articles

Our Blogs

"Zerosack Networks blogs are about sharing technical knowledge with the world to get awareness and basic facts about modern technology, programming, cloud computing, machine learning, artificial intelligence, technology history, business, laws and policies, and more."

Filter By: image
Introduction To Google Ads (AdWords) By: Rajat Kumar | 09 August, 2018

Hi everyone, in this article we are going to learn about google ads (adwords). As you all know AdWords now turn into Google Ads, Yes...

How to create and configure robots.txt file By: Rajat Kumar | 01 August, 2017

The robots exclusion standard, also known as the robots exclusion protocol or simply robots.txt, is a standard used by websites to communicate with web crawlers...

Top Advanced SEO techniques checklist in 2023 By: Rajat Kumar | 30 July, 2017

SEO is a marketing discipline focused on growing visibility in organic (non-paid) search engine results. SEO encompasses both the technical and creative elements required to...

Why Mobile responsive sites matter. By: Rajat Kumar | 19 May, 2017

Introduction to why mobile responsive site important:
Today we are going to learn new era of internet applications and web experience, so before take deep...

How to Use Open Graph Protocol Meta Tags for Social Network With Example By: Rajat Kumar | 14 May, 2017

Open Graph Protocol The social structured data tags are the way your site appears when shared via social media like Facebook and Twitter by adding...

Steps for designing any dynamic website (for beginner). By: Rajat Kumar | 11 March, 2017

Hello techies today we are talking about what are the main steps that keep in mind when designing and developing any custom website or web-application.

Top 10 best SEO techniques must use in website Year 2020 (for beginner). By: Rajat Kumar | 07 March, 2017

Hello techies today we are going to talk about top 10 best SEO (search engine optimization) techniques must use while designing any custom website or...

Concepts & techniques to find vulnerability and prevent the cyber-attacks (Session-2). By: Rajat Kumar | 15 January, 2017

Hello techies in this session-2 we will talk about Attacks, concept, techniques & tricks to find vulnerability and prevent the cyber-attacks to reduce the damage...

SMTP vs. IMAP vs. POP3: Understanding Mail and Data Transmission Differences By: Rajat Kumar | 27 December, 2016

SMTP, IMAP & POP3 are the 3 transmission protocols that are the part TCP (Transmission Control Protocol). TCP is connection oriented protocol that is by...