Skip to main content

Posts

PHP guide- Everything about PHP

🔥 PHP GUIDE 🔥 ✨What is PHP❓ PHP is an acronym for "PHP: Hypertext Preprocessor". It is a widely-used, open source scripting language.PHP scripts are executed on the server And it is free to download and use.. ✨What is a PHP File❓ PHP files can contain text, HTML, CSS, JavaScript, and PHP code .PHP code is executed on the server, and the result is returned to the browser as plain HTML .PHP files have extension ".php" ✨What Can PHP Do❓ 💢PHP can generate dynamic page content 💢PHP can create, open, read, write, delete, and close files on the server 💢PHP can collect form data 💢PHP can send and receive cookies 💢PHP can add, delete, modify data in your database 💢PHP can be used to control user-access 💢PHP can encrypt data 💢With PHP you are not limited to output HTML. You can output images, PDF files, and even Flash movies. You can also output any text, such as XHTML and XML. ✨Why PHP❓ 💢PHP runs on various platforms (Windows, Linux, Unix, Mac OS X, et...

How to Check Used & Empty RAM Slots on Windows 10

How to Check Used & Empty RAM Slots on Windows 10       ➖➖➖➖➖➖➖➖➖➖➖➖➖      ⚜ lt’s worth noting that there are plenty of third-party tools available to check the RAM slots, but most of those software contains malware that can damage your system files. So, let’s check the steps to quickly find out if your PC has any available memory slots left. 🔹Step 1 : First of all, open the Start Menu and search for Task Manager. 🔹Step 2 : Open Task Manager from the List. You can also open Task Manager By Pressing CTRL + ALT + Delete. 🔹Step 3 : Now on the Task Manager, you need to move to the ‘Performance’ tab. 🔹Step 4 : Now under the Performance tab, select ‘Memory’ 🔹Step 5 : Now on the right-hand side panel, check the ‘Slots Used’. On my computer, its showing 1/2. That means I can add an extra memory stick. ✅ That’s it, you are done! This is how you can quickly determine memory slots available on the Motherboard on Windows 10 Note:- If y...

How to create INVISIBLE Folder

🔰 How To Create a Invisible Folder in PC Guide 🔰 1️⃣ Go to Start Menu And Search “ Character Map ” and open it 2️⃣ Scroll Down and choose a blank Box 3️⃣ Now click on select and then click on copy 4️⃣ Now Right Click on Desktop and create a Folder and rename it and paste the selection 5️⃣ then you create a folder without name 6️⃣ Then Right Click on the folder and go to properties 7️⃣ click on customize and then click on change icon 8️⃣ Choose Blank Icon and Click Ok 9️⃣ Now Apply the changes 🔟 Thats All Enjoy Concept is,windows doesn't allow u to create a folder without  any name..but if u understand that a blank space is also a character right?So basically we're using a blank character to create it. Note:- You can also hide your folder from properties section. If you like this article please subscribe out daily newsletter so you don't miss anything again.

SPOOFING:- TYPES OF ATTACKS AND SECURITY AGAINST SPOOFING

                           SPOOFING                             👉What is spoofing? Ans :- Text message spoofing or SMSspoofing is sending a text message with someone else's phone number or sender ID. Note:- Given details are only for educational purposes. We don't promote any kind of cyber attack. Stay alert about getting sfoofed, daily thousands of cyber criminals try to spoof you. Don't click on any link randomly. Types of spoofing   Lets start deep knowledge about spoofing 🔥 👉Email spoofing Website and/or URL spoofing. Caller ID spoofing. Text message spoofing. GPS spoofing. Man-in-the-middle attacks. Extension spoofing. IP spoofing. Facial spoofing. Email spoofing is the creation of email messages with a forged sender address. The core email protocols do not have any mechanism for aut...

HOW TO ADD FIREWALL IN ANY ANDROID DEVICE !!

     FIREWALL IN ANY ANDROID DEVICE      DESCRIPTION :   firewall is the security in any operating system that disallows all the dangerous IP’s and also the harmful programs to penetrates in the operating system ⭕️Steps To Add Firewall In Any Android Device: ✍️ Step 1. First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device. ✍️ Step 2. Now you need to launch the app after installing it in your device. Now you need to click on “Start".... ✍️ Step 3. Now you need to allow the connection, simply tap on “OK” to continue ✍️ Step 4. Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish           That’s it! you are done, now            ...

How to improve your Typing skills!!

Touch Typing Is All About The Idea That Each Finger Has It's Own Area On The Keyboard. KEYBOARD SCHEME:- The color coded keyboard under lesson input field will help you to understand which finger should press each key. - Hit keys only with the fingers for which they have been reserved. - Always return to the starting position of the finger "ASDF-JKL". - When typing imagine the location of the symbol on the keyboard. - Establish and maintain rhythm while typing. Your keystrokes should come after equal interval. - The SHIFT is also pressed by pinky finger. Opposite to the one hitting the other key. FINGERS MOTION:- - Do not rush when you just started learning . Speed up only after your fingers hitting the right key out of habbit. - Take your time when typing to avoid mistakes. The speed up as you progress. - Always scan the text a word or two in advance. TYPING WITHOUT LOOKING AT THE KEYBOARD:- Don't look at the keys when you type , just slide yo...

Facebook: 5 Ways Hacker can Hack your Account

Facebook: 5 Ways Hackers can Hack Your Account Facebook is the most widely used social networking site with more than 1.5 billion users, which makes it a huge target for hackers. In this graphic we will show you the top 10 methods used by hackers to hack Facebook accounts and how you can protect yourself against these cyber crooks. 1 Phishing Phishing is still the most common type of assault used for hacking Facebook accounts. There are several strategies for carrying out a phishing attack. 1. Basic Phishing attack works like this...a hacker makes a fake login page which precisely resembles the genuine Facebook page. 2. An email is sent asking the casualty to login into that page. 3. Once the casualty logins through the fake page the casualties "email address" and "secret word" is put away into a content record. The hacker then downloads the content document and gets his hands of the casualties accreditations. 2 Keylogging Keylogg...

Why flutter is future for App Development!!

Flutter:- What is flutter? - Flutter is the framework allowing you to build cross-platform apps which can run natively on Mobile app, Desktop and even embadded devices. Why flutter is the future , why not REACT NATIVE, IONIC KOTLIN, JAVA ,SWIFT or others Well there are 6 reasons:- 1 . Simple to use and learn:- Relative to other native and hybrid options. It also has an excellent documentation. 2.Fast Development:- With hot reload you can re-compile the app in seconds. No more multiple "build gradle". 3. Extremely Fast Performance:- You can get an App that performs as good as (even better than) native apps. 4. Popularity:- It has gained more popularity than React Native on both GitHub and StackOverflow,in a short time. 5. Best for MVP'S:- Best for startups, as you can cut the cost on developing for multiple platforms. But the biggest reason is 6.FUCHSIA OS:- A new OS currently developed by Google that has the potential to replace all other operating systems. It...