Posts

About Rooting

Rooting- it is process by which you can gain super access on your system.                                                Or It allows you to attain privelaged control over your android or any other sysytem In Android and Windows we call it Rooting In IOS we call it Jail breaking Some things you can do after Rooting Your device  You can Highly customise your device, you can remove unwanted bloatware, you can change some system settings and you can change ROM also. And many other things you can do. Advantages of Rooting your device You can enhance your device performance  You can add some features that are not supported by your device You can add third party apps as a system apps And many more.......  Disadvantages of rooting Your device Warranty will be void  There will be breach in your security.  Your device can be bricked.    Does we need to our device at present?  No, you should not root your device in present time because in present your phone are loaded with several features that

Some Programming Languages

Programming Languages   A programming language is a formal language, which comprises a set of instructions that produce various kinds of output. Programming languages are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers. There are programmable machines that use a set of specific instructions, rather than general programming languages. Array Language   Array programming (also termed vector or multidimensional) languages generalize operations on scalars to apply transparently to vectors, matrices, and higher-dimensional arrays. A+ Analytica APL Chapel Fortran 90 Freemat GAUSS Interactive Data Language (IDL) J Julia K MATLAB Octave Q R S S-Lang SequenceL Speakeasy Wolfram Language X10 ZPL Authoring Language An authoring language is a programming language used to create tutorials, websites, and other interactive computer programs. Darwin Information Typing Architecture (DITA) Lasso PILOT TUTOR Constrain Language  A const

10 Types Of Common Hacking

Image
1. Keylogger Keylooger is a simple software that records keys sequences and strokes of your keyboard into a log file might even contain you personal email ID and passwords Keylogger is one main reason why online banking sites gives you an option to use third virtual keyboard  2.  DOS/DDOS      Denial Of Service A DOS attack is a hacking technique to take down a site server by loading that site with lot of traffic that the server is unable to process all the request in a real time and finally crashes down For DDOS attacks hackers often deploy hornets of zombie computer, which have only work to flood your system with request packets 3. Water Hole Attacks To poison a place. In this attack the hackers hits the most accessible physical point of the victim.  4. Fake WAP Even just for fun, a hacker can use software to fake a Wireless Access Point. This WAP connects to the official public place WAP. Once you get connected to fake WAP a hacker can

Programming Languages Used To Develop Some Popular Webpage And Software.

Programming Language And Code Used To Develop Some Popular Application Google search   Backrub ( Google's first in carnation) was written in java and python now Google front end is written in C and C++   and its famous crawlers (spyders) were written in python . However the crawler kept crashing and indexes got stale with old information, therefore Google developed a new crawler (capable of incremnetal index updates) written in C++ Google Chrome  Google chrome is written in C++ , Assembly and python   Adobe   All Adobe products (photoshop acrobat illustrator etc) are written  in C/C++ and embed  JavaScript ( Adobe call their implementation action script) and then the UI etc are written in JavaScript   Microsoft Microsoft products (word,Excel, PowerPoint,etc )are written in C/C++ embed a UB engine and the UI  are written in UB . Microsoft Windows 10 OS is written in C++ while its kernel is written in C Apple 

Top CMD Commands

Image
TOP COMMAMDS :- ✏️Ping          This command will allow you to know if the host you pinging id alive , which means if it is up the time of executing the ping command .. For example - 8.8.8.8 which belongs to google  OR  Ping www.google.com  ✏️NS lookup                          This command has many functionalities - one is for resolving DNS into IP . Let's say you know it's IP but you want to find it out .  ✏️ NS lookup - NS lookup www.google.com is the website for which we want to find out the IP . Now another really exciting function of NS lookup is to find out IP of specific mail server. NS lookup ( enter )  Set  type - mx ( enter )  Yahoo.com                       This command will give you  the mail server IP of yahoo.com  , you can use whatever server you want and if it is listed on DNS , then you get the IP . Simple , isn't it ?  You can send snoofed email to your friend , give the IP address of the mail server. ✏️ Tracert                      This comman

Virtual Reality

Image
VR(Virtual Reality ) : Meaning :- Creating a synthetic believeable world. It requires several hardware and software. Major components of VR - : 1.Display 2. Tracking  3.Optics 4.Performance About optics  Simple function each lens makes a possible of your eye to focus on a screen.  Optics - : Perfect focus by using specialised lenses VR headset focus the light from near a display. The lenses greatly magnified the image exact size shape and placement have a huge impact  Each headset manufacturers. Feel a view comfort optical Displays - : Just behind VR headset lens your phone have one and equal more high resolution  OLED displays some times those are embedded in side the headset like the vive. Other times you will use your phones display's to have high resolution possible for a VR Display. A second important component of a modern VR display is something called low persistence  Low persistence means that instead of showing you a false image, the display is only showing you