Posts

What is protocol | It's usage | Techhunter

Image
What is protocol In the networking and communications area, a p rotocol   is the formal specification that defines the procedures that must be followed when transmitting or receiving data.  Protocols  define the format, timing, sequence, and error checking used on the network. In plain english, the above means that if you have 2 or more devices e.g computers which want to communicate, then they need a common "Protocol" which is a set of rules that guide the computers on how and when to talk to each other.  The way this "defenition" happens in computer land is by the RFC's (Requests For Comments) where the IETF (a group of enginners with no life) make up the new standards and protocols and then the major vendors (IBM, Cisco, Microsoft, Novell) follow these standards and implement them in their products to make more money and try to take over this world ! There are hundreads of protocols out there and it is impossible to list them all here, but instead we have inc...

Coding vs programing|TechHunter

Image
 CODING VS PROGRAMMING Coding vs programmingi is a debate that has become relevant in the software development community fairly recently. Read this article to find out why they are different and why it is important to know the distinction. With the recent rise in computer science classes across all grades, we’re starting to grow our personal vocabularies in ways that make the average person uncomfortable. To complicate matters, many of these “new” words seem to have such intimidating histories that we don’t take the time to properly understand their usage — instead we repeat them blindly, whether we know what they really mean or not. One such example of complex wordsmithing is the synonymous use of the terms “coding” and “programming”.See Also:  what is coding ? “Coding” and “Programming”  are the two most important approaches in Software Development Industries. Coding is basically the process of creating codes from one language to another one. It can also be called...

Top 10 operating system for hacking in 2020|TechHunter

Image
Ethica hacking is identifying weaknesses in computer systems or networks to exploit its vulnerabilities so they can be fixed later. Hackers use various techniques to identify threats and thereby increase the security of the device. These people can utilize Linux based operating system to hack PC or network. It contains a wide range of applications to prevent cybersecurity attacks. Following is a handpicked list of Top OS for Hacking with their popular features and download links. 1) Kali Linux     Kali Linux is a Security Distribution of Linux specifically designed for digital forensics and penetration testing. It has over 600 preinstalled penetration-testing applications (cyber-attack performs against computer vulnerability). This OS can be run on Windows as well as Mac OS. Features: It can be used for penetration testing. This platform is available in 32 bits as well as 64 bits. Kali Linux can be updated without the need to download a new version. This OS can encry...

What is HTML? The Basics of Hypertext Markup Language|TechHunter

Image
What is HTML?  HTM  stands for  Hypertext Markup Language . It allows the user to create and structure sections, paragraphs, headings, links, and blockquotes for web pages and applications. HTML is not a programming language, meaning it doesn’t have the ability to create dynamic functionality. Instead, it makes it possible to organize and format documents, similarly to Microsoft Word. When working with HTML, we use simple code structures (tags and attributes) to mark up a website page. For example, we can create a paragraph by placing the enclosed text within a starting  <p>  and closing  </p>  tag. <p>This is how you add a paragraph in HTML.</p> <p>You can have more than one!</p> Overall, HTML is a markup language that is really straightforward and easy to learn even for complete beginners in website building. Here’s what you’ll learn by reading this article The History of HTML HTML was invented by Tim Berners-...

Best Non Chinese alternative to 59 banned apps|Tech hunter

Image
Best non Chinese alternative indian Apps:

Creating hyperlink|HTML|TechHunter

Image
Hyperlinks are really important — they are what makes the Web  a web . This article shows the syntax required to make a link, and discusses link best practices.

Create a order list through HTML|TechHunter

Image
Create Order list<ol> HTML order list created with <ol>tag First of all let's see the attributes of HTML- Attributes Attribute Value Description Reversed reversed Specifies that the list order should be reversed (9,8,7...) Start number Specifies the start value of an ordered list Type 1 A a I i Specifies the kind of marker to use in the list Ordered HTML List - The Type Attribute The  type  attribute of the  <ol>  tag, defines the type of the list item marker: Type Description type="1" The list items will be numbered with numbers (default) type="A" The list items will be numbered with uppercase letters type="a" The list items will be numbered with lowercase letters type="I" The list items will be numbered with uppercase roman numbers type="i" The list items will be numbered with lowercase roman numbers < ol  type ="1" >    < li > Coffee < /li >    < li > Tea < /li >    < l...

A-Z Kali Linux commands|TechHunter

Image
If you are new to Kali Linux world, check out the list of all available Kali Linux commands for both newbies and advance users to ease up with Terminal. Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns, and RaphaĆ«l Hertzog are the core developers. As we all know Kali Linux is one of the most  used operating system by hackers and security experts. It’s nothing like any other Linux based operating systems when it comes on features and functionality. But knowing the basics of Linux kernel and Terminal will give a headstart to any newbie who likes to try this operating system. And for them, here is your Kali Linux commands cheat sheet, take a copy of the Kali commands pdf along with this article for your reference in future. Kali Linux is preinstalled with over 600 penetration-testing programs, including nmap (a port scanner), Wiresha...