Hi, so we have this subject called DBMS (database management system) which is taken up by Miss. Nishtha Jatana. Nishtha maam follows a different routine for her classes…a rather constructive one. She converts her initial 2 – 3 tutorial classes into presentations that are delivered by the students. If you don’t know what a tutorial class is.. it is basically a kind of an extra class where students can ask doubts or there can be revision of topics or some numerical problems related to the topics can be done. Now the presentations are conducted on a voluntary basis. There is no compulsion, so i decided Continue Reading
That’s what i learned
Ohkay so there is this software called the metasploit, for hackers its what a wand is for a wizard. The metasploit is a framework, a library of all the exploits and payloads. What happens is basically, that an application may be vulnerable to a certain code..that is for a particular input the application might crash, if that input is converted into a file such that it can attack the application then it is called an exploit. Also there is something that is called as the “PAYLOAD” it is generally the malicious code that is added to the exploit code so that after the exploit has executed the control passes to the payload and a malicious code gets executed, it can act like a trojan and fully compromise your pc or can execute arbitrary shell commands, perhaps it can do pretty much anything you can think of….