{"id":7,"date":"2026-03-09T11:56:41","date_gmt":"2026-03-09T11:56:41","guid":{"rendered":"https:\/\/coresectech.com\/?page_id=7"},"modified":"2026-03-09T12:39:26","modified_gmt":"2026-03-09T12:39:26","slug":"home","status":"publish","type":"page","link":"https:\/\/coresectech.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"7\" class=\"elementor elementor-7\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9f2e651 e-flex e-con-boxed e-con e-parent\" data-id=\"9f2e651\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39ff4d0 elementor-widget elementor-widget-html\" data-id=\"39ff4d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<!DOCTYPE html>\r\n<html lang=\"en\">\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\r\n<title>CoreSecTech | Cybersecurity & High\u2011Tech Platform<\/title>\r\n<meta name=\"description\" content=\"CoreSecTech - Networking, Linux, Cybersecurity and IT tutorials\">\r\n<meta name=\"keywords\" content=\"cybersecurity tutorials, linux commands, networking guides, ethical hacking tools, sysadmin tips\">\r\n<meta name=\"robots\" content=\"index, follow\">\r\n\r\n<!-- Google AdSense (add your ca-pub ID after approval) -->\r\n<!--\r\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-XXXXXXXXXXXX\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n-->\r\n<link rel=\"preconnect\" href=\"https:\/\/fonts.googleapis.com\">\r\n<link rel=\"preconnect\" href=\"https:\/\/fonts.gstatic.com\" crossorigin>\r\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Poppins:wght@400;600;700;800&family=Inter:wght@400;500;600&display=swap\" rel=\"stylesheet\">\r\n\r\n<style>\r\n:root{\r\n--bg-light:#f4f7fb;\r\n--text-light:#0b0f15;\r\n--accent:#7c3aed;\r\n--accent2:#00f0ff;\r\n--dark:#030507;\r\n--card:#0b0f15;\r\n--text:#e6edf3;\r\n--muted:#8b9bb0;\r\n--border:#1a2330;\r\n--glow:0 0 25px rgba(124,58,237,0.35);\r\n}\r\n\r\n*{margin:0;padding:0;box-sizing:border-box}\r\n\r\nbody{\r\ntransition:background .3s,color .3s;\r\nfont-family:Inter,sans-serif;\r\nbackground:radial-gradient(circle at 20% 20%,#0a0f1a,#030507 60%);\r\ncolor:var(--text);\r\noverflow-x:hidden;\r\n-webkit-tap-highlight-color:transparent;\r\n}\r\n\r\n\/* LIGHT THEME *\/\r\nbody.light{\r\nbackground:var(--bg-light);\r\ncolor:var(--text-light);\r\n}\r\n\r\nbody.light header{background:#ffffff;border-bottom:1px solid #e5e7eb}\r\nbody.light .menu a{color:#111}\r\nbody.light .card{background:#ffffff;border:1px solid #e5e7eb;color:#111}\r\nbody.light .card p{color:#555}\r\nbody.light .section-title span{color:#7c3aed}\r\nbody.light footer{background:#f1f5f9}\r\nbody.light input{background:#ffffff;color:#111}\r\nbody.light .hero h1{background:linear-gradient(90deg,#0b0f15,#7c3aed);-webkit-background-clip:text;-webkit-text-fill-color:transparent}\r\nbody.light .hero p{color:#475569}\r\nbody.light .hero-stats h3{color:#0b0f15}\r\nbody.light .btn{color:#fff}\r\n\r\n\r\n.container{max-width:1200px;margin:auto;padding:20px}\r\n\r\n\/* CONTENT + SIDEBAR LAYOUT FOR ADSENSE *\/\r\n.content-layout{\r\n display:grid;\r\n grid-template-columns: 1fr 300px;\r\n gap:40px;\r\n}\r\n\r\n.sidebar-ad{\r\n position:sticky;\r\n top:120px;\r\n}\r\n\r\n@media(max-width:900px){\r\n .content-layout{grid-template-columns:1fr}\r\n .sidebar-ad{position:relative}\r\n}\r\n\r\n\/* PRELOADER *\/\r\n#preloader{\r\nposition:fixed;\r\ninset:0;\r\nbackground:#020409;\r\ndisplay:flex;\r\nalign-items:center;\r\njustify-content:center;\r\nz-index:4000;\r\n}\r\n\r\n.loader{\r\nwidth:80px;height:80px;border-radius:50%;\r\nborder:3px solid #0f1a25;\r\nborder-top:3px solid var(--accent2);\r\nanimation:spin 1s linear infinite;\r\n}\r\n\r\n\/* HEADER *\/\r\nheader{\r\nposition:sticky;\r\ntop:0;\r\nz-index:1000;\r\nbackground:#0b0f14;\r\nborder-bottom:1px solid #111;\r\n}\r\n\r\n.nav{display:flex;justify-content:space-between;align-items:center}\r\n\r\n.logo{\r\nfont-family:Poppins;\r\nfont-weight:700;\r\nfont-size:22px;\r\ncolor:var(--accent2);\r\ntext-decoration:none;\r\nletter-spacing:1px;\r\ntext-shadow:0 0 10px rgba(0,240,255,0.6);\r\n}\r\n\r\n.menu{display:flex;gap:28px;align-items:center}\r\n.menu a{text-decoration:none;color:var(--text);font-weight:500}\r\n.menu a:hover{color:var(--accent2)}\r\n\r\n.nav-actions{display:flex;gap:14px}\r\n\r\n.nav-btn{padding:8px 16px;border-radius:8px;border:1px solid var(--accent);color:#fff;text-decoration:none;font-size:14px}\r\n\r\n.nav-btn.primary{background:linear-gradient(135deg,var(--accent),var(--accent2));border:none}\r\n\r\n.menu-btn{display:none;font-size:26px;background:none;border:none;color:#fff}\r\n\r\n\/* HERO *\/\r\n.hero{min-height:90vh;display:flex;align-items:center}\r\n\r\n.hero-grid{display:grid;grid-template-columns:1fr 1fr;gap:40px;align-items:center}\r\n\r\n.hero h1{\r\nfont-family:Poppins;\r\nfont-size:clamp(42px,6vw,72px);\r\nmargin-bottom:20px;\r\nletter-spacing:3px;\r\nbackground:linear-gradient(90deg,#ffffff,var(--accent2));\r\n-webkit-background-clip:text;\r\n-webkit-text-fill-color:transparent;\r\n}\r\n\r\n.hero p{max-width:520px;color:var(--muted);margin-bottom:30px}\r\n\r\n.btn{background:linear-gradient(135deg,var(--accent),var(--accent2));color:#fff;padding:12px 26px;border-radius:10px;text-decoration:none;font-weight:600;box-shadow:var(--glow)}\r\n\r\n.hero-stats{display:flex;gap:60px;margin-top:40px}\r\n.hero-stats h3{font-size:32px;color:#fff}\r\n.hero-stats span{color:var(--muted);font-size:14px}\r\n\r\n.hero-visual{display:flex;justify-content:center}\r\n\r\n.sphere{\r\nwidth:300px;height:300px;border-radius:50%;\r\nbackground:radial-gradient(circle at 30% 30%,#00f0ff,#7c3aed 60%,#000);\r\nbox-shadow:0 0 80px rgba(124,58,237,0.6);\r\nanimation:spin 20s linear infinite;\r\n}\r\n\r\n@keyframes blink{0%,50%,100%{opacity:1}25%,75%{opacity:0}}\r\n\r\n@keyframes spin{\r\n0%{transform:rotate(0deg)}\r\n100%{transform:rotate(360deg)}\r\n}\r\n\r\n.section-title{text-align:center;margin-bottom:60px}\r\n.section-title h2{font-size:44px;font-family:Poppins}\r\n.section-title span{color:var(--accent2)}\r\n\r\n.grid{display:grid;grid-template-columns:repeat(auto-fit,minmax(260px,1fr));gap:30px}\r\n\r\n.card{\r\nbackground:linear-gradient(145deg,#0b0f15,#06090f);\r\npadding:30px;border-radius:18px;border:1px solid var(--border);\r\ntransition:0.35s\r\n}\r\n\r\n.card:hover{\r\nborder-color:var(--accent);\r\ntransform:translateY(-8px);\r\nbox-shadow:0 10px 40px rgba(124,58,237,0.25)\r\n}\r\n\r\n.icon-circle{\r\nwidth:56px;height:56px;border-radius:50%;\r\nbackground:radial-gradient(circle,var(--accent2),transparent);\r\nbox-shadow:0 0 20px rgba(0,240,255,0.6);\r\nmargin-bottom:18px\r\n}\r\n\r\n.card h3{margin-bottom:10px;font-family:Poppins}\r\n.card p{color:var(--muted)}\r\n\r\n.section{padding:100px 0}\r\n\r\n\/* MATRIX BACKGROUND *\/\r\n.matrix-bg{\r\nposition:fixed;\r\nleft:0;\r\ntop:0;\r\nwidth:100%;\r\nheight:100%;\r\npointer-events:none;\r\nopacity:0.08;\r\nz-index:-1;\r\nbackground-image:linear-gradient(rgba(0,240,255,0.15) 1px, transparent 1px),linear-gradient(90deg, rgba(0,240,255,0.15) 1px, transparent 1px);\r\nbackground-size:40px 40px;\r\n}\r\n\r\n\/* CURSOR GLOW *\/\r\n.cursor-glow{\r\nposition:fixed;\r\nwidth:300px;\r\nheight:300px;\r\nborder-radius:50%;\r\npointer-events:none;\r\nbackground:radial-gradient(circle, rgba(0,240,255,0.18), transparent 60%);\r\ntransform:translate(-50%,-50%);\r\nz-index:0;\r\n}\r\n\r\n.reveal{opacity:0;transform:translateY(40px);transition:all .8s ease}\r\n.reveal.show{opacity:1;transform:translateY(0)}\r\n\r\nfooter{background:#05080b;border-top:1px solid #111;padding:60px 0 30px 0;margin-top:120px}\r\n\r\n.footer-grid{display:grid;grid-template-columns:repeat(auto-fit,minmax(220px,1fr));gap:40px;margin-bottom:40px}\r\n\r\n.footer-col h4{font-family:Poppins;margin-bottom:14px}\r\n.footer-col p{color:var(--muted);font-size:14px}\r\n\r\n.footer-links a{display:block;margin:6px 0;text-decoration:none;color:var(--muted);font-size:14px}\r\n.footer-links a:hover{color:var(--accent2)}\r\n\r\n.footer-social{display:flex;gap:12px;margin-top:10px}\r\n.footer-social span{width:36px;height:36px;border-radius:50%;border:1px solid var(--border);display:flex;align-items:center;justify-content:center;font-size:14px}\r\n\r\n.footer-bottom{text-align:center;color:var(--muted);font-size:13px;border-top:1px solid #111;padding-top:20px}\r\n\r\n@media(max-width:900px){\r\n.hero-grid{grid-template-columns:1fr;text-align:center}\r\n.hero-stats{justify-content:center}\r\n}\r\n\r\n\/* MOBILE OPTIMIZATIONS *\/\r\n@media (hover:none) and (pointer:coarse){\r\n  .cursor-glow{display:none}\r\n}\r\n\r\ncanvas{max-width:100%;height:auto}\r\n\r\n\/* prevent terminal overflow *\/\r\n#heroTerminal{\r\nmax-height:220px;\r\noverflow:auto;\r\n}\r\n\r\n#terminalInput{font-size:16px}\r\n\r\n.hero-stats{flex-wrap:wrap;gap:30px}\r\n\r\n.hero{min-height:auto;padding:60px 0}\r\n\r\n@media(max-width:700px){\r\n.menu{position:fixed;top:60px;left:0;right:0;background:#0b0f14;flex-direction:column;padding:20px;display:none}\r\n.menu.show{display:flex}\r\n.menu-btn{display:block}\r\n.nav-actions{display:none}\r\n}\r\n\r\n<\/style>\r\n<\/head>\r\n\r\n<body>\r\n\r\n<div id=\"preloader\"><div class=\"loader\"><\/div><\/div>\r\n\r\n<div class=\"matrix-bg\"><\/div>\r\n<div class=\"cursor-glow\" id=\"cursorGlow\"><\/div>\r\n\r\n<header>\r\n<div class=\"container nav\">\r\n<a class=\"logo\" href=\"#\">CoreSecTech<\/a>\r\n<button class=\"menu-btn\" onclick=\"toggleMenu()\">\u2630<\/button>\r\n\r\n<div class=\"menu\" id=\"menu\">\r\n<a href=\"#\">Home<\/a>\r\n<a href=\"#blog\">Blog<\/a>\r\n<a href=\"#categoryGrid\">Categories<\/a>\r\n<a href=\"#toolsGrid\">Tools<\/a>\r\n<a href=\"about.html\">About<\/a>\r\n<a href=\"contact.html\">Contact<\/a>\r\n<\/div>\r\n\r\n<div class=\"nav-actions\">\r\n<button class=\"nav-btn\" id=\"themeBtn\" onclick=\"toggleTheme()\">\ud83c\udf19<\/button>\r\n<a class=\"nav-btn\" onclick=\"openLogin()\">Login<\/a>\r\n<a class=\"nav-btn primary\" href=\"#\">Get Started<\/a>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"container\" style=\"padding-top:0;padding-bottom:10px\">\r\n<div style=\"max-width:500px;margin:auto\">\r\n<input id=\"siteSearch\" placeholder=\"Search tutorials, tools, guides...\" style=\"width:100%;padding:12px 16px;border-radius:10px;border:1px solid var(--border);background:#0b0f15;color:var(--text);outline:none\">\r\n<\/div>\r\n<\/div>\r\n<\/header>\r\n\r\n<!-- READING PROGRESS BAR -->\r\n<div id=\"progressBar\" style=\"position:fixed;top:0;left:0;height:3px;background:linear-gradient(90deg,var(--accent),var(--accent2));width:0%;z-index:2000\"><\/div>\r\n\r\n<!-- TOP AD PLACEHOLDER (AdSense) -->\r\n<div class=\"container\" style=\"margin-top:20px;margin-bottom:10px;text-align:center\">\r\n<div style=\"min-height:90px;border:1px dashed #2a3342;border-radius:8px;padding:20px;color:#8b9bb0;font-size:14px\">\r\nAdSense Banner Area (728x90)\r\n<\/div>\r\n<\/div>\r\n\r\n<section class=\"hero container\">\r\n<div class=\"hero-grid\">\r\n\r\n<div>\r\n<h1>CORESECTECH<\/h1>\r\n<p>Unlock the future with powerful networking, Linux and cybersecurity knowledge built for IT professionals.