Home Blog Feedback

Gabatarwan shafin zai kasance a nan...

HTML TUTORIALS

Stands for "Hypertext Markup Language." HTML is the language used to create webpages. "Hypertext" refers to the hyperlinks that an HTML page may contain. "Markup language" refers to the way tags are used to define the page layout and elements within the page.Below is an example of HTML used to define a basic webpage with a title and a single paragraph of text.TechTerms.comThis is an example of a paragraph in HTML.The first line defines what type of contents the document contains. " " means the page is written in HTML5 . Properly formatted HTML pages should include ,, and tags, which are all included in the example above. The page title, metadata , and links to referenced files are placed between thetags. The actual contents of the page go between the tags.The web has gone through many changes over the past few decades, but HTML has always been the fundamental language used to develop webpages. Interestingly, while websites have become more advanced and interactive, HTML has actually gotten simpler. If you compare the source of an HTML5 page with a similar page written in HTML 4.01 or XHTML 1.0, the HTML5 page would probably contain less code. This is because modern HTML relies oncascading style sheets or JavaScript to format nearly all the elements within a page.NOTE: Many dynamic websites generate webpages on-the-fly, using a server-side scripting language like PHP or ASP. However, even dynamic pages must be formatted using HTML. Therefore, scripting languages often generate the HTML that is sent to your web browser.

HACKING

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network . [1] Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, [2] challenge, recreation, [3] or to evaluate system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground". [4]Longstanding controversy surrounds the meaning of the term "hacker ". In this controversy, computer programmers reclaim the term hacker , arguing that it refers simply to someone with an advanced understanding of computers and computer networks [5] and that cracker is the more appropriate term for those who break into computers, whether computer criminals (black hats) or computer security experts (white hats). [6][7] A 2014 article noted that "... the black-hat meaning still prevails among the general public". [8]HistoryFurther information: Timeline of computer security hacker historyBruce Sterling , author of The Hacker CrackdownIn computer security, a hacker is someone who focuses on security mechanisms of computer and network systems. While including those who endeavor to strengthen such mechanisms, it is more often used by the mass media and popular culture to refer to those who seek access despite these security measures. That is, the media portrays the 'hacker' as a villain. Nevertheless, parts of the subculture see their aim in correcting security problems and use the word in a positive sense. White hat is the name given to ethical computer hackers, who utilize hacking in a helpful way. White hats are becoming a necessary part of the information security field. [9] They operate under a code, which acknowledges that breaking into other people's computers is bad, but that discovering and exploiting security mechanisms and breaking into computers is still an interesting activity that can be done ethically and legally. Accordingly, the term bears strong connotations that are favorable or pejorative, depending on the conte

PHISHING

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords andcredit card details, by disguising oneself as a trustworthy entity in anelectronic communication .[1][2] Typically carried out by email spoofing , [3] instant messaging , [4] and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. [5]An example of a phishing email, disguised as an official email from a (fictional) bank. The sender is attempting to trick the recipient into revealing confidential information by "confirming" it at the phisher's website. Note the misspelling of the words received anddiscrepancy as recieved anddiscrepency , respectively. Although the URL of the bank'swebpage appears to be legitimate, the hyperlink points at the phisher's webpage.Phishing is an example of social engineering techniques used to deceive users. Users are lured by communications purporting to be from trusted parties such as social web sites , auction sites , banks, colleagues/executives, online payment processors or IT administrators. [6]Attempts to deal with phishing incidents include legislation , user training, public awareness, and technical security measures (the latter being due to phishing attacks frequently exploiting weaknesses in current web security). [7]

Taken Muhimmin Sako

Muhimmin sakon shafin zai kasance a nan...

Recent Blog Posts

    No posts at the moment.

Blog Categories

No categories at the moment.