WOFF or Web Open Font Format is basically TTF with metadata and compression that is supported by browsers. Many users would like to use a WOFF font that they downloaded…
In computing, the process identifier (a.k.a. process ID or PID) is a number used by most operating system kernels—such as those of Unix, macOS and Windows — to uniquely identify…
Google's Chrome browser is one of the most popular web browser in the world. Millions of users across the globe use this browser daily. This browser’s functionality can be enhanced…
A site layout is a pre-constructed site made out of HTML pages that incorporate coordinated pictures, text content and backing documents for text style styles and Javascripts. The end client…
You must have heard about IMAP, SMTP and POP3 quite often. They are TCP/IP protocols that have been in use for email delivery since 1981. Popular Services like Yahoo, Gmail…
In this tutorial, we will see how to make Ajax work with PHP and MySQL. We will create a small web application which will fetch the information from Database using…
These are used to connect different devices in the network or to connect two or more different networks. Following devices are used for interconnection: Repeater Hub Bridge Router Gateway Switch…
Data visualization is one of the most powerful tools an analyst has for two main reasons. Firstly, it is matchless in its ability to guide the analyst’s hand in determining…
Computer Technology means any and all electronic media and services, including computers, software, e-mail, telephones, voicemail, facsimile machines, online services, internet, provided to employees by the City. Below is the…
On March 7, 2022, Max Kellerman from CM4All disclosed a local privilege escalation vulnerability (CVE-2022-0847) found in Linux kernel version 5.8 and newer. This vulnerability allows attackers to overwrite read-only…
In this article we'll be setting up a Fake Access Point. As you know, Access Points or routers transmit their WiFi network(s) with a SSID. Some of these names can…
Object-oriented programming (OOP) is a computer programming model that organizes software design around data, or objects, rather than functions and logic. In this article, we have collected some commonly asked…
Reconnaissance is one of the important stage in any ethical hacking attempt. By performing reconnaissance on any target, an ethical hacker can learn about the details of the target network…
Technology is growing day by day and the entire world is its grasp. We cannot imagine even a day without electronic devices around us. With the use of this growing…
The Internet has made our lives easier and has provided us with lots of advantages but it has also put our system’s security at risk of being infected by a…