Vulnerability analysis is the next phase of Ethical hacking to identify the security holes or vulnerabilities in your system or network. A vulnerability assessment is a...
Network Scanning Concepts Network scanning refers to a set of procedures for identifying hosts, ports, and services in a network. Network scanning is one of the...
We can distinct boot process in linux in 6 different stages These includes BIOS MBR GRUB Kernel Init Run Level Programs BIOS Acronym for Basic Input...
Drafting Orders The buyers decide to purchase the needed goods from the suppliers. The letter which the buyer sends to the supplier requesting supply of the...
Adjustment Letters Responses to letters of complaint are called adjustment letters. They are of three forms. 100 percent yes. 100 percent no. Partial adjustment— you could...
Complaint Letters Introduction You need to politely state the problem. Include supporting documents, such as the following: Serial numbers Dates of purchase Invoice numbers Check numbers...
Bad-News Letter Unfortunately, you occasionally will be required to write bad-news letters. These letters might reject a job applicant, deny an employee a raise, tell a...
Linux Authorization For security purpose, LINUX divides authorization in Ownership Permission Ownwership In linux, every file and directory is assigned with 3 tyoes of owner User...
Guidelines/Techniques for Giving Interview ( For Interviewee) Prepare for the Interview. Anticipate questions and form answers. Research about the company. Make an Appropriate Appearance. Dress, neatness,...
Types of Interviews 1. Structured Versus Unstructured Interviews In structured interview, the interviewer ( or a computer) asks a series of prepared questions in a set...