Comparison on Cloud: PaaS Services In this journey, I went through the world of advanced Internet Paas Services Solutions, where I understand Cloud Computing Power. Read More » February 16, 2023 4:22 pm
Top fitness tracker watches and fitness bands We don’t have more time to care your health and fitness in busy world but thanks to the latest technology Read More » February 16, 2023 4:22 pm
Loops in python -part 7 Python programming language provides the following types of loops. Here we cover all the ways for executing the loops. While Read More » February 16, 2023 4:22 pm
ARBITRARY FILE UPLOAD VULNERABILITY AT VARIOUS SECURITY LEVELS Good Afternoon all, DVWA – DAMN VULNERABLE WEB APPLICATION. Some of you guys know well about DVWA, but this one Read More » February 16, 2023 4:22 pm
Array : 2D array Hey guys, i hope you are doing well In the previous blog we learn about the 1d array and today Read More » February 16, 2023 4:22 pm
PHP BASICS FOR BEGINNERS PART – 1 INTRODUCTION: PHP is a server-side scripting language which is used in the backend of any process of a website. In Read More » February 16, 2023 4:22 pm
Setting up Snort: Intrusion Detection System Configuration IDS – Intrusion Detection System is used to detect for intruders who try to access the network of system in Read More » February 16, 2023 4:22 pm
Array Hey guys, so in a previous blog, we learn how pandas worked in data science or in Python, I hope Read More » February 16, 2023 4:22 pm
Traffic Interception using ZAP ZAP —- ZED ATTACK PROXY It is an integrated pen-testing tool mostly useful for finding vulnerabilities in web applications. With Read More » February 16, 2023 4:22 pm