Blog

Operators in C Language

Operators in C Language C language supports an upscale set of intrinsical operators. AN operator could be an image that tells the compiler to perform an exact mathematical or logical manipulation. Operators are utilized in programs to control knowledge and variables. C operators can be classified into the following types: Arithmetic operators Relational operators Logical…
Read more

Escape Sequence in C

Escape Sequence in C An escape sequence in C language is a sequence of characters that doesn’t represent itself when used inside string literal or character. It is composed of two or more characters starting with backslash \. For example: \n represents new line. List of Escape Sequences in C Escape Sequence Meaning \a Alarm…
Read more

Data types in C

Data types in C C data types are defined as the data storage format that a variable can store data to perform a specific operation. Data types are used to define a variable before to use in a program. Size of variable, constant and array are determined by data types. C – DATA TYPES: There…
Read more

What is Topology

What is Topology Topology defines the structure of the network of how all the components are interconnected to each other. There are two types of topology: physical and logical topology. The physical topology is the geometric representation of all the nodes in a network. Bus Topology The bus topology is designed in such a way…
Read more

घर बैठे इन्टरनेट से ऑनलाइन पैसे कैसे कमाए

इन्टरनेट से पैसे कमाने के तरीके (Online Paise Kaise Kamaye) कोई writing में अच्छा होता है तो कोई singing में. सबके पास अलग अलग कला होता है. हम दुशरो से वो चीज़ सीखते है जो हमे पता नहिं होता. वैसे ही आप अपनी talent के जरिये online आसानी से पैसे कमा पाएंगे, और ये कोई…
Read more

How to Hack WiFi Networks that Use WEP Encryption

How to Hack WiFi Networks that Use WEP Encryption More and more people are using wireless networks. Thus, every hacker needs to know how to attack this kind of target. In this section, you’ll use Kali Linux to hack a WEP- encrypted WiFi password. Important Note: You’re still practicing so don’t use it on other…
Read more

How to Hack WiFi Networks that Use WPA/WPA-2

How to Hack WiFi Networks that Use WPA/WPA-2 WEP-encrypted passwords are easy to hack. WPA/WPA-2 passwords, however, are time- consuming and resource-intensive. This is the reason why most WiFi networks use WPA/WPA-2 encryption. Cracking this form of encryption is difficult, but certainly doable. Here are the steps you need to take: 1. Launch a terminal…
Read more

Algorithm and Flowchart

Algorithms and flowcharts are two different tools used for creating new programs, especially in computer programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way.  Algorithm To write a logical step-by-step method to solve the problem is called algorithm, in other words,…
Read more

प्रोफेशनल free Blog कैसे बनाये

प्रोफेशनल free Blog कैसे बनाये. Blog kya hai aur kaise kam karta hai जब आप Google में कुछ Search करते है तो आपको बहुत सारे Result देखने को मिलते है। जिसे हम और आप जैसे लोग ही लिखते है उन्हें Blogger कहते है जो अपना knowledge Share करके लोगो की हेल्प करते है और Online पैसे कमाते…
Read more

Email marketing क्या है

Hello everyone, आज हम जानेंगे कि Email Marketing क्या है, कैसे काम करती है….. Email Marketing क्या है? किसी भी तरह की marketing जिसमे email का प्रयोग मुख्य तौर पर किया जाये तो उसे email Marketing कहा जाता है. अब इसे example से बढ़िया तरीके से समझा जा सकता है. Examples भी मैंने कुछ ऐसे…
Read more

What is Phishing

What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity in an electronic communication.Typically carried out by email spoofing or instant messaging,it often directs users to enter personal information at a fake website, the look and feel of which…
Read more

What is XSS attack ?

What is XSS attack ? Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. XSS enables attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. Cross-site scripting carried…
Read more

What is sql injection

What is sql injection ? SQL injection is a code injection technique, used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker).SQL injection must exploit a security vulnerability in an application’s software, for example, when user input is…
Read more

What Is the DDoS Protection Bootcamp

What Is the DDoS Protection Bootcamp? The DDoS Protection Bootcamp is the first online portal to provide in-depth technical training in the field of DDoS protection. If you’re involved in IT security or network operations, you know that DDoS attacks are a problem that’s not going away. Recent studies indicate that almost 75% of organizations…
Read more

How to Install a Complete Linux Distro on Android

How to Install a Complete Linux Distro on Android? For users who want to experience a complete desktop OS on their Android phone, especially tech-savvy people who don’t want to carry around a laptop or tablet, it’s entirely possible to install a fully-functional Linux OS on your Android phone. You will need a rooted phone…
Read more

WHAT IS CARDING

WHAT IS CARDING? Carding is the type of hacking In that, u use hack credit cards to shop online Hacking online sites like Amazon etc.. Purchase products for free The requirement for carding: 💥 VPN/SOCKs5 💥 Ccleaner 💥Valid CC 💥Mac address changer 💥 Drop *First of all, carding is an illegal process and it is…
Read more

How to Install Tor Browser

How to Install Tor Browser Step 1:Goto browser and search tor project and select the option of download for windows,linux or dos. Step 2:After downloading tor open it and connect it you can also configure it and set proxy for more security . Step 3:We should set VPN also for much more security as tor…
Read more

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

What is Password Cracking?

What is Password Cracking? Password cracking is the process of guessing or recovering a password from stored locations or from data transmission system. It is used to get a password for unauthorized access or to recover a forgotten password. In penetration testing, it is used to check the security of an application. In recent years,…
Read more

ASCII-Code

ASCII-Code All electronic communications involving computers are expressed in binary language which involves only two symbols. These are 0 for off and 1 for on. Since normal communications between humans over large distances is both in letters and numbers it earlier became necessary to come up with a coding method capable of handling both cases.…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more