Go4Expert's Monthly Newsletter - Read Online
 
Logo - Please Enable Images
 


We're back with this month's edition of Go4Expert's Newsletter. We hope you enjoy it and pass on the word to your buddies. As always, we'd love to know what you would like to see in upcoming newsletters and we welcome you to submit your feedback.


AMD Fusion - Accelerated Processing Unit (APU), New Era in Computing

  This is known to all that AMD is the only one competitor of Intel.s market. In this .Dual-Core. era of CPU.s AMD is going to launch their APU or Accelerated Processing Unit in this year. Not only AMD Intel is also working with this architecture and hopefully they will also release their new...

Read more...
 

Sockets in C Tutorials

  What is a socket? See there are many types of sockets hardware sockets .like electrical sockets. etc. and software .programming sockets. like what i'm going to talk about from now onwards. See , a socket can be thought like any standard way to perform network communication through our system...

Read more...
 

Bash Simple Tricks Tutorial

  In this tutorial of mine I am demonstrating some bash commands with some example scenarios/questions and their solutions.... What is Bash:- Bash or Bourne Again Shell is a reimplementation of Bourne shell... Bash is the default shell that comes with most of the linux distributions out...

Read more...
 

Running Windows Programs Under Linux

  In this tutorial of mine i am demonstrating how to Run windows programs in linux .... In my case i am using Ubuntu 10.10 with Kernel 2.6 I am using Wine to demonstrate my article.. Wine is a program that provides the windows API for running the windows programs . ...

Read more...
 

An Introduction to Cryptography

  Cryptography is "Art of writing or hiding secret". It is a science of protecting the information from theft or unauthorized access. To do so, important or confidential information is hided as or converted to some other form of gibberish data. Now original information can be recovered only by the...

Read more...
 

Understanding Symmetric-Key encryption

  The article extends the Cryptography concepts to explain the Symmetric Key encryption. Additionally, it throws light on the capabilities of Symmetric key encryption and its operational modes. Symmetric-Key encryption Symmetric key cryptography is encrypting or decrypting message using a...

Read more...
 

Data Encryption Standard (DES) Algorithm

  The article continues the discussion on Algorithms available in Symmetric Key cryptography. It explains the whereabouts of DES algorithm. Due to the limitations of DES on security context, we shall include Triple DES in the scope. Triple DES is a stronger form of DES algorithm. Understanding...

Read more...
 

Instantly Submit HTML Form Using IFrame and JavaScript

  Have you ever wondered when you see form on some website submitted in a fraction of a second? Have you ever wanted such forms on your site? This is it. Let us take a sample form. HTML:

Read more...
 

Fraction math functions

  This script adds some basic math functions to php allowing you to get percentages, ratios and other fraction based functions. Background I created this because I had a need for some math functions that php does not provide. I also made them for my math class to save on time from having to do...

Read more...
 

What are Torrents and How they Work ?

  What are torrent *Torrents* Torrents are P2P(Peer to Peer) software compatible files they are used to share files in P2P network environments. For running torrents you need to install a specialised P2P software. Torrents use a Protocols for transfer of files The Bit-Torrent protocol...

Read more...
 

Introduction to Bouncy Castle APIs

  The Bouncy Castle Crypto APIs is a set of implementations of cryptographic concepts and algorithms. Bouncy Castle APIs are developed in both Java and C#. These APIs can be freely downloaded from the Bouncy Castle home page. Let us have a glance at some of the important type of implementations...

Read more...
 

Understanding Public Key Infrastructure

  Public Key Infrastructure Public key infrastructure is an architecture which supports mechanisms like integrity and confidentiality. It is heavily used in e-commerce, where business transactions are frequent and should be much secured. In fact business transaction starts only after the two...

Read more...
 

Understanding Advanced Encryption Standard

  Advanced Encryption Standard is a block cipher symmetric encryption algorithm. It is preferred to protect network communications, personal data etc using AES over DES. It encrypts or decrypts the data through several rounds. Categorization It is categorized under three types of key sizes ....

Read more...
 

How to get started with GNU Project Debugger [GDB]?

  GDB is GNU Project Debugger its basically is a debugger and allows you to see inside the program flow, control structure, working, code and we will see how we can do that. How to work with GDB We will we using a basic debugMe.c program throughout this tutorial helloworld.c Code:...

Read more...
 

Getting Started With Virtual machines

  Virtual machine(VM) as the name suggests is a software implementation of a programmable machine running inside another machine i.e an OS running inside another OS e.g. Linux running inside Windows. The Host machine on which the Virtual Machine Monitor/Software runs is called the Host Machine or...

Read more...
 

How to get started with Metasploit

  Metasploit is a Hacking Framework consisting of tools , exploits , Knowledge etc etc...Its a Boon to pen-testers , exploit developers and Hackers ... This Project was started by H.D Moore and is now open source project managed by Rapid7 (http://www.rapid7.com/) For Downloading and installing...

Read more...
 

8 More Reasons to be Using Linux Instead of Windows

  Let me share with you 8 More Reasons why you should be Using Linux Instead of Windows. *1. Free and Open Source Software * Linux is free and open source software which means you can redistribute, change, modify the code or the whole system and no one is going to ask you "Why you have done...

Read more...
 

What is Operating System, Kernel and Types of kernels

  1. What Is Kernel? A kernel is a central component of an operating system. It acts as an interface between the user applications and the hardware. The sole aim of the kernel is to manage the communication between the software (user level applications) and the hardware (CPU, disk memory etc). The...

Read more...
 

How to Get CPU Vendor String, Using x86 Assembly Instruction

  In this article I am going to demonstrate a basic use of low-level language to demonstrate how you can get your CPU Vendor string, and other hardware information using x86 assembly coding Code: --------- section .data string db "The Vendor id string is 'XXXXXXXXXXXX'",0xA section...

Read more...
 

Stack Implement in C using arrays

  Stack is a LIFO[Last in first out] abstract type of data structure. The stack is mainly associated with 2 types of functions Push() and Pop(). Push() adds an item on the top of the stack and Pop() removes an item from the top of the stack. Implementation of Stack stack.c Code: ...

Read more...
 

Why Stack Overflows Can Be Dangerous?

  Stack is a Last in First out(LIFO) abstract data structure...Stack is used as the main data structure for processing and data management on most of the OS architectures...like intel x86 etc etc.. Stack based Overflows It happens when to much data is passed on the call stack and results in...

Read more...
 

How HTTP Works?

  HTTP is an abbreviated form of Hyper Text Transfer Protocol..As we all know HTTP set the foundations for internet and WWW [world wide web]...I'll not go in much detail of its history, but I'll get straight to the topic of How HTTP works HTTP is a request response protocol to communicate...

Read more...
 

Memory addressing and segmentation in Linux

  Lets try and understand the memory addressing system and segmentation in Linux [Note: This article is written keeping in mind 8086 microprocessor]. 1. Memory Addresses There are three types of addresses : 1. *Logical addresses :* Logical addresses are included in the machine language...

Read more...
 

How FTP Works With Example

  FTP is a abbreviation of File Transfer Protocol , it is the main net work protocol used for downloading/uploading of files...From one host to another using a TCP based network like INTERNET.. FTP works on a principle of client-server model and uses data-connection between client and server..FTP...

Read more...
 

How to get source of a Web Page in C

  *Note : The following source will only work with non-chunked encoding servers...The servers which have enabled the encoding set to chunked will not properly work with this source... And I assume basic knowledge of SOCKETS UNIX API and C language as prerequisites...* Source Code:...

Read more...
 

How SSH works? Examples and Samples

  SSH is a abbreviation for Secure Shell is a network protocol that allