IGNOU BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB pdf Book Download

ignou

IGNOU BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB  pdf Book Download Course Code Course Title Download BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB  BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB Unit-1 BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB Unit-2 BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB Unit-3 BCSL-013 COMPUTER BASICS AND PC SOFTWARE LAB Unit-4 … Read more

IGNOU BCS-011 COMPUTER BASICS AND PC SOFTWARE pdf Book Download

ignou

IGNOU  BCS-011 COMPUTER BASICS AND PC SOFTWARE  pdf Book Download   Course Code Course Title Download BCS-011 COMPUTER BASICS AND PC SOFTWARE  Basics of Computer Hardware Basics of Computer Software Internet Technologies

Use of Semicolons in Shell Script

shell programming

Use of Semicolons in Shell Script Instead of being on separate lines, statements can be separated by a semicolon (;) – For example: if grep “UNIX” myfile; then echo “Got it”; fi – This actually works anywhere in the shell. % cwd=`pwd`; cd $HOME; ls; cd $cwd  

if Statement in Shell Script

shell programming

if Statement in Shell Script Simple form: if decision_command_1 then command_set_1 fi   Example: if grep unix myfile >/dev/null then echo “It’s there” fi        

for Loops in Shell Script

shell programming

for Loops in Shell Script for loops allow the repetition of a command for a specific set of values Syntax: for var in value1 value2 … do command_set done – command_set is executed with each value of var (value1, value2, …) in sequence for loop example in shell script #!/bin/sh # timestable – print out … Read more

Disadvantages of Ethical Hacking

As with all types of activities which have a darker side, there will be…..dishonest people presenting drawbacks. The possible drawbacks of ethical hacking include: The ethical hacker using the knowledge they gain to do malicious hacking activities Allowing the company’s financial and banking details to be seen The possibility that the ethical hacker will send … Read more

The Advantages of Ethical Hacking

Testing Security Measures The primary advantage of having ethical hackers on a company’s payroll is that the hackers are allowed to test a company’s security measures in a controlled, safe environment. These hackers can help companies determine which of their computer security measures are effective, which measures need updating, and which ones pose little to … Read more

TYPES OF HACKING

One of the most frequent threats of hacking is those faced by the websites. It is very common to see a particular website or online account being hacked open intentionally using unauthorized access and its contents being changed or made public. The web sites of political or social organizations are the frequent targets by groups … Read more