Skip to main content

Posts

Hello World program in different different languages

C: #include<stdio.h> int main(){     printf("Hello World\n");     return 0; }   C++: #include<iostream> using namespace std; int main(){     cout<<"Hello World"<<endl;     return 0; }   Python: print("Hello World\n")   Node JS: console.log("Hello World");   Java Script: document.write("Hello World");   Objective C: #import <Foundation/Foundation.h> int main(int argc, const char* argv[]){      @autoreleasepool{          NSLog(@"Hello World");      }      0; } JAVA: class HelloWorld{     public static void main(String[] args){          System.out.println("Hello World");     } } BASH: echo "Hello World"

Basic Elements of Communication System(Networking)

A Communication is the process of transferring messages from one point to another. It is a very vital process in a network. When two networks are connected with each others they have to share data to each others so this process of communication system has three basic elements which are as follows - 1. A sender (source), which creates the message to be transmitted. 2. A medium, which carries the message, 3. A receiver (sink), which receives the message. Data communication is the function of transmitting data from one point to another. In this case, the sender and receiver are normally machines, in particular, computer devices (computers, terminals, peripheral devices like printers, plotters, disks, etc), and the transmission medium may be telephone lines, microwave links, satellite links, etc. However, the messages that are transmitted are only in data form, but not in voice conversations form. Hence, the electronic systems, which transfer data from one point to another, are called dat

A technical preview of an Operating System

Operating System (OS): An Operating system consists of a set of programs which controls, co-ordinates and supervises the activities of the various components of a computer system. Its function is to link between the computer hardware and the user. An operating system is a software or a series of programmes, which performs various types of functions in order to manage and organize file so". Objectives:  There are lot of objectives of an operating system, actually it covers the birth of a perfect operating system. A user is just like a wanting animal they just want everything. But as a developer we are just tying to make our software more & more better as per user requests. These are some main objectives ------ To describe the basic organization of computer systems. To provide a grand tour of the major components of operating systems. Provide more convenient environment for users. Provide maximum utilized performance to users as per hardware existance. Computer Startup: When a c

Application Softwares (types of softwares)

  Application Software:   An application software always works under a system software. These softwares are generally a set of one or more programmes, designed to solve a specific problem, or do a specific task e.g. An application software for payroll processing produces pay slips as the major output, and an application software for processing examination results produces mark sheets as the major output along with some other statistical reports.    And also if a person is writing a program to solve his/her personal and particular problems is also comes under the application software. These programs included in an application software package are called application programmes and who made these programs are also known as application programmers. The most commonly known application software are 1. Word Processing Software: A word processing software enables us to make use of a computer system for creating editing, viewing, formatting, storing retrieving and painting documents (written

Types of Softwares

Software generally categorized into two types, which are as follows : System Softwares Application Softwares.        System Softwares:      A system software is a set of programs which is designed to control different-different operations and more extend processing capabilities of a computer system. It can perform these functions one or more depending on program requirements on a given task. Supports the development of other application software. Supports the execution of other application software. Handles the effective & efficient use of various hardware resources, such as CPU, memory peripherals etc.  Controls and communicate with the operation of peripheral devices such as printer disk, tape etc.     And system software makes the operation of a computer system more effective and efficient as we can see in its functions. It help the hardware components work together. These programme which are included in a system software package are called system programmes, and the programme

How to Hack Your Friends Screen Lock

Password Hacked:        Hello, friends, today we will discuss on a phishing page tool which can capture a device passcode. This is just a github tool and we will tell you how to use this, you can impress your friends using this tool and it is really not hard to use it.  You should only have an android device with termux app installed, or you can do this thing with your computer system also. Today i am only showing you how to do these things only with your android device. Please follow each steps carefully to get perfect run of this tool : First , open your play store on your android mobile phone and then search  TERMUX  and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute you have to on your network connection. type pkg update  then hit enter. Now type pkg upgrade  then it will automatically upgrade your envoirment. Then you have to clone this tool in termux, Tool link (LockPh

How to Hack Your Friends Camera

  Camera Phishing:      Hello, Friends, today have tried to tell you an interesting hack about the camera of your friends and impress them with the help of an Amazing tool here no pc or computer is required so we are starting some simple steps which help you to do cam-phishing . First , open your play store on your android mobile phone and then search TERMUX and you have to download it. then it need approx 1 min for installation in your android phone and then you have to write some keywords which help to execute  you have to on your network connection. Write pkg update then it starts executing and after if it gives you the option to check yes or no then type Y else it will automatically execute. Write pkg upgrade then it will execute some functions. Then you have to write  https://github.com/techchipnet/CamPhish.git and after that press enter. then exit you will come out of termux then again open termux and then again write all steps from 3 to 5  press enter . then write

