Jumat, 30 September 2016

What is object slicing in c++

Object Slicing   In inheritance we can assign a derived class object to a base class object. But, a base class object cannot be assigned to a derived class object. When a derived class object is assigned to a base class object, extra features provided by the derived class will not be available. Such phenomenon is called object slicing.   Following program demonstrates object slicing: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35

The post What is object slicing in c++ appeared first on Coding Security.


What is object slicing in c++
read more

What are virtual constructors and destructors in c++

C++ allows programmers to create virtual destructors. But, it doesn’t allow virtual constructors to be created because of various reasons. To know why a virtual destructor is needed, consider the following program: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 #include <iostream> using namespace std; class A { public: A() { cout<<“A’s constructor”<<endl; } ~A() { cout<<“A’s destructor”<<endl; } }; class B : public A { public: B() { cout<<“B’s

The post What are virtual constructors and destructors in c++ appeared first on Coding Security.


What are virtual constructors and destructors in c++
read more

How to perform object to primitive type conversion in C++

In expressions when there are constants or variables of different types (built-in), one or more types are converted to a destination type. Similarly, user-defined types like classes when used in expressions can also be converted to built-in types or vice versa. Following are the different possibilities of type conversion: Conversion from basic type to class type Conversion from class type to basic type Conversion from one class type to another class type   Conversion from basic type to class type   A value or variable of a basic type or built-in type can be converted to a class member type

The post How to perform object to primitive type conversion in C++ appeared first on Coding Security.


How to perform object to primitive type conversion in C++
read more

Kamis, 29 September 2016

how to perform function overriding in C++

Introduction Polymorphism is one of the key features of object orientation. It means many forms or single interface multiple implementations. Polymorphism is of two types: 1) Compile-time polymorphism and 2) Run-time polymorphism as illustrated in the following figure: Function Overriding When a base class and sub class contains a function with the same signature, and the function is called with base class object, then the function in derived class executes and the function in base class is said to be overridden. This is known as function overriding. Following program demonstrates function overriding: 1 2 3 4 5 6 7 8

The post how to perform function overriding in C++ appeared first on Coding Security.


how to perform function overriding in C++
read more

How to work with constant parameters and members in C++

Constant Parameters and Members Constant Member Functions Member functions in a class can be declared as constant if that member function has no necessity of modifying any data members. A member function can be declared as constant as follows: 1 2 3 4 return–type function–name(params–list) const { //body of function }   Following program demonstrates the use of constant member functions: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 #include<iostream>

The post How to work with constant parameters and members in C++ appeared first on Coding Security.


How to work with constant parameters and members in C++
read more

How to return objects and use of this pointer in c++

Returning Objects   We can not only pass objects as function arguments but can also return objects from functions. We can return an object in the following three ways: Returning by value which makes a duplicate copy of the local object. Returning by using a reference to the object. In this way the address of the object is passed implicitly to the calling function. Returning by using the ‘this pointer’ which explicitly sends the address of the object to the calling function.   Following program demonstrates the three ways of returning objects from a function: 1 2 3 4 5

The post How to return objects and use of this pointer in c++ appeared first on Coding Security.


How to return objects and use of this pointer in c++
read more

Rabu, 28 September 2016

What is array of objects in C++

Array of Objects   As we can create array of basic data types, we can also create an array of user-defined types. An array of objects can be used to maintain details of a group of objects which are stored contiguously in memory. Syntax for creating an array of objects is as follows: ClassName array-name;   For example we can create an array of objects for Student class which can be used to maintain details of a set of students. A single object in an array can be accessed using the subscript or index. Below program demonstrates the use of an array

The post What is array of objects in C++ appeared first on Coding Security.


What is array of objects in C++
read more

what is object composition and friend function in C++

Object Composition   In real-world programs an object is made up of several parts. For example a car is made up of several parts (objects) like engine, wheel, door etc. This kind of whole part relationship is known as composition which is also known as has-a relationship. Composition allows us to create separate class for each task. Following are the advantages or benefits of composition: Each class can be simple and straightforward. A class can focus on performing one specific task. Classes will be easier to write, debug, understand, and usable by other people. Lowers the overall complexity of the

The post what is object composition and friend function in C++ appeared first on Coding Security.


what is object composition and friend function in C++
read more

What is the difference between local class and nested class in c++

Local Classes   A class which is declared inside a function is called a local class. A local class is accessible only within the function it is declared. Following guidelines should be followed while using local classes: Local classes can access global variables only along with scope resolution operator. Local classes can access static variables declared inside a function. Local classes cannot access auto variables declared inside a function. Local classes cannot have static variables. Member functions must be defined inside the class. Private members of the class cannot be accessed by the enclosing function if it is not declared

The post What is the difference between local class and nested class in c++ appeared first on Coding Security.


What is the difference between local class and nested class in c++
read more

Selasa, 27 September 2016

What is delegation event model in java

In this article we will learn about using delegation event model i.e., how to implement event handling in Java programs.   Following are the basic steps in using delegation event model or for handling events in a Java program: Implement the appropriate listener interface. Register the listener with the source. Provide appropriate event handler to handle the event raised on the source.   Key Events Handling Following is a Java program which handles key events. In the program when the user types characters in the text field, they are displayed in a label below the text field. 1 2 3

The post What is delegation event model in java appeared first on Coding Security.


What is delegation event model in java
read more

How to work with adapter classes in java

In this article we will learn about adapter classes which are used to simplify the event handling process. Sample Java programs are also provided.   Adapter classes are a set of classes which can be used to simplify the event handling process. As we can see in the mouse event handling program here, even though we want to handle only one or two mouse events, we have to define all other remaining methods available in the listener interface(s). To remove the aforementioned disadvantage, we can use adapter classes and define only the required event handling method(s). Some of the adapter classes

The post How to work with adapter classes in java appeared first on Coding Security.


How to work with adapter classes in java
read more

How to handle mouse events in java

A pointing device can generate a number of software recognisable pointing device gestures. A mouse can generate a number of mouse events, such as mouse move (including direction of move and distance), mouse left/right button up/down and mouse wheel motion, or a combination of these gestures.. In computing, an event is an action or occurrence recognized by software that may be handled by the software. Computer events can be generated or triggered by the system, by the user or in other ways. Typically, events are handled synchronously with the program flow, that is, the software may have one or more dedicated places where events are handled, frequently an event loop. A

The post How to handle mouse events in java appeared first on Coding Security.


How to handle mouse events in java
read more

Senin, 26 September 2016

Here are some of the built-in object functions in javascript

To solve different kinds of problems, JavaScript provides various built-in objects. Each object contains properties and methods. Some of the built-in objects in Javascript are: Array Date Math String Number Array object:  The properties available on Array object are: Property Description length Returns the number of elements in the array constructor Returns the function that created the array object prototype Allows us to add properties and methods to an array object Methods available on Array object are: Method Description reverse() Reverses the array elements concat() Joins two or more arrays sort() Sort the elements of an array push() Appends one or more elements at

The post Here are some of the built-in object functions in javascript appeared first on Coding Security.


Here are some of the built-in object functions in javascript
read more

What is the basic schema of XML

This article explains XML Schema which is an alternative for DTDs in specifying the high level syntax for an XML document. We will learn creating and using XML Schema along with XML documents.   Introduction Like DTD, a XML Schema also specifies the structure of the tags and attributes in a XML document. Why XML Schema when there is already DTD? There are several disadvantages of using DTD for specifying the structure of a XML document. First disadvantage is, DTDs syntax is different from that of XMLs syntax. We have to learn new syntax to work with DTDs. Second disadvantage

The post What is the basic schema of XML appeared first on Coding Security.


What is the basic schema of XML
read more

what are character formatting essentials in HTML

In the last section we have learned different ways to format paragraphs of text. Now, we will learn different ways to format individual characters or words in text. Methods of Text control You can control the look and formatting of text in your documents using various means. The direct method of controlling the look of text like the <font> tag has been deprecated in favor of HTML 4.01 and XHTML. <font> tag: The <font> tag enables the developer to directly affect the size and color or the text. The attributessize and color of the <font> tag are used to change the size and

The post what are character formatting essentials in HTML appeared first on Coding Security.


what are character formatting essentials in HTML
read more

Minggu, 25 September 2016

What are frames in HTML ?

Frames are popular in the olden days. There are used in almost all the web pages. The frameset structure provides an easy way to create multiple, separate scrolling areas in a user agent window and a flexible mechanism to modify the contents of a frame. However, there are some disadvantages of using frames. Due to this frames are deprecated. Although frames are supported in HTML 4.01, they are deprecated in HTML 5. Frames are replaced with the more powerful and flexible CSS formatting methods. Following are some of the disadvantages of frames: Frames are not search engine friendly. Frames are

The post What are frames in HTML ? appeared first on Coding Security.


What are frames in HTML ?
read more

How to perform dynamic method dispatch in java

In this article we will look at dynamic method dispatch in Java which is a way to provide run-time polymorphism. What is dynamic method dispatch? Dynamic method dispatch is a mechanism which resolves the call to a overridden method at run-time based on the type of object being referred. When is dynamic method dispatch possible? It is possible only when the following are satisfied: A class inherits from another class (inheritance) Super class variable refers a sub class object A overridden method is invoked using the super class reference Why dynamic method dispatch? Dynamic method dispatch is the way to

The post How to perform dynamic method dispatch in java appeared first on Coding Security.


How to perform dynamic method dispatch in java
read more

What are different thread priorities in java

In this article we will learn how to work with thread priorities when there are several threads competing for CPU time. Example code is also provided.   In a uni-processor system, when several threads are competing for the CPU, you might want a certain thread to get more CPU time (burst time) over the remaining threads. We can use thread priorities in such situation.   The thread class provides three final static variables (constants) namely: MIN_PRIORITY, NORM_PRIORITY, and MAX_PRIORITY whose values are 1, 5 and 10 respectively. Priority values can be in the range 1 to 10. 1 denotes minimum priority and

The post What are different thread priorities in java appeared first on Coding Security.


What are different thread priorities in java
read more

Sabtu, 24 September 2016

How to synchronize threads in java

In this article we will learn about what is synchronization? why synchronization is needed? and how to synchronize threads in Java along with sample programs.   Why Synchronization is Needed? When two or more threads are accessing the same resource like a variable or a data structure, it may lead to inconsistent data or values. Such conditions that lead to inconsistency are known as race conditions.   As an example let’s consider a variable count whose value is 7 at present. Consider two operations: count = count + 1 which is executed by thread1 and another operation count = count – 1 which is executed

The post How to synchronize threads in java appeared first on Coding Security.


How to synchronize threads in java
read more

How to work with pointers in C – programming

A pointer is a derived data type in C. It is built from one of the fundamental data types available in C. Pointers contain memory addresses as their values. Since these memory addresses are the locations in the computer memory where program instructions and data are stored, pointers can be used to access and manipulate data stored in the memory. Advantages of Pointers Pointers are used frequently in C, as they offer a number of benefits to the programmers. They include the following: Pointers are more efficient in handling arrays and data tables. Pointers can be used to return multiple

The post How to work with pointers in C – programming appeared first on Coding Security.


How to work with pointers in C – programming
read more

What are event listener interfaces in java

In this article we will learn about various event listener interfaces in Java along with the methods available in each of those listener interfaces. The event delegation model contains two main components. First are the event sources and second are the listeners. Most of the listener interfaces are available in the java.awt.event package. In Java, there are several event listener interfaces which are listed below:   ActionListener  This interface deals with the action events. Following is the event handling method available in the ActionListener interface: void actionPerformed(ActionEvent ae)   AdjustmentListener This interface deals with the adjustment event generated by the scroll

The post What are event listener interfaces in java appeared first on Coding Security.


What are event listener interfaces in java
read more

Jumat, 23 September 2016

What are literals in javascript?

JavaScript provides five scalar primitive types: Number, Boolean, String, Undefined, Null and two compound primitive types Array and Object. Even though JavaScript supports object-orientation features, it still supports these scalar primitive data types simply because of performance reasons. Maintenance of primitive values is much faster than objects. JavaScript also provides object versions known as wrapper objects for the primitive types Number, Boolean and String namely, Number, Boolean andString. All primitive values are stored on stack whereas objects are stored in heap.   String Data Type A string literal is a string value enclosed in either double quotes or single quotes.

The post What are literals in javascript? appeared first on Coding Security.


