Rabu, 31 Agustus 2016

How to perform string manipulation in C-Programming

As we have already seen in the previous unit, a string is a collection of characters and strings are maintained as character arrays in C programs. The common operations or manipulations that can be performed on strings are: Reading and writing strings Concatenating/combining/joining strings Comparing strings Copying one string into another string Extracting a portion of the string (substring) C provides predefined functions for performing all the above operations or manipulations on strings. Most of these predefined functions are available instring.h header file. The list of predefined functions is given below: Note: The difference between scanf and gets is, scanf

The post How to perform string manipulation in C-Programming appeared first on Coding Security.


How to perform string manipulation in C-Programming
read more

How to implement string functions using user defined functions

A user–defined function (UDF) is a function provided by the user of a program or environment, in a context where the usual assumption is that functions are built into the program or environment. A function has zero or more parameters. You can use local variables to store intermediate results. The function body consists of Igor operations, assignment statements, flow control statements, and calls to other functions. A function can return a numeric, string, wave reference or data folder reference result. It can also have a side-effect, such as creating a wave or creating a graph. Before we dive into the

The post How to implement string functions using user defined functions appeared first on Coding Security.


How to implement string functions using user defined functions
read more

How to perform Type Conversion and Type Casting in C – Programming

Converting a data type of an expression to another data type is known as type conversion. Here expression refers to either a variable or value or sub expression. There are two types of conversions. They are: Implicit conversion or Coercion Explicit conversion or Casting Implicit Conversion While evaluating expressions, it is common to have operands of different data types. C automatically converts the data type of operands or any intermediate values to the proper type so that expression can be evaluated without losing any significance. This automatic conversion performed by C is known asimplicit conversion. In C, the expression on

The post How to perform Type Conversion and Type Casting in C – Programming appeared first on Coding Security.


How to perform Type Conversion and Type Casting in C – Programming
read more

Selasa, 30 Agustus 2016

How to allocate memory for the array of objects in C++

Dynamic memory allocation for array of objects   In the previous topic memory for array of objects was static as the memory was allocated at compile time. To allocate memory dynamically or at run time, we use an array of pointers which can be created as follows: ClassName *array-name;   Memory allocated for an array of pointers is far less than memory allocated for an array of objects. We can create an object at run time using the newoperator as follows: array-name = new ClassName;   After dynamically allocating memory for an object we access the members using the ->

The post How to allocate memory for the array of objects in C++ appeared first on Coding Security.


How to allocate memory for the array of objects in C++
read more

what are friend functions and classes in c++

Friend Functions   A friend function is a non-member function which can access the private and protected members of a class. To declare an external function as a friend of the class, the function prototype preceded with friend keyword should be included in that class. Syntax for creating a friend function is as follows: 1 2 3 4 5 6 class ClassName { ... friend return–type function–name(params–list); ... };   Following are the properties of a friend function: Friend function is a normal external function which is given special access to the private and protected members of a class. Friend

The post what are friend functions and classes in c++ appeared first on Coding Security.


what are friend functions and classes in c++
read more

what are control statements in javascript

Statements that are used to control the flow of execution in a script are known as control statements. Control statements are used along with compound statements (a set of statements enclosed in braces). Local variables are not allowed in a control construct (control statement + single/compound statement). Even though a variable is declared within a control construct, it is treated as a global variable.   Control Expressions The expressions upon which the flow of control depends are known as control expressions. These include primitive values, relational expressions and compound expressions. The result of evaluating a control expression is always a

The post what are control statements in javascript appeared first on Coding Security.


what are control statements in javascript
read more

Senin, 29 Agustus 2016

How to achieve Runtime polymorphism

The word polymorphism means having many forms. Typically, polymorphism occurs when there is a hierarchy of classes and they are related by inheritance. C++ polymorphism means that a call to a member function will cause a different function to be executed depending on the type of object that invokes the function. Consider the following example where a base class has been derived by other two classes:   abstract class Figure { int dim1, dim2; Figure(int x, int y) { dim1 = x; dim2 = y; } abstract void area(); } class Triangle extends Figure { Triangle(int x, int y) {

The post How to achieve Runtime polymorphism appeared first on Coding Security.


How to achieve Runtime polymorphism
read more

What is a Union in C Programming language

Unions have the same syntax as that of a structure since both of them are similar. However, there is a major difference between them in terms of memory allocation. A structure is allocated memory for all the members of the structure whereas a union is allocated memory only for largest member of the union. This implies that, although a union may contain many members of different types, it can handle only one member at a time. Like structure, a union can be declared using the union keyword as shown below: 1 2 3 4 5 6 union student { char

The post What is a Union in C Programming language appeared first on Coding Security.


What is a Union in C Programming language
read more

How to work with data structures in C programming

We know that arrays can be used to represent a collection of elements of the same data type like int, float etc. They cannot be used to hold a collection of different types of elements. C supports a structured data type known as astructure, a way for packing data of different data types. A structure is a convenient tool for handling a group of logically related data items. For example, it can be used to represent the details of a student or the details of a text book etc. Definition: A structure is a collection of heterogeneous data elements referred

The post How to work with data structures in C programming appeared first on Coding Security.


How to work with data structures in C programming
read more

Minggu, 28 Agustus 2016

How to work with strings and Arrays in C++

Arrays Introduction An array is a group of elements forming a complete unit. Characteristics of an array are as follows: An array is a collection of elements. All elements in an array are of the same type. Collection of elements forms a complete set.   Elements in an array are stored in order and sequentially inside the memory.   Need for arrays Think that we have to store five values in a program. We can declare five variables to store those five values as follows: int var1; int var2; int var3; int var4; int var5;   We can declare an

The post How to work with strings and Arrays in C++ appeared first on Coding Security.


How to work with strings and Arrays in C++
read more

How to present Deployment diagrams in UML

Introduction Deployment diagrams are one of the two kinds of diagrams used in modeling the physical aspects of an object-oriented system. A deployment diagram shows the configuration of run time processing nodes and the components that live on them. We use deployment diagrams to model the static deployment view of a system. A deployment diagram is a diagram that shows the configuration of run time processing nodes and the components that live on them. Common Properties A deployment is just a special kind of diagram that shares the same properties as all other diagrams like: a name and graphical contents.

The post How to present Deployment diagrams in UML appeared first on Coding Security.


How to present Deployment diagrams in UML
read more

How to parse xml using SAX and DOM API’s

This article explains XML Processors and two of the popular XML document parsing APIs namely SAX and DOM. Java example programs are also provided. XML processors are needed for the following reasons: The processor must check the basic syntax of the document for well-formedness. The processor must replace all occurrences of an entity with its definition. The processor must copy the default values for attributes in a XML document. The processor must check for the validity of the XML document if either a DTD or XML Schema is included. Although an XML document exhibits a regular and elegant structure, that

The post How to parse xml using SAX and DOM API’s appeared first on Coding Security.


How to parse xml using SAX and DOM API’s
read more

Sabtu, 27 Agustus 2016

How to parse parentheses in a string using C Programming

Parsing or syntactic analysis is the process of analysing a string of symbols, either in natural language or in computer languages, conforming to the rules of a formal grammar. The term parsing comes from Latin pars (orationis), meaning part (of speech). The term has slightly different meanings in different branches of linguistics and computer science. Traditional sentence parsing is often performed as a method of understanding the exact meaning of a sentence or word, sometimes with the aid of devices such assentence diagrams. It usually emphasizes the importance of grammatical divisions such as subject and predicate. Within computational linguistics the

The post How to parse parentheses in a string using C Programming appeared first on Coding Security.


