Database Keys

0
Keys A key is a single or combination of multiple fields. Its purpose is to access or retrieve data rows from the table account to...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

What is Bandwidth / Traffic

0
BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...

Top 16 Hackers Friendly Linux OS

0
16 Hackers Friendly Linux OS Kali Linux OS: One of the most advanced penetration-testing platform developed by offensive security. Its flavors are available in both...
Character Encoding

Character Encoding

0
URL Character Encoding  Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F This complex %20 sign are nothing but Character Encoding in Hex form.    Special             Hex                 Ascii...

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...