Mile2’s C)ISSO vs. ISC’s CISSP®

0
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...

What Is Network Topology And What Are Its Different Types?

0
What is Network Topology? Network topology is the arrangement of the different networking elements like network links, computers, switches, nodes, Wi-Fi access points, laptops and...
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd

Hash Detector BTr3

0
   Hash Detector BackTrack r3       /* To Detect what type of algorithm is used to make hash encrypted */      root@bt:~# cd /pentest/passwords/hash-identifier            root@bt:/pentest/passwords/hash-identifier# ls     ...
linux-security-bug

Linux kernel vulnerability discovered

0
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
Database Users

Database Users

0
Database End Users End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...

The Power Of Social Networking

0
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000