<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Mahima Bhardwaj</title>
    <description>The latest articles on DEV Community by Mahima Bhardwaj (@mahimabhardwaj).</description>
    <link>https://dev.to/mahimabhardwaj</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1077386%2F53e7d2d4-5fc0-4b56-8b67-fcdce74ad040.webp</url>
      <title>DEV Community: Mahima Bhardwaj</title>
      <link>https://dev.to/mahimabhardwaj</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mahimabhardwaj"/>
    <language>en</language>
    <item>
      <title>The Potential of Agentic Frameworks to Reform India’s Workforce and GCCs</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sat, 20 Dec 2025 07:58:30 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/the-potential-of-agentic-frameworks-to-reform-indias-workforce-and-gccs-401</link>
      <guid>https://dev.to/mahimabhardwaj/the-potential-of-agentic-frameworks-to-reform-indias-workforce-and-gccs-401</guid>
      <description>&lt;p&gt;&lt;strong&gt;India enters a decade demanding faster digital transformation&lt;/strong&gt;&lt;br&gt;
India’s economy grows rapidly. GCCs expand aggressively. Workflows scale across industries. But process complexity rises each year. Many teams still rely on manual tasks. This slows decisions. It reduces efficiency. It creates operational fatigue. Leaders now seek automation that thinks, adapts, and acts.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Traditional automation hits limits in dynamic work environments&lt;/strong&gt;&lt;br&gt;
Companies use RPA for structured tasks. It works for stable processes. But modern operations change often. Teams switch tools. Systems update. Rules evolve. RPA breaks easily. It requires frequent fixes. It cannot understand context. It cannot make decisions. GCCs feel this pain deeply.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCCs manage massive global workflows with rising expectations&lt;/strong&gt;&lt;br&gt;
India hosts more than 1,600 GCCs. They run finance, HR, supply chain, analytics, and engineering. They support global HQs. They maintain enterprise systems. They manage millions of workflows. Accuracy matters. Speed matters. Scalability matters. But manual work hurts performance. This blocks global competitiveness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agentic frameworks appear as adaptive digital employees&lt;/strong&gt;&lt;br&gt;
Agentic systems like n8n and Make.ai go beyond simple automation. They act like digital coworkers. They decide the next steps. They process context. They integrate tools. They chain long workflows. They react to triggers. They adapt when conditions shift. This makes them powerful for modern GCCs.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agents carry tasks end-to-end without constant human input&lt;/strong&gt;&lt;br&gt;
These frameworks execute actions across systems. They read data. They validate inputs. They are called APIs. They update records. They generate responses. They trigger next steps. They notify teams. This reduces human involvement. Teams focus on judgment, creativity, and strategy.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Complication&lt;/strong&gt;: Workforce time gets drained by repetitive tasks&lt;br&gt;
Indian teams spend hours on routine work. Employees pull reports. They track SLAs. They move data manually. They follow approval chains. They check dashboards. They send updates. This reduces productivity. It affects morale. It delays outcomes. Workloads keep rising.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Resolution&lt;/strong&gt;: Agentic automation frees humans for meaningful work&lt;br&gt;
Agents remove low-value tasks from human hands. They standardize repetitive steps. They ensure accuracy. They reduce manual errors. They cut processing time. Employees shift to high-value tasks. They focus on analysis and innovation. This upgrades workforce quality quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agentic frameworks unlock four major advantages for GCCs&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Multi-system integration without heavy engineering effort&lt;br&gt;
n8n and Make.ai integrate with hundreds of tools. They connect CRMs, ERPs, HRMS platforms, cloud apps, and databases. They simplify data flow. They reduce engineering dependency. GCCs build workflows quickly. This increases agility.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Logic-driven decisions for dynamic business scenarios&lt;br&gt;
Agents evaluate conditions similar to humans. They check rules. They compare data. They detect patterns. They select the best action. This makes processes dynamic. Operations become resilient. Accuracy improves consistently.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scalable workflows that grow without adding headcount&lt;br&gt;
Agents scale effortlessly. Work volume increases. Agents handle more requests. No extra hiring is required. No training needed. This stabilizes cost. It ensures consistent service delivery for global teams.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Continuous improvement through feedback and iteration&lt;br&gt;
Agents learn from logs and outcomes. Teams refine workflows monthly. Errors reduce further. Cycle times decrease. Reporting becomes stronger. Companies see compound gains over time.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;&lt;strong&gt;Digital coworkers reimagine the workforce structure&lt;/strong&gt;&lt;br&gt;
These agents act like digital teammates. They manage emails. They summarise data. They assign tasks. They create documents. They schedule meetings. They track performance metrics. This boosts every team’s productivity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Indian workforce gains massive productivity leverage&lt;/strong&gt;&lt;br&gt;
India has a young workforce. But productivity gaps still exist. Agentic tools act as multipliers. One worker achieves the output of many. Teams achieve deadlines faster. Quality improves. Work pressure decreases. This builds a more capable workforce.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCCs move closer to global operational excellence&lt;/strong&gt;&lt;br&gt;
GCCs aim for world-class standards. They deliver services across time zones. Agentic workflows help them reach higher benchmarks. Errors fall. Processes stabilize. Reporting becomes real-time. Leadership gets clearer visibility. Customers get better outcomes.&lt;/p&gt;

&lt;p&gt;Use Case 1: Finance teams get streamlined invoice workflows&lt;br&gt;
Agents match invoices with POs. They validate details. They check tax rules. They route approvals automatically. They update accounting software. They notify stakeholders. Finance teams save hours daily.&lt;/p&gt;

&lt;p&gt;Use Case 2: HR teams automate the entire recruitment pipeline&lt;br&gt;
Agents screen resumes. They match skills. They schedule interviews. They send reminders. They track candidate progress. They update ATS systems. HR professionals invest more time in candidate experience.&lt;/p&gt;

&lt;p&gt;Use Case 3: IT service desks gain predictive, automated actions&lt;br&gt;
Agents triage incidents. They classify severity. They refer to past solutions. They assign tasks. They alert teams. They close resolved tickets. This improves SLA compliance significantly.&lt;/p&gt;

&lt;p&gt;Use Case 4: Analytics teams fully automate data preparation&lt;br&gt;
Agents pull data from sources. They clean datasets. They run transformations. They update dashboards. They generate insights. Leaders make faster decisions. Analysts spend time on deeper work.&lt;/p&gt;

&lt;p&gt;Use Case 5: Customer operations adopt smart, responsive workflows&lt;br&gt;
Agents read customer queries. They identify intent. They route tickets. They trigger responses. They escalate complex issues. They monitor satisfaction metrics. Customer experience improves quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;High-authority research confirms huge productivity benefits&lt;/strong&gt;&lt;br&gt;
Reports from McKinsey highlight that 60–70% of tasks can be automated using advanced tools.&lt;br&gt;
Accenture notes 40% productivity gains with AI-first workflows.&lt;br&gt;
KPMG outlines automation as a top GCC priority.&lt;br&gt;
Deloitte shows rising investment in intelligent operations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Become a member&lt;/strong&gt;&lt;br&gt;
These studies validate agentic automation’s long-term impact.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;The Indian job ecosystem shifts toward higher-value skills&lt;/strong&gt;&lt;br&gt;
Some worry about job loss. But research shows a different outcome. Roles shift — not disappear. Workers supervise agents. They design workflows. They manage exceptions. They focus on problem-solving. Job quality improves overall.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Reskilling becomes essential across industries&lt;/strong&gt;&lt;br&gt;
Employees need training in automation tools. They must understand workflows. They must track performance. Companies invest more in learning programs. India’s talent becomes future-ready. This fuels long-term national growth.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;GCCs become AI-first innovation hubs for global enterprises&lt;/strong&gt;&lt;br&gt;
GCCs evolve from support centers to strategy centers. They gain advanced capabilities. Agentic frameworks power this transformation. They improve processes. They align with global digital goals. India strengthens its position as a technology leader.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Economics strongly support agentic transformation&lt;/strong&gt;&lt;br&gt;
Agentic automation requires moderate cost. It reduces large operational expenses. It lowers error rates. It saves employee time. It accelerates project delivery. Leaders see quick ROI. Long-term benefits compound yearly.&lt;/p&gt;

&lt;p&gt;India rises as a global leader in agentic automation adoption&lt;br&gt;
India has strong engineering talent. GCCs create large-scale operations. Startups innovate rapidly. Enterprises experiment with new tools. Agentic frameworks fit perfectly. India can lead the next decade of smart workflow automation.&lt;br&gt;
**&lt;br&gt;
Complication–Resolution Summary**&lt;br&gt;
Complication:&lt;br&gt;
India faces rising process complexity. Manual tasks slow teams. Traditional automation fails in dynamic environments. GCCs struggle with scale.&lt;/p&gt;

&lt;p&gt;Resolution:&lt;br&gt;
Agentic frameworks provide adaptive automation. They connect systems. They make decisions. They scale smoothly. They reduce workload pressure. They create a smarter, more capable workforce.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Agentic frameworks create a new human–AI partnership&lt;/strong&gt;&lt;br&gt;
This is the biggest shift. Humans lead with ideas. Agents execute operations. This balance drives efficiency. It unlocks innovation. It builds competitive advantage.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;India’s workforce future is agentic, agile, and AI-empowered&lt;/strong&gt;&lt;br&gt;
India now stands on the edge of a major workforce revolution. Agentic frameworks are not just automation tools — they are force multipliers for human capability. They elevate every role. They accelerate every workflow. They convert effort into impact.&lt;/p&gt;

&lt;p&gt;GCCs adopting these systems transform faster than ever. Processes stabilize. Decisions speed up. Teams gain clarity. Employees move from routine execution to strategic contribution. Work becomes smarter, not harder.&lt;/p&gt;

&lt;p&gt;As agentic systems take over execution, humans rise to the challenge of creativity, problem-solving, and leadership. This shift unlocks India’s true talent potential. It strengthens global competitiveness. It prepares India for the next decade of digital acceleration.&lt;/p&gt;

&lt;p&gt;India is not just adapting to the agentic era — it is poised to lead it.&lt;/p&gt;

&lt;p&gt;With empowered workers, AI-driven operations, and innovation-focused GCCs, India can set global benchmarks in intelligent operations.&lt;/p&gt;

&lt;p&gt;This is the next chapter in India’s workforce evolution — one that is agentic, resilient, and globally unstoppable.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>development</category>
      <category>ai</category>
      <category>agents</category>
    </item>
    <item>
      <title>Virtual Destructors in C++ | C++ Programming| Destructor in C++|</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sun, 22 Dec 2024 11:22:12 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/virtual-destructors-in-c-c-programming-destructor-in-c-deh</link>
      <guid>https://dev.to/mahimabhardwaj/virtual-destructors-in-c-c-programming-destructor-in-c-deh</guid>
      <description>&lt;p&gt;In C++, a virtual destructor is used to ensure that the destructor of a derived class is called when an object is deleted through a pointer to the base class. This is crucial when dealing with polymorphism, as it allows the appropriate destructor to be invoked for an object of a derived class, ensuring proper resource cleanup and avoiding potential memory leaks.&lt;/p&gt;

&lt;p&gt;Why is a Virtual Destructor Necessary?&lt;br&gt;
When you delete an object through a pointer to a base class, C++ will call the base class destructor by default. If the base class destructor is not virtual, only the base class destructor will be called, leading to incomplete cleanup of resources allocated by the derived class. If the destructor is virtual, the destructor of the derived class is also called, allowing for proper cleanup.&lt;/p&gt;

</description>
      <category>virtualdestructor</category>
      <category>destructor</category>
      <category>cpp</category>
      <category>softwaredevelopment</category>
    </item>
    <item>
      <title>Cyber Security</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Tue, 17 Dec 2024 02:45:32 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/hackers-profile-1mon</link>
      <guid>https://dev.to/mahimabhardwaj/hackers-profile-1mon</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/mahimabhardwaj" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1077386%2F53e7d2d4-5fc0-4b56-8b67-fcdce74ad040.webp" alt="mahimabhardwaj"&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/mahimabhardwaj/attacker-profiles-and-motivations-e56" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;ATTACKER PROFILES AND MOTIVATIONS&lt;/h2&gt;
      &lt;h3&gt;Mahima Bhardwaj ・ Dec 16 '24&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#cybersecurity&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#networking&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#motivation&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
      <category>cybersecurity</category>
      <category>discuss</category>
    </item>
    <item>
      <title>ATTACKER PROFILES AND MOTIVATIONS</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Mon, 16 Dec 2024 21:38:18 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/attacker-profiles-and-motivations-e56</link>
      <guid>https://dev.to/mahimabhardwaj/attacker-profiles-and-motivations-e56</guid>
      <description>&lt;p&gt;&lt;u&gt;&lt;/u&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Script Kiddies
&lt;/h2&gt;

