Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
Web Design
Web Browser
CP Live
Aptitude
Puzzles
Projects
GBlog
Complete DevOps Roadmap - Beginner to Advanced
DevOps is considered a set of practices that combines the abilities of Software Development i.e Dev and IT Operations i.e Ops together, which results in delivering top-not...
Read More
How To Install Adobe Acrobat Reader on Ubuntu
The standard file format for sharing files among businesses and people in PDF. The likelihood that a document downloaded from the internet will be in PDF format is very hi...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
How to Install Scribus on Ubuntu
An open-source, cross-platform desktop publishing tool is called Scribus. Brochures, newspapers, magazines, posters, novels, and even newsletters may all be designed and p...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
How to install and use xpad on Ubuntu
Being the most popular Linux distribution, Ubuntu offers extensive support for a variety of apps. The Ubuntu application Xpad is about sticky notes and is accessible throu...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
How to Install Webmin in Ubuntu
Administrators can administer Linux and Unix servers and systems using the web-based utility Webmin. You may manage user accounts, update and configure your system, monito...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
How to install Gnome Weather on Ubuntu
Since it's well-designed and integrated with Ubuntu Gnome Desktop, the Gnome Weather app should always be your first choice. The prediction is integrated into the Clock (d...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
How to install Marble on Ubuntu
Marble is a virtual globe program that lets you pick between the Earth, Moon, Venus, Mars, and other planets to show as a 3-D model. KDE created it as free software under ...
Read More
Linux-Unix
How To
Installation Guide
how-to-install
fuser command in Linux
fuser is a command line utility in Linux. fuser can identify the process using the files or sockets. This command can be also used to kill the process. In this article, we...
Read More
linux-command
Linux-Unix
Linux-misc-commands
Economic Problem & Its Causes
We all know that human wants are unlimited, but the means to satisfy these wants are limited. Therefore, all the wants cannot be fulfilled. An economic problem means the p...
Read More
Picked
Class 11
Microeconomics
Commerce
What is HTTP2 in Wireshark?
HTTP1 and HTTP2 are separate versions of web standards, which implies that the former is the original and the latter is a newer version. While there are only a few major c...
Read More
Picked
Ethical Hacking
Wireshark TCP-UDP-HTTP-Streams
Capillary Action
Capillary Action in Physics is the action of the liquid in the capillary tubes. Capillary tubes, which are narrow cylindrical tubes, have very small diameters. It is obser...
Read More
School Learning
Class 11
School Physics
Physics-Formulas
Physics-Class-11
Firewall as a Service (FWaaS)
Prerequisite: Introduction of Firewall in Computer NetworkA firewall in a computer network functions as a barrier that prevents illegal entry to your computer's connection...
Read More
Computer Networks
CCNA Infrastructure Security
What is RPC Enumeration?
RPC is a remote procedure call (or a function call that carries out tasks on a different computer). RPC enumeration is the process of discovering what services are running...
Read More
Picked
Ethical Hacking
Ethical Hacking - Enumeration
What is Whois Footprinting?
Whois Footprinting is an ethical hacking practice that collects data about targets and their condition. This is the pre-attack phase and the activities performed will be s...
Read More
Picked
Ethical Hacking
Ethical Hacking - Footprinting
What are Bandwidth Attacks?
Bandwidth attacks in ethical hacking target a network's bandwidth, and by extension, its available computing resources. A hacker can overload a network by sending a high n...
Read More
Picked
Ethical Hacking
Ethical Hacking - Network Attacks
USB Drop Attack in System Hacking
The USB drop attack is a client-side attack in system hacking. This means that an attacker must be physically near the victim and plug a malicious USB device into the vict...
Read More
Picked
Ethical Hacking
Ethical Hacking - System Hacking
1
...
3523
3524
3525
...
10982