Getting started with Oracle DB.

In this blog post we will be looking at how to get started with Oracle DB. Undoubtedly, oracle is considered to be one of the most secure database management systems. Hence, many organizations around the world use Oracle DB. Here are some of the security features in Oracle DB: Data Dependent Access Control ,Role Based […]

Pingsweeping – How and why?

Pingsweeping – Intro & usage. Assume that you are a burglar and you want to steal. Then your first goal will be to identify your targets. Similarly, in the context of hacking, the first thing a hacker needs to do is identify the target hosts. In order to do so they send ICMP requests (pings) […]

Blog on encryption plus a script I wrote to encrypt folders.

Encryption – what it is and what it is not. Encryption is the process of converting readable plain text into cipher text that is unreadable/meaningless. The goal of doing so is to avoid unauthorized access to data.In order to access the encrypted data, one must ‘decypt’ data. Decryption is the process of converting cipher text […]

COMMON PROBLEMS FACED BY ARCH LINUX USERS.

When it comes to arch installation, post installation and regular usage there may be many problems that users will have to deal with. Interestingly there are not many posts/ forums that address these problems properly or clarify the solution clearly. So I feel obliged to write a post so that maybe one day someone will […]