Skip to main content

Posts

Showing posts with the label hacking

PHP guide- Everything about PHP

πŸ”₯ PHP GUIDE πŸ”₯ ✨What is PHP❓ PHP is an acronym for "PHP: Hypertext Preprocessor". It is a widely-used, open source scripting language.PHP scripts are executed on the server And it is free to download and use.. ✨What is a PHP File❓ PHP files can contain text, HTML, CSS, JavaScript, and PHP code .PHP code is executed on the server, and the result is returned to the browser as plain HTML .PHP files have extension ".php" ✨What Can PHP Do❓ πŸ’’PHP can generate dynamic page content πŸ’’PHP can create, open, read, write, delete, and close files on the server πŸ’’PHP can collect form data πŸ’’PHP can send and receive cookies πŸ’’PHP can add, delete, modify data in your database πŸ’’PHP can be used to control user-access πŸ’’PHP can encrypt data πŸ’’With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML. ✨Why PHP❓ πŸ’’PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, et...

π–π‘πšπ­ 𝐈𝐬 𝐁𝐒𝐨𝐬 πŸ€”❓❓

π–π‘πšπ­ 𝐈𝐬 𝐁𝐒𝐨𝐬 πŸ€”❓❓ Bios is firmware used to perform hardware initialization during the booting process (power-on startup), and to provide runtime services for operating systems and programs.The BIOS firmware comes pre-installed on a personal computer's system board, and it is the first software to run when powered on. The name originates from the Basic Input/Output System used in the CP/M operating system in 1975.The BIOS originally proprietary to the IBM PC has been reverse engineered by companies looking to create compatible systems. The interface of that original system serves as a de facto standard. The BIOS in modern PCs initializes and tests the system hardware components, and loads a boot loader from a mass memory device which then initializes an operating system. In the era of DOS, the BIOS provided a hardware abstraction layer for the keyboard, display, and other input/output (I/O) devices that standardized an interface to application programs and the ...

What is zip attack? Safety tips!!

What is Zip Attack ?       ⚠️ This post is only for Knwldg &     Educational Purpose only.we are not responsible for any misuse πŸ”ΈZip bombs are very small files, that when unzipped, can expand from some few kilo bytes to thousands of terabytes, they are  usually used to take out antivirus software. Zip bombs of course has a single base, a text file containing only 0s Usually that text file is 4GB, written in either notepad or wordpad, how you make a Zip File is explained  πŸ”Έ Steps :- πŸ‘‰Open notepad or word pad and write in 1000 zeros and then you should have a text file of about 1Kb πŸ‘‰Now use the CTR+A, CTR+C, CTR+V buttons on your keyboard to select all, copy the selected and then paste it(respectively) πŸ‘‰Repeat step 2 until your text file becomes 4GB πŸ‘‰Now save the text file under any name with of course a .txt extension, so now you have a 4GB text file containing only of zeros πŸ‘‰Now Compress this text file into a ...

HACKING AND DIFFERENT TYPES OF HACKING

----HACKING AND DIFFERENT TYPES OF HACKING----- What Is Hacking?   Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes , nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge. ♨️ Different Type Of Hackers ♨️ 1-WHITE HAT HACKER ━━━━━━━━━━━━━ First up, we have the perfect type of hacker to break the stereotype. The white hat hacker is a good guy, as ironic as it may sound. White Hackers, white hat hackers or ethical hackers are the people who test existing internet infrastructures to research loopholes in the system. They create algorithms and perform multiple methodologies to break into systems, only to strengthen them. - Think of this as a lockpic...

SPOOFING:- TYPES OF ATTACKS AND SECURITY AGAINST SPOOFING

                           SPOOFING                             πŸ‘‰What is spoofing? Ans :- Text message spoofing or SMSspoofing is sending a text message with someone else's phone number or sender ID. Note:- Given details are only for educational purposes. We don't promote any kind of cyber attack. Stay alert about getting sfoofed, daily thousands of cyber criminals try to spoof you. Don't click on any link randomly. Types of spoofing   Lets start deep knowledge about spoofing πŸ”₯ πŸ‘‰Email spoofing Website and/or URL spoofing. Caller ID spoofing. Text message spoofing. GPS spoofing. Man-in-the-middle attacks. Extension spoofing. IP spoofing. Facial spoofing. Email spoofing is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for aut...

Facebook: 5 Ways Hacker can Hack your Account

Facebook: 5 Ways Hackers can Hack Your Account Facebook is the most widely used social networking site with more than 1.5 billion users, which makes it a huge target for hackers. In this graphic we will show you the top 10 methods used by hackers to hack Facebook accounts and how you can protect yourself against these cyber crooks. 1 Phishing Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack. 1. Basic Phishing attack works like this...a hacker makes a fake login page which precisely resembles the genuine Facebook page. 2. An email is sent asking the casualty to login into that page. 3. Once the casualty logins through the fake page the casualties "email address" and "secret word" is put away into a content record. The hacker then downloads the content document and gets his hands of the casualties accreditations. 2 Keylogging Keylogg...