How to create simple job contact form using html

Job Contact Form:

<html>
<body bgcolor="87ceeb"><center><h1>FB.com/bookfaceimpact</h1>

<h2>Jobs In Hyderabad</h2>
<p>Enter your details </p>

<p><strong>Name:</strong>
<input name="t1" type="text" size="20"><br></p>
<p><strong>gender:</strong>
Male<input name="t" type="radio" value="Male">
Female<input name="t" type="radio" value="Female">
others<input name="t" type="radio" value="others"><br>
</p>
<select>
<option value="1">india
<option value="2">Pakistan</select>
<p><strong>Marital status:</strong><br>
single<input name="t" type="checkbox" value="single"><br>
married<input name="t" type="checkbox" value="married"><br>
bachelor<input name="t" type="checkbox" value="bachelor">
</p>
<p><strong>Year Of Pass:</strong>
<input name="t1" type="text" size="20"><br></p>
<input type="submit" value="submit">
</body>
</html>

O/P:


<P>

This tag organize the text into paragraphs.<p>
Tag always starts a new paragraph and makes the browser skip some additional vertical space to start a new paragraph. Much like pressing the enter key a second time .the text and images between the <p>…</p> tags can be aligned to either right, left (default or center of the window depending on the option we select.

<p>Enter your details is given form below</p>

<br>

The <br> Tag is used to insert a line break into a page  By moving to the next line of the text. This tag is an empty element and it does not take any content. This does not have a closing tag. This tag has some attributes, the most useful is CLEAR.CLEAR attribute indicates how the text should “flow “ around the image.

With <br>

<p><strong>Marital status:</strong><br>
single<input name="t" type="checkbox" value="single"><br>


Without<br>

<p><strong>Marital status:</strong>
single<input name="t" type="checkbox" value="single">


<center>

The text is centered widthwise in the browser

The  Radio Element

The option contains a circle symbol, this circle marks the text that we give, allowing it to only select one for the user
Syntax

<input  name="t"  type="radio"  value="Gender">

The Checkbox Element

The option contains a square sign, this mark is displayed before the text we give, which allows the user to select only one

<input name="t"  type="checkbox"  value="Gender">

<Select>

Select option contains drop down menu ,in this section we can select anyone what we want
<select>
<option value="OOFFF">Gender1
<option value="FFFOO">Gender2</select>

Submit Element

This option contains button type if we are successfully enter all information then this option will be used to send that information
<input type="submit" value="submit">

Unbelievable Facts About Data Communication.

Data Communication:



 Since the purpose of Computers, data communications and networks is to process data into information. Data are stored inside a computer and transmitted on a communications system in the form of binary digits, or bits. The digits are either 1's or O's and are coded in
accordance with the binary (base 2) number system.
The binary bits inside a computer are represented by the level of a polarity of electrical signals. A high-level signal within a storage element in the computer could represent a 1; low-Level signal a 0. These elements are strung together to form numbers and characters, such as the number 6 or the letter A, in accordance with established codes.
Data are transmitted along the communications path (often the telephone network) between computer-oriented devices using electrical signals and bit sequence to represent numbers and characters. In some instances, the data representation may be by light signals, as in optic fibers. The bit representations depict user data and control data. The control data are used to manage the communications network and the flow of the user data.
depicts how the data move from a sending computing device, through the communications medium, and into a receiving computer device. The order should be aware that the binary data code is converted to base 10 for human consumption when it is displayed on terminals and printouts.
The term bps refer to the number of binary bits per second that are transferred through a communication path or component. If a 2,400 bit/s line uses an 8-bit code to represent a number of character, then the character per second rate is 300 (2,400/8 =300). The majority of communications speeds are quoted in bit/s rates.
It should be emphasized that a bit traveling down a communications path, as in is actually a representation of the electrical/electromagnetic or optical state of the line for a certain period of time. The bit 1 may be depicted by placing a negative voltage on the line for a few fractions of a second arid a 0 could be represented by a low-level signal positive voltage for the same period of time.