&lt;p&gt;&lt;br&gt;
They are the individuals with limited technical skills who readily use hacking tools and scripts to carry out  attacks . They often target small organization and may engage in hacking for fun.Script kiddies are often seen as nuisance rather than a significant threat to security professionals. Engaging in hacking activities can lead to legal case on them.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxp2qlmk916v5iusnrzu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fhxp2qlmk916v5iusnrzu.png" alt=" " width="368" height="288"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limited Technical Knowledge&lt;/strong&gt; - Script kiddies typically lack the &lt;br&gt;
   deep technical understanding than more experienced hackers possess. &lt;br&gt;
   They may not have the programming skills to develop their own tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Use of automated tools&lt;/strong&gt; - They are heavily rely on tools which are &lt;br&gt;
    created by skilled hackers.They may not have programming skills to &lt;br&gt;
    create their own tools.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Minimal Originality&lt;/strong&gt; -They just copy and paste code. They does not &lt;br&gt;
   have any knowledge of how code works.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Target easy Target&lt;/strong&gt; - They target small organization where they can easily find out security weakness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Limited Scope&lt;/strong&gt; - They simply engage in simple and easy attacks sucha s defacing websites(change the look of website without owner permission and replace its content), attempting DDOS(Distributed Denial of service attacks) or attempted basic Social Engineering.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Lack of ethics&lt;/strong&gt; - Some young or inexperienced hacker does not understand fully that whatever they are doing is illegal and can cause harm to businesses or people.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;/u&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Hactivists
&lt;/h2&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyyg40hbokepsfzybv13k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fyyg40hbokepsfzybv13k.png" alt=" " width="431" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;They are Hackers or group of Hackers. They are skilled in computer science technology and do hacking to raise social issues. They also conducts online actions such as website defacements,data breaches or DDOS attacks or other form of digital activism to achieve their goals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Motivated By ideals&lt;/strong&gt; - They are driven by social or political issues, and try to resolve those causes through their hacking skills. They may target audience or organization they see as opposing their ideals.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Political or social Activism&lt;/strong&gt; - They use their technical skills to raise awareness about social injustices,governments actions , censorship or other issues they deeply care about.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Civil Disobidience&lt;/strong&gt; - They use civil disobidience to leak sensitive information to expose corruption, surveillance(keeping an eye on someone), misconduct(Misbehavior). They often see themselves as whistleblowers(person who reports illegal, unethical or dishonest activities).&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Anonymity&lt;/strong&gt; - Many hactivists operate anonymity to avoid detection by law enforcements and hide their identities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Publicity and attention&lt;/strong&gt; -They want to grab media attention making their cause more visible and raising public awareness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Varied techniques&lt;/strong&gt; - Hactivists use varied techniques from website defacements to ddos attacks to bring awareness.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Diverse Groups&lt;/strong&gt; - Hactivist group can be varied in size from small organization to well stuctured large organization.&lt;/p&gt;

&lt;p&gt;&lt;u&gt;&lt;/u&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Cyber Criminals
&lt;/h2&gt;



&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl45q5zvxqtaksdcxugaf.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl45q5zvxqtaksdcxugaf.JPG" alt=" " width="243" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;They are motivated by financial gain. They engage in activites like credit card fraud, ransomaware attacks, identity theft and online scams to generate profits. They often target valuable information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Hacking:&lt;/strong&gt; Gaining unauthorized access to computer systems, networks, or databases with the intent to steal information, disrupt services, or compromise security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Malware Distribution:&lt;/strong&gt; Creating and distributing malicious software (malware) such as viruses, worms, Trojans, ransomware, and spyware to infect and control victims' devices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Phishing:&lt;/strong&gt; Sending deceptive emails or messages to trick individuals into revealing sensitive information, such as passwords, credit card details, or personal data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Identity Theft:&lt;/strong&gt; Stealing personal information to commit financial fraud, apply for loans or credit, or conduct other illegal activities using the victim's identity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Online Fraud:&lt;/strong&gt; Engaging in various forms of online fraud, including credit card fraud, online scams, or auction fraud, to deceive and defraud individuals or businesses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Distributed Denial of Service (DDoS) Attacks:&lt;/strong&gt; Overloading targeted websites or online services with massive amounts of traffic, rendering them inaccessible to legitimate users.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Data Breaches:&lt;/strong&gt; Illegally accessing and disclosing sensitive information, often resulting in data leaks that can have serious consequences for individuals and organizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber Extortion:&lt;/strong&gt; Threatening to release sensitive information or disrupt services unless a ransom is paid.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cyber Espionage:&lt;/strong&gt; Conducting cyber-attacks to gather sensitive information for political, economic, or competitive advantages.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Black Market Activities:&lt;/strong&gt; Participating in underground markets to buy and sell stolen data, credentials, hacking tools, or other illegal services.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  STATE-SPONSORED HACKERS
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;p&gt;They are hackers or group of hackers sponsored by state governments. They are also called nation state actors. These Hackers get money, tools and resources from government to carry out cyber attacks. They used adavned tools to carry out attacks and that are hard to detect.&lt;br&gt;
They attack other countries or organization for purposes like:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Political : Influencing election or creating political problems.&lt;/li&gt;
&lt;li&gt;Ecomomic : stealing financial or business data to help their own country.&lt;/li&gt;
&lt;li&gt;Military : Gaining acess to military plans and system.&lt;/li&gt;
&lt;li&gt;Intellgence: Collecting secret or sensitive Information.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Sophistication:&lt;/strong&gt; State-sponsored hackers are often highly skilled and well-funded, allowing them to develop and deploy advanced hacking techniques. They may use zero-day vulnerabilities, sophisticated malware, and complex attack strategies. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Target Diversity:&lt;/strong&gt; They target a wide range of organizations and entities, including other governments, political groups, defense contractors, critical infrastructure, technology companies, academic institutions, and more.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Espionage:&lt;/strong&gt; State-sponsored hackers often engage in cyber espionage to gather intelligence on political opponents, military capabilities, economic activities, and other sensitive information.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  INSIDERS
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffyhu1kf0ecsurhgrojvt.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ffyhu1kf0ecsurhgrojvt.png" alt=" " width="246" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Individuals who have authorized access to an organization's systems, networks, data, or facilities due to their status as employees.&lt;br&gt;
These individuals, by virtue of their access, have the potential to pose security risks if they misuse their privileges, intentionally or unintentionally.&lt;/p&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  Key Strategies to avoid Insiders Attack
&lt;/h2&gt;

&lt;p&gt;**&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Access Controls:&lt;/strong&gt; Implementing strict access controls based on the principle of least privilege to ensure that employees have access only to the resources necessary for their roles.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Security Awareness Training:&lt;/strong&gt; Educating employees about security best practices, recognizing phishing attempts, and understanding the importance of safeguarding sensitive information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Monitoring and Auditing:&lt;/strong&gt; Regularly monitoring user activity, network traffic, and system logs to detect unusual or suspicious behavior.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Incident Response Planning:&lt;/strong&gt; Having a well-defined incident response plan in place to address insider threats when they occur, minimizing damage and preventing future incidents.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Employee Support:&lt;/strong&gt; Creating a positive work environment with channels for reporting concerns and addressing employee grievances can help reduce the likelihood of disgruntled insiders.&lt;/p&gt;

&lt;h2&gt;
  
  
  ORGANIZED CYBERCRIME GROUPS
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frlhr2703k1140mwsrk2u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frlhr2703k1140mwsrk2u.png" alt=" " width="239" height="301"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Organized cybercrime groups are highly structured, often multinational, and well-coordinated entities that engage in various forms of cybercrime for financial gain, power, or other objectives. These groups use advanced hacking techniques, exploit vulnerabilities, and collaborate across borders to carry out their illegal activities. They pose significant threats to individuals, organizations, and even governments.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Russian Cybercriminal Syndicates:&lt;/strong&gt; Russia has been associated with several prominent cybercrime groups, including the likes of:&lt;br&gt;
Russian Business Network (RBN): Known for hosting malicious websites, malware distribution, and various cyber-attack services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Carbanak/Anunak:&lt;/strong&gt; Responsible for large-scale financial cybercrimes, targeting banks and financial institutions.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Evil Corp:&lt;/strong&gt; Known for ransomware attacks and widespread banking fraud.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Chinese APT Groups:&lt;/strong&gt; China has been linked to advanced persistent threat (APT) groups known for cyber espionage and targeted attacks:&lt;br&gt;
APT1 (Unit 61398): Believed to be associated with the Chinese military, responsible for stealing sensitive data from numerous organizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;In conclusion, the digital world is constantly under threat from a variety of cyber attackers, each with distinct motivations, techniques, and levels of expertise. Whether it's the mischievous script kiddies, ideologically driven hacktivists, financially motivated cybercriminals, highly skilled state-sponsored hackers, or even insiders with authorized access, the spectrum of cyber threats is vast. Understanding the nature of these attackers is essential for developing robust defenses and fostering a secure cyber ecosystem. Organizations must prioritize cybersecurity measures, educate their teams, and stay vigilant to mitigate risks and protect against these ever-evolving threats. The battle for digital security is ongoing, and only a proactive approach can ensure resilience in this landscape.&lt;/strong&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>motivation</category>
      <category>security</category>
    </item>
    <item>
      <title>Network Security Fundamentals</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sat, 14 Dec 2024 21:58:08 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/network-security-fundamentals-3p5b</link>
      <guid>https://dev.to/mahimabhardwaj/network-security-fundamentals-3p5b</guid>
      <description>&lt;p&gt;&lt;strong&gt;&lt;u&gt;The Connected Globe&lt;/u&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7og1gjtcqqafr7w9ltdu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7og1gjtcqqafr7w9ltdu.png" alt=" " width="661" height="414"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;With more than 5 billion internet users worldwide in 2022, which represents well over half of the world population , the internet connects &lt;br&gt;
businesses, governments and people across the globe.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Over reliance on internet will continue to grow, with nearly 30 billion devices and "things".&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Including autonomous vehicles, household appliances and wearable technology, and more connecting to the internet of things(IoT).&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Nearly 9 billion worldwide smartphone subscriptions using a total of 160 exabytes(EB) of monthly data by 2025.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The Net: How Things Connect&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;In the 1960s, the U.S. Defence Advanced Research Project Agency(DARPA) &lt;br&gt;
created  ARPANET, the precursor to the modern internet.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;ARPANET was the first packet-switched network which breaks data into small blocks(packets),transmits each individual packets from node to node towards its destination&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
      <category>networking</category>
      <category>networksecurity</category>
      <category>topology</category>
    </item>
    <item>
      <title>CyberAttacks Types and Techniques.</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Fri, 25 Oct 2024 18:39:31 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/cyberattacks-types-and-techniques-pcg</link>
      <guid>https://dev.to/mahimabhardwaj/cyberattacks-types-and-techniques-pcg</guid>
      <description>&lt;p&gt;&lt;strong&gt;Phishing&lt;/strong&gt;- It is one of the most common cyberattacks used by attackers to deceive individuals into revealing their sensitive information through misleading communication.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xpys5gmzvqlpf2wuza0.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2xpys5gmzvqlpf2wuza0.png" alt=" " width="385" height="428"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Phishing&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Vishing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Smishing&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Pharming&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Whaling&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Vishing&lt;/strong&gt; - In this type of phishing, malicious actors use voice communication—often via phone calls or voice messages—to deceive individuals into providing sensitive information, such as:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Credit card numbers&lt;/li&gt;
&lt;li&gt;Bank details&lt;/li&gt;
&lt;li&gt;Personal data&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjb0gfiw4wdg77lld1h4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbjb0gfiw4wdg77lld1h4.png" alt=" " width="225" height="225"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Smishing&lt;/strong&gt; -  is a type of phishing attack conducted via SMS (Short Message Service). In this method, attackers send text messages that often appear to come from a trusted source, such as a bank, service provider, or other reputable organization. The goal of these messages is to lead you to a malicious website, where they can steal your personal information.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdbw90w0q17oy3vvij6k2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdbw90w0q17oy3vvij6k2.png" alt=" " width="173" height="291"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pharming&lt;/strong&gt; - Impersonating Legitimate website to steal user credential.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6bou1b26fhu6czueisl9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6bou1b26fhu6czueisl9.png" alt=" " width="297" height="170"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Whaling&lt;/strong&gt; - In this technique attacker will target High-Profile individuals like politicians or celebrities.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnw0w2plgh726hz6r9gna.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnw0w2plgh726hz6r9gna.png" alt=" " width="300" height="168"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is Malware&lt;/strong&gt;&lt;br&gt;
It is a software that is designed to harm , disrupt or gain unauthorized access to a computer ,server or network. It can steal Data, Damage systems or allow unauthoruzed access to sensitive information. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Malware includes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foqg1jgbfze99rdk0gkv9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foqg1jgbfze99rdk0gkv9.png" alt=" " width="703" height="304"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Virus&lt;/strong&gt; - It attaches itself to file and spreads when those file opened or run.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kscebgimz962ik9vz63.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6kscebgimz962ik9vz63.png" alt=" " width="796" height="326"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Worm&lt;/strong&gt;- It replicates itself and spreads across networks without user interaction.It slows down computer or network.They run by themselves they don't need user interaction.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fahywzxm1xjnnxxqza6c4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fahywzxm1xjnnxxqza6c4.png" alt=" " width="499" height="261"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Ransomware&lt;/strong&gt; - it usually works by encripting data with a key unknown to the user. Payment through an Untraceable payment system is always the criminal's goal.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faqfrvrkjf6zrry06z0lz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faqfrvrkjf6zrry06z0lz.png" alt=" " width="647" height="294"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Social Engineering&lt;/strong&gt; &lt;br&gt;
It used to manipulate individuals into divulging sensitive information, performing specific actions , or compromising their security.This type of attack exploits human psychology, trust and natural behaviour to gain unauthorized access to syatems.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7tpahmyqnyro4b02vbs7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7tpahmyqnyro4b02vbs7.png" alt=" " width="426" height="538"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Shoulder Surfing&lt;/strong&gt;&lt;br&gt;
A criminal observes , or shoulder surfs, to pick up PINs, access codes or credit card numbers.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftp1pfqvqhpsofhibl7g2.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Ftp1pfqvqhpsofhibl7g2.png" alt=" " width="216" height="215"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Distributed DoS Attack (DDoS)&lt;/strong&gt;&lt;br&gt;
Similar to DOS attack, but it originates from multiple, coordinated sources. An attacker builds a network of infected hosts , called a botnet(Zombies).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fub8vmjoxpn57jeb7pq08.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fub8vmjoxpn57jeb7pq08.png" alt=" " width="712" height="323"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Spamming&lt;/strong&gt;&lt;br&gt;
It refers to practice of sending unsolicited and often repetitive messages. The intention for promiting products ,services or other content. Spam messages are sent in bulk to a large number of recepients.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F964jcdkk22eks209aij8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F964jcdkk22eks209aij8.png" alt=" " width="432" height="546"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Malvertising&lt;/strong&gt;&lt;br&gt;
In a malvertising attack, malicious code or links to malicious websites are embedded with legimate-looking ads.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqr3mfsb88hbcygq8nt4r.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fqr3mfsb88hbcygq8nt4r.png" alt=" " width="429" height="545"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SQL Injection&lt;/strong&gt;&lt;br&gt;
SQL injection is a type of cyberattack.It occurs when an attacker maliciously inserts SQL code within input fields of a web application. This attack exploits vulnerabilities in poorly sanitized user inputs. It allows the attacker to execute unauthorized SQL queries on the application's database.&lt;br&gt;
The primary goal of an SQL injection attack is to gain unauthorized access to the database.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8w7vtdtkkmycj1ru8fkh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8w7vtdtkkmycj1ru8fkh.png" alt=" " width="425" height="555"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Cross-Site Scripting(XSS)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Cross-Site Scripting (XSS) is a type of security vulnerability.&lt;br&gt;
It occurs when a web application allows malicious users to inject malicious scripts.This vulnerability arises when the application does not properly validate content before displayed to users.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7nc4i36jtbxsqmg6ko91.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F7nc4i36jtbxsqmg6ko91.png" alt=" " width="427" height="517"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Bots and Botnets&lt;/strong&gt;&lt;br&gt;
A bot (short for "robot" or "software robot") typically refers to a software program or script that performs automated tasks on the internet. Bots can be designed for a wide range of purposes, both legitimate and malicious. The term "bot" is often associated with automated actions performed on the internet, such as web crawling, data extraction, and interacting with online services.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0w0gyewdi7cxchu1tq0o.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F0w0gyewdi7cxchu1tq0o.png" alt=" " width="408" height="522"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Man-in-the-middle attack&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A criminal performs a man-in-the-middle (MitM) attack by intercepting communications between computers to steal information crossing the network.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fffq91kyuz29ka6uqh9tz.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fffq91kyuz29ka6uqh9tz.png" alt=" " width="393" height="282"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>linux</category>
      <category>ubuntu</category>
      <category>cli</category>
    </item>
    <item>
      <title>SQL INJECTION AND ITS TYPES.</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Tue, 22 Oct 2024 23:42:43 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/sql-injecttion-and-its-types-4kfl</link>
      <guid>https://dev.to/mahimabhardwaj/sql-injecttion-and-its-types-4kfl</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjiimzizovrcaz3n3t8ho.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjiimzizovrcaz3n3t8ho.png" alt=" " width="284" height="177"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;SQL Injection is a type of Cyberattack. It occurs when an attacker maliciously inserts sql code within input fields of a web application.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;This application Exploits Vulnerablities in poorly sanitized user inputs.&lt;/li&gt;
&lt;li&gt;It allows the attacker to execute unauthorized SQL queries on the application database.&lt;/li&gt;
&lt;li&gt;The Primary Goal of SQL Injection attack is to gain unauthorized access to the database.&lt;/li&gt;
&lt;li&gt;They Perform SQL Injection to modify , add or delete sensitive data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;How SQL Injection Attacks Works&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4fu3qlt8ctd5y59x5ft7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4fu3qlt8ctd5y59x5ft7.png" alt=" " width="265" height="190"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;User Input&lt;/strong&gt; -&amp;gt; Many web applications allow users to enter data through login forms, search boxes, or other fields. This user input is typically incorporated into SQL queries to interact with the database.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Lack of Sanitization&lt;/strong&gt; -&amp;gt; If the application does not properly validate, sanitize or escape this user input before using it in SQL query. It becomes vulnerable to SQL Injection.The untrusted input is treated as part of the SQL command , allowing the attacker to manipulate it.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Malicious Input&lt;/strong&gt; -&amp;gt; Attackers craft Inputs that include malicious SQL commands or fragments. This input is designed to alter the structure of SQL query to bypass Normal Logic.&lt;br&gt;
&lt;strong&gt;for example&lt;/strong&gt;&lt;br&gt;
In login form , an attacker might enter something like:&lt;br&gt;
&lt;code&gt;' OR '1'='1&lt;/code&gt;&lt;br&gt;
This can trick the SQL query into returning more data than intended or &lt;strong&gt;bypassing authentication&lt;/strong&gt; checks.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Attack Execution&lt;/strong&gt; -&amp;gt; The application executes the query, incorporating the attacker's input. Since the SQL injection changes the query’s behavior, it may lead to unintended actions, such as displaying sensitive data, modifying records, or performing administrative functions.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Impact&lt;/strong&gt; -&amp;gt; Depending on the nature of the vulnerability and the attacker’s goals, SQL injection can result in:&lt;br&gt;
&lt;strong&gt;Data exposure&lt;/strong&gt;: Access to sensitive information like usernames, passwords, and financial data.&lt;br&gt;
&lt;strong&gt;Data manipulation&lt;/strong&gt;: The ability to alter, insert, or delete data in the database.&lt;br&gt;
&lt;strong&gt;Control over the database&lt;/strong&gt;: In some cases, the attacker can gain administrative access or even execute system commands if the database privileges are high.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Types of SQL Injection&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;1&amp;gt; &lt;strong&gt;Classic SQL Injection&lt;/strong&gt; -&amp;gt; Inserting malicious SQL into a query , such as 'OR '1'=1 to &lt;strong&gt;bypass authentication&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;2&amp;gt; &lt;strong&gt;Blind SQL Injection&lt;/strong&gt;-&amp;gt; Attacker doesn’t see the database output but can infer information by sending true/false conditions.&lt;/p&gt;

