One of the defining features of PHP(Hypertext Preprocessor) is the versatility it offers for connection to, and manipulation with databases. In this article, we look at some features of the PHP with MySQL…
Read more
In this article we’ll discuss about the top 21 wireless hacking tools through which you can easily enumerate any Wi-Fi connection near by you or your device. Wireless networks are convenient and popular,…
Read more
When the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government…
Read more
Q26. Fill in the blank: The p tag is an example of a _____________ tag because it contains sections of text. Answer – The p tag is an example of a container tag…
Read more
391. Which script is run when X Window starts? A. .xinit B. .xrc C. .startxrc D. .xinitrc Answer – – D Description – The .xinitrc script is run from your home directory when…
Read more
As you all knows, today we are going to celebrate Safer Internet Day i.e. on 7th of February 2017 with Google. No doubt!, our world is progressing towards a cashless economy, do you…
Read more
In the modern age the software applications has become an integral part of an organization. Due to their so much involvement in this area they have become the new arena for security domains….
Read more
In the world today mobile has become a vital possession. It is not just your cellphone. It has become more than that. It compensates for so many things that you cannot just afford…
Read more
In this article we’ll discuss about the malware forensics and analysis. We’re sure that most of us have fallen victims to a system hack. And we are not talking about the basic hack…
Read more
In this article, We’ll discuss about htaccess tips & tricks related to website security, optimization, SEO and redirects in detail. All the codes in this article has been tested multiple times in various…
Read more
1. AFE – Android Framework for Exploitation, is a framework for exploiting android based devices. They’ve been in the security field from past 5 years and having a strong enthusiastic team behind Appknox(https://www.appknox.com)…
Read more
Facebook is one of the biggest social networking platform based in Menlo Park, California. People use Facebook to stay connected with their friends and family but there’s a huge risk behind it. The…
Read more
As you might knows, the latest version of Google Chrome and Mozilla Firefox has been released but here is one surprise for all users. The Latest Version of Google Chrome is 56 and…
Read more
This article will get you a good spark about writing the programs in various languages like Ruby, PHP, Python, Perl, Bash, C, C++ and Java. All Credits goes to Mr. Chetan Soni –…
Read more
Q1. What is a web browser? Answer – A web browser is a software program that runs on your computer and enables you to view web pages. Q2. What does HTML stand for?…
Read more
361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man…
Read more
Beware after 31st December 2016, taking advantage of normal banking, cyber criminals can empty your bank accounts and make you definitely cashless. Change your debit/credit card pin and wallet’s passwords. Change your password…
Read more
As we know, our computer understands only binary language i.e 1 and 0 which is very difficult for all of us to read and write. So in Operating System, there is special program…
Read more
331. Which of the following tools are used when creating a new partition for data storage on a Linux system? A. fdisk B. format C. mkfs D. mount Answer – – A, C…
Read more