All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
cPanel Security Team: glibc CVE-2015-7547
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Summer Internship 2017
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
SSL Installation on Webmin
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...





