Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
Hacking is crime or not?
Hacking:
Is an art of gaining unauthorized access into any system either by hook or by crook!
This is the definition what everyone think. But according to...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Normalization
It deals with the database design problem
Normalization process concerns with the transformation of the conceptual schema (logical data structure) into computer representable...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
Oracle Inside
Oracle Architecture
Basically, these are two main components of ORACLE Database Architecture.
Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
Linux /etc/shadow File
This was Linux Shadow file for linux users file /etc/passwd


