articles

Our Blogs

"Zerosack Networks blogs are about sharing technical knowledge with the world to get awareness and basic facts about modern technology, programming, cloud computing, machine learning, artificial intelligence, technology history, business, laws and policies, and more."

Filter By: vulnerability
Nofollow vs Noopener vs Noreferrer: Differences and Examples in Link Tag Syntax By: Rajat Kumar | 23 February, 2023

The rel attribute is used to specify the relationship between the current document and the linked document in HTML. The nofollow, noopener, and noreferrer values...

How to create and configure robots.txt file By: Rajat Kumar | 01 August, 2017

The robots exclusion standard, also known as the robots exclusion protocol or simply robots.txt, is a standard used by websites to communicate with web crawlers...

Concepts & techniques to find vulnerability and prevent the cyber-attacks (Session-2). By: Rajat Kumar | 15 January, 2017

Hello techies in this session-2 we will talk about Attacks, concept, techniques & tricks to find vulnerability and prevent the cyber-attacks to reduce the damage...

Basics of Cyber security to protect information & data from hackers (Session-1). By: Rajat Kumar | 07 January, 2017

Hello techies Cybersecurity is most important things that should take into consideration in today world. So that’s why today we are starting our new series...