Skip to main content

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

DHCP principle , DHCP server and client communication process

1. Explain with principle: the DHCP server and client communication process DHCP stands for Dynamic Host Configuration Protocol. It handles the automatic assignment of IP addresses and other configuration settings for devices on your network. DHCP automates Network and Sharing Center in your control panel. This is especially good for people who have laptops, aren't hooked up to the Internet all the time and often move from place to place with their portable devices. They can simply get a new IP address as needed without having to do it manually. DHCP is designed to make the assignment of IP addresses and other network configuration information faster and easier. DHCP is a protocol that uses Level 4 on the OSI model. It communicates using User Datagram Protocol (UDP) datagrams through UDP Port 68. DHCP works with most current and past Windows clients, and also Linux, Macintosh, and many network-capable printers. DHCP is desi...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

Hot New Technologies

  1. 3D printing
  2. 3G-vs-WiFi
  3. 4G technology
  4. 5G Technology
  5. Asynchronous Chips
  6. Blue Eyes Technology
  7. Bluejacking
  8. Blue Brain
  9. Braingate
  10. Biochips
  11. Bluetooth Technology
  12. Blue ray Disc
  13. Biometric Security System
  14. Cloud Computing
  15. CAD/CAM
  16. Conditional Access System
  17. Cryptography
  18. Computer Networks
  19. CORBA
  20. Common Gateway Interface (CGI)Carbon Nano Technology
  21. Cyber Crime
  22. Computer Peripheral
  23. Computer Forensics
  24. Data Warehousing
  25. Deepweb
  26. Daknet
  27. Data Storage On Fingernail
  28. Digital Signature
  29. Database Management System (DBMS)
  30. Data Mining
  31. Digital Light Processing
  32. Domain Name System (DNS)
  33. DNA Computing
  34. Denial-of-service attack(DOS)
  35. Distributed denial-of-service attack (DDoS)
  36. Embedded Systems
  37. E-ball Technology
  38. Enterprise Resource Planning (ERP)
  39. Extreme Programming (EP)
  40. Firewall
  41. Google Chrome OS
  42. Graphic Card
  43. GSM (Global System for Mobile Communications)
  44. Graphics Processing Unit (GPU)
  45. Google Glass
  46. Gi-Fi Technology
  47. Green Computing
  48. Holographic Memory
  49. Honeypot
  50. HSPA(High Speed Packet Acess)
  51. Human Computer Interface
  52. Invisibility Cloaks
  53. iPad
  54. IP Spoofing
  55. IP Telephony
  56. IPV6 ( The next generation protocal)
  57. Intrusion Detection Systems (IDS)
  58. Java Ring
  59. Jini Technology
  60. Li-Fi Technology
  61. LAMP Technology
  62. Linux Operating Systems
  63. Mind Reading
  64. Meta Search Engine
  65. Mobile Computing
  66. Mobile Jammer
  67. Middleware Technologies
  68. Mobile Phone Cloning
  69. Mobile Number Portability (MNP)
  70. Nanotechnology
  71. Network Security
  72. Night Vision Technology
  73. Operating System
  74. Optical Fiber
  75. Podcast
  76. Polymer Memory
  77. Phishing
  78. PICO projectors
  79. Pill Camera
  80. Restful Web Services
  81. Robotics
  82. SDLC  (Software Development life cycle)
  83. Sixth Sense Technology
  84. Software Reuse
  85. Search Engine
  86. Symbian OS
  87. Service Oriented Architecture (SOA)
  88. Steganography
  89. Smart Fabrics
  90. Search Engine Optimization(SEO)
  91. SNMP
  92. Software Testing
  93. Tidal Energy
  94. UNIX Operating System
  95. Universal Serial Bus (USB)
  96. Virtual Private Network (VPN)
  97. Virus and Anti Viruses
  98. Voice over Internet Protocol (VoIP)
  99. WIFI
  100. WIMAX
  101. Wibree
  102. Wireless Fidelity
  103. Wearable Computing
  104. Wireless Sensor Networks (WSN)
  105. Wireless Mesh Network
  106. Zigbee

Comments

Post a Comment