Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…
Tag: masters of computer science
Boot Process in Linux | Understanding Boot process and related System files
We can distinct boot process in linux in 6 different stages These includes BIOS MBR GRUB Kernel Init Run Level…
Everything you need to know on “Drafting Orders”
Drafting Orders The buyers decide to purchase the needed goods from the suppliers. The letter which the buyer sends to…
Everything you need to know about adjustment letters
Adjustment Letters Responses to letters of complaint are called adjustment letters. They are of three forms. 100 percent yes. 100…
Best way to write complaint letters with example
Complaint Letters Introduction You need to politely state the problem. Include supporting documents, such as the following: Serial numbers Dates…
Bad News Letter | Criteria of Writing a Bad-News Letter with example
Bad-News Letter Unfortunately, you occasionally will be required to write bad-news letters. These letters might reject a job applicant, deny…
File permission, changing permission and ownership in Linux
Linux Authorization For security purpose, LINUX divides authorization in Ownership Permission Ownwership In linux, every file and directory is assigned…
Steps and techniques of giving interviews
Guidelines/Techniques for Giving Interview ( For Interviewee) Prepare for the Interview. Anticipate questions and form answers. Research about the company. …
What are the types of the interview? What is interview media?
Types of Interviews 1. Structured Versus Unstructured Interviews In structured interview, the interviewer ( or a computer) asks a series…