Online Free Tutorials & Courses

Latest online learning materials with easy-to-understand examples in various subjects.

Terminologies for Securing a System

Before getting into the very in depth of every concept, it is recommended to clear the concepts and terminologies that are related to cybersecurity and cybercrime. It is because each of the terms has individual meaning and used on different scenarios in this field of security.

    Elements of Security

    In general, the form of computer security, we can understand that it is all about detecting and preventing the system from external agents who somehow want to harm our system or information residing within that system. So there are specific […]

      Cyber Security

      Cybersecurity is all about reducing threats when people are in a process to deal with technology where it encompasses the full range of protection against any online risk or vulnerability which comprises of information security assurance and cyber law enforcement as well.

        Database Security

        Database security is the technique that protects and secures the database against intentional or accidental threats.

        • What is Database Security?
        • What is a Threat?
        • Backup and Recovery.

        Scheduling Algorithms of Operating System

        CPU scheduling treats with the issues of deciding which of the processes in the ready queue needs to be allocated to the CPU. There are several different CPU scheduling algorithms used nowadays within an operating system. In this tutorial, you will get to know about some of them.

          JavaScript Comments

          In this chapter, you will learn about two different types of comments that the JavaScript programmer allows to use.

          • Single-line Comments
          • Block Comments.

          JavaScript async Attribute

          HTML5 bring the async attribute for <script> elements. The async attribute is alike to defer (which you have read earlier) in that it transforms the way a script is processed. Further similar to defer attribute, async applies only to external […]

            History of JavaScript

            To begin down the path to using JavaScript well, it is essential to know its nature, history, and limitations. This chapter contains complete information about the history of JavaScript.


              "Darknet" or "Dark Net" is a lamination of a specific type of network which can only be retrieved by particular software, techniques, authorization or configurations. It is often accessed using non-standard protocols and ports.

                DoS Attacks and Its Prevention

                Hackers have numbers of reason to break through network security. Whatever the reason is; hacking causes damage both to that particular individual who becomes the prey along with the computing devices and lays a more significant impact on business firms […]


                  A botnet is a short form of 'robot network'. The term 'bot' is used when we have to define some automated tasks that are performed without user intervention. But as this term is used concerning hacking, to describe a new breed of malicious threats, we will learn about it with every detail.


                    Rootkits are a collection of tools or set of applications that allow the administrator level access to a computer or a network. These rootkits are fed into the host computer by a cracker (malicious hacker) either by exploiting a known vulnerability of the system or by cracking the password.

                      Computer Virus

                      A computer virus is a program or a piece of code that is specifically designed to spread from computer systems to another computer and to interfere with computer operation without the knowledge of the victim.

                      • What is Computer Virus?
                      • History and Types of Computer Virus.
                      • Symptoms of a Computer Virus.
                      • Countermeasures Against Computer Virus.


                      Phishing is an attempt to grab sensitive information and identity such as credit card details (while doing online transactions or e-marketing- indirectly money), username and password (while using personal email account or other social networking sites). The term sounds similar […]

                        System Hacking

                        System hacking is defined as the compromise of computer systems and software to gain access to the target computer and steal or misuse their sensitive information. Here the malicious hacker exploits the weaknesses in a computer system or network to gain unauthorized access of its data or take illegal advantage of it.

                          Scroll Back to Top