<\/p>\r\n<a class=\"btn\" href=\"#\">Start Learning<\/a>\r\n\r\n<div class=\"hero-stats\">\r\n<div><h3 data-count=\"250\">0<\/h3><span>Readers Monthly (K)<\/span><\/div>\r\n<div><h3 data-count=\"75\">0<\/h3><span>Guides Published<\/span><\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"hero-visual\" style=\"flex-direction:column;gap:20px\">\r\n\r\n<canvas id=\"globeCanvas\" width=\"320\" height=\"320\" style=\"max-width:320px;background:#020409;border-radius:50%;border:1px solid var(--border);box-shadow:0 0 40px rgba(0,240,255,0.25)\"><\/canvas>\r\n\r\n<div style=\"background:#020409;border:1px solid var(--border);border-radius:14px;padding:22px;width:100%;max-width:420px;box-shadow:0 0 40px rgba(0,240,255,0.15);font-family:monospace\">\r\n<div style=\"color:#8b9bb0;font-size:13px;margin-bottom:10px\">coresectech@terminal<\/div>\r\n<pre id=\"heroTerminal\" style=\"color:#00f0ff;white-space:pre-wrap;line-height:1.6;margin:0\"><\/pre>\r\n<div style=\"display:flex;align-items:center;margin-top:6px;font-family:monospace\">\r\n<span style=\"color:#8b9bb0;margin-right:6px\">coresectech@lab:~$<\/span>\r\n<input id=\"terminalInput\" autocomplete=\"off\" style=\"flex:1;background:#020409;border:none;color:#00f0ff;outline:none;font-family:monospace\">\r\n<\/div>\r\n<span id=\"terminalCursor\" style=\"display:inline-block;width:10px;background:#00f0ff;margin-left:4px;animation:blink 1s infinite\"><\/span>\r\n<\/div>\r\n\r\n<\/div>\r\n\r\n<\/div>\r\n<\/section>\r\n\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Cybersecurity <span>Services<\/span><\/h2><\/div>\r\n<div class=\"grid\">\r\n<div class=\"card\"><div class=\"icon-circle\"><\/div><h3>Network Security<\/h3><p>Enterprise firewall configuration and infrastructure protection.<\/p><\/div>\r\n<div class=\"card\"><div class=\"icon-circle\"><\/div><h3>Penetration Testing<\/h3><p>Identify vulnerabilities using ethical hacking techniques.<\/p><\/div>\r\n<div class=\"card\"><div class=\"icon-circle\"><\/div><h3>Linux Hardening<\/h3><p>Secure Linux servers and automate system protection.<\/p><\/div>\r\n<div class=\"card\"><div class=\"icon-circle\"><\/div><h3>Incident Response<\/h3><p>Rapid detection and response to cyber attacks.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- CATEGORIES -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Explore <span>Categories<\/span><\/h2><\/div>\r\n<div class=\"grid\" id=\"categoryGrid\">\r\n<div class=\"card\" data-cat=\"network\"><div class=\"icon-circle\"><\/div><h3>Networking<\/h3><p>LAN, VLAN, routing, switching and infrastructure tutorials.<\/p><\/div>\r\n<div class=\"card\" data-cat=\"linux\"><div class=\"icon-circle\"><\/div><h3>Linux<\/h3><p>Server administration, shell scripting and hardening.<\/p><\/div>\r\n<div class=\"card\" data-cat=\"cyber\"><div class=\"icon-circle\"><\/div><h3>Cybersecurity<\/h3><p>Ethical hacking, penetration testing and SOC tools.<\/p><\/div>\r\n<div class=\"card\" data-cat=\"windows\"><div class=\"icon-circle\"><\/div><h3>Windows Admin<\/h3><p>Active Directory, PowerShell and enterprise management.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- FEATURED ARTICLE -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Featured <span>Article<\/span><\/h2><\/div>\r\n<div class=\"content-layout\">\r\n\r\n<div class=\"card\" style=\"padding:40px\">\r\n<h2 style=\"font-family:Poppins;margin-bottom:10px\">Complete Guide to Securing Your Office Network<\/h2>\r\n<p style=\"color:var(--muted);margin-bottom:20px\">Learn how IT professionals secure enterprise networks using VLAN segmentation, firewall rules, intrusion detection systems and proper monitoring.<\/p>\r\n<a class=\"btn\" href=\"#\">Read Full Guide<\/a>\r\n<\/div>\r\n\r\n<div class=\"sidebar-ad\">\r\n<div class=\"card\" style=\"margin-bottom:20px\">\r\n<h3 style=\"margin-bottom:10px\">Trending Guides<\/h3>\r\n<ul style=\"line-height:1.8;color:var(--muted)\">\r\n<li>Top Linux Commands for Sysadmins<\/li>\r\n<li>Best Cybersecurity Tools<\/li>\r\n<li>Nmap Scanning Tutorial<\/li>\r\n<li>Wireshark Packet Analysis<\/li>\r\n<li>Firewall Security Best Practices<\/li>\r\n<\/ul>\r\n<\/div>\r\n\r\n<div class=\"card\">\r\n<h3 style=\"margin-bottom:10px\">Popular Categories<\/h3>\r\n<ul style=\"line-height:1.8;color:var(--muted)\">\r\n<li>Networking<\/li>\r\n<li>Linux<\/li>\r\n<li>Cybersecurity<\/li>\r\n<li>Windows Administration<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- RELATED ARTICLES -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Related <span>Articles<\/span><\/h2><\/div>\r\n<div class=\"grid\" id=\"relatedArticles\">\r\n<div class=\"card\"><h3>How VLAN Segmentation Improves Network Security<\/h3><p>Understand how VLANs isolate traffic and protect enterprise infrastructure.<\/p><\/div>\r\n<div class=\"card\"><h3>Beginner Guide to Nmap Network Scanning<\/h3><p>Learn basic Nmap commands used by security professionals.<\/p><\/div>\r\n<div class=\"card\"><h3>Wi\u2011Fi Security Best Practices<\/h3><p>Steps to secure wireless networks in offices and home labs.<\/p><\/div>\r\n<div class=\"card\"><h3>Linux Server Hardening Checklist<\/h3><p>Essential steps to secure production Linux servers.