Skip to main content

PHP guide- Everything about PHP

🔥 PHP GUIDE 🔥 ✨What is PHP❓ PHP is an acronym for "PHP: Hypertext Preprocessor". It is a widely-used, open source scripting language.PHP scripts are executed on the server And it is free to download and use.. ✨What is a PHP File❓ PHP files can contain text, HTML, CSS, JavaScript, and PHP code .PHP code is executed on the server, and the result is returned to the browser as plain HTML .PHP files have extension ".php" ✨What Can PHP Do❓ 💢PHP can generate dynamic page content 💢PHP can create, open, read, write, delete, and close files on the server 💢PHP can collect form data 💢PHP can send and receive cookies 💢PHP can add, delete, modify data in your database 💢PHP can be used to control user-access 💢PHP can encrypt data 💢With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML. ✨Why PHP❓ 💢PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, et...

What is zip attack? Safety tips!!

What is Zip Attack ?      

⚠️ This post is only for Knwldg &   Educational Purpose only.we are not responsible for any misuse

🔸Zip bombs are very small files, that when unzipped, can expand from some few kilo bytes to thousands of terabytes, they are  usually used to take out antivirus software.
Zip bombs of course has a single base, a text file containing only 0s Usually that text file is 4GB, written in either notepad or wordpad, how you make a Zip File is explained 
🔸Steps:-

👉Open notepad or word pad and write in 1000 zeros and then you should have a text file of about 1Kb

👉Now use the CTR+A, CTR+C, CTR+V buttons on your keyboard to select all, copy the selected and then paste it(respectively)

👉Repeat step 2 until your text file becomes 4GB

👉Now save the text file under any name with of course a .txt extension, so now you have a 4GB text file containing only of zeros

👉Now Compress this text file into a zip file(This will be our base) let's call it zip1

👉Now copy this zip file(zip1) 17 times and now you will have 17 copies of the original  zip1 file, and now zip all these zip1 files into 1 zip file let's call it zip2, now zip2 contains 17 zip1s
Now make 17 copies of zip2 and zip it into zip3

👉Now continue step 6 until you have gone to zip5 or 5 layers, each containing 17 zip files
Now you know how to make a zip bomb, here is how it's used, hackers place zip bombs near their malware, so the zip bomb acts as a bait and the anti virus tries to open this zip file but then gets 17 smaller zip files and opens them, and the size increases unexpectedly fast and  the antivirus will either crash or stop opening these zip files and temporarly shut down, now the Malware will do its magic...u can use this file to annoy ur friends and for professional hackers use this trick to hide  malwares don't open this on ur pc.

Safety tips:- Never open any zip file from unknown sources it may lead to hacking and malware attack.

If you like this article please subscribe to our weekly newsletter.
Share with your friends and family to save them from such attacks.

    By- Indian Developers Club ☑️

Comments

Popular posts from this blog

Difference between Artificial intelligence and Machine learning???

WHAT IS THE DIFFERENCE BETWEEN ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING❓❓🤔 🧿Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge. On the other hand, some programs have attained the performa...

SHODAN: A Search engine for hackers

    SHODAN: A Search engine for hackers Note:- This article is only for educational purposes , we are not promoting any kind of hacking. Stay away from these sites and stay safe 🌀 Shodan is a search engine that lets the user find specific types of computers (web cams, routers, servers, etc.) connected to the internet using a variety of filters. 🌀 Shodan provides the simple and powerful searching and it provides it with ease. 🌀 If you have a basic account then it provides you only the limited number of results. 🌀 So, if you want to access it more then you have to upgrade it. 🌀 The premium features of Shodan includes plotting the host locations on maps, accessing the full search listings etc. 🌀 It also gives you a feature to search using filters. It makes your search even more easier. They have there bases in 7 countries from where they do this.  Shodan have information about all IoT devices around the world. When they purchased fro...

Quantum computers:-Need , Working and Advantages

 Quantum computers:- In simple terms ( IBM quantum computer) Three Factors Of Quantum Computing:- 1. The Need? Integrated circuit (IC) chips are becoming small and small every year. Nowadays, Transistors are of size of 14 nm and that is smaller than the size of red blood cells. As things get small the regular rule of general  physics doesn't apply. At atomic level quantum physics work. 2. Difference? Ordinary computers use bits to represent data and carry out processes. Bits are like switches ; they can be either 1 or 0, just like "ON" or "OFF". Just like bits, quantum computers have "qubits". Which are basic unit of Quantum information. 3. Working? Classic state- Quantum state Instead of 1 and 0, quantum computers use electron spins. The spins can be in the state of positive (1) or negative (0) or both! This is called superposition. Quantum computers use superposition principles; they can ha...