Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - sudeep

Pages: [1] 2
1
Hacking and Security / Re: My computer got infected
« on: April 22, 2014, 06:18:59 pm »
The first thing you need to do is to locate the malware.
Just open the Task Manager (ctrl + alt + del) and switch to Processes. Check all the processes run by Administrator as most of the worms and virus are executed by the user and not by the system. If any processes is suspicious, then search it and delete. After all the malware is removed, reinstall your OS ;-)

2
Tutorials / Re: Understanding the BitTorrent Protocol.
« on: February 20, 2014, 12:06:58 pm »
Thanks ken, you helped me understand the topic to its roots. It would be nice if you explain the other terms also.
+1

3
Mobile Hacking / Re: How to Recover your micro Sd card Lost Password
« on: August 25, 2013, 01:49:25 pm »
This tutorial is useless if you have formatted your mobile. And if you have not formatted your mobile then your sd  card would open without any password as it is already stored in your mobile. So what's the use of this trick? I had a similar issue but had to break the password and lost the data in it.

4
General discussion / Re: Diploma or Collage
« on: May 16, 2013, 12:17:51 pm »
In India, degree is given more importance than diploma. Though, you can get degree after diploma, I will advice for 10+2 and then degree.

5
General discussion / Re: Training courses & Seminars
« on: May 08, 2013, 05:27:56 am »
Hello everyone, I need some help from you guys. I'm looking for websites that archive or organize training courses and seminars world wide, in the filed of physics,nanotechnology,electronics and photonics. Please if you know a website or come across one, dump it here. I've done some searching and I found a few websites
Finding a institution that conduct seminars worldwide is quite difficult. I think that searching for your country specific will give you better results

6
C - C++ / Re: problem with Cout statement
« on: April 04, 2013, 08:55:38 am »
@ Sudeep, Your code is Wrong because,

1. main() always returns a value 0 to the caller (OS) at the end if everything goes okay. which is why we use "int", because main() returns an integer value (0) to the caller. but void functions dont return any value.

2. This is c++ where you dont have to include the header files (that comes with the compiler) extensions. my minGW compiler complains about that.(most compilers will too)
yor using the "c" standard in c++.

3. you didnt include the std, not including it makes cout and endl undefined so the compiler shouts at that too.

4. You didnt put any return statement at the end of main(). the
return 0;
is for informing the caller that everything went fine, if not it returns another integer value. this is a very bad mistake, because the compilers dont give an error msg for not stating return 0;


Seems like your college is teaching the old standards of c++.


Using the "void" before function main means that the function main() does not return any value so there is no need of the return() inside the main.
I use Turbo C++.

7
C - C++ / Re: problem with Cout statement
« on: April 03, 2013, 09:01:38 pm »
I have changed your code a bit so that you can get the output what you want.
Code: (C) [Select]
#include <iostream>
using namespace std;
int main(void) {
cout << 2 + 5 << "\n" ;
cout << 2 + 8 << "\n" ;
return 0;
}

I am also learning C++ at the college, but they never used "using namespace std".
The program that I learnt was very simple and something like this :
Code: (C) [Select]
#include<iostream.h>
void main()
{
cout<<2 + 5 <<endl;
cout<<5 + 8 <<endl;
}
You can try this also.

8
C - C++ / Re: Which code is better?
« on: March 27, 2013, 09:29:17 am »
@rasenove

The code you wrote was same that came to my mind after reading the question, but I think that the previous one is better.

9
Anonymity and Privacy / Re: Hiding my identity
« on: March 24, 2013, 05:06:10 pm »
Then you can try from a different PC from somewhere else

10
Science / Re: ∞ x 0 = -1 [?]
« on: January 30, 2013, 09:14:35 am »
As much as I know, ∞ x 0 is an indeterminate form. There are in total 7 indeterminate forms viz. 0/0, ∞/∞, ∞x0, ∞-∞, 0^0, ∞^0, 1^∞
and these can be solved using Limits only.
@ p_2001 : I agree with you.

11
General discussion / Re: How did you went into hacking?
« on: January 26, 2013, 12:09:55 pm »
I had a small site months ago in wapka. If you know about wapka, then you must know about the mb system there. A user who promised to give me mb for creating a toplist for him later cheated me. Then I searched a lot and lot and tried to hack his account and ultimately hacked it and just stole all his mb. That day I felt how cool the hacker's are and decided to learn hacking and I'm here

12
Hacking and Security / Increasing your email security
« on: January 23, 2013, 10:28:48 am »
Besides having a strong password to email, we can do a lot much to increase the security of email. Below are the two tricks that I use.

1. Security Question :
 Other than mobile Verification and alternate email address, this is the simplest way one can get into your account. If the attacker dox'es and gets all your personal information, there is a chance that he can answer it by guessing. So what you can do is select a question and put an answer which is not at all related to it. For example, if you select the question " Who was your best childhood friend?" then you can put the answer as your birth place, your favourite colour, mobile number,etc. so that the attacker has no chance of guessing it at all.

2. Filters :
  You can use filters to make your account a bit more safe. If someone gets into your account, the first thing he will do is check all your information and accounts related to the email. Then he will go the sites in which you have your account and click on the 'Forgot password' to get password to the email. Here, what we can do is create a new filter in which you can enter keywords like 'password, key, pin, etc. ' and choose the action as move to thrash or delete permanently. If you receive any email containing these keywords, then it will go to thrash. This will prevent the attacker to gaining access to your other accounts.

These are the two tricks that I use for my email. If you use any tricks please share.

13
@glitcher Ya, you can format your USB with XP bootable CD. When the setup starts, it asks the drive which you want to format and install XP. Just select the drive for the USB and then you will get 4 options, to format using
NTFS, NTFS(quick), FAT32, FAT32(quick). Select NTFS quick and format the Usb and after the format is complete, exit the setup.

14
If you have Windows XP bootable CD, you can run the setup and format it easily

15
General discussion / Re: Quest to learn every programming language!
« on: December 31, 2012, 07:57:20 am »
Its nearly impossible to learn all these languages. They are nearly 250+

Pages: [1] 2