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- BLOG GUIDES -->\r\n<section class=\"section container reveal\" id=\"blog\">\r\n<div class=\"section-title\"><h2>Latest <span>Guides<\/span><\/h2><\/div>\r\n\r\n<div class=\"content-layout\">\r\n\r\n<div>\r\n<div class=\"grid\" id=\"blogGrid\">\r\n\r\n<div class=\"card\" data-title=\"wifi security\">\r\n<h3>Secure Your Wi\u2011Fi Network<\/h3>\r\n<p>Protect routers and wireless networks from cyber threats.<\/p>\r\n<\/div>\r\n\r\n<!-- IN FEED AD -->\r\n<div class=\"card\" style=\"display:flex;align-items:center;justify-content:center;border:1px dashed #2a3342;color:#8b9bb0;min-height:180px\">\r\nAdSense In\u2011Feed Ad\r\n<\/div>\r\n\r\n<div class=\"card\" data-title=\"linux commands\">\r\n<h3>Top Linux Commands for Admins<\/h3>\r\n<p>Essential commands every system administrator should know.<\/p>\r\n<\/div>\r\n\r\n<div class=\"card\" data-title=\"network troubleshooting\">\r\n<h3>Network Troubleshooting Guide<\/h3>\r\n<p>Diagnose connectivity issues in enterprise networks.<\/p>\r\n<\/div>\r\n\r\n<!-- IN FEED AD -->\r\n<div class=\"card\" style=\"display:flex;align-items:center;justify-content:center;border:1px dashed #2a3342;color:#8b9bb0;min-height:180px\">\r\nAdSense In\u2011Feed Ad\r\n<\/div>\r\n\r\n<div class=\"card\" data-title=\"cyber tools\">\r\n<h3>Best Cybersecurity Tools<\/h3>\r\n<p>Popular open\u2011source tools used by ethical hackers.<\/p>\r\n<\/div>\r\n\r\n<\/div>\r\n<\/div>\r\n\r\n<!-- SIDEBAR ADS -->\r\n<div class=\"sidebar-ad\">\r\n\r\n<div style=\"border:1px dashed #2a3342;border-radius:10px;padding:20px;text-align:center;color:#8b9bb0;margin-bottom:20px\">\r\nSidebar Ad (300x250)\r\n<\/div>\r\n\r\n<div style=\"border:1px dashed #2a3342;border-radius:10px;padding:20px;text-align:center;color:#8b9bb0\">\r\nSticky Ad (300x600)\r\n<\/div>\r\n\r\n<\/div>\r\n\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- ================= BLOG ARTICLE TEMPLATE SYSTEM ================= -->\r\n<!-- Example article links now point to article pages like: \/articles\/linux-commands.html -->\r\n\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Featured <span>Tutorial<\/span><\/h2><\/div>\r\n\r\n<div class=\"card\" style=\"max-width:900px;margin:auto\">\r\n<h2 style=\"font-family:Poppins;margin-bottom:10px\">Top Linux Commands Every Sysadmin Should Know<\/h2>\r\n<p style=\"color:var(--muted);margin-bottom:20px\">A practical list of essential Linux commands used daily by system administrators for monitoring, networking and troubleshooting servers.<\/p>\r\n\r\n<p><strong>1. top<\/strong> \u2013 monitor CPU and memory usage in real time.<\/p>\r\n<p><strong>2. df -h<\/strong> \u2013 check disk usage of mounted drives.<\/p>\r\n<p><strong>3. netstat -tulnp<\/strong> \u2013 list listening network ports.<\/p>\r\n<p><strong>4. journalctl<\/strong> \u2013 view system logs in systemd based systems.<\/p>\r\n\r\n<pre style=\"background:#020409;padding:14px;border-radius:10px;border:1px solid var(--border);margin:16px 0\"><code>\r\nssh admin@192.168.1.10\r\nsudo apt update\r\nsudo apt upgrade\r\n<\/code><\/pre>\r\n\r\n<p>These commands are fundamental for maintaining Linux infrastructure in enterprise environments.<\/p>\r\n\r\n<div style=\"margin-top:20px\">\r\n<a class=\"btn\" href=\"#\">Share Article<\/a>\r\n<\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- RELATED POSTS UNDER ARTICLE -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Recommended <span>Reads<\/span><\/h2><\/div>\r\n<div class=\"grid\">\r\n<div class=\"card\"><h3>Linux Server Hardening Guide<\/h3><p>Steps to secure production servers.<\/p><\/div>\r\n<div class=\"card\"><h3>Understanding SSH Security<\/h3><p>Best practices to protect remote server access.<\/p><\/div>\r\n<div class=\"card\"><h3>Monitoring Linux Performance<\/h3><p>Use htop, vmstat and iostat for diagnostics.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- BLOG SYSTEM STRUCTURE GUIDE -->\r\n<!--\r\nRecommended folder structure for the blog system:\r\n\r\ncoresectech\/\r\n\u2502\r\n\u251c index.html\r\n\u251c blog.html                (all articles list)\r\n\u251c articles\/\r\n\u2502   \u251c linux-commands.html\r\n\u2502   \u251c nmap-tutorial.html\r\n\u2502   \u251c wireshark-guide.html\r\n\u2502   \u2514 vlan-explained.html\r\n\u2502\r\n\u251c assets\/\r\n\u2502   \u251c css\/\r\n\u2502   \u251c js\/\r\n\u2502   \u2514 images\/\r\n\u2502\r\n\u251c privacy.html\r\n\u251c terms.html\r\n\u251c disclaimer.html\r\n\u251c about.html\r\n\u2514 contact.html\r\n\r\nEach article page should include:\r\n- article title\r\n- meta description\r\n- author\r\n- publish date\r\n- related articles\r\n- adsense blocks\r\n\r\n-->\r\n\r\n<!-- POPULAR ARTICLES -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Popular <span>Articles<\/span><\/h2><\/div>\r\n<div class=\"grid\">\r\n<div class=\"card\"><h3>Nmap Complete Guide<\/h3><p>Learn how to scan networks, detect open ports and identify vulnerabilities using Nmap.<\/p><\/div>\r\n<div class=\"card\"><h3>Wireshark Packet Analysis<\/h3><p>Understand network traffic and troubleshoot connectivity problems with Wireshark.<\/p><\/div>\r\n<div class=\"card\"><h3>Firewall Security Best Practices<\/h3><p>Best firewall rules and configurations to protect enterprise infrastructure.<\/p><\/div>\r\n<div class=\"card\"><h3>Top Linux Commands for Sysadmins<\/h3><p>Essential Linux commands used by system administrators in production servers.