Thursday, August 9, 2018

Blog Hacking Reasons and Security Tips




For What Reason Do Programmers Target Web Journals? 

Steal activity. Now and again programmers introduce concealed contents on your site that divert guests to one of their own destinations. They'll frequently set up modern decides that make it difficult for you to distinguish or find the malware. They at that point utilize your movement to profit. 

SEO spam. A programmer can utilize your site to distribute spam content, for instance, about professionally prescribed medications. While this helps their SEO, it can totally destroy your SEO or even get your site restricted from Google. 

Email spam. More than 100 billion spam messages are sent each day, fundamentally from a huge number of hacked sites. On the off chance that your site winds up one of them, your space name can get boycotted and your honest to goodness messages will never again be conveyed. Trust me, it's difficult to work when no one gets your messages! 





How Might I Shield My Site From Hackers? 

Counteractive action is the best fix with regards to site security. It's simpler and less expensive to keep a hack than it is to discover, settle and recuperate from one. 

Here are a couple of strategies bloggers can use to diminish the probability that programmers will effectively break your site: 

Keep your product Secure. This simple advance can incredibly upgrade your security. Turn on programmed refreshes for your blog programming, subjects, modules and different parts. This decreases the measure of time your site may be defenseless. On the off chance that programmed refreshes are unrealistic, set up email cautions so you know quickly when refreshes are accessible. You ought to likewise check physically for refreshes each week just on the off chance that any got lost in an outright flood. 

Use parts that are large effectively created. Abstain from utilizing more seasoned programming parts, (for example, subjects or modules) that are not being effectively kept up and refreshed. In the event that a security issue emerges and the designer doesn't discharge a fix, you'd need to investigate and make a fix yourself—expecting you were even mindful of the helplessness before your site was hacked 

Use more sophisticated passwords. You can guard against animal power assaults by making your passwords difficult to figure. Here are a couple of secret word rules from National Institute of Standards and Technology (NIST): 

o Make it long, 12-16+ characters is great 

o Avoid normal English words 

o Don't utilize your username in your secret word 

o Don't utilize normal secret word strings like 123, watchword, pass, and so forth. 

o Use numbers and accentuation, yet don't simply put a 1 or ! toward the end (every other person does that).

Uninstall applications you needn't bother with. Sites tend to gather parts after some time—applications, modules and topics that were introduced however are never again utilized. Expel every one of these segments so they can't be a conceivable vector for programmers to get to your site. 

Back up your site. This won't stop programmers, however it will make it a great deal less demanding to settle/reestablish your site if it's at any point hacked. 

Protect your gadgets. Programmers frequently utilize trojans on your PC, tablet or cell phone to take your site passwords. Guarantee you have progressed, breakthrough security programming introduced on the entirety of your gadgets. 

Set up checks. Introduce a day by day scanner to check your site for malware and vulnerabilities. This can alarm you to an issue so you can respond rapidly to settle it. 

Have a reaction design. While we'd jump at the chance to figure we could effectively fight off all assaults, the fact of the matter is more dreary. In case you're on the web, it's reasonable you'll in the end be hacked. Reviews show that 75%-90% of organizations are casualties of programmers every year. Plan ahead: 

o Set up alarms so you can rapidly see whether any issues happen. 

o Backup your site consistently, and keep reinforcement duplicates for no less than seven days. 

o Know who you can contact if your site needs repair, for example, a web designer with hack repair understanding or a cyber security group. 

Don't reuse passwords. For what reason is it such a major no-no to utilize a similar secret key for two sites? Information breaks happen constantly—in excess of 5 million records are hacked each day. Programmers at that point utilize these records to get to different records. So in the event that you utilized a similar secret word on Yahoo that you use for your site, the programmers that got 500 million Yahoo password should utilize then effortlessly get to your site. Also, don't figure your secret word will be sheltered on the grounds that programmers don't have room schedule-wise to deal with 500 million passwords. The present mechanized programming can process a huge number of records speedier than you can read this article. 

Install a propelled web application firewall (WAF). A "brilliant" web application firewall can identify and square assaults on your site. 

Review your code. In case you're utilizing exceptionally created blog programming, utilize the OWASP top 10 cheat sheets to audit the security of your blog's code. 

Minimize get to consents. The more clients who have administrator access to your blog, the more potential focuses. To limit programmer openings: 

o Remove clients who never again require get to 

o Only give clients the entrance they require—if proofreader access will do the trick, don't give administrator get to 

o Monitor logins so you know the IP address and username each time somebody sign into your site.





