Summer Internship 2017
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...
Database Transaction
Database Transaction
Transaction is a Collection of operations that forms a single logical unit of work.
A transaction is an atomic unit of work that...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Make Write Protection USB/SDCARD
Write Protection USB or SDCARD
C:diskpart
DISKPART> list disk
/* Displays the list of disk available */
DISKPART> select disk 1
/* Select your desired Drive */
DISKPART> attributes disk...
IPv4 Classes
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...
cPanel Security Team: glibc CVE-2015-7547
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
Google Search for Serial Key
Serial Key
If you want to use any software n software is asking to enter key and you don't have key.
What you will do now?
Buy ...