What are literals in javascript?
read more

How statement control works in PHP

Control statements in PHP are used to control the flow of execution in a script. There are three categories of control statements in PHP: selection statements, iteration / loop statements and jump statements.   Selection statements The selection statements in PHP allows the PHP processor to select a set of statements based on the truth value of a condition or Boolean expression. Selection statements in PHP are if, if-else, elseif ladder and switch statement. Syntax of if is given below: 1 2 3 4 if(condition / expression) {    statements(s); } Syntax of if-else is given below: 1 2 3

The post How statement control works in PHP appeared first on Coding Security.


How statement control works in PHP
read more

How Synchronization is performed in Operating systems

The system consisting of cooperatingsequential processes or threads, all running asynchronously andpossiblysharing data. We illustrated this model with the producer-consumer problem,described how a bounded buffer could be used to enable processes to sharememory. Solution allows at most BUFFER.SIZE – 1 items in the buffer at the sametime. Suppose we want tomodify the algorithm to remedy this deficiency. Onepossibility is to add an integer variable counter, initialized to 0. counter isincremented every time we add a new item to the buffer and is decrementedevery time we remove one item from the buffer. The code for the producerprocess can be modified as follows: while (true)

The post How Synchronization is performed in Operating systems appeared first on Coding Security.


How Synchronization is performed in Operating systems
read more

Kamis, 22 September 2016

How to check the validity of the data using javascript

One of the best uses of client-side JavaScript is the form validation. The input given by the user can be validated either on the client-side or on the server-side. By performing validation on the client-side using JavaScript, the advantages are less load on the server, saving network bandwidth and quicker response for the users. Form input can be validated using different events, but the most common event used is submit i.e when the submit button is clicked. Corresponding attribute to be used is onsubmit of the form tag. Let’s consider a simple form as shown below: 1 2 3 4

The post How to check the validity of the data using javascript appeared first on Coding Security.


How to check the validity of the data using javascript
read more

How to work with arrays in javascript

An array is a collection of elements. Unlike in Java, arrays in JavaScript can contain elements of different types. A data element can be a primitive value or a reference to other objects or arrays. An Array object can be created in two ways. First way is by using the newoperator as shown below: var array1 = new Array(10, 20, “hai”);  var array2 = new Array(10); In the first declaration, the size of array1 is 3 and the values are initialized to 10, 20 and “hai”. In the second declaration, the size of array2 is 10 and the elements are

The post How to work with arrays in javascript appeared first on Coding Security.


How to work with arrays in javascript
read more

How to define user objects in javascript

Creation and Manipulation of User Defined Objects An object is a real world entity that contains properties and behaviour. Properties are implemented as identifiers and behaviour is implemented using a set of methods. An object in JavaScript doesn’t contain any predefined type. In JavaScript the new operator is used to create a blank object with no properties. A constructor is used to create and initialize properties in JavaScript. Note: In Java new operator is used to create the object and its properties and a constructor is used to initialize the properties of the created object. An object can be created

The post How to define user objects in javascript appeared first on Coding Security.


How to define user objects in javascript
read more

Rabu, 21 September 2016

How to perform form processing in PHP

This article explains about form processing in PHP. Users enter various data in a HTML form through different HTML controls. We will see how to process that data in a PHP script. One of the applications of PHP is processing the data provided by the users in (X)HTML forms. PHP provides two implicit arrays $_GET and $_POST which are global variables and are accessible anywhere in a PHP script. The array $_GET is used when the attribute method of the form tag is set toGET and the array $_POST is used when the attribute method of the form tag is

The post How to perform form processing in PHP appeared first on Coding Security.


How to perform form processing in PHP
read more

How functions are defined in PHP?

A function is a part of program which contains set of statements that can perform a desired task. A function can be defined with the function keyword followed by the function name and an optional set of parameters enclosed in parentheses. A function definition may not occur before a function call. It can be anywhere in the script. Although function definitions can be nested, it is not encouraged as they can make the script complex. Syntax for defining a function is given below: 1 2 3 4 5 function  function_name() {     //Body of the function      } The

The post How functions are defined in PHP? appeared first on Coding Security.


How functions are defined in PHP?
read more

What are the properties of CSS

To give various styles to HTML elements, CSS provides various properties. Related properties are grouped as: font properties, text properties, background properties, List properties etc. Font Properties The primary content in any web document is text. To apply different styles to the font of the text, we can use font properties. Font Families:  The shape and space between the characters depends upon the font family. A font family can be set using the CSS font property font-family. It is common to specify multiple font names separated by commas as a value to this property as shown below: p { font-family

The post What are the properties of CSS appeared first on Coding Security.


What are the properties of CSS
read more

Selasa, 20 September 2016

What is the difference between throw, throws and finally in java

In this article we will look at the use of throw throws and finally keywords of exception handling in Java programs.   throw Keyword The throw keyword can be used in Java programs to throw exception objects explicitly. The syntax of using throw is as follows: throw ThrowableInstance; The ThrowableInstance can be object of Throwable class or any of its sub classes. A reference to the Throwable instance can be obtained using the parameter in catch block or by using the new operator. Let’s see a sample program that demonstrates the use of throw: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 class ArrayException {

The post What is the difference between throw, throws and finally in java appeared first on Coding Security.


What is the difference between throw, throws and finally in java
read more

How to group threads in java

In this article we will learn what is a thread group? How to work with thread groups in Java along with example program.   A thread group is a collection of threads. A thread group allows the programmer to maintain a group of threads more effectively. To support thread groups Java provides a class named ThreadGroup available in java.langpackage.   Some of the constructors available in ThreadGroup class are: ThreadGroup(String group-name) ThreadGroup(ThreadGroup parent, String group-name)   After creating a thread group using one of the above constructors, we can add a thread to the thread group using one of the following Thread constructors: Thread(ThreadGroup ref,

The post How to group threads in java appeared first on Coding Security.


How to group threads in java
read more

What are Java literals? How do they work?

In this article you will learn about Java literals, which are frequently used in Java programs. You will learn about different types of Java literals and some examples for writing and using different literals in Java programs. Every Java primitive data type has its corresponding literals. A literal is a constant value which is used for initializing a variable or directly used in an expression. Below are some general examples of Java literals:   Integer Literals: Integer literals are the most commonly used literals in a Java program. Any whole number value is an example of an integer literal. For example, 1, 10,

The post What are Java literals? How do they work? appeared first on Coding Security.


What are Java literals? How do they work?
read more

Senin, 19 September 2016

How to override methods in java

In this article we will look at method overriding which is similar to method overloading. Method overriding is a mechanism which supports polymorphism in Java. What is method overriding? In the context of inheritance, suppose a base class A contains a method display with zero parameters and sub class B also contains a method display with zero parameters, what happens when we create an object for class B and call the display method using that object? The method that will execute is the display method in the sub class B. Then what happened to the display method in super class A? It was hidden. This process of

The post How to override methods in java appeared first on Coding Security.


How to override methods in java
read more

What is the basic structure of the java program

In this post I will explain the structure of a Java program. A Java program is a collection of one or more classes, in which, one class contains the mainmethod. Before looking at the structure of a Java program, let’s see the structure of a Java class. Structure of a Java class is as shown below: A Java class can contain the following: Package statement: A package statement is used to declare a Java class as a part of the specified package. More on declaring packages later. Package statement is optional. When we decide to write a package statement, it should

The post What is the basic structure of the java program appeared first on Coding Security.


What is the basic structure of the java program
read more

What is static keyword in java

In this article we will look at static keyword which can be used to share data among multiple objects.   static Keyword In Java programs, static keyword can be used to create the following: Class variables Class methods Static blocks   Class Variables: The static keyword is used to create one of the three types of variables called as class variables. A class variable is a variable declared inside a class and outside all the methods and is marked as static. Syntax for declaring a class variable or a static variable is shown below: static data-type variable-name; Example for declaring a class

The post What is static keyword in java appeared first on Coding Security.


What is static keyword in java
read more

Minggu, 18 September 2016

How to display content of file in an applet

A Java applet extends the class java.applet.Applet, or in the case of a Swing applet, javax.swing.JApplet. The class which must override methods from the applet class to set up a user interface inside itself (Applet) is a descendant of Panel which is a descendant of Container. As applet inherits from container, it has largely the same user interface possibilities as an ordinary Java application, including regions with user specific visualization. The first implementations involved downloading an applet class by class. While classes are small files, there are often many of them, so applets got a reputation as slow-loading components. However,

The post How to display content of file in an applet appeared first on Coding Security.


How to display content of file in an applet
read more

How to draw lines, rectangles and ovals in java applet

A Java applet is a small application which is written in Javaand delivered to users in the form of bytecode. The user launches the Java applet from a web page, and the appletis then executed within a Java Virtual Machine (JVM) in a process separate from the web browser itself. Java Applets are usually used to add small, interactive components or enhancements to a webpage. These may consist of buttons, scrolling text, or stock tickers, but they can also be used to display larger programs like word processors or games. Java applets run at very fast speeds and, until 2011,

The post How to draw lines, rectangles and ovals in java applet appeared first on Coding Security.


How to draw lines, rectangles and ovals in java applet
read more

Here are some basic networking concepts for begineers

Network A network is a collection of interconnected computers, which are connected using communication media along with communication devices. Examples of communication devices are: modems, routers and bridges. Examples of communication media are: telephone cables, coaxial cables, twisted pair cables and fiber optical cables. Using a network has several advantages like: Easy to share the information. Easy to share the resources like printers etc. Saves time and money. Topology The topology of a network refers to the structure in which the computers are interconnected with one another. Some of the network topologies are mesh, star, bus, ring etc. Internet The

The post Here are some basic networking concepts for begineers appeared first on Coding Security.


Here are some basic networking concepts for begineers
read more

Sabtu, 17 September 2016

What are the basic concepts of the software development

A computer generally consists of two components: Hardware and Software. The purpose of software is to use the hardware components. So far, we have seen the hardware components. Now, let’s learn about the software related concepts. Program A program is a set of instructions for solving a particular problem. Using programs a human can use the underlying hardware components like CPU, Memory etc. Software Software is a set of programs. Computer software is divided into two broad categories: 1) System software and 2) Application software. System software manages the computer’s hardware resources. It provides the interface between the hardware and

The post What are the basic concepts of the software development appeared first on Coding Security.


What are the basic concepts of the software development
read more

What are data types in C- Programming

A data type specifies the type of value that we use in our programs. A data type is generally specified when declaring variables, arrays, functions etc. In ANSI C, the data types are divided into three categories. They are: 1) Primitive or Fundamental data types 2) User-defined data types 3) Derived data types Primitive or Fundamental data types The primitive data types in ANSI C are as shown in the below diagram: The most fundamental data types that every C compiler supports are: int, char, float and double. Other compilers support the extended versions of these fundamental data types like:

The post What are data types in C- Programming appeared first on Coding Security.


What are data types in C- Programming
read more

What are Preprocessor Directives in C- Programming

C provides many features like structures, unions and pointers. Another unique feature of the C language is the preprocessor. The C preprocessor provides several tools that are not present in other high-level languages. The programmer can use these tools to make his program easy to read, easy to modify, portable and more efficient. The preprocessor is a program that processes the source code before it passes through the compiler. Preprocessor directives are placed in the source program before the main line. Before the source code passes through the compiler, it is examined by the preprocessor for any preprocessor directives. If

The post What are Preprocessor Directives in C- Programming appeared first on Coding Security.


What are Preprocessor Directives in C- Programming
read more

How to Achieve runtime polymorphism

In programming languages and type theory, polymorphism  is the provision of a single interface to entities of different types. A polymorphic type is one whose operations can also be applied to values of some other type, or types.There are several fundamentally different kinds of polymorphism: Ad hoc polymorphism: when a function denotes different and potentially heterogeneous implementations depending on a limited range of individually specified types and combinations. Ad hoc polymorphism is supported in many languages using function overloading. Parametric polymorphism: when code is written without mention of any specific type and thus can be used transparently with any number

The post How to Achieve runtime polymorphism appeared first on Coding Security.


How to Achieve runtime polymorphism
read more

What is function terminology in C- Programming

Creating functions For creating functions in C programs, we have to perform two steps. They are: 1) Declaring the function and 2) Defining the function. Declaring functions The function declaration is the blue print of the function. The function declaration can also be called as the function’s prototype. The function declaration tells the compiler and the user about what is the function’s name, inputs and output(s) of the function and the return type of the function. The syntax for declaring a function is shown below: Example: In the above example, readint is the name of the function, int is the

The post What is function terminology in C- Programming appeared first on Coding Security.