What Steps Would I Be Able To Take If My Site Is Hacked? 

Indeed, even with the best security on the planet, you're never 100% safe from programmers. It's an uncalled for diversion—to win, you need to guard each and every powerlessness each second of consistently, while the programmer just needs to locate a solitary helplessness to misuse for a couple of moments. So it's basic that you have a reaction design set up in the event that your site gets hacked. 

Here are the fundamental advances you'll have to take to manage a regular hack: 

1. Check and clear boycotts. Google and email specialist co-ops keep up boycotts of traded off sites. On the off chance that your site has been added to one of these boycotts, you'll have to get it expelled.

2. Change passwords quickly. Change all login points of interest identified with your site: FTP, database, WordPress, facilitating control board, and so forth. 

3. Scan your nearby computer(s). Programmers now and again utilize trojans to take site passwords from your neighborhood PC. 

4.  Lock down your site. Experience the counteractive action steps and think about finding a way to secure your site.

5. Document the issue. Deliberately record every marker of a hack that you've seen, which pages are influenced, and so forth.  

6. Change every one of your passwords once more. Just on the off chance that the programmers got a refreshed secret word before you got the hack totally evacuated. 

7. Find and expel the hack. The hack will frequently be malevolent code embedded into your site's PHP documents, or extra records transferred some place on your site. Note that numerous hacks will have different parts, for instance, an indirect access get to document, pernicious code added to your site records and new records transferred through the secondary passage get to. On the off chance that you have a spotless late reinforcement of your site, this can distinguish and evacuate the hack. 

The internet is a war zone. Everything we can do as bloggers is to make safeguard move, remain caution and be prepared to react if an episode happens.

Wednesday, August 8, 2018

How to Secure Your Blog - Prevent Hacking

Your Blog is a standout among the most vital matters in the world to you. The manner in which you talk with the outdoor world, share your interests, and conceivably even make your pay.


There are different individuals out there who don't sense a similar manner.

Those programmers need to take your blog and utilize it for benefit by either spamming promotion crammed posts to your blog or utilizing your supporter records for their criminal purposes.

At the off chance that your blog is assumed manipulate by a programmer, not exclusively may also you lose your blog, you could lose a part of your readership and your notoriety. it is justified irrespective of any trouble to ensure this does not arise.

The Basics : 

What is going for some thing remains of the internet doesn't alternate in your weblog. A large variety of the risks in your pc can affect your blog additionally, so that you need to hold up a regular watchfulness on the 2 fronts. recognize these nuts and bolts and realize them well.

Passwords and Usernames 

While it might be beneficial with the intention to have a simple mystery phrase, for instance, "Password123" or some thing comparative, programmers may have the potential to break one of these watchword in five minutes on a moderate day. You require some thing higher with diverse forms of characters, no words within the lexicon, and enough characters to hold the amount of viable consequences excessive (no less than 10). when you submit a decent one to reminiscence, you may not suppose one of these excellent quantity about the hassle, and it'll get much less worrying to do not forget another one every time you change it.

at the off threat that you are searching for a few instances of what a decent secret key resembles, take a look at the recorded instances under:

OpenIt786

!UnLockMe123

regarding your username, this typically might not be too ensured, however there are steps you could take. The greatest one isn't always utilizing "Administrator" as your username.

A huge range of endeavors and attacks programmers utilize will begin at the start that Admin is a username or profile name on the web site, so in case you're utilizing it you have made their activity a ton much less annoying. aside from this, clearly make a factor no longer handy your username out to all people. guard it as your watchword.

Protection software 

Your computer is hooked up for your blog, and there's not anything you can do to change that. inside the event that your pc is assaulted, don't forget accessories your blog assaulted additionally. Any treats or spared passwords for your machine may be stolen and used to get admission to your weblog.

You require safety programming on the greater a part of your devices, and you need to ensure it is refreshed reliably. There are each free projects and premium projects available. A part of the better loose objects include Panda free Antivirus, AVG free Antivirus, and Avira. A part of the first-rate premium tasks and brands contain Norton, McAfee, and Kaspersky general security.

every have their advantages and stumbling blocks (for example, Kaspersky is the maximum pricey, but has each thing you may want), and you should choose what is in your monetary plan and maximum excellent along with your requirements. consider it as an hobby on your weblog's survival.

