Skip to main content

Posts

Showing posts with the label security

Popular posts from this blog

CISC VS RISC computers (all details)

CISC Introduction            The term "CISC" (complex instruction set computer or computing) refers to computers designed with a full set of computer instructions that were intended to provide needed capabilities in the most efficient way. Intel's   Pentium   microprocessors are CISC microprocessors. CISC is a   processor design   where single   instructions   can execute several low-level operations (such as a load from   memory , an arithmetic   operation , and a   memory store ) or are capable of multi-step operations or   addressing modes   within single instructions. The primary goal of CISC architecture is to complete a task in as few lines of assembly as possible. This is achieved by building processor hardware that is capable of understanding & executing a series of operations, this is where our CISC architecture introduced. T...

Google Dorks for sql injection | new 2017 |

default.php?catID= cart_additem.php?id= item_show.php?code_no= details.php?BookID= item.php?prodtype= inurl:php?id+site:it+show inurl:php?id+site:fr+show inurl:php?id+site:dk+shop inurl:php?id+site:pt+shop inurl:php?id+site:za+shop inurl:php?id+site:fi+shop acclogin.php?cartID= addToCart.php?idProduct= inurl:php?id+site:es+shop inurl:php?id+site:ro+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+checkout List.php?CatID= inurl:php?id+site:au+product inurl:php?id+site:au+succes inurl:php?id+site:uk+shop inurl:php?id+site:au+shop inurl:php?id+site:fr+shop inurl:php?id+site:it+shop inurl:php?id+site:de+shop inurl:php?id+site:pl+shop itemdetail.php?item= inurl:php?id+site:au+checkout

what are Auxiliary Storage Devices ? (squential vs Random auxiliary storage)

              Auxiliary storage, secondary storage, or external storage are devices that store noncritical system data like documents, multimedia and programs, which are used whenever they are required. These files are invoked from the auxiliary storage when needed and then transferred to the primary storage so that the CPU can process them. The results of the process can also be sent back to the auxiliary storage for later retrieval. These storage devices hold data and programs for future use and are considered nonvolatile storage that retains information even when power is not available. The best example of auxiliary storage is hard disk drives and optical storage media like CDs, DVDs, and Blue ray. Other auxiliary storage belongs to the peripheral devices category as well, such as flash drives and any type of memory card. ž   Auxiliary storage devices can be categorized in two types based on data access.  1. Sequential Access ...

FaceApp can use your Personal details : It's terms and conditions are Disturbing | Don't use FaceApp If privacy matters to you.

FaceApp is allowed to use your name, username or any likeness provided in any media format it likes without compensation, meaning you will not be paid for it, or have any ability to take it down or complain about it.  This is also because FaceApp uploads your photo to the cloud for processing, it doesn’t carry out on-device processing like many apps do. After doing so, it retains the image long after you’ve deleted the app and moved on to the next viral sensation. People using the app are not made aware of this.  If you have time please read FaceApp terms and conditions.  https://www.faceapp.com/privacy The FaceApp episode highlights how, after more than a year of high-profile privacy scandals in the tech industry, consumers still don't adequately scrutinise services before handing over their sensitive personal data. At the same time, it's a reminder of how little we understand how companies collect our information and what rights they have to it...