Internet and Domain Hosting
What is web hosting?
Web Hosting is a service that provides internet users with online computer systems for storing information, images, video, or any content...
Making Sense of NoSQl
Book Description:
If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...
Hash Detector in Kali Linux
Hash Detector Kali
/* To Detect what type of algorithm is used to make hash encrypted */
root@kali:~# cd /usr/bin
root@kali:/usr/bin/# hash-identifier
...
Cyber Law
Facebook Cyber Laws of IndiaWhat’s covered?
Facebook posts
Messages
Comments etc.
Even “liking” or “sharing” these posts could get a person into trouble....
Mile2’s C)PTE vs. CEH®
WHY IS MILE2’S C)PTE PREFERABLE OVER THE EC Councils CEH?
To begin, it’s noteworthy to mention that mile2 was the first to bring the CEH...
MAC
MAC ( Media Access Control ) Address
Address of any network card
eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc..
MAC...
The Power Of Social Networking
In 21st century we do not need a pen or paper to convey our thoughts to someone who is miles away.The term social networking...
2 – Phase Commit Protocol
Commit Protocol
In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
Database 3-Level Architecture
External Level :
The User’s view of the database
Consists of a no. of different external views of the DB
Describes part of the...
Linux /etc/shadow File
This was Linux Shadow file for linux users file /etc/passwd




