Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
Web-Hosting

Internet and Domain Hosting

0
What is web hosting? Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...

SSL Handshake (443)

0
SSL Handshake (443 port of server at which SSL connection is made)                                                                         Client  (Browser)    ---------------------Client Hello Msg.------------------------------------> Server ·         Highest SSL Version ·         Compression (SHA1, SHA1-DES) ·        ...

DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow

Make Write Protection USB/SDCARD

0
Write Protection USB or SDCARD C:diskpart DISKPART> list disk /* Displays the list of disk available */ DISKPART> select disk 1  /* Select your desired Drive */ DISKPART> attributes disk...

IPv4 Classes

0
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...

Database Keys

0
Keys A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...

What is Bandwidth / Traffic

0
BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...