All About Tor

0
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties: Your internet service provider, and...

DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...
Database Users

Database Users

0
Database End Users End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

cPanel Security Team: glibc CVE-2015-7547

0
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
summer- internship-2017

Summer Internship 2017

0
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....
Web-Hosting

Internet and Domain Hosting

0
What is web hosting? Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
Install SSL on Webmin

SSL Installation on Webmin

0
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...