- 
Program to Read an Input Keystroke using C Language**Note: To perform this I have used Dev c++ tool. It is checked and compiled. We can simple use getchar() to read the input character in C language Code: #include<stdio.h> void main(){ char c; printf(“\n\n*****************Program to Read an Input Keystroke******************\n\n”); printf(“Enter a Character: \n”); c=getchar(); printf(“Your Input Is: %c “,c); } OUTPUT: 
- 
Internet Surfing: How much you expose yourself? We all surf internet without caring about our privacy. Why do you think the cyber crime exists? Why do you think hacktivists turn against the government? The answer to this is PRIVACY. Most of the people today who are not technology oriented doesn’t care about what information they share on Internet. All that matters to… 
- 
How to become a Hacker? Hacker is a person who can gain unauthorized access to a device. Many people have this question in their mind, “How to become one?”. Before I give answer to this question, I would like to explain the concept of everything related to hacking. Hacking is a vast field, it consist of topics not just limited… 
- 
SQL Injection part 3: Identifying String Data or Numeric Data This is my third post on SQL Injection, The first post SQL Injection part 1 was just a basic one to check if the SQL vulnerability exist on a certain website and SQL Injection part 2 shows how to exploit the SQL vulnerability. We inject SQL in three parameters, namely: String Data Numeric Data Query structure In… 
- 
Program To Convert Binary to Decimal Using C Language**NOTE: The following code for “Program To Convert Binary to Decimal Using C Language” has been written and performed on Ubuntu OS, To run the following code in Windows on Turbo C, You need to add #include as one of the header files and getch() at the end of the code before main() closing brace… 
- 
Program to Convert Floating Decimal to Binary Using C Language**NOTE: The following code for “Program to Convert Floating Decimal To Binary Using C language” has been written and performed on Ubuntu OS, To run the following code in Windows on Turbo C, You need to add #include<conio.h> as one of the header files and getch() at the end of the code before main() closing… 
- 
Converting Decimal To Binary Using C language**NOTE: The following code for “Converting Decimal To Binary Using C language” has been written and performed on Ubuntu OS, To run the following code in Windows on Turbo C, You need to add #include<conio.h> as one of the header files and getch() at the end of the code before main() closing brace “}”. #include<stdio.h>… 
- 
The Bits and The BytesIn this article we are going to talk about the Computer Basics : The Bits and The Bytes.Computers are used to process data. Computers works on instructions to process data. They do it electrically inside CPU(central processing unit). Computer don’t really understand the language that a human mind can understand.There processing capabilities lies within bits and… 
- 
SQL Injection Part 2In this article we will be looking at SQL Injection and how we can exploit different types of SQL vulnerabilities present on a website.SQL Injection is one most dangerous ways to get into some site and ruin it totally! Database contains every precious information. It consist of records of credit cards, names with address or… 
- 
SMTP Relay AttacksI have had already told you about What is SMTP, How does that work and How can you extract emails using SMTP. In this article I will be telling you how you can use SMTP relays to send spams to any person. SMTP relay is a mail server through which we can send Outbound emails.… 
- 
What is SMTP?Emails have always been an important part of our lives. We send emails through agents such as Gmail, Yahoo, etc. and we also get emails regarding different subjects from numerous other email clients. These email clients works on SMTP at port 25. What is SMTP? SMTP(Simple Mail Transfer Protocol ) is a Protocol which works… 
- 
Spoofing The IP address:Engage Packet Builder usage Spoofing is a wide topic.This entire website will tell you how to be anonymous and therefore Spoofing is important.The best people are the people who never get caught! So in this article we will be learning about Spoofing the IP address with the use of Enagage Packet Builder tool. You can download the tools here: http://www.engagesecurity.com/downloads/ … 


