-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy patharticles.html
132 lines (122 loc) · 4.45 KB
/
articles.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta name="description" content="Browse cybersecurity articles on T0fum4n's blog. Stay updated with the latest trends and best practices.">
<title>Articles | T0fum4n's Cybersecurity Blog</title>
<!-- Google Fonts -->
<link href="https://fonts.googleapis.com/css2?family=Roboto:wght@400;700&display=swap" rel="stylesheet">
<!-- CSS Styles -->
<style>
body {
margin: 0;
padding: 0;
font-family: 'Roboto', sans-serif;
background-color: #0d1117;
color: #c9d1d9;
}
header {
background-color: #161b22;
padding: 20px;
text-align: center;
border-bottom: 1px solid #30363d;
}
header h1 {
margin: 0;
font-size: 2.5rem;
letter-spacing: 2px;
color: #58a6ff;
}
nav a {
color: #c9d1d9;
text-decoration: none;
margin: 0 15px;
font-weight: 700;
}
nav a:hover {
color: #58a6ff;
}
.content {
padding: 40px 20px;
max-width: 1000px;
margin: auto;
}
.article {
background-color: #161b22;
border: 1px solid #30363d;
border-radius: 10px;
padding: 20px;
margin-bottom: 20px;
box-shadow: 0px 4px 6px rgba(0, 0, 0, 0.3);
display: flex;
align-items: flex-start;
}
.article img {
width: 150px;
height: auto;
margin-right: 20px;
border-radius: 8px;
}
.article h3 {
margin-top: 0;
color: #58a6ff;
}
.article p {
color: #8b949e;
font-size: 1.1rem;
}
footer {
background-color: #161b22;
text-align: center;
padding: 10px;
position: fixed;
bottom: 0;
width: 100%;
border-top: 1px solid #30363d;
}
footer p {
margin: 0;
color: #8b949e;
}
</style>
</head>
<body>
<header>
<h1>Articles</h1>
<nav>
<a href="index.html">Home</a>
<a href="about.html">About</a>
<a href="articles.html">Articles</a>
<a href="contact.html">Contact</a>
</nav>
</header>
<section class="content">
<div class="article">
<img src="images/articles/phishing-basics.jpg" alt="Phishing Basics">
<div>
<h3><a href="/blogs/whatisphishingarticle.html">Understanding Phishing Emails: How They Work and How to Spot Them...</a></h3>
<p>Phishing emails are a common cyber threat designed to trick users into revealing personal information or downloading malicious content. This article explains how phishing works, signs to look out for, and strategies to avoid falling victim to these deceptive messages.</p>
</div>
</div>
<div class="article">
<img src="images/articles/whatisavuln.jpg" alt="What is a vuln?">
<div>
<h3><a href="/blogs/what-is-a-vulnerability.html">What is a Vulnerability? Basics of Cyber Weak Points and How to Identify Them...</a></h3>
<p>In cybersecurity, a vulnerability is a flaw that attackers can exploit to access systems and data. This article introduces what vulnerabilities are, how they are discovered, and why understanding and addressing them is essential to security.</p>
</div>
</div>
<div class="article">
<img src="images/articles/ransomware-basics.jpg" alt="Ransomware Basics">
<div>
<h3>The Basics of Ransomware: How It Works and How to Protect Yourself (Coming Soon...)</h3>
<p>Ransomware is a form of malware that encrypts files and demands a ransom for their release. This article explores how ransomware attacks happen, common attack vectors, and effective steps to protect yourself and your organization from these costly incidents.</p>
</div>
</div>
<!-- Add more articles in the same format as needed -->
</section>
<footer>
<p>© 2024 T0fum4n. All rights reserved.</p>
</footer>
</body>
</html>