Top 16 Hackers Friendly Linux OS
16 Hackers Friendly Linux OS
Kali Linux OS:
One of the most advanced penetration-testing platform developed by offensive security. Its flavors are available in both...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
What is Bandwidth / Traffic
BandWidth Explained
Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
PHPMyAdmin Version Update
Whenever you are dealing with Server i.e XAMPP and you don't want reinstall server and still you want to update version of PHPMyAdmin.
...
SSL Handshake (443)
SSL Handshake (443 port of server at which SSL connection is made)
Client (Browser) ---------------------Client Hello Msg.------------------------------------> Server
· Highest SSL Version
· Compression (SHA1, SHA1-DES)
· ...
Presentation on TOR
This presentation is upon TOR Project.
If you need any assistance feel free to contact us.
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...


