Category: Uncategorized

What is Redis

History of Redis Redis is an in-memory data structure project implementing a distributed, in-memory key-value database with optional durability. Redis supports different kinds of abstract data structures, such as strings, lists, maps, sets, sorted sets, HyperLogLogs, bitmaps, streams, and spatial

DRDO CEPTAM 09 COMPUTER SCIENCE EXAM PREPARATION TUTORIAL WITH FULL SYLLABUS

DRDO CEPTAM 09 COMPUTER SCIENCE EXAM PREPARATION TUTORIAL WITH FULL SYLLABUS PART ONE   DRDO ENTRY TEST : CEPTAM-09/STA-B Advt NETWORKING PROTOCOLS Networking Protocols include;- FTP=      File Transfer Protocol : port=21 SSH =      Secure Shell : port =22

Tagged with: , ,

What is Network Marketing and How does It Work Direct Selling and MLM

What is Network Marketing and How does It Work Direct Selling and MLM What is Network Marketing and How does It Work Direct Selling and MLM:-In  this  cyberpoint9 tutorial we are going to describe about the  concept of Network Marketing and How does

Tagged with: , , , , , , , , , , , , , , , , , , , , , , ,

Introduction to Penetration Testing

Introduction to Penetration Testing ———————————– Its a post info gathering phase in which we exploit the vulnerabilities discovered in the VA phase. WEB PT NETWORK PT MOBILE PT – Mobile SF Framework .apk .ipa Documentation : Digital Security Report Ethics

Introduction to System Hardening Basic Security Configuration

Session 17 ========== Introduction to System Hardening Basic Security Configuration Automated Security Analyzers – Lynis Basics Of Shell Scripting Introduction to System Hardening ================================ Hardening is usually a process of securing the system by reducing its surface of vulnerability. A

Introduction Of Honeypot Study Material Notes in Cyber Security

Introduction Of Honeypot Study Material Notes in Cyber Security Introduction Of Honeypot Study Material Notes in Cyber Security :-In  this  cyberpoint9 tutorial we are going to describe about the  concept wireless security and their policy and protocols in ethical hacking cyber programming. And also we

Introduction to wireshark

WIRESHARK ========== Wireshark is a free application that allows you to capture and view the data traveling back and forth on your network, providing the ability to drill down and read the contents of each packet – filtered to meet

Joomla Content Management System

What Is a CMS? ================ A Content Mnagement System(CMS), is a system that allows you to manage information easily and effectively. The information could be anything, whether it’s a simple article or a complex media management system. It’s for non-technical

Conetent Managment System

G2 S13 ====== Content Management System ————————- For creating a whole new website, you just need to drag and drop the site’s element only. You do not need to have very awesome knowledge of HTML, JS, PHP and all…. So

INTRODUCTION TO NESSUS

INTRODUCTION TO NESSUS ====================== Nessus is one of the most popular and capable vulnerability scanners, it is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture regarding all the CVE’s , CWE’s , CVSS Scores and

Top
Show Buttons
Hide Buttons