Author: Abhishek Kumar

Read More

Which JavaScript to learn? Angular, React, Vue & Ember

We would not give any opinions about it because opinions vary from persons to persons. We would simply be discussing the facts and specific figures what should we use based on the following two criteria’s:

How Popular a language is- Popularity
Jobs based on a particular language- Job Market
How Difficult a language is to learn-Learning Curve.

Advertisements
Read More

Take ownership |Get full access to files and folders in Windows 10

The Owner of a folder has the right to allow or deny access to that resource. … The default owner of a file or folder is the person who creates the resource.Ownership can be taken or transferred in several ways. The current owner of a file or folder can transfer ownership to another user or group.4

In order to get full access to some file or folder in Windows 10.

Read More

Want To Earn? The Secret Of passive income generation |Blogs and Websites

house-money-capitalism-fortune-12619.jpg

Analyse your revenue Model

These are some questions you must ask yourself before you go ahead.

  • Where are our revenues coming from?
  • What value is delivered to which markets?
  • What costs are involved in delivering that value?
  • Are our perceived key activities and key resources as important for gaining revenue as we think they are?
  • If we change our model in a specific way, what are the effects?
Read More

Cryptojackers infliction | Thousands of websites getting Hacked

Cryptocurrency has been taking over and unless you have been living under a rock you have probably heard of bitcoin.

What you may not know is it is possible to mine your own crypto coins similarly gold was mined during the gold rush in 1800’s. Let me tell you how many youtuber’s , bloggers, website owners are using tools called plugin’s in general to use cpu power of the host computers in order to generate crytocurrency i.e bitcoins.

Read More

Cracking Wifi Passwords using Aircrack-ng

Have you ever thought about cracking wifi passwords

Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) are two security protocols and security certification programs developed by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined these in response to serious weaknesses researchers had found in the previous system, Wired Equivalent Privacy (WEP).

Read More

Chrome Hidden Feature for Speed Improvements

Readers thankyou for being here today I am gonna show you how google chrome and other browser have secrectly integrated the advanced setting inside. Technically I love Chrome , especially on android one of the reasons is the way it shows the AMP (Accelerated Mobile Pages) pages, the speed,  since google’s is currently rolling out accelerated mobile pages in its mobile search results.