|
|
|
Articles by Gitesh Trivedi |
51. Detail Explanation about What is VPN?
November 07, 2011
In a small LAN to LAN, and users with low self-confidence in very good physical security in the form of text in the child's network is probably not a security risk associated with many of the facades. From these data, the greater the risk is transferred, as some discrete points in the data in plain ...
|
|
|
52. Direct Privilege Management of Oracle Database
November 04, 2011
I believe that here, deprived of the various elements and object privileges and individual user name. As already mentioned, always follow the "least privilege" as the absolute minimum rights for each user ID database. In order to facilitate the overall cost of administration and maintenance, you can...
|
|
|
53. How Multitasking Feature Works in Operating Systems?
October 31, 2011
The modern definition encompasses the idea of multi-programming tasks, but the concept extends the ability to use different parts called threads at a time. The basic idea is that most programs cannot be treated as a series of small elements called tasks. Sometimes these tasks and completed sequentia...
|
|
|
54. Port Binding Attacks on Windows Security
October 29, 2011
Allow any Windows user, who is logged, regardless of privilege level of commitment to any port. Ports from which users can bind to ports, such as remote procedure call RPC and NetBIOS. Port-binding programs are user-initiated services, a native Win2k priority to listen to any particular port, this f...
|
|
|
55. Unix File - Quick Look
October 27, 2011
Computer files are so named because they have a relationship with the people waving old manila, once used to store pieces of paper. These files are tab markers with titles such as " Laundry Washing, 2010-2011", which allows an early form of random access. For now, you can think of a computer file s...
|
|
|
56. Ultimate Advantages of Unix and Linux for Programmer
October 21, 2011
Programmers are, by nature, the spirit of independence and creativity. They are rarely met; use a fixed set of resources to achieve a particular result. Programmers are often fascinated by the same tools, rather than applications that create these instruments. They want to build and forge new tools ...
|
|
|
57. What is Materialized View
October 19, 2011
In different situations, end users are forced to run queries that summarize large amounts of data and calculation of some values on the basis of such statements. Usually such queries are common in databases that support applications such as SSD. Sometimes, however, although the consultation database...
|
|
|
58. Proper Memory Allocation and Calculation is Prerequisites of Production Database Deployment
October 18, 2011
Insufficient memory may give rise to a claim of memory. If the demand for memory components of active processes exceeds the available physical memory in the system starts paging system, the movement of active processes to disk to physical memory is loaded. Begin to deteriorate at this stage of imple...
|
|
|
59. Version Control Is Necessary of Application Source Code in High Availability Database Servers
October 17, 2011
The source code version control seems to be quite common in large organizations. Therefore, the tip is of small and medium enterprises, in which the source is not under version control oriented. The developers of many small businesses, I think, working versions of the source code unnecessary surgery...
|
|
|
60. Online Forums are Best Weapon for Obtaining Solutions of Queries
October 14, 2011
Looking for a place online to meet new people, talk entertainment, events, calendar and talk or just have fun? The online forums are there for some time on the Internet, often free and easy to install. The forums are mainly web, exchange of information and people talk about different topics. An exam...
|
|
|
|
|
|
>
|
|
|
|
|
Author Login |
|
|
Advertiser Login
ADVERTISE HERE NOW!
Limited Time $60 Offer!
90 Days-1.5 Million Views
|
|
TIM FAY
After 60-plus years of living, I am just trying to pass down some of the information that I have lea...more
|
|
|
|
|
LAURA JEEVES
At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
|
|
|
|
|
ALEX BELSEY
I am the editor of QUAY Magazine, a B2B publication based in the South West of the UK. I am also the...more
|
|
|
|
|
GENE MYERS
Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
|
|
|
|
|
SUSAN FRIESEN
Located in the lower mainland of B.C., Susan Friesen is a visionary brand strategist, entrepreneur, ...more
|
|
|
|
|
STEPHEN BYE
Steve Bye is currently a fiction writer, who published his first novel, ‘Looking Forward Through the...more
|
|
|
|
|
SHALINI MITTAL
A postgraduate in Fashion Technology. Shalini is a writer at heart! Writing for her is an expression...more
|
|
|
|
|
ADRIAN JOELE
I have been involved in nutrition and weight management for over 12 years and I like to share my kn...more
|
|
|
|
|
JAMES KENNY
James is a Research Enthusiast that focuses on the understanding of how things work and can be impro...more
|
|
|
|