Web-Hosting

Internet and Domain Hosting

0
What is web hosting? Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...

Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

Mile2’s C)PTE vs. CEH®

0
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH? To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

The Power Of Social Networking

0
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...

2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
Database 3-Level Architecture

Database 3-Level Architecture

0
External Level : The User’s view of the database Consists of a no. of different external views of the DB Describes part of the...
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd