Sws101_hack_the _box_tier0
Topic: Hack the box Hello welcome to my blog, today we will be learing on Hack the box starting point tier 0. We will be learning on how to get gained access to the system and the new tools and pr...
Topic: Hack the box Hello welcome to my blog, today we will be learing on Hack the box starting point tier 0. We will be learning on how to get gained access to the system and the new tools and pr...
Nonrelational Database or NoSQL Database In this blog I will be sharing what we did our sixth flipped class. We went through Nonrelational Database along with their advantages, disadvantages and i...
Topic: Normalization From what I have learned, Data normalization is a process used in database design to organize databsase structure efficiently and to reduce data redunancy(repetition). It invo...
Topic: Advanced Aggregation Function From what I have learned is that, these function are more specialized function that operated beyound basic aggregation function like SUM, AVG, COUNT, MIN, MAX ...
Topic: Understanding SQL set operation and Null Values 1.Set Operations SQl set operation are operators in SQL that combines two or more queries into a single result set. There are four main set o...
Topic: Exploring ER model Representation. For me, Entity Relational(ER) models are for identifying entities to be represented in a database and see how these entities are related to each other. It...
Bandit - OverTheWire Game Notes Level 0 Teaches how to use the ssh (secure shell) command to access another server. In this level, I am introduced to basic server access protocols and provided wit...
Topic: Types of Database Users and Database Administrators From the word Database Administrator I understood that, it is a IT profession that deal with implementing, designing, maintaining and che...
Topic Networking Computer networking is the practice of connecting various gadgets to proportion resources and information. This can contain routers, switches, hubs, and modems, each serving excep...