hkrhasan
2 years ago in HTML
<!DOCTYPE html><html lang="en"><head><style data-next-hide-fouc="true">body{display:none}</style><noscript data-next-hide-fouc="true"><style>body{display:block}</style></noscript><link rel="apple-touch-icon" sizes="76x76" href="/static/favicons/apple-touch-icon.png"/><link rel="icon" type="image/png" sizes="32x32" href="/static/favicons/favicon-32x32.png"/><link rel="icon" type="image/png" sizes="16x16" href="/static/favicons/favicon-16x16.png"/><link rel="manifest" href="/static/favicons/site.webmanifest"/><link rel="mask-icon" href="/static/favicons/safari-pinned-tab.svg" color="#5bbad5"/><meta name="msapplication-TileColor" content="#000000"/><meta name="theme-color" content="#000000"/><meta name="google-site-verification" content="IeS-E4Jd85j5BFsy1ePbBq3HKQjn3nc94V_0XxHKRSw"/><link rel="alternate" type="application/rss+xml" href="/feed.xml"/><link rel="preconnect" href="https://fonts.gstatic.com" crossorigin="anonymous"/><link href="https://fonts.googleapis.com/css2?family=Inter:wght@400;600;700&amp;display=swap" rel="stylesheet"/><link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/[email protected]/dist/katex.min.css" integrity="sha384-Um5gpz1odJg5Z4HAmzPtgZKdTBHZdw8S29IecapCSB31ligYPhHQZMIlWLYQGVoc" crossorigin="anonymous"/><link href="https://unpkg.com/[email protected]/css/boxicons.min.css" rel="stylesheet"/><meta charSet="utf-8"/><script>!function(){try {var d=document.documentElement.classList;d.remove('light','dark');var e=localStorage.getItem('theme');if("system"===e||(!e&&true)){var t="(prefers-color-scheme: dark)",m=window.matchMedia(t);m.media!==t||m.matches?d.add('dark'):d.add('light')}else if(e) d.add(e)}catch(e){}}()</script><meta content="width=device-width, initial-scale=1" name="viewport"/><title>Treasure for IT Students | hkrhasan.com </title><meta name="robots" content="follow, index"/><meta name="description" content="A blog created for help IT Students"/><meta property="og:url" content="http://www.hkrhasan.com//"/><meta property="og:type" content="website"/><meta property="og:site_name" content="Treasure for IT Students"/><meta property="og:description" content="A blog created for help IT Students"/><meta property="og:title" content="Treasure for IT Students"/><meta property="og:image" content="http://www.hkrhasan.com//static/images/twitter-card.png"/><meta name="twitter:card" content="summary_large_image"/><meta name="twitter:site" content="https://twitter.com/talibha80785319"/><meta name="twitter:title" content="Treasure for IT Students"/><meta name="twitter:description" content="A blog created for help IT Students"/><meta name="twitter:image" content="http://www.hkrhasan.com//static/images/twitter-card.png"/><script async="" src="https://pagead2.googlesyndication.com/pagead/js/adsbygoogle.js?client=ca-pub-7910716560966125" crossorigin="anonymous"></script><script async="" custom-element="amp-auto-ads" src="https://cdn.ampproject.org/v0/amp-auto-ads-0.1.js"></script><meta name="next-head-count" content="19"/><noscript data-n-css=""></noscript><script defer="" nomodule="" src="/_next/static/chunks/polyfills.js?ts=1641043035903"></script><script src="/_next/static/chunks/webpack.js?ts=1641043035903" defer=""></script><script src="/_next/static/chunks/main.js?ts=1641043035903" defer=""></script><script src="/_next/static/chunks/pages/_app.js?ts=1641043035903" defer=""></script><script src="/_next/static/chunks/pages/index.js?ts=1641043035903" defer=""></script><script src="/_next/static/development/_buildManifest.js?ts=1641043035903" defer=""></script><script src="/_next/static/development/_ssgManifest.js?ts=1641043035903" defer=""></script><noscript id="__next_css__DO_NOT_USE__"></noscript></head><body class="antialiased text-black bg-white dark:bg-gray-900 dark:text-white"><amp-auto-ads type="adsense" data-ad-client="ca-pub-7910716560966125"></amp-auto-ads><div id="__next"><div class="max-w-3xl px-4 mx-auto sm:px-6 xl:max-w-5xl xl:px-0"><div class="flex flex-col justify-between h-screen"><header class="flex items-center justify-between py-10"><div><a aria-label="Tailwind CSS Blog" href="/"><div class="flex items-center justify-between"><div class="mr-3"><svg xmlns="http://www.w3.org/2000/svg" xmlns:xlink="http://www.w3.org/1999/xlink" viewBox="344.564 330.278 111.737 91.218" width="53.87" height="43.61"><defs><linearGradient id="logo_svg__b" gradientUnits="userSpaceOnUse" x1="420.97" y1="331.28" x2="420.97" y2="418.5"><stop offset="0%" stop-color="#06b6d4"></stop><stop offset="100%" stop-color="#67e8f9"></stop></linearGradient><linearGradient id="logo_svg__d" gradientUnits="userSpaceOnUse" x1="377.89" y1="331.28" x2="377.89" y2="418.5"><stop offset="0%" stop-color="#06b6d4"></stop><stop offset="100%" stop-color="#67e8f9"></stop></linearGradient><path d="M453.3 331.28v28.57l-64.66 58.65v-30.08l64.66-57.14z" id="logo_svg__a"></path><path d="M410.23 331.28v28.57l-64.67 58.65v-30.08l64.67-57.14z" id="logo_svg__c"></path></defs><use xlink:href="#logo_svg__a" fill="url(#logo_svg__b)"></use><use xlink:href="#logo_svg__c" fill="url(#logo_svg__d)"></use></svg></div><div class="hidden h-6 text-2xl font-semibold sm:block">HKR HASAN</div></div></a></div><div class="flex items-center text-base leading-5"><div class="hidden sm:block"><a class="p-1 font-medium text-gray-900 sm:p-4 dark:text-gray-100" href="/blog">Blog</a><a class="p-1 font-medium text-gray-900 sm:p-4 dark:text-gray-100" href="/tags">Tags</a><a class="p-1 font-medium text-gray-900 sm:p-4 dark:text-gray-100" href="/about">About</a></div><button aria-label="Toggle Dark Mode" type="button" class="w-8 h-8 p-1 ml-1 mr-1 rounded sm:ml-4"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" fill="currentColor" class="text-gray-900 dark:text-gray-100"><path d="M17.293 13.293A8 8 0 016.707 2.707a8.001 8.001 0 1010.586 10.586z"></path></svg></button><div class="sm:hidden"><button type="button" class="w-8 h-8 ml-1 mr-1 rounded" aria-label="Toggle Menu"><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" fill="currentColor" class="text-gray-900 dark:text-gray-100"><path fill-rule="evenodd" d="M3 5a1 1 0 011-1h12a1 1 0 110 2H4a1 1 0 01-1-1zM3 10a1 1 0 011-1h12a1 1 0 110 2H4a1 1 0 01-1-1zM3 15a1 1 0 011-1h12a1 1 0 110 2H4a1 1 0 01-1-1z" clip-rule="evenodd"></path></svg></button><div class="fixed w-full h-full top-24 right-0 bg-gray-200 dark:bg-gray-800 opacity-95 z-10 transform ease-in-out duration-300 translate-x-full"><button type="button" aria-label="toggle modal" class="fixed w-full h-full cursor-auto focus:outline-none"></button><nav class="fixed h-full mt-8"><div class="px-12 py-4"><a class="text-2xl font-bold tracking-widest text-gray-900 dark:text-gray-100" href="/blog">Blog</a></div><div class="px-12 py-4"><a class="text-2xl font-bold tracking-widest text-gray-900 dark:text-gray-100" href="/tags">Tags</a></div><div class="px-12 py-4"><a class="text-2xl font-bold tracking-widest text-gray-900 dark:text-gray-100" href="/about">About</a></div></nav></div></div></div></header><main class="mb-auto"><div class="divide-y divide-gray-200 dark:divide-gray-700"><div class="pt-6 pb-3 space-y-2 md:space-y-5"><h1 class="text-3xl font-extrabold leading-9 tracking-tight text-gray-900 dark:text-gray-100 sm:text-4xl sm:leading-10 md:text-6xl md:leading-14">Learn Without Limits</h1><p class="text-lg leading-7 text-gray-500 dark:text-gray-400">A blog created for help IT Students</p><nav class="relative pt-6"><div class="swiper flex text-2xl"><div class="swiper-wrapper"><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/hacking">HACKING<!-- --> (<!-- -->24<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/cyber-security">CYBER-SECURITY<!-- --> (<!-- -->15<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/it">IT<!-- --> (<!-- -->13<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/computer">COMPUTER<!-- --> (<!-- -->11<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/computer_fundamentals">COMPUTER FUNDAMENTALS<!-- --> (<!-- -->11<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/networking">NETWORKING<!-- --> (<!-- -->10<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/linux">LINUX<!-- --> (<!-- -->6<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/spoofing">SPOOFING<!-- --> (<!-- -->4<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/os">OS<!-- --> (<!-- -->4<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/php">PHP<!-- --> (<!-- -->4<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/installation">INSTALLATION<!-- --> (<!-- -->3<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/unix">UNIX<!-- --> (<!-- -->3<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/operating_system">OPERATING SYSTEM<!-- --> (<!-- -->3<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/git">GIT<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/windows10-git">WINDOWS10-GIT<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/excel">EXCEL<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/virtualbox">VIRTUALBOX<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/virtualization">VIRTUALIZATION<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/linux_history">LINUX HISTORY<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/switch">SWITCH<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/mysql">MYSQL<!-- --> (<!-- -->2<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/windows">WINDOWS<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/windows10">WINDOWS10<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/ssh">SSH<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/tmux">TMUX<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/vpn">VPN<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/multimedia">MULTIMEDIA<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/virus">VIRUS<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/scanning">SCANNING<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/nmap">NMAP<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/memory">MEMORY<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/ouput_devices">OUPUT DEVICES<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/function">FUNCTION<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/input_devices">INPUT DEVICES<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/commands">COMMANDS<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/cli">CLI<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/if">IF<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/logical_function">LOGICAL FUNCTION<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/types">TYPES<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/types_of_computer">TYPES OF_COMPUTER<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/window10">WINDOW10<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/python">PYTHON<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/python_programming">PYTHON PROGRAMMING<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/kali">KALI<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/window">WINDOW<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/os_history">OS