Online Free Tutorials & Courses

Latest online learning materials with easy-to-understand examples in various subjects.

Cyber Security

Cybersecurity is all about reducing threats when people are in the process of dealing with technology. It encompasses the full range of protection against any online risk or vulnerability, which comprises information security assurance and cyber law enforcement.

    Database Security

    Database security is the technique that protects and secures the database against intentional or accidental threats.

    • What is Database Security?
    • What is a Threat?
    • Backup and Recovery.

    Scheduling Algorithms of Operating System

    CPU scheduling treats with the issues of deciding which of the processes in the ready queue needs to be allocated to the CPU. There are several different CPU scheduling algorithms used nowadays within an operating system. In this tutorial, you will get to know about some of them.

      JavaScript Comments

      Comments are those lines within a program or script that the compiler or interpreter does not read when they compile or interpret any source code. In this chapter, you will learn about two different types of comments that the JavaScript programmer allows to use.

        JavaScript async Attribute

        HTML5 bring the async attribute for <script> elements. The async attribute is alike to defer (which you have read earlier) in that it transforms the way a script is processed. Further similar to the defer attribute, async applies only to […]

          History of JavaScript

          To use JavaScript well, it is necessary to know its nature, history, and limitations. This chapter contains complete information about the history of JavaScript.

            Darknet

            "Darknet" or "Dark Net" is a lamination of a specific type of network which can only be retrieved by particular software, techniques, authorization, or configurations. It is often accessed using non-standard protocols and ports.

              DoS Attacks and Its Prevention

              Hackers have many reasons to break network security. Whatever the reason is, hacking causes damage both to that particular individual who becomes the prey and the computing devices and lays a more significant impact on business firms resulting in the […]

                Botnet

                A botnet is a short form of 'robot network'. The term 'bot' is used when we have to define some automated tasks performed without user intervention. But as this term is used concerning hacking to describe a new breed of malicious threats, we will learn about it with every detail.

                  Rootkit

                  Rootkits are a collection of tools or sets of applications that allow the administrator-level access to a computer or a network. These rootkits are fed into the host computer by a cracker (malicious hacker) either by exploiting a known vulnerability of the system or cracking the password.

                    Computer Virus

                    A computer virus is a program or a piece of code that is specifically designed to spread from computer systems to another computer and interfere with computer operation without the victim's knowledge.

                    • What is Computer Virus?
                    • History and Types of Computer Virus.
                    • Symptoms of a Computer Virus.
                    • Countermeasures Against Computer Virus.

                    Phishing

                    Phishing is an attempt to grab sensitive information and identity, such as credit card details (while doing online transactions or e-marketing- indirectly money), username, and password (while using a personal email account or other social networking sites). The term Phishing […]

                      System Hacking

                      System hacking is defined as the compromise of computer systems and software to access the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access to its data or take illegal advantage.

                        Physical Security

                        Mostly, people talk about hacking from the attacking point of view and deal with logical security. Still, physical security is also a matter of concern from both malicious hackers and penetration tester's point of view. Penetration testing against physical targets is also a common phase of testing.

                          Social Engineering

                          In other words, social engineering refers to the psychological manipulation of a human being into performing actions by interacting with them and then breaking into normal security postures. It's like a trick of confidence to gather information and gain unauthorized access by tricking or doing fraud.

                            Scroll Back to Top