Cyber Security Vulnerability Assessment
Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…
Tech News in Nepal | #1 Tech Blog
Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or…
We can distinct boot process in linux in 6 different stages These includes BIOS MBR GRUB Kernel Init Run Level…
Drafting Orders The buyers decide to purchase the needed goods from the suppliers. The letter which the buyer sends to…
Adjustment Letters Responses to letters of complaint are called adjustment letters. They are of three forms. 100 percent yes. 100…
Complaint Letters Introduction You need to politely state the problem. Include supporting documents, such as the following: Serial numbers Dates…
Bad-News Letter Unfortunately, you occasionally will be required to write bad-news letters. These letters might reject a job applicant, deny…
Linux Authorization For security purpose, LINUX divides authorization in Ownership Permission Ownwership In linux, every file and directory is assigned…
Guidelines/Techniques for Giving Interview ( For Interviewee) Prepare for the Interview. Anticipate questions and form answers. Research about the company. …
Types of Interviews 1. Structured Versus Unstructured Interviews In structured interview, the interviewer ( or a computer) asks a series…