HISTORY<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/html_css_js_php">HTML CSS_JS_PHP<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/html">HTML<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/css">CSS<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/javascript">JAVASCRIPT<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/file_upload">FILE UPLOAD<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/networking_device">NETWORKING DEVICE<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/router">ROUTER<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/hub">HUB<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/bridge">BRIDGE<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/repeater">REPEATER<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/nic">NIC<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/vlan">VLAN<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/subneting">SUBNETING<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/computer_generation">COMPUTER GENERATION<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/computer_history">COMPUTER HISTORY<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/block_daigram">BLOCK DAIGRAM<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/php_with_mysql">PHP WITH_MYSQL<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/mysql_connection_php">MYSQL CONNECTION_PHP<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/pdo">PDO<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/pdo_mysql">PDO MYSQL<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/mysqli">MYSQLI<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/xampp">XAMPP<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/xampp_installation">XAMPP INSTALLATION<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/localhost">LOCALHOST<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/send_email">SEND EMAIL<!-- --> (<!-- -->1<!-- -->)</a></div><div class="swiper-slide mr-3 mb-2" style="width:max-content"><a class="cursor-pointer border-2 border-solid border-black dark:border-white rounded-full py-2 px-4 font-semibold text-sm text-gray-900 dark:text-gray-100" href="/tags/send_email_xampp">SEND EMAIL_XAMPP<!-- --> (<!-- -->1<!-- -->)</a></div></div></div></nav></div><ul class="divide-y divide-gray-200 dark:divide-gray-700"><li class="py-12"><article><div class="space-y-2 xl:grid xl:grid-cols-4 xl:space-y-0 xl:items-baseline"><dl><dt class="sr-only">Published on</dt><dd class="text-base font-medium leading-6 text-gray-500 dark:text-gray-400"><time dateTime="2021-12-27T00:00:00.000Z">December 27, 2021</time></dd></dl><div class="space-y-5 xl:col-span-3"><div class="space-y-6"><div><h2 class="text-2xl font-bold leading-8 tracking-tight"><a class="text-gray-900 dark:text-gray-100" href="/blog/how-to-install-git-on-window-10">How To Install Git On Window 10 Step by Step? | What is Git?</a></h2><div class="flex flex-wrap"><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/hacking">hacking</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/cyber-security">cyber-Security</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/git">git</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/windows">windows</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/windows10">windows10</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/windows10-git">windows10-git</a></div></div><div class="prose text-gray-500 max-w-none dark:text-gray-400">In this article we will learn how to install git on windows 10 step by step. This article is for beginners and for those who are new to git. I will explain each and every step in dept for installing git on windows 10.</div></div><div class="text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="Read &quot;How To Install Git On Window 10 Step by Step? | What is Git?&quot;" href="/blog/how-to-install-git-on-window-10">Read more →</a></div></div></div></article></li><li class="py-12"><article><div class="space-y-2 xl:grid xl:grid-cols-4 xl:space-y-0 xl:items-baseline"><dl><dt class="sr-only">Published on</dt><dd class="text-base font-medium leading-6 text-gray-500 dark:text-gray-400"><time dateTime="2021-12-27T00:00:00.000Z">December 27, 2021</time></dd></dl><div class="space-y-5 xl:col-span-3"><div class="space-y-6"><div><h2 class="text-2xl font-bold leading-8 tracking-tight"><a class="text-gray-900 dark:text-gray-100" href="/blog/setting-up-ssh--with-github-on-windows-10">Setting Up SSH and Git with Github on Window 10</a></h2><div class="flex flex-wrap"><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/hacking">hacking</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/cyber-security">cyber-Security</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/git">git</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/windows10-git">windows10-git</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/ssh">ssh</a></div></div><div class="prose text-gray-500 max-w-none dark:text-gray-400">Hello guys, I am going to show you how to setup SSH and Git with Github on Windows 10. When we interact with a remote Git server, such as GitHub, we have to include credentials in the request. This proves we are a specific GitHub user, who’s allowed to do whatever we’re asking to...</div></div><div class="text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="Read &quot;Setting Up SSH and Git with Github on Window 10&quot;" href="/blog/setting-up-ssh--with-github-on-windows-10">Read more →</a></div></div></div></article></li><li class="py-12"><article><div class="space-y-2 xl:grid xl:grid-cols-4 xl:space-y-0 xl:items-baseline"><dl><dt class="sr-only">Published on</dt><dd class="text-base font-medium leading-6 text-gray-500 dark:text-gray-400"><time dateTime="2021-12-20T00:00:00.000Z">December 20, 2021</time></dd></dl><div class="space-y-5 xl:col-span-3"><div class="space-y-6"><div><h2 class="text-2xl font-bold leading-8 tracking-tight"><a class="text-gray-900 dark:text-gray-100" href="/blog/what-is-tmux-and-use-of-tmux">What is Tmux? | How to Use Tmux?</a></h2><div class="flex flex-wrap"><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/hacking">hacking</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/cyber-security">cyber-Security</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/linux">linux</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/tmux">tmux</a></div></div><div class="prose text-gray-500 max-w-none dark:text-gray-400">Tmux is a terminal multiplexer. It allows you to run multiple programs in a single terminal window. It is a very powerful tool for managing multiple programs in a single terminal window.</div></div><div class="text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="Read &quot;What is Tmux? | How to Use Tmux?&quot;" href="/blog/what-is-tmux-and-use-of-tmux">Read more →</a></div></div></div></article></li><li class="py-12"><article><div class="space-y-2 xl:grid xl:grid-cols-4 xl:space-y-0 xl:items-baseline"><dl><dt class="sr-only">Published on</dt><dd class="text-base font-medium leading-6 text-gray-500 dark:text-gray-400"><time dateTime="2021-12-17T00:00:00.000Z">December 17, 2021</time></dd></dl><div class="space-y-5 xl:col-span-3"><div class="space-y-6"><div><h2 class="text-2xl font-bold leading-8 tracking-tight"><a class="text-gray-900 dark:text-gray-100" href="/blog/how-to-set-up-own-vpn-on-aws">How to Setup Own VPN Server on AWS EC2? | What is VPN?</a></h2><div class="flex flex-wrap"><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/hacking">hacking</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/cyber-security">cyber-Security</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/networking">networking</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/spoofing">spoofing</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/vpn">vpn</a></div></div><div class="prose text-gray-500 max-w-none dark:text-gray-400">In this article, I will show you how to setup your own VPN server on AWS EC2. I will also show you how to spoof your IP address and how to use VPN to protect your network.</div></div><div class="text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="Read &quot;How to Setup Own VPN Server on AWS EC2? | What is VPN?&quot;" href="/blog/how-to-set-up-own-vpn-on-aws">Read more →</a></div></div></div></article></li><li class="py-12"><article><div class="space-y-2 xl:grid xl:grid-cols-4 xl:space-y-0 xl:items-baseline"><dl><dt class="sr-only">Published on</dt><dd class="text-base font-medium leading-6 text-gray-500 dark:text-gray-400"><time dateTime="2021-12-15T00:00:00.000Z">December 15, 2021</time></dd></dl><div class="space-y-5 xl:col-span-3"><div class="space-y-6"><div><h2 class="text-2xl font-bold leading-8 tracking-tight"><a class="text-gray-900 dark:text-gray-100" href="/blog/what-is-multimedia-and-components-of-multimedia">What is Multimedia? | Components Of Multimedia</a></h2><div class="flex flex-wrap"><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/computer">computer</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/it">IT</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/computer_fundamentals">computer_fundamentals</a><a class="mr-3 text-sm font-medium uppercase text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" href="/tags/multimedia">multimedia</a></div></div><div class="prose text-gray-500 max-w-none dark:text-gray-400">In this article we will discuss about what is multimedia and all types of components of multimedia. Today multimedia is used in various fields like in education, training, business etc. Also we will talk about some of the components of multimedia like video, audio, image, text, animation etc.</div></div><div class="text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="Read &quot;What is Multimedia? | Components Of Multimedia&quot;" href="/blog/what-is-multimedia-and-components-of-multimedia">Read more →</a></div></div></div></article></li></ul></div><div class="flex justify-end text-base font-medium leading-6"><a class="text-primary-500 hover:text-primary-600 dark:hover:text-primary-400" aria-label="all posts" href="/blog">All Posts →</a></div><div class="flex items-center justify-center pt-4"></div></main><footer><div class="flex flex-col items-center mt-16"><div class="flex mb-3 space-x-4"><a class="text-sm text-gray-500 transition hover:text-gray-600" target="_blank" rel="noopener noreferrer" href="mailto:[email protected]"><span class="sr-only">mail</span><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 20 20" class="fill-current text-gray-700 dark:text-gray-200 hover:text-blue-500 dark:hover:text-blue-400 h-6 w-6"><path d="M2.003 5.884L10 9.882l7.997-3.998A2 2 0 0016 4H4a2 2 0 00-1.997 1.884z"></path><path d="M18 8.118l-8 4-8-4V14a2 2 0 002 2h12a2 2 0 002-2V8.118z"></path></svg></a><a class="text-sm text-gray-500 transition hover:text-gray-600" target="_blank" rel="noopener noreferrer" href="https://github.com/hkrhasan"><span class="sr-only">github</span><svg viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg" class="fill-current