2 – Phase Commit Protocol

0
Commit Protocol In transaction processing, databases & comp. n/w, the 2 Phase commit is a type of atomic commitment protocol ( ACP ). It...
linux

Linux Password Stored Format in /etc/passwd

0
                          This was Linux users file, to understand linux password file /etc/shadow

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

All About Tor

0
Tor Browser uses the Tor network to protect your privacy and anonymity. Using the Tor network has two main properties: Your internet service provider, and...

Mile2’s C)ISSO vs. ISC’s CISSP®

0
WHY IS MILE2’S C)ISSO PREFERABLE OVER THE POPULAR ISC2’s CISSP? It’s noteworthy to bring to light that the same international author, Kevin Henry, who wrote...

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...

cPanel Security Team: glibc CVE-2015-7547

0
CVE-2015-7547 may be a crucial vulnerability in glibc affecting any versions larger than 2.9. The DNS client side resolver function getaddrinfo() employed in the...
linux

Linux in a Nutshell, 6th Edition

0
Book Description: Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins --...

Oracle Inside

0
Oracle Architecture Basically, these are two main components of ORACLE Database Architecture. Oracle Architecture is an Object – Relational Database Management System, provides an open comprehensive...
ubuntu

UbuntuHacks

0
Book Description:  Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners...