E-books & Knowledge Base
Hello Folks, Once again, I’m back with another piece of information which is useful for the users. Almost all the internet audience will be targeted on this since it’s a privacy & protecting your self over the internet. Okay!! Today’s topic is about the famous malware which is spreading over the [...]
Followed by azker‘s article on OSI model Part-1 and Part-2. In this article I will explain what this ARP and why it’s important to know about it. In OSI Layers you see there are two types of addresses in OSI model. Network layer contains IP address and Datalink layer contains MAC address. When I was learning OSI Layers this [...]
Have you missed the 1st part.. Read -> PART 1 Assuming you’ve read Part 01, I’m continuing to explain by expanding this article.. 🙂 Alright!! I hope you’ve got to learn something about OSI model as we now going to learn about the networking layers which defines this model. As I’ve explained, there are seven [...]
Hmm!! Network layers… *sigh*… 😕 But, what the he*k is this OSI model & why….??!?!? Hehe… Jus’ chill out & take sometime to read this article if you love to study about networking… Alright!!! now we’ll start moving on to the topic… Okay, now if you’re a networking dude [...]
These are the disk storage types you use to see on windows environment. As a Microsoft user we knows only to format, copy/paste & store DATA’s within the hard disk. But, we never knew what actually can we do using these disk types or what benefit does it offer for it’s users. Well, there are two types of disk storage [...]
Discuss more about posts, topics & issues at our GeekLK Help Zimbra, an open source mail server is not just to send and receive emails but it’s a fully featured collaboration suite which includes calendar, tasks, file-sharing, IM, mobile support and many more… Now, I wanted to deploy an email server on my work [...]
For your information, there are different kinds of Database structures over the internet such as Oracle, Microsoft SQL Server, MySQL.. etc. Now we’re discussing here; about MySQL which can be run through phpMyAdmin. It is actually an open-source tool written on PHP intended to handle the administration of MySQL [...]
Session Hijacking also known as a Sidejacking, is an attack stealing someones web session to gain unauthorized access. What is a web (HTTP) session Each & every time a user log into Facebook, Twitter or your banking account… etc, the web server will give the user a session ID or a token while the web browser stores [...]
Mobile, Cloud, Social and Data Analytic Technologies are Expected to be the big movers in 2012, says a December 2011 article from iTWire. Virtualization and security were already buzzwords in 2011, but new in 2012 is the emphasis on enterprise social collaboration and business analytics Technology.
The shocking job losses at the end of the last decade have resulted in reversing the prosperity curve, with the highest rate of unemployment since the early 1980s. Although, the recovery is slower, however, there is evidence that the economy and hiring trends especially in IT industry is on the rise in 2011 and 2012.