Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...

DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...
Character Encoding

Character Encoding

0
URL Character Encoding  Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F This complex %20 sign are nothing but Character Encoding in Hex form.    Special             Hex                 Ascii...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....