text-gray-700 dark:text-gray-200 hover:text-blue-500 dark:hover:text-blue-400 h-6 w-6"><path d="M12 .297c-6.63 0-12 5.373-12 12 0 5.303 3.438 9.8 8.205 11.385.6.113.82-.258.82-.577 0-.285-.01-1.04-.015-2.04-3.338.724-4.042-1.61-4.042-1.61C4.422 18.07 3.633 17.7 3.633 17.7c-1.087-.744.084-.729.084-.729 1.205.084 1.838 1.236 1.838 1.236 1.07 1.835 2.809 1.305 3.495.998.108-.776.417-1.305.76-1.605-2.665-.3-5.466-1.332-5.466-5.93 0-1.31.465-2.38 1.235-3.22-.135-.303-.54-1.523.105-3.176 0 0 1.005-.322 3.3 1.23.96-.267 1.98-.399 3-.405 1.02.006 2.04.138 3 .405 2.28-1.552 3.285-1.23 3.285-1.23.645 1.653.24 2.873.12 3.176.765.84 1.23 1.91 1.23 3.22 0 4.61-2.805 5.625-5.475 5.92.42.36.81 1.096.81 2.22 0 1.606-.015 2.896-.015 3.286 0 .315.21.69.825.57C20.565 22.092 24 17.592 24 12.297c0-6.627-5.373-12-12-12"></path></svg></a><a class="text-sm text-gray-500 transition hover:text-gray-600" target="_blank" rel="noopener noreferrer" href="https://facebook.com/talib.hasan.7587"><span class="sr-only">facebook</span><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" class="fill-current text-gray-700 dark:text-gray-200 hover:text-blue-500 dark:hover:text-blue-400 h-6 w-6"><path d="M24 12.073c0-6.627-5.373-12-12-12s-12 5.373-12 12c0 5.99 4.388 10.954 10.125 11.854v-8.385H7.078v-3.47h3.047V9.43c0-3.007 1.792-4.669 4.533-4.669 1.312 0 2.686.235 2.686.235v2.953H15.83c-1.491 0-1.956.925-1.956 1.874v2.25h3.328l-.532 3.47h-2.796v8.385C19.612 23.027 24 18.062 24 12.073z"></path></svg></a><a class="text-sm text-gray-500 transition hover:text-gray-600" target="_blank" rel="noopener noreferrer" href="https://www.linkedin.com/in/hkrhasan"><span class="sr-only">linkedin</span><svg viewBox="0 0 24 24" xmlns="http://www.w3.org/2000/svg" class="fill-current text-gray-700 dark:text-gray-200 hover:text-blue-500 dark:hover:text-blue-400 h-6 w-6"><path d="M20.447 20.452h-3.554v-5.569c0-1.328-.027-3.037-1.852-3.037-1.853 0-2.136 1.445-2.136 2.939v5.667H9.351V9h3.414v1.561h.046c.477-.9 1.637-1.85 3.37-1.85 3.601 0 4.267 2.37 4.267 5.455v6.286zM5.337 7.433a2.062 2.062 0 01-2.063-2.065 2.064 2.064 0 112.063 2.065zm1.782 13.019H3.555V9h3.564v11.452zM22.225 0H1.771C.792 0 0 .774 0 1.729v20.542C0 23.227.792 24 1.771 24h20.451C23.2 24 24 23.227 24 22.271V1.729C24 .774 23.2 0 22.222 0h.003z"></path></svg></a><a class="text-sm text-gray-500 transition hover:text-gray-600" target="_blank" rel="noopener noreferrer" href="https://twitter.com/talibha80785319"><span class="sr-only">twitter</span><svg xmlns="http://www.w3.org/2000/svg" viewBox="0 0 24 24" class="fill-current text-gray-700 dark:text-gray-200 hover:text-blue-500 dark:hover:text-blue-400 h-6 w-6"><path d="M23.953 4.57a10 10 0 01-2.825.775 4.958 4.958 0 002.163-2.723c-.951.555-2.005.959-3.127 1.184a4.92 4.92 0 00-8.384 4.482C7.69 8.095 4.067 6.13 1.64 3.162a4.822 4.822 0 00-.666 2.475c0 1.71.87 3.213 2.188 4.096a4.904 4.904 0 01-2.228-.616v.06a4.923 4.923 0 003.946 4.827 4.996 4.996 0 01-2.212.085 4.936 4.936 0 004.604 3.417 9.867 9.867 0 01-6.102 2.105c-.39 0-.779-.023-1.17-.067a13.995 13.995 0 007.557 2.209c9.053 0 13.998-7.496 13.998-13.985 0-.21 0-.42-.015-.63A9.935 9.935 0 0024 4.59z"></path></svg></a></div><div class="flex mb-2 space-x-2 text-sm text-gray-500 dark:text-gray-400"><div>Hkr Hasan</div><div></div><div>© 2022</div><div></div><a href="/">Treasure for IT Students</a></div><div class="mb-8 text-sm text-gray-500 dark:text-gray-400"></div></div></footer></div></div></div><script src="/_next/static/chunks/react-refresh.js?ts=1641043035903"></script><script id="__NEXT_DATA__" type="application/json">{"props":{"pageProps":{"posts":[{"title":"How To Install Git On Window 10 Step by Step? | What is Git?","date":"2021-12-27T00:00:00.000Z","tags":["hacking","cyber-Security","git","windows","windows10","windows10-git"],"draft":false,"summary":"In this article we will learn how to install git on windows 10 step by step. This article is for beginners and for those who are new to git. I will explain each and every step in dept for installing git on windows 10.","slug":"how-to-install-git-on-window-10"},{"title":"Setting Up SSH and Git with Github on Window 10","date":"2021-12-27T00:00:00.000Z","tags":["hacking","cyber-Security","git","windows10-git","ssh"],"draft":false,"summary":"Hello guys, I am going to show you how to setup SSH and Git with Github on Windows 10. When we interact with a remote Git server, such as GitHub, we have to include credentials in the request. This proves we are a specific GitHub user, who’s allowed to do whatever we’re asking to...","slug":"setting-up-ssh--with-github-on-windows-10"},{"title":"What is Tmux? | How to Use Tmux?","date":"2021-12-20T00:00:00.000Z","tags":["hacking","cyber-Security","linux","tmux"],"draft":false,"summary":"Tmux is a terminal multiplexer. It allows you to run multiple programs in a single terminal window. It is a very powerful tool for managing multiple programs in a single terminal window.","slug":"what-is-tmux-and-use-of-tmux"},{"title":"How to Setup Own VPN Server on AWS EC2? | What is VPN?","date":"2021-12-17T00:00:00.000Z","tags":["hacking","cyber-Security","networking","spoofing","vpn"],"draft":false,"summary":"In this article, I will show you how to setup your own VPN server on AWS EC2. I will also show you how to spoof your IP address and how to use VPN to protect your network.","slug":"how-to-set-up-own-vpn-on-aws"},{"title":"What is Multimedia? | Components Of Multimedia","date":"2021-12-15T00:00:00.000Z","tags":["computer","IT","computer_fundamentals","multimedia"],"draft":false,"summary":"In