CALL US

+91 8219776763

Category: Programming

HTTP Methods: GET vs. POST

By Prempal Singh 0 Comment February 14, 2017

What is HTTP HTTP stands for Hypertext Transfer Protocol and HTTP is used to communications and request-response protocol between clients and servers. A web browser may be the client or may be the server. Example: A client (browser) submits an HTTP request to the server; then the server returns a response to the client. The […]

What is Hacking and Their Types

By Prempal Singh 0 Comment December 3, 2016

What is Hacking Through the 1990s, the term “hacker” formerly denoted a skilled programmer, experienced in machine code and computer working or functioning. In particular, these individuals could always crack on an unsatisfactory system to solve problems and have interaction in a little software company watching by interpreting a competitor’s code. There are many types […]

How to trace & get IP Address of Target Person

By Prempal Singh 0 Comment September 3, 2016

IP (Internet Protocol) Address is one of the most important components or part of the internet, as well as cyber forensics. With the help of IP address all digital devices, computers communicate with each other, and this is allotted to that device, such as static or dynamic. That all the reasons law enforcement agencies are […]

How to make secure Website to being Hacked(Blocked Scanner)

By Prempal Singh 0 Comment July 24, 2016

As you may all know there are many Web Vulnerability Scanning devices and software available on internet which can scan any website for vulnerabilities? It is just a fashion nowadays to scan an internet site from a Web Susceptibility Scanner and if received or acquired any vulnerability then record or survey vulnerabilities to the manager, […]

How to Calculate Hash Value

By Prempal Singh 0 Comment July 22, 2016

Calculate Hash Value Before knowing about “Calculate Hash Value” methods we need to know what is Hashing. What is Hash? Hashing is a method for reducing large inputs to a compact fixed size output. When you are performing forensics, typically cryptography hashing algorithms like MD5 and SHA-1 are used. These functions have a few properties […]

error: Content is protected by Cyberops !!