One of the defining features of PHP(Hypertext Preprocessor) is the versatility it offers for connection to, and manipulation with databases. In this article, we look at some features of the PHP with MySQL…
Read moreIn this article we’ll discuss about the top 21 wireless hacking tools through which you can easily enumerate any Wi-Fi connection near by you or your device. Wireless networks are convenient and popular,…
Read moreWhen the first electronic computers emerged from university and military laboratories in the late 1940s and early 1950s, visionaries proclaimed them the harbingers of a second industrial revolution that would transform business, government…
Read moreQ26. Fill in the blank: The p tag is an example of a _____________ tag because it contains sections of text. Answer – The p tag is an example of a container tag…
Read more391. Which script is run when X Window starts? A. .xinit B. .xrc C. .startxrc D. .xinitrc Answer – – D Description – The .xinitrc script is run from your home directory when…
Read moreAs you all knows, today we are going to celebrate Safer Internet Day i.e. on 7th of February 2017 with Google. No doubt!, our world is progressing towards a cashless economy, do you…
Read moreIn the modern age the software applications has become an integral part of an organization. Due to their so much involvement in this area they have become the new arena for security domains….
Read moreIn the world today mobile has become a vital possession. It is not just your cellphone. It has become more than that. It compensates for so many things that you cannot just afford…
Read moreIn this article we’ll discuss about the malware forensics and analysis. We’re sure that most of us have fallen victims to a system hack. And we are not talking about the basic hack…
Read moreIn this article, We’ll discuss about htaccess tips & tricks related to website security, optimization, SEO and redirects in detail. All the codes in this article has been tested multiple times in various…
Read more1. AFE – Android Framework for Exploitation, is a framework for exploiting android based devices. They’ve been in the security field from past 5 years and having a strong enthusiastic team behind Appknox(https://www.appknox.com)…
Read moreFacebook is one of the biggest social networking platform based in Menlo Park, California. People use Facebook to stay connected with their friends and family but there’s a huge risk behind it. The…
Read moreAs you might knows, the latest version of Google Chrome and Mozilla Firefox has been released but here is one surprise for all users. The Latest Version of Google Chrome is 56 and…
Read moreThis article will get you a good spark about writing the programs in various languages like Ruby, PHP, Python, Perl, Bash, C, C++ and Java. All Credits goes to Mr. Chetan Soni –…
Read moreQ1. What is a web browser? Answer – A web browser is a software program that runs on your computer and enables you to view web pages. Q2. What does HTML stand for?…
Read more361. You are told by a co-worker that information pertaining to the syslog command can be found in man page 3. How would you view this information? A. man syslog 3 B. man…
Read moreBeware after 31st December 2016, taking advantage of normal banking, cyber criminals can empty your bank accounts and make you definitely cashless. Change your debit/credit card pin and wallet’s passwords. Change your password…
Read moreAs we know, our computer understands only binary language i.e 1 and 0 which is very difficult for all of us to read and write. So in Operating System, there is special program…
Read more331. Which of the following tools are used when creating a new partition for data storage on a Linux system? A. fdisk B. format C. mkfs D. mount Answer – – A, C…
Read more