What is function terminology in C- Programming
read more

Steps to Develop Applications

A computer program is a set of formal instructions, which the computer executes in order to carry out some designated task. Whether that task is as simple as adding two numbers together or as complex as maintaining a large inventory for a multi-national corporation, there is a common element involved. They are both achieved by the computer executing a series of instructions –the computer program. Programming can be defined as the development of a solution to an identified problem. There are six basic steps in the development of a program: Define the problem This step (often overlooked) involves the careful

The post Steps to Develop Applications appeared first on Coding Security.


Steps to Develop Applications
read more

Kamis, 15 September 2016

How to find the GCD of a number in recursive and non-recursive methods

In mathematics, the greatest common divisor (gcd) of two or more integers, when at least one of them is not zero, is the largest positive integer that divides the numbers without a remainder. For example, the GCD of 8 and 12 is 4. One good way to find the least common multiple of 2 numbers is to multiply both numbers by 1,2,3,4,5… and then find the first multiple that appears in both lists. The first number that appears in both lists is 24. (48 appears also, but it is not ‘least’), so 24 is the LCM of 6 and 8.

The post How to find the GCD of a number in recursive and non-recursive methods appeared first on Coding Security.


How to find the GCD of a number in recursive and non-recursive methods
read more

How to simulate cloud architecture

Introduction Although cloud computing‘s inception spans over a decade, still there are many challenging issues which requires a significant amount of research to be done. It is impractical for medium to small sized educational institutions and other organizations to establish a physical cloud for conducting research on cloud computing. It is not possible to perform benchmarking experiments in repeatable, dependable, and scalable environments using real-world cloud environments. A solution for this is to use simulators (virtual reality) which can simulate a real cloud environment. A cloud simulator helps to model various kinds of cloud applications by creating data centers, virtual

The post How to simulate cloud architecture appeared first on Coding Security.


How to simulate cloud architecture
read more

Rabu, 14 September 2016

Howto pass arguments to applet in java

In this article we will learn about passing parameters to applets using the param tag and retrieving the values of parameters using getParameter method.   Parameters specify extra information that can be passed to an applet from the HTML page. Parameters are specified using the HTML’s param tag.   Param Tag The <param> tag is a sub tag of the <applet> tag. The <param> tag contains two attributes: name and value which are used to specify the name of the parameter and the value of the parameter respectively. For example, the param tags for passing name and age parameters looks as shown below:

The post Howto pass arguments to applet in java appeared first on Coding Security.


Howto pass arguments to applet in java
read more

How to work with mutithreading in java

In this article we will learn what is multithreading and how to create and use threads in Java programs.   Background Information Multitasking: Ability to execute two or more tasks in parallel or simultaneously is known as multitasking. Multitasking is of two types: 1) Process based multitasking and 2) Thread based multitasking. Process based multitasking: Executing two or more processes simultaneously is known as process based multitasking. For example, we can listen to music and browse internet at the same time. The processes in this example are the music player and browser. Thread based multitasking: Thread is a part of process

The post How to work with mutithreading in java appeared first on Coding Security.


How to work with mutithreading in java
read more

what are tokens in C- Programming

Introduction A programming language is designed to help process certain kinds of data consisting of numbers, characters and strings and to provide useful output known as information. The task of processing data is achieved by writing instructions. These set of instructions is known as a program. Programs are written using words and symbols according to the rigid rules of the programming language known as syntax.   Character Set The characters that can be used to form words, numbers and expressions depend upon the computer on which the program is run. The characters in C, are grouped into the following four

The post what are tokens in C- Programming appeared first on Coding Security.


what are tokens in C- Programming
read more

Selasa, 13 September 2016

Here are some of the basic array operations in java

In this post we are going to look at some very basic and frequently asked array programs in Java. Different programs are written as separate functions in the class ArrayClass. These programs are restricted to integers. Following programs are available: Reading elements into an array Printing elements in an array Printing the sum of all elements in an array Printing the average of elements in an array Print the least element in the array Print the largest element in the array Search an element in the array using linear search Search an element in the array using binary search Return the

The post Here are some of the basic array operations in java appeared first on Coding Security.


Here are some of the basic array operations in java
read more

what are auto, register, extern and static in C programming

The storage classes specify the scope and lifetime of a variable in a C program. The scope (active) specifies in which parts of the program is the variable accessible and the lifetime (alive) specifies how long a variable is available in the memory so that the program will be able to access that variable. There are four storage classes in C. They are: auto register extern static The storage classes’ auto, register and static can be applied to local variables and the storage classes’ extern and static can be applied to global variables. auto When a variable is declared with

The post what are auto, register, extern and static in C programming appeared first on Coding Security.


what are auto, register, extern and static in C programming
read more

Here are some Basic Terminologies that every programmer should know

Following are some of the basic terms every programmer should know before learning any programming language: Language A language is a set of characters, words and associated grammar rules which is used for communication between two human beings either spoken or written. Examples: Telugu, Hindi, English etc. Programming Language A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. The earliest known programmable machine preceded the invention of the digital

The post Here are some Basic Terminologies that every programmer should know appeared first on Coding Security.


Here are some Basic Terminologies that every programmer should know
read more

Senin, 12 September 2016

How to read the text data in files and display number of words and lines using java

Parsing or syntactic analysis is the process of analysing a string of symbols, either in natural language or in computer languages, conforming to the rules of a formal grammar. The term parsing comes from Latin pars (orationis), meaning part (of speech). The term has slightly different meanings in different branches of linguistics and computer science. Traditional sentence parsing is often performed as a method of understanding the exact meaning of a sentence or word, sometimes with the aid of devices such as sentence diagrams. It usually emphasizes the importance of grammatical divisions such as subject and predicate. Within computational linguistics

The post How to read the text data in files and display number of words and lines using java appeared first on Coding Security.


How to read the text data in files and display number of words and lines using java
read more

What is a user-defined exception?