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- AI ARTICLE GENERATOR -->\r\n<section class=\"section container reveal\" style=\"text-align:center\">\r\n<div class=\"section-title\"><h2>AI <span>Article Generator<\/span><\/h2><\/div>\r\n<div class=\"card\" style=\"max-width:700px;margin:auto\">\r\n<p style=\"color:var(--muted);margin-bottom:14px\">Enter a topic and generate a starter tutorial structure for your blog.<\/p>\r\n<input id=\"aiTopic\" placeholder=\"Example: Nmap Port Scanning Tutorial\" style=\"width:70%;max-width:360px;padding:12px;border-radius:8px;border:1px solid var(--border);background:#06090f;color:#fff;margin-right:10px\">\r\n<button class=\"btn\" onclick=\"generateArticle()\">Generate<\/button>\r\n<div id=\"aiArticleOutput\"><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- NEWSLETTER SUBSCRIBE -->\r\n<section class=\"section container reveal\" style=\"text-align:center\">\r\n<div class=\"card\" style=\"max-width:700px;margin:auto\">\r\n<h2 style=\"font-family:Poppins;margin-bottom:10px\">Join the Cybersecurity Newsletter<\/h2>\r\n<p style=\"color:var(--muted);margin-bottom:20px\">Get weekly cybersecurity tips, Linux tutorials and networking guides directly in your inbox.<\/p>\r\n<input placeholder=\"Enter your email\" style=\"width:70%;max-width:320px;padding:12px;border-radius:8px;border:1px solid var(--border);background:#06090f;color:#fff;margin-right:10px\">\r\n<button class=\"btn\">Subscribe<\/button>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- TOOLS DIRECTORY -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Security <span>Tools<\/span><\/h2><\/div>\r\n<div class=\"grid\" id=\"toolsGrid\">\r\n<div class=\"card\"><h3>Nmap<\/h3><p>Network discovery and port scanning tool.<\/p><\/div>\r\n<div class=\"card\"><h3>Wireshark<\/h3><p>Packet analysis for network troubleshooting.<\/p><\/div>\r\n<div class=\"card\"><h3>Metasploit<\/h3><p>Penetration testing framework.<\/p><\/div>\r\n<div class=\"card\"><h3>Burp Suite<\/h3><p>Web application security testing platform.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- CYBER TERMINAL -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Cyber <span>Terminal<\/span><\/h2><\/div>\r\n<div class=\"card\" style=\"background:#020409;font-family:monospace\">\r\n<pre id=\"terminal\" style=\"color:#00f0ff;white-space:pre-wrap;line-height:1.6\"><\/pre>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- LIVE CYBER ATTACK MAP -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Live <span>Threat Map<\/span><\/h2><\/div>\r\n<div class=\"card\" style=\"padding:20px;text-align:center\">\r\n<canvas id=\"attackMap\" width=\"900\" height=\"400\" style=\"max-width:100%;background:#020409;border-radius:12px;border:1px solid var(--border)\"><\/canvas>\r\n<p style=\"color:var(--muted);margin-top:10px\">Simulated global cyber attack visualization<\/p>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- DASHBOARD PREVIEW -->\r\n<section class=\"section container reveal\">\r\n<div class=\"section-title\"><h2>Security <span>Dashboard<\/span><\/h2><\/div>\r\n<div class=\"grid\">\r\n<div class=\"card\"><h3>Threat Alerts<\/h3><p>3 suspicious login attempts detected.<\/p><\/div>\r\n<div class=\"card\"><h3>Network Devices<\/h3><p>128 active devices monitored.<\/p><\/div>\r\n<div class=\"card\"><h3>Firewall Logs<\/h3><p>245 intrusion attempts blocked today.<\/p><\/div>\r\n<div class=\"card\"><h3>Patch Status<\/h3><p>12 servers pending security updates.<\/p><\/div>\r\n<\/div>\r\n<\/section>\r\n\r\n<!-- MID ARTICLE AD PLACEHOLDER -->\r\n<div class=\"container\" style=\"margin:60px auto;text-align:center\">\r\n<div style=\"min-height:250px;border:1px dashed #2a3342;border-radius:8px;padding:30px;color:#8b9bb0\">\r\nAdSense In\u2011Content Ad Area (300x250)\r\n<\/div>\r\n<\/div>\r\n\r\n<footer>\r\n\r\n<div class=\"container footer-grid\">\r\n\r\n<div class=\"footer-col\">\r\n<h4>CoreSecTech<\/h4>\r\n<p>Advanced cybersecurity, networking and Linux knowledge platform for IT professionals.<\/p>\r\n<div class=\"footer-social\">\r\n<span>\ud835\udd4f<\/span>\r\n<span>in<\/span>\r\n<span>\u25b6<\/span>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"footer-col footer-links\">\r\n<h4>Resources<\/h4>\r\n<a href=\"#blog\">Blog<\/a>\r\n<a href=\"#toolsGrid\">Tools<\/a>\r\n<a href=\"#categoryGrid\">Categories<\/a>\r\n<a href=\"#\">Guides<\/a>\r\n<\/div>\r\n\r\n<div class=\"footer-col footer-links\">\r\n<h4>Company<\/h4>\r\n<a href=\"about.html\">About<\/a>\r\n<a href=\"contact.html\">Contact<\/a>\r\n<a href=\"#\">Careers<\/a>\r\n<\/div>\r\n\r\n<div class=\"footer-col footer-links\">\r\n<h4>Legal<\/h4>\r\n<a href=\"privacy.html\">Privacy Policy<\/a>\r\n<a href=\"terms.html\">Terms & Conditions<\/a>\r\n<a href=\"disclaimer.html\">Disclaimer<\/a>\r\n<\/div>\r\n\r\n<div class=\"footer-col footer-links\">\r\n<h4>Community<\/h4>\r\n<a href=\"#\">GitHub<\/a>\r\n<a href=\"#\">YouTube<\/a>\r\n<a href=\"#\">LinkedIn<\/a>\r\n<a href=\"#\">Discord<\/a>\r\n<\/div>\r\n\r\n<\/div>\r\n\r\n<div class=\"footer-bottom\">\u00a9 2026 CoreSecTech \u2014 Cybersecurity Knowledge Platform<\/div>\r\n\r\n<\/footer>\r\n\r\n<div id=\"loginModal\" style=\"position:fixed;inset:0;background:rgba(0,0,0,0.6);display:none;align-items:center;justify-content:center;z-index:2000\">\r\n<div style=\"background:#0b0f15;padding:30px;border-radius:14px;border:1px solid var(--border);width:320px\">\r\n<h3 