Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Acunetix v10.5 released
The new version tests for vulnerabilities in popular content management systems Joomla! and Drupal. The proprietary database includes close to 300 Drupal and Joomla!...
MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...
Amity YOUTH FEST 2017
Amity Youth Festival 2017
Amity University’s Computer Science Department cordially invite your college students to participate in a Three-day fest organized bythe University from the...
Python Programming
Book Description:
You will learn fundamentals like IP, TCP, DNS and SSL by using working Python programs; you will also be able to familiarize yourself...
Brave Summarizer takes on Bing and ChatGPT at the AI search results game
Hopping on the AI train, Brave is incorporating its own AI-powered search function to its web browser called Summarizer – similar to what Microsoft...
DBMS Overview
Overview of DBMS(Database Management System)
A DB (Database) is a complex software package with computer programs that control the creation, maintenance and use of database.
DB(Database)...
Enable Right Click on WebPage
Click "Tools"->"Internet Options"
Click the "Security" tab
Click "Custom Level"
Scroll down to the "Scripting" section
Set "Active Scripting" to "disable"
Click "Ok"
Database Transaction
Database Transaction
Transaction is a Collection of operations that forms a single logical unit of work.
A transaction is an atomic unit of work that...
DBMS vs FPS
DBMS vs FPS ( File Processing System)
Flexibility
Because programs and data are independent, programs don’t have to be modified when types of unrelated data...


