Skip to main content

Posts

Showing posts from 2016

How to Turn Off Your PC Using Your Smartphone

Do you want to turn off your PC at your home and save some electricity. Or may be try to shutdown your PC from outside just because it looks cool. We got you covered. If you ever walked away from your computer and remembered that you forgot to turn it off, you can actually do it from your smart phone! To begin with, you need to download Unified Remote app on your smartphone ( iOS ,  Android ), and you then need to download it’s server to your computer from  this website  right here. You can go through the installation process on your PC  and it is easy, straightforward and there is no spyware or any nonsense which comes with it. Once you are finished, make sure the server app is running on your computer, and then open the app on your mobile. It will scan for a server on your local network. Once it finds the server it will let you control your computer. Now, the way the app works is with a bunch of different remotes. There are remotes that’ll let you control your PC as if it was a

How to Remove a Virus from Android Without a Factory Reset

Desktops aren’t the only gadgets that can be affected by a virus. Android devices have a malware problem and it’s growing every day. If you do get a virus, you could perform a factory reset to get rid of it, but that means you’d lose all your data — those photos you shot, the saved games, the text messages, and everything else. Obviously, you want a factory reset to be your last option. So what can you do to remove a virus from Android without a factory reset? Is It Really a Virus? If your phone isn’t functioning the way it should be, there’s a chance you have some malware on it. One wrong tap somewhere and a malicious file might have been downloaded on your phone, which is leeching battery life, Internet resources, or your personal data. But it could be something else. Suppose your Android refuses to boot or crashes every time it starts up. Or maybe you can’t seem to download apps from the Play Store. These are not necessarily caused by a virus. So don’t panic! First, check our

Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. Any command is wrong kindly comment below.  Download Cheat Sheet: Kali Linux Commands Download Cheat Sheet: Kali Linux Commands

7 algorithms and data structures every programmer must know

In programmers life algorithms and data structures is most important subject if they want to go out in the programming world and make some bucks. Today, We will see what they do and where they are used with simplest examples. This list is prepared keeping in mind their use in competitive programming and current development practices. 1. Sort Algorithms Sorting is the most heavily studied concept in Computer Science. Idea is to arrange the items of a list in a specific order. Though every major programming language has built-in sorting libraries, it comes in handy if you know how they work. Depending upon requirement you may want to use any of these. Merge Sort Quick Sort Bucket Sort Heap Sort Counting Sort More importantly one should know  when and where to use  them. Some examples where you can find direct application of sorting techniques include: Sorting by price, popularity etc in e-commerce websites 2. Search Algorithms Binary Search  (in linear data structures) Binary se

Top 5 Bootable USB Tools For Windows Operating System

In this article, I have created a list of the top 5 bootable USB tools for Windows operating system. You can create ISO files for different Windows operating systems, Linux distros, and also make Linux Live USB drives. All these bootable USB tools have their advantages and disadvantages. One of the most common methods of installing an operating system on a computer is to create a bootable media. We can also install an OS using the inbuilt features, for instance, the Reset option present in Microsoft Windows 8 and later. For that, an already running operating system on your machine is a pre-requisite. On the other hand, that’s not the case with the bootable media, you can use it even if your computer doesn’t have any operating system installed at all. Primarily, we create a bootable media using a CD/DVD or a USB drive. However, the former one has become obsolete because it is technologically backward than the USB drive-based bootable media. Now, there are many tools available to crea

Rooting

Rooting is the process of getting the superuser (root) permissions on an Android device (which is also a type of Linux system). This allows you to install unauthorized applications and ROMs, delete bloatware and other kinds of stuff. However, in many countries, rooting might result in voiding your warranty. If you are a long time Android user, you might have come across various applications asking for root access to function. The internet is full of articles on rooting and the whole process is different for different smartphones. There are tons of guides on online forums and there is no single guide that works for all smartphones. Well, in this article, I’ll try to tell you the meaning of rooting and some related aspects. What is rooting? Here, we love Linux and open source software. So, I expect that you might be using a Linux distribution for everyday computing. In that case, you might be aware of running a command with sudo. It allows you to run programs with root permissions. If

How to generate exceptions in virtual constructors

It is possible that exceptions might raise in a constructor or destructors. If an exception is raised in a constructor, memory might be allocated to some data members and might not be allocated for others. This might lead to memory leakage problem as the program stops and the memory for data members stays alive in the RAM.   Similarly, when an exception is raised in a destructor, memory might not be deallocated which may again lead to memory leakage problem. So, it is better to provide exception handling within the constructor and destructor to avoid such problems. Following program demonstrates handling exceptions in a constructor and destructor: #include<iostream> using namespace std; class Divide { private: int *x; int *y; public: Divide() { x = new int(); y = new int(); cout<<“Enter two numbers: “; cin>>*x>>*y; try { if(*y == 0) { throw *x; } } catch(int) { delete x; delete y; cout<<“Second number cannot be zero!”<<end

How to work with virtual constructors and destructors in C++

C++ allows programmers to create virtual destructors. But, it doesn’t allow virtual constructors to be created because of various reasons. To know why a virtual destructor is needed, consider the following program: #include <iostream> using namespace std; class A { public: A() { cout<<“A’s constructor”<<endl; } ~A() { cout<<“A’s destructor”<<endl; } }; class B : public A { public: B() { cout<<“B’s constructor”<<endl; } ~B() { cout<<“B’s destructor”<<endl; } }; int main() { A *bptr = new B(); delete bptr; return 0; } Output for the above program is as follows: A‘s constructor B’s constructor A‘s destructor   From the above output you can see that derived class destructor didn’t execute. This might lead to problems like memory leakage. To avoid such problems we make destructor in base class as virtual destructor.   Virtual destructor instructor ensures that the derived class destructor is execut

WAFNinja – A Tool To Bypass WAF

WAFNinja  is a CLI tool written in Python. It is the best tool for penetration testers to bypass a WAF by automating steps necessary for bypassing input validation. The tool was created with the objective to be easily extendable, simple to use and usable in a team environment. Many payloads and fuzzing strings, which are stored in a local database file come shipped with the tool. WAFNinja  supports HTTP connections, GET and POST requests and the use of Cookies in order to access pages restricted to authenticated users. Also, an intercepting proxy can be set up.   Using Command: wafninja.py [-h] [-v] {fuzz, bypass, insert-fuzz, insert-bypass, set-db} ... Example: Fuzz: python wafninja.py fuzz -u "http://www.target.com/index.php?id=FUZZ" -c "phpsessid=value" -t xss -o output.html   Bypass: python wafninja.py bypass -u "http://www.target.com/index.php" -p "Name=PAYLOAD&amp;Submit=Submit" -c "phpsessid=value" -t xss -o output.