Amity YOUTH FEST 2017
Amity Youth Festival 2017
Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...
Linux Server Hacks
Book Description:
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
Brave Summarizer takes on Bing and ChatGPT at the AI search results game
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...
PHPMyAdmin Version Update
Whenever you are dealing with Server i.e XAMPP and you don't want reinstall server and still you want to update version of PHPMyAdmin.
...
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Google Search for Serial Key
Serial Key
If you want to use any software n software is asking to enter key and you don't have key.
What you will do now?
Buy ...
Hackers Handbook
The Web Application Hackers Handbook - (Worthy for Beginners)
The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....