Transmission Characteristics  A general knowledge of the characteristics of electrical transmission is essential if the reader is to gain an understanding of data communIcations, Line capacity error Control techniques, communications software, and many other network components are all analyzed and designed around the capabilities and limitations of electricity.the data are transmitted on a communications channel by the alteration of an electrical signal to represent 1's and O's. The electrical signal state manifests itself by either the signal level or some other property of the complex electrical signal. The movement of the signal over its transmission path is referred to as signal propagator. On a wire path, signal propagation is a flow of electrical current. Radio transmission between computer sites without the use of wires is accomplished by emitting an electrical signal that propagates as an electromagnetic wave.
 The term baud is another commonly used in data communications. This term describes the rate of change of the signal on the line, that is, how many times (per second) the signal changes its pattern. As a simple example, the sending device assembles the bits into groups of two and then modifies the oscillating waveform (that is. changes the signal state) to one of four amplitudes to represent any combination of 2 bits (00, 01, 10, II). In this example, the bit transfer rate across the Communications path is twice the baud(or rate of signal change). Most modems today use up to 8 bits per baud to achieve greater signal transfer capacity.
The process is called modulation. This term means that the data stream changes or modulates the signal on the communications path (channel or link).
The signal is also distinguished by its frequency or number of complete oscillations of the waveform in a given time. Frequency is measured in oscillation per second. The electrical industry has defined the unit of I hertz (Hz) to mean one Oscillation per second.
The other term used to describe frequency is cycles per second( ) frequency of the wave has no relation to the amplitude. Signals can have many different combinations of the two. The amplitude indicates the signal level and the amount of negative or positive voltage, while the frequency indicates the rate (in Hertz) of the signal oscillation. The phase of the signal describes the point to which the signal has advanced In its cycle. the phases of the signal are identified as the beginning of the cycle. 1/4 of the cycle,1/2 of the cycle,3/4 of the cycle, and the completion of the cycle. The wave can also be labeled with degree markings like that of a sine wave or a 36O circle. The sine wave is so named because the wave varies in the same manner as the trigonometric sine function. The sine wave is derived from circular motion. The amplitude of the wave increases to a maximum at 90degrees, in the same manner, that the sine of an angle of rotation increases to a maximum of 90°. Since a complete cycle represents a 360° rotation around the circle. 1/4 of a cycle point represents a phase value of 90 degrees.
 The wave depicts the signal at its maximum strength at two points in the cycle. One-half of the cycle is represented by a positive voltage and the other one-half by a negative voltage. The changing voltage state results in electrical charges changing their direction of flow down the wire circuit. The voltage continuously varies its amplitude and periodically reverses its polarity. The nature of the charge is the only difference. The strength, either positive or negative. is the same at the two peaks in the cycle.
Transmission capacity, speed, and delay :
The transmission capacity, stated in bits per second (bit/s), of a communications system, is quite important because response time and throughput for the user applications running on a computer depend on the capacity of the system. For example, a 4,800-bit/s line will provide twice the capacity of a 2,400-bit/s line and result in increased throughput and better response time.
The telephone network is designed to carry voice, which is a low-bandwidth signal. Adequate voice fidelity requires a frequency spectrum of about 3 kHz. The frequency spectrum for voice-grade circuits does not allow for a high rate of bits per second to be transmitted.
The limiting factors on transmission capacity are the bandwidth, signal power, and noise on the conductor. An increased signal power can indeed increase the line capacity and also provide for greater distance for the propagation of the signal. However, excessive power may destroy components in the system and/or may not be economically feasible.
The noise on a line is a problem that is inherent to the line itself and cannot be eliminated. Noise (called thermal, Gaussian, white, or background noise) results from the constant, random movement of electrons on the conductor and provides a limit to the channel capacity. The hiss you hear on a telephone line is such a noise. Any electrical conductor is a source of a noise. The power of the noise is proportional to the bandwidth, so in lncre*aod b.ndwIdtb will also contain additional noise. An electronic technique known— filtering Is used to reduce the added noise