this article we will discuss about what is multimedia and all types of components of multimedia. Today multimedia is used in various fields like in education, training, business etc. Also we will talk about some of the components of multimedia like video, audio, image, text, animation etc.","slug":"what-is-multimedia-and-components-of-multimedia"},{"title":"How to Change MAC Address On Linux | Two ways to change MAC Address in Linux","date":"2021-12-14T00:00:00.000Z","tags":["hacking","cyber-Security","networking","spoofing"],"draft":false,"summary":"In This Article I will show you how to change MAC Address in Linux using two ways. First way is to change manually MAC Address and second way is to change MAC Address using macchanger.","slug":"how-to-change-mac-address"},{"title":"What is Proxychains? | How to Install Proxychains on Linux | Proxychains with Tor Service","date":"2021-12-09T00:00:00.000Z","tags":["hacking","cyber-Security","networking","spoofing"],"draft":false,"summary":"Using a Linux-based operating system to hide your identity on the internet is quite simple, and you can do it all without paying for a VPN service like.","slug":"all-about-proxychains"},{"title":"Proxy Server | How a Proxy Server Works | Types of Proxy Server","date":"2021-12-08T00:00:00.000Z","tags":["hacking","cyber-Security","networking","spoofing"],"draft":false,"summary":"A proxy server stands betweeen your computer and the internet. In this article we will discuss what is proxy server and how a proxy server works and how can protect your data from being accessed by others.","slug":"what-is-proxy-server"},{"title":"Computer Virus | Types of Virus | History of Computer Virus","date":"2021-12-06T00:00:00.000Z","tags":["computer","IT","computer_fundamentals","virus","hacking"],"draft":false,"summary":"Computer viruses are designed to infect your programs and files, alter the way your computer operates or stop it from working altogether. Follow this article to learn more about viruses and how to protect your computer.","slug":"computer-virus-types-of-virus"},{"title":"What is Nmap? | How to Use Nmap? | Nmap Flags And Nmap Port States","date":"2021-12-01T00:00:00.000Z","tags":["hacking","cyber-Security","networking","scanning","nmap"],"draft":false,"summary":"Nmap is a powerful, and fast network mapping tool. In this article, we’ll explain how to install and use Nmap, and show you how to protect your networks.","slug":"all-about-nmap"},{"title":"What is TCP? | TCP Header | TCP 3-way Handshake","date":"2021-11-29T00:00:00.000Z","tags":["hacking","cyber-Security","networking"],"draft":false,"summary":"Learn about the Transmission Control Protocol (TCP), a data transport protocol that works on top of the Internet Protocol (IP) and includes multiple error-checking mechanisms.","slug":"all-about-tcp"},{"title":"Number Systems: Binary Number, Octal Number, Decimal Number and Hexa Decimal Number","date":"2021-11-29T00:00:00.000Z","tags":["computer","IT","computer_fundamentals"],"draft":false,"summary":"Number System is a method of representing numbers and there are 4 different types of number systems. Learn everything about the types of number systems.","slug":"number-system"},{"title":"What is Network Protocol? | Different Types Of Network Protocol","date":"2021-11-26T00:00:00.000Z","tags":["networking","hacking"],"draft":false,"summary":"Network protocols simplify communication between different digital devices and are so important to modern connection that you likely use them every day, whether or not you realize it. different types of network protocols are HTTP,FTP, DHCP, Telnet, SSH etc.","slug":"network-protocol"},{"title":"Google Hacking: Google Dorks | Advance Google Search Techniques","date":"2021-11-23T00:00:00.000Z","tags":["hacking","cyber-Security","networking"],"draft":false,"summary":"What is Google Hacking, and how can you use Advance Google Search Techniques to discover vulnerable targets","slug":"google-hacking"},{"title":"Computer Memory | Types of Memory | Computer Fundamental","date":"2021-11-12T00:00:00.000Z","tags":["computer","IT","computer_fundamentals","memory"],"draft":false,"summary":"Computer - Memory, A memory is just like a human brain. It is used to store data and instructions. Computer memory is the storage space in the computer, where data is to be proces.","slug":"computer-memory"},{"title":"3 types of language processor with their differences","date":"2021-11-07T18:30:00.000Z","tags":["computer","computer_fundamentals","IT"],"draft":false,"summary":"Language processor is a type of software that translate source code into object code.3 types of language processors are Compiler, interpreter and assembler..","slug":"language-processors-assembler-compiler-and-interpreter"},{"title":"Software | Types of Software | System Vs Applications Software","date":"2021-11-07T18:30:00.000Z","tags":["computer","computer_fundamentals","IT"],"draft":false,"summary":"Want to know how software works? Learn about types of software, what they do and how they function. Take an in-depth look at the software design and implementation processes, how to ensure software quality and the history of software.","slug":"software-and-types-of-software"},{"title":"What are the seven stages of a cyber-attack","date":"2021-11-06T18:30:00.000Z","tags":["hacking","cyber-Security"],"draft":false,"summary":"Defeat hackers by understanding the seven stages of a cyber-attack. Phase one of a hack is Find out a target for hacking. The