Email safety 

Where your blog is concerned, your e mail protection is of equal importance on your trendy pc safety. in the event that a programmer figures out the way to get into your electronic mail account, they are able to quite correctly find out your mystery key or doubtlessly your username. that is however the numerous exceptional issues you have to control whilst your e-mail is hacked, (for example, ability fraud).

that is the cause your e-mail need to be the most secured account you've got. on the off chance which you are in particular cautious, you will need to make a one-of-a-kind e-mail for blogging purposes. you can likewise utilize it as a exclusive touch point for perusers so you can all the extra efficaciously kind out your messages. A 2nd e mail address is loose and simple to begin, so there may be no dilemma to setting one up (aside from time).

what is more, you'll want a strong watchword (see the suggestions sketched out earlier than). Your electronic mail record may also likewise produce other take a look at choices, for example, a protection image or security query you want to reply at anything factor you sign up on some other machine. Take any of these selectiaddaccessories, and word that you do not want to impart your e-mail to all people you meet.

Levels, Tools, and Plugins 

A solid web site web page is your first line of safeguard against potential programmers. Programmers aren't virtually languid, however they're deft and will assault the weakest blog they see. inside the occasion that your blog seems dated, it is security is probably dated, as nicely. endeavor to think how a predator accessorizes, and later on take measures with a purpose to ward them off. undertaking to do that from an all encompassing perspective, mulling over the level, the base weblog, and any modules you have delivered.

Most running a blog degrees, WordPress in particular amongst them, have a tremendous degree of gadgets and modules available to customers so that it will make your web page more comfortable. give us a threat to research absolutely the maximum mainstream and useful ones:

Acunetix WP protection experiment is one of the primary modules you have to down load in your blog. as soon as actuated, it will filter out your blog and plan for any capacity protection openings and after that advocate fixes for you. it is steadily enhancing and is an high-quality prologue to WordPress protection.

WordFence is possibly the most prominent and understood of all of the modules for WordPress at the existing time. The module examines the coding of your website, at that point upgrades your safety and purportedly makes it up to fifty instances speedier. It has a part of the pleasant blocking off highlights (you could square complete structures), will take a look at for each regular and not in reality ordinary gaps and spills, and has a firewall. there's an super desire that is tremendous, however the loose alternative is all that could in all likelihood be needed to shield your blog from normally risks.

Sucuri safety is a module from an business enterprise that represents full-size authority in inspecting and internet safety. it'll be part of numerous boycott automobiles onto your weblog to make sure it, and it has a massive amount of gazing highlights available so that you can understand each and every thing about the safety and movement on your web site. it's miles an outstanding all-around safety application.

Animal force Login safety is most likely your most solid choice inside the occasion which you are being centered with a botnet attack or, as the name recommends, a beast compel assault. since the extra a part of those styles of attacks are automated, you require a decent degree of assurance with the intention to work consequently for you, and this module will hinder the IP address of a programmer who endeavors to sign up too frequently. you can even get an electronic mail while this happens so that you recognize approximately the recurrence of attacks on your web page.

Some thing safety modules you pick out, make sure to discover them completely. several accessories are both outdated or malware in camouflage and could come up with an wrong feeling that every one is well with the arena. inside the most dire outcome possible, you can even be giving programmers a front entryway technique into assaulting your blog. Getting your paintings done will spare you a exquisite deal of coins over the long haul.

Tip from Kevin: stick to modules observed within the authority WordPress index. you may have the potential to look while a module turned into final refreshed, irrespective of whether it's appropriate with the maximum latest adaptation of WordPress, how regularly its engineers respond "bolster" questiaccessories, and the big name rating distinct clients have given it. additionally, all the modules are loose. i like loose.

A remaining tip with appreciate to this is to take a hour or so like clockwork to audit any applications you could use on your weblog. in the event that they're obsolete, do not falter to supplant them. Cybersecurity advances too swiftly to be in any way devoted to some thing that by no means once more works.

Utilize the latest version 

in the event that you are utilizing WordPress or any other facilitating management which has diverse forms, make sure you are utilising the modern-day one accessible. Programmers discover significantly extra protection openings and issues in extra established diversifications of running a blog degrees, and the hosts probable do not bolster them a lot at their maximum current object.

on the off threat that you could overhaul, do it now. There are few burdens to updating after the principle month (wherein they get the insects out), and you may make the most alternate highlights marketed.