 Since the purpose of Computers, data communications and networks is to process data into information. Data are stored inside a computer and transmitted on a communications system in the form of binary digits, or bits. The digits are either 1's or O's and are coded in
accordance with the binary (base 2) number system.
The binary bits inside a computer are represented by the level of a polarity of electrical signals. A high-level signal within a storage element in the computer could represent a 1; low level signal a 0. These elements are strung together to form numbers and characters, such as the number 6 or the letter A, in accordance with established codes.
Data are transmitted along the communications path (often the telephone network) between computer-oriented devices using electrical signals and bit sequence to represent numbers and characters. In some instances, the data representation may be by light signals, as in optic fibers. The bit representations depict user data and control data. The control data are used to manage the communications network and the flow of the user data.
depicts how the data move from a sending computing device, through the communications medium, and into a receiving computer device. The order should be aware that the binary data code is converted to base 10 for human consumption when it is displayed on terminals and printouts.
The term bps refer to the number of binary bits per second that are transferred through a communication path or component. If a 2,400 bit/s line uses an 8-bit code to represent a number of character, then the character per second rate is 300 (2,400/8 =300). The majority of communications speeds are quoted in bit/s rates.
It should be emphasized that a bit traveling down a communications path, as in is actually a representation of the electrical/electromagnetic or optical state of the line for a certain period of time. The bit 1 may be depicted by placing a negative voltage on the line for a few fractions of a second arid a 0 could be represented by a low-level signal positive voltage for the same period of time.


Transmission Characteristics  A general knowledge of the characteristics of electrical transmission is essential if the reader is to gain an understanding of data communIcations, Line capacity error Control techniques, communications software, and many other network components are all analyzed and designed around the capabilities and limitations of electricity.the data are transmitted on a communications channel by the alteration of an electrical signal to represent 1's and O's. The electrical signal state manifests itself by either the signal level or some other property of the complex electrical signal. The movement of the signal over its transmission path is referred to as signal propagator. On a wire path, signal propagation is a flow of electrical current. Radio transmission between computer sites without the use of wires is accomplished by emitting an electrical signal that propagates as an electromagnetic wave.
 The term baud is another commonly used in data communications. This term describes the rate of change of the signal on the line, that is, how many times (per second) the signal changes its pattern. As a simple example, the sending device assembles the bits into groups of two and then modifies the oscillating waveform (that is. changes the signal state) to one of four amplitudes to represent any combination of 2 bits (00, 01, 10, II). In this example, the bit transfer rate across the Communications path is twice the baud(or rate of signal change). Most modems today use up to 8 bits per baud to achieve greater signal transfer capacity.
The process is called modulation. This term means that the data stream changes or modulates the signal on the communications path (channel or link).
The signal is also distinguished by its frequency or number of complete oscillations of the waveform in a given time. Frequency is measured in oscillation per second. The electrical industry has defined the unit of I hertz (Hz) to mean one Oscillation per second.
The other term used to describe frequency is cycles per second( ) frequency of the wave has no relation to the amplitude. Signals can have many different combinations of the two. The amplitude indicates the signal level and the amount of negative or positive voltage, while the frequency indicates the rate (in Hertz) of the signal oscillation. The phase of the signal describes the point to which the signal has advanced In its cycle. the phases of the signal are identified as the beginning of the cycle. 1/4 of the cycle,1/2 of the cycle,3/4 of the cycle, and the completion of the cycle. The wave can also be labeled with degree markings like that of a sine wave or a 36O circle. The sine wave is so named because the wave varies in the same manner as the trigonometric sine function. The sine wave is derived from circular motion. The amplitude of the wave increases to a maximum at 90degrees, in the same manner, that the sine of an angle of rotation increases to a maximum of 90°. Since a complete cycle represents a 360° rotation around the circle. 1/4 of a cycle point represents a phase value of 90 degrees.
 The wave depicts the signal at its maximum strength at two points in the cycle. One-half of the cycle is represented by a positive voltage and the other one-half by a negative voltage. The changing voltage state results in electrical charges changing their direction of flow down the wire circuit. The voltage continuously varies its amplitude and periodically reverses its polarity. The nature of the charge is the only difference. The strength, either positive or negative. is the same at the two peaks in the cycle.
Transmission capacity, speed, and delay :
The transmission capacity, stated in bits per second (bit/s), of a communications system, is quite important because response time and throughput for the user applications running on a computer depend on the capacity of the system. For example, a 4,800-bit/s line will provide twice the capacity of a 2,400-bit/s line and result in increased throughput and better response time.
The telephone network is designed to carry voice, which is a low-bandwidth signal. Adequate voice fidelity requires a frequency spectrum of about 3 kHz. The frequency spectrum for voice-grade circuits does not allow for a high rate of bits per second to be transmitted.
The limiting factors on transmission capacity are the bandwidth, signal power, and noise on the conductor. An increased signal power can indeed increase the line capacity and also provide for greater distance for the propagation of the signal. However, excessive power may destroy components in the system and/or may not be economically feasible.
The noise on a line is a problem that is inherent to the line itself and cannot be eliminated. Noise (called thermal, Gaussian, white, or background noise) results from the constant, random movement of electrons on the conductor and provides a limit to the channel capacity. The hiss you hear on a telephone line is such a noise. Any electrical conductor is a source of a noise. The power of the noise is proportional to the bandwidth, so in lncre*aod b.ndwIdtb will also contain additional noise. An electronic technique known— filtering Is used to reduce the added noise



