articles

Our Blogs

"Zerosack Networks blogs are about sharing technical knowledge with the world to get awareness and basic facts about modern technology, programming, cloud computing, machine learning, artificial intelligence, technology history, business, laws and policies, and more."

Filter By: phishing
Understanding SPF and DKIM for SMTP Email Authentication and How to Configure Them in a DNS Server By: Rajat Kumar | 06 November, 2023

Learn how to enhance email security and combat spam with this comprehensive guide on configuring SPF and DKIM authentication in your DNS server. Understand the...

Nofollow vs Noopener vs Noreferrer: Differences and Examples in Link Tag Syntax By: Rajat Kumar | 23 February, 2023

The rel attribute is used to specify the relationship between the current document and the linked document in HTML. The nofollow, noopener, and noreferrer values...

Protecting Your Personal Data and Privacy from Cyber Attacks (Session-3). By: Rajat Kumar | 25 January, 2017

In this session-3 we focuses on your personal devices and your personal data. It includes tips for protecting your devices, creating strong passwords and safely...

Concepts & techniques to find vulnerability and prevent the cyber-attacks (Session-2). By: Rajat Kumar | 15 January, 2017

Hello techies in this session-2 we will talk about Attacks, concept, techniques & tricks to find vulnerability and prevent the cyber-attacks to reduce the damage...