Source Code of Microsoft’s Windows XP Operating System Leaked Online
Microsoft seems to be the victim of another leak related to the Windows operating system. This time around, the source code for Windows XP and …
Knowledge pool for Information Technologies
Microsoft seems to be the victim of another leak related to the Windows operating system. This time around, the source code for Windows XP and …
Form tags mean that your site has started to become a dynamic site from a static site. We use form tags mostly on dynamic sites. …
This week, Check Point researchers announced a vulnerability in Instagram’s Android and iOS app that would take over the device remotely. With this vulnerability, the …
Type property takes many values in inputs and these values are used to determine how to enter data. Data entries such as text, selection, file …
Basic Html tags are indispensable (Html, head, title and body) tags that make up the skeleton. If we divide our site into parts; We can …
Html’s tag for images is img. The img tag contains many features in itself. We will examine these ones by one. Let’s start with the …
Linux operating system based servers generally do not have a graphical interface for security reasons. In this case, it is very important to know how …
In Linux-based operating systems, information about network operations such as network settings, network commands or network configuration is included. In Linux operating systems, as everything …
Security firm Secura published a technical article about CVE-2020-1472, an authentication vulnerability in Microsoft’s Netlogon authentication process, and the vulnerability was named “Zerologon.” The vulnerability …
One of the most popular and functional programming languages today is JavaScript. This scripting language, which is actively used in web browsers, makes the web …