Sunday, 24 July 2022

Detail Backlink Topic

 What is a Backlink?

Backlinks are also known as inbound links. These are the links from one website to a page on another website. Website pages with a high number of backlinks are more likely to rank on the search engine rather than one which does not have.

You would need a backlink for better results for your website over the internet. If you have a number of links on your site, the more weightage you will have on the search engine. Creating a large number of backlinks is why a blog or website ranks over google or other search engines.

There are two types of backlinks.

Do-Follow:

A Dofollow link passes the authority of the original website to the desired site. These links allow other search engines and Google to point back to your website or blog. A Dofollow link helps your website rank in the top positions in the search engines. High-quality do-follow backlinks are the best way to generate increased traffic for your website.

No-Follow:

A No-follow website does not influence the ranking of the website. However, it increases the traffic of the website. These links do not give the website many benefits but definitely provide traffic to your site. Social media sites primarily use Nofollow links. Businesses can link their social media platforms with their website through No-follow links.

Both of these links benefit your website, so do not ignore any of these methods to bring more traffic to your site.

Whenever a website links its webpage with the other website, it passes a link juice. The link juice helps you to increase your website ranking and traffic. The more the link juice flows from the linking website to the linked site, the more authentic recommendation will be to the site. A website owner can block the link juice when he builds a no-follow link instead of do-follow.

Adding a Root Domain:

Adding a root domain refers to adding a number of backlinks from specific domains to your websites. If you create several links from a single website, it will still be considered as a linked root domain.

A low-quality link is generated from spam, unauthorized, or hacked sites. Building low-quality links can hamper your search engine ranking and cause harm to your site.

The best way to get quality backlinks is to build backlinks on high-quality content sites with more traffic and search results. Creating backlinks on the most authoritative website is difficult but most relevant for your SEO visibility.

Internal links are the links that link your website pages internally with one another. This internal linking will help your user or the visitor easily navigate between your site’s web pages. This method will keep your visitor for a longer time on your website.

Backlinks play an essential role in SEO as they represent a vote from one site to another. Creating backlinks will be worth it only when you choose the right site to build links. For instance, You offer products related to footwear and build links on a clothing website. These links will be of no use to your business.

When you build high-quality backlinks, it helps you to improve the organic ranking of your website. Below are some of the points which will tell you how backlinks matter for SEO-

  • Creating backlinks will help you in fast indexing over a search engine.
  • You can drag more traffic to your website.
  • Backlinks help you to position your website as an authority.
  • More backlinks on other sites will assure Google that the content you provide through your website is authentic and relevant for the viewers.
  • When you purchase high-quality backlinks from reputed sites, the search engine automatically considers your site to be placed on the top positions in the search engine.

Here are the tips that will help in your site’s high-quality link building.

Publish Good and Evergreen Content:

When you publish good content with the best keywords, it will influence other websites to allow you to build links on their website.

Tips and tricks to write better content

  • You should include query-solving content for your audience.
  • For a better user experience, always write readable content for your visitor.
  • Use an informal and interactive way of content writing.

Start Guest Blogging:

Guest posting is the best way to get quality backlinks. You need to find which sites are offering guest posting. You can do guest posts on another website and add your website’s backlinks to them. With the help of guest blogging, you can build high-quality backlinks.

You can use infographics to create high-quality backlinks. Infographic is a good source of information that is usually shared over the internet. So if you create backlinks on infographics, it can bring more traffic to your website.

Be Active on Quora:

Quora can be a fine option for you to build backlinks free for generating high traffic for your website. You can also answer the questions on quora and add your site’s backlink with detailed information on that topic to get more viewers on your website. To benefit more from quora, you can improve your presence on this platform.

Most SEO experts use this technique to build high-quality backlinks free on another website. The experts look for broken links and ask the website owners to fix these links and place their links in exchange for broken links. Quora is the most convenient way to get your links on a high-traffic website. To check broken links of any website, you can use the broken link check site.

Do Internal Linking:

You can increase your website’s search ranking by creating internal links. You can link one webpage with another internally on your website. This technique of interlinking pages will boost the search visibility of your site.

Video Marketing:

As viewers show interest in video-related content. You can build your youtube channel and describe the topic on which you have prepared a blog. You can add your blog’s link to the video content so that whoever watches your vlog can easily move to your website to know more about the topic. This method of preparing backlinks can bring large traffic to your website and help you rank on search engines.

Some of the benefits of using backlinks are

  • Backlinks help you to improve the organic traffic of your website.
  • Creating backlinks will provide you with the option of fast indexing.
  • You can also increase the referral traffic of your site.
  • Building high-quality backlinks sites will help you rank in the top positions in the search engine.

Constant in PHP

What is Constant in PHP

A constant is a name or an identifier for a fixed value. Constants are like variables, except that once they are defined, they cannot be undefined or changed.

Constants are very useful for storing data that doesn't change while the script is running. Common examples of such data include configuration settings such as database username and password, website's base URL, company name, etc.

Constants are defined using PHP's define() function, which accepts two arguments: the name of the constant, and its value. Once defined the constant value can be accessed at any time just by referring to its name. 

<?php // Defining constant define("SITE_URL", "https://www.tutorialrepublic.com/"); // Using constant echo 'Thank you for visiting - ' . SITE_URL; ?>


Conventions for PHP Constants

Name of constants must follow the same rules as variable names, which means a valid constant name must start with a letter or underscore, followed by any number of letters, numbers, or underscores with one exception: the $ the prefix is not required for constant names.






Saturday, 23 July 2022

Variable in PHP

 Variables are used to store data, like strings of text, numbers, etc. Variable values can change over the course of a script. Here're some important things to know about variables:

1) In PHP, a variable does not need to be declared before adding a value to it. PHP automatically converts the variable to the correct data type, depending on its value.

2) After declaring a variable it can be reused throughout the code.

3) The assignment operator (=) used to assign value to a variable.

In PHP variable can be declared as: $var_name = value;

<?php // Declaring variables $txt = "Hello World!"; $number = 10; // Displaying variables value echo $txt; // Output: Hello World! echo $number; // Output: 10 ?>


In the example, we have created two variables where the first one has been assigned with a string value and the second has been assigned with a number. Later we displayed the values of the variables in the browser using the echo statement. The PHP echo the statement is often used to output data to the browser. We will learn more about this in the upcoming chapter.

Conventions for PHP Variables

These are the following rules for naming a PHP variable:

  • All variables in PHP start with a $ sign, followed by the name of the variable.
  • A variable name must start with a letter or the underscore character _.
  • A variable name cannot start with a number.
  • A variable name in PHP can only contain alpha-numeric characters and    underscores (A-z, 0-9, and _).
  • A variable name cannot contain spaces.





















Friday, 22 July 2022

PHP Syntax

Basic PHP syntax, including case sensitivity, statements, and whitespaces.

As a programming language, PHP has a set of rules that governs how you write programs.

Start PHP 

<?php

Enclosing tag

?>

Example

<!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>PHP Syntax</title> </head> <body> <h1><?php echo 'PHP Syntax'; ?></h1> </body> </html>


 PHP code, the enclosing tag is optional

<?php echo 'PHP Syntax';


PHP is partially case-sensitive. Knowing what is case sensitive and what is not is crucial to avoid syntax errors.

If you have a function such as, you can use it as COUNT. It would work properly.

The following are case-insensitive in PHP:

  • PHP constructs are if, if-else, if-else, switch, while, do-while, etc.
  • Keywords such as true and false.
  • User-defined function & class names.

On the other hand, variables are case-sensitive. e.g., $message and $MESSAGE are different variables.

A PHP script typically consists of one or more statements. A statement is a code that does something, e.g., assigning a value to a variable and calling a function.

A statement always ends with a semicolon (;). The following shows a statement that assigns a literal string to the $message variable:

$message = "Hello";PHP also has a compound statement that consists of one or more simple statements.if( $is_new_user ) { send_welcome_email(); }The closing tag of a PHP block (?>) automatically implies a semicolon (;). Therefore, you don’t need to place a semicolon in the last statement in a PHP block. For example:<?php echo $name ?>The statement echo $name doesn’t need a semicolon. However, using a semicolon for the last statement in a block should work fine. For example:<?php echo $name; ?>

Whitespace & line breaks

In most cases, whitespace and line breaks don’t have special meaning in PHP. Therefore, you can place a statement in one line or span it across multiple lines.

login( $username, $password );


login( $username, $password );






























o";










Thursday, 21 July 2022

Blind XSS Impact

What is Blind XSS?

Blind XSS is a flavor of cross-site scripting (XSS), where the attacker “blindly” deploys a series of malicious payloads on web pages that are likely to save them to a persistent state (like in a database, or in a log file). Then, without knowing any details about where the payloads have ended up, or if (and when) they are going to be executed, the attacker waits for the payloads to be pulled out of storage and rendered on a web page loaded by a user. Hence, unlike most XSS attacks, which are non-persistent, and rely on immediate response pages generated from the data input by the attacker in a web form or HTTP query, Blind XSS is a persistent type of XSS that relies on vulnerabilities in the code of the target web pages, which allow malicious scripts, inserted into web controls, to be saved by the server in a database or web site file. These are then “served” to other users as part of HTML page responses, without begin “sanitized” first.

The distinction of the Blind XSS attack is the fact that the attacker does not know where the payload will end up and if, or when, it will get executed. Hence, in order for the attack to succeed, the attacker needs to make sure that enough payloads are deployed, and that the payloads are crafted in such a way as to be effective in time, know where to call back and how to sign off the results. At the same time, the attacker needs to implement technology to listen for eventual call backs from the payloads deployed.

Common Targets 

A most common target of Blind XSS is obviously any web page that gets user input and saves it somewhere for later viewing (by others) – logon forms, log viewers, customer service applications, exception handlers, forums/message boards, feedback forms, chat windows

Logon forms

Logon forms usually take the input user name string and save it to a log file which can be viewed, at a later stage, from a web page. Hence, a failed logon, with a malicious script entered in the “user name” field of the logon form, will cause the server to save an entry into the log which will have the malicious script as the “user name”. An attacker can perform several such login attempts in order to get the malicious script(s) into the log database or log file. Later on, if an administrator of the website (or web application) that the login form belongs to, checks out the logs for the day, and if those logs come up on a web page, the malicious script may get executed and call back to the attacker with the desired information. 

Typical targets in this scenario are web-based applications that require authentication, web management consoles for appliances, etc. Typical damage ranges from stolen credentials to unauthorized access to the data manipulated by the application (or appliance) and denial of service. Typical user targets are the administrators and the aim usually is security related.

Forums & Message boards

Similar to the previous scenario, attackers can place the malicious scripts within the topic title in a forum or message board. Again, most commonly, the server will save their post to a database, and the stored information can get exposed to other viewers, like the moderators over a period of time. In this scenario, the script may get sanitized when delivered to normal users, which will disable the malicious code. However, when a moderator of the forum will load a forum management web page, like a thread popularity report, for example, the unsanitized topic titles may be loaded and consequently, the attacker’s script would be executed, calling back with stolen information, redirecting the user or cause a denial of service attacks by for example calling code within the admin interface that stops the forum. Typical user targets are moderators of forums or message boards, who load forum content from management web sessions in order to perform administrative tasks and the aim is again, security related.

Detecting and Preventing Blind XSS Attacks

The best cure is prevention; therefore the best way to defend against Blind XSS attacks is to make sure that your website or web application is not vulnerable. The most effective way to accomplish this is by having web developers review the code and ensure that any user input is properly sanitized. If this is not done, there is a risk that user input does not get scraped off any scripting tags before being saved to storage or served to the user’s browser, and consequently, your website or web application might be vulnerable to XSS, including Blind XSS attacks.

It is good coding practice to never trust data provided by the user. In order to eliminate all risks, you need to implement sanitization of the user input before it gets stored, and also, as a second line of defense, when data is read from storage before it is sent to the user’s browser.

Next, you need a specialized tool that performs innocuous penetration testing, which apart from detecting the easy-to-detect XSS vulnerabilities, also includes the ability to detect Blind XSS vulnerabilities which might not expose themselves in the web application being scanned (as in the forum example). If you do not have access to the code or the time to check millions of lines of code, you can use such a tool in order to determine if your website or web application is vulnerable to Blind XSS attacks, and if positive, you will need to address this with your software provider.

The difficulty in detecting Blind XSS without a code review comes from the fact that this type of attack does not rely on vulnerabilities in the third-party web server technology or the web browser; vulnerabilities that get listed or you can scan for and patch. This attack exploits vulnerabilities introduced by the developers in the code of your website or web application. So even if your website is implemented using the latest technology such as HTML 5 or you ensure that your web server is fully patched, the web application may still be vulnerable to XSS. In addition to this, Blind XSS attacks are even more difficult to detect since the payload is executed on a completely different web application than where it was injected.



















Tuesday, 19 July 2022

Started with PHP 1

 Setting Local Web Server

PHP script executes on a web server running PHP. So before you start writing any PHP program you need the following program installed on your computer.

1)The Apache Web server

2)The PHP engine

3)The MySQL database server

You can either install them individually or choose a pre-configured package for your operating systems like Linux and Windows. Popular pre-configured packages are XAMPP and WampServer.

WampServer is a Windows web development environment. It allows you to create web applications with Apache2, PHP, and a MySQL database. It will also provide the MySQL administrative tool PhpMyAdmin to easily manage your databases using a web browser.

First PHP Script

Now that you have successfully installed WampServer on your computer. In this section, we will create a very simple PHP script that displays the text "Hello, world!" in the browser window.

Ok, click on the WampServer icon somewhere on your Windows taskbar and select the "www directory". Alternatively, you can access the "www" directory by navigating the C:\wamp\www. Create a subdirectory in the "www" directory let's say "project".

<?php // Display greeting message echo "Hello, world!"; ?>


Now save this file as "hello.php" in your project folder (located at C:\wamp\www\project), and view the result in your browser by visiting this URL: http://localhost/project/hello.php.

Alternatively, you can access the "hello.php" file by selecting the localhost option and then selecting the project folder from the WampSever menu on the taskbar.

PHP can be embedded within a normal HTML web page. That means inside your HTML document you can write the PHP statements, as demonstrated in the following example:

<!DOCTYPE HTML> <html> <head> <title>PHP Application</title> </head> <body> <?php // Display greeting message echo 'Hello World!'; ?> </body> </html>


Now save this file as "hello.php" in your project folder (located at C:\wamp\www\project), and view the result in your browser by visiting this URL: http://localhost/project/hello.php.

Alternatively, you can access the "hello.php" file by selecting the localhost option and then selecting the project folder from the WampSever menu on the taskbar.

PHP can be embedded within a normal HTML web page. That means inside your HTML document you can write the PHP statements, as demonstrated in the following example:
















Microsoft Thwarts Chinese Cyber Attack Targeting Western European Governments

  Microsoft on Tuesday   revealed   that it repelled a cyber attack staged by a Chinese nation-state actor targeting two dozen organizations...