APPLICATIONS OF FIREWALL & FIREWALL EVASION TOOLS
APPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the
Read moreAPPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the
Read moreDATABASE ATTCKS we have list of most critical database attacks, & they are: 1. Excessive privileges: When users (or applications)
Read moreINTRODUCTION Data means groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.Data
Read moreMerge Sort Algorithm Merge Sort is a Divide and Conquer algorithm. It divides input array in two halves, calls itself for the
Read moreLinear Search vs Binary Search A Linear Search is the most basic type of searching algorithm. A Linear Search sequentially moves through your collection (or data
Read moreMatrix multiplication program in C Matrix multiplication in C language to calculate the product of two matrices (two-dimensional arrays). A
Read morePROTECTING YOUR PASSWORD AND LOGGING ON SECURELY Hackers who know your password do not have to resort to technological exploits;
Read moreSOFTWARE SECURITY FOR PORTABLE COMPUTERS The best defense for portable computers is theft prevention, but there are ways to minimize
Read morePROTECTING YOUR COMPUTER AND NETWORK PHYSICALLY SECURING LAPTOP/NOTEBOOK/HANDHELD COMPUTERS Portable computers can be even more vulnerable because it is
Read more