32 C
Mumbai
Friday, October 30, 2020
Tel: 8850717892

rohit.khedkar

More Articles

Migrating Postgres Database From Heroku to Docker Container

While surfing on the internet and brainstorming for a day, I couldn't find any perfect and straightforward guide to make the actual migration of the database. As we all know, the database is a critical...

- Advertisement -

Discover

Trending

Watch Dogs: Legion and Albion Targeted by Egregor Ransomware

In this topic, we will see about the Data breach held in Watch Dogs: Legion and Albion, and How was the Breach conducted? Data...

Role of Architecture in Shaping Human Psychology

“Whatever good things we build end up building us.” – Jim Rohn An Overview: The interplay of architecture and human psychology is vital; people dwell into...

Metaspoilt Framework, A popular Tool among Cyber Criminals

First, in this topic, we will see, What is the Metasploit Framework? 1) What is the Metasploit Framework? Metasploit Framework is a widely used penetration testing...

Urban Farming Masterplan by MJZ Firm, Poland

An Overview: Dubbed 'the gardens of the future', the project focuses on natural food production. MJZ, an architecture firm has introduced a new urban farming...

Equinix Ransomware

RANSOMWARE attack hits Equinix companies internal system. Before going forward we will first see, What is Equinix? Equinix is a leading global interconnection platform, it is...