Amity YOUTH FEST 2017
Amity Youth Festival 2017
Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...
Linux kernel vulnerability discovered
Linux kernel vulnerability have been discovered recently (CVE-2017-6074). It may be exploited to achieve kernel code execution from an unprivileged processes. For example an...
IPv4 Classes
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
DBMS Client/Server Computing
Client/Server Architecture for DBMS
Client/Server Computing represents a model wherein requests are made at one end & the client end and provided at another...
Mile2’s C)ISSO vs. ISC’s CISSP®
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP?
It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...
SSL Installation on Webmin
The following instructions will guide you through the SSL installation method on Webmin. If you have got more than one server or device, you...
Character Encoding
URL Character Encoding
Many time in URL we see eg. www.example.com/page?val=cat%20%2E%2E%2F
This complex %20 sign are nothing but Character Encoding in Hex form.
Special Hex Ascii...
Database Users
Database End Users
End users are the people whose jobs require access to the database for querying, updating and generating reports; database primarily exists for...
Best DNS Server -> Increase Internet Speed
List of Top 10 Best DNS Server : To increase Internet Speed
Google:
Preferred DNS server - 8.8.8.8
Alternate DNS server - 8.8.4.4
Norton DNS:
Preferred...