How to parse parentheses in a string using C Programming
read more

What is expression evaluation in C-Programming

An expression is a sequence of operands and operators that reduces to a single value. For example, the expression, 10+5 reduces to the value of 15. Based on the operators and operators used in the expression, they are divided into several types. Some of them are: Integer expressions – expressions which contains integers and operators Real expressions – expressions which contains floating point values and operators Arithmetic expressions – expressions which contain operands and arithmetic operators Mixed mode arithmetic expressions – expressions which contain both integer and real operands Relational expressions – expressions which contain relational operators and operands Logical

The post What is expression evaluation in C-Programming appeared first on Coding Security.


What is expression evaluation in C-Programming
read more

How to create and work with constants in C Programming

Constants in C are fixed values which cannot be changed during the execution of the program. In C, we can declare variables as constants in two ways. They are: 1) By using “const” keyword 2) By using “#define” preprocessor directive const Keyword We can declare a variable as a constant by using the const qualifier. A variable that is declared using const cannot change its value once it is initialized. The syntax of using the const is as shown below: Example of using the const keyword is as shown below: #define Preprocessor Directive We can also declare constants in a

The post How to create and work with constants in C Programming appeared first on Coding Security.


How to create and work with constants in C Programming
read more

Jumat, 26 Agustus 2016

How to work with storage classes in C-Programming

The storage classes specify the scope and lifetime of a variable in a C program. The scope (active) specifies in which parts of the program is the variable accessible and the lifetime (alive) specifies how long a variable is available in the memory so that the program will be able to access that variable. There are four storage classes in C. They are: auto register extern static The storage classes’ auto, register and static can be applied to local variables and the storage classes’ extern and static can be applied to global variables. auto When a variable is declared with

The post How to work with storage classes in C-Programming appeared first on Coding Security.


How to work with storage classes in C-Programming
read more

How to work with files in C-Programming

So far we have been using scanf and printf functions for reading and writing data to the console. This is fine as long as the data is less. However, many real world problems involve large amounts of data. In such situations, the console oriented I/O pose two major problems. They are: It becomes difficult and time consuming to handle large volumes of data through console. The entire data is lost when either the program is terminated or the computer is turned off. It is therefore necessary to have a more flexible approach where data can be stored on the disks

The post How to work with files in C-Programming appeared first on Coding Security.


How to work with files in C-Programming
read more

Droidsniff – Stealing user’s social credentials

What is Droidsniff? DroidSniff was developed as a tool for testing the security of your accounts. This software is neither made for using it in public networks, nor for hijacking any other persons account. It should only demonstrate the poor security properties network connections without encryption have. So do not get DroidSniff to harm anybody or use it in order to gain unauthorized access to any account you do not own! Use this software only for analyzing your own security! Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that

The post Droidsniff – Stealing user’s social credentials appeared first on Coding Security.


Droidsniff – Stealing user’s social credentials
read more

Kamis, 25 Agustus 2016

Here are some Tips for the HR interview

Following tips (in images) will guide you regarding the distinction between over smart and smart answers that can be given for several HR interview questions. Interviews usually take place face to face and in person, although modern communications technologies such as the Internet have enabled conversations to happen in which parties are separated geographically, such as withvideoconferencing software, and of course telephone interviews can happen without visual contact. Interviews almost always involve spoken conversation between two or more parties, although in some instances a “conversation” can happen between two persons who type questions and answers back and forth. Interviews can range

The post Here are some Tips for the HR interview appeared first on Coding Security.


Here are some Tips for the HR interview
read more

Here are the Economics applied in the cloud computing

There are three particularly compelling use cases for utility computing over conventional computing: When the demand varies over time. For example in conventional computing the organization has to invest (to meet demand) in capital expenditure prior to starting its operations and there is no guarantee that demand will always be below the expected margin. Utility computing (cloud) can scale the resources as per demand and the customer pays for only what they use. When demand is unknown in advance. For example a web start up will need to support a spike in demand when it becomes popular, followed by a

The post Here are the Economics applied in the cloud computing appeared first on Coding Security.


Here are the Economics applied in the cloud computing
read more

What are cloud simulators and it’s applications

Although cloud computing‘s inception spans over a decade, still there are many challenging issues which requires a significant amount of research to be done. It is impractical for medium to small sized educational institutions and other organizations to establish a physical cloud for conducting research on cloud computing. It is not possible to perform benchmarking experiments in repeatable, dependable, and scalable environments using real-world cloud environments. A solution for this is to use simulators (virtual reality) which can simulate a real cloud environment. A cloud simulator helps to model various kinds of cloud applications by creating data centers, virtual machines

The post What are cloud simulators and it’s applications appeared first on Coding Security.


What are cloud simulators and it’s applications
read more

Rabu, 24 Agustus 2016

Here are top 28 facts amazing of Google

In this article we have listed the top 28 amazing facts of the company google. On August 16, 2013, Google went down for 5 minutes and in that time, the global Internet traffic dropped by 40%. A single Google search requires more computing power than it took to send Apollo 11 to the Moon. Google has found GPA’s and test scores to be “worthless as criteria for hiring”; they have teams where 14% of their employees haven’t gone to college. Google was originally called”Backrub”. In 1999, the founders of Google actually tried to sell it to Excite for just US$1

The post Here are top 28 facts amazing of Google appeared first on Coding Security.


Here are top 28 facts amazing of Google
read more

Difference between Apache and Nginx

In this article we are going to spot out the differences between the Apache and Nginx web servers. Apache and Nginx are the two most common open source web servers in the world. Together, they are responsible for serving over 50% of traffic on the internet. Both solutions are capable of handling diverse workloads and working with other software to provide a complete web stack. Apache Apache provides a variety of multi-processing modules (Apache calls these MPMs) that dictate how client requests are handled. Basically, this allows administrators to swap out its connection handling architecture easily. Nginx Nginx came onto

The post Difference between Apache and Nginx appeared first on Coding Security.


Difference between Apache and Nginx
read more

Selasa, 23 Agustus 2016

How to enable God mode in windows 10

If you are a long time Windows user you may remember the trick to enable the God mode for those who don’t  it is a feature that gives all the access to the operating system control panel settings.   God Mode is just a way to access the master control panel in Windows 10 .The feature is useful for those in IT, those who manage a computer, and obviously for those advanced enthusiasts. Most consumers have little need for the feature, and in fact, it could lend itself to doing some damage to the OS.   Enable God Mode in

The post How to enable God mode in windows 10 appeared first on Coding Security.


How to enable God mode in windows 10
read more

How to work with functions in C++

While writing large programs, main() function will become quite complex to maintain and soon you will lose track of what is happening. This is where functions will aid programmers.   Functions allows the programmer to divide a large program into logical chunks. Each function is a self contained block that does a non-trivial task. The main() function will call other functions which in turn solves the problem. This model of programming using functions is known as modular programming or structured programming.   Consider the following program which calculates the area and perimeter of a circle using functions. #include<iostream> double area(double);

The post How to work with functions in C++ appeared first on Coding Security.


How to work with functions in C++
read more

How to work with arrays and strings in C++

Arrays An array is a group of elements forming a complete unit. Characteristics of an array are as follows: An array is a collection of elements. All elements in an array are of the same type. Collection of elements forms a complete set.   Elements in an array are stored in order and sequentially inside the memory.   Need for arrays Think that we have to store five values in a program. We can declare five variables to store those five values as follows: int var1; int var2; int var3; int var4; int var5;   We can declare an array

The post How to work with arrays and strings in C++ appeared first on Coding Security.


How to work with arrays and strings in C++
read more

Senin, 22 Agustus 2016

How to install ruby on rails on Ubuntu 16.04

In this article we will go through steps on how to install ruby on rails on Ubuntu 16.04. Ruby on Rails is one of the most popular application stacks for developers looking to create sites and web apps. The Ruby programming language, combined with the Rails development framework, makes app development simple. Update and install dependencies First, we should update apt-get since this is the first time we will be using apt in this session. This will ensure that the local package cache is updated. sudo apt-get update Next, let’s install the dependencies required for rbenv and Ruby with apt-get:

The post How to install ruby on rails on Ubuntu 16.04 appeared first on Coding Security.


How to install ruby on rails on Ubuntu 16.04
read more

Websites to look for if you are into competitive to coding

These sites have their sets of practice problems, practice sessions and competition rounds. Major of the competitions are sponsored by some big shot companies and they also keep a keen eye on the contests, so who knows you might just one lucky person to be selected for a big internship or for a big job. Some of these competitions are held on weekly, monthly or yearly basis where as others have specific dates for competitions. Hackerrank I personally use hackerrank to solve programming problems it has good UI and it is easy to use as the website is with the

The post Websites to look for if you are into competitive to coding appeared first on Coding Security.


Websites to look for if you are into competitive to coding
read more

Some of the commonly asked interview questions across companies

In this article we are going to share some commonly asked interview questions among different companies. While we are seeing many interview questions listed on internet we see some of the common questions. some questions seemed common across companies which were not trivial so I can list the ones where companies did not bound me with an NDA. Note that these are some of the tricky ones, a vast majority of actual interview questions asked at companies other than Google are fairly easy. Given an array of integers, find all the 3 numbers that sum up to a target number?

The post Some of the commonly asked interview questions across companies appeared first on Coding Security.


Some of the commonly asked interview questions across companies
read more

Difference between python 2 and python 3

Python is a easy, extremely readable and versatile programming language.The goal of development of python is make the programming language easy to use which is easy to set up and Significantly easy to use Python is great choice for beginners. Python supports multiple programming styles including scripting and object oriented it can be used for general purpose or for a special purpose  it offers a lot of potential for those who want to add a new programming language to their CV. Python 2 Python 2 signalled a more transparent and inclusive language development process than earlier versions of Python with

The post Difference between python 2 and python 3 appeared first on Coding Security.


Difference between python 2 and python 3
read more

Minggu, 21 Agustus 2016

Which License choose if you are a open source contributer

Open source licenses grant permission to everyone to use, modify, and share licensed software for any purpose, subject to conditions preserving the provenance and openness of the software. The following licenses are arranged from one with the strongest of these conditions (GNU AGPLv3) to one with no conditions. GNU AGPLv3 Permissions of this strongest copyleft license are conditioned on making available complete source code of licensed works and modifications, which include larger works using a licensed work, under the same license. Copyright and license notices must be preserved. Contributors provide an express grant of patent rights. When a modified version

The post Which License choose if you are a open source contributer appeared first on Coding Security.


Which License choose if you are a open source contributer
read more

A guide on how to use apt-get commands in Linux

In this guide we will provide you with a brief introduction on how to use the apt-get commands in the Linux Terminal, clean your packages and update your system. What is APT-GET?? If you are a Ubuntu user you may know that it is a extended build of the Debian Linux, While the Debian uses DPKG packaging system. A packaging system which will provide programs and applications for installation which will reduce the hassle of the user compiling the code from source. APT is the advanced package tool which is used to interact with the DPKG packages to do some

The post A guide on how to use apt-get commands in Linux appeared first on Coding Security.


A guide on how to use apt-get commands in Linux
read more

Sabtu, 20 Agustus 2016

How to find 2s complement of a binary number in C programming

In this article we are going to demonstrate the 2s compliment of a binary number using C-Program. Two’s complement is a mathematical operation on binary numbers, as well as a binary signed number representation based on this operation. Its wide use in computing makes it the most important example of a radix complement. The two’s complement of an N-bit number is defined as the complement with respect to 2N; in other words, it is the result of subtracting the number from 2N. This is also equivalent to taking the ones’ complement and then adding one, since the sum of a

The post How to find 2s complement of a binary number in C programming appeared first on Coding Security.


How to find 2s complement of a binary number in C programming
read more

How Inbuilt String functions work in C programming

In this article we are going to show you the code of how the string functions work in the C program. In computer programming, a string is traditionally a sequence of characters, either as a literal constant or as some kind of variable. The latter may allow its elements to be mutated and the length changed, or it may be fixed (after creation). A string is generally understood as a data type and is often implemented as an array of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. A string may also denote

The post How Inbuilt String functions work in C programming appeared first on Coding Security.


How Inbuilt String functions work in C programming
read more

Call by value and Call by reference Demonstration in C

Even though C does not have call by reference, we assume that it is passing a pointer. Let us try to understand how parameters are passed in functions by  simple examples. Lets us assume person X and person Y are executing some instruction from their respective notebooks. Since each have their own note books they can execute in parallel without any problem. Now let us assume a situation where person X and person Y share a same notebook. In that case when person X is using the notebook person Y can not use the notebook. Only one person can only

The post Call by value and Call by reference Demonstration in C appeared first on Coding Security.


Call by value and Call by reference Demonstration in C
read more

Jumat, 19 Agustus 2016

How to access a structure using a pointer in C programming

In this article we are going to demonstrate how to access a structure using a pointer. A struct in the C programming language (and many derivatives) is a complex data type declaration that defines a physically grouped list of variables to be placed under one name in a block of memory, allowing the different variables to be accessed via a single pointer, or the struct declared name which returns the same address. The struct can contain many other complex and simple data types in an association, so is a natural organizing type for records like the mixed data types in

The post How to access a structure using a pointer in C programming appeared first on Coding Security.


How to access a structure using a pointer in C programming
read more

How to find GCD of a number in C Programming

In this article we are going to find the GCD of a number using non-recursive and recursive functions in C-Progrmaming. In mathematics, the greatest common divisor (gcd) of two or more integers, when at least one of them is not zero, is the largest positive integer that divides the numbers without a remainder. For example, the GCD of 8 and 12 is 4. The greatest common divisor is also known as the greatest common factor (gcf), highest common factor (hcf), greatest common measure (gcm), or highest common divisor. This notion can be extended to polynomials (see Polynomial greatest common divisor)

The post How to find GCD of a number in C Programming appeared first on Coding Security.


How to find GCD of a number in C Programming
read more

A Program to demonstrate typedef usage with a struct

In this article we are going to demonstrate how to use the typedef function in C-Programming. he C programming language provides a keyword called typedef, which you can use to give a type, a new names. Following is an example to define a term BYTE for one-byte numbers − typedef unsigned char BYTE; After this type definitions, the identifier BYTE can be used as an abbreviations for the typeunsigned char, for example.. BYTE b1, b2; By convention, uppercase letters are used for these definitions to remind the user that the type name is really a symbolic abbreviations, but you can

The post A Program to demonstrate typedef usage with a struct appeared first on Coding Security.


A Program to demonstrate typedef usage with a struct
read more

Windows PowerShell got Open Sourced and available for all the platforms

Lately Microsoft has been showing interest in Linux and other open source projects. Now it has even contributed to the open source by giving away it’s powerful PowerShell. What is PowerShell? PowerShell is an object-oriented programming language and interactive command line shell for Microsoft Windows. PowerShell was designed to automate system tasks, such as batch processing, and create systems management tools for commonly implemented processes. Basically it is a commandline based tool which is used to interact with shell using some object commands just like the Terminal which you use in the Linux or Windows Command prompt if you use Windows

The post Windows PowerShell got Open Sourced and available for all the platforms appeared first on Coding Security.


Windows PowerShell got Open Sourced and available for all the platforms
read more

Kamis, 18 Agustus 2016

How to read and print matrix using pointers and Dynamic Memory Allocation

In this article we are going to demonstrate a program that reads the data in the form using pointers and we allocate the memory dynamically for the pointer operations to run. We will get a brief understanding about the system memory and it’s instances. What is Dynamic memory allocation ?? C dynamic memory allocation refers to performing manual memorymanagement for dynamic memory allocation in the C programming language via a group of functions in the C standard library, namely malloc, realloc, calloc and free.   In the below  program we are going to establish a dynamic array to store the

The post How to read and print matrix using pointers and Dynamic Memory Allocation appeared first on Coding Security.


How to read and print matrix using pointers and Dynamic Memory Allocation
read more

What are Input and Output streams in C++

Any program in a given programming language needs significant amount of input from the user and also needs to display to the output several times. To support such I/O operations, C++ provides a library which contains several classes and functions. Streams in C++   In C++, standard library maintains input and output as streams. A stream is a flow of data, measured in bytes, in sequence. If data is received from input devices, it is called a source stream and if the data is to be sent to output devices, it is called a destination stream.   The data in

The post What are Input and Output streams in C++ appeared first on Coding Security.


What are Input and Output streams in C++
read more

What is new in the Go 1.7 Programming language

Go programming language version 1.7 which  is backed by a new ssa Compiler.SSA is a method of describing lower level of operation  SSA acts through an infinite number of registers Which provide well optimized passes the result is smaller code size and faster implementation.   In addition to the performance benefits of new SSA  backend Veera in new suite of tools that will allow developers to interact with SSA machinery  One of the search output and Optimisation passes resulted in the Go assembly language in order to disassemble the Go tool   $GOSAFUNC=main go build   This invocation will output

The post What is new in the Go 1.7 Programming language appeared first on Coding Security.


What is new in the Go 1.7 Programming language
read more

Rabu, 17 Agustus 2016

10 Programming Languages to learn to get highest pay as of 2016

Programming languages in the world changes significantly as a new programming  language the emerge faster, when some programming languages are losing popularity as a programmer it is better to keep an eye on the highest paying job in programming.   According to the USA these are developers  that are getting paid more than the average programmer.   Ruby On Rails   At the top of the  stack we start with Ruby On Rails most of the startups Are using Ruby On Rails as the primary programming language as Ruby On Rails brings speed and agility of building applications on rail. Top

The post 10 Programming Languages to learn to get highest pay as of 2016 appeared first on Coding Security.


10 Programming Languages to learn to get highest pay as of 2016
read more

Functional Programming Languages are coming back

In this article we are going to specify some of the functional programming languages that are going to come back as some developers claim that these languages have clear report and good structure of the code which prevents many errors caused by the classes according according to Analytics functional programming languages are coming back, some of them are Clojure, Erlang and Scala What is a functional programming language? A Functional programming language works with mathematical functions and not have any side effects changing the input. Scala Scala is a functional and highly scalable programming language and its been around for

The post Functional Programming Languages are coming back appeared first on Coding Security.


Functional Programming Languages are coming back
read more

Programming languages to learn in 2016

In this article we are going to talk about 6 new programming languages to learn in 2016. It is important for us to know the right path on which programming languages to learn. It is important that you know to keep to track of the new programming languages updating your skills will let you stay in the loop and you’ll always get a job in the premium entripreise sector. The new programming languages will come with new features, framework and they are faster when compared to the older version it will help you to add more value to be your

The post Programming languages to learn in 2016 appeared first on Coding Security.


Programming languages to learn in 2016
read more

Selasa, 16 Agustus 2016

Most Important frequently asked C++ interview questions

In this article we are going to some of the most important and frequently asked interview questions. Question 1 What will the line of code below print out and Why? cout &lt;&lt; 25u - 50; Well the Answer is just not -25. The answer is 4294967271, taking the compiler is 32bit. There are two types of operands in C++ which one differ from another generally the lower types will be promoted to higher types Higher types : long double, double, long int Lower types : unsigned int, int, float Question 2 What is diamond problem that can occur with C++??

The post Most Important frequently asked C++ interview questions appeared first on Coding Security.


Most Important frequently asked C++ interview questions
read more

Difference between RAID 0, RAID 1, RAID 5 and RAID 10

We use raid for Redundancy of the storage especially when it enterprise data. RAID stands for Redundant Array of Inexpensive (Independent) Disks. In the most of the scenarios you will be using the following raid configuration. RAID 0 RAID 1 RAID 5 RAID 10 (also known as RAID 1+0) This article explains the main difference between these raid levels along with an easy to understand diagram. In all the diagrams mentioned below: A, B, C, D, E and F – represents blocks p1, p2, and p3 – represents parity RAID LEVEL 0(zero) Following are the key points to remember for RAID level

The post Difference between RAID 0, RAID 1, RAID 5 and RAID 10 appeared first on Coding Security.


Difference between RAID 0, RAID 1, RAID 5 and RAID 10
read more

Important skills a php dev needs to learn

PHP is one of the oldest languages with very high demand in the field but there are also lot of programmers who can write PHP in order to make your self unique you need to learn these 10 skills. OOPS : PHP is Object Oriented which in the sense you can create Objects which consists of variables, functions and constructors Major concept of the object oriented programming in PHP was introduced from php5.You need to have good understanding of OOPS for which you can refer to this popular book: “PHP Objects, Patterns and Practice ” PHP Frameworks You must be good

The post Important skills a php dev needs to learn appeared first on Coding Security.


Important skills a php dev needs to learn
read more

Senin, 15 Agustus 2016

How to deploy the UML diagrams

Introduction Deployment diagrams are one of the two kinds of diagrams used in modeling the physical aspects of an object-oriented system. A deployment diagram shows the configuration of run time processing nodes and the components that live on them. We use deployment diagrams to model the static deployment view of a system. A deployment diagram is a diagram that shows the configuration of run time processing nodes and the components that live on them. Common Properties A deployment is just a special kind of diagram that shares the same properties as all other diagrams like: a name and graphical contents.

The post How to deploy the UML diagrams appeared first on Coding Security.


How to deploy the UML diagrams
read more

How to know victim’s Os using Nmap

In this article we are going to show you how to know the victim OS using NMAP.   What is nmap? According to its website, Nmap (“Network Mapper”) is a free and open source (license) utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions)

The post How to know victim’s Os using Nmap appeared first on Coding Security.


How to know victim’s Os using Nmap
read more

How to use netcat as a backdoor in windows system

In this article we are going to use netcat to use as the backdoor particularly in windows system. If a hacker cracks your system once he will create a backdoor just to comeback again this is achieved through netcat. 10 Steps to Use NetCat as a Backdoor in Windows 7 System: The first step you need to gain an access to victim computer and get a meterpreter script for the payload. The next step you need to upload your NetCat.exe to victim computer by using following command : upload /pentest/<strong class="StrictlyAutoTagBold">windows</strong>-binaries/tools/nc.exe C:\\<strong class="StrictlyAutoTagBold">windows</strong>\\system32 upload nc.exe and place it in C:\<strong

The post How to use netcat as a backdoor in windows system appeared first on Coding Security.