.

JavaScript DialogBoxes

Dialog Boxes:

 

These dialog boxes appear, as Separate window and their content depends on the information provided by the user. This content is independent of the text in the HTML page containing the javascript script and does not affect the content of the page in any Way.

Three types of dialog boxes provided by javascript are: 

1. Alert dialog box
2. prompt dialog box
3. Confirm dialog box. 

1.The Alert Dialog Box :

  1. This is the simplest of all and is used to display a small amount of text to the user. the javascript alert( ) method takes a string as an argument and displays an alert dialog box in the browser window when invoked by JavaScript code.
  2. The alert dialog box displays the string passed to the alert( ) method as a message, as well as an OK button. The JavaScript and the HTML program, in which this code snippet is held, will not continue processing until the 0k button is clicked(that is until dismissed).
  3. The alert dialog box can be used to display a cautionary message or display some information.
  4. A message is displayed to the user when incorrect information is keyed in a form like an invalid password.An invalid result is the Output of a calculation.
  5. A warning that a service is not available on a given date/time.

Syntax

alert(”message”):
as in:
alert("ClIck OK to continue”) 

Example

To display the user the sum of two numbers.

FIle Name : AlertDemo.html 

<HTML>
<BODY>
<SCRIPT>
var x= 10;
var y =20.50;
alert("Sum is" +(x + y));
document.writeln(x + y);  //this statement is not printed uztil alert dialogbox dismissed
</SCRIPT>
</BODY>
</HTML>

2. Prompt Dialog Box :

  1. As seen in the previous program, the alert dialog box simply displays information in a browser and does not allow any interaction with the user. 
  2. With prompt dialog box user can enter some data that can be read into a program(like scanf function).
  3. The prompt dialog box displays a specified message. In addition, the prompt dialog box also provides a single data entry text box in which the user can enter some data.  

The prompt dialog box displays the following.

  1. Displays a predefined Message.
  2. Displays a text box for user input.
  3. Displays an OK & Cancel push buttons.
  4. The prompt dialog bo also causes program execution to halt until user action takes place(modal dialog box).
  5. This could be the OK button being clicked, or the CANCEL button is clicked, which causes the following action to take place.
  6. Clicking on the OK button causes the text typed inside the textbox to be passed to the program environment (i.e JavaScrip).
  7. Clicking on the CANCEL button causes a NULL value to be passed to the environment. When the prompt( ) method is used a instantiate and use a dialog box the method requires two blocks of information.
  8. A message to be displayed as a prompt to the User.
  9. Any message to be displayed in the textbox. by default(this is optional)


Syntax 

prompt"Message" “Default value”);
as in
prompt(” Enter your favorite color”, "Blue");
A default value, Blue, is displayed by default in the text box which user can change if he wants. The value that user keys into the textbox on the prompt dialog box is accepted and can be stored variable.

