Posts

Stack Data Structure Implementation using Arrays | Lab 1 | Logic and Program | Tamil | MPR

  Stack Data Structure Implementation using Arrays Watch this video in 1.5x if you want, coz the video is litter longer and I hope it will be useful. The program uses the concept of arrays and stacks and understanding it completely is obviously little tough, and I tried to complete it as best as I can and I hope you will find it useful. Try to visualize the concept and learn. Kindly comment down the pros and cons of the video. So that will improve myself. Welcome to this educational video on implementing a stack data structure using arrays. In this lab session, we will cover the logic and program for building a stack data structure in a step-by-step manner. We will start with an introduction to the concept of stacks and their applications in computer science. Then we will dive into the implementation details, including the definition of a stack, the array-based approach for building a stack, and the various operations that can be performed on a stack such as push, pop, and peek. Thr

Tower of Hanoi | Lab 1 | Logic and Program

  Tower of Hanoi Watch this video in 1.5x if you want, coz the video is litter longer and I hope it will be useful. The program uses the concept of recursion and understanding it completely is obviously little tough, and I tried to complete it as best as I can and I hope you will find it useful. Try to visualize the concept and learn. Kindly comment down the pros and cons of the video. So that will improve myself. Tower of Hanoi <- Video Link!!! Source Code: // 1 Tower of Hanoi #include <stdio.h> int towerofHanoi(int,char,char,char); void main() {        int n;        printf("Enter the number of disks \n");        scanf("%d",&n);        towerofHanoi(n,'A','C','B'); } int towerofHanoi(int n,char src, char dest, char aux) {        if (n==1) {         printf("Move disk 1 from %c to %c \n",src,dest);        }        else {         towerofHanoi(n-1,src,aux,dest);         printf("Move disk %d from %c to %c\n",n,src

Andrax - Advanced pentesting Platform...

Image
ANDRAX  is a  Penetration Testing  platform developed specifically for  Android  smartphones, it has the ability to run natively on Android so it behaves like a common Linux distribution, But more powerful than a common distribution! The development of the tool began on 08/09/2016 (DD/MM/YYYY) only for people in Brazil ANDRAX has been fully redefined and reloaded on 05/10/2018 (DD/MM/YYYY) open to the international public. It enable to all Android device with root access enabled and a good unlocked rom become a weapon for advanced Penetration Testing.  Simple, everyone has a smartphone and spends all the time with it! We have the possibility to camouflage easily in the middle of everyone, the processor architecture of most Android smartphones is ARM a modern and robust architecture extremely superior to the rest, With touch screens we can run the tools with great agility and take advantage of the graphical interface of Android, we can get in almost anywhere with our smartphones. In tec

Termux - Android Linux Environment

Image
 What is Termux ? Termux is an Android terminal emulator and Linux environment application that works directly with no rooting or setup required. A minimal base system is installed automatically, additional packages are available using the package manager. You can obtain Termux builds from F-Droid. Do not install it from Google Play. Bcoz, their gogle play support of termux iis stopped, so that you cannot install needed packages from termux which is installed from google play. So, make sure to instal the termux from F-Droid. System requirements: Android 7.0 - 11.0 CPU: AArch64, ARM, i686, x86_64. At least 200 MB of disk space. Please note that Termux does not support ARM devices without NEON SIMD, for example on devices based on Nvidia Tegra 2 CPUs. On various Internet resources, Termux is recognized as utility extremelly helpful for variety of purposes like hacking, phishing and information gathering. This is possible due to availability of famous pentesting software like  Metasploit

Case 1 - Cyber Crime

 Hello guys as usual I am Rahul and today I am gonna show you some interesting facts regarding the case I got recently so before explaining about that case I want to share you some details regarding what I did to that case ok. so I cannot do anything to that case because the victim is very not aware of any cyber crimes and all so at that occur easily hypnotist are done some tricks and got that what he want ok so I will explain what are the things happen from the beginning ok me and my friends and a set of people are running WhatsApp and telegram groups for training some people to get into the cybersecurity fields ok daily someone will take the lecture one day I will take another day my friend so that it will go on and continue there is a guy whose name is Falcon he is also a member in that group one day she texted me and told me that bro my friend facing one problem so please help me get it out of this so I like I asked him what happened what are the things have a father doing so he st

Types of Hacking !

Hacking techniques are ever-evolving, and it’s important to keep up with new threats. Hackers are usually after two things from your business: data or money.  Usually they’re motivated by both, as uncovering a wealth of data can help them to cash in.  Compromised data can cost you a lot. “The average cost of a data breach is $3.92 million as of 2019,” according to the Ponemon Institute. Larger corporations aren’t the only targets. According to a data breach investigation by Verizon, “43% of breach victims were small businesses.” Are you doing everything you can to protect your organization? Discover our top tips here. Reputational repercussions and recovery costs from a well-executed hack could put you out of business. Prosper in 2020 by educating your employees on the most common hacking techniques causing damage to your organization's environment everywhere this year: Social Engineering & Phishing  Social engineering is an attempt to get you to share personal information, usu

Types of Hackers !!!

Image
  Introduction            Computers and the Internet have changed the work environment of the world beyond imagination. Computers on taking over a major part of our lives, all our data has got transferred from records and ledgers to computers. Though this kind of shift in working has reduced the physical burden on workers it has also increased the chances of data theft. People involved in stealing data or harming the systems are knowledgeable people with wrong intentions known as Hackers. There are different types of hackers. Let’s take a look at how many types of hackers are there and the types of hacker attacks and techniques. 1)  White Hat Hackers          White hat hackers are types of hackers who’re professionals with expertise in cyber security. They are authorized or certified to hack the systems. These White Hat Hackers work for governments or organizations by getting into the system. They hack the system from the loopholes in the cyber security of the organization. This hackin