Tag: hardware

Transfer Money without Internet

Here’s How to Transfer Money from Your Phone without Internet Consider a situation where you’re stuck in a place with almost no internet connectivity and you’ve got a high priority banking transaction to make. Be it booking tickets for your favourite movie, paying electricity bills to avoid disconnection, or even helping out a friend in…
Read more

Operators in C Language

Operators in C Language C language supports a rich set of built-in operators. An operator is a symbol that tells the compiler to perform a certain mathematical or logical manipulation. Operators are used in programs to manipulate data and variables. C operators can be classified into the following types: Arithmetic operators Relational operators Logical operators…
Read more

Data types in C

Data types in C C data types are defined as the data storage format that a variable can store data to perform a specific operation. Data types are used to define a variable before to use in a program. Size of variable, constant and array are determined by data types. C – DATA TYPES: There…
Read more

Algorithm and Flowchart

Algorithms and flowcharts are two different tools used for creating new programs, especially in computer programming. An algorithm is a step-by-step analysis of the process, while a flowchart explains the steps of a program in a graphical way.  Algorithm To write a logical step-by-step method to solve the problem is called algorithm, in other words,…
Read more

what is port forwarding?

what is port forwarding? the port forwarding is a way to send and receive data packets from a public source. it is a complicated topic. you might never understand it if you won’t perform it on your own system. By port forwarding, we can redirect traffic to a specific destination. example: you play Minecraft. it…
Read more

Neworking

Networking A networking is a collection of computers linked to one another allowing information an resources to be shared between them. Setting Up A Network: A Network is setup by connecting the various computers through the cables, connectors and connectivity devices such as hubs or switches along with which necessary protocols for enabling communication between…
Read more

Dark Web Access

Dark Web Access Do you wish to enter into the world of darkness? – The Dark Web. Then make sure you are protected and safe with the VPN to remain anonymous online. If you aren’t connected with the Best VPN, then you may land in trouble even if you are using Tor browser. First, set…
Read more

Web Vulnerability Scanners

Web Vulnerability Scanners Netsparker Application Security Scanner — Application security scanner to automatically find security flaws. Nikto — Noisybut fast black box web server and web application vulnerability scanner. Arachni — Scriptableframework for evaluating the security of web applications. w3af — Webapplication attack and audit framework. Wapiti — Blackbox web application vulnerability scanner with built-in…
Read more

White Hats

White Hats A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking. White hat hackers, also called ethical hackers, only seek vulnerabilities or exploits when they are…
Read more

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ Tʜᴇ Mᴇᴛʜᴏᴅ ɪs ʙᴀsᴇᴅ ᴏɴ ᴀɴ ᴜɴᴄᴏᴍᴘʟɪᴄᴀᴛᴇᴅ ᴄᴏᴍᴍᴀɴᴅ ᴘʀᴏᴍᴘᴛ ᴛʀɪᴄᴋ ᴛʜᴀᴛ ᴡɪʟʟ ғᴏʀᴄᴇ ғᴏʀᴍᴀᴛ ʏᴏᴜʀ ᴇxᴛᴇʀɴᴀʟ ᴅʀɪᴠᴇ, ᴀɴᴅ ᴛʜᴇɴ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ɪᴛ sᴍᴏᴏᴛʜʟʏ ᴀɴᴅ ᴇʀʀᴏʀ-ғʀᴇᴇ. Hᴏᴡᴇᴠᴇʀ, ɴᴏᴛᴇ ᴛʜᴀᴛ ᴛʜɪs ᴡɪʟʟ ᴅᴇʟᴇᴛᴇ ᴀʟʟ ʏᴏᴜʀ ғɪʟᴇs ғʀᴏᴍ USB ᴘᴇɴ ᴅʀɪᴠᴇ ᴀɴᴅ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀɴʏ ɪᴍᴘᴏʀᴛᴀɴᴛ ᴅᴀᴛᴀ, Tʜᴇɴ…
Read more