Posts

Showing posts from December, 2022

Python Pattern Programs

Python Pattern Programs Pattern-1: To print a given number of *s in a row    test.py 1) n=int(input('Enter n value:'))    2) for i in range(n):      3)     print('*',end=' ') Output: Enter n value:5 * * * * *   Pattern-2: To print a square pattern with * symbols   test.py 1) n=int(input('Enter No Of Rows:'))   2) for i in range(n):  3)   print('* '*n)     Output: Enter No Of Rows:5 * * * * * * * * * * * * * * * * * * * * * * * * *    Pattern-3: To print a square pattern with provided fixed digit in every row   test.py 1) n=int(input('Enter No Of Rows:'))   2) for i in range(n):   3)     print((str(i+1)+' ')*n)   Output: Enter No Of Rows:5 1 1 1 1 1 2 2 2 2 2 3 3 3 3 3 4 4 4 4 4 5 5 5 5 5   Pattern-4: To print a square pattern with alphabet symbols   test.py ...

about Ethical hacking

  Introduction The term "hacker" has become synonymous with computer criminals, but there is another type of hacker out there who uses their skills for good instead of evil. These are ethical Hacking, and they play a vital role in keeping our online world safe. If you're interested in becoming an ethical hacker, there are a few steps you need to take. First, you'll need to get a solid foundation in computer science and information systems. Then, you'll need to hone your hacking skills. Once you've done that, you can join an ethical hacking community and get certified. By following these steps, you can become an important part of the fight against cybercrime. Ethical Hacking Course in Delhi In the event that, you are a graduate, undergraduate, or perhaps postgraduate, you are qualified for this Ethical Hacking Course in Delhi. Network protection is an expert course, which assists you with filling in the long run. In the event that, you have t...

Ports and Protocols- Ethical Hacking Course

  Ports and Protocols These should be memorized, even be ready to convert them to hex system} representation just in case they have to be known in a very packet dump, long file, IDS rule, or somebody capture/display filter.  Protocols  1                            ICMP 6                            TCP 17                           UDP 47                            GRE 50                             AH 51                            ESP Ports 20-21                       ...

Python as an Object Oriented Programming

  Python as an Object-oriented programming As we know that Python programming language supports different programming approaches. Object Oriented Programming is one of them (OOP), which means to solve the programming problem by creating objects that are called object-oriented programming.   Object Oriented Programming has two characteristics Behavior Attribute Let’s understand this with an example  name, age, etc. as attributes  singing, etc., as behavior object-oriented programming in Python programming focused on creating reusable code and that concept is also called DRY (don’t repeat yourself). What are the main concepts of Python OOP (object-oriented program) There are many types of OOP concepts but we’ll discuss the main OOP concepts i.e., objects Data Abstraction Encapsulation class  Inheritance Polymorphism  Object  Object Programming has associated with state and behavior. It might be any real-world ...

Why Join Web Designing Course

  What is Web Designing? Web designing is the skill to design content to tell about your business that is displayed on the internet. Before the 2010s web designing skill is used only to design a web for desktop browsers. After the 2010s mid the web designing skill is upgraded now it is not only for desktop browsers, it is also for phones, and tablets. What does a web designer do? A web designer work on the layout, the appearance of the website, and in some cases the content of a website. A layout is the arrangement of all visual elements on a webpage, and it is referred how the information is structured and categorized. Appearance is, for instance, images used, related to colors, and font used, in the website. A good web design is easy to use for the user group and brand of the Website. Many websites are designed simply so that no extrinsic information and performance that might disturb and daze the user appears. A website de...

Web Designing | What is Web Designing

  A web designing is referring to designing a website that is displayed on the internet. It refers to the experience of the users’ aspects of website development. Web designing helps you to design a user-friendly website. It is an identified goal of the website or a web page and promotes accessibility for all users. Web designing involves organized content and images on website pages, integrating applications and many other interactive elements. The elements for designing the web are allows designers to adjust any preferences and provide solutions for that. There are many elements used for web designing: Layout Images Virtual effects/ Virtual Hierarchy  Typography Color theme Navigation Readability Content Mobile friendly   Layout-: is how the material is displayed on the web page. By choosing the correct layout is an important task for the designers. The website layout should be simple, attractive, accessible, etc. web designers make sure that the l...

Data Science-Blog on Data Science Course

  What is Data Science? It is the study of data to extract important insights for the business. Also, it is the field of study that programming skills, and knowledge of maths and statistics to extract insights into the data. In data science , you can use the data for analysis that come from different sources or are presented in different formats.   Why Data Science is Important? Data Science is Important because it combines the tools, technologies, and methods to generate the data. Nowadays many modern organizations overwhelm with data like we have video, text, image, and audio data. Data Science is used for? It is used to study the data in 4 parts i.e., 1. Descriptive analysis 2. Diagnostic analysis 3. Predictive analysis 4. Prescriptive analysis Some benefits of data sci for business Data Science is the way for companies to operate because many businesses need robust strategies of data science to drive growth and maintain competitive goals like: 1. Dis...

Introduction of Cyber Security

  Introduction The term cyber security means the practice of defending computers, mobile devices, networks, servers, etc. Cyber Security is also known as information of technology security. This term applies in a variety of contexts, from mobiles, and computers, and also it can be divided into some common categories.   Types of Cyber Security Network Security – it’s the practice of securing your computer network from intruders, whether it's targeted attackers or any opportunistic malware. Application security – usually focuses on keeping software and devices free from threats. Successful security begins in the stage of design as well as before the deployment of a program or device. Information Security – that protects the integrity and privacy of your data in storage or in transit. Operational Security – It  includes the process and decision for handling and protecting the data assets. It helps you to know where your data is stored under the umbrella. D...

What is Digital Marketing

INTRODUCTION If you want to be successful in digital marketing, there are a few things you need to know. This users guide will teach you everything from the basics of online advertising to the most effective ways to market your business online. You’ll also find out how to create and track a successful digital marketing campaign, and how to measure its effectiveness. Whether you’re just starting out or have been doing digital marketing for years, this guide is for you.   What is Digital Marketing         A digital marketing strategy is a plan that helps businesses operate and communicate through the use of digital channels. Digital marketing includes all aspects of online advertising, such as website design, content, search engine optimization (SEO), social media marketing, and email marketing. There are three main types of Digital Marketing: Paid search Organic search Viral Marketing   Paid Search - it refers ...

Domain Name Service - Ethical Hacking Course

  DNS is essential within the footprinting of a target network.It will generally save the aggressor a great deal of your time, or a minimum of corroborate different info that has been gathered. DNS is additionally a target for many forms of attack. Field within the SOA record: (time in seconds) 1882919 7200 3600 14400 2400 serial refresh hear end TTL Requesting a zone transfer nslookup: Is- d example.com dig@ns1.example.com AXFR host-t AXFR example.com ns1.example.com Using Whols Whols example.com Reginal net Registrars ARIN (North America) APNIC (Asia Pacific Region) LACNIC (Southern and Central America and Caribbean) RIPE NCC (Europe, the center East and Central Caribbean) AfriNIC (Africa) Attacks against DNS Server Zone transfers:- military operation road Zone Poisoning:- send false answers to cache servers till they store them Reflection Dos:- send phony requests into a series of servers that do algorithmic queries. Google Hacking An aggressor ca...

Ethical Hacking CEH Conditions and Methodologies

  There are entry-level security categories, however, security isn't AN entry-level subject. so as to be comfy with the CEH  coaching, prerequisites are assumed, and check things can involve topics that point won't allow covering throughout the live coaching. before coaching, try and refresh your skills in the following areas. The longer spent on this step the easier the coaching expertise are going to be. Know the fundamentals of data security • Concepts like “CIA (Confidentiality, Integrity, Availability) • Coverage would have return throughout Comp ischemia or CISSP coaching   Know the fundamentals of networking • Physical layer, cabling, hardware devices • The functions of switches, routers, firewalls • IP Addressing , subnett...