style=\"font-family:Poppins;margin-bottom:16px\">Login<\/h3>\r\n<input placeholder=\"Username\" style=\"width:100%;margin-bottom:10px;padding:10px;border-radius:8px;border:1px solid var(--border);background:#06090f;color:#fff\">\r\n<input type=\"password\" placeholder=\"Password\" style=\"width:100%;margin-bottom:14px;padding:10px;border-radius:8px;border:1px solid var(--border);background:#06090f;color:#fff\">\r\n<button class=\"btn\" style=\"width:100%;margin-bottom:8px\" onclick=\"closeLogin()\">Login<\/button>\r\n<button onclick=\"closeLogin()\" style=\"width:100%;padding:8px;border-radius:8px;border:1px solid var(--border);background:transparent;color:#aaa\">Cancel<\/button>\r\n<\/div>\r\n<\/div>\r\n\r\n<script>\r\n\r\n\/* PRELOADER *\/\r\nfunction hidePreloader(){\r\n  const p=document.getElementById('preloader');\r\n  if(p) p.style.display='none';\r\n}\r\n\r\n\/\/ hide when page fully loads\r\nwindow.addEventListener('load', hidePreloader);\r\n\r\n\/\/ fallback for preview environments where load may not fire\r\nwindow.addEventListener('DOMContentLoaded', ()=>{\r\n  setTimeout(hidePreloader, 600);\r\n});\r\n\r\nfunction toggleMenu(){\r\nconst menu=document.getElementById('menu');\r\nmenu.classList.toggle('show');\r\n}\r\n\r\nfunction openLogin(){document.getElementById('loginModal').style.display='flex'}\r\nfunction closeLogin(){document.getElementById('loginModal').style.display='none'}\r\n\r\n\/* CURSOR GLOW *\/\r\nconst glow=document.getElementById('cursorGlow');\r\nlet glowX=0,glowY=0,glowRAF=false;\r\ndocument.addEventListener('mousemove',e=>{\r\n glowX=e.clientX;\r\n glowY=e.clientY;\r\n if(!glowRAF){\r\n  glowRAF=true;\r\n  requestAnimationFrame(()=>{\r\n    glow.style.left=glowX+'px';\r\n    glow.style.top=glowY+'px';\r\n    glowRAF=false;\r\n  });\r\n }\r\n});\r\n\r\n\/* SCROLL REVEAL *\/\r\nconst reveals=document.querySelectorAll('.reveal');\r\nconst observer=new IntersectionObserver(entries=>{\r\nentries.forEach(entry=>{\r\nif(entry.isIntersecting){entry.target.classList.add('show');}\r\n});\r\n});\r\nreveals.forEach(el=>observer.observe(el));\r\n\r\n\/* COUNTER ANIMATION *\/\r\ndocument.querySelectorAll('[data-count]').forEach(el=>{\r\nlet target=+el.dataset.count;\r\nlet count=0;\r\nlet step=target\/80;\r\nlet i=setInterval(()=>{\r\ncount+=step;\r\nif(count>=target){count=target;clearInterval(i)}\r\nel.innerText=Math.floor(count);\r\n},20);\r\n});\r\n\r\n\/* SEARCH FILTER *\/\r\nconst search=document.getElementById('siteSearch');\r\nif(search){\r\nsearch.addEventListener('input',()=>{\r\nconst q=search.value.toLowerCase();\r\n\r\n document.querySelectorAll('#blogGrid .card').forEach(c=>{\r\n const t=c.innerText.toLowerCase();\r\n c.style.display=t.includes(q)?'block':'none';\r\n });\r\n\r\n document.querySelectorAll('#toolsGrid .card').forEach(c=>{\r\n const t=c.innerText.toLowerCase();\r\n c.style.display=t.includes(q)?'block':'none';\r\n });\r\n});\r\n}\r\n\r\n\r\n\/* THREE.JS CYBER GLOBE *\/\r\nconst canvas=document.getElementById('globeCanvas');\r\nif(canvas){\r\n const ctx=canvas.getContext('2d');\r\n let angle=0;\r\n function draw(){\r\n  ctx.clearRect(0,0,canvas.width,canvas.height);\r\n  const cx=160,cy=160,r=120;\r\n  ctx.strokeStyle='#00f0ff';\r\n  ctx.lineWidth=1;\r\n\r\n  for(let i=0;i<16;i++){\r\n    ctx.beginPath();\r\n    const a=angle+i*Math.PI\/8;\r\n    const ry=r*Math.abs(Math.cos(a));\r\n    ctx.ellipse(cx,cy,r,ry,0,0,Math.PI*2);\r\n    ctx.stroke();\r\n  }\r\n\r\n  \/\/ nodes\r\n  for(let i=0;i<20;i++){\r\n    const x=cx+Math.cos(i+angle)*r*0.7;\r\n    const y=cy+Math.sin(i+angle)*r*0.4;\r\n    ctx.beginPath();\r\n    ctx.arc(x,y,2,0,Math.PI*2);\r\n    ctx.fillStyle='#7c3aed';\r\n    ctx.fill();\r\n  }\r\n\r\n  angle+=0.01;\r\n  requestAnimationFrame(draw);\r\n }\r\n draw();\r\n}\r\n\r\n\r\n\/* ================= SIMPLE BLOG SYSTEM ================= *\/\r\nconst BLOG_POSTS=[\r\n {title:\"Secure Your Wi\u2011Fi Network\",cat:\"network\",desc:\"Protect routers and wireless networks from cyber threats.\"},\r\n {title:\"Top Linux Commands for Admins\",cat:\"linux\",desc:\"Essential commands every system administrator should know.\"},\r\n {title:\"Network Troubleshooting Guide\",cat:\"network\",desc:\"Diagnose connectivity issues in enterprise networks.\"},\r\n {title:\"Best Cybersecurity Tools\",cat:\"cyber\",desc:\"Popular open\u2011source tools used by ethical hackers.\"},\r\n {title:\"Nmap Port Scanning Tutorial\",cat:\"cyber\",desc:\"Learn how to scan networks and detect open ports.\"},\r\n {title:\"Wireshark Packet Analysis\",cat:\"network\",desc:\"Inspect packets and troubleshoot network traffic.\"}\r\n];\r\n\r\nfunction renderBlog(){\r\n const grid=document.getElementById('blogGrid');\r\n if(!grid) return;\r\n grid.innerHTML=\"\";\r\n BLOG_POSTS.forEach((p,i)=>{\r\n   const card=document.createElement('div');\r\n   card.className='card';\r\n   card.innerHTML=`<h3>${p.title}<\/h3><p>${p.desc}<\/p>`;\r\n   grid.appendChild(card);\r\n   if(i===1||i===3){\r\n     const ad=document.createElement('div');\r\n     ad.className='card';\r\n     ad.style.display='flex';\r\n     ad.style.alignItems='center';\r\n     ad.style.justifyContent='center';\r\n     ad.style.minHeight='160px';\r\n     ad.style.border='1px dashed #2a3342';\r\n     ad.innerText='AdSense In\u2011Feed Ad';\r\n     grid.appendChild(ad);\r\n   }\r\n });\r\n}\r\n\r\n\/* AI ARTICLE GENERATOR *\/\r\nfunction generateArticle(){\r\n const topic=document.getElementById('aiTopic')?.value.trim();\r\n if(!topic) return alert('Enter a topic');\r\n const container=document.getElementById('aiArticleOutput');\r\n const slug=topic.toLowerCase().replace(\/[^a-z0-9]+\/g,'-');\r\n const html=`<div class=\"card\" style=\"margin-top:20px\">\r\n <h2 style=\"font-family:Poppins;margin-bottom:10px\">${topic}<\/h2>\r\n <p style=\"color:var(--muted)\">This guide explains ${topic} with practical steps for IT professionals and cybersecurity learners.