C programming basics - part 1

Data Types: There are two data types in C programming language - (1)- Primary Data Types  (2)- Secondary Data Types   (1)- Primary Data Types :      Primary data types are those data types which are defined already in the           language. They can be used directly in the program. These data types one of the main important thing in C programming.  There are mainly three types primary data types----- a)- int : For integer values range = -32767 to 32768 b)- float : For float values range = c)- char : For character values range = -127 to 128

A Digital Computer

 A digital computer is a digital system that performs various computational tasks. The word "Digital" implies that the information in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. These discrete values are taken by the decimal digits 0 to 9.  The first electronic digital systems was developed at 1940s late, it was primarily only used for some numerical computations.  As we all know a digital computer uses binary number system & it can only understand a binary number. And a binary number has only 2 digits 0 & 1 . Let me tell you one more interesting thing is that a binary digit is called "bit" here. That means if we use 0 it means its a bit, and vise versa.  In a digital computer all information is only represented in group of bits. After using various programming techniques & some algorithms, these grou

Why you should start programming with C?

         You must have listened about C programming from many peoples, yes C is a mid level programming language It contains both language features HLL & LLL so it is called mid level language. So today we will talk about some history & uses of this C programming language.     C was developed at AT & T's Bell Laboratories of USA in 1972. It was designed & written by a man Dennis Ritchie & we also call him father modern programming languages. In the late seventies(70s) began to replace the more familiar languages of that time like PL/I, ALGOL, etc. No one pushed C.       Thus without any advertisements C reputation spread & its pool of users grew. Ritchie seems to have been rather surprised that so many programmers preferred C to older languages like FORTRAN or PL/I, or the newer once PASCAL & APL. But that's what happened. Possibly why C seems so popular is because it was reliable, simple & easy to use at that time. WHY YOU SHOULD LEARN C: C is

Programing Langauges HLL vs LLL

High Level Languages:      High level languages are abbreviated as HLL, these languages are too much similar to human language. These are more programmer friendly languages easy to code, debug and maintain. Actually they don't interact with the hardware , rather they focuses more on the complex arithmetic operations, optimal program efficiency and easiness in coding.      High level language requires a compilers or an interpreters to translate source code written in high level language to machine language. We can compile the source code written in HLL to multiple languages. Thus they are machine independent language. Advantages of HLL: It provides higher level of abstraction from machine languages. It is machine independent languages. Less error prone, easy to find debug errors. They provides the better programming productivity. Disadvantages of HLL:  Its take additional time to translate its code to machine code. HLL programmer are much slower than the Low Level Language Progra

why visiting darkweb is not too easy?

DARK WEB :       Today we will talk about Dark-Web ,   the Dark-Web is a WWW(World wide web) content that exists on the internet but we need specific software, system configurations or authorized access to see or make changes in this content. Dark-web is just a part of the internet where 90% of internet data is available right now. The Dark-Web contents are not shown by normal search engines like Google , Bing or other search engines.          The dark-web include small peer to peer and friend to friend networks, as well as large, popular networks such as Tor, Freenet etc. operated by public organizations and individuals.  Users of the dark web refer to the regular web as clean net due to its unencrypted nature. The Tor dark web or onion browsing uses the traffic anonymization technique of onion-routing in the network's top-level-domain suffix .onion REAL WORLD:  If we talk about real world scenarios with dark web it's too complex for a beginner level guy to ge

Know Operating Systems (Briefly)

OPERATING SYSTEM :     Today's lot of operating systems have arrived in the marketplace, but some OS gets failed because of their specifications or trends. Let me tell you what is an Operating System in short " an operating system is just a system software which help us to communicate with a machine using graphical or command line interface."     That's means when someone using his/her smartphone or computer or any type of device that's sure this device has an operating system and there is a proper way to use this device. Every Operating system has its own way or type of using it.    An OS is also making a vital role in the device because there are lot of things in a device which depends on the OS like bluetooth-connectivity, wireless-connections, display and many more things.   WORKING PROCESS :   Basically an OS is a system software so it contains all information about the hardware of this device.    Now it will use this information so it b

Man in the middle attack types

Types Of Man-In-The-Middle Attacks : Today internet is one of the most essential thing in our normal life and it plays a vital role in every industries. Our demand of internet is growing day by day and it is not going to stop until now.  Man in the middle attack is one of the most common cyber-attack. In this attack an attacker act as a medium between the user and the server when a user send a request to a website for a particular data it can be in any form like login credentials, bank details etc. then server send data to user but when a person is interacting between user & server he/she can see all data. So today i will tell you how an attacker can perform a man in the middle attack ,so just read this blog careful................... 1⃣ IP spoofing:   Every device capable of connecting to the web has an online protocol (IP) address, which is analogous to the road address for your home.  By spoofing an IP address, an attacker can trick you into thinking you’re interacting with an

Some useful shortcuts of Libre Office Writer

Ctrl+A   Select All Ctrl+J    Justify Ctrl+D Double Underline Ctrl+E Centered Ctrl+F Find and Replace Ctrl+Shift+P Superscript Ctrl+L Align Left Ctrl+R Align Right Ctrl+Shift+B Subscript Ctrl+Y Redo last action Ctrl+0 (zero) Apply Default   paragraph style Ctrl+1 Apply Heading 1 paragraph style Ctrl+2 Apply Heading 2 paragraph style Ctrl+3 Apply Heading 3 paragraph style Ctrl+5 1.5 Line Spacing Ctrl+ Plus Key(+) Calculates the selected text and copies the result to the clipboard. Ctrl+Hyphen(-) Custom hyphens; hyphenation set by you. Ctrl+Shift+minus sign (-) Non-breaking dash (is not used for hyphenation) Ctrl+multiplication sign * (only on number pad) Run macro field Ctrl+Shift+Space Non-breaking spaces. Non-breaking spaces are not used for hyphenation and are not expanded if the text is justified. Shift+Enter Line break without paragraph change Ctrl+Enter Manual page break Ctrl+Shift+Enter Column break in multicolumnar texts Alt+Enter Inserting a new paragraph

Most Important Full Forms

  CPU : CENTRAL PROCESSING UNIT   OS : OPERATING SYSTEM UPS : UNINTERRUPTIBLE POWER SUPPLY RAM : RANDOM-ACCESS MEMORY ROM : READ-ONLY MEMORY LCD : LIQUID CRYSTAL DISPLAY   LED : LIGHT-EMITTING DIODE   FAT : FILE ALLOCATION TABLE DOC : DOCUMENT   MMC : MULTIMEDIA CARD   CD : COMPACT DISC   DVD : DIGITAL VERSATILE DISC   ISO : INTERNATIONAL ORGANIZATION FOR STANDARDIZATION   DB : DATABASE   IC : INTEGRATED CIRCUIT   TEMP : TEMPORARY   WMP : WINDOWS MEDIA PLAYER   MP3 : MOVING PICTURE EXPERTS GROUP PHASE 3 (MPEG-3)   MPEG : MOVING PICTURE EXPERTS GROUP PHASE (MPEG)   JPG : JOINT PHOTOGRAPHIC EXPERTS GROUP   AVI : AUDIO VIDEO INTERLEAVE   WMV : WINDOWS MEDIA VIDEO   GIF : GRAPHICS INTERCHANGE FORMAT   USB : UNIVERSAL SERIAL BUS   IP : INTERNET PROTOCOL   DNS : DOMAIN NAME SYSTEM   HTTP : HYPERTEXT TRANSFER PROTOCOL   HTTPS : HYPERTEXT TRANSFER PROTOCOL SECURE   HTML : HYPERTEXT MARKUP LANGUAGE   XML : EXTENSIBLE MARKUP LANGUAGE   CSS : CASCADING STYLE SHEETS

How to become a successful hacker

T he whole world is going to transform in Internet and internet related things, & still privacy is one of the most issued topic in market till now. So basically market needs a perfect hacker. As we all know nothing is safe on internet millions TB of data is also growing on internet day by day but along with this the efficient Cyber Security Experts (WHITE HAT HACKERS) counts are very few. So the market needs perfect Cyber Security Specialist to make company data safe from any unauthorized access and to be ready for any cyber attack, so demand are too increasing day by day.         If we talk about Hackers then we both know that hackers are also growing in the world day by day as we all know, it does not matter here what kind of hackers because where is god, devil is also there. And if we talk clearly then we know that Black Hat & White Hat both growing day by day. So if you want to become a successful hacker you should apply at least these points in you=====>>

PROGRAMMING LANGUAGES

  Today a programming language is very essential thing in technology market, everything is going to transform in digital world. We handle these digital things with lot of hardware and using programming language. Currently there are lot of programming languages arrived in market like Python, Java, Perl and many more. So today we will talk about what is programming language & how its works?   A programming language is the way to talk to a computer machine, generally we can not directly go to the computer and we can not say to the computer to do a specific task, Because a computer only understand the binary data . We need to program it or we can say we need to talk to the computer in computer language to give then computer will understand what we want with them. Generally we talk in different - different languages, so we can also communicate in different - different languages with a computer. Sometimes computer languages goes to complicated for a human being but sue to