other phases are weaponization, Delivering the attack, exploitation, installing a persistent backdoor, Exercising command and control then Achieving the hacker's objectives.","references":["https://www.dnv.com/cybersecurity/cyber-insights/recognizing-the-seven-stages-of-a-cyber-attack.html"],"slug":"recognizing-the-seven-stage-of-a-cyber-attack"},{"title":"Ethical Hacking | Types of Ethical Hacking | Types of Hacker","date":"2021-11-06T18:30:00.000Z","tags":["hacking","cyber-Security"],"draft":false,"summary":"Ethical hacking is important for every organization as it helps to check their data safe and secure. Learn ethical hacking , types of ethical hacking, and ethical hacker vs penetration testers","slug":"what-is-ethical-hacker-and-types-of-ethical-hacker"},{"title":"What is Footprinting? | Types and techniques of Footprinting | Importance of Footprinting ","date":"2021-11-06T18:30:00.000Z","tags":["hacking","cyber-Security"],"draft":false,"summary":"What footprinting means is gathering data about the target system which can be utilized to execute to hack the system.","slug":"what-is-footprinting-and-its-techniques"},{"title":"Top 5 Elements of Information Security Policy | CIA Triad","date":"2021-11-05T18:30:00.000Z","tags":["hacking","cyber-Security"],"draft":false,"summary":"Without a security policy, it is impossible to coordinate and enforce a security program. Learn what makes up a good security policy and how to make it effective.","slug":"elements-of-information-security"},{"title":"13 Hacking Terminologies Every User Should Know To Safeguard Your Online Business from Hackers","date":"2021-11-05T18:30:00.000Z","tags":["hacking","cyber-Security"],"draft":false,"summary":"Today we are going to discuss 13 basic Hacking Terminologies which may one day render useful in case of a cyber attack on your business and your personal security.","slug":"hacking-terminologies"},{"title":"Output Devices | Computer Fundamental","date":"2021-10-31T18:30:00.000Z","tags":["computer","IT","computer_fundamentals","ouput_devices"],"draft":false,"summary":"Output devices are devices that receive data or instruction from a computer. This article lists 3 examples of output devices.","slug":"output-devices"},{"title":"Excel Basic Function Every User Should Know","date":"2021-10-29T00:00:00.000Z","tags":["excel","IT","function"],"draft":false,"summary":"Excel has its immense purposeful applications. Through his post we look at the most important Advanced Excel Formulas, Functions with their application..","slug":"excel-basic-function"},{"title":"Input Devices | Computer Fundamental","date":"2021-10-27T00:00:00.000Z","tags":["computer","IT","computer_fundamentals","input_devices"],"draft":false,"summary":"Input devices for beginners and professionals with explanation of input device, output device, memory, CPU, motherboard, computer network, virus, software, hardware etc.","slug":"input-devices"},{"title":"Linux Basic Commands Every User Should Know","date":"2021-10-24T00:00:00.000Z","tags":["linux","hacking","commands","cli"],"draft":false,"summary":"In this article, we’ll go through some of the most common Linux commands that are used on a daily basis by Linux system administrators.","slug":"linux-basic-command"},{"title":"How to use the Excel IF function","date":"2021-10-22T00:00:00.000Z","tags":["excel","if","logical_function","IT"],"draft":false,"summary":"The IF function in excel is one of the most popular functions, and it allows you to make logical comparisons between a value and what you expect.","slug":"if_function_in_excel"},{"title":"Types of Computer | Computer Fundamental","date":"2021-10-22T00:00:00.000Z","tags":["IT","computer","types","computer_fundamentals","types_of_computer"],"draft":false,"summary":"Do you know how many types of computers have been invented till now? If you don't know the answer to this question, there is no need to worry. In this article, readers will be able to learn about the different types of computers.","slug":"types-of-computer"},{"title":"How to find out if Intel VT-x or AMD-V Virtualization Technology is supported in Windows 10, Windows 8, Windows Vista or Windows 7 machine","date":"2021-10-20T00:00:00.000Z","tags":["virtualbox","virtualization","os","hacking","window10"],"draft":false,"summary":"Are you interested in Virtual Machines, Virtualization, Hypervisor, whatever name you call it and not sure if your Windows box supports Intel VT-x or AMD-V? This article tell you how to find out for yourself.","slug":"how-i-check-virtulization-support-or-not"},{"title":"How To Install Python On Window 10","date":"2021-10-20T00:00:00.000Z","tags":["python","installation","python_programming"],"draft":false,"summary":"In this section, you’ll learn how to check which version of Python, if any, is installed on your Windows computer. You’ll also learn which of the three installation methods you should use.","slug":"how-to-install-python"},{"title":"How to install kali linux on VirtualBox?","date":"2021-10-20T00:00:00.000Z","tags":["kali","linux","hacking","installation","os"],"draft":false,"summary":"Today I am going to share with you “How to install Kali Linux on VirtualBox”. Kali Linux on VirtualBox is the best option to set up a lab at home and practice as more as you can of Ethical hacking.","slug":"install-kali-linux"},{"title":"How to install VirtualBox on window 10","date":"2021-10-20T00:00:00.000Z","tags":["virtualbox","virtualization","os","hacking"],"draft":false,"summary":"In this article, you will learn how to install