Monday, April 24, 2017
Ruby Tutorial : Step By Step Learning Ruby Programming Language

Ruby Tutorial : Step By Step Learning Ruby Programming Language

Prerequisites for Ruby Tutorial: Install Ruby – Here you will found How to install Ruby? Ruby is a scripting language designed by Yukihiro Matsumoto(Matz). In my previous article Why Rails ? , I wrote...
ROR Tutorial : Rails with Mysql Configuration

ROR Tutorial : Rails with Mysql Configuration

Many of our users get error in establishing connection with mysql or some other configuration for mysql, so I decided to make this tutorial for Rails with Mysql Configuration. Off-course to have...

Ruby On Rails Tutorials : MVC (Model View Controller)

Pr-request for Ruby On Rails Tutorials : Use MVC (Model View Controller) Read our previous post Ruby On Rails Tutorials : Creating new project in Rails In our previous post we create a...
Ruby On Rails Tutorials : Creating new project in Rails

Ruby On Rails Tutorials : Creating new project in Rails

Pr-request for Ruby on Rails tutorials Install linux Operating-System from here . Install RVM , Ruby and Rails from here. Go through...
Why Rails ? An Introduction to my favorite framework

Why Rails ? An Introduction to my favorite framework

Note: I will start tutorials on rails with real-time dynamic web application depends on response of users. If you want this please mention in comments, so that I can start as...
IT pros ,FALLOUT 4 GAMEPLAY FOOTAGE LEAKED!

C First Program

Let’s start our C First Program through telling you basics about C language. Each and every coding line has its meaning and significance this tutorial will tell you about the simple...
Format string exploits

Format string exploits

Format string exploits became public in late 2000. It is easy to find errors in format string in comparison of buffer overflows. Once errors are spotted, they are usually eradicated(removed) quickly....
pentestbox , pentest box

PentestBox: A Portable Penetration Testing Distribution for Windows Environments

Download SourceForge                                              Download Torrent PentestBox is a portable penetration...
Program to find prime numbers from a set of numbers

Program to find prime numbers from a set of numbers

Write a program to find whether the number is prime or not ?? WAP/ Algorithm or Sudo code to find weather a number is prime or not is the most frequently asked...
rvm ruby and rails

Step by Step procedure to install RVM , Ruby and Rails on your linux...

RVM , Ruby , Rails and You This tutorial is specially for RVM, Ruby , Rails and You . It's really difficult to setup development environment for any system and it may...
Building C/C++ code on the Command Line ( Visual Studio / GNU GCC ) for windows

Building C/C++ code on the Command Line using Visual Studio for windows

If you read our previous post ie., Best C / C++ Compiler : Compilation using gcc , it means now you are in love with C-programming. Well today we are going to...
Programming with files in C: Counting Character,Tabs, Spaces from files and writing on files

C Programming with files : Counting Character,Tabs, Spaces from files and writing on files

C Programming with files  ( Reading and playing with characters of file) After reading our previous post, you are now ready to play with C Programming with files . Let's start from counting...
metasploit Unleashed

Explore into the Metasploit ( a Ultimate Hackers Tool)

  Metasploit is a complete and a Ultimate Security tool that provides information about Computer Security Vulnerabilities and also use in penetration testing .It was develop by HD Moore in 2003 using...
Exploit Shell code using Command-line

Exploit using shell code from command line

After reading our previous post:Exploiting buffer overflows using command line it's time to do Exploit Shell code using Command-line but I think you do want to clear your doubt of previous...
Next step towards exploit : finding the return address

Next step towards exploit : finding the return address

Hey friends , I think it's the time to take next step towards exploit after reading our all previous posts . In this tutorial you will learn about : What you...
Ten hilarious programmers facts that only programmers can understand

Ten hilarious programmers facts that only programmers can understand

Programmers Facts Computer programmers are smarter than normal people in term of computers and code ,but honestly some of them are really crazy .Programmer are someone who always think and express their...
Sound-Fix in Kali

Important things to do after installing Kali Linux

There are small set of important softwares that are required after installation of Kali Linux. Linux operating system is not too much user friendly but it is highly flexible operating system....
get into friends whatsapp

How to get into friends whatsapp and send messages

I don't know that how to Express this success !!! Everybody knows that hacking is just a creativity and finding the way to get deeper into the code. So here I...
Memory management in C Programming

Memory management in C Programming:Computer Memory

Memory management in C is one of the important topic as it's not only about memory management in c but also about Computer Memory Management. In this section you will Learn...

C++Advance (STL) Map

Here I want to clear the concepts of map in short.There are 4 associate containers (binary tree) : set ,multiset ,map and multimap .Applications of map are very important because, both multiset...

Reverse String in c++ using sstream

One of  good question can be asked about string is How to Reverse String ?  You can do in many ways but I am going to show you , the one of...

How to solve LASTDIG problem in SPOJ ?

Last digit problem in SPOJ looks simple but it contains a important concept of Modular exponentiation. If want AC in submission then you have to know about this concept ,to avoid time...

Why Null passed in first argument for the messageDialog in java ?

Null passed in first argument: JOptionPane showMessageDialog method signatures: showMessageDialog(Component parentComponent, Object message)   or showMessageDialog(Component parentComponent, Object message, String title, int messageType) or showMessageDialog(Component parentComponent, Object message, String title, int messageType, Icon icon) first parameter is parentComponent : Defines the...

How to use long long data type in C?

In order of size, starting with the smallest, the integer types are char, short,int, long and long long. The smaller types have the advantage of taking up less memory, the larger...

How has open source changed the way students learn new technology

Open-Source Software (OSS):                                                   is computer software with...

Latest tech trends (Internet of Things -IoT , mobile app development , cloud/distributed computing)

  The Internet of Things? The Internet of things, also known as the Internet of objects, refers to the networked interconnection of everyday objects. The Internet of Things, or IoT, is emerging as the...