SSL Installation on Webmin
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...
Masking and IP Addressing format
Types of Addressing
Classful Addressing
Classless Addressing
Classful Addressing
IPv4 uses concept of classes. This architecture is called classful addressing
Types of Classes
Class...
IPC Section for Cyber Laws
IPC Section for Cyber Laws
Indian Penal Code for IT World
Section 378,379. Theft of Computer Hardware
Section 464. Making a False Document
Section 468....
Linux Password Stored Format in /etc/passwd
This was Linux users file, to understand linux password file /etc/shadow
cPanel Security Team: glibc CVE-2015-7547
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
IT Cyber Space Law
IT Act Section 66 to 69
Sec 66 Computer Related Offences
If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
PHPMyAdmin Version Update
Whenever you are dealing with Server i.e XAMPP and you don't want reinstall server and still you want to update version of PHPMyAdmin.
...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...




