Skip to main content

PHP guide- Everything about PHP

🔥 PHP GUIDE 🔥 ✨What is PHP❓ PHP is an acronym for "PHP: Hypertext Preprocessor". It is a widely-used, open source scripting language.PHP scripts are executed on the server And it is free to download and use.. ✨What is a PHP File❓ PHP files can contain text, HTML, CSS, JavaScript, and PHP code .PHP code is executed on the server, and the result is returned to the browser as plain HTML .PHP files have extension ".php" ✨What Can PHP Do❓ 💢PHP can generate dynamic page content 💢PHP can create, open, read, write, delete, and close files on the server 💢PHP can collect form data 💢PHP can send and receive cookies 💢PHP can add, delete, modify data in your database 💢PHP can be used to control user-access 💢PHP can encrypt data 💢With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML. ✨Why PHP❓ 💢PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, et...

SPOOFING:- TYPES OF ATTACKS AND SECURITY AGAINST SPOOFING

                           SPOOFING                            
👉What is spoofing?
Ans:-Text message spoofing or SMSspoofing is sending a text message with someone else's phone number or sender ID.
Note:- Given details are only for educational purposes. We don't promote any kind of cyber attack.
Stay alert about getting sfoofed, daily thousands of cyber criminals try to spoof you. Don't click on any link randomly.
Types of spoofing 

Lets start deep knowledge about spoofing 🔥

👉Email spoofing

Website and/or URL spoofing.
Caller ID spoofing.
Text message spoofing.
GPS spoofing.
Man-in-the-middle attacks.
Extension spoofing.
IP spoofing.
Facial spoofing.

Email spoofing is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for authentication, making it common for spam and phishing emails to use such spoofing to mislead or even prank the recipient about the origin of the message ♨️


👉Website spoofing is all about making a malicious website look like a legitimate one. The spoofed site will look like the login page for a website you frequent—down to the branding, user interface, and even a spoofed domain name that looks the same at first glance. Cybercriminals use spoofed websites to capture your username and password (aka login spoofing) 

👉Caller ID spoofing happens when scammers fool your caller ID by making the call appear to be coming from somewhere it isn't. Scammers have learned that you're more likely to answer the phone if the caller ID shows an area code the same or near your own. In some cases, scammers will even spoof the first few digits of your phone number in addition to the area code to create the impression that the call is originating from your neighborhood (aka neighbor spoofing)

👉Text message spoofing or SMS spoofing is sending a text message with someone else's phone number or sender ID. If you've ever sent a text message from your laptop, you've spoofed your own phone number in order to send the text, because the text did not actually originate from your phone. 

👉GPS spoofing 

GPS spoofing is an attack in which a radio transmitter located near the target is used to interfere with a legitimate GPS signals. The attacker can transmit no data at all or could transmit inaccurate coordinates

👉Man-in-the-middle (MitM) attack. You like that free Wi-Fi at your local coffee shop? Have you considered what would happen if a cybercriminal hacked the Wi-Fi or created another fraudulent Wi-Fi network in the same location? In either case, you have a perfect setup for a man-in-the-middle attack, so named because cybercriminals are able to intercept web traffic between two parties. The spoof comes into play when the criminals alter the communication between the parties to reroute funds or solicit sensitive personal information like credit card numbers or logins.
👉IP spoofing is used when someone wants to hide or disguise the location from which they're sending or requesting data online. As it applies to cyberthreats, IP address spoofing is used in distributed denial of service attacks (DDoS) to prevent malicious traffic from being filtered out and to hide the attacker's location.

👉A face spoof attack is an attempt to deceive a facerecognition system using a substitute for another's person's face – usually their photo, video recording or a 3D mask. If thespoofing attack succeeds, the fraudster acquires privileges or access rights of another person.

Thanks for reading this article 😊. Please share it with your loved ones and save them from being spoofed.

                         ....................                           

Comments

Popular posts from this blog

Difference between Artificial intelligence and Machine learning???

WHAT IS THE DIFFERENCE BETWEEN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING❓❓🤔 🧿Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge. On the other hand, some programs have attained the performa...

SHODAN: A Search engine for hackers

    SHODAN: A Search engine for hackers Note:- This article is only for educational purposes , we are not promoting any kind of hacking. Stay away from these sites and stay safe 🌀 Shodan is a search engine that lets the user find specific types of computers (web cams, routers, servers, etc.) connected to the internet using a variety of filters. 🌀 Shodan provides the simple and powerful searching and it provides it with ease. 🌀 If you have a basic account then it provides you only the limited number of results. 🌀 So, if you want to access it more then you have to upgrade it. 🌀 The premium features of Shodan includes plotting the host locations on maps, accessing the full search listings etc. 🌀 It also gives you a feature to search using filters. It makes your search even more easier. They have there bases in 7 countries from where they do this.  Shodan have information about all IoT devices around the world. When they purchased fro...

Quantum computers:-Need , Working and Advantages

 Quantum computers:- In simple terms ( IBM quantum computer) Three Factors Of Quantum Computing:- 1. The Need? Integrated circuit (IC) chips are becoming small and small every year. Nowadays, Transistors are of size of 14 nm and that is smaller than the size of red blood cells. As things get small the regular rule of general  physics doesn't apply. At atomic level quantum physics work. 2. Difference? Ordinary computers use bits to represent data and carry out processes. Bits are like switches ; they can be either 1 or 0, just like "ON" or "OFF". Just like bits, quantum computers have "qubits". Which are basic unit of Quantum information. 3. Working? Classic state- Quantum state Instead of 1 and 0, quantum computers use electron spins. The spins can be in the state of positive (1) or negative (0) or both! This is called superposition. Quantum computers use superposition principles; they can ha...