Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
All About Tor
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties:
Your internet service provider, and...
Summer Internship 2017
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
SSL Installation on Webmin
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...
Represent Decimal > 8-Bit Notation
Denoting decimal ( Base 2 ) numbers into 8-Bit Binary Notation
eg. 255 in binary = 11111111
16 in binary = 00010000





