Tech Articles

[LINUX] Top 25 Bash Shell Prompt Characters

The default shell used in all Linux distributions is the GNU bash shell. Once you start a terminal emulation package or log in from the Linux console, you get access to the shell CLI prompt. The prompt is your gateway to the shell. This is the place where you enter shell commands. The default prompt […]

Tech Articles

Overview of Linux Distributions

Now that you have seen the four main components required for a complete Linux system, you may be wondering how you are going to get them all put together to make a Linux system. Fortunately, there are people who have already done that for us. A complete Linux system package is called a distribution. There […]

Tech Articles

Types of Cyber Crimes

Cyber security means securing the cyberspace from attack and economic espionage. Cyberspace is interconnectedness of IT infrastructure such as Internet, Telecom networks, computer systems etc. In 3rd Global Cybersecurity Index released by the ITU, India slipped to 47th rank in 2018 from 23rd in 2017. Types of Cyber crimes – 1. Cyber defamation: It is […]

Tech Articles

“Hello, World!” Program in Different Programming Languages

If you are already an experienced programmer interested in learning programming languages, you may want to read this article quickly and take note of Hello World examples. In spite of the complexity involved in covering all of the disciplines into which computers have crept,the basic computer is still relatively simple in principle. Programming a computer […]

Tech Articles

OSI Model and TCP/IP Model

When we speak about computer networking, the most basic model that helps us understand how data travels across the network is Open System Interconnection (OSI). This is a conceptual model that helps us visualize and understand how communication between two or more systems occurs. The OSI model breaks the communication system into seven abstract layers […]

Tech Articles

Windows/Linux Useful Commands

There are hundreds of commands that are used in day-to-day Windows administration. Some Useful Commands to Be Run from the Windows Command Prompt are as follows: S.No. Command Usage Description 1 tasklist tasklist Lists all the tasks that are currently active on the system (similar to what’s displayed in Task Manager). 2 tracert tracert < […]

Tech Articles

Free Vulnerability Database And Resources [2020 Compilation]

Vulnerability Database are the first place to start your day as a security professional. Any new vulnerability detection is generally available through public vulnerability database. These database are a big source of information for hackers to be able to understand and exploit/avoid/fix the vulnerability. Some Public Sources for you – http://www.exploit-db.com/ http://securityvulns.com/ http://www.securityfocus.com/ http://www.securiteam.com/ http://secunia.com/advisories/ […]

Tech Articles

List of Common HTTP Error Status Codes

When you access any application over internet or intranet, every HTTP request that is received by a server is responded to with an HTTP status code which is a 3 digit code, and are grouped into various different classes such as 1xx (Informational), 2xx (Success), 3xx (Redirection), 4xx (Client Error) and 5xx (Server Error). Suggested […]

Tech Articles

SQL Commands – Minimal Cheatsheet 2020

SQL is a standard language for accessing and manipulating databases. Although SQL is an ANSI/ISO standard, there are different versions of the SQL language. However, to be compliant with the ANSI standard, they all support at least the major commands (such as SELECT, UPDATE, DELETE, INSERT, WHERE) in a similar manner. DELETE – DELETE statements […]

Tech Articles

How To Fax a PDF Easily, Quickly, Securely Through Email, Online, & Phone

Technology is revolutionizing every area of personal and business communication. Fax technology is undergoing a makeover for the twenty-first century. Today, you can send faxes online thanks to online faxing apps. Fax technology is still secure than email when sending sensitive information. Businesses use fax to send faxes in PDF format. Online fax tools make […]

Tech Articles

5 Simple Ways to Hack Your Girlfriend’s Text Messages

Your Girlfriend’s isn’t the character she was. She’s in no way intimate with you anymore nor does she want to spend the best time with you. You’ve seen her changing messages with someone on her cell phone constantly, however she by no means lets you see who it’s far. You haven’t any preference but to […]

Tech Articles

5 Outstanding WhatsApp Hacking Software 2020

Social media has recently taken over our lives and the list places WhatsApp on the topmost rank. From sharing intimate life experiences to attaining crucial information, we all rely on WhatsApp quite a lot. It became way more important than online college homework help to millions of students. We believe hacking someone’s WhatsApp account isn’t […]

Tech Articles

OWASP – API Security – Top 10

OWASP API security (https://www.owasp.org/index.php/OWASP_API_Security_Project) is an open source project which is aimed at preventing organizations from deploying potentially vulnerable APIs. APIs expose micro services to consumers, making it important to focus on how to make these APIs safer and avoid known security pitfalls. Let’s take a look at the OWASP top ten list of API […]

Tech Articles

Tips on how to provide your WordPress Site

Online networking and promotions are essential for your writing business. Setting up a website and improving its business effectiveness goes a long way in selling your writing services. Providing services on your website requires skills and feature WordPress can help you sell your services in the following ways: Utilizing WordPress plugins such as Woo Commerce […]