Skip to main content

PHP guide- Everything about PHP

πŸ”₯ PHP GUIDE πŸ”₯ ✨What is PHP❓ PHP is an acronym for "PHP: Hypertext Preprocessor". It is a widely-used, open source scripting language.PHP scripts are executed on the server And it is free to download and use.. ✨What is a PHP File❓ PHP files can contain text, HTML, CSS, JavaScript, and PHP code .PHP code is executed on the server, and the result is returned to the browser as plain HTML .PHP files have extension ".php" ✨What Can PHP Do❓ πŸ’’PHP can generate dynamic page content πŸ’’PHP can create, open, read, write, delete, and close files on the server πŸ’’PHP can collect form data πŸ’’PHP can send and receive cookies πŸ’’PHP can add, delete, modify data in your database πŸ’’PHP can be used to control user-access πŸ’’PHP can encrypt data πŸ’’With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML. ✨Why PHP❓ πŸ’’PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, et...

Facebook: 5 Ways Hacker can Hack your Account

Facebook: 5 Ways Hackers can Hack Your Account
Facebook is the most widely used social networking site with more than 1.5 billion users, which makes it a huge target for hackers. In this graphic we will show you the top 10 methods used by hackers to hack Facebook accounts and how you can protect yourself against these cyber crooks.
1 Phishing

Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack.
1. Basic Phishing attack works like this...a hacker makes a fake login page which precisely resembles the genuine Facebook page.
2. An email is sent asking the casualty to login into that page.
3. Once the casualty logins through the fake page the casualties "email address" and "secret word" is put away into a content record.
The hacker then downloads the content document and gets his hands of the casualties accreditations.

2 Keylogging
Keylogging is the easiest way to hack a Facebook password. Keylogging sometimes can be so dangerous that even a person with good knowledge of computers can fall for it.
A keylogger is a basically small program which once installed on a victims computer it will record everything which the victim types on his or her computer.
The logs are then sent back to the attacker by either TP or directly to the hackers email address.

3 Stealers

Almost 80% percent people use stored passwords in their browser to access Facebook. This is very convenient for you, but can be extremely dangerous as stealers can easily access your saved passwords stored in the browsers.
How to combat Facebook hackers via Stealers
1-Use Password Manager
Password managers automatically fill out important forms without you having to type anything in and keeps your passwords safe.
​2-Avoid saving passwords on browsers
When the "remember password" prompt comes up and you are not at your own computer, click on the "not now" button.

4 Session Hijacking
Session Hijacking can be often very dangerous if you are accessing Facebook on a http://connection. In a Session Hijacking attack a hacker steals the victims browser cookie which is used to authenticate a user on a website and uses to it to access victims account. Session hijacking is widely used on Lans.
How to combat session hijacking
Using a Firefox add-on called Force TLS or if you use Chrome, KB SSL Enforcer. Both will automatically redirect you to secured page of the sites you visit.

5 Side Jacking / Firesheep:-
Sidejacking is a popular method for hacking Facebook and email accounts. It's the process of stealing someone's access to a website, typically done on wireless public networks. 
Firesheep is a widely used to carry out sidejacking attacks and works when the attacker and victim is on the same wifi network. A sidejacking attack is basically another name for http session hijacking, but it's more targeted towards wifi users.

Note:- Secure your social media accounts.
Avoid opening any website with http 
Always open https websites.

Never share your bank details on social media accounts.

Share this article with your loved ones and save them from being hacked.

            Indian Developers Club              

Comments

Popular posts from this blog

Difference between Artificial intelligence and Machine learning???

WHAT IS THE DIFFERENCE BETWEEN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING❓❓πŸ€” 🧿Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge. On the other hand, some programs have attained the performa...

SHODAN: A Search engine for hackers

    SHODAN: A Search engine for hackers Note:- This article is only for educational purposes , we are not promoting any kind of hacking. Stay away from these sites and stay safe πŸŒ€ Shodan is a search engine that lets the user find specific types of computers (web cams, routers, servers, etc.) connected to the internet using a variety of filters. πŸŒ€ Shodan provides the simple and powerful searching and it provides it with ease. πŸŒ€ If you have a basic account then it provides you only the limited number of results. πŸŒ€ So, if you want to access it more then you have to upgrade it. πŸŒ€ The premium features of Shodan includes plotting the host locations on maps, accessing the full search listings etc. πŸŒ€ It also gives you a feature to search using filters. It makes your search even more easier. They have there bases in 7 countries from where they do this.  Shodan have information about all IoT devices around the world. When they purchased fro...

Quantum computers:-Need , Working and Advantages

 Quantum computers:- In simple terms ( IBM quantum computer) Three Factors Of Quantum Computing:- 1. The Need? Integrated circuit (IC) chips are becoming small and small every year. Nowadays, Transistors are of size of 14 nm and that is smaller than the size of red blood cells. As things get small the regular rule of general  physics doesn't apply. At atomic level quantum physics work. 2. Difference? Ordinary computers use bits to represent data and carry out processes. Bits are like switches ; they can be either 1 or 0, just like "ON" or "OFF". Just like bits, quantum computers have "qubits". Which are basic unit of Quantum information. 3. Working? Classic state- Quantum state Instead of 1 and 0, quantum computers use electron spins. The spins can be in the state of positive (1) or negative (0) or both! This is called superposition. Quantum computers use superposition principles; they can ha...