Ebooks

Permissions in a Shell (Myanmar)

ဒီ Tutorial ေလးမွာေတာ့ Linux Permission Flag ေတြ အေၾကာင္း ..Web Server Intrusion အေၾကာင္း Index Defacing ေတြအေၾကာင္းတစ္ေစ့တစ္ေစာင္းေ၇းသားထားတဲ့ Tutorial ေလးပါ ။ Download

Cpanel Cracking Ebook(Myanmar)

Cpanel Cracking အေၾကာင္း Tutorial ေလးတစ္ခုပါ။။ အမွားပါလွ်င္ ကြ်န္ေတာ္၏ ညံဖ်င္းမွုေၾကာင့္သာျဖစ္ပါတယ္။ Special Thanks to King Cobra ( United Bangladeshi Hackers )  By dr.t3rr0r Download – Click Here 

Differences between WordPress, Durpal and Joomla

Here is the a lists of characteristics for WordPress,Drupel and Joomla that of most are the CMS ! Joomla – is a free and open-source content management framework (CMF) for publishing web content. It is built on a model–view–controller web application framework that can be used independently of the CMS. WordPress –  is a free …

Differences between WordPress, Durpal and Joomla Read More »

[Ebook] Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can …

[Ebook] Basic Security Testing with Kali Linux Read More »

Assembly language

 An assembly language is a low-level programming language for a computer, or other programmable device, in which there is a very strong (generally one-to-one) correspondence between the language and the architecture’s machine code instructions. Each assembly language is specific to a particular computer architecture, in contrast to most high-level programming languages, which are generally portable …

Assembly language Read More »

Certified Ethical Hacker (CEH) v.8 Courseware Searchable PROPER

Certified Ethical Hacker (CEH) v.8 Courseware Searchable PROPER Download Links: CEH v8 Labs Module 00 CEH v8 Labs Module 02 Footprinting and Reconnaissance CEH v8 Labs Module 03 Scanning Networks CEH v8 Labs Module 04 Enumeration CEH v8 Labs Module 05 System Hacking CEH v8 Labs Module 06 Trojans and Backdoors CEH v8 Labs Module …

Certified Ethical Hacker (CEH) v.8 Courseware Searchable PROPER Read More »

Briefly Explanation Of Hyper-Visior Technology

Virtualization, the technology of abstracting the operating systems from theunderlying physical server components, has become a cornerstone of the data centerarchitecture. Virtualization allows organizations to run not just one operating systemper physical server in the data center, but tens, dozens, or even hundreds, on asingle physical server. The benefits of virtualization are many, including a …

Briefly Explanation Of Hyper-Visior Technology Read More »

error: Content is protected !!