Making Sense of NoSQl

0
Book Description:  If you want to understand and perhaps start using the new data storage and analysis technologies that go beyond the SQL database model,...

Hacking is crime or not?

0
Hacking: Is an art of gaining unauthorized access into any system either by hook or by crook! This is the definition what everyone think. But according to...

Cyber Law

0
Facebook Cyber Laws of IndiaWhat’s covered? Facebook posts Messages Comments etc.  Even “liking” or “sharing” these posts could get a person into trouble....

MAC

0
MAC ( Media Access Control ) Address  Address of any network card eg. Wifi Card, Ethernet Card, Bluetooth adapter, VMware Virtual network adapter etc.. MAC...
kali OS

Hash Detector in Kali Linux

0
   Hash Detector Kali       /* To Detect what type of algorithm is used to make hash encrypted */      root@kali:~# cd /usr/bin            root@kali:/usr/bin/# hash-identifier         ...

What is Bandwidth / Traffic

0
BandWidth Explained Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting?...

Masking and IP Addressing format

0
Types of Addressing Classful Addressing Classless Addressing Classful Addressing  IPv4 uses concept of classes. This architecture is called classful addressing  Types of Classes                                 Class...

IPv4 Classes

0
This architecture of IPv4 classes is called classful addressing. In classful addressing, the address space is divided into 5 classes: A, B, C, D,...

Represent Decimal > 8-Bit Notation

0
Denoting decimal ( Base 2 )  numbers into 8-Bit Binary Notation eg.    255  in binary  =  11111111         16     in binary  =  00010000
linux

Linux /etc/shadow File

0
This was Linux Shadow file for linux users file /etc/passwd