Example 

To access two numbers from the user and displays their product.

File Name : PromptDemo.HTML
<HTML>
<BODY>
<SCRIPT>
var fn = prompt("Enter first number" ,"10");
var sn = prompt("Enter second number","2O.5");
document.writeln(fn*an);
</SCRIPT>
</BODY>
</HTML> 


Confirm Dialog Box:
 
JavaScript Provides a third type of a dialog box, called the confirm dialog box. As the name indicates, this dialog box serves as a technique for confirming user action. 


The confirm dialog box displays the following information:

  1. A pre-defined message
  2. OK & Cancel button.
  3. The confirm dialog box does not allow any user activities until the dialog box is dismissed(modal).
  4. Clicking on the OK button causes TRUE to be passed to the program that called the confirm dialog box.
  5.  Clicking on the CANCEL button causes FALSE to be passed to the program that called the confirm dialog box.

Syntax

confirm("message");
as in
confirm("Are you sure of your order?");

Example 

To display a message if user confirms.
File Name: ConfirmDemo.html
<HTML>
<BODY>
<SCRIPT>
var qty = prompt("How many Reliance shares you would like purchase","200");
if(confirm("Are you sure, shall I place order with Stock exchange?")); 
{
document.writeln("Your order of" +qty+ "shares is confirmed");
}
</SCRIPT>
</BODY>
</HTML>



Simply Learn Ethical Hacking Part1




Ethical Hacking :
https://www.bookfaceimpact.info
Ethicalhacking



Hacking is sometimes legal as long because it is being done to search out weaknesses in a very Pc or network system for the testing purpose. this kind of hacking is what we have a tendency to decision moral Hacking.
A computer user UN agency will the act of hacking is named a "Hacker". Hackers ar those that get information, to grasp however systems operate, however they're designed, and so plan to play with these systems.

Types of Hacking:

We can segregate hacking into different categories, based on what is being hacked. Here is a set of examples: 
  1. Website Hacking: Hacking an internet site suggests that taking unauthorized management over an internet server and its associated software package love databases and different interfaces.
  2. Network Hacking:  It take the information by using tools like Telnet, NS lookup, Ping, Tracert, Netstat, etc. with the intent to harm the network system and hamper its operation.
  3. Email Hacking: It includes getting unauthorized access to an Email account and using it without taking the consent of its owner.
  4. Ethical Hacking: Ethical hacking involves finding weaknesses in a computer or network system for testing purpose and finally getting them fixed.
  5. Password Hacking: This is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
  6. Computer Hacking: This is the process of stealing computer ID and password by applying hacking methods and getting unauthorized access to a computer system.
Ethical Hacking −Hacker Types EthicaHacking:

Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.

  1. White Hat Hackers: White Hat hackers are also known as Ethical Hackers. They never intend to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
  2. Black Hat Hackers: Black Hat hackers, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
  3. Grey Hat Hackers: Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
  4. Miscellaneous Hackers: Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it.

Miscellaneous Hackers Types:

  1. Red Hat Hackers: Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.
  2. Blue Hat Hackers: A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events. 
  3. Elite Hackers: This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. 
  4. Script Kiddie: A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie. 
  5. Neophyte: A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
  6. Hacktivist:  A  hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.

