MitM

Man-in-the-Middle (MitM)

Intercepting and Redirecting Genuine Web Sites Traffic Man-it-the-Middle attack uses proxy servers, DNS poisoning and local Hosts file tampering to intercept and redirect end user traffic to fake sites. Fraudsters use MitM tactics to capture login credentials and other sensitive data and tamper with transactions in real-time. MitM attacks can be …

bigdata-larger-pane_0

Big Data Analytics

Big data analytics refers to the process of collecting, organizing and analyzing large sets of data (“big data”) to discover patterns and other useful information. Big data analytics will help organizations to better understand the information contained within the data and will also help identify the data that is most …

A Brief History of C++

A Brief History of C++

Nowadays computers are able to perform many different tasks, from simple mathematical operations to sophisticated animated simulations. But the computer does not create these tasks by itself; these are performed following a series of predefined instructions called computer languages. A computer language is a set of instructions and a series …

cookie_2

Cookies and Security

Cookies would seem to have all the security they need by virtue of the domain, path, andsecure options, but the nature of web pages complicates the matter significantly. User logins and session hijacking One of the most common uses for cookies is to track user login state. The mechanism is quite simple: you …

DMZ

DMZ (demilitarized zone)

In computer networks, a DMZ (demilitarized zone) is a computer host or small network inserted as a “neutral zone” between a company’s private network and the outside public network. It prevents outside users from getting direct access to a server that has company data. (The term comes from the geographic …

BFSGraph

Breadth First Search in C++

Breadth First Search in C++ – Algorithm and Source Code Basic Theory Breadth – first searches are performed by exploring all nodes …

hash-collision

Collision

Collision or clash is a situation that occurs when two distinct pieces of data have the same hash value, checksum, fingerprint, or cryptographic digest. Collisions are unavoidable whenever members of a …

Function in WHERE clause

Function in WHERE clause

  Introduction When we are using the function in the SELECT statement it returns data depends on the number of records retrieve …

vicheatsheet

Basic vi Commands

General Startup To use vi: vi filename To exit vi and save changes: ZZ or :wq or : x To exit vi …

Microsoft_SQL_Server_Logo.svg

Microsoft SQL Server Cluster

When someone heard about SQL server clustered, he think that it is a big staff to handle.  But believe me if you …