<\/p>\r\n <h3>Introduction<\/h3>\r\n <p>${topic} is an important concept in modern infrastructure and security environments.<\/p>\r\n <h3>Example Command<\/h3>\r\n <pre style=\"background:#020409;padding:14px;border-radius:10px;border:1px solid var(--border)\"><code># example\r\nsudo systemctl status ${slug}\r\n<\/code><\/pre>\r\n <\/div>`;\r\n container.innerHTML=html;\r\n}\r\n\r\nrenderBlog();\r\n\r\n\/* CYBER ATTACK MAP ANIMATION *\/\r\nconst attackCanvas=document.getElementById('attackMap');\r\n\r\n\/* ensure canvas scales correctly on mobile *\/\r\nfunction resizeAttackCanvas(){\r\n if(!attackCanvas) return;\r\n const rect=attackCanvas.getBoundingClientRect();\r\n attackCanvas.width=rect.width;\r\n attackCanvas.height=rect.height;\r\n}\r\nwindow.addEventListener('resize',resizeAttackCanvas);\r\nsetTimeout(resizeAttackCanvas,300);\r\nif(attackCanvas){\r\n const ctx=attackCanvas.getContext('2d');\r\n const nodes=[\r\n  {x:120,y:200},{x:300,y:120},{x:450,y:260},{x:650,y:150},{x:780,y:300}\r\n ];\r\n\r\n function drawAttack(){\r\n  ctx.clearRect(0,0,attackCanvas.width,attackCanvas.height);\r\n\r\n  \/\/ draw nodes\r\n  nodes.forEach(n=>{\r\n   ctx.beginPath();\r\n   ctx.arc(n.x,n.y,4,0,Math.PI*2);\r\n   ctx.fillStyle='#00f0ff';\r\n   ctx.fill();\r\n  });\r\n\r\n  \/\/ random attack line\r\n  const a=nodes[Math.floor(Math.random()*nodes.length)];\r\n  const b=nodes[Math.floor(Math.random()*nodes.length)];\r\n\r\n  ctx.beginPath();\r\n  ctx.moveTo(a.x,a.y);\r\n  ctx.lineTo(b.x,b.y);\r\n  ctx.strokeStyle='rgba(124,58,237,0.8)';\r\n  ctx.lineWidth=2;\r\n  ctx.stroke();\r\n }\r\n\r\n function attackLoop(){\r\n drawAttack();\r\n requestAnimationFrame(attackLoop);\r\n}\r\nattackLoop();\r\n}\r\n\r\n\/* HACKER TERMINAL TYPING ANIMATION *\/\r\nconst terminalLines=[\r\n\"coresectech@lab:~$ whoami\",\r\n\"coresectech\",\r\n\"coresectech@lab:~$ nmap -sS 192.168.1.0\/24\",\r\n\"Scanning network...\",\r\n\"22\/tcp open ssh\",\r\n\"80\/tcp open http\",\r\n\"443\/tcp open https\",\r\n\"Host discovery complete\",\r\n\"coresectech@lab:~$\" ,\r\n\"coresectech@lab:~$ nmap -sS 192.168.1.0\/24\",\r\n\"Starting Nmap 7.94...\",\r\n\"Scanning network...\",\r\n\"22\/tcp open ssh\",\r\n\"80\/tcp open http\",\r\n\"443\/tcp open https\",\r\n\"Host discovery complete\",\r\n\"coresectech@lab:~$\"\r\n];\r\n\r\nfunction startTerminal(){\r\n const el = document.getElementById('heroTerminal') || document.getElementById('terminal');\r\n if(!el) return;\r\n\r\n let line = 0;\r\n let char = 0;\r\n\r\n function type(){\r\n   if(line >= terminalLines.length) return;\r\n\r\n   const text = terminalLines[line];\r\n   el.textContent += text.charAt(char);\r\n   char++;\r\n\r\n   if(char < text.length){\r\n     setTimeout(type, 30);\r\n   } else {\r\n     el.textContent += \"\\n\";\r\n     line++;\r\n     char = 0;\r\n     setTimeout(type, 400);\r\n   }\r\n }\r\n\r\n type();\r\n}\r\n\r\nsetTimeout(startTerminal,1200);\r\n\r\n\/* INTERACTIVE TERMINAL COMMANDS *\/\r\nconst termInput=document.getElementById('terminalInput');\r\nif(termInput){\r\n termInput.addEventListener('keydown',e=>{\r\n  if(e.key==='Enter'){\r\n   const cmd=termInput.value.trim();\r\n   const out=document.getElementById('heroTerminal');\r\n   if(!cmd) return;\r\n   out.textContent += \"coresectech@lab:~$ \"+cmd+\"\\n\";\r\n\r\n   let response=\"command not found\";\r\n   if(cmd==='whoami') response='coresectech';\r\n   if(cmd==='help') response='commands: whoami, help, scan';\r\n   if(cmd==='scan') response='Scanning network...\\n22\/tcp open ssh\\n80\/tcp open http\\n443\/tcp open https';\r\n\r\n   out.textContent += response+\"\\n\";\r\n   termInput.value='';\r\n   out.scrollTop=out.scrollHeight;\r\n  }\r\n });\r\n}\r\n\r\n\/* THEME TOGGLE *\/\r\nfunction toggleTheme(){\r\n const body=document.body;\r\n const btn=document.getElementById('themeBtn');\r\n body.classList.toggle('light');\r\n\r\n if(body.classList.contains('light')){\r\n   localStorage.setItem('theme','light');\r\n   if(btn) btn.innerText='\u2600\ufe0f';\r\n }else{\r\n   localStorage.setItem('theme','dark');\r\n   if(btn) btn.innerText='\ud83c\udf19';\r\n }\r\n}\r\n\r\n\/* load saved theme *\/\r\n(function(){\r\n const saved = localStorage.getItem('theme');\r\n const btn=document.getElementById('themeBtn');\r\n if(saved === 'light'){\r\n   document.body.classList.add('light');\r\n   if(btn) btn.innerText='\u2600\ufe0f';\r\n }else{\r\n   if(btn) btn.innerText='\ud83c\udf19';\r\n }\r\n})();\r\n\r\n\r\n\/* READING PROGRESS BAR *\/\r\nwindow.addEventListener('scroll',()=>{ \/* passive scroll *\/\r\n const winScroll=document.documentElement.scrollTop||document.body.scrollTop;\r\n const height=document.documentElement.scrollHeight-document.documentElement.clientHeight;\r\n const scrolled=(winScroll\/height)*100;\r\n const bar=document.getElementById('progressBar');\r\n if(bar) bar.style.width=scrolled+'%';\r\n});\r\n\r\n<\/script>\r\n\r\n<!