This is a reference for when I need to look up syntax for SQL commands.
-
posts
-
MySQL Command Cheatsheet
-
Spoofing and Poisoning
I will explain spoofing and poisoning from computer security in this post.
-
Web Threat Protection
Web threats according to ‘testout.com’ are usually any risk that uses the internet to perform some sort of malevolent act. These threats use multiple types of malware and fraud. Some common threats are spam, ransomware, phishing, malware, and hacking. Some security concerns that individuals in addition to a company’s need to regard, and potential identify theft, financial harm, loss of confidential information and data, personal defamation, or denouncement of a company’s reputation, not to mention the potential loss of customers and their trust in the company’s ability to keep their confidentiality.
-
Response to Manuel Castells's Lessons from the History of the Internet.
I read the chapter, Lessons from the History of Internet, from Mauel Castell’s book and learned about the many events that led to rise of World Wide Web or WWW.
-
Managing Systems Design Projects - WBS, Gantt and PERT/CPM charts
Work breakdown structure is an important process and in this post I will talk about what it is, it’s importance, and charts used for managing systems design projects.
-
Python Cheatsheet
Most useful Python cheatsheet from Arianne Colton and Sean Chen. I reference this when I am working on python projects.
-
TCP/IP, OSI Models, TCP vs UDP
The OSI model had been around since 1984. In this post, we will talk about why it exists.
-
Linux Command Line Cheatsheet
Useful Linux Command Line cheatsheet.
-
ASCII Conversion Chart
Great reference on Decimal - Binary - Octal - Hex - ASCII Conversion Chart.