Securing Your blog in a rush 

severa bloggers like to movement or paintings from out of doors the house, and this is an notable factor. It takes under consideration new factors of view and a faster, greater predictable charge of generation. Be that as it could, there are various dangers at the same time as blogging in a rush, and also you have to be installation for them with an appropriate studying and the proper apparatuses.

Open Networks 

almost about net security by and large, open structures are your most extraordinarily lousy foe and a programmer's closest accomplice. at the same time as they may be valuable to numerous folks who need to peruse the internet for not anything, a super many human beings don't have the foggiest idea about the function absence of safety a significant number of them have.

The most severe issue with an open device is that it's miles extraordinarily easy for everybody to seize your information transferred or downloaded at the machine. reflect onconsideration on your pc as a speak tower. every person with a recipient and the getting to know to utilize it may get the flag. sadly, the beneficiaries are not steeply-priced, and they're simply simple for even fledgling programmers to make use of.

at the point when your statistics is grabbed in this manner, it can with out lots of a stretch be utilized in opposition to you. attempt to envision if your passwords and usernames had been sincerely communicated decoded for somebody to get. on the off threat which you check in with out protection, this is the factor so that it will show up. Paradise prevent you strive net based saving money or weblog-related budgetary exchanges.

Make use of a VPN 

The maximum ideal technique to counter the issues of open structures is to utilize a virtual non-public network (VPN) to defend your self. What a VPN will do is associate your gadget by means of a scrambled association with some other server offsite. This affiliation can cross approximately as a passage and could veil your IP address, for you to allow you a most extreme level of security and safety. Programmers won't have the capacity to recognize anything, even on an open machine.

There are a wide variety of VPNs available, and a big quantity of them are particular. doing a little examination concerning the problem will permit you to find out which to use to avert programmers on open systems and similarly remain private.


Thanks for reading it ! Hope it will help you to secure your blogs
😏

Saturday, February 3, 2018

HTML - Class 6 - HTML Images






Assalam-U-Alikum Guys,

Welcome again, Today we learn about Images in HTML. Images are very important to beautify as well as to depict many complex things in simple way on your Web Page.



Never Doubt the Power of an Image


              Something that words not Explained But Image Can. means images play a vital role in understanding.This Tutorial POST will take you through simple steps to use images in your web page.


This Post Contains :

  • Insert an Image
  • Set Image Width and Height
  • Set Image Border
  • Set Image Alignments
  • Using an Image as a Links

Basic Syntax :
In HTML, <img> Tag is used for defining the images.
The <img> is an empty Tag, and it contains a list of attributes only. 
The <img> Tag has no ending tag.

<img src="address or URL" style="width:width
height:height;" alt="Any_text_to Display">
  • The src attribute specifies Address/Location of Image or the URL of the image.
  • The alt attribute shows an alternate text for an image, if you cannot view image because of an Error or Connection problem or if you URL or Address id invalid.


Insert an Image :
To insert an image in web page <img> is used and specify the address or location of image using src (source) attribute. 

Some Rules for src Attribute are :

  1. Make Sure that you specify a valid URL or Address for image.
  2. Image name is always be Case Sensitive.
  3. You can use these image Formats : JPEG, JPG, PNG, GIF or based on your need.  
Example :

<img src="D:images/bunny.jpg">


Set Image Width Height :
In HTML, you can also set the height and width of an image based on your requirement. For that purpose we can use Height and Width attributes of <img> Tag.

we can specify Height and Width in term of 
px  : that specify dimensions in pixels.
%  : Percentage of its original size.
em : allow you to change as per its parent element.


Example :



<img src="D:images/bunny.jpg" width="100pxheight="100px">


Set Image Border :
By default, image will have border around it with everything is zero as well as you can specify border thickness, color, type by as your needs by two ways.

First one in Style Attribute and second one is separately using the border attribute. 

A thickness zero (0) means no border arround the picture.


Example :



<img src="D:images/bunny.jpgwidth="100px" height="100px" border="3px">

<img src="D:images/bunny.jpgwidth="100px" height="100px" 
Style="border:solid 5px black;">


Set Image Alignments :
In HTML by default, Images are Left Aligned or at he Left side of web page but to align them as per need we use Align attribute to set it in right, left or center.

Example :

<img src="D:images/bunny.jpgwidth="100px" height="100px" 

align="center">


Using an Image as a Link

In HTML we can also use our images as a link, simply nest the <img> tag inside the <a> tag or write the <img> tag in between the <a> and </a> Tag.

<a href="https://weblayoutexpert.blogspot.com/">
  <img src="D:images/bunny.jpg"style="width:100px;height:100px;">
</a>



Thank you all for paying attention.

Good Bye (Allah Hafiz)

Tutor : Asad Saleem


Tuesday, January 30, 2018

HTML - Class 5 - HTML Comments


Comments in HTML
https://weblayoutexpert.blogspot.com/


Assalam-U-Alikum Guys,

Welcome again, Today we learn about Comment in HTML. Basically adding Comments will increase the Readability of our Code or programming. Let suppose you check your code after along period of time, at that you can't properly understand it if you add proper Comments in your source code during coding, that enable understanding about code even after passing many years. 

Now lets Start,

Introduction

The HTML Comment element is basically used to add the comments in an HTML document. Means comment elements make the content as disable code in a Web page, which is not take as part of code. Basically  purpose of Comments is readable explanation or annotation in the HTML code. 

  • The HTML comment elements begin with <!–– and the comment closes with ––>.
  • The HTML comment elements are not displayed in the web browser. 

For example:
------------------------------------------------------------------------------------------------------------------

<p><!-- this tag use for paragraph line --></p>

------------------------------------------------------------------------------------------------------------------


Multi-line Comments

In HTML, using comment elements you can also comments multiple lines text of a HTML page. Comment multiple line text must Begin with <!– tag and End with –> tag and place all text that treat as comment in this tag.

  • HTML comment can span multiple line in you HTML document.
  • Informative text comments when you explain to the code.
For Example:
------------------------------------------------------------------------------------------------------------------

   <body>
      <!--
         <p> This is a multiline comment </p>
         <p>It can span through as many as lines you like</p>
      -->
   </body>


------------------------------------------------------------------------------------------------------------------

Or

------------------------------------------------------------------------------------------------------------------

   <body>

      <h1>Welcome in HTML Tutorial.</h1> <!-- welcome heading that show in web page -->
   
   </body>
------------------------------------------------------------------------------------------------------------------

Conditional Comments

HTML conditional comments are nothing but exactly same like simple comment element in HTML that will be used by only Internet Explorer.
  • Conditional comments only work in IE.
  • Comments between <!–[if IE]> and <![endif]–>.
  • A conditional comment block that is ignored by down-level browsers.

Comment Tag (<comment>)

HTML comment <comment> element is used to insert comment in the source code of HTML. 

  • Comment Tag is supported by only few browsers.
  • It start with <comment> Tag and end with </comment> Tag.

For Example:

   <body>
      <p>IE is <comment>not</comment> supported the HTML comment                   tag.</p>
   </body>


Some more things :
  • If we use JavaScript in our HTML page. then "//" two Slashes in front of Text that need to make Comment.
  • If we are using the CSS in HTML page then "//" for single line Comment and /*...content....*/ is used for multi-line Commenting.


Thank you all for paying attention.

Good Bye (Allah Hafiz)

Tutor : Asad Saleem

HTML - Class 4 Text Formatting in HTML

Assalam u Alikum Guys, 

Welcome again,

Today we learn about Text Formatting in HTML

Basically Formatting is known as the appearance or look or presentation of our Text in HTML. Formatting is also know as layout of Text.
HTML provide Tags for Formatting of Text
For Example : Bold Text, Italic Text, Underline Text, Strike Text, Monospaced Font, Super-Script Text, Sub-Script Text, Inserted Text, Deleted Text, Larger Text, Smaller Text, Grouping Content.

One by one all above Tags will Explain with Example.

Bold Text (<b>) Tag

<b> Tag is used Bold the Text in HTML without any extra Importance.
<b> Tag always start with <b> and end with </b>

HTML Example :
---------------------------------------------------------------------------------
<p>My mother has <b>blue</b> eyes.</p>
---------------------------------------------------------------------------------

Italic Text (<i>) Tag

<i> Tag is used make the Text Italic in HTML without any extra Importance. Means Text slant the text little bit toward right side.
<i> Tag always start with <i> and end with </i>

HTML Example :
---------------------------------------------------------------------------------
<p>My mother has <i>blue</i> eyes.</p>
---------------------------------------------------------------------------------

