-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathhacking.htm
More file actions
218 lines (214 loc) · 21.4 KB
/
hacking.htm
File metadata and controls
218 lines (214 loc) · 21.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<link href="https://unpkg.com/tailwindcss@^1.0/dist/tailwind.min.css" rel="stylesheet">
<title>HACKING</title>
<header class="text-gray-500 bg-gray-900 body-font">
<div class="container mx-auto flex flex-wrap p-5 flex-col md:flex-row items-center">
<a class="flex title-font font-medium items-center text-white mb-4 md:mb-0">
<svg xmlns="http://www.w3.org/2000/svg" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-10 h-10 text-white p-2 bg-green-500 rounded-full" viewBox="0 0 24 24">
<path d="M12 2L2 7l10 5 10-5-10-5zM2 17l10 5 10-5M2 12l10 5 10-5"></path>
</svg>
<span class="ml-3 text-xl">Somen Samantas Blog Point</span>
</a>
<nav class="md:mr-auto md:ml-4 md:py-1 md:pl-4 md:border-l md:border-gray-700 flex flex-wrap items-center text-base justify-center">
<a href='index.html' class="mr-5 hover:text-white">Home</a>
<a href='blog.html' class="mr-5 hover:text-white">Blog</a>
<a class="mr-5 hover:text-white">About</a>
</nav>
<button class="inline-flex items-center bg-gray-800 border-0 py-1 px-3 focus:outline-none hover:bg-gray-700 rounded text-base mt-4 md:mt-0">Button
<svg fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-4 h-4 ml-1" viewBox="0 0 24 24">
<path d="M5 12h14M12 5l7 7-7 7"></path>
</svg>
</button>
</div>
</header>
</head>
<body>
<section class="text-gray-500 bg-gray-900 body-font">
<div class="container px-5 py-24 mx-auto">
<div class="text-center mb-20">
<h1 class="sm:text-3xl text-2xl font-medium title-font text-white mb-4">HACKING</h1>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">“Most hackers are young because young people tend to be adaptable. As long as you remain adaptable, you can always be a good hacker.”</p>
<div class="flex mt-6 justify-center">
<div class="w-16 h-1 rounded-full bg-green-500 inline-flex"></div>
</div>
</div>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">WHAT IS HACKING?</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire networks. And while hacking might not always be for malicious purposes, nowadays most references to hacking, and hackers, characterize it/them as unlawful activity by cybercriminals—motivated by financial gain, protest, information gathering (spying), and even just for the “fun” of the challenge.</p>
<p> <br> </p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">WHO ARE HACKERS?</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">A computer hacker is a skilled computer expert who uses their technical knowledge to overcome a problem. Although the term “hacker” can basically refer to any skilled computer programmer, it has however become more synonymous with the idea of a security hacker; that is, a person who, with their technical knowledge, uses bugs or exploits to break into computer systems.</p>
<p> <br> </p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">TYPES OF HACKERS?</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">1. BLACK HAT HACKERS</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">Basically, these are the “bad guys”. They are the types of hackers who break into computer networks with purely negative motives such as monetary gain or reputation.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">“Black hat” hacker claims to earn $20,000 per hour – but Reddit doubts it. A self-styled "hacker" claims that crime can pay - saying that his 3 million-strong PC botnet earns him up to “$15,000 to $20,000” per hour.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">Black hats lack ethics, sometimes violate laws, and break into computer systems with malicious intent, and they may violate the confidentiality, integrity, or availability of an organization's systems and data.<br>Kevin Mitnick<br>Without a doubt, one of the best black hat hackers to ever hit the tech world.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br></p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">2.WHITE HAT HACKERS</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">To protect common services or special interests against attack, white hat hackers are often behind the scenes, thwarting attacks in real time, or proactively exposing weakness to try to help keep services running and data protected. Additionally, white hat hackers are often employed by businesses to help assess and improve security.