Posts

SQL INJECTION ATTACK

Image
What is SQL injection ? A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application. A successful SQL injection exploit can read sensitive data from the database, modify database data (Insert/Update/Delete), execute administration operations on the database (such as shutdown the DBMS), recover the content of a given file present on the DBMS file system and in some cases issue commands to the operating system. SQL injection attacks are a type of injection attack, in which SQL commands are injected into data-plane input in order to effect the execution of predefined SQL commands. DESCRIPTION:  SQL injection errors occur when: Data enters a program from an untrusted source. The data used to dynamically construct a SQL query. The main consequences are: Confidentiality: Since SQL databases generally hold sensitive data, loss of confidentiality is a frequent problem with SQL Injection

What is Cross Site Scripting Attack (XSS-Attack)

Image
   WHAT IS CROSS SITE SCRIPTING  ( XSS)  : Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it. An attacker can use cross site scripting (XSS) to send a malicious script to an unsuspecting user. The end user’s browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by the browser and used with that site. These scripts can even rewrite the content of

Avengers Endgame Writers Say Thor Killed Thanos Only Because He Let Him

Image
Avengers Endgame Writers Say Thor Killed Thanos Only Because He Let Him Now that the Avengers Endgame digital versions are out with commentary from the writers and directors, it was revealed that Thanos' death was more of an assisted suicide.                                           Towards the end of Avengers: Infinity War, it is only Thor who comes close to killing Thanos. He even stumps him to an extent, but Thanos uses the infinity stones to alter the time zone. Thanos also advised the God of Thunder to have gone for his head. Also Read >>  Chandrayaan-2 Orbit Successfully Raised Third Time, ISRO Announces. Click Here The failed attempt stayed with Thor for a long time. Despite having godly powers, Thor lost his planet and people at the hands of Thanos in Infinity War, and became a recluse. With no future plans whatsoever, he decides to binge on pizza, beer and video games for five years. In Avengers: Endgame, Hulk and Racoon arrive in N

Scammers New Whatsapp Hacking Trick

Image
Scammers trick Whatsapp users by offering 1000GB free data on the app's 10th anniversary                            "   Scammers New Whatsapp Hacking Trick " A new WhatsApp scam that claims to offer free internet data has been doing rounds on the internet recently. The users are tricked into believing that they are being offered 1000GB of free data as a gift on WhatsApp’s 10th anniversary. एक नया व्हाट्सएप घोटाला जो मुफ्त इंटरनेट डेटा की पेशकश करने का दावा करता है, हाल ही में इंटरनेट पर चक्कर लगा रहा है। उपयोगकर्ताओं को यह विश्वास दिलाया जाता है कि उन्हें व्हाट्सएप की 10 वीं वर्षगांठ पर उपहार के रूप में 1000GB मुफ्त डेटा दिया जा रहा है। FOLLOW ON INSTAGRAM @PRASHANT_7392 The victims are asked to share the message with at least 30 more people in order to claim the reward. The ultimate goal of the scammers is to perform click fraud through this type of scam.   पीड़ितों को इनाम का दावा करने के लिए कम से कम 30 और लोगों

What Can Linux Do that Windows Can’t?

Image
What Can Linux Do that Windows Can’t? With the recent partnership between Windows And Linux , the list of things Windows can’t do has shortened a bit. The partnership brought with it bash integration into the Windows OS, which has given users a convenient way to access the shell whenever they feel like it. In short, that means you don’t even need Linux to access the shell instance of your flavor of Linux OS. Linux servers can run forever without rebooting If you are looking for a free-to-use, customizable server OS to install in your home or office, with zero licensing fees (depending on your distro), then a Linux OS is going to be your best bet. Those who are willing to take the time  to set up and configure their server  correctly will be rewarded with a stable machine that almost never requires rebooting, service restarts, or any maintenance downtime. There is a reason why the majority of web hosts prefer using the Linux OS in their deployments. It is not uncommon t

Operating System

Image
  what is operating system short not ??? Operating system definition and examples of operating systems in use today An  operating system  is a powerful, and usually large, program that controls and manages the hadwareand other software on a computer. All computers and computer-like devices require operating systems, including your laptop, tablet, desktop, smartphone, smartwatch, and router Not sure what operating system you're running? Use the Lifewire System Info Tool below to find out!                                                                              Follow My Other Instagram Page Click Here. Examples of Operating Systems Laptops, tablets, and desktop computers all run operating systems that you've probably heard of. Some examples include versions of Microsoft Windows (like Windows10, Windows8, Windows7, Windows Visita, and WindowsXP), Apple's Mac Os (formerly OS X), Chrome OS, BlackBerry Tablet OS, and flav

What is the full form of " SIM "

Image
           What is the full form of  " SIM " ??? SIM: Subscriber Identity Module or Subscriber Identification Module. SIM  is  an integrated circuit that securely stores the international mobile subscriber identity  (IMSI). It is a portable memory chip that makes you able to make phone call across the world where subscriber's network is available. SIM is generally used in mobile phones that operates on GSM network. It is portable and you can use it with any supporting mobile phone. SIM Size: When the first SIM card was invented, it was almost of the size of a credit card. But the newest standard of a SIM contains a size of 15mm by 12mm. Now a days, some smart phones uses micro and nano SIM cards which are different in sizes.                                                        Instagram: @binary_meme                                                               Facebook: binary_meme What information does a SIM card store: