Skip to content

NTSEQ:- A IT Infrastructure and Cyber Security Blogs

Author:

SQL indexes

What Is an Index? An index can be best described as a pointer to data in a table. An index

Continue reading

‘this’ pointer in C++

C++ uses a unique keyword called “this” to represent an object that invokes a member function. ‘this‘ is a pointer

Continue reading

What Is Memory leak in C++ and How to avoid it?

This happens when the programmers allocate memory to the heap for some temporary use and then forget to delete it

Continue reading

Object Slicing in C++ with examples

Object Slicing :- Object slicing occurs when a derived class object is assigned to a base class object  when an

Continue reading

Memory Clerks in SQL Server

Whenever a memory consumer wants to allocate memory to SQL Server, then it has to go through a memory clerk

Continue reading

What Is Dirty Pages in SQL Server ?

When a page is read from disk in memory, it is considered a clean page because it is similar to

Continue reading

What is Copy Only Backup in SQL Server?

SQL Server Copy Only Backup:- A copy-only backup is a SQL Server backup that is independent of the sequence of

Continue reading

SQL Server – Take Log backup after Changing Recovery model from FULL to SIMPLE

There are Some common misconceptions that if we change the database recovery model from “FULL” to “SIMPLE” Then we require

Continue reading

PHP :- What is PHP?

PHP stands for personal home page. It is a server side scripting language to developthe dynamic web application. The alias

Continue reading

PHP:- To change the port number of Apache server

To change the port number of Apache server in PHP:- Open httpd.conf file Change the values of listen, server local

Continue reading

Posts pagination

«Previous Posts 1 … 16 17 18 19 20 … 34 Next Posts»
  • C Programming
  • C++
  • Cyber Security
  • Interview FAQ
  • Java
  • Linux
  • MySQL
  • Netseq.com
  • Oracle
  • PHP
  • Python
  • SQL
  • SQL Server -DBA
  • Active Directory Security: Strategies to Safeguard Your Organization
  • PowerShell scripts for Active Directory (AD)
  • Top 50 Essential Active Directory PowerShell Commands and Administrative Tools
  • Critical Windows Event ID’s to SOC Team Must Monitor
  • Top Cybersecurity Threats in 2025 and How to Protect Yourself
WordPress Theme: Wellington by ThemeZee.