In this article we will learn how to create user defined exceptions (own exceptions) and how to use them in Java programs. Although Java provides several pre-defined exception classes, sometimes we might need to create our own exceptions which are also called as user-defined exceptions. Steps for creating a user-defined exception: Create a class with your own class name (this acts the exception name) Extend the pre-defined class Exception Throw an object of the newly create exception As an example for user-defined exception, I will create my own exception named NegativeException as follows: 1 2 3 4 5 6 7 8 9

The post What is a user-defined exception? appeared first on Coding Security.


What is a user-defined exception?
read more

What are try and catch blocks in exception handling

In this article we will learn about try and catch blocks in more detail along with Java code examples.   A Simple try-catch Block As we know, statements that might raise exceptions are placed inside tryblock and the exception handling code is placed inside catch block. A try block must be followed immediately by one or more catch blocks or a finally block. Let’s see an example program which catches an array index out of bounds exception: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 class ArrayException { public static void main(String args) { try

The post What are try and catch blocks in exception handling appeared first on Coding Security.


What are try and catch blocks in exception handling
read more

Minggu, 11 September 2016

How to suspend ,resume and stop threads

Based on the requirements sometimes you might want to suspend, resume or stop a thread. For doing such operations on a thread, before Java 2, thread API used to contain suspend(), resume() and stop() methods. But all these methods might lead to undesired behavior of the program or machine. For example, these methods might lead to deadlock when a thread locked and is accessing a data structure and suddenly it is suspended or stopped. All other threads will be waiting indefinitely for gaining access to the data structure. Because of this drawback of suspend(), resume() and stop() methods, they have been deprecated (should not

The post How to suspend ,resume and stop threads appeared first on Coding Security.


How to suspend ,resume and stop threads
read more

How postCSS is better than SASS and LESS

Most of the front-end devs already know about the SASS and LESS and some of the them might heard about the PostCSS, but didn’t get a chance to try it out the toll is becoming popular day-by-day and due to it’s growing benefits over the other systems ruby developers have found with the same technology at Railsware. How to Treat PostCSS For the beginning, you need to understand that PostCSS is created not solely for preprocessing (even though numerous developers use it instead of LESS, Stylus, and SASS. The point is – you can use it either as a preprocessor

The post How postCSS is better than SASS and LESS appeared first on Coding Security.


How postCSS is better than SASS and LESS
read more

7 best python frameworks for web development

A web framework (WF) or web application framework (WAF) is a software framework that is designed to support the development of web applications including web services, web resources and web APIs. Web frameworks aim to alleviate the overhead associated with common activities performed in web development. For example, many web frameworks provide libraries for database access, templating frameworks and session management, and they often promote code reuse. Though they often target development of dynamic websites they are also applicable to static websites. Python programming language is one of the most efficient language for the development of the server based applications python

The post 7 best python frameworks for web development appeared first on Coding Security.


7 best python frameworks for web development
read more

Sabtu, 10 September 2016

What are literals in java??

In this article you will learn about Java literals, which are frequently used in Java programs. You will learn about different types of Java literals and some examples for writing and using different literals in Java programs. Every Java primitive data type has its corresponding literals. A literal is a constant value which is used for initializing a variable or directly used in an expression. Below are some general examples of Java literals: Integer Literals: Integer literals are the most commonly used literals in a Java program. Any whole number value is an example of an integer literal. For example, 1, 10, 8343

The post What are literals in java?? appeared first on Coding Security.


What are literals in java??
read more

What are object orientation principles in java

In this article we will look at the key object orientation principles also known as OOP principles. Although some people or textbooks mention three OOP principles, I would say there are four key principles namely abstraction, encapsulation, inheritance and polymorphism. Note: OOP refers to Object Oriented Programming.   Abstraction Abstraction is first of the object orientation principles. It is defined as hiding the complex details and presenting only with the relevant or necessary details.Abstraction is used to manage complexity while writing programs. Encapsulation and inheritance are used to implement abstraction while writing programs. Abstraction represents the external behavior of the object (what the

The post What are object orientation principles in java appeared first on Coding Security.


What are object orientation principles in java
read more

how to work data permission control in java

In this article we will look at access control in Java. We will learn about four access modifiers: public, protected, default and private along with java code examples.   Access Control Access control is a mechanism, an attribute of encapsulation which restricts the access of certain members of a class to specific parts of a program. Access to members of a class can be controlled using the access modifiers.There are four access modifiers in Java. They are: public protected default private If the member (variable or method) is not marked as either public or protectedor private, the access modifier for that member will

The post how to work data permission control in java appeared first on Coding Security.


how to work data permission control in java
read more

Jumat, 09 September 2016

How garbage collection is done in java

In this article we will learn about garbage collection, which is a mechanism for freeing the memory occupied by objects which are no longer used in a program.   Garbage Collection  In most of the object oriented programming languages, memory management (allocating and deallocating memory) is left to the user and it is generally error prone (user might forget to free the memory occupied by an object). Objects are allocated memory in the heap memory which grows and shrinks dynamically. Java provides automatic memory management through a mechanism known as garbage collection. Unused objects are collected for garbage collection by

The post How garbage collection is done in java appeared first on Coding Security.


How garbage collection is done in java
read more

What are methods in java

In this article you will learn about Java methods. You will look at what is a method, how to create methods in a Java class, how to call a method, how to return a value from a method and more. Method: A method is a piece of code to solve a particular task. A method is analogous to functions in C and C++. Methods are defined inside a class. The syntax for creating a method is as shown below: The return_type specifies the type of value that will be returned by the method. The name of the method is specified by method_name. Every

The post What are methods in java appeared first on Coding Security.


What are methods in java
read more

What are variable length arguments in java

In this article we will look at what is variable length arguments or varargs is and how to use variable length arguments in methods to solve the complexity of a Java program.   There might be some situations while creating methods, where the programmer might not know how many arguments are needed in the method definition or how many arguments are going to be passed at run-time by the user. Prior to Java 5, there were a couple of workarounds for this problem but was often complex or error prone.   With Java 5, a new feature called varargs was

The post What are variable length arguments in java appeared first on Coding Security.


What are variable length arguments in java
read more

Kamis, 08 September 2016

How to work with command line arguments in java

In this article we will learn about what a command line argument is and how to access and work with the command line arguments in Java.   Sometimes we might want to pass extra information while running a Java program. This extra information passed along with the program name are known as command line arguments. These command line arguments are separated by white spaces.   Command line arguments can be accessed using the string array specified in the main function’s signature. For example, if the array name is args, then the first command line argument can be accessed as args

The post How to work with command line arguments in java appeared first on Coding Security.


