What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
codingsec.webp 2016-09-22 17:00:52 How to work with arrays in javascript (lien direct) An array is a collection of elements. Unlike in Java, arrays in JavaScript can contain elements of different types. A data element can be a primitive value or a reference to other objects or arrays. An Array object can be created in two ways. First way is by using the newoperator as shown below: var array1 = new Array(10, 20, “hai”);  var array2 = new Array(10); In the first declaration, the size of array1 is 3 and the values are initialized to 10, 20 and “hai”. In the second declaration, the size of array2 is 10 and the elements are
codingsec.webp 2016-09-22 16:00:16 How to define user objects in javascript (lien direct) Creation and Manipulation of User Defined Objects An object is a real world entity that contains properties and behaviour. Properties are implemented as identifiers and behaviour is implemented using a set of methods. An object in JavaScript doesn't contain any predefined type. In JavaScript the new operator is used to create a blank object with no properties. A constructor is used to create and initialize properties in JavaScript. Note: In Java new operator is used to create the object and its properties and a constructor is used to initialize the properties of the created object. An object can be created
codingsec.webp 2016-09-21 18:00:47 How to perform form processing in PHP (lien direct) This article explains about form processing in PHP. Users enter various data in a HTML form through different HTML controls. We will see how to process that data in a PHP script. One of the applications of PHP is processing the data provided by the users in (X)HTML forms. PHP provides two implicit arrays $_GET and $_POST which are global variables and are accessible anywhere in a PHP script. The array $_GET is used when the attribute method of the form tag is set toGET and the array $_POST is used when the attribute method of the form tag is
codingsec.webp 2016-09-21 17:00:31 How functions are defined in PHP? (lien direct) A function is a part of program which contains set of statements that can perform a desired task. A function can be defined with the function keyword followed by the function name and an optional set of parameters enclosed in parentheses. A function definition may not occur before a function call. It can be anywhere in the script. Although function definitions can be nested, it is not encouraged as they can make the script complex. Syntax for defining a function is given below: 1 2 3 4 5 function  function_name() {     //Body of the function      } The
codingsec.webp 2016-09-21 16:00:37 What are the properties of CSS (lien direct) To give various styles to HTML elements, CSS provides various properties. Related properties are grouped as: font properties, text properties, background properties, List properties etc. Font Properties The primary content in any web document is text. To apply different styles to the font of the text, we can use font properties. Font Families:  The shape and space between the characters depends upon the font family. A font family can be set using the CSS font property font-family. It is common to specify multiple font names separated by commas as a value to this property as shown below: p { font-family
codingsec.webp 2016-09-20 18:00:46 What is the difference between throw, throws and finally in java (lien direct) In this article we will look at the use of throw throws and finally keywords of exception handling in Java programs.   throw Keyword The throw keyword can be used in Java programs to throw exception objects explicitly. The syntax of using throw is as follows: throw ThrowableInstance; The ThrowableInstance can be object of Throwable class or any of its sub classes. A reference to the Throwable instance can be obtained using the parameter in catch block or by using the new operator. Let's see a sample program that demonstrates the use of throw: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 class ArrayException {
codingsec.webp 2016-09-20 17:00:56 How to group threads in java (lien direct) In this article we will learn what is a thread group? How to work with thread groups in Java along with example program.   A thread group is a collection of threads. A thread group allows the programmer to maintain a group of threads more effectively. To support thread groups Java provides a class named ThreadGroup available in java.langpackage.   Some of the constructors available in ThreadGroup class are: ThreadGroup(String group-name) ThreadGroup(ThreadGroup parent, String group-name)   After creating a thread group using one of the above constructors, we can add a thread to the thread group using one of the following Thread constructors: Thread(ThreadGroup ref,
codingsec.webp 2016-09-20 16:00:18 (Déjà vu) What are Java literals? How do they work? (lien direct) In this article you will learn about Java literals, which are frequently used in Java programs. You will learn about different types of Java literals and some examples for writing and using different literals in Java programs. Every Java primitive data type has its corresponding literals. A literal is a constant value which is used for initializing a variable or directly used in an expression. Below are some general examples of Java literals:   Integer Literals: Integer literals are the most commonly used literals in a Java program. Any whole number value is an example of an integer literal. For example, 1, 10,
codingsec.webp 2016-09-19 18:00:24 How to override methods in java (lien direct) In this article we will look at method overriding which is similar to method overloading. Method overriding is a mechanism which supports polymorphism in Java. What is method overriding? In the context of inheritance, suppose a base class A contains a method display with zero parameters and sub class B also contains a method display with zero parameters, what happens when we create an object for class B and call the display method using that object? The method that will execute is the display method in the sub class B. Then what happened to the display method in super class A? It was hidden. This process of
