+91 9116117170

Category: Linux

What is Hacking and Their Types

By Shaurya Sharma 0 Comment December 3, 2016

What is Hacking Through the 1990s, the term “hacker” formerly denoted a skilled programmer, experienced in machine code and computer working or functioning. In particular, these individuals could always crack on an unsatisfactory system to solve problems and have interaction in a little software company watching by interpreting a competitor’s code. There are many types […]

How to Delete DNS Cache using Command Prompt

By Shaurya Sharma 0 Comment November 14, 2016

The computer system generally saves the URL of websites that you visit up a lot of times, prevent up searching for the DNS each time. This is stored on your computer in form of caches but this may sometimes cause in the DNS Errors if the caches become damaged. Now the thing is that you […]

How to install Nmap on Linux & Windows

By Shaurya Sharma 0 Comment September 10, 2016

What is Nmap Nmap is stands for Network Mapper, which is open source, used for find network and auditing for security. Network administrator are used for monitoring host or service up time, network inventory, managing service and upgrade networking schedules. Nmap also use raw IP packets are many ways to identify which hosts are available […]

What is SQL Injection?

By Shaurya Sharma 0 Comment August 22, 2016

Introduction of SQL SQL stands for Structured Query Language. It is used to exchange information with Database like create/update/delete. Standard Language for Relational Database Management System according to ANSI (American National Standards Institute). Used to perform task with database like create/delete/update/rename database and tables. In a database data is stored in table (Rows and Columns) form. Introduction […]

Virtual Private Network (VPN)

By Shaurya Sharma 2 Comments August 6, 2016

What is VPN A VPN or Virtual Private Network is a technique used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are generally employed by corporations to protect sensitive data. However, by using a personal VPN is more and more becoming very popular as more interactions […]

error: Content is protected by Cyberops !!