
WOFF or Web Open Font Format is basically TTF with metadata and compression that is supported by browsers. Many users would like to use a WOFF font that they downloaded from a website…
Read more
In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify an active process….
Read more
A site layout is a pre-constructed site made out of HTML pages that incorporate coordinated pictures, text content and backing documents for text style styles and Javascripts. The end client plugs their data,…
Read more
You must have heard about IMAP, SMTP and POP3 quite often. They are TCP/IP protocols that have been in use for email delivery since 1981. Popular Services like Yahoo, Gmail and Outlook use…
Read more
In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using PHP and Ajax….
Read more
These are used to connect different devices in the network or to connect two or more different networks. Following devices are used for interconnection: Repeater Hub Bridge Router Gateway Switch Modulation/ Modem 1….
Read more
Data visualization is one of the most powerful tools an analyst has for two main reasons. Firstly, it is matchless in its ability to guide the analyst’s hand in determining “what to look…
Read more
Computer Technology means any and all electronic media and services, including computers, software, e-mail, telephones, voicemail, facsimile machines, online services, internet, provided to employees by the City. Below is the list of few…
Read more
On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only or immutable files…
Read more
In this article we’ll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can be very common….
Read more
Object-oriented programming (OOP) is a computer programming model that organizes software design around data, or objects, rather than functions and logic. In this article, we have collected some commonly asked OOPs interview questions…
Read more
Reconnaissance is one of the important stage in any ethical hacking attempt. By performing reconnaissance on any target, an ethical hacker can learn about the details of the target network and identify potential…
Read more
Technology is growing day by day and the entire world is its grasp. We cannot imagine even a day without electronic devices around us. With the use of this growing technology, invaders, hackers…
Read more
The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a virus, of being…
Read more