codingsec.webp 2016-09-19 17:00:27 What is the basic structure of the java program (lien direct) In this post I will explain the structure of a Java program. A Java program is a collection of one or more classes, in which, one class contains the mainmethod. Before looking at the structure of a Java program, let's see the structure of a Java class. Structure of a Java class is as shown below: A Java class can contain the following: Package statement: A package statement is used to declare a Java class as a part of the specified package. More on declaring packages later. Package statement is optional. When we decide to write a package statement, it should
codingsec.webp 2016-09-19 16:00:54 What is static keyword in java (lien direct) In this article we will look at static keyword which can be used to share data among multiple objects.   static Keyword In Java programs, static keyword can be used to create the following: Class variables Class methods Static blocks   Class Variables: The static keyword is used to create one of the three types of variables called as class variables. A class variable is a variable declared inside a class and outside all the methods and is marked as static. Syntax for declaring a class variable or a static variable is shown below: static data-type variable-name; Example for declaring a class
codingsec.webp 2016-09-18 18:00:42 How to display content of file in an applet (lien direct) A Java applet extends the class java.applet.Applet, or in the case of a Swing applet, javax.swing.JApplet. The class which must override methods from the applet class to set up a user interface inside itself (Applet) is a descendant of Panel which is a descendant of Container. As applet inherits from container, it has largely the same user interface possibilities as an ordinary Java application, including regions with user specific visualization. The first implementations involved downloading an applet class by class. While classes are small files, there are often many of them, so applets got a reputation as slow-loading components. However,
codingsec.webp 2016-09-18 17:00:36 How to draw lines, rectangles and ovals in java applet (lien direct) A Java applet is a small application which is written in Javaand delivered to users in the form of bytecode. The user launches the Java applet from a web page, and the appletis then executed within a Java Virtual Machine (JVM) in a process separate from the web browser itself. Java Applets are usually used to add small, interactive components or enhancements to a webpage. These may consist of buttons, scrolling text, or stock tickers, but they can also be used to display larger programs like word processors or games. Java applets run at very fast speeds and, until 2011,
codingsec.webp 2016-09-18 16:00:50 Here are some basic networking concepts for begineers (lien direct) Network A network is a collection of interconnected computers, which are connected using communication media along with communication devices. Examples of communication devices are: modems, routers and bridges. Examples of communication media are: telephone cables, coaxial cables, twisted pair cables and fiber optical cables. Using a network has several advantages like: Easy to share the information. Easy to share the resources like printers etc. Saves time and money. Topology The topology of a network refers to the structure in which the computers are interconnected with one another. Some of the network topologies are mesh, star, bus, ring etc. Internet The
codingsec.webp 2016-09-17 18:30:46 What are the basic concepts of the software development (lien direct) A computer generally consists of two components: Hardware and Software. The purpose of software is to use the hardware components. So far, we have seen the hardware components. Now, let's learn about the software related concepts. Program A program is a set of instructions for solving a particular problem. Using programs a human can use the underlying hardware components like CPU, Memory etc. Software Software is a set of programs. Computer software is divided into two broad categories: 1) System software and 2) Application software. System software manages the computer's hardware resources. It provides the interface between the hardware and
codingsec.webp 2016-09-17 17:00:33 How to Achieve runtime polymorphism (lien direct) In programming languages and type theory, polymorphism  is the provision of a single interface to entities of different types. A polymorphic type is one whose operations can also be applied to values of some other type, or types.There are several fundamentally different kinds of polymorphism: Ad hoc polymorphism: when a function denotes different and potentially heterogeneous implementations depending on a limited range of individually specified types and combinations. Ad hoc polymorphism is supported in many languages using function overloading. Parametric polymorphism: when code is written without mention of any specific type and thus can be used transparently with any number
codingsec.webp 2016-09-17 16:00:15 Steps to Develop Applications (lien direct) A computer program is a set of formal instructions, which the computer executes in order to carry out some designated task. Whether that task is as simple as adding two numbers together or as complex as maintaining a large inventory for a multi-national corporation, there is a common element involved. They are both achieved by the computer executing a series of instructions –the computer program. Programming can be defined as the development of a solution to an identified problem. There are six basic steps in the development of a program: Define the problem This step (often overlooked) involves the careful
codingsec.webp 2016-09-15 18:00:24 How to find the GCD of a number in recursive and non-recursive methods (lien direct) In mathematics, the greatest common divisor (gcd) of two or more integers, when at least one of them is not zero, is the largest positive integer that divides the numbers without a remainder. For example, the GCD of 8 and 12 is 4. One good way to find the least common multiple of 2 numbers is to multiply both numbers by 1,2,3,4,5… and then find the first multiple that appears in both lists. The first number that appears in both lists is 24. (48 appears also, but it is not ‘least’), so 24 is the LCM of 6 and 8.
codingsec.webp 2016-09-15 17:00:15 (Déjà vu) How to simulate cloud architecture (lien direct) Introduction Although cloud computing's inception spans over a decade, still there are many challenging issues which requires a significant amount of research to be done. It is impractical for medium to small sized educational institutions and other organizations to establish a physical cloud for conducting research on cloud computing. It is not possible to perform benchmarking experiments in repeatable, dependable, and scalable environments using real-world cloud environments. A solution for this is to use simulators (virtual reality) which can simulate a real cloud environment. A cloud simulator helps to model various kinds of cloud applications by creating data centers, virtual
codingsec.webp 2016-09-14 18:00:38 (Déjà vu) Howto pass arguments to applet in java (lien direct) In this article we will learn about passing parameters to applets using the param tag and retrieving the values of parameters using getParameter method.   Parameters specify extra information that can be passed to an applet from the HTML page. Parameters are specified using the HTML's param tag.   Param Tag The <param> tag is a sub tag of the <applet> tag. The <param> tag contains two attributes: name and value which are used to specify the name of the parameter and the value of the parameter respectively. For example, the param tags for passing name and age parameters looks as shown below:
codingsec.webp 2016-09-14 17:00:51 How to work with mutithreading in java (lien direct) In this article we will learn what is multithreading and how to create and use threads in Java programs.   Background Information Multitasking: Ability to execute two or more tasks in parallel or simultaneously is known as multitasking. Multitasking is of two types: 1) Process based multitasking and 2) Thread based multitasking. Process based multitasking: Executing two or more processes simultaneously is known as process based multitasking. For example, we can listen to music and browse internet at the same time. The processes in this example are the music player and browser. Thread based multitasking: Thread is a part of process
codingsec.webp 2016-09-13 18:00:00 Here are some of the basic array operations in java (lien direct) In this post we are going to look at some very basic and frequently asked array programs in Java. Different programs are written as separate functions in the class ArrayClass. These programs are restricted to integers. Following programs are available: Reading elements into an array Printing elements in an array Printing the sum of all elements in an array Printing the average of elements in an array Print the least element in the array Print the largest element in the array Search an element in the array using linear search Search an element in the array using binary search Return the
codingsec.webp 2016-09-13 16:00:30 Here are some Basic Terminologies that every programmer should know (lien direct) Following are some of the basic terms every programmer should know before learning any programming language: Language A language is a set of characters, words and associated grammar rules which is used for communication between two human beings either spoken or written. Examples: Telugu, Hindi, English etc. Programming Language A programming language is a formal computer language or constructed language designed to communicate instructions to a machine, particularly a computer. Programming languages can be used to create programs to control the behavior of a machine or to express algorithms. The earliest known programmable machine preceded the invention of the digital
codingsec.webp 2016-09-12 18:00:50 (Déjà vu) How to read the text data in files and display number of words and lines using java (lien direct) Parsing or syntactic analysis is the process of analysing a string of symbols, either in natural language or in computer languages, conforming to the rules of a formal grammar. The term parsing comes from Latin pars (orationis), meaning part (of speech). The term has slightly different meanings in different branches of linguistics and computer science. Traditional sentence parsing is often performed as a method of understanding the exact meaning of a sentence or word, sometimes with the aid of devices such as sentence diagrams. It usually emphasizes the importance of grammatical divisions such as subject and predicate. Within computational linguistics
codingsec.webp 2016-09-12 17:00:25 What is a user-defined exception? (lien direct) In this article we will learn how to create user defined exceptions (own exceptions) and how to use them in Java programs. Although Java provides several pre-defined exception classes, sometimes we might need to create our own exceptions which are also called as user-defined exceptions. Steps for creating a user-defined exception: Create a class with your own class name (this acts the exception name) Extend the pre-defined class Exception Throw an object of the newly create exception As an example for user-defined exception, I will create my own exception named NegativeException as follows: 1 2 3 4 5 6 7 8 9
codingsec.webp 2016-09-12 16:00:23 What are try and catch blocks in exception handling (lien direct) In this article we will learn about try and catch blocks in more detail along with Java code examples.   A Simple try-catch Block As we know, statements that might raise exceptions are placed inside tryblock and the exception handling code is placed inside catch block. A try block must be followed immediately by one or more catch blocks or a finally block. Let's see an example program which catches an array index out of bounds exception: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 class ArrayException { public static void main(String args) { try
codingsec.webp 2016-09-11 18:00:31 How to suspend ,resume and stop threads (lien direct) Based on the requirements sometimes you might want to suspend, resume or stop a thread. For doing such operations on a thread, before Java 2, thread API used to contain suspend(), resume() and stop() methods. But all these methods might lead to undesired behavior of the program or machine. For example, these methods might lead to deadlock when a thread locked and is accessing a data structure and suddenly it is suspended or stopped. All other threads will be waiting indefinitely for gaining access to the data structure. Because of this drawback of suspend(), resume() and stop() methods, they have been deprecated (should not Guideline
codingsec.webp 2016-09-11 17:00:50 How postCSS is better than SASS and LESS (lien direct) Most of the front-end devs already know about the SASS and LESS and some of the them might heard about the PostCSS, but didn’t get a chance to try it out the toll is becoming popular day-by-day and due to it’s growing benefits over the other systems ruby developers have found with the same technology at Railsware. How to Treat PostCSS For the beginning, you need to understand that PostCSS is created not solely for preprocessing (even though numerous developers use it instead of LESS, Stylus, and SASS. The point is – you can use it either as a preprocessor
codingsec.webp 2016-09-11 16:00:59 7 best python frameworks for web development (lien direct) A web framework (WF) or web application framework (WAF) is a software framework that is designed to support the development of web applications including web services, web resources and web APIs. Web frameworks aim to alleviate the overhead associated with common activities performed in web development. For example, many web frameworks provide libraries for database access, templating frameworks and session management, and they often promote code reuse. Though they often target development of dynamic websites they are also applicable to static websites. Python programming language is one of the most efficient language for the development of the server based applications python
codingsec.webp 2016-09-10 18:00:36 What are literals in java?? (lien direct) In this article you will learn about Java literals, which are frequently used in Java programs. You will learn about different types of Java literals and some examples for writing and using different literals in Java programs. Every Java primitive data type has its corresponding literals. A literal is a constant value which is used for initializing a variable or directly used in an expression. Below are some general examples of Java literals: Integer Literals: Integer literals are the most commonly used literals in a Java program. Any whole number value is an example of an integer literal. For example, 1, 10, 8343
codingsec.webp 2016-09-10 17:00:12 What are object orientation principles in java (lien direct) In this article we will look at the key object orientation principles also known as OOP principles. Although some people or textbooks mention three OOP principles, I would say there are four key principles namely abstraction, encapsulation, inheritance and polymorphism. Note: OOP refers to Object Oriented Programming.   Abstraction Abstraction is first of the object orientation principles. It is defined as hiding the complex details and presenting only with the relevant or necessary details.Abstraction is used to manage complexity while writing programs. Encapsulation and inheritance are used to implement abstraction while writing programs. Abstraction represents the external behavior of the object (what the
codingsec.webp 2016-09-10 16:00:08 (Déjà vu) how to work data permission control in java (lien direct) In this article we will look at access control in Java. We will learn about four access modifiers: public, protected, default and private along with java code examples.   Access Control Access control is a mechanism, an attribute of encapsulation which restricts the access of certain members of a class to specific parts of a program. Access to members of a class can be controlled using the access modifiers.There are four access modifiers in Java. They are: public protected default private If the member (variable or method) is not marked as either public or protectedor private, the access modifier for that member will
codingsec.webp 2016-09-09 18:00:04 How garbage collection is done in java (lien direct) In this article we will learn about garbage collection, which is a mechanism for freeing the memory occupied by objects which are no longer used in a program.   Garbage Collection  In most of the object oriented programming languages, memory management (allocating and deallocating memory) is left to the user and it is generally error prone (user might forget to free the memory occupied by an object). Objects are allocated memory in the heap memory which grows and shrinks dynamically. Java provides automatic memory management through a mechanism known as garbage collection. Unused objects are collected for garbage collection by
codingsec.webp 2016-09-09 17:00:24 (Déjà vu) What are methods in java (lien direct) In this article you will learn about Java methods. You will look at what is a method, how to create methods in a Java class, how to call a method, how to return a value from a method and more. Method: A method is a piece of code to solve a particular task. A method is analogous to functions in C and C++. Methods are defined inside a class. The syntax for creating a method is as shown below: The return_type specifies the type of value that will be returned by the method. The name of the method is specified by method_name. Every
codingsec.webp 2016-09-09 16:00:15 What are variable length arguments in java (lien direct) In this article we will look at what is variable length arguments or varargs is and how to use variable length arguments in methods to solve the complexity of a Java program.   There might be some situations while creating methods, where the programmer might not know how many arguments are needed in the method definition or how many arguments are going to be passed at run-time by the user. Prior to Java 5, there were a couple of workarounds for this problem but was often complex or error prone.   With Java 5, a new feature called varargs was
codingsec.webp 2016-09-08 18:00:11 How to work with command line arguments in java (lien direct) In this article we will learn about what a command line argument is and how to access and work with the command line arguments in Java.   Sometimes we might want to pass extra information while running a Java program. This extra information passed along with the program name are known as command line arguments. These command line arguments are separated by white spaces.   Command line arguments can be accessed using the string array specified in the main function's signature. For example, if the array name is args, then the first command line argument can be accessed as args
codingsec.webp 2016-09-08 17:00:46 How to perform recursion operation in java (lien direct) This article explains about recursion in Java. We will learn what is recursion and how to use recursion to write effective Java programs. Recursion is a famous way to solve problems with less lines of code. Many programmers prefer recursion over iteration as less amount of code is required to solve problems using recursion. A method calling itself in its definition (body) is known as recursion. For implementing recursion, we need to follow the below requirements: There should be a base case where the recursion terminates and returns a value. The value of the parameter(s) should change in the recursive
codingsec.webp 2016-09-08 16:00:58 How to perform parameter passing in java (lien direct) This article explains about the parameter passing techniques in programming languages in general and how Java handles parameters in methods. Sample code is also provided which demonstrates the parameter passing techniques.   Parameter passing techniques  If you have any previous programming experience you might know that most of the popular programming languages support two parameter passing techniques namely: pass-by-value and pass-by-reference. In pass-by-value technique, the actual parameters in the method call arecopied to the dummy parameters in the method definition. So, whatever changes are performed on the dummy parameters, they are not reflected on the actual parameters as the changes
codingsec.webp 2016-09-07 16:00:18 How to perform ARP Cache Poisoning with Scapy (lien direct) ARP poisoning is one of the oldest yet most effective tricks in a hacker's toolkit. Quite simply, we will convince a target machine that we have become its gateway, and we will also convince the gateway that in order to reach the target machine, all traffic has to go through us. Every computer on a network maintains an ARP cache that stores the most recent MAC addresses that match to IP addresses on the local network, and we are going to poison this cache with entries that we control to achieve this attack. Because the Address Resolution Protocol and ARP
codingsec.webp 2016-09-06 19:00:31 How to use this keyword in java (lien direct) In this article, we will look at the uses of this keyword in Java programs along with example Java code.   this Keyword  this keyword in Java is used to refer current object on which a method is invoked. Using such property, we can refer the fields and other methods inside the class of that object. The this keyword has two main uses which are listed below: It is used to eliminate ambiguity between fields and method parameters having the same name. It is used for chaining constructors. To explain the first use, let's consider the following program, which creates a
codingsec.webp 2016-09-06 18:00:36 what is access control in java (lien direct) In this article we will look at access control in Java. We will learn about four access modifiers: public, protected, default and private along with java code examples.   Access Control Access control is a mechanism, an attribute of encapsulation which restricts the access of certain members of a class to specific parts of a program. Access to members of a class can be controlled using the access modifiers.There are four access modifiers in Java. They are: public protected default private If the member (variable or method) is not marked as either public or protectedor private, the access modifier for that member will
codingsec.webp 2016-09-06 17:00:26 How to perform overloading in java (lien direct) In this article you are going to learn about overloading in Java. You will look at what is overloading? why should we use overloading? along with details and examples on method overloading and constructor overloading.   Overloading  One of the way through which Java supports polymorphism is overloading. It can be defined as creating two or more methods in the same class sharing a common name but different number of parameters or different types of parameters. You should remember that overloading doesn't depend upon the return type of the method. Since method binding is resolved at compile-time based on the
codingsec.webp 2016-09-05 17:00:35 What are methods in Java? How do they work? (lien direct) In this article you will learn about Java methods. You will look at what is a method, how to create methods in a Java class, how to call a method, how to return a value from a method and more. Method: A method is a piece of code to solve a particular task. A method is analogous to functions in C and C++. Methods are defined inside a class. The syntax for creating a method is as shown below: The return_type specifies the type of value that will be returned by the method. The name of the method is specified by method_name. Every
codingsec.webp 2016-09-05 16:00:18 What is java Virtual Machine? How does it work? (lien direct) In this article we will look at Java Virtual Machine (JVM) which provides the run-time engine for bytecode generated by the Java compiler. We will look at JVM architecture and more. Before learning about JVM it is important to know about JDK (Java Development Kit) and JRE (Java Runtime Environment). Below figure shows the relationship between JDK, JRE, and JVM: JDK provides programmers with a set of tools (like javac, debugger, javap, appletviewer etc..) for developing Java programs. JDK includes JRE. JRE provides the run-time engine JVM along with the class libraries which contains the predefined functionality. Using JDK programmers
codingsec.webp 2016-09-04 18:00:53 How do constructors work in java (lien direct) In this article we will look at constructors in Java. We will learn what is a constructor, use of a constructor in Java programs, characteristics of a constructor and different types of a constructor.   Constructor  A constructor is a special method which has the same name as class name and that is used to initialize the objects (fields of an object) of a class. A constructor has the following characteristics: Constructor has the same name as the class in which it is defined. Constructor doesn't have a return type, not even void. Implicit return type for a constructor is
codingsec.webp 2016-09-02 18:00:35 (Déjà vu) How to decode WPA/WEP keys using Penetrate Pro (lien direct) The App Penetrate Pro is developed by Biogo Ferreria. It is an excellent App for decoding WEP/WPA WiFi Keys. The Latest Build of the penetrate pro supports the following features. Routers based on Thomson: Thomson, Infinitum, BBox, DMax, Orange, SpeedTouch, BigPond, O2Wireless, Otenet. DLink Eircom Pirelli Discus Verizon FiOS (only some routers) Fastweb (Pirelli & Telsey) Jazztel_XXXX and WLAN_XXXX Tecom Infostrada SkyV1 Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone
codingsec.webp 2016-09-02 17:00:48 How to scan ports in the network using aNmap from mobile (lien direct) Nmap has been one of the most important tool for every network security developer from over the last 10 years but it is only available in the windows , Linux and Mac OS X but it is still not available in the android, Even though there are 1 Billion Android Devices. Hence we are here to introduce the aNamp it is compiled from the Nmap source code by some devs to support android Devices. aNamp is an android tool that you can use on a network to determine the available hosts, services and OS to get all the features of ★★★★★
codingsec.webp 2016-09-02 16:00:32 How to perform Dynamic analysis of an android application using DroidBox (lien direct) DroidBox is developed to offer dynamic analysis of Android App Data. The following information listed down below are the results shown and generated. Hashes for the analyzed package Incoming/outgoing network data File read and write operations Started services and loaded classes through DexClassLoader Information leaks via the network, file and SMS Circumvented permissions Cryptography operations performed using Android API Listing broadcast receivers Sent SMS and phone calls Additionally, two images are generated visualizing the behavior of the package. One showing the temporal order of the operations and the other one being a treemap that can be used to check similarity
codingsec.webp 2016-09-01 18:00:03 How to hack android device network using Network Spoofer (lien direct) Network Spoofer lets you change websites on other people’s computers from an Android phone. You can you network Spoofer to Flip pictures upside down Flip text upside down Make websites experience gravity Redirect websites to other pages Delete random words from websites Replace words on websites with others Change all pictures to Trollface Wobble all pictures / graphics around a bit A few custom modes for you to have your own fun! Download and prank your friends! It is a very easy app to use if you are looking to prank your friends the app will just run fine if
codingsec.webp 2016-09-01 17:00:04 How to analyse Android Applications using APK inspector (lien direct) Generally we need to inspect our apps for security vulnerabilities before publishing to the Android App store but if you are new to the Android Security you may find it difficult to code Apps with High Security. Disclaimer – Our tutorials are designed to aid aspiring pen testers/security enthusiasts in learning new skills, we only recommend that you test this tutorial on a system that belongs to YOU. We do not accept responsibility for anyone who thinks it's a good idea to try to use this to attempt to hack systems that do not belong to you. Now APKinspector(Android Application
Last update at: 2024-05-06 22:08:05
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter