www.secnews.physaphae.fr This is the RSS 2.0 feed from www.secnews.physaphae.fr. IT's a simple agragated flow of multiple articles soruces. Liste of sources, can be found on www.secnews.physaphae.fr. 2024-05-07T01:15:40+00:00 www.secnews.physaphae.fr CodingSec - Ethical Hacking Team How to encrypt a file in python 2017-05-01T15:08:38+00:00 https://codingsec.net/2017/05/encrypt-file-python/ www.secnews.physaphae.fr/article.php?IdArticle=360578 False None None None CodingSec - Ethical Hacking Team How to Hash Passwords in PHP in a Modern way 2017-05-01T15:05:59+00:00 https://codingsec.net/2017/05/hash-passwords-php-modern-way/ www.secnews.physaphae.fr/article.php?IdArticle=360579 False None None None CodingSec - Ethical Hacking Team How to build a basic Data Graph in Tensor Flow 2017-05-01T14:46:11+00:00 https://codingsec.net/2017/05/build-basic-data-graph-tensor-flow/ www.secnews.physaphae.fr/article.php?IdArticle=360580 False None None None CodingSec - Ethical Hacking Team What are type defined structures in C Programming 2017-04-30T15:22:46+00:00 https://codingsec.net/2017/04/type-defined-structures-c-programming-3/ www.secnews.physaphae.fr/article.php?IdArticle=360309 False None None 2.0000000000000000 CodingSec - Ethical Hacking Team How to Dynamically Dispatch a method in java programming 2017-04-30T15:20:05+00:00 https://codingsec.net/2017/04/dynamically-dispatch-method-java-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360310 True None None 3.0000000000000000 CodingSec - Ethical Hacking Team How to create virtual constructors and Destructors in C++ 2017-04-30T15:17:09+00:00 https://codingsec.net/2017/04/create-virtual-constructors-destructors-c/ www.secnews.physaphae.fr/article.php?IdArticle=360311 False None None 4.0000000000000000 CodingSec - Ethical Hacking Team How to create a Package file in java programming 2017-04-29T14:22:10+00:00 https://codingsec.net/2017/04/create-package-file-java-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360312 False None None 2.0000000000000000 CodingSec - Ethical Hacking Team How to initialize parameters in Servlets in Java Programming 2017-04-29T14:19:57+00:00 https://codingsec.net/2017/04/initialize-parameters-servlets-java-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360313 False None None 4.0000000000000000 CodingSec - Ethical Hacking Team How to create function templates in C++ Programming 2017-04-29T14:06:20+00:00 https://codingsec.net/2017/04/create-function-templates-c-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360314 False None None 2.0000000000000000 CodingSec - Ethical Hacking Team What are the methods of iStream Classes in C++ 2017-04-28T13:37:44+00:00 https://codingsec.net/2017/04/methods-istream-classes-c/ www.secnews.physaphae.fr/article.php?IdArticle=360315 False None None 4.0000000000000000 CodingSec - Ethical Hacking Team What is the operator precedence and Associativity in C Programming 2017-04-28T13:33:47+00:00 https://codingsec.net/2017/04/operator-precedence-associativity-c-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360316 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team What are different thread states in java programming 2017-04-28T13:27:57+00:00 https://codingsec.net/2017/04/different-thread-states-java-programming/ www.secnews.physaphae.fr/article.php?IdArticle=360317 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team How do you overload binary operators in C++ 2017-04-27T13:55:08+00:00 https://codingsec.net/2017/04/overload-binary-operators-c-2/ www.secnews.physaphae.fr/article.php?IdArticle=359911 False None None None CodingSec - Ethical Hacking Team What is the terminology of functions in C Programming 2017-04-27T13:46:44+00:00 https://codingsec.net/2017/04/terminology-functions-c-programming-3/ www.secnews.physaphae.fr/article.php?IdArticle=359912 False None None None CodingSec - Ethical Hacking Team How do you achieve synchronization in java programming 2017-04-27T13:43:37+00:00 https://codingsec.net/2017/04/achieve-synchronization-java-programming/ www.secnews.physaphae.fr/article.php?IdArticle=359913 False None None None CodingSec - Ethical Hacking Team How to use virtual functions in Polymorphism (C++) 2017-04-26T14:00:38+00:00 https://codingsec.net/2017/04/use-virtual-functions-polymorphism-c/ www.secnews.physaphae.fr/article.php?IdArticle=359465 False None None None CodingSec - Ethical Hacking Team What are the cases in java where method overriding is possible 2017-04-26T13:35:19+00:00 https://codingsec.net/2017/04/cases-java-method-overriding-possible/ www.secnews.physaphae.fr/article.php?IdArticle=359466 True None None None CodingSec - Ethical Hacking Team What are the concepts of session data management 2017-04-26T13:32:56+00:00 https://codingsec.net/2017/04/concepts-session-data-management/ www.secnews.physaphae.fr/article.php?IdArticle=359467 False None None None CodingSec - Ethical Hacking Team How to use ftell, rewind and fseek in C Programming 2017-04-25T16:04:42+00:00 https://codingsec.net/2017/04/use-ftell-rewind-fseek-c-programming/ www.secnews.physaphae.fr/article.php?IdArticle=358795 False None None 4.0000000000000000 CodingSec - Ethical Hacking Team How to use interfaces in your java code 2017-04-25T16:01:37+00:00 https://codingsec.net/2017/04/use-interfaces-java-code/ www.secnews.physaphae.fr/article.php?IdArticle=358796 False None None 3.0000000000000000 CodingSec - Ethical Hacking Team What are different ways to access members of objects in C++ 2017-04-25T15:58:53+00:00 https://codingsec.net/2017/04/different-ways-access-members-objects-c/ www.secnews.physaphae.fr/article.php?IdArticle=358797 False None None 3.0000000000000000 CodingSec - Ethical Hacking Team How to encrypt and decrypt string using PHP and CryptoJS 2017-04-24T13:49:31+00:00 https://codingsec.net/2017/04/encrypt-decrypt-string-using-php-cryptojs/ www.secnews.physaphae.fr/article.php?IdArticle=358798 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team How to encrypt data on your android phone using built-in feature 2017-04-24T13:37:55+00:00 https://codingsec.net/2017/04/encrypt-data-android-phone-using-built-feature/ www.secnews.physaphae.fr/article.php?IdArticle=358799 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team Top 10 Most Commonly asked ethical Hacking Interview 2017-04-24T13:29:49+00:00 https://codingsec.net/2017/04/top-10-commonly-asked-ethical-hacking-interview/ www.secnews.physaphae.fr/article.php?IdArticle=358800 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team Here is a list of most commonly used event handling attributes 2017-04-23T13:18:51+00:00 https://codingsec.net/2017/04/list-commonly-used-event-handling-attributes/ www.secnews.physaphae.fr/article.php?IdArticle=358801 False None None 2.0000000000000000 CodingSec - Ethical Hacking Team How to overload constructors in C++ programming 2017-04-23T13:14:10+00:00 https://codingsec.net/2017/04/overload-constructors-c-programming/ www.secnews.physaphae.fr/article.php?IdArticle=358802 False None None None CodingSec - Ethical Hacking Team How do you group threads in java programming 2017-04-23T13:08:47+00:00 https://codingsec.net/2017/04/group-threads-java-programming-2/ www.secnews.physaphae.fr/article.php?IdArticle=358803 True None None None CodingSec - Ethical Hacking Team How access control add security to your code in java 2017-04-22T15:36:41+00:00 https://codingsec.net/2017/04/access-control-add-security-code-java/ www.secnews.physaphae.fr/article.php?IdArticle=358804 True None None None CodingSec - Ethical Hacking Team what are constant parameter member functions 2016-10-10T17:00:00+00:00 https://codingsec.net/2016/10/constant-parameter-member-functions/ www.secnews.physaphae.fr/article.php?IdArticle=188071 False None None None CodingSec - Ethical Hacking Team How to throw exceptions of object type 2016-10-10T16:00:52+00:00 https://codingsec.net/2016/10/throw-exceptions-object-type/ www.secnews.physaphae.fr/article.php?IdArticle=187772 False None None None CodingSec - Ethical Hacking Team What is function prototype in programming languages 2016-10-07T17:00:57+00:00 https://codingsec.net/2016/10/function-prototype-programming-languages/ www.secnews.physaphae.fr/article.php?IdArticle=176163 False None None None CodingSec - Ethical Hacking Team what are the Advantages and Disadvantages of Inheritance 2016-10-03T16:00:01+00:00 https://codingsec.net/2016/10/advantages-disadvantages-inheritance/ www.secnews.physaphae.fr/article.php?IdArticle=158105 False Guideline None None CodingSec - Ethical Hacking Team How to allocate memory for objects and classes 2016-10-02T18:00:14+00:00 https://codingsec.net/2016/10/allocate-memory-objects-classes/ www.secnews.physaphae.fr/article.php?IdArticle=154151 False None None None CodingSec - Ethical Hacking Team what is the difference between local and nested class 2016-10-02T17:00:15+00:00 https://codingsec.net/2016/10/difference-local-nested-class/ www.secnews.physaphae.fr/article.php?IdArticle=153986 False None None None CodingSec - Ethical Hacking Team what are volatile objects and member functions 2016-10-02T16:00:01+00:00 https://codingsec.net/2016/10/volatile-objects-member-functions/ www.secnews.physaphae.fr/article.php?IdArticle=153895 False None None None CodingSec - Ethical Hacking Team What is delegation event model in java 2016-09-27T18:00:53+00:00 https://codingsec.net/2016/09/delegation-event-model-java-2/ www.secnews.physaphae.fr/article.php?IdArticle=135014 False None None None CodingSec - Ethical Hacking Team How to work with adapter classes in java 2016-09-27T17:00:51+00:00 https://codingsec.net/2016/09/work-adapter-classes-java/ www.secnews.physaphae.fr/article.php?IdArticle=134683 True None None None CodingSec - Ethical Hacking Team How to handle mouse events in java 2016-09-27T16:00:37+00:00 https://codingsec.net/2016/09/handle-mouse-events-java/ www.secnews.physaphae.fr/article.php?IdArticle=134418 False None None None CodingSec - Ethical Hacking Team Here are some of the built-in object functions in javascript 2016-09-26T18:00:20+00:00 https://codingsec.net/2016/09/built-object-functions-javascript/ www.secnews.physaphae.fr/article.php?IdArticle=129255 False None None None CodingSec - Ethical Hacking Team What is the basic schema of XML 2016-09-26T17:00:02+00:00 https://codingsec.net/2016/09/basic-schema-xml/ www.secnews.physaphae.fr/article.php?IdArticle=128998 False None None None CodingSec - Ethical Hacking Team what are character formatting essentials in HTML 2016-09-26T16:00:26+00:00 https://codingsec.net/2016/09/character-formatting-essentials-html/ www.secnews.physaphae.fr/article.php?IdArticle=128677 False None None None CodingSec - Ethical Hacking Team What are frames in HTML ? 2016-09-25T18:00:10+00:00 https://codingsec.net/2016/09/what-are-frames-in-html/ www.secnews.physaphae.fr/article.php?IdArticle=124300 False None None None CodingSec - Ethical Hacking Team How to perform dynamic method dispatch in java 2016-09-25T16:00:30+00:00 https://codingsec.net/2016/09/perform-dynamic-method-dispatch-java/ www.secnews.physaphae.fr/article.php?IdArticle=123976 False None None None CodingSec - Ethical Hacking Team What are different thread priorities in java 2016-09-25T16:00:00+00:00 https://codingsec.net/2016/09/different-thread-priorities-java/ www.secnews.physaphae.fr/article.php?IdArticle=123977 True None None None CodingSec - Ethical Hacking Team How to synchronize threads in java 2016-09-24T17:00:34+00:00 https://codingsec.net/2016/09/synchronize-threads-java/ www.secnews.physaphae.fr/article.php?IdArticle=121116 False Guideline None None CodingSec - Ethical Hacking Team What are event listener interfaces in java 2016-09-24T16:00:24+00:00 https://codingsec.net/2016/09/event-listener-interfaces-java/ www.secnews.physaphae.fr/article.php?IdArticle=121023 False None None None CodingSec - Ethical Hacking Team What are literals in javascript? 2016-09-23T18:00:03+00:00 https://codingsec.net/2016/09/what-are-literals-in-javascript/ www.secnews.physaphae.fr/article.php?IdArticle=117288 False None None None CodingSec - Ethical Hacking Team How statement control works in PHP 2016-09-23T17:00:11+00:00 https://codingsec.net/2016/09/how-statement-control-works-in-php/ www.secnews.physaphae.fr/article.php?IdArticle=117051 False None None None CodingSec - Ethical Hacking Team How Synchronization is performed in Operating systems 2016-09-23T16:00:42+00:00 https://codingsec.net/2016/09/synchronization-performed-operating-systems/ www.secnews.physaphae.fr/article.php?IdArticle=116873 False None None None CodingSec - Ethical Hacking Team How to check the validity of the data using javascript 2016-09-22T18:00:34+00:00 https://codingsec.net/2016/09/check-validity-data-using-javascript/ www.secnews.physaphae.fr/article.php?IdArticle=111540 True None None None CodingSec - Ethical Hacking Team How to work with arrays in javascript 2016-09-22T17:00:52+00:00 https://codingsec.net/2016/09/work-arrays-javascript/ www.secnews.physaphae.fr/article.php?IdArticle=111282 False None None None CodingSec - Ethical Hacking Team How to define user objects in javascript 2016-09-22T16:00:16+00:00 https://codingsec.net/2016/09/define-user-objects-javascript/ www.secnews.physaphae.fr/article.php?IdArticle=111000 False None None None CodingSec - Ethical Hacking Team How to perform form processing in PHP 2016-09-21T18:00:47+00:00 https://codingsec.net/2016/09/perform-form-processing-php/ www.secnews.physaphae.fr/article.php?IdArticle=106526 False None None None CodingSec - Ethical Hacking Team How functions are defined in PHP? 2016-09-21T17:00:31+00:00 https://codingsec.net/2016/09/functions-defined-php/ www.secnews.physaphae.fr/article.php?IdArticle=106277 False None None None CodingSec - Ethical Hacking Team What are the properties of CSS 2016-09-21T16:00:37+00:00 https://codingsec.net/2016/09/what-are-the-properties-of-css-2/ www.secnews.physaphae.fr/article.php?IdArticle=105988 False None None None CodingSec - Ethical Hacking Team What is the difference between throw, throws and finally in java 2016-09-20T18:00:46+00:00 https://codingsec.net/2016/09/difference-throw-throws-finally-java/ www.secnews.physaphae.fr/article.php?IdArticle=100887 False None None None CodingSec - Ethical Hacking Team How to group threads in java 2016-09-20T17:00:56+00:00 https://codingsec.net/2016/09/group-threads-java/ www.secnews.physaphae.fr/article.php?IdArticle=100570 False None None None CodingSec - Ethical Hacking Team What are Java literals? How do they work? 2016-09-20T16:00:18+00:00 https://codingsec.net/2016/09/java-literals-work/ www.secnews.physaphae.fr/article.php?IdArticle=100271 True None None None CodingSec - Ethical Hacking Team How to override methods in java 2016-09-19T18:00:24+00:00 https://codingsec.net/2016/09/override-methods-java/ www.secnews.physaphae.fr/article.php?IdArticle=94620 False None None None CodingSec - Ethical Hacking Team What is the basic structure of the java program 2016-09-19T17:00:27+00:00 https://codingsec.net/2016/09/basic-structure-java-program/ www.secnews.physaphae.fr/article.php?IdArticle=94365 False None None None CodingSec - Ethical Hacking Team What is static keyword in java 2016-09-19T16:00:54+00:00 https://codingsec.net/2016/09/static-keyword-java/ www.secnews.physaphae.fr/article.php?IdArticle=94042 False None None None CodingSec - Ethical Hacking Team How to display content of file in an applet 2016-09-18T18:00:42+00:00 https://codingsec.net/2016/09/display-content-file-applet/ www.secnews.physaphae.fr/article.php?IdArticle=87811 False None None None CodingSec - Ethical Hacking Team How to draw lines, rectangles and ovals in java applet 2016-09-18T17:00:36+00:00 https://codingsec.net/2016/09/draw-lines-rectangles-ovals-java-applet/ www.secnews.physaphae.fr/article.php?IdArticle=87608 False None None None CodingSec - Ethical Hacking Team Here are some basic networking concepts for begineers 2016-09-18T16:00:50+00:00 https://codingsec.net/2016/09/basic-networking-concepts-begineers/ www.secnews.physaphae.fr/article.php?IdArticle=87415 False None None None CodingSec - Ethical Hacking Team What are the basic concepts of the software development 2016-09-17T18:30:46+00:00 https://codingsec.net/2016/09/basic-concepts-software-development/ www.secnews.physaphae.fr/article.php?IdArticle=82348 False None None None CodingSec - Ethical Hacking Team How to Achieve runtime polymorphism 2016-09-17T17:00:33+00:00 https://codingsec.net/2016/09/achieve-runtime-polymorphism-2/ www.secnews.physaphae.fr/article.php?IdArticle=81934 False None None None CodingSec - Ethical Hacking Team Steps to Develop Applications 2016-09-17T16:00:15+00:00 https://codingsec.net/2016/09/steps-develop-applications/ www.secnews.physaphae.fr/article.php?IdArticle=81727 False None None None CodingSec - Ethical Hacking Team How to find the GCD of a number in recursive and non-recursive methods 2016-09-15T18:00:24+00:00 https://codingsec.net/2016/09/find-gcd-number-recursive-non-recursive-methods/ www.secnews.physaphae.fr/article.php?IdArticle=70564 False None None None CodingSec - Ethical Hacking Team How to simulate cloud architecture 2016-09-15T17:00:15+00:00 https://codingsec.net/2016/09/simulate-cloud-architecture/ www.secnews.physaphae.fr/article.php?IdArticle=70278 True None None None CodingSec - Ethical Hacking Team Howto pass arguments to applet in java 2016-09-14T18:00:38+00:00 https://codingsec.net/2016/09/howto-pass-arguments-applet-java/ www.secnews.physaphae.fr/article.php?IdArticle=64780 True None None None CodingSec - Ethical Hacking Team How to work with mutithreading in java 2016-09-14T17:00:51+00:00 https://codingsec.net/2016/09/work-mutithreading-java/ www.secnews.physaphae.fr/article.php?IdArticle=64539 False None None None CodingSec - Ethical Hacking Team Here are some of the basic array operations in java 2016-09-13T18:00:00+00:00 https://codingsec.net/2016/09/basic-array-operations-java/ www.secnews.physaphae.fr/article.php?IdArticle=60625 False None None None CodingSec - Ethical Hacking Team Here are some Basic Terminologies that every programmer should know 2016-09-13T16:00:30+00:00 https://codingsec.net/2016/09/basic-terminologies-every-programmer-know/ www.secnews.physaphae.fr/article.php?IdArticle=60235 False None None None CodingSec - Ethical Hacking Team How to read the text data in files and display number of words and lines using java 2016-09-12T18:00:50+00:00 https://codingsec.net/2016/09/read-text-data-files-display-number-words-lines-using-java/ www.secnews.physaphae.fr/article.php?IdArticle=55781 True None None None CodingSec - Ethical Hacking Team What is a user-defined exception? 2016-09-12T17:00:25+00:00 https://codingsec.net/2016/09/user-defined-exception/ www.secnews.physaphae.fr/article.php?IdArticle=55511 False None None None CodingSec - Ethical Hacking Team What are try and catch blocks in exception handling 2016-09-12T16:00:23+00:00 https://codingsec.net/2016/09/try-catch-blocks-exception-handling/ www.secnews.physaphae.fr/article.php?IdArticle=55220 False None None None CodingSec - Ethical Hacking Team How to suspend ,resume and stop threads 2016-09-11T18:00:31+00:00 https://codingsec.net/2016/09/suspend-resume-stop-threads/ www.secnews.physaphae.fr/article.php?IdArticle=49586 False Guideline None None CodingSec - Ethical Hacking Team How postCSS is better than SASS and LESS 2016-09-11T17:00:50+00:00 https://codingsec.net/2016/09/postcss-better-sass-less/ www.secnews.physaphae.fr/article.php?IdArticle=49376 False None None None CodingSec - Ethical Hacking Team 7 best python frameworks for web development 2016-09-11T16:00:59+00:00 https://codingsec.net/2016/09/7-best-python-frameworks-web-development/ www.secnews.physaphae.fr/article.php?IdArticle=49146 False None None None CodingSec - Ethical Hacking Team What are literals in java?? 2016-09-10T18:00:36+00:00 https://codingsec.net/2016/09/what-are-literals-in-java/ www.secnews.physaphae.fr/article.php?IdArticle=44080 False None None None CodingSec - Ethical Hacking Team What are object orientation principles in java 2016-09-10T17:00:12+00:00 https://codingsec.net/2016/09/object-orientation-principles-java/ www.secnews.physaphae.fr/article.php?IdArticle=43803 False None None None CodingSec - Ethical Hacking Team how to work data permission control in java 2016-09-10T16:00:08+00:00 https://codingsec.net/2016/09/work-data-permission-control-java/ www.secnews.physaphae.fr/article.php?IdArticle=43595 True None None None CodingSec - Ethical Hacking Team How garbage collection is done in java 2016-09-09T18:00:04+00:00 https://codingsec.net/2016/09/garbage-collection-done-java-2/ www.secnews.physaphae.fr/article.php?IdArticle=38114 False None None None CodingSec - Ethical Hacking Team What are methods in java 2016-09-09T17:00:24+00:00 https://codingsec.net/2016/09/what-are-methods-in-java/ www.secnews.physaphae.fr/article.php?IdArticle=37887 True None None None CodingSec - Ethical Hacking Team What are variable length arguments in java 2016-09-09T16:00:15+00:00 https://codingsec.net/2016/09/variable-length-arguments-java/ www.secnews.physaphae.fr/article.php?IdArticle=37623 False None None None CodingSec - Ethical Hacking Team How to work with command line arguments in java 2016-09-08T18:00:11+00:00 https://codingsec.net/2016/09/work-command-line-arguments-java/ www.secnews.physaphae.fr/article.php?IdArticle=32789 False None None None CodingSec - Ethical Hacking Team How to perform recursion operation in java 2016-09-08T17:00:46+00:00 https://codingsec.net/2016/09/perform-recursion-operation-java/ www.secnews.physaphae.fr/article.php?IdArticle=32581 False None None None CodingSec - Ethical Hacking Team How to perform parameter passing in java 2016-09-08T16:00:58+00:00 https://codingsec.net/2016/09/perform-parameter-passing-java/ www.secnews.physaphae.fr/article.php?IdArticle=32349 False None None None CodingSec - Ethical Hacking Team How to perform ARP Cache Poisoning with Scapy 2016-09-07T16:00:18+00:00 https://codingsec.net/2016/09/how-to-perform-arp-cache-poisoning-with-scapy/ www.secnews.physaphae.fr/article.php?IdArticle=26948 False None None None CodingSec - Ethical Hacking Team How to use this keyword in java 2016-09-06T19:00:31+00:00 https://codingsec.net/2016/09/use-keyword-java/ www.secnews.physaphae.fr/article.php?IdArticle=22047 False None None None CodingSec - Ethical Hacking Team what is access control in java 2016-09-06T18:00:36+00:00 https://codingsec.net/2016/09/access-control-java/ www.secnews.physaphae.fr/article.php?IdArticle=21701 False None None None CodingSec - Ethical Hacking Team How to perform overloading in java 2016-09-06T17:00:26+00:00 https://codingsec.net/2016/09/perform-overloading-java/ www.secnews.physaphae.fr/article.php?IdArticle=21543 False None None None CodingSec - Ethical Hacking Team What are methods in Java? How do they work? 2016-09-05T17:00:35+00:00 https://codingsec.net/2016/09/methods-java-work/ www.secnews.physaphae.fr/article.php?IdArticle=18089 False None None None CodingSec - Ethical Hacking Team What is java Virtual Machine? How does it work? 2016-09-05T16:00:18+00:00 https://codingsec.net/2016/09/java-virtual-machine-work/ www.secnews.physaphae.fr/article.php?IdArticle=17966 False None None None CodingSec - Ethical Hacking Team How do constructors work in java 2016-09-04T18:00:53+00:00 https://codingsec.net/2016/09/constructors-work-java/ www.secnews.physaphae.fr/article.php?IdArticle=16071 False None None None CodingSec - Ethical Hacking Team How to decode WPA/WEP keys using Penetrate Pro 2016-09-02T18:00:35+00:00 https://codingsec.net/2016/09/decode-wpawep-keys-using-penetrate-pro/ www.secnews.physaphae.fr/article.php?IdArticle=11955 True None None None CodingSec - Ethical Hacking Team How to scan ports in the network using aNmap from mobile 2016-09-02T17:00:48+00:00 https://codingsec.net/2016/09/scan-ports-network-using-anmap-mobile/ www.secnews.physaphae.fr/article.php?IdArticle=11800 False None None 5.0000000000000000 CodingSec - Ethical Hacking Team How to perform Dynamic analysis of an android application using DroidBox 2016-09-02T16:00:32+00:00 https://codingsec.net/2016/09/perform-dynamic-analysis-android-application-using-droidbox/ www.secnews.physaphae.fr/article.php?IdArticle=11610 False None None None CodingSec - Ethical Hacking Team How to hack android device network using Network Spoofer 2016-09-01T18:00:03+00:00 https://codingsec.net/2016/09/hack-android-device-network-using-network-spoofer/ www.secnews.physaphae.fr/article.php?IdArticle=9958 False None None None CodingSec - Ethical Hacking Team How to analyse Android Applications using APK inspector 2016-09-01T17:00:04+00:00 https://codingsec.net/2016/09/analyse-android-applications-using-apk-inspector/ www.secnews.physaphae.fr/article.php?IdArticle=9959 False None None None