Ethical Hacking Terminologies Ethical Hacking

Following is a list of important terms used in the field of hacking.
  1. Adware: Adware is software system designed to force pre-chosen ads to show on your system.
  2. Attack: associate attack is associate action that's done on a system to urge its access and extract sensitive information.
  3. Backdoor:  A back door, or door, could be a hidden entry to a computer or software system that bypasses security measures, love logins and arcanum protections.
  4. Bot: A larva could be a program that automates associate action in order that it are often done repeatedly at a way higher rate for a additional sustained amount than a person's operator might pair. to Illustrate, causation communications protocol, FTP or Telnet at a better rate or business script to make objects at a better rate.
  5. Botnet:  A botnet, additionally referred to as zombie army, could be a cluster of computers controlled while not their owners’ information. Botnets area unit wont to send spam or create denial of service attacks.
  6. Brute force attack: A brute force attack is an automatic and therefore the simplest reasonably technique to realize access to a system or web site. It tries the various combination of usernames and passwords, over and another time, till it gets in.
  7. Buffer Overflow: Buffer Overflow could be a flaw that happens once additional information is written to a block of memory, or buffer than the buffer is allotted to carry.
  8. Clone phishing: Clone phishing is that the modification of associate existing, legitimate email with a false link to trick the recipient into providing personal data.
  9. Cracker: A cracker is one World Health Organization modifies the software system to access the options that area unit thought of undesirable by the person cracking the software system, particularly copy protection options.
  10. Denial of service attack (DoS):  A denial of service (DoS) attack could be a malicious decide to create a server or a network resource unobtainable to users, sometimes by briefly interrupting or suspending the services of a bunch connected to the web.
  11. DDoS: Distributed denial of service attack.
  12. Exploit Kit: associate exploit kit is software designed to run on internet servers, with the aim of characteristic software system vulnerabilities in consumer machines human action with it and exploiting discovered vulnerabilities to transfer and execute malicious code on the consumer.
  13. Exploit: Exploit could be a piece of software system, a bit of knowledge, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the safety of a pc or network system.
  14. Firewall: A firewall could be a filter designed to stay unwanted intruders outside a system or network whereas permitting safe communication between systems and users on the within of the firewall.
  15. Keystroke work: Keystroke logging is that the method of chase the keys that area unit ironed on a pc (and that touchscreen points area unit used). it's merely the map of a computer/human interface. it's utilized by grey and black hat hackers to record login IDs and passwords. Keyloggers area unit sometimes secreted onto a tool employing a Trojan delivered by a phishing email.
  16. Logic bomb: a scourge secreted into a system that triggers a malicious action once sure conditions area unit met. the foremost common version is that the time bomb.
  17. Malware: Malware is associate umbrella term wont to seek advice from a range of varieties of hostile or intrusive software system, as well as pc viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and alternative malicious programs.
  18. Master Program: A master program could be a program a black hat hacker uses to remotely transmit commands to infected zombie drones, unremarkably to hold out Denial of Service attacks or spam attacks.
  19. Phishing: Phishing is associate e-mail fraud technique within which the culprit sends out legitimate-looking emails, in a shot to collect personal and monetary data from recipients.
  20. Phreaker:   Phreakers area unit thought of the initial pc hackers and that they area unit people who forced an entry the phonephone network illicitly, usually to form free long-distance phone calls or to faucet phone lines.
  21. Rootkit: Rootkit could be a skulking style of software system, usually malicious, designed to cover the existence of sure processes or programs from traditional strategies of detection and alter continuing privileged access to a pc.
  22. Shrink Wrap code: A Shrink Wrap code attack is associate act of exploiting holes in unpatched or poorly organized software system.
  23. Social engineering: Social engineering implies deceiving somebody with the aim of getting sensitive and private data, like mastercard details or usernames and passwords.
  24. Spam: A Spam is solely associate unsought email, additionally referred to as junk email, sent to an oversized range of recipients while not their consent.
  25. Spoofing:  Spoofing could be a technique wont to gain unauthorized access to computers, whereby the trespasser sends messages to a pc with associate scientific discipline address indicating that the message is coming back from a sure host.
  26. Spyware: Spyware is software system that aims to collect data a couple of person or organization while not their information which might send such data to a different entity while not the consumer's consent, or that asserts management over a pc while not the consumer's information.
  27. SQL Injection: SQL injection is associate SQL code injection technique, wont to attack data-driven applications, within which malicious SQL statements area unit inserted into associate entry field for execution (e.g. to dump the info contents to the attacker).
  28. Threat:  A threat could be a attainable danger which will exploit associate existing bug or vulnerability to compromise the safety of a pc or network system.
  29. Trojan:  A Trojan, or computer virus, could be a bug disguised to seem sort of a valid program, creating it tough to tell apart from programs that area unit purported to be there designed with associate intention to destroy files, alter data, steal passwords or alternative data.
  30. Virus: a scourge could be a bug or a bit of code that is capable of repeating itself and usually includes a prejudicious impact, love corrupting the system or destroying information. 
  31. Vulnerability: A vulnerability could be a weakness that permits a hacker to compromise the safety of a pc or network system.
  32. Worms: A worm could be a self-replicating virus that doesn't alter files however resides in active memory and duplicates itself.
  33. Cross-site Scripting: Cross-site scripting (XSS) could be a style of pc security vulnerability usually found in internet applications. XSS allows attackers to inject client-side script into websites viewed by alternative users.
  34. Zombie Drone: A Zombie Drone is outlined as a hi-jacked pc that's getting used anonymously as a soldier or 'drone' for malicious activity, to Illustrate, distributing unwanted spam e-mails

Tools Of Ethical Hacking:

They are so many types of tools
NMAP:
Nmap uses raw IP packets to determine:

  1. what hosts square measure on the market on the network,
  2. what services those hosts square measure giving,
  3. what in operation systems they're running on,what style of firewalls is in use and alternative such characteristics.
  4. Nmap runs on all major pc in operation systems cherish Windows, Mac ,and  Linux.

Metasploit:

With Metasploit, we will perform the subsequent operations:
  1. Conduct basic penetration tests on tiny networks
  2. Run spot checks on the exploitability of vulnerabilities
  3. Discover the network or import scan information
  4. Browse exploit modules and run individual exploits on hosts 
Burp Suite:  Burp Suite could be a fashionable platform that's wide used for activity security testing of net applications.
Angry IP Scanner : It helps in straightforward recovery of varied sorts of passwords by using any of the subsequent methods
Cain&Abel: 
  1. Sniffing the network,
  2. Cracking encrypted passwords exploitation wordbook,
  3. Brute-Force and scientific discipline attacks,recording VoIP conversations,
  4. Cryptography disorganized  passwords,sick wireless network keys,
  5. Revealing positive identification boxes,uncovering cached passwords and analyzing routing protocols.
Ettercap: you'll be able to run Ettercap on all the popular in operation systems cherish Windows, Linux, and waterproof OS X. 
EtherPeek:  EtherPeek proactively sniffs traffic packets on a network. By default, EtherPeek supports protocols cherish AppleTalk, IP, IP Address Resolution Protocol (ARP), NetWare, TCP, UDP, NetBEUI, and NBT packets.
SuperScan:  SuperScan could be a powerful tool for network directors to scan protocol ports and resolve hostnames. it's a user friendly interface that you just will use to:
Perform ping scans and port scans exploitation any IP vary.
Scan any port vary from a intrinsical list or any given vary.View responses from connected hosts.
Modify the port list and port descriptions exploitation the in-built editor.
Merge port lists to create new ones.
hook up with any discovered open port.Assign a custom helper application to any port.
QualysGuard: QualysGuard includes a group of tools which will monitor, detect, and defend your world network. 
WebInspect: WebInspect could be a net application security assessment tool that helps establish renowned and unknown vulnerabilities among the online application layer. 
LC4: LC4 recovers Windows user account passwords to contour migration of users to a different authentication system or to access accounts whose passwords square measure lost. 
LANguard Network Security Scanner: LANguard Network Scanner monitors a network by scanning connected machines and providing info concerning every node. you'll be able to get info concerning every individual package.
Network Stumbler: Network Stumbler may be wont to verify if a network is well organized, its signal strength or coverage, and notice interference between one or additional wireless networks. It may also be wont to non-authorized connections.   
ToneLoc: ToneLoc stands for Tone locater. it had been a preferred war dialling computer virus written for MS-DOS within the early 90’s. War dialling could be a technique of employing a electronic equipment to mechanically scan a listing of phonephone numbers, typically dialling each variety during a native code.



How to create simple job contact form using html

Job Contact Form: <html> <body bgcolor="87ceeb"><center><h1>FB.com/bookfaceimpact</h1> &...