How to work with command line arguments in java
read more

How to perform recursion operation in java

This article explains about recursion in Java. We will learn what is recursion and how to use recursion to write effective Java programs. Recursion is a famous way to solve problems with less lines of code. Many programmers prefer recursion over iteration as less amount of code is required to solve problems using recursion. A method calling itself in its definition (body) is known as recursion. For implementing recursion, we need to follow the below requirements: There should be a base case where the recursion terminates and returns a value. The value of the parameter(s) should change in the recursive

The post How to perform recursion operation in java appeared first on Coding Security.


How to perform recursion operation in java
read more

How to perform parameter passing in java

This article explains about the parameter passing techniques in programming languages in general and how Java handles parameters in methods. Sample code is also provided which demonstrates the parameter passing techniques.   Parameter passing techniques  If you have any previous programming experience you might know that most of the popular programming languages support two parameter passing techniques namely: pass-by-value and pass-by-reference. In pass-by-value technique, the actual parameters in the method call arecopied to the dummy parameters in the method definition. So, whatever changes are performed on the dummy parameters, they are not reflected on the actual parameters as the changes

The post How to perform parameter passing in java appeared first on Coding Security.


How to perform parameter passing in java
read more

Rabu, 07 September 2016

How to perform I/O in C – Programming

Reading Input from Keyboard Another way of assigning values to variables besides directly assigning the value is reading values from the keyboard. C provides scanf function in thestdio.h header file. Using this function we can read values from the keyboard and assign the values to variables. The syntax of scanf function is as shown below: The control string specifies the type of value to read from the keyboard and the ampersand symbol & is an operator to specify the address the variable(s). Example usage of scanf function is shown below: Printing onto Screen To print or output text onto the screen,

The post How to perform I/O in C – Programming appeared first on Coding Security.


How to perform I/O in C – Programming
read more

How to create constants in C – Programming

Constants in C are fixed values which cannot be changed during the execution of the program. In C, we can declare variables as constants in two ways. They are: 1) By using “const” keyword 2) By using “#define” preprocessor directive const Keyword We can declare a variable as a constant by using the const qualifier. A variable that is declared using const cannot change its value once it is initialized. The syntax of using the const is as shown below: Example of using the const keyword is as shown below: #define Preprocessor Directive We can also declare constants in a

The post How to create constants in C – Programming appeared first on Coding Security.


How to create constants in C – Programming
read more

How to perform ARP Cache Poisoning with Scapy

ARP poisoning is one of the oldest yet most effective tricks in a hacker’s toolkit. Quite simply, we will convince a target machine that we have become its gateway, and we will also convince the gateway that in order to reach the target machine, all traffic has to go through us. Every computer on a network maintains an ARP cache that stores the most recent MAC addresses that match to IP addresses on the local network, and we are going to poison this cache with entries that we control to achieve this attack. Because the Address Resolution Protocol and ARP

The post How to perform ARP Cache Poisoning with Scapy appeared first on Coding Security.


How to perform ARP Cache Poisoning with Scapy
read more

Selasa, 06 September 2016

How to use this keyword in java

In this article, we will look at the uses of this keyword in Java programs along with example Java code.   this Keyword  this keyword in Java is used to refer current object on which a method is invoked. Using such property, we can refer the fields and other methods inside the class of that object. The this keyword has two main uses which are listed below: It is used to eliminate ambiguity between fields and method parameters having the same name. It is used for chaining constructors. To explain the first use, let’s consider the following program, which creates a

The post How to use this keyword in java appeared first on Coding Security.


How to use this keyword in java
read more

what is access control in java

In this article we will look at access control in Java. We will learn about four access modifiers: public, protected, default and private along with java code examples.   Access Control Access control is a mechanism, an attribute of encapsulation which restricts the access of certain members of a class to specific parts of a program. Access to members of a class can be controlled using the access modifiers.There are four access modifiers in Java. They are: public protected default private If the member (variable or method) is not marked as either public or protectedor private, the access modifier for that member will

The post what is access control in java appeared first on Coding Security.


what is access control in java
read more

How to perform overloading in java

In this article you are going to learn about overloading in Java. You will look at what is overloading? why should we use overloading? along with details and examples on method overloading and constructor overloading.   Overloading  One of the way through which Java supports polymorphism is overloading. It can be defined as creating two or more methods in the same class sharing a common name but different number of parameters or different types of parameters. You should remember that overloading doesn’t depend upon the return type of the method. Since method binding is resolved at compile-time based on the

The post How to perform overloading in java appeared first on Coding Security.


How to perform overloading in java
read more

Senin, 05 September 2016

What are methods in Java? How do they work?

In this article you will learn about Java methods. You will look at what is a method, how to create methods in a Java class, how to call a method, how to return a value from a method and more. Method: A method is a piece of code to solve a particular task. A method is analogous to functions in C and C++. Methods are defined inside a class. The syntax for creating a method is as shown below: The return_type specifies the type of value that will be returned by the method. The name of the method is specified by method_name. Every

The post What are methods in Java? How do they work? appeared first on Coding Security.


What are methods in Java? How do they work?
read more

What is java Virtual Machine? How does it work?

In this article we will look at Java Virtual Machine (JVM) which provides the run-time engine for bytecode generated by the Java compiler. We will look at JVM architecture and more. Before learning about JVM it is important to know about JDK (Java Development Kit) and JRE (Java Runtime Environment). Below figure shows the relationship between JDK, JRE, and JVM: JDK provides programmers with a set of tools (like javac, debugger, javap, appletviewer etc..) for developing Java programs. JDK includes JRE. JRE provides the run-time engine JVM along with the class libraries which contains the predefined functionality. Using JDK programmers

The post What is java Virtual Machine? How does it work? appeared first on Coding Security.


What is java Virtual Machine? How does it work?
read more

Minggu, 04 September 2016

How do constructors work in java

In this article we will look at constructors in Java. We will learn what is a constructor, use of a constructor in Java programs, characteristics of a constructor and different types of a constructor.   Constructor  A constructor is a special method which has the same name as class name and that is used to initialize the objects (fields of an object) of a class. A constructor has the following characteristics: Constructor has the same name as the class in which it is defined. Constructor doesn’t have a return type, not even void. Implicit return type for a constructor is

The post How do constructors work in java appeared first on Coding Security.