&lt;p&gt;3&amp;gt; &lt;strong&gt;Error-based SQL Injection&lt;/strong&gt; -&amp;gt; Exploits error messages returned by the database to gain information.&lt;/p&gt;

&lt;p&gt;4&amp;gt;&lt;strong&gt;Union-based SQL Injection&lt;/strong&gt; -&amp;gt; Uses the UNION SQL operator to combine multiple select statements into a single result, potentially exposing more data.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;SQL Injection Prevention Methods&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Input Validation and Sanitization&lt;/strong&gt; -&amp;gt; Always validate and sanitize all user input before it is used in an SQL query.&lt;br&gt;
Use parameterized queries or prepared statements to ensure that inputs are treated as data and not executable code.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Avoid Dynamic SQL&lt;/strong&gt; -&amp;gt; Avoid creating dynamic SQL queries that concatenate user input directly into the query string.&lt;br&gt;
Static SQL should be used whenever possible, or parameterized queries where the structure of the SQL statement is predefined, and user input is passed as parameters.&lt;br&gt;
&lt;strong&gt;Bad Practice:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;"SELECT * FROM users WHERE username = '" + user_input + "'";
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Good Practice&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;SELECT * FROM users WHERE username = ?;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;Least Privilege&lt;/strong&gt;&lt;br&gt;
Ensure that the database account used by the web application has the minimum privileges required to operate. For instance:&lt;br&gt;
Only allow read permissions for retrieving data.&lt;br&gt;
Restrict write access unless necessary.&lt;br&gt;
Avoid granting administrative access to the database for standard queries.&lt;br&gt;
&lt;strong&gt;Regular Updates&lt;/strong&gt;&lt;br&gt;
Keep the web application, frameworks, and related libraries up to date. New vulnerabilities are discovered frequently, and patches are released to fix them.&lt;br&gt;
Regularly check for and apply security patches.&lt;br&gt;
&lt;strong&gt;Web Application Firewall (WAF)&lt;/strong&gt;&lt;br&gt;
A WAF can monitor, detect, and block malicious traffic before it reaches the web application. WAFs can provide an additional layer of security by filtering out potentially harmful SQL injection attempts.&lt;br&gt;
&lt;strong&gt;Security Testing&lt;/strong&gt;&lt;br&gt;
Conduct regular vulnerability assessments and penetration testing to identify weaknesses in the application.&lt;br&gt;
Use tools like SQLMap or automated scanners to test for SQL injection vulnerabilities.&lt;/p&gt;

</description>
      <category>sql</category>
      <category>sqlinjection</category>
      <category>cybersecurity</category>
      <category>database</category>
    </item>
    <item>
      <title>How to use chmod | Understanding File &amp; Directory Permissions</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sat, 24 Aug 2024 15:40:51 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/how-to-use-chmod-understanding-file-directory-permissions-2b0k</link>
      <guid>https://dev.to/mahimabhardwaj/how-to-use-chmod-understanding-file-directory-permissions-2b0k</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/JHUx4nXMwTo?feature=shared" rel="noopener noreferrer"&gt;Youtube&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;File permissions are key to managing a Linux system. They control who can access files and folders, helping keep the data safe and secure.&lt;/p&gt;

&lt;p&gt;Whether you’re a system administrator, developer, or just a regular user, it’s important to know how file permissions work. This article will explain file permissions in simple terms.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyyxtucx3n2ac1mbwaqg.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbyyxtucx3n2ac1mbwaqg.png" alt=" " width="800" height="241"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://youtu.be/JHUx4nXMwTo?feature=shared" rel="noopener noreferrer"&gt;In first step we will list all files and directories in long format using ls -l.&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;ls- to list all files and directories&lt;/li&gt;
&lt;li&gt; -l- this flag is used to list data in long format
&lt;/li&gt;
&lt;/ol&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;-rw-rw-r-- 1   rps rps 03 Aug 24  03:21 file2.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;If first chacater is hyphen then current object is file. we will divide current permission into 4 group.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;→ hyphen is denoting one group
rw- -&amp;gt; rw- is denoting second group
rw- -&amp;gt; rw- is denoting third group
r- — -&amp;gt; r — is denoting fourth group.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;second group is denoting user permission. user has access to read and write only.&lt;/p&gt;

&lt;p&gt;Third Group is denoting group access. group has access to read and write only.&lt;/p&gt;

&lt;p&gt;fourth group is denoting others. others has acces to read only.&lt;/p&gt;

&lt;p&gt;Note: here user and group has same name i.e rps.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63fqul9enog5ppdpt5e1.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F63fqul9enog5ppdpt5e1.png" alt=" " width="580" height="49"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;file2.txt&lt;br&gt;
In this image we can clearly see user has not access to execute the file2.txt. As we can see in image permission denied.&lt;/p&gt;

&lt;p&gt;To give permission to use user to execute file2.txt we will use chmod command.&lt;/p&gt;

&lt;p&gt;Before using chmod command first we understand chmod command .&lt;/p&gt;

&lt;p&gt;The chmod command in Linux is used to change the permissions of a file or directory. Permissions control who can read, write, or execute the file.&lt;/p&gt;

&lt;p&gt;r (read) — Permission to view the contents of a file or list the contents of a directory.&lt;br&gt;
w (write) — Permission to modify the contents of a file or make changes within a directory (like creating or deleting files).&lt;br&gt;
x (Execute): Permission to run a file as a program or script. For directories, it allows entering the directory.&lt;/p&gt;

&lt;p&gt;Execute Permission to user&lt;br&gt;
In the above Image we have given access to user to execute file2.txt.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;chmod u+x file2.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now user has permission to execute file2.txt&lt;br&gt;
./file2.txt&lt;br&gt;
when you will execute file2.txt it will successfully execute.&lt;/p&gt;

&lt;p&gt;To give the group permission to execute file2.txt&lt;/p&gt;

&lt;p&gt;&lt;code&gt;chmod g+x file2.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Group get access to execute file2.txt&lt;br&gt;
Now we will grant permission to others to write to and execute file2.txt.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;chmod o+wx file2.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now others has access to write and execute file2.txt.&lt;/p&gt;

&lt;p&gt;Now we want to revoke the write and execute permissions from the group for file2.txt.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;chmod g-wx file2.txt

&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;group had only access to read permission&lt;br&gt;
Now we want to revoke the write and execute permissions from the user for file2.txt.&lt;/p&gt;

&lt;p&gt;User has no access to write into file2.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;chmod u-wx file2.txt
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;txt&lt;br&gt;
Now I will give write permission to user for file2.txt&lt;/p&gt;

&lt;p&gt;&lt;code&gt;chmod u+w file2.txt&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Now user has permission to write into file2.txt.&lt;/p&gt;

&lt;p&gt;Summary for file permission&lt;br&gt;
Wrapping up&lt;br&gt;
Understanding Linux file permissions (how to find them, read them, and change them) is an important part of maintaining and securing your systems.&lt;/p&gt;

</description>
      <category>linux</category>
      <category>ubuntu</category>
      <category>terminal</category>
      <category>cli</category>
    </item>
    <item>
      <title>Host Website on Netlify for Free</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sat, 29 Jun 2024 15:10:17 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/host-website-on-netlify-for-free-10ig</link>
      <guid>https://dev.to/mahimabhardwaj/host-website-on-netlify-for-free-10ig</guid>
      <description>&lt;p&gt;First login to &lt;a href="https://youtu.be/4PFECfI-UiE?feature=shared" rel="noopener noreferrer"&gt;Netlify&lt;/a&gt; Website &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uykku9pfhcgyw2gct15.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6uykku9pfhcgyw2gct15.JPG" alt=" " width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then Go to Home and then select*&lt;em&gt;&lt;a href="https://youtu.be/4PFECfI-UiE?feature=shared" rel="noopener noreferrer"&gt; sites&lt;/a&gt;&lt;/em&gt;* . In sites select &lt;strong&gt;Add new site&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1crq94wurxq1805sdc37.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1crq94wurxq1805sdc37.JPG" alt=" " width="800" height="327"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After clicking on Add new site , if you want to deploy project present on &lt;strong&gt;Github&lt;/strong&gt; then select &lt;strong&gt;import an existing project&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6lvamol5709q8hgojcqy.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6lvamol5709q8hgojcqy.JPG" alt=" " width="800" height="350"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now click on &lt;strong&gt;Github icon&lt;/strong&gt;.It will redirect you to your Github Page&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frgh24z5443g7gp9f3qra.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frgh24z5443g7gp9f3qra.JPG" alt=" " width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Then &lt;strong&gt;Select your repo&lt;/strong&gt; which you want to deploy online.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg22k7ev2f892j7trvt39.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fg22k7ev2f892j7trvt39.JPG" alt=" " width="800" height="348"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After Selecting your repo . Give some name to your project in option Add &lt;strong&gt;site name&lt;/strong&gt; and then click on &lt;strong&gt;Deploy &lt;/strong&gt;. &lt;br&gt;
Successfully it will deploy your Project.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fggaw1wceemy5zhajz97u.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fggaw1wceemy5zhajz97u.JPG" alt=" " width="800" height="354"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;After some seconds it will generate one link for your project.&lt;br&gt;
it means your Project is successfully &lt;strong&gt;Deployed&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnm88i41srq0t4aphpi7r.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fnm88i41srq0t4aphpi7r.JPG" alt=" " width="800" height="338"&gt;&lt;/a&gt;&lt;br&gt;
Now &lt;strong&gt;click on that link&lt;/strong&gt; and you are able to see your project deployed online.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl1f8sl7szzu8mo7jjrkk.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fl1f8sl7szzu8mo7jjrkk.JPG" alt=" " width="800" height="444"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>javascript</category>
      <category>beginners</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>Host Website for FREE using Github Pages</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sun, 16 Jun 2024 15:11:54 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/host-website-for-free-using-github-pages-1496</link>
      <guid>https://dev.to/mahimabhardwaj/host-website-for-free-using-github-pages-1496</guid>
      <description>&lt;p&gt;-First Login to your &lt;strong&gt;Github account&lt;/strong&gt; and then choose the repository which you want to &lt;a href="https://youtu.be/bO1i5ObvdJg?feature=shared" rel="noopener noreferrer"&gt;deploy online&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc84kc644k7pwy0d3exy7.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fc84kc644k7pwy0d3exy7.JPG" alt=" " width="800" height="338"&gt;&lt;/a&gt;&lt;br&gt;
-Then go to settings and select pages&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e4jgj410bc1g27sof5a.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3e4jgj410bc1g27sof5a.JPG" alt=" " width="800" height="340"&gt;&lt;/a&gt;&lt;br&gt;
-After selecting pages go to &lt;strong&gt;branch option&lt;/strong&gt; and select branch as main&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvel26t1rlb71e9ue9cpy.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvel26t1rlb71e9ue9cpy.JPG" alt=" " width="800" height="333"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-Now save the changes and after &lt;strong&gt;selecting branch **and refresh the page **2-3 times&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcxe6681p3t4yu5qupxoy.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcxe6681p3t4yu5qupxoy.JPG" alt=" " width="800" height="393"&gt;&lt;/a&gt;&lt;br&gt;
-Now You will see a link it means your project is &lt;strong&gt;deployed&lt;/strong&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvtfv9ugsj2whih8q2ve2.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fvtfv9ugsj2whih8q2ve2.JPG" alt=" " width="800" height="325"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;-Now ,click on that link and &lt;strong&gt;visit you site&lt;/strong&gt; and you can see your project has  been &lt;strong&gt;successfully deployed&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fapuyp2gyp1z3t5ezx5jf.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fapuyp2gyp1z3t5ezx5jf.JPG" alt=" " width="800" height="382"&gt;&lt;/a&gt;&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>github</category>
      <category>javascript</category>
      <category>beginners</category>
    </item>
    <item>
      <title>Arrow Funcion In javascript</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Sat, 09 Mar 2024 20:58:44 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/arrow-funcion-in-javascript-mgj</link>
      <guid>https://dev.to/mahimabhardwaj/arrow-funcion-in-javascript-mgj</guid>
      <description>&lt;p&gt;&lt;a href="https://youtu.be/TUzDpvm3BOk?feature=shared" rel="noopener noreferrer"&gt;&lt;/a&gt;&lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8fpnjmr3jkymenki55fv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F8fpnjmr3jkymenki55fv.png" alt=" " width="285" height="177"&gt;&lt;/a&gt;**&lt;/p&gt;

&lt;h2&gt;
  
  
  &lt;strong&gt;First we need tho understand what is function&lt;/strong&gt;
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
&lt;strong&gt;&lt;a href="https://youtu.be/otz_EQ3z1HA?si=suKrtdJzfRbHGHyV" rel="noopener noreferrer"&gt;Function&lt;/a&gt;&lt;/strong&gt;- It is Block of statement  which take input as parameter and perform some operation on that input and return them as output.&lt;br&gt;
**&lt;/p&gt;

&lt;h2&gt;
  
  
  *&lt;em&gt;Syntax of  Normal Function *&lt;/em&gt;
&lt;/h2&gt;

&lt;p&gt;**&lt;br&gt;
&lt;code&gt;function HelloWorld()// function defintion&lt;br&gt;
{&lt;br&gt;
  console.log("Hii")&lt;br&gt;
}&lt;br&gt;
HelloWorld();// function calling&lt;/code&gt;&lt;br&gt;
Now, we need to understand &lt;br&gt;
&lt;strong&gt;--What is Arrow Function??&lt;/strong&gt;&lt;br&gt;
&lt;strong&gt;Arrow Function&lt;/strong&gt;-{()=&amp;gt;}-concise way of writing javascript function in shorter way.&lt;br&gt;
Introduced in ES6 version.It is anonymous function without a name.&lt;br&gt;
  &lt;strong&gt;Syntax of  Normal Arrow Function&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;const hello=()=&amp;gt;&lt;br&gt;
{&lt;br&gt;
  console.log("hello world");&lt;br&gt;
}&lt;br&gt;
hello();&lt;br&gt;
&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;&lt;a href="https://youtu.be/TUzDpvm3BOk?feature=shared" rel="noopener noreferrer"&gt;Arrow Function with parameters&lt;/a&gt;&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;const add=(a,b)=&amp;gt;&lt;br&gt;
{&lt;br&gt;
return a+b;&lt;br&gt;
}&lt;br&gt;
console.log(add(2,3))&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Simpler way of writing Arrow Function&lt;/strong&gt;&lt;br&gt;
&lt;code&gt;const diff=(a,b)=&amp;gt;a-b;&lt;br&gt;
console.log(diff(2,1))&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Note :- arguments keyword are not available in arrow function.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Spread Operator in arrow Function&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;const Number=(...num)=&amp;gt; console.log(num)&lt;br&gt;
Number(2,3,4,5,10) // [2,3,4,5,10]&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;First we need to understand &lt;strong&gt;what is Hoisting in javascript&lt;/strong&gt; so calling a function before defining it Known as  Function Hoisting.&lt;br&gt;
It does not give any difference in normal function for ex&lt;br&gt;
&lt;code&gt;multiply(3,2))//6&lt;br&gt;
function multiply(a,b)&lt;br&gt;
{&lt;br&gt;
 console.log(a*b);&lt;br&gt;
}&lt;/code&gt;&lt;br&gt;
But is not allowed in arrow function it will show error.&lt;/p&gt;

&lt;p&gt;before , discussing this keyword in arrow function let's see the working of this keyword in normal function declared inside object.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;const obj=&lt;br&gt;
{&lt;br&gt;
  name:'Radhika',&lt;br&gt;
  myFunction: function()&lt;br&gt;
{&lt;br&gt;
  console.log(this.name)&lt;br&gt;
},&lt;br&gt;
};&lt;br&gt;
obj.myFunction// 'Radhika'&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Here , in above code this keyword is working for this object only but if we declare this keyword inside arrow function it will show value as undefined let see the code of it.&lt;/p&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight plaintext"&gt;&lt;code&gt;

const obj=
{
  value:20,
  myFunction: ()=&amp;gt;
{
  console.log(this.value)
},
};
obj.myFunction()// undefined `


the reason behind is this that this keyword inside arrow function work for window not for that object inside which it is declared in case of arrow function.




&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;

</description>
      <category>javascript</category>
      <category>frontend</category>
      <category>webdev</category>
      <category>beginners</category>
    </item>
    <item>
      <title>FS Module in Node.js</title>
      <dc:creator>Mahima Bhardwaj</dc:creator>
      <pubDate>Fri, 01 Mar 2024 18:34:58 +0000</pubDate>
      <link>https://dev.to/mahimabhardwaj/fs-module-in-nodejs-18in</link>
      <guid>https://dev.to/mahimabhardwaj/fs-module-in-nodejs-18in</guid>
      <description>&lt;p&gt;File system module in Node.js provide an API for interacting with the file system on your computer. It allows you to perform various operations such as writing, creating , updating, deleting files and more.&lt;/p&gt;

&lt;p&gt;To use fs.module ypu need to require it in your node.js application&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepgpb9gcue4lw81ohvn1.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fepgpb9gcue4lw81ohvn1.JPG" alt=" " width="223" height="46"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Now,let’s explore some common use cases and example of working with file system module&lt;/p&gt;

&lt;p&gt;1&amp;gt; &lt;strong&gt;Reading a File&lt;/strong&gt;- You can read the content of using fs.read File method there’s Ex-&lt;br&gt;
Node.js File system is responsible for all asynchronous or synchronous I/O operations.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w820cz4dzh755cf5ni5.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9w820cz4dzh755cf5ni5.JPG" alt=" " width="363" height="32"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;fs.readFile is responsible for reading physical file asynchronously.&lt;/p&gt;

&lt;p&gt;filename- full path and name of a file as string&lt;br&gt;
options- parameter can be object or string which includes encoding is ‘utf-8’ and default flag is “r”.&lt;/p&gt;

&lt;p&gt;callback Function -with 2 parameters err and fd. this will get called when read file operation completes.&lt;/p&gt;

&lt;p&gt;*&lt;em&gt;2&amp;gt;Writing a File&lt;br&gt;
*&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjktwifcoekpvqo5bqurf.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjktwifcoekpvqo5bqurf.JPG" alt=" " width="616" height="164"&gt;&lt;/a&gt;&lt;br&gt;
You can write data to a file using fs.writeFile method.&lt;/p&gt;

&lt;p&gt;3&amp;gt;append a File- we can appendFile which takes three argument file name,data yo want to append and third callback function which will take parameter err . if there is any error it will throw err if there is no error then it will simply console log the msg.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenfs39te1ug23tryzov1.JPG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fenfs39te1ug23tryzov1.JPG" alt=" " width="575" height="195"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What Kind of operation we can perform in node.js are as follows-&lt;br&gt;
Importing the module&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Error Handling
2.Asynchronous and synchronous methods
3.File operations- reading, writing, updating, renaming, checking, deleting.
4.file streams&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>node</category>
      <category>webdev</category>
      <category>npm</category>
    </item>
  </channel>
</rss>
