MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

Normalization

0
It deals with the database design problem Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

Make Write Protection USB/SDCARD

0
Write Protection USB or SDCARD C:diskpart DISKPART> list disk /* Displays the list of disk available */ DISKPART> select disk 1  /* Select your desired Drive */ DISKPART> attributes disk...
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...

Python Programming

0
Book Description:  You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...

DBMS vs FPS

0
DBMS vs FPS ( File Processing System) Flexibility Because programs and data are independent, programs don’t have to be modified when types of unrelated data...
summer- internship-2017

Summer Internship 2017

0
Summer training program provide great opportunity for every learners to utilize their summer vacation in the right manner. Student will able to develop active...