How to use netcat as a backdoor in windows system
read more

August 2016 Ethical Hacking Challenge

Hello all, Here is the August ethical hacking challenge, this will hopefully be the first of many (depending on feedback of this style) The challenge is based on a capture the flag style, your mission is to find the text file that is within the root directory. You will need to install VirtualBox if you don’t have it already, the network adapter is bridged so you should be able to pick up a DHCP address.   here is the link to the virtual machine image http://ift.tt/2aVvQ0s

The post August 2016 Ethical Hacking Challenge appeared first on Coding Security.


August 2016 Ethical Hacking Challenge
read more

Minggu, 14 Agustus 2016

How to work with state machines in UML

Introduction A state machine is a behavior that represents the sequences of states that an object undergoes during its lifetime in response to events, together with its responses to those events. The state of an object is a condition or situation during the life of an object during which it satisfies some condition, performs some activity or waits for some event. We can visualize a state machine in two ways: 1) by focusing on the control flow from one activity to another (using activity diagrams) or 2) by focusing on the states of objects and the transitions among those states

The post How to work with state machines in UML appeared first on Coding Security.


How to work with state machines in UML
read more

How to create kali linux virtual machine in virtualbox

In this article we are going to show you how to create the virtual machine of the kali linux in virtual box. A virtual machine (VM) is a software implementation of a machine (i.e. a computer) that executes programs like a physical machine. So in other words it’s an application that helps your hardware(computer) to have more than 1 OS in one single computer. Step by Step How to Create Kali Linux Virtual Machine: 1. Download the Virtual Box from link above and install it (just a few “next” clicks. 2. Open your Virtual Box application and click the new

The post How to create kali linux virtual machine in virtualbox appeared first on Coding Security.


How to create kali linux virtual machine in virtualbox
read more

How to steal cookies using Cross Site Scripting

What is XSS? Well it is a way of inserting the malicious javascript code in your page in the form of the input therfore every time the page loads the script gets loaded in the webpage sense that the new code got inserted in the website Which is called the cross site scripting. oday tutorial was about Hacking Tutorial how to do Cookie Stealing via Cross Site Scripting Vulnerability with persistent type. This kind of vulnerability was much more dangerous than the non-persistent one, because it will affect the whole user of the website that has this kind of persistent

The post How to steal cookies using Cross Site Scripting appeared first on Coding Security.


How to steal cookies using Cross Site Scripting
read more

Sabtu, 13 Agustus 2016

What are events and signals in UML

Introduction In state machines (sequence of states), we use events to model the occurrence of a stimulus that can trigger an object to move from one state to another state. Events may include signals, calls, the passage of time or a change in state. In UML, each thing that happens is modeled as an event. An event is the specification of a significant occurrence that has a location in time and space. A signal, passing of time and change in state are asynchronous events. Calls are generally synchronous events, representing invocation of an operation. UML allows us to represent events

The post What are events and signals in UML appeared first on Coding Security.


What are events and signals in UML
read more

How to perform man in the middle attack in kali linux

In the previous article we have published about the man in the middle attack using a proxy : http://ift.tt/2bfmibX Currently in this tutorial we are going to perform the man in the middle attack using Kali Linux. The man-in-the-middle attack (often abbreviated MITM, MitM, MIM, MiM, MITMA) in cryptography and computer security is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. Victim IP

The post How to perform man in the middle attack in kali linux appeared first on Coding Security.


How to perform man in the middle attack in kali linux
read more

What is PlayFair Cipher (old cryptography)

The password of the user is stored in the format of the encrypted which is achieved by using one of the techniques of the cryptography. Today we  are going to discuss about the play fair cipher Playfair Cipher founded by Sir Charles Wheatstone in 1854 also known as Polygraphic System using matrix 5 x 5. The Playfair is a primitive block cipher. Any new personal computer today can break a message encoded with it in a matter of seconds, even some skilled cryptogrophists and puzzle experts can even break it with nothing more than pen and paper. (maybe you who

The post What is PlayFair Cipher (old cryptography) appeared first on Coding Security.


What is PlayFair Cipher (old cryptography)
read more

Jumat, 12 Agustus 2016

How to work with activity diagrams in UML

Introduction An activity diagram is like a flowchart, representing flow of control from activity to activity, whereas, the interaction diagrams focus on the flow of control from object to object. Activities result in some action, which is made up of executable atomic computations that result in a change of state of the system or the return of a value. Actions involve calling another operation, sending a signal, creating or destroying an object or some pure computation, such as evaluating an expression. Common Properties An activity diagram shares the same common properties as do all other UML diagrams like a name

The post How to work with activity diagrams in UML appeared first on Coding Security.


How to work with activity diagrams in UML
read more

How to exploit remote buffer overflow with python

In this article we are going to perform the exploit overflowing the buffer from the client part of the computer. Step by Step Coding Remote Buffer Overflow Exploit with Python: for carg in sys.argv:             if carg == “-s”:                         argnum = sys.argv.index(carg)                         argnum += 1                         host = sys.argv             elif carg == “-p”:                         argnum = sys.argv.index(carg)                         argnum += 1                         port = sys.argv

The post How to exploit remote buffer overflow with python appeared first on Coding Security.


How to exploit remote buffer overflow with python
read more

How to code your first sql injection vulnerability with python

In this article we are going check if the website is vulnerable to the sql injection using a python script. It will work if and only if the variables are using the get method. We are currently using the python programming language We need an internet connection and a vulnerable website. You can easily find a website for testing using simple SQLi dorks, like inurl:”index.php?cat_id=”. You can find vulnerable site dumps over the web. Step by step Code your first simple SQLi checking vulnerability with Python: Before starting coding, make a new .py file. Importing main libraries This time we

The post How to code your first sql injection vulnerability with python appeared first on Coding Security.


How to code your first sql injection vulnerability with python
read more

Kamis, 11 Agustus 2016

What are interaction diagrams in the UML

Introduction An interaction diagram represents an interaction, which contains a set of objects and the relationships between them including the messages exchanged between the objects. A sequence diagram is an interaction diagram in which the focus is on time ordering of messages. Collaboration diagram is another interaction diagram in which the focus is on the structural organization of the objects. Both sequence diagrams and collaboration diagrams are isomorphic diagrams.   Common Properties Interaction diagrams share the properties which are common to all the diagrams in UML. They are: a name which identifies the diagram and the graphical contents which are

The post What are interaction diagrams in the UML appeared first on Coding Security.


What are interaction diagrams in the UML
read more

Here is how to hijack session using Firesheep

When you are connected to a web application it is mostly a dynamic web application you will have a unique id called the session id  which identifies you as the valid user of the web site. The id will be valid until you logout of the session if some how the hacker got the session id they will get access to the session and access your account. This can be achieved by software called the FireSheep 1. Download Firesheep 2. Sit on a unencrypted wireless network 3. Turn on your wireless card(support promiscious mode, such as : atheros, orinocco, etc)

The post Here is how to hijack session using Firesheep appeared first on Coding Security.


Here is how to hijack session using Firesheep
read more

Web App vs Native App: which is best

If you are on a startup or trying to start a startup  you may get to decide which one you want to work on the app that you start with will lead to the development which is a ladder or the snake which is the pit for your business. Mobile Vs Desktop Let’s be completely honest: amount of mobile devices are growing up exponentially every year and no one can stop this expansion; even more – Google wants you to become mobile friendly, chastising those companies, who don’t want to adjust their online services for mobile. Custom android app development services

The post Web App vs Native App: which is best appeared first on Coding Security.


