Knowledge Treasure

  • Home
  • About
  • Contact
Home / Archive for May 2024

Real historical figures in Assassin's creed odyssey (Part 1).

Chamathka Kariyawasam May 29, 2024 Add Comment
Assassin's Creed Odyssey is based on ancient Greece from BC 431 to BC 422. The game tells the mythological history of the Peloponnesian ...
Read More

How to use lists in Python

Chamathka Kariyawasam May 22, 2024 Add Comment
Lists Lists use for store multiple values in a single variable. we can use square brackets to create a list. list can conation one or more d...
Read More

How to scan web directories using dirb tool.

Chamathka Kariyawasam May 20, 2024 Add Comment
 Dirb tool Dirb is a web directory scanning tool that comes on kali Linux. This tool can use by penetration testers for scan hidden files, d...
Read More

How to extend the volume on partition of HDD or SSD

Chamathka Kariyawasam May 19, 2024 Add Comment
How to extend the volume on partition   Firstly right click on the windows icon on the task bar and select Disk Management option. If not yo...
Read More

How to use if/elif/else statements in python

Chamathka Kariyawasam May 17, 2024 Add Comment
if/elif/else statements  in python When you need to include a selection part into a python program, you can use the if statement with a cond...
Read More
Variables and Keywords in python

Variables and Keywords in python

Chamathka Kariyawasam May 16, 2024 Add Comment
Variables and Keywords in python Variables Variable is a value that can be change by the effect of the conditions or processes in the progra...
Read More
Python (Programming Language)

Python (Programming Language)

Chamathka Kariyawasam May 14, 2024 Add Comment
Python (programming language) P ython was created by Guido van Rossum in 1991. Python is easier than other programming languages. Therefore ...
Read More
Newer Posts Home
Subscribe to: Comments ( Atom )
  • Popular Post
  • Categories

Popular Posts

  • What can someone do with Ip address

Labels

  • Assassin's creed
  • communications standards
  • Cyber-security
  • Data
  • databases
  • games
  • Kali-linux
  • Network
  • odyssey
  • Programming
  • Protocols
  • Python
  • Storage Management
  • Tor
  • Tutorial

Featured post

What is a data breach?

Powered by Blogger.

Search This Blog

Blog Archive

  • July 2024 (1)
  • June 2024 (9)
  • May 2024 (7)

About

Knowledge Treasure is a premier technology article website dedicated to delivering insightful, well-researched, and up-to-date content across a wide range of tech-related topics. Our mission is to empower readers with knowledge that enhances their understanding of the rapidly evolving world of technology. From in-depth analyses of the latest innovations in artificial intelligence and cybersecurity to comprehensive guides on software development and data science, Knowledge Treasure serves as a reliable resource for tech enthusiasts, professionals, and students alike. With contributions from industry experts and thought leaders, we ensure that each article is not only informative but also engaging and accessible, making complex concepts understandable for all. Whether you are seeking to stay current with technological advancements or looking to deepen your expertise, Knowledge Treasure is your go-to source for all things tech..

Menu

  • Home
  • About
  • Contact

Contact form

Name

Email *

Message *

Popular Posts

  • What Is Network Topology and Types of Network Topologies?
    Network topology refers to the arrangement or layout of elements in a computer network. Such as computers, switches, routers, printers, fi...
  • What can someone do with Ip address
    What can someone do with Ip address An Internet Protocol (IP) address is a unique identifier that devices use to connect to the network. I...
  • What Is Tor, How it works, Is it Safe and legal?
    What is TOR network and browser? The onion router(Tor) is a web browser that can access the internet using the Tor network. Tor project is...
  • What is a data breach?
     What is a data breach? A data breach is a critical security incident in which unauthorized individuals gain access to confidential, sensi...
© 2024 Knowledge Trasure by Chamathka Kariyawasam | All Rights Reserved | Theme Distributed By
  • Home
  • About
  • Contact