Skip to content

thetqweb | the Ultimate Cyber Intelligence Hub

Learn really interesting Cyber Skills that will get you comfortable around, Linux (use-case is KALI), Windows, macOS, Android, Browsers, Servers, Coding, etc. By a #CyberSec Expert && #DigitalPrivacy Activist!

  • thetqweb | Twitter
  • Support Us
  • Home
  • Hacking
    • Kali Linux
    • Windows
    • Linux
  • infosec
  • Forum
    • Firefox
    • MySQL
    • Scrapy
    • Tor Browser
    • WSL
  • Wiki
  • Search
  • About
  • Support Us
thetqweb | the Ultimate Cyber Intelligence Hub

Distributed Ledger

Posted on November 16, 2022November 14, 2022 by thetqweb

Also referred to as Distributed Ledger Technology (DLT) or Shared Ledger, is a technology that replicates, shares and synchronizes data across various geographical locations, institutions and/or sites, and which is accessible by multiple users.

Continue Reading...
What Is
Leave a comment

Decentralized Network

Posted on November 15, 2022November 14, 2022 by thetqweb

This is a network architecture that utilizes network protocols across different nodes or computing devices (computers or servers) instead of a single node to operate.

Continue Reading...
What Is
Leave a comment

A program to Create, Write and Close a file in C language

Posted on November 14, 2022November 14, 2022 by thetqweb

A program to Create, Write and Close a file in C language In the C programming language, to Create, Write and Close a file you need to; 1. Specify a pointer or the reference to the space in memory where

Continue Reading...
C language
Leave a comment

RISC and CISC Architectures, Differences, Advantages and Disadvantages

Posted on November 13, 2022November 12, 2022 by thetqweb

RISC processors use simplified instructions that execute at a high speed while CISC processors use sophisticated instructions that can perform multi-step low-level operations but that execute comparatively at a lower speed.

Continue Reading...
Wiki
Leave a comment

Hack Architecture (Havard Architecture)

Posted on November 12, 2022November 11, 2022 by thetqweb

Hack Architecture (Havard Architecture) The Hack Architecture is a unique architecture as it partitions the address space into two distinct address spaces or memories, the instruction memory and the data memory. A hack machine that is based on the hack

Continue Reading...
Wiki
Leave a comment

Heuristics Evaluation of Linux and Windows using Nielsen’s heuristics for UI Design

Posted on November 11, 2022 by thetqweb

Heuristics Evaluation of Linux and Windows using Nielsen’s heuristics for UI Design Heuristics Evaluation is an important aspect when it comes to testing of a system’s design, and how easily users can engage with it as well as how they

Continue Reading...
Wiki
Leave a comment

Posts pagination

«Previous Posts 1 … 4 5 6 7 8 … 30 Next Posts»

Search

Popular Recent Posts

  • Fix “No P2P traffic is Permitted on this Server” issue in Proton VPN
  • Fix `org.freedesktop.DBus.Error.UnknownMethod: Object does not exist at path “/org/freedesktop/NetworkManager/ActiveConnection/19″` error in Proton VPN
  • Fix “Error Loading Servers” “Expecting value: line 1 column 1 (char 0)” issue in Proton VPN
  • Fix “Failed to unlock the collection” error in Proton VPN
  • Fix “Connection to API timed out” error in Proton VPN
  • Fix “Network Error” issue in Proton VPN
  • Fix “Unable to generate logs: can’t compare offset-naive and offset-aware datetimes” error in Proton VPN
  • Fix “Authentication required” issue in Proton VPN
  • Fix “Your session is invalid. Please login to re-authenticate.” issue in Proton VPN
  • Fix “Unknown reason occurred” issue in Proton VPN

Useful Links

  • Privacy Policy
  • Cookie Policy
  • About Us

Subscribe to thetqweb via Email

Enter your email address to subscribe to thetqweb and receive notifications of new posts by email.

WordPress Theme: Donovan by ThemeZee.
 

Loading Comments...