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"> <br> White hat hackers use the same tools and techniques as real attackers. This can range from simple public “root kits” with proven tools, to complex and sophisticated campaigns involving social engineering, endpoint vulnerabilities, protocol spoofing, attack decoys and more. Where true black hat attackers and white hat hackers differ is primarily in a single way: Time.<BR>White hat hackers hired to test security might have anywhere between 8 hours and a few weeks to get all the findings they can. Black hat attackers, however, have been known to take months, or even years to successfully execute campaigns. This gives attackers a major advantage: they can try dozens, or hundreds of different attack techniques to successfully breach networks.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br>The median salary of an ethical hacker is almost $80,000, according to PayScale, and the top range can climb to well over $100,000. On the consulting side, the EC-Council states that CEH professionals can expect to be paid $15,000 to $45,000 per contract or short-term assignment.<br> <br>Dan Kaminsky has played a large role in fighting cybercrime since 2008, when he became one of the most widely known white hat hackers.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br></p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">3. GREY HAT HACKERS</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto">A grey hat (greyhat or gray hat) is a computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but does not have the malicious intent typical of a black hat hacker.<br>Grey hat hackers are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br>If there isn't permission from the target to find vulnerabilities, trying to crack a company's security against the law. So a grey hat hacker should expect to be punished by disclosing a vulnerability to a company.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br>They earns as both a black hat and a white hat.<br>They prefer to be anonymous....</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br></p>
<p class="text-base leading-relaxed x1:w-2/4 lg:w-3/4 mx-auto"><br>Red Hat Hackers<br>Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.<br>Blue Hat Hackers<br>A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.<br>Elite Hackers<br>This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.<br>Script Kiddie<br>A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.<br>Neophyte<br>A neophyte, "n00b", or "newbie" or "Green Hat Hacker" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.<br>Hacktivist<br>A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br></p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br>Ethical Hacker Eligibility : <br>It is important to have a Bachelor’s degree (BSc, BTech, BE, BCA) in Information Technology or Computer Science to become an ethical hacker. Candidates with advanced diploma in network security or relevant technology can also choose ethical hacking as professional career. A certification from a reputed institute enhances the chances of getting hired by some big names in the IT sector. The list of international certifications are:<br>Certified Ethical Hacker (EC-Council)<br>Certified Hacking Forensic Investigator (EC-Council)<br>GIAC Certified Penetration Tester (GPEN) by SAN and GIAC<br>Certified Intrusion Analyst (GCIA) can further improve the job prospects<br>Offencive Security Certified Professional(OSCP) by kali linux</p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br></p>
<p class="text-base leading-relaxed xl:w-2/4 lg:w-3/4 mx-auto"><br>Important Links:</p>
<nav class="md:mr-auto md:ml-4 md:py-1 md:pl-4 md:border-l">
<a href='https://www.eccouncil.org/' class="mr-5 hover:text-white">EC-COUNCIL</a>
<a href='www.giac.org/' class="mr-5 hover:text-white">GIAC</a>
<a href='https://www.offensive-security.com/' class="mr-5 hover:text-white">OSCP</a>
</nav>
</div>
</section>
<hr>
<section class="text-gray-500 bg-gray-900 body-font">
<div class="container px-5 py-24 mx-auto">
<div class="flex flex-wrap -m-4">
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href="https://www.amazon.in/b?node=1637249031&_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=c3c210a173c7fa46c5c839ddc14398ef&ref_=ihub_curatedcontent_952dca7b-87fb-4a74-8bcc-c71bd3fa0f23" class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/31/Ebooks/300x300_3.jpg">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/b?node=1637249031&_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=c3c210a173c7fa46c5c839ddc14398ef&ref_=ihub_curatedcontent_952dca7b-87fb-4a74-8bcc-c71bd3fa0f23">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">Min 40% Off on Kindle Exam Central eBooks</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: Aug 15, 2020, 12:00 AM<br>End Date: Sep 15, 2020, 12:00 AM<br>Content Type: Deals & Promotions</h2>
<p class="mt-1">Category: Kindle eBooks</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://www.amazon.in/l/17533702031?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=6df3b91a699dabfe3ab6a45b69149c85&ref_=ihub_curatedcontent_5e993c1c-18e4-419c-9359-5acc8332c6bb' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/31/img20/OP/SFH/D15593517_IN_OP_BTS_Mar20_670x645.jpg">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/l/17533702031?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=6df3b91a699dabfe3ab6a45b69149c85&ref_=ihub_curatedcontent_5e993c1c-18e4-419c-9359-5acc8332c6bb">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">School from home with top rated stationery essentials starting Rs.79</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: Aug 13, 2020, 12:00 AM<br>End Date: Sep 15, 2020, 12:00 AM<br>Content Type: Events</h2>
<p class="mt-1">Category: Office Products</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://www.amazon.in/b?node=14141215031&_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=4476fbad6dc9b66a4265e3461b7817e6&ref_=ihub_curatedcontent_42ee8d5b-a6cd-49bf-9631-df4c64631602' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/31/img19/INKC/ONSITE/Chaturanga300x300_3.jpg">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/b?node=14141215031&_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=4476fbad6dc9b66a4265e3461b7817e6&ref_=ihub_curatedcontent_42ee8d5b-a6cd-49bf-9631-df4c64631602">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">New Release in the Baahubali prequel</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: Aug 06, 2020, 12:00 AM<br>End Date: Aug 31, 2020, 12:00 AM<br>Content Type: Brands & Products</h2>
<p class="mt-1">Category: Kindle eBooks</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://amzn.to/2EsVQza' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://images-na.ssl-images-amazon.com/images/I/51wOOMQ+F3L._SX312_BO1,204,203,200_.jpg">
</a>
<div class="mt-4">
<a href="https://amzn.to/2EsVQza">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">RICH DAD POOR DAD BOOK</h3>
<h2 class="text-white title-font text-lg font-medium">What The Rich Teach Their Kids About Money That the Poor and Middle Class Do Not!</h2>
<p class="mt-1">Robert T. Kiyosaki (Author)</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a HREF='https://www.amazon.in/gp/bestsellers/videogames?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=4718c01fce5c88b82edcec9d7ba8930e&ref_=ihub_curatedcontent_d9571eb8-441e-4f4b-a03b-44fb8396a073' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/01/ACI/ACI_PCVideoGames._SS300_SCLZZZZZZZ_.png">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/gp/bestsellers/videogames?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=4718c01fce5c88b82edcec9d7ba8930e&ref_=ihub_curatedcontent_d9571eb8-441e-4f4b-a03b-44fb8396a073">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">Best Sellers in Video Games</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: On-going<BR>End Date: On-going<BR>Content Type: Brands & Products</h2>
<p class="mt-1">Category: Video Games</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://www.amazon.in/gp/bestsellers/books?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=bc19ab23c67c87947e32b5407c8335f8&ref_=ihub_curatedcontent_e6a4a122-3d85-449c-95c4-bba77cd91b78' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/01/ACI/ACI_Books._SS300_SCLZZZZZZZ_.png">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/gp/bestsellers/books?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=bc19ab23c67c87947e32b5407c8335f8&ref_=ihub_curatedcontent_e6a4a122-3d85-449c-95c4-bba77cd91b78">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">Best Sellers in Books</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: On-going<br>End Date: On-going<br>Content Type: Brands & Products</h2>
<p class="mt-1">Category: Books</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://www.amazon.in/gp/bestsellers/electronics?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=84c2552a58a9b6d1aa8d849ed6b867b2&ref_=ihub_curatedcontent_77c1e3ed-d73a-4007-95f7-f90c6eda3fb5' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/01/ACI/ACI_Electronics._SS300_SCLZZZZZZZ_.png">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/gp/bestsellers/electronics?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=84c2552a58a9b6d1aa8d849ed6b867b2&ref_=ihub_curatedcontent_77c1e3ed-d73a-4007-95f7-f90c6eda3fb5">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">Best Sellers in Electronics</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: On-going<br>End Date: On-going<br>Content Type: Brands & Products</h2>
<p class="mt-1">Category: Electronics</p>
</a>
</div>
</div>
<div class="lg:w-1/4 md:w-1/2 p-4 w-full">
<a href='https://www.amazon.in/gp/bestsellers/shoes?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=5788ce3df1a32a516624b6cd8f77b0bc&ref_=ihub_curatedcontent_0a3f81f5-b529-4174-9004-e522a0414ee5' class="block relative h-48 rounded overflow-hidden">
<img alt="ecommerce" class="object-cover object-center w-full h-full block" src="https://m.media-amazon.com/images/G/01/ACI/ACI_Shoes__Bags._SS300_SCLZZZZZZZ_.png">
</a>
<div class="mt-4">
<a href="https://www.amazon.in/gp/bestsellers/shoes?_encoding=UTF8&linkCode=ib1&tag=somen123401-21&linkId=5788ce3df1a32a516624b6cd8f77b0bc&ref_=ihub_curatedcontent_0a3f81f5-b529-4174-9004-e522a0414ee5">
<h3 class="text-gray-500 text-xs tracking-widest title-font mb-1">Best Sellers in Shoes & Handbags</h3>
<h2 class="text-white title-font text-lg font-medium">Start Date: On-going<br>End Date: On-going<br>Content Type: Brands & Products</h2>
<p class="mt-1">Category: Shoes</p>
</a>
</div>
</div>
</div>
</div>
</section>
<hr>
<footer class="text-gray-500 bg-gray-900 body-font">
<div class="container px-5 py-8 mx-auto flex items-center sm:flex-row flex-col">
<a class="flex title-font font-medium items-center md:justify-start justify-center text-white">
<svg xmlns="http://www.w3.org/2000/svg" fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-10 h-10 text-white p-2 bg-green-500 rounded-full" viewBox="0 0 24 24">
<path d="M12 2L2 7l10 5 10-5-10-5zM2 17l10 5 10-5M2 12l10 5 10-5"></path>
</svg>
<span class="ml-3 text-xl">Somen Samantas study point</span>
</a>
<p class="text-sm text-gray-600 sm:ml-4 sm:pl-4 sm:border-l-2 sm:border-gray-800 sm:py-2 sm:mt-0 mt-4">© 2020 tailblocks —
<a href="https://twitter.com/knyttneve" class="text-gray-500 ml-1" target="_blank" rel="noopener noreferrer">@knyttneve</a>
</p>
<span class="inline-flex sm:ml-auto sm:mt-0 mt-4 justify-center sm:justify-start">
<a href='https://www.facebook.com/somen.samanta.902' class="text-gray-600">
<svg fill="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-5 h-5" viewBox="0 0 24 24">
<path d="M18 2h-3a5 5 0 00-5 5v3H7v4h3v8h4v-8h3l1-4h-4V7a1 1 0 011-1h3z"></path>
</svg>
</a>
<a href='https://twitter.com/SomenSamanta' class="ml-3 text-gray-600">
<svg fill="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-5 h-5" viewBox="0 0 24 24">
<path d="M23 3a10.9 10.9 0 01-3.14 1.53 4.48 4.48 0 00-7.86 3v1A10.66 10.66 0 013 4s-4 9 5 13a11.64 11.64 0 01-7 2c9 5 20 0 20-11.5a4.5 4.5 0 00-.08-.83A7.72 7.72 0 0023 3z"></path>
</svg>
</a>
<a href='https://www.instagram.com/samantasomen222/' class="ml-3 text-gray-600">
<svg fill="none" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="2" class="w-5 h-5" viewBox="0 0 24 24">
<rect width="20" height="20" x="2" y="2" rx="5" ry="5"></rect>
<path d="M16 11.37A4 4 0 1112.63 8 4 4 0 0116 11.37zm1.5-4.87h.01"></path>
</svg>
</a>
<a href="https://www.linkedin.com/in/somen-samanta-24231a1b3/" class="ml-3 text-gray-600">
<svg fill="currentColor" stroke="currentColor" stroke-linecap="round" stroke-linejoin="round" stroke-width="0" class="w-5 h-5" viewBox="0 0 24 24">
<path stroke="none" d="M16 8a6 6 0 016 6v7h-4v-7a2 2 0 00-2-2 2 2 0 00-2 2v7h-4v-7a6 6 0 016-6zM2 9h4v12H2z"></path>
<circle cx="4" cy="4" r="2" stroke="none"></circle>
</svg>
</a>
</span>
</div>
</footer>
</body>
</html>