woff To TTF format Techhyme

Convert WOFF to TTF File (Online Tool/Python)

WOFF or Web Open Font Format is basically TTF with metadata and compression that is supported by browsers. Many users would like to use a WOFF font that they downloaded from a website…

Read more
Windows Process ID ways Techhyme

[Windows 10] Ways To Find the Process ID of any Application

In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify an active process….

Read more
Free SEO Chrome Extensions Techhyme

12 FREE Chrome Extensions For SEO

Google’s Chrome browser is one of the most popular web browser in the world. Millions of users across the globe use this browser daily. This browser’s functionality can be enhanced by installing Chrome…

Read more
HTML Templates Techhyme

11 Most Popular Sites For Free HTML Templates

A site layout is a pre-constructed site made out of HTML pages that incorporate coordinated pictures, text content and backing documents for text style styles and Javascripts. The end client plugs their data,…

Read more
SMTP POP3 and IMAP Techhyme

SMTP, IMAP and POP3 – All You Need To Know

You must have heard about IMAP, SMTP and POP3 quite often. They are TCP/IP protocols that have been in use for email delivery since 1981. Popular Services like Yahoo, Gmail and Outlook use…

Read more
PHP MySQL Ajax Demo Techhyme

Fetch Information From Database using PHP/AJAX/MySQL

In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using PHP and Ajax….

Read more
Internetwork Devices Techhyme

7 Types of Internetworking Devices You Need To Know

These are used to connect different devices in the network or to connect two or more different networks. Following devices are used for interconnection: Repeater Hub Bridge Router Gateway Switch Modulation/ Modem 1….

Read more
Charts Visualization Techhyme

Types of Charts Available For Data Visualization

Data visualization is one of the most powerful tools an analyst has for two main reasons. Firstly, it is matchless in its ability to guide the analyst’s hand in determining “what to look…

Read more
Computer Technology Terms Techhyme

Important Terms Related to Computer Technology

Computer Technology means any and all electronic media and services, including computers, software, e-mail, telephones, voicemail, facsimile machines, online services, internet, provided to employees by the City. Below is the list of few…

Read more
Dirty Pipe Exploitation Techhyme

[Kali Linux] Exploitation of Dirty Pipe Vulnerability CVE-2022-0847

On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only or immutable files…

Read more
wireless hacking sniffing create fake access point wpa2 dnsmasq hostapd techhyme

Wireless Sniffing with Fake Access Point (WPA2) – A Practical Demonstration

In this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….

Read more
OOPs Interview Questions Answers Techhyme

OOPS Interview Questions With Answers

Object-oriented programming (OOP) is a computer programming model that organizes software design around data, or objects, rather than functions and logic. In this article, we have collected some commonly asked OOPs interview questions…

Read more
Automatic Recon Tools Bug Bounty Techhyme Security Hacking

Top 5 Automatic Recon Tools for Bug Bounty

Reconnaissance is one of the important stage in any ethical hacking attempt. By performing reconnaissance on any target, an ethical hacker can learn about the details of the target network and identify potential…

Read more
Computer Security Questions MCQ Answers Techhyme

Computer Security Multiple Choice Questions with Answers – Part 4

Technology is growing day by day and the entire world is its grasp. We cannot imagine even a day without electronic devices around us. With the use of this growing technology, invaders, hackers…

Read more
Computer Security Questions MCQ Answers Techhyme

Computer Security Multiple Choice Questions with Answers – Part 3

The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being…

Read more