Web App vs Native App: which is best
read more

Rabu, 10 Agustus 2016

What are the use cases in UML and it’s diagrams

Introduction Use case modeling (use case diagrams) describes what a system does or what is the functionality provided by the system to benefit the users. Use case modeling was created by Ivar Jacobson. More than any other diagrams in UML, use case diagrams allow us to quickly gather the requirements of the software system. The primary components of a use case model are use cases, actors or roles and the system being modeled also known as the subject. The primary purpose of use cases are: To describe the functional requirements of the system, resulting in an agreement between the stakeholders

The post What are the use cases in UML and it’s diagrams appeared first on Coding Security.


What are the use cases in UML and it’s diagrams
read more

How to become a professional hacker (Step by Step Guide)

If you want to become a hacker or you choose the term hacker as the career option then this is the article for you. A attitude of the master mind is required for the hacker to develop in the mindset. Step 1: Learn To Program In C C programming being one of the most powerful languages in computer programming, It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT& T Bell Labs. C programming will essentially help you divide the task in smaller pieces and

The post How to become a professional hacker (Step by Step Guide) appeared first on Coding Security.


How to become a professional hacker (Step by Step Guide)
read more

How to prevent Fraud for secure web

In the past years the usage of the internet is doubled and cloud based services are rapidly increasing as well as the online businesses. Many of these websites face challenge of the fraudulent account creation by malicious users. First Thing First: Understand The Normal User Behavior Knowing your users is really key to identifying the malicious users. If you have identified a pattern for users who are good you may easily be able to provide them a good user experience. At the same you can also identify the users who are not showing normal behavior. Some of the common ways

The post How to prevent Fraud for secure web appeared first on Coding Security.


How to prevent Fraud for secure web
read more

Selasa, 09 Agustus 2016

How to work with advanced relationships in UML

The things in diagrams are connected with one another through relationships. So, relationships are the connections between things. In UML, the four important relationships are dependency, generalization, association and realization. Each type of relationship has its own graphical representation. If you are familiar with the basics regarding the UML relationships, you can continue reading the rest of the article. Otherwise, first have a look at the basics of relationships in UML. Now, let’s have a look at the advanced information that can be represented using the above relationships: Dependency The dependency relationship is also known as using relationship i.e., if

The post How to work with advanced relationships in UML appeared first on Coding Security.


How to work with advanced relationships in UML
read more

A guide to Hack Games (Game cheating)

In this article we are going to show how to hack games where the developers of the game wouldn’t want you to access this parts of the game well if you like hacking games we have listed tools that will help you achieve it. Cheating is simply irresistible when it comes to online gaming. As online gamer, you want to destroy all your enemies or quickly move on to the higher stages, by any means. In this article, you will get some wicked cheats and tips that will take your gaming experience to the next level. Cheating, as you probably know,

The post A guide to Hack Games (Game cheating) appeared first on Coding Security.


A guide to Hack Games (Game cheating)
read more

40 Hacking Tools to become a powerful hacker #part 2

Just Like we Discussed in the Part 1 of this post : http://ift.tt/2aNv9En Here are the Next 40 hacking Tools that will make your a powerful hacker   Packet Crafting To Exploit Firewall Weaknesses     Hping Earlier Hping was used as a security tool. Now it is used as a command-line oriented TCP/IP packet analyzer or assembler. You can use this for Firewall testing, advance port scanning, network testing by using fragmentation, TOS and different other protocols.   Scapy It is a powerful and interactive packet manipulation program. Scapy has the capability to decode or forge the packets of a

The post 40 Hacking Tools to become a powerful hacker #part 2 appeared first on Coding Security.


40 Hacking Tools to become a powerful hacker #part 2
read more

Senin, 08 Agustus 2016

How to work with advanced classes in UML

If you are familiar with the basics of a class and its representation, you can continue reading this article. Otherwise, first read the basics about classes in UML. Introduction The fundamental building block in a object-oriented system is an object or class. However, in UML, class is not the only general building block. It is only one of the general building blocks in UML, called as classifiers. A classifier is a mechanism which describes structural and behavioral features in a system. Other classifiers in UML are: interfaces, datatypes, signals, components, nodes, use cases and subsystems. Classifiers A classifier is a

The post How to work with advanced classes in UML appeared first on Coding Security.


How to work with advanced classes in UML
read more

9 Books to follow if you want to become a ethical hacker

Ethical Hackers Provide security for the computers digital data in the sense with the increase of the Black hat hackers we need Computer security professionals in order to work the security of the entriprise data. The domain of computer security involves a knowledge in sophisticated technologies and a real time exposure to computer network and data management and as a matter of fact there are much less professional than are required by the worldwide market of computer security. Understanding the computer security domain is not easy and it calls for professional training. Fortunately there are computer security books that offer

The post 9 Books to follow if you want to become a ethical hacker appeared first on Coding Security.


9 Books to follow if you want to become a ethical hacker
read more

Best Android Apps that provide security for your phone

Now-a-Days the phone has become primary device for every person in the planet hence the security of the data has become the priority of the businesses. More over if your phone gets stolen and the phone is accessed by the undesired people it will lead into pretty big issues. Here are some apps that provide the security of the android device Lookout If you are on the lookout for a free mobile app that is capable of protecting your android device around the clock from a wide range of mobile threats then Lookout Mobile Security is the right answer for

The post Best Android Apps that provide security for your phone appeared first on Coding Security.


Best Android Apps that provide security for your phone
read more

Minggu, 07 Agustus 2016

What are uses of Diagrams in UML

In object oriented modeling we will view the software system as a collection of interacting objects. Related objects are grouped together into classes. So, every software system or application consists of classes and these classes collaborate with each other in some manner to achieve the functionality. Modeling is all about creating a simplification or abstraction of the end software system that is going to be developed. Modeling consists of creating different diagrams. Every diagram can be thought of as a graph containing vertices joined with edges. In UML, these vertices are replaced with things and the edges are replaced with

The post What are uses of Diagrams in UML appeared first on Coding Security.


What are uses of Diagrams in UML
read more

20 Best Password managing software

In this article we are going to give your 20 best password managing software . keeping the track of your password is very hard when your are maintaining a lot of passwords hence we have a list of 20 Best software managers that will help you keep track of your passwords and usernames. Key Things to Keep Your Password Secure Here are some key things to keep your password secure, most of the password managers support these features. Use a difficult to guess password with more than 8 characters and containing alphabets, numbers and special characters. Use different password for

The post 20 Best Password managing software appeared first on Coding Security.


20 Best Password managing software
read more

Neo4j can stop Brute Force Attack

A Brute Force attack is a guess made by the software of your password we can target any website using brute force. This kinda attacks compromise user information like credit card data and bank account details thus hacker are able to perform the identity theft. Your credit card information can also be sold in the black market. What Is Brute Force Attack? In cryptography, Brute force attack is defined as a approach of systematically checking all possible passwords until the correct one is found. This type of attack may take time proportional to the complexity of password. Brute force attacks

The post Neo4j can stop Brute Force Attack appeared first on Coding Security.


Neo4j can stop Brute Force Attack
read more

Sabtu, 06 Agustus 2016

What are the common mechanisms in UML

UML provides the basic notations to visualize, specify, construct and document the artifacts of a software intensive system. Sometimes, the user might need to represent information through notations which are not available in UML. In such circumstances, we can use the extensibility mechanisms like stereotypes, tagged values and constraints which are a part of common mechanisms in UML. UML supports an annotational thing known as a note. A note is used to provide comments or reviews or also for documentation. Stereotypes, tagged values and constraints are the mechanisms provided by the UML to extend the building blocks, the properties and

The post What are the common mechanisms in UML appeared first on Coding Security.


What are the common mechanisms in UML
read more

How to root your android tablet

In this article we will discuss how to root your android tablet and unlock the beyond. Rooting comes into play if you want more from your android like changing fonts etc. Which most manufacturers don’t provide with native UI. Rooting gives you a chance to do much more that your stock android can’t do before rooting you need to know why you are doing it. What is rooting Rooting is breaking your limit and accessing the phone software that your phone manufacturer won’t allow some times when you root the app asks for the super user permissions well consider a

The post How to root your android tablet appeared first on Coding Security.


How to root your android tablet
read more

20 best Websites to download the hacked games

Gaming daily helps your to learn strategy many people play games online daily.some hackers hack the games inorder to improve their hacking skills Here are some websites you can get hacked games. Hacked Arcade Games The website is one of the popular websites for hacked games. The website has more than 20k hacked games and has games across the category like action, arcade, defense and many others. Arcade Prehacks If you are looking for hacked online games this website is one of the best. It does not only offer various games but also offers a forum of discussion and also

The post 20 best Websites to download the hacked games appeared first on Coding Security.


20 best Websites to download the hacked games
read more

Jumat, 05 Agustus 2016

How to work with relationships in UML

When we are modeling the system first of all we start is identifying things. These things will not stay alone. They collaborate with each other means they are connected with others in some way. These connections between the things are known as relationships. In object-oriented modeling, there are three main relationships between the things: 1) Dependency, 2) Associations and 3) Generalization. Dependency A dependency is a using relationship. In this relationship one thing depends on the other thing. The change in independent thing will affect the dependent thing. Dependency is graphically represented as a dashed directed line. The arrow head

The post How to work with relationships in UML appeared first on Coding Security.


How to work with relationships in UML
read more

4 signs show that your phone got hacked

In this article we are going to figure out that if your phone got hacked or your safe. You may ask the question can hackers hack my phone?? The Answer is yes if your are not careful. Sometimes your phones starts to act weird and it kinda clinges on the apps and you will not expect an nominal behaviour from your phone we suggest you not to ignore it. The main reason behind the phone abnormal UI is that the phone got hacked. High Phone Bills Sometimes the bills made on your behalf can be unnoticeable in the beginning but

The post 4 signs show that your phone got hacked appeared first on Coding Security.


4 signs show that your phone got hacked
read more

How virus enters into your computer

In this article we will get to know how does virus like malware latches on our computer. well Malware is a deadly push that it can kill the computer software for good and your life by stealing your personal information can play with your money by keeping the system updated with the latest software you can keep out of the malware but even though new malware attacks comprimise the security of the computers. What is malware? It is nothing but a piece of software, which is designed in order to interrupt the nominal working of the system and causing all

The post How virus enters into your computer appeared first on Coding Security.


How virus enters into your computer
read more

Kamis, 04 Agustus 2016

Anonymous Hackers Attack Czech Finance Minister

The Czech and the Slovakian divisions of the famous Anonymous hacker collective have attacked the private companies which are owned by Andrej Babis who is the Czech Republic’s Finance Minister, motivating their actions as hacktivism campaign that was carried out because of the country’s intentions to introduce new online gambling laws, according to report by local news media. Babis is the main politician who is behind this controversial law that was approved in the Czech Republic. This law   allows the government to block the non-licensed gambling websites all around the country. While the legislation targets the rogue online gambling sites, Anonymous hacker collective has

The post Anonymous Hackers Attack Czech Finance Minister appeared first on Coding Security.


Anonymous Hackers Attack Czech Finance Minister
read more

What are the classes in UML

Modeling a system involves identifying the fundamental things (objects) in the system. These things are represented as classes in UML. The classes form the vocabulary (basic elements) of the system. Definition A class is a template or description for similar objects. Similar means objects have same attributes, operations, responsibilities and semantics. These classes may belong to problem domain or may belong to the solution or implementation for the problem. The graphical representation of a class in UML is a rectangle. Names Every class must have a name that distinguishes it from the other classes. The name is written as simple

The post What are the classes in UML appeared first on Coding Security.


What are the classes in UML
read more

How to decode password hash using CPU and GPU

In this article we are going to learn how to decrypt the password hash into plain text using CPU and GPU power. Password hashing is used as a way of securing the passwords in the server. It is a generally used mechanism to hide the plain text info from the others even thought there is only one way to hash the password you can even retrieve the password using different techniques. we are going to learn some of the techniques that retrieves the password Is password hashing secure Since hashing is the one way process.This helps the website owners to

The post How to decode password hash using CPU and GPU appeared first on Coding Security.


How to decode password hash using CPU and GPU
read more

How to run a man in the middle attack proxy

In this article we are going to know how to run a man in the middle proxy to record the conversation between the client and the server. Here is a simple tutorial that will help you rum proxy on your local machine which can record the HTTP requests between the client and the server. Take a software like TOMCAT manager.which can also be treated as the man in the middle attack in the below tutorial we also demonstrate a basic man in the middle attack. What is the man in the middle attack Man in the middle attack is a

The post How to run a man in the middle attack proxy appeared first on Coding Security.


How to run a man in the middle attack proxy
read more

Google SEO Trick Leads Users to Online Scam

Researchers from the Malwarebytes discovered a campaign which abuses the Google search which featured snippets to show links to websites that are compromised which eventually redirects the users to online scams and even exploit kits that spreading ransomware. The campaign depends on crooks identifying websites that are listed in “featured snippets,” a Google feature which shows answers to common questions by user. Most of the times, the links lead to safe websites like Wikipedia, but in some rare cases, they are also to personal blogs or news sites. In an active campaign that is detected by Jerome Segura of Malwarebytes, attackers are redirecting the users from a featured snippet for a

The post Google SEO Trick Leads Users to Online Scam appeared first on Coding Security.


Google SEO Trick Leads Users to Online Scam
read more

Hacker Compromises Fosshub and Distributes MBR-Hijacking Malware

A hacking crew  named of PeggleCrew has compromised Fosshub and embedded a malware inside the files hosted on the website and offered to download. According to Cult of Peggle, one of the four members in the group, the team breached the website and embedded one  malware payload inside some of files hosted on the Fosshub, a downloads portal, in a same category as Softpedia. “In short, a network service with no authentication was exposed to the internet,” the hacker told the Softpedia in an email. “We are able to grab data from the network service to obtain source code, passwords that led us further into infrastructure of the

The post Hacker Compromises Fosshub and Distributes MBR-Hijacking Malware appeared first on Coding Security.


Hacker Compromises Fosshub and Distributes MBR-Hijacking Malware
read more

Rabu, 03 Agustus 2016

11 Best Free android apps to learn hacking from mobile

In this article we are going to discuss about Learning Hacking over the Mobile. Why ? (You may ask) 80% of the users in the internet come from mobile hence we stay with our mobiles most of the time rather than the Desktop hence it is good to know the mobile apps that will help you sharpen skill in your hacking. Here are some best free apps to get some knowledge of the hacking Hacking Tutorials 2.0 If you are a beginner who wants to gain a toehold in demystifying world of hacking, this hacking tutorial apps is the best

The post 11 Best Free android apps to learn hacking from mobile appeared first on Coding Security.


