Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
What is Database Transaction ?
Transaction Management
In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Linux Server Hacks
Book Description:
Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...
Google Search for Serial Key
Serial Key
If you want to use any software n software is asking to enter key and you don't have key.
What you will do now?
Buy ...
Hacking is crime or not?
Hacking:
Is an art of gaining unauthorized access into any system either by hook or by crook!
This is the definition what everyone think. But according to...
The Power Of Social Networking
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
IPv4 Classes
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...
Linux in a Nutshell, 6th Edition
Book Description:
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...
Hash Detector BTr3
Hash Detector BackTrack r3
/* To Detect what type of algorithm is used to make hash encrypted */
root@bt:~# cd /pentest/passwords/hash-identifier
root@bt:/pentest/passwords/hash-identifier# ls
...



