• 0
  • 1
  • 2

SOA

princeton-97827_1280

Oracle Service Oriented Architecture

Java

san-jose-92464_1280

Java Tutorial Easy to Understand Way

OIC

academic-2769_1280

Oracle Integration Cloud

SOA/OIC interview Question

In this article, I will discuss the question which is asked in the Technical round of the SOA/OIC interview. Also, I will upload the answer in detail shortly.1. Basic of OIC (OIC and generation)2. Where to use SOA and where to use OIC?3. How to maintain the version (major/minor version)?4. Types of Certificates in OIC?5. What is Inbound/Outbound...

How to get source code of any android application?[Reverse engineering ]

 Hi all, today I am posting a very interesting topic "Reverse Engineering of Android Application". You need to follow the below steps to get all code & resources.Download any .apk file.Create a New folder and paste that .apk into the folder.Now you just need to change the extension with .zip or .rar. [ ex: abc.apk to abc.zip or abc.rar]Extract...

Android Tools

Hello Friends Today I am posting About Android Tools that uses too much these Days  and i hope these application help you lot. Hack Code:The hacker's Toolbox is an application for penetration tester, Ethical hackers, IT administrator and Cyber security professional to perform different tasks like reconnaissance, scanning performing exploits...

Trojan Horse

What is a Trojan ?"A Trojan Horse, or Trojan, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system". - Wikipedia"A Trojan horse is an apparently useful program containing hidden functions that can exploit the privileges of the...

Computer Viruses

What is a Computer Virus ? A potentially damaging computer programme capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user. Types of viruses :- The different types of viruses are as follows- 1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of...

Password Hacking

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following...

IDM with full Patch Crack serial key

IDM 6.19 build 2 is another version of best download managers named Internet Download Manager. This software is widely used today because of the great features it provides to its users. It provides full control over pausing, resuming, scheduling the...

Downloads torrent with idm

Hello friends today i am posting about how to download torrent file with idm high speed downloader. these are few tips to download torrent file with idm. First How to Download IDM. You can download here [ CLICK HERE ] With the...

Popular Posts

Nilesh Jha's Blog

Nilesh Jha. Powered by Blogger.

Contact Form

Name

Email *

Message *

Copyright © 2025 Nilesh Jha's Blog |
|