11 Best Free android apps to learn hacking from mobile
read more

40+ Free Best Tools that will help your become a powerful hacker

In this article we are going to share 50 free best tools that will help you on your way to become a powerful hacker. We are going to start with password cracking software. Password Cracker Software It is often referred as the password recovery tool which can be used to recover the original password or bypassing the encryption, The most common method used in the password cracking is repeatedly make guesses for the probable password and perhaps finally hitting on the correct one.If passwords are long the user might forget it these password recovery tools are often used by hackers

The post 40+ Free Best Tools that will help your become a powerful hacker appeared first on Coding Security.


40+ Free Best Tools that will help your become a powerful hacker
read more

How the software development life cycle is determined using UML

UML is a software development life cycle or process independent language. But to get most out of UML, the software development process should have the following properties: Use case driven Architecture centric Iterative and Incremental Rational Unified Process (RUP) is a software development process framework developed by Rational Corporation which satisfies the above three properties. The overall software development life cycle can be visualized as shown below: Critical activities in each phase: Inception: Business case is established 20% of the critical use cases are identified Elaboration: Develop the architecture Analyze the problem domain (80% of use cases are identified) Construction:

The post How the software development life cycle is determined using UML appeared first on Coding Security.


How the software development life cycle is determined using UML
read more

Selasa, 02 Agustus 2016

Windows Flaw is Leaking Microsoft Account Passwords, VPN Credentials

The way how Windows handles the old authentication procedures for the shared network resources has a flaw and can leak a user’s Microsoft account username and password including VPN credentials if he is using a VPN to browse the Internet. This exploit relies on the attacker embedding a link to SMB resource (network share) inside an email or a Web page which is viewed using Outlook. The attacker can put the disguise the link to his network, share inside image tags but instead of the proper image link he can place the link to his network share hosted on his own network. Whenever user accesses the link using Edge, Internet

The post Windows Flaw is Leaking Microsoft Account Passwords, VPN Credentials appeared first on Coding Security.


Windows Flaw is Leaking Microsoft Account Passwords, VPN Credentials
read more

Data of 200 Million Yahoo Users Available for Sale on the Dark Web

Ringkasan ini tidak tersedia. Harap klik di sini untuk melihat postingan.

Best Free Hacking Tutorials to follow to become a professional hacker

To become a hacker is difficult it is not easy as becoming a programmer even to perform a simplest hack you need to have knowledge in the C, Python and HTML and more over you need to the roots of the unix system. You must show interest in problem solving even the security trend changes even faster than programming. If you are thinking of a career option in the world of the hacking you kinda need to be prepared to do hard and smart work. Here are some few resources that will help you out to speed up the learning

The post Best Free Hacking Tutorials to follow to become a professional hacker appeared first on Coding Security.


Best Free Hacking Tutorials to follow to become a professional hacker
read more

How to create a most secure password that protection from hackers

In this article we are going to share some important tricks and tips that will help you to put the strong and memorable passwords we see various instances of hacking and cyber theft on the most popular platforms and banking systems. This can be controlled in the three simple ways by maintains the low profile electronic mediums so you don’t catch eyes of the hackers. Moreover you must ensure that your security systems are fool proof not providing the easy way of accessing your account your public and private devices must be protected using passwords. To make sure that you

The post How to create a most secure password that protection from hackers appeared first on Coding Security.


How to create a most secure password that protection from hackers
read more

What is the software architecture of the UML

A model is a simplified representation of the system. To visualize a system, we will build various models. The subset of these models is a view. Architecture is the collection of several views. The stakeholders (end users, analysts, developers, system integrators, testers, technical writers and project managers) of a project will be interested in different views. Architecture can be best represented as a collection five views: 1) Use case view, 2) Design/logical view, 3) Implementation/development view, 4) Process view and 5) Deployment/physical view. The five views can be summarized as shown in the below table: Structure diagrams Structure diagrams emphasize the

The post What is the software architecture of the UML appeared first on Coding Security.


What is the software architecture of the UML
read more

Senin, 01 Agustus 2016

New Trojan is Installing Backdoor in Android Devices

SpyNote a new Android Trojan has been identified by the researchers who warn that the attacks are forthcoming. This Trojan was found by Palo Alto Networks’ Unit 42 team and was spotted in any of the active campaigns. But the Unit 42 believes so because the software is now widely available on the Dark Web, which it will soon be used in an upcoming wave of attacks. The Unit 42 discovered the Trojan while they are monitoring malware discussion forums. The Researchers say that is where they found a malware builder tool which is specifically designed to create multiple versions of the SpyNote Trojan. The SpyNote, according to the

The post New Trojan is Installing Backdoor in Android Devices appeared first on Coding Security.


New Trojan is Installing Backdoor in Android Devices
read more

The Best Way To Charge Our Mobile Phones According to Science

We all know that our smartphone batteries are bad as they hardly last a day. But it is partially our fault because we are  charging them the wrong way whole time. Most of us (including me) have a belief that charging our smartphones in small bursts will result in some long-term damage to their batteries and that it is better to charge the mobile when they are below 5%. But we just couldn’t be more wrong. As a matter of fact a site from battery company Cadex named Battery University shows how the lithium-ion batteries in our smartphones are very sensitive to their own versions of ‘stress’. And, like us humans, extended stress could

The post The Best Way To Charge Our Mobile Phones According to Science appeared first on Coding Security.


The Best Way To Charge Our Mobile Phones According to Science
read more

An Introduction the Unified Modeling Language

The UML is a language for (overview of UML): Visualizing Specifying Constructing Documenting the artifacts of a software intensive system. The UML is a Language A language provides a vocabulary and the rules for combining words in that vocabulary for the purpose of communication. A modeling language is a language whose vocabulary and rules focus on the conceptual and physical representation of the system. A modeling language like UML is thus a standard language for software blueprints. The vocabulary and rules of a language such as the UML tell you how to create and read well-formed models. But they don’t

The post An Introduction the Unified Modeling Language appeared first on Coding Security.


An Introduction the Unified Modeling Language
read more

How to perform network operations on android

In this article we are going to learn about how to transfer the data through the network using the android volley library. What is Volley? Volley is a network library that helps in doing network related operations like fetching image or data. Here are some features of this library. Supports request queuing and prioritization Effective cache management Multiple concurrent network connections can be established Supports request cancelling No need to use asynctask as it performs all network operations asynchronously. Android Volley Tutorial Using volley we can fetch simple string, image or json data. Below I have given example for each

The post How to perform network operations on android appeared first on Coding Security.


How to perform network operations on android
read more

How to nuke your harddrive before selling it

In this article we are going to know how to erase the data in the hard drive forever well the part is that the data in the hard drive must securely deleted In the case of formatting and partitioning will do this properly hence we use software like DBAN (Darik’s Boot and Nuke). DBAN is a utility to securely delete your data from the hard drive by repeatedly overwriting the existing data with the new data repeatedly several times. It is included with a Live Boot CD in which it will describe how the DBAN will be used and how

The post How to nuke your harddrive before selling it appeared first on Coding Security.


How to nuke your harddrive before selling it
read more

4 GNOME Shell Extensions that Improve the Interface

We have GNOME 3.0 now and it introduced a new overview mode. Now you can launch apps, switch between windows, and also managed virtual desktops. I loved it, and GNOME easily became my favorite desktop environment on any OS. But there are a few changes I would like to make and I can, this is one of the greatest about GNOME. You can change things to to your choice if you don’t like the default experience. Here are a few was you can tweak the GNOME shell to suit your style. 1. Dash to Dock The GNOME’s early criticisms was that the hassle

The post 4 GNOME Shell Extensions that Improve the Interface appeared first on Coding Security.


4 GNOME Shell Extensions that Improve the Interface
read more