• 10 best Internet search techniques

    These days, everyone is expected to be up to speed on Internet search techniques. But there are still a few tricks that some users — and even savvy searchers — may not be aware of. Did you hate memorizing seemingly insignificant facts for tests at school? No photographic memory? Good news! Life...
  • 8 Ways to Kid-proof Your Internet Parental Controls

    Kids are more tech savvy than we can ever hope to be. We block a web site and they find a way around our blocking software. We put up a firewall, they go through it. What's a parent to do? We can never be sure that any of our parental controls will work, but we try our best to keep kids safe....
  • free download ebook Ethical Hacking (EC-Council Exam 312-50): Student Courseware

    EC-Council E-Business Certification SeriesCopyright © by EC-Council Developer - Thomas MathewPublisher - OSB PublisherISBN No - 0972936211 By explaining computer security and outlining methods to test computer systems for possible weaknesses, this guide provides the tools ...
  • Mobile Application Testing

    Technology is evolving faster by the day. Today, we see mobiles are no longer mobiles, they are small computers. The smartphones run powerful applications, providing everything to users at their fingertips. Users can use their mobiles for:Logging in to banks in order to transfer funds Purchasing...
  • Denial Of Service Attacks

    1. Definitions We begin by defining Denial of Service and Distributed Denial of Service. 1.1 What is a DoS? As the name implies, DoS is a Denial of Service to a victim trying to access a resource. In many cases it can be safey said that the attack requires a protocol flaw as well as some kind of...

Thursday, January 10, 2013

ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE -- collect statistics about a database BEGIN -- start a transaction block CHECKPOINT -- force a transaction...