virtualbox on window 10 step by step.","slug":"install-virtual-box"},{"title":"LINUX vs UNIX | Difference between Linux kernel and UNIX kernel","date":"2021-10-18T00:00:00.000Z","tags":["linux","unix","operating_system","hacking","linux_history"],"draft":false,"summary":"Today Linux is in great demand. You can see the use of Linux everywhere. It's dominating on our servers, desktop, smartphones and even used in some electrical devices like refrigerators.","slug":"difference-between-linux-and-unix"},{"title":"Operating System | Types Of OS | History of OS | Computer Fundamental","date":"2021-10-18T00:00:00.000Z","tags":["os","operating_system","IT","window","linux","unix","hacking","os_history","computer","computer_fundamentals"],"draft":false,"summary":"An Operating System can be defined as an interface between user and hardware. It is responsible for the execution of all the processes, Resource Allocation, CPU management, File Management and many other tasks.","slug":"what-is-os-and-history-of-os-types-of-os"},{"title":"What is Linux \u0026 Unix, GNU?","date":"2021-10-17T00:00:00.000Z","tags":["linux","unix","operating_system","hacking","linux_history"],"draft":false,"summary":"Linux is an open source operating system (OS). An operating system is the software that directly manages a system’s hardware and resources, like CPU, memory, and storage. The OS sits between applications and hardware and makes the connections between all of your software and the physical resources that do the work.","slug":"what-is-linux-and-gnu-operating-system"},{"title":"File Upload with Progress Bar HTML CSS \u0026 JavaScript \u0026 Php","date":"2021-10-16T00:00:00.000Z","tags":["html_css_js_php","html","css","javascript","php","file_upload"],"draft":false,"summary":"In this article you will learn the file uploading with progress bar using html css and javascript and php as you can see in the preview image.","slug":"file-uploader-html-css-js-php"},{"title":"Networking Devices (NIC, Repeater, Hub, Bridge, Switch, Router)","date":"2021-10-15T00:00:00.000Z","tags":["networking_device","networking","router","switch","hub","bridge","repeater","nic"],"draft":false,"summary":"To build a strong network and defend it, you need to understand the devices that comprise it.","slug":"networking-devices"},{"title":"What is VLAN? Types, Advantages, Example","date":"2021-10-15T00:00:00.000Z","tags":["VLAN","subneting","switch","networking"],"draft":false,"summary":"VLAN is a custom network which is created from one or more local area networks. It enables a group of devices available in multiple networks to be combined into one logical network.","slug":"what-is-vlan-types-advantage-example"},{"title":"What is Computer? | Evolution \u0026 Generation of Computer | Computer Fundamental","date":"2021-10-13T00:00:00.000Z","tags":["computer","computer_generation","computer_history","block_daigram","computer_fundamentals","IT"],"draft":false,"summary":"A computer is a programmable electronic device that accepts raw data as input and processes it with a set of instructions (a program) to produce the result as output. It renders output just after performing mathematical and logical operations and can save the output for future use. It can process numerical as well as non-numerical calculations.","slug":"what-is-computer-and-evolution-of-computer"},{"title":"How to Connect Mysql Database with PHP","date":"2021-10-11T00:00:00.000Z","tags":["php","mysql","php_with_mysql","mysql_connection_php","pdo","pdo_mysql","mysqli"],"draft":false,"summary":"In this article I will discuss how to connect MySQL Database on different servers with PHP and also give an overview of connecting Database using PDO(PHP Data Objects).","slug":"how-to-connect-mysql-database-with-php"},{"title":"How to install XAMPP on Windows 10","date":"2021-10-11T00:00:00.000Z","tags":["xampp","installation","xampp_installation","php","mysql","localhost"],"draft":false,"summary":"In this article you will learn the steps to install XAMPP on Windows 10. as well as the instructions to configure the web environment and fix common issues","slug":"how-to-install-xampp-server-step-by-step"},{"title":"How to send email in PHP?","date":"2021-10-07T00:00:00.000Z","tags":["php","send_email","send_email_xampp"],"draft":false,"summary":"Send Email In Php on xampp sever and live server using gmail.","slug":"email-send-in-php"}],"tags":{"hacking":24,"cyber-security":15,"git":2,"windows":1,"windows10":1,"windows10-git":2,"ssh":1,"linux":6,"tmux":1,"networking":10,"spoofing":4,"vpn":1,"computer":11,"it":13,"computer_fundamentals":11,"multimedia":1,"virus":1,"scanning":1,"nmap":1,"memory":1,"ouput_devices":1,"excel":2,"function":1,"input_devices":1,"commands":1,"cli":1,"if":1,"logical_function":1,"types":1,"types_of_computer":1,"virtualbox":2,"virtualization":2,"os":4,"window10":1,"python":1,"installation":3,"python_programming":1,"kali":1,"unix":3,"operating_system":3,"linux_history":2,"window":1,"os_history":1,"html_css_js_php":1,"html":1,"css":1,"javascript":1,"php":4,"file_upload":1,"networking_device":1,"router":1,"switch":2,"hub":1,"bridge":1,"repeater":1,"nic":1,"vlan":1,"subneting":1,"computer_generation":1,"computer_history":1,"block_daigram":1,"mysql":2,"php_with_mysql":1,"mysql_connection_php":1,"pdo":1,"pdo_mysql":1,"mysqli":1,"xampp":1,"xampp_installation":1,"localhost":1,"send_email":1,"send_email_xampp":1}},"__N_SSG":true},"page":"/","query":{},"buildId":"development","isFallback":false,"gsp":true,"scriptLoader":[]}</script></body></html>
1