• All Post
  • A.I.
  • AI
  • Branding
  • c
  • c++
  • computer
  • cryptocurrency
  • database
  • Design
  • digital marketing
  • hacking
  • HTML
  • java
  • Marketing
  • network
  • other
  • programming
  • python
  • react
  • social
  • Tools
  • Uncategorized
  • web devlopment
    •   Back
    • cryptocurrency
    •   Back
    • drawing In Python
Photo by Miguel Á. Padriñán on <a href="https://www.pexels.com/photo/close-up-shot-of-keyboard-buttons-2882630/" rel="nofollow">Pexels.com</a>

October 6, 2022/

A vulnerability is a weakness that makes a threat possible. This may be because of poor design, configuration mistakes, or inappropriate and insecure coding techniques. threat. Examples of attacks include sending malicious input to an application or flooding a network in an attempt to deny service. A Threat is a…

Photo by Anete Lusina on <a href="https://www.pexels.com/photo/crop-hacker-silhouette-typing-on-computer-keyboard-while-hacking-system-5240547/" rel="nofollow">Pexels.com</a>

June 1, 2022/

WHAT IS A SERVER?   in computing, a server is a piece of computer hardware or software (computer program) that provides functionality for other programs or devices, called “clients”. This architecture is called the clientserver model. Servers can provide various functionalit ies, often called “services”, such as sharing data or…


June 1, 2022/

Ethical Hacker: the hacker culture is a subculture of individuals who enjoy – often in collective effort – the intellectual challenge of creatively overcoming the limitations of software systems or electronic hardware (mostly digital electronics), to achieve novel and clever outcomes. The act of engaging in activities (such as programming…

For News Subscribe Us!

Can curiosity may end shameless explained. True high on said mr on come. An do mr design at little myself wholly entire though. Attended of on stronger or mr pleasure.

You have been successfully Subscribed! Ops! Something went wrong, please try again.

© 2022 Code With AM