Character Encoding

Character Encoding

0
URL Character Encoding  Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F This complex %20 sign are nothing but Character Encoding in Hex form.    Special             Hex                 Ascii...

Enable Right Click on WebPage

0
Click "Tools"->"Internet Options" Click the "Security" tab Click "Custom Level" Scroll down to the "Scripting" section Set "Active Scripting" to "disable" Click "Ok"

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...

Normalization

0
It deals with the database design problem Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...

What is Database Transaction ?

0
Transaction Management In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...

Acunetix v10.5 released

0
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd