DBMS vs FPS

0
DBMS vs FPS ( File Processing System) Flexibility Because programs and data are independent, programs don’t have to be modified when types of unrelated data...

Masking and IP Addressing format

0
Types of Addressing Classful Addressing Classless Addressing Classful Addressing  IPv4 uses concept of classes. This architecture is called classful addressing  Types of Classes                                 Class...
linux

Linux Server Hacks

0
Book Description:  Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every...

Top 16 Hackers Friendly Linux OS

0
16 Hackers Friendly Linux OS Kali Linux OS: One of the most advanced penetration-testing platform developed by offensive security. Its flavors are available in both...

cPanel Security Team: glibc CVE-2015-7547

0
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...

Best DNS Server -> Increase Internet Speed

0
List of Top 10 Best DNS Server : To increase Internet Speed Google: Preferred DNS server - 8.8.8.8 Alternate DNS server - 8.8.4.4 Norton DNS: Preferred...

What is Database Transaction ?

0
Transaction Management In database, transaction gins technically when 1st executable SQL statements is encountered. An executable SQL statement is encountered. An executable SQL statement generates...

All About Tor

0
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties: Your internet service provider, and...

Hackers Handbook

0
The Web Application Hackers Handbook - (Worthy for Beginners)   The Web Application Hackers Handbook is one of mine second favorite E-book with 500+ Hacking Pages...

IT Cyber Space Law

0
IT Act Section 66 to 69 Sec 66 Computer Related Offences If any person, dishonestly, or fraudulently, does any act referred to in section 43, he...