Tag: c-programming

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

What is Topology

What is Topology Topology defines the structure of the network of how all the components are interconnected to each other. There are two types of topology: physical and logical topology. The physical topology is the geometric representation of all the nodes in a network. Bus Topology The bus topology is designed in such a way…
Read more

Computer Forensics

Cyber activity has become an important part of everyday life of the general public. ~ Importance of computer forensics: • 85% of business and government agencies detected security breaches • FBI estimates that the United States loses up to $10 billion a year to cyber crime History of computer forensics ~Francis Galton (1822-1911) • Made…
Read more

DDoS Attack

Distributed denial of service attack in this attack multiple systems which are infected by trojan, are used to target a single system causing a denial of service attack(dos) .By slowloris you can do DDoS attack .As Slowloris is a tool of kali linux . Attacks involving multiple computers or other devices all targeting the same…
Read more

Google Hacks

Google dorks are used to find hidden information and we can find anything easily by using it. Because Google has a searching algorithm and indexes most websites, it can be useful to a hacker to find vulnerabilities on the target. The basic syntax for google dorks: operator_name:keyword Because of google dorks it becomes easy to…
Read more

Hard Disk

Hard Disk The hard disk drive in your system is the “data center” of the PC. It is here that all of your programs and data are stored between the occasions that you use the computer. Your hard disk (or disks) are the most important of the various types of permanent storage used in PCs…
Read more

What is Malware Threats

What is Malware Threats Malware re is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information. Various types of malware Virus Trojans Worms Rootkits Spyware Ransomware Virus…
Read more

7 steps of c programming

7 steps of c programming C as you’ve seen, is a compiled language. If you are accustomed to using a compiled language, such as Pascal or FORTRAN, you will be familiar with the basic steps in putting together a C program. However, if your background is in an interpreted language, such as BASIC, or in…
Read more

C Programs-Print Hello word

1.Print Hello word #include<stdio.h> void main() { printf(“Hello World”); getch(); } 2. Program to assign values of two numbers and print their addition. #include<stdio.h> #include<conio.h> void main() { int a,b,ans; clrscr(); a=10; b=20; ans=a+b; printf(“Addition is : %d”,ans); getch(); } 3.Program to accept values of two numbers and print their addition. include<stdio.h> void main() {…
Read more