How do constructors work in java
read more

Every Library File and it’s function in C – Programming

Predefined / Library Functions A function is said to be a predefined function or library function, if they are already declared and defined by another developer. These predefined functions will be available in the library header files. So, if we want to use a predefined function, we have to include the respective header file in our program. For example, if we want to use printf function in our program, we have to include thestdio.h header file, as the function printf has been declared inside it. Some of the header files in C are: Some of the predefined functions available in

The post Every Library File and it’s function in C – Programming appeared first on Coding Security.


Every Library File and it’s function in C – Programming
read more

How to work with Loops in C – Programming

goto Statement Unlike other selection or branching statements that we have seen so far which branches based on a condition, the goto statement branches unconditionally. That is why the goto statement is also referred to as unconditional jump statement. There are two more unconditional branch statements in C. They are: break and continue. We have already seen the break statement inswitch statement. But both break and continue are extensively used inside loops. So, we will discuss about these two unconditional branch statements later. By using the goto branch statement, we can either skip some instructions and jump forward in the

The post How to work with Loops in C – Programming appeared first on Coding Security.


How to work with Loops in C – Programming
read more

How to work with arrays in C – Programming

Arrays In all the programs we have done until now, to store and operate on values we have used variables. But at a point in time, a variable can hold only a single value. For example, in the following syntax: int a = 10; we are able to store only 10 in the variable a, which is a single value. It is normal in programming to work with a list of values or a group of values at once. For such purposes, variables cannot be used. So, C language provides the construct array for holding multiple values at once. Definition:

The post How to work with arrays in C – Programming appeared first on Coding Security.


How to work with arrays in C – Programming
read more

Sabtu, 03 September 2016

How to work with strings in C – Programming

Strings A string is a collection of characters which is treated as a single data item. A group of characters enclosed in double quotes is known as a string constant. Some of the examples of string constants are: “hai” “hello world” “My name is suresh” In C programming, there is no predefined data type to declare and use strings. So, we use character arrays to declare strings in C programs. The common operations that can be performed on a string are: Reading and writing strings Combining strings together Copying one string to another Comparing strings for equality Extracting a portion

The post How to work with strings in C – Programming appeared first on Coding Security.


How to work with strings in C – Programming
read more

What are control statements in C – Programming

In C, until so far, in all the programs, the control is flowing from one instruction to next instruction. Such flow of control from one instruction to next instruction is known as sequential flow of control. But, in most of the C programs, while writing the logic, the programmer might want to skip some instructions or repeat a set of instructions again and again. This is can be called as non-sequential flow of control. The statements in C, which allows the programmers to make such decisions, are known as decision making statements or control statements. In C, there are two

The post What are control statements in C – Programming appeared first on Coding Security.


What are control statements in C – Programming
read more

What are types of variables in C – Programming

A variable is a memory location inside memory which is referred using a name. The value inside a variable changes throughout the execution of the program. Based on where the variable is declared in the program, variables can be divided into two types. They are: Local Variables Global Variables Local Variables A variable is said to be a local variable if it is declared inside a function or inside a block. The scope of the local variable is within the function or block in which it was declared. A local variable remains in memory until the execution of the function

The post What are types of variables in C – Programming appeared first on Coding Security.


What are types of variables in C – Programming
read more

Jumat, 02 September 2016

How to decode WPA/WEP keys using Penetrate Pro

The App Penetrate Pro is developed by Biogo Ferreria. It is an excellent App for decoding WEP/WPA WiFi Keys. The Latest Build of the penetrate pro supports the following features. Routers based on Thomson: Thomson, Infinitum, BBox, DMax, Orange, SpeedTouch, BigPond, O2Wireless, Otenet. DLink Eircom Pirelli Discus Verizon FiOS (only some routers) Fastweb (Pirelli & Telsey) Jazztel_XXXX and WLAN_XXXX Tecom Infostrada SkyV1 Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone

The post How to decode WPA/WEP keys using Penetrate Pro appeared first on Coding Security.


How to decode WPA/WEP keys using Penetrate Pro
read more

How to scan ports in the network using aNmap from mobile

Nmap has been one of the most important tool for every network security developer from over the last 10 years but it is only available in the windows , Linux and Mac OS X but it is still not available in the android, Even though there are 1 Billion Android Devices. Hence we are here to introduce the aNamp it is compiled from the Nmap source code by some devs to support android Devices. aNamp is an android tool that you can use on a network to determine the available hosts, services and OS to get all the features of

The post How to scan ports in the network using aNmap from mobile appeared first on Coding Security.


How to scan ports in the network using aNmap from mobile
read more

How to perform Dynamic analysis of an android application using DroidBox

DroidBox is developed to offer dynamic analysis of Android App Data. The following information listed down below are the results shown and generated. Hashes for the analyzed package Incoming/outgoing network data File read and write operations Started services and loaded classes through DexClassLoader Information leaks via the network, file and SMS Circumvented permissions Cryptography operations performed using Android API Listing broadcast receivers Sent SMS and phone calls Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity

The post How to perform Dynamic analysis of an android application using DroidBox appeared first on Coding Security.


How to perform Dynamic analysis of an android application using DroidBox
read more

Kamis, 01 September 2016

How to hack android device network using Network Spoofer

Network Spoofer lets you change websites on other people’s computers from an Android phone. You can you network Spoofer to Flip pictures upside down Flip text upside down Make websites experience gravity Redirect websites to other pages Delete random words from websites Replace words on websites with others Change all pictures to Trollface Wobble all pictures / graphics around a bit A few custom modes for you to have your own fun! Download and prank your friends! It is a very easy app to use if you are looking to prank your friends the app will just run fine if

The post How to hack android device network using Network Spoofer appeared first on Coding Security.


How to hack android device network using Network Spoofer
read more

Hacking Android Devices using androrat

The android devices in the network can be hacked using Meterpreter Attack but most of the people are not aware that process is not safe, But for this sense we can use the AndroRAT(Android Remote Administration Tool) to hack any android device in the network. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it’s a good idea to try to use this to attempt to hack systems that

The post Hacking Android Devices using androrat appeared first on Coding Security.


Hacking Android Devices using androrat
read more