The main Goal of Security is to protect data or information which is being transmitted and achieve the Confidentiality Integrity & Availability of the data....
Security Attacks an attack is an action that comprises the information or network security. There are two types of attacks: Passive Attack and Active Attack...
Asymmetric key cryptography is called a public key cryptography.Asymmetric key cryptography two keys are used, one for encryption and other for decryption....
Symmetric key cryptography also called as Secret key cryptography.Symmetric key cryptography a single key is used for encryption as well as decryption....
A common use of JSON is to read data from a web server, and display the data in a web page. Objects in PHP can be converted into JSON by using the PHP function json_encode() in reverse you can use js...
Using PHP you can easily redirect your website visitors to a different page depending on where they come from. For example you may have 2 different web sites selling a product but only one customer ca...