Tag: c-programming

How to Install Gdebi Package Installer on kali Linux?

How to Install Gdebi Package Installer on kali Linux? gdebi is a simple tool to install deb files. It lets you install local deb packages resolving and installing. it is dependencies. apt does the same, but only for remote (Http, FTP) located package repositories. It has a graphical user interface but can also be used…
Read more

NetCat

NetCat is a network exploration application that is not only popular among those in the security industry, but also in the network and system administration fields. While it’s primarily used for outbound/inbound network checking and port exploration, it’s also valuable when used in conjunction with programming languages like Perl or C, or with bash scripts.…
Read more

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

What is Topology

What is Topology Topology defines the structure of the network of how all the components are interconnected to each other. There are two types of topology: physical and logical topology. The physical topology is the geometric representation of all the nodes in a network. Bus Topology The bus topology is designed in such a way…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

DDoS Attack

Distributed denial of service attack in this attack multiple systems which are infected by trojan, are used to target a single system causing a denial of service attack(dos) .By slowloris you can do DDoS attack .As Slowloris is a tool of kali linux . Attacks involving multiple computers or other devices all targeting the same…
Read more

Google Hacks

Google dorks are used to find hidden information and we can find anything easily by using it. Because Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on the target. The basic syntax for google dorks: operator_name:keyword Because of google dorks it becomes easy to…
Read more

Hard Disk

Hard Disk The hard disk drive in your system is the “data center” of the PC. It is here that all of your programs and data are stored between the occasions that you use the computer. Your hard disk (or disks) are the most important of the various types of permanent storage used in PCs…
Read more

What is Malware Threats

What is Malware Threats Malware re is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information. Various types of malware Virus Trojans Worms Rootkits Spyware Ransomware Virus…
Read more

7 steps of c programming

7 steps of c programming C as you’ve seen, is a compiled language. If you are accustomed to using a compiled language, such as Pascal or FORTRAN, you will be familiar with the basic steps in putting together a C program. However, if your background is in an interpreted language, such as BASIC, or in…
Read more