-- ================= LEGAL PAGE TEMPLATES FOR ADSENSE ================= -->\r\n<!-- Create separate files using the templates below: privacy.html, terms.html, disclaimer.html, about.html, contact.html -->\r\n\r\n<!-- PRIVACY POLICY TEMPLATE -->\r\n<!--\r\n<!DOCTYPE html>\r\n<html lang=\"en\">\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<title>Privacy Policy | CoreSecTech<\/title>\r\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\r\n<\/head>\r\n<body style=\"font-family:Arial;max-width:900px;margin:auto;padding:40px;line-height:1.6\">\r\n<h1>Privacy Policy<\/h1>\r\n<p>At CoreSecTech, accessible from your domain, the privacy of our visitors is extremely important to us.<\/p>\r\n\r\n<h2>Information We Collect<\/h2>\r\n<p>We may collect personal information such as name, email address, and usage data when you interact with the website.<\/p>\r\n\r\n<h2>How We Use Your Information<\/h2>\r\n<ul>\r\n<li>Improve website performance<\/li>\r\n<li>Respond to inquiries<\/li>\r\n<li>Send newsletters if subscribed<\/li>\r\n<\/ul>\r\n\r\n<h2>Cookies<\/h2>\r\n<p>CoreSecTech uses cookies to improve user experience and analyze traffic.<\/p>\r\n\r\n<h2>Google AdSense<\/h2>\r\n<p>Third\u2011party vendors including Google use cookies to serve ads based on prior visits to this website.<\/p>\r\n\r\n<h2>Consent<\/h2>\r\n<p>By using our website, you consent to our Privacy Policy.<\/p>\r\n<\/body>\r\n<\/html>\r\n-->\r\n\r\n<!-- TERMS AND CONDITIONS TEMPLATE -->\r\n<!--\r\n<!DOCTYPE html>\r\n<html>\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<title>Terms and Conditions | CoreSecTech<\/title>\r\n<\/head>\r\n<body style=\"font-family:Arial;max-width:900px;margin:auto;padding:40px\">\r\n<h1>Terms and Conditions<\/h1>\r\n<p>By accessing this website you agree to comply with the following terms.<\/p>\r\n\r\n<h2>Use of Content<\/h2>\r\n<p>All tutorials and guides are provided for educational purposes only.<\/p>\r\n\r\n<h2>Intellectual Property<\/h2>\r\n<p>All content published on CoreSecTech belongs to the website owner unless stated otherwise.<\/p>\r\n\r\n<h2>Limitation of Liability<\/h2>\r\n<p>We are not responsible for any damages arising from the use of information on this website.<\/p>\r\n<\/body>\r\n<\/html>\r\n-->\r\n\r\n<!-- DISCLAIMER TEMPLATE -->\r\n<!--\r\n<!DOCTYPE html>\r\n<html>\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<title>Disclaimer | CoreSecTech<\/title>\r\n<\/head>\r\n<body style=\"font-family:Arial;max-width:900px;margin:auto;padding:40px\">\r\n<h1>Disclaimer<\/h1>\r\n<p>The information provided on CoreSecTech is for educational and informational purposes only.<\/p>\r\n\r\n<p>All cybersecurity tutorials are intended for ethical learning and defensive security practices.<\/p>\r\n\r\n<p>We are not responsible for misuse of information shared on this website.<\/p>\r\n<\/body>\r\n<\/html>\r\n-->\r\n\r\n<!-- ABOUT PAGE TEMPLATE -->\r\n<!--\r\n<!DOCTYPE html>\r\n<html>\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<title>About | CoreSecTech<\/title>\r\n<\/head>\r\n<body style=\"font-family:Arial;max-width:900px;margin:auto;padding:40px\">\r\n<h1>About CoreSecTech<\/h1>\r\n<p>CoreSecTech is a technology learning platform focused on cybersecurity, networking, Linux administration and system infrastructure.<\/p>\r\n\r\n<p>The goal of this website is to provide practical tutorials and guides for IT professionals, students and enthusiasts.<\/p>\r\n<\/body>\r\n<\/html>\r\n-->\r\n\r\n<!-- CONTACT PAGE TEMPLATE -->\r\n<!--\r\n<!DOCTYPE html>\r\n<html>\r\n<head>\r\n<meta charset=\"UTF-8\">\r\n<title>Contact | CoreSecTech<\/title>\r\n<\/head>\r\n<body style=\"font-family:Arial;max-width:900px;margin:auto;padding:40px\">\r\n<h1>Contact Us<\/h1>\r\n<p>If you have any questions, feel free to contact us.<\/p>\r\n\r\n<form>\r\n<label>Name<\/label><br>\r\n<input type=\"text\" style=\"width:100%;padding:8px\"><br><br>\r\n\r\n<label>Email<\/label><br>\r\n<input type=\"email\" style=\"width:100%;padding:8px\"><br><br>\r\n\r\n<label>Message<\/label><br>\r\n<textarea style=\"width:100%;height:120px\"><\/textarea><br><br>\r\n\r\n<button type=\"submit\">Send Message<\/button>\r\n<\/form>\r\n\r\n<p>Email: admin@coresectech.com<\/p>\r\n<\/body>\r\n<\/html>\r\n-->\r\n\r\n<!-- ================= END LEGAL PAGE TEMPLATES ================= -->\r\n\r\n<\/body>\r\n<\/html>\r\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>CoreSecTech | Cybersecurity &#038; High\u2011Tech Platform CoreSecTech \u2630 Home Blog Categories Tools About Contact \ud83c\udf19 Login Get Started AdSense Banner Area (728&#215;90) CORESECTECH Unlock the future with powerful networking, Linux and cybersecurity knowledge built for IT professionals. Start Learning 0 Readers Monthly (K) 0 Guides Published coresectech@terminal coresectech@lab:~$ Cybersecurity Services Network Security Enterprise firewall configuration &#8230; <a title=\"Home\" class=\"read-more\" href=\"https:\/\/coresectech.com\/\" aria-label=\"Read more about Home\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_canvas","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/coresectech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7"}],"version-history":[{"count":22,"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":41,"href":"https:\/\/coresectech.com\/index.php?rest_route=\/wp\/v2\/pages\/7\/revisions\/41"}],"wp:attachment":[{"href":"https:\/\/coresectech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}