Posts

Python S1E2 : What is Programming

Image
What is programming? Feel free to skip this part if you already know everything I will be talking about. W all know very well that computers doesn't have Felling. They don't work any faster or slower depending on if we're angry at them or if we're happy. No doubt that Computers can perform millions of calculations per second, but they require us to tell them exactly what to do. If they do something else than we want them to do the problem is usually that they don't understand our instructions the way we understand them. The only big difference between programming and what you're familiar with already is that instead of clicking buttons to do things we will use our beautiful keyboard to write the instructions using a  programming language in our case its python  . Most programming languages consist of English words, digits and some characters that have special meanings just like abbreviations . Unlike people often think, programming is usually not compl...

Python S1E1 : Introduction

Who I'm Manan. And I want to teach Python. Because you're good looking. And because it's useful. What In this tutorial, we'll start from the very beginning. You don't need to know anything about Python or anything about Programming to start.  When I will be Posting Python Tutorial blog on every Saturday. Where On a computer. Here. Why Because this stuff is important. Whether you're a business person formatting your emails, or just someone who is interested and hasn't tried any sort of coding, scripting, or programming before,  Python is Easiest language to learn Table Of Content 1. What is Programming ( note: I will Update ToC every Saturday with new Tutorial Blog. )

OSI model

Image
The OSI model is a layered approach to networking. OSI stands for Open Systems Interconnection. It was developed by ISO – ‘International Organization of Standardization‘, in the year 1974.  An abstract model of networking, called the Basic Reference Model or seven-layer model it is a 7 layer architecture with each layer having specific functionality to performed. All 7 layers work together to transmit the data. This image was taken from geeksforgeeks.org I am describing them to you in descending order because, I personally believe that this model can be easily understood in this order. ( Please note: OSI model is not implemented in Internet because of its late invention. Current model being used is the TCP/IP model. TCP/IP model k baraime phir kabhi batt karege abhi merko alas aa raha hai ) 7. Application Layer (Layer 7) : At the very top of the OSI Reference Model stack of layers, we find Application layer which is implemented by the network applications. Application L...

How to Hack WiFi 2k18

Image
Step 1:- First Download Backtrack Step 2:- Burn the iso image on CD and boot your laptop from CD drive Step 3:- Select the third boot option(VESA/KDE). Step 4:- Once in BT3, click the tiny black box in the lower left corner to load up a “Console” window. Step 5:- Type the following command airmon-ng Note down the interface name. In this example "wifi0" Step 6:- airmon-ng stop wifi0 Step 7:- ifconfig wifi0 down Step 8:- macchanger –mac 00:11:22:33:44:66 wifi0 Step 9:- airmon-ng start wifi0 Step 10:- airodump-ng wifi0 This will start populating Wifi networks. Press Ctrl + C to stop. Check the network with WEP encryption. Notedown BSSID, CH and ESSID somewhere in notepad or paper. Note that if the same BSSID is available in the second part with STATION associated with it, means you some one is accessing that network and our task will be little easier. If not than don’t worry we will still crack it. Step 11:- airodump-ng -c (channel) -w (file name...

Black Hat SEO

Image
 Black Hat SEO refers to the use of aggressive SEO strategies, techniques and tactics that focus only on search engines and not a human audience, and usually does not obey search engines guidelines. Examples of Black Hat SEO Techniques : keyword stuffing , invisible text, Paid Links,  doorway  pages, adding unrelated keywords to the page content or page swapping (changing the webpage entirely after it has been ranked by search engines). Who uses Black Hat SEO and Why?: Black hat SEO is more frequently used by those who are looking for a quick financial return on their  Web site , rather than a long-term investment on their Web site. Disadvantage of Black Hat SEO :   Black hat SEO can possibly result in your Web site being banned from a  search engine , however since the focus is usually on quick high return business models, most experts who use Black Hat SEO tactics consider being banned from search engines a somewhat irreleva...

Compton Scattering

Image
The scattering of photons from charged particles is called Compton scattering after Arthur Compton who was the first to measure photon-electron scattering in 1922 . When the incoming photon gives part of its energy to the electron, then the scattered photon has lower energy and according to the Planck relationship has lower frequency and longer wavelength . The wavelength change in such scattering depends only upon the angle of scattering   for a given target particle. Compton's original experiment made use of molybdenum K-alpha x-rays , which have a wavelength of 0.0709 nm . These were scattered from a block of carbon and observed at different angles with a Bragg spectrometer . The spectrometer consists of a rotating framework with a calcite crystal to diffract the x-rays and an ionization chamber for detection of the x-rays. Since the spacing of the crystal planes in calcite is known, the angle of diffraction gives an accurate measure of the wavelength.   Bragg ...

Doxing

In the modern world, Internet has become a wonderful place to gain knowledge, exchange ideas, share information, make new friends and whatnot. Even though, you can do all of this by remaining anonymous behind your monitor, your real life identity and personal details can still be at the risk of falling into the hands of strangers. This is where the term “doxing” comes into play! What is Doxing? Doxing simply refers to the process of gathering or deducing other people’s information such as name, age, email, address, telephone number, photographs etc. using publicly available sources such as the Internet. In other words, doxing is the act of using the Internet to search for personal details about a person. Doxing is done by initially taking a piece of information (such as “name” or “email address”) and keeping it as a base to find out other possible details about the person. The term “doxing” is derived from the word “document tracing” which means to retrieve documents about a pa...