Underline Text (<u>) Tag

<u> Tag is used make the Text Underlined in HTML without any extra Importance. Means all the Text between <u>.........</u> displayed with underline.
<u> Tag always start with <u> and end with </u>

Strike Text () Tag

<strike> Tag put a line through the Text in HTML. Means all the Text between <strike>.........</strike> displayed with Strike-through which is thin line through the Text.
<strike> Tag always begin with <strike> and end with </strike>

HTML Example :
---------------------------------------------------------------------------------
<p>My father has <u>blue</u> eyes.</p>
---------------------------------------------------------------------------------

Mono-spaced Font (<tt>) Tag

<tt> Tag is used in HTML to display the Text in Mono-Spaced means "Each letter in the text have same distance or width with its neighbor letter". Most of the fonts are known as variable-width fonts because different letter have different widths. 
(Example : The Letter "M" has greater width than an another Letter "I") 
but in Mono-Spaced fonts each and every letter has same or equal width.
<tt> Tag always begin with <tt> and end with </tt>

HTML Example :
---------------------------------------------------------------------------------
<p>My <tt>uncle has blue</tt> eyes.</p>
---------------------------------------------------------------------------------

Super-Script Text (<sup>) Tag

The content or Text between the <sup>..........</sup> Tags/Element is written in form of Super-Script the font size is same as the character surrounding it but is displayed half a character's height. 
(Example : Mostly in mathematics we write "Square of 'x' " as X² is the Example of Super-Script).

HTML Example :
---------------------------------------------------------------------------------
<p>The Square of 'x' " is written as X<sup>2</sup>. 2 is Super-Script().</p>
---------------------------------------------------------------------------------

Sub-Script Text (<sub>) Tag

Its description is totally as same as the Super-Script. The Difference is 
<sub>.........</sub> element is used. 
(Example : Mostly in Chemistry we write a Formula "H2O" as H₂O is the Example of Sub-Script).

HTML Example :
---------------------------------------------------------------------------------
<p>In the formula "H<sub>2<sub>O" is written as as H₂O  . 2 is Sub-Script.</p>
---------------------------------------------------------------------------------

Inserted Text (<ins>) Tag

Anything that is Appeared within the <ins>.......</ins> element is displayed or present as Inserted Text.The formal difference between depends on the HTML specification that we choose to regard as official.

HTML Example :
---------------------------------------------------------------------------------
<p>My mother has <ins>blue</ins> eyes.</p>
---------------------------------------------------------------------------------

Deleted Text (<del>) Tag

Anything that is Appeared within <del>.......</del> element is displayed or present as Deleted Text.The formal difference between depends on the HTML specification that we choose to regard as official.

HTML Example :
---------------------------------------------------------------------------------
<p>My mother has <del>brown</del> eyes.</p>
---------------------------------------------------------------------------------

Larger Text (<big>) Tag

Anything that is written within the <big>.......</big> element is displayed little bit larger or one font larger than the rest of Text.

HTML Example :
---------------------------------------------------------------------------------
<p>My father has <big>black</big> eyes.</p>
---------------------------------------------------------------------------------

Smaller Text (<small>) Tag

Anything that is written within the <small>.......</small> element is displayed little bit smaller or one font smaller than the rest of Text.

HTML Example :
---------------------------------------------------------------------------------
<p>My sister has <small>green</small> eyes.</p>
---------------------------------------------------------------------------------

Grouping Content (<div>, <Span>) Tag

In HTML <div>, <Span> tags are used for grouping the elements or allow us to group together several elements to create sections or sub sections of page.
Means the Tag divide the elements in Block Form. 
(Example : More than one <p> or other tags within <div>........</div> elements and also can apply same designing to all elements in that <div>.)
The <span> tag enable in Web page to group/blocked inline-elements in a document/Web page.

The <span> tag makes no visual effect by itself.

HTML Example :
---------------------------------------------------------------------------------
<div style="color:#0000FF">
  <h3>This is Div Example heading</h3>
  <p>This is Div Example paragraph.</p>
</div>
---------------------------------------------------------------------------------
<p>My baby has <span style="color:blue">blue</span> eyes.</p>
---------------------------------------------------------------------------------


Thanks for paying attention !

NOTE : Friends and Fellow Plzzzzzzzzzzzzzzzzz Follow me to get my post. You get Notification on each new Post. Thank You.


If you get any Mistake or any confusion in POST so plzzzzzzz tell in Comments. Questions are also be Entertained.

Tutor : Asad Saleem