Purpose of Linux File System Structure

The arrangement of files in a Linux system may seem at first to be a semi-arbitrary arrangement of files and directories, based on historic practice. To an extent that’s true, but over the…

Read more

List of all MIME’s, their Type, Extension Name and Description

Multipurpose Internet Mail Extension (MIME) is an accepted system of extensions used on computer systems. Such a standardization makes it easy to specify a file type and feel confident other computers will understand it. This…

Read more

Most Common Font Style-sheet Properties in CSS

There are many style sheet properties available for each of the HTML physical and logical styles. CSS also enables you to add emphasis in many ways not possible with HTML. For example, while…

Read more

16 Malicious Terms which you need to know

The need to define a unified nomenclature for malicious programs is almost as old as computer viruses themselves. Obviously, each classification has a common pitfall because classes will always appear to overlap, and…

Read more

Classification of Wireless Network Attacks 2017

In the wireless industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. All types of Wireless networks are vulnerable to the following attacks and their classifications: 1….

Read more

List of all Environment Variables – Batch File Programming

Environment variables are special variables that contain its values set by the operating system itself, other applications or by manual. Environment variables are set to reduce tasks and code complexity by calling them in…

Read more

Overview of 157 Linux Basic Commands

People who don’t know what Linux is sometimes ask us if it’s a program that runs on Microsoft Windows. When we tell them that Linux is, itself, an operating system like Windows and that they…

Read more

Python Operators and their Examples

Python is a portable, interpreted, object-oriented programming language. It combines remarkable power with very clear syntax. Moreover, its high-level built-in data structures, combined with dynamic typing and dynamic binding, make it very attractive…

Read more

Multiple Choice Questions/Answers for Windows – With Explanation

1. What filename extension is applied by default to custom consoles that are created for the MMC? .mmc .msc .con .mcn Answer – B Description – When you create a custom console for…

Read more

Create Hotspot on Windows 10 in 6 steps

Hotspots are locations that offer public Internet access. Most hotspots use Wi-Fi, but some also allow wired connections. Clients can connect to these open networks with any Wi-Fi-capable device, including laptops, PDAs, or…

Read more

Most Commonly Used Ports assigned by IANA

A port is an extension of an address, similar to adding an apartment or room number to a street address. A letter with a street address will arrive at the correct apartment building,…

Read more

Microsoft Emergency Windows Update Released – 12 Dec 2017

In response to a constantly changing threat landscape, Microsoft frequently updates malware definitions and the Microsoft Malware Protection Engine. In order to be effective in helping protect against new and prevalent threats, antimalware…

Read more

5 Reason To Start Working On Your Business Branding Right Now

We all are familiar with some of the world-famous brands like Apple, Coca-Cola, Mercedes-Benz, etc, but do we know how they got so much prominence and respect among the masses and market.As you…

Read more

Earn 50$ a day by keeping your computer ON

Have you ever thought about setting up a business online? If not, where have you been for the last 5 or 10 years? It’s the new American dream, encompassing all the usual ideas…

Read more

Kali Linux 2017.3 – A 3rd release in year 2017

Kali Linux is a Linux-based penetration testing operating system that aids security professionals in performing assessments in a purely native environment dedicated to security and hacking. Kali Linux is a distribution based on…

Read more

Find Open Ports in Kali Linux with Netstat Utility

A port scan sends client requests to a server port addresses on a host for finding an active port. The design and operation of the Internet is based on TCP/IP. A port can have some behavior like…

Read more

The 12 Best, Must-Have Tools For Steganography – Updated Tools

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography is a technology that hides a message within an object, a text, or…

Read more

SQL Injection – A Complete Understanding Tutorial

SQL injection is an attack to circumvent scripts using SQL queries, as is often the case on websites, and especially for user authentication systems. [#] Introduction – SQL, or Structured Query Language, is…

Read more

Top 5 Vulnerability Research Websites – #CyberSecurity

1) National Vulnerability Database https://nvd.nist.gov/ NVD i.e. National Vulnerability Database is a product of NIST (National Institute of Standards and Technology) Computer Security Division which is sponsored by DHS(Dept. of Homeland Security’s). The…

Read more

77 Best SEO Tools – A Complete Package [Updated List]

SEO (Search Engine Optimization) is the activity of optimizing Web pages or whole sites in order to make them more search engine friendly, thus getting higher positions in search results. SEO is sometimes…

Read more

Do’s and Don’ts in SEO – Search Engine Optimization

The process of SEO has never been more important. Search engines, such as Google, Yahoo, and Bing, have developed an impressive ability to deliver relevant search results to a user’s queries. How well a site is ranked…

Read more

Top 40 XSS (Cross Site Scripting) Revision Questions with Answers

The below questions and answers are designed to both measure your understanding of the concepts of XSS -Cross Site Scripting Attacks and Prevention. Q1: What is the difference between HTML Injection and XSS?…

Read more