DBMS Overview

0
Overview of DBMS(Database Management System) A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database. DB(Database)...

Mile2’s C)ISSO vs. ISC’s CISSP®

0
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...

cPanel Security Team: glibc CVE-2015-7547

0
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
Character Encoding

Character Encoding

0
URL Character Encoding  Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F This complex %20 sign are nothing but Character Encoding in Hex form.    Special             Hex                 Ascii...
Database Users

Database Users

0
Database End Users End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...

Presentation on TOR

0
This presentation is upon TOR Project. If you need any assistance feel free to contact us.  

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow