Nepali Unicode with Keyboard Layout (Traditional) is suitable for the persons who are already using true type fonts like preeti, kantipur etc. There is only slight modification upon true type fonts with Unicode flavour. These letters can accessible to everywhere even any client computer doesn't avail Nepali fonts.
Similarly, Nepali Unicode with Keyboard Layout (Romanized) is suitable for new Nepali Unicode users which works as typing in English - based on pronunciation.
Download Nepali Unicode with Keyboard Layout (Traditional and Romanized) from below:
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system. The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injecting vulnerable targets using Havij. The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users. Download Free Havij 1.15 Advanced SQL Injection Tool
New Features HTTPS support Add MSSQL Blind MSAccess more Blind (commercial version only) PostgreSQL added (only commercial version) Check fo…
1. Packet filter:
Packet filtering inspects each packet passing through the network and accepts or rejects it based on user-defined rules.
2. Circuit-level firewall:
Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking.
3. Application gateway:
Applies security mechanisms to specific applications, such as FTP and Telnet servers.
4. Proxy server:
Intercepts all messages entering and leaving the network acting as an intermediary between clients and servers. The proxy server hides the true network addresses
Units of Land Area Calculation in Nepal
Land area is calculated in the following units in Nepal. Area: Ropani, Anna, Paisa, Dam
508.74 sq m=1 ropani=16 anna=5476 sq. ft.
31.79 sq m=1 anna=4 paisa=342.25 sq. ft.
7.94 sq m =1 paisa=4 dam=85.56 sq. ft. Area: Bigha, Katha, Paisa, Dam
6772.41 sq m=1 Bigha=20 Katha=72900 sq. ft.
338.62 sq m=1 Katha=20 paisa=3645 sq. ft.
16.9 sq m =1 Paisa= =182.25 sq. ft.
Government of Nepal has launched a national portal yesterday (December 2, 2013) and the web address of the portal is www.nepal.gov.np. The portal can be surf in two languages Nepali and English.
In this portal, one can find nearly almost all about Nepal such as Citizen, Business, E-services, Tourism, Education, Important decisions of GoN etc. Besides that, the information about Nepal - geography, history, languages, cultures, people etc. Although, it is late to introduce the national portal, this is great effort to ensuring implementation of E-Governance in Nepal.
Apex Programming Tutorial
Apex is a proprietary language developed by Salesforce.com. It is a strongly typed, object-oriented programming language that allows developers to execute flow and transaction control statements on the Force.com platform server in conjunction with calls to the Force.com API.
Apache Ant Tutorial
Apache Ant is a Java based build tool from Apache Software Foundation. Apache Ant's build files are written in XML and they take advantage of being open standard, portable and easy to understand. This tutorial should show you how to use Apache ANT to automate the build and deployment process in simple and easy steps. After completing this tutorial, you should find yourself at a moderate level of expertise in using Apache Ant from where you may take yourself to next levels.
Armitage is a scriptable red team collaboration tool for Metasploit that visualizes targets, recommends exploits, and exposes the advanced post-exploitation features in the framework. Through one Metasploit instance, your team will: Use the same sessionsShare hosts, captured data, and downloaded filesCommunicate through a shared event log.Run bots to automate red team tasks.
Armitage is a force multiplier for red team operations.
Armitage represents each target as a computer with its IP address and other information about it below the computer. The computer screen shows the operating system the computer is running. Steps are given below: A red computer with electrical jolts indicates a compromised host.A directional green line indicates a pivot from one host to another. Pivoting allows Metasploit to route attacks and scans through intermediate hosts. A bright green line indicates the pivot communication path is in use.Click a host to select it. You may select multiple hosts by clicking an…
Customer Information Control System (CICS) Tutorial
CICS stands for Customer Information Control System. CICS was developed in 1968 by IBM. CICS allows users to develop and execute online application in an MVS environment. CICS has become the most commonly used server for Internet applications. CICS is a transaction processing system which is also called as Online Transaction Processing (OLTP) Software. CICS is a data communication system that can support a network containing hundreds of terminals.