IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

Presentation on TOR

0
This presentation is upon TOR Project. If you need any assistance feel free to contact us.  
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd

Normalization

0
It deals with the database design problem Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...

Brave Summarizer takes on Bing and ChatGPT at the AI search results game

0
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...

IPC Section for Cyber Laws

0
IPC Section for Cyber Laws Indian Penal Code for IT World Section 378,379. Theft of Computer  Hardware Section 464. Making a False Document Section 468....

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...