Courses
Tutorials
Jobs
Practice
Contests
Data Structure
Java
Python
HTML
Interview Preparation
Trending Now
DSA
Web Tech
Foundational Courses
Data Science
Practice Problem
Python
Machine Learning
JavaScript
System Design
Django
DevOps Tutorial
Java
C
C++
ReactJS
NodeJS
CP Live
Aptitude
Puzzles
Projects
GBlog
Complete DevOps Roadmap - Beginner to Advanced
DevOps is considered a set of practices that combines the abilities of Software Development i.e Dev and IT Operations i.e Ops together, which results in delivering top-not...
Read More
What is Cookie Hijacking?
Cookie Hijacking is a method by which webmasters break into other websites to steal cookies. This allows them to watch the victim's browsing activity, log their keystrokes...
Read More
Picked
Ethical Hacking
Ethical Hacking - System Hacking
Moment.js Round Plugin
The Round plugin is amoment.js plugin thatwill round the date and time to the specified range.Write the below command in the terminal to install Round Plugin:npm install m...
Read More
Web Technologies
Picked
Node.js
Moment.js
Moment.js-Plugins
What is Ethereum Virtual Machine and How it Works?
The article focuses to discuss Ethereum Virtual Machine and how it works. The following topics will be discussed here:Introduction To Ethereum Virtual Machine (EVM)?Purpos...
Read More
Picked
Blockchain
Ethereum
Cytoplasm - Structure and Function
Cytoplasm is a semi-fluid, gel-like substance found in all living cells, both prokaryotic and eukaryotic. It surrounds the cell's organelles and nucleus. It acts as the me...
Read More
Picked
School Learning
Class 9
School Biology
Periodic Formulas with Examples
A period is defined as the time interval between two points in time, and a periodic function is defined as a function that repeats itself at regular intervals or periods i...
Read More
Picked
Mathematics
School Learning
Maths-Formulas
What is Log Tampering?
Log tampering is a method by which hackers can maintain access and cover tracks on any kind of system of an organization. Hackers can use this method to make the security ...
Read More
Picked
Ethical Hacking
WEP Crack Method in Wireless Networks
This article is about Wireless Encryption Protocol or commonly known as WEP. This protocol is one of the two most popular protocols used by wireless networks to send data ...
Read More
Picked
Ethical Hacking
Ethical Hacking - Enumeration
What are the three components of a map?
Distance, direction, and symbols are important components of a map. A map refers to a diagrammatic representation of a very large area and it represents three-dimensional ...
Read More
Picked
School Learning
School Geography
Geography-MAQ
Social Science
Explain why "Efficient means of transport is essential for fast development"
The movement of goods and people from one place to another, and the various means of carrying out such movement. The growth in the ability - and need - to transport large ...
Read More
Picked
School Learning
School Geography
Geography-MAQ
Social Science
Advantages and Disadvantages of Google Chrome
Firefox and Chrome are the two popular web browsers in the world. Firefox is senior to chrome by six years. Now, If we compare them both Chrome and Firefox are excellent w...
Read More
TechTips
How to Get the Device's IMEI and ESN Programmatically in Android?
Many times while building Android Applications we require a unique identifier to identify the specific mobile users. For identifying that user we use a unique address or i...
Read More
Java
Picked
Kotlin
Android
Sin Cos Formulas in Trigonometry with Examples
Trigonometry, as its name implies, is the study of triangles. It is an important branch of mathematics that studies the relationship between side lengths and angles of the...
Read More
Picked
Mathematics
School Learning
Maths-Formulas
React Suite <Dropdown> Props
React Suite is a front-end library designed for the middle platform and back-end products. The React Suite Dropdown provides navigation that uses a select picker in order ...
Read More
Web Technologies
Picked
ReactJS
React-Suite Components
React-Suite Navigation
React-Suite
Software Testing - Boundary Value Analysis vs Equivalence Partitioning
Software Testing is a process of finding bugs and verifying whether the developed software meets its end-user requirements or not. To do testing, testers write test cases ...
Read More
Picked
Software Testing
Creating an Encrypted Persistent Live Kali USB
The term “Live USB Persistence” refers to the fact that the files and data that we create in USB as a result of our work there, they are stored on the USB drive rather tha...
Read More
Linux-Unix
Picked
Kali-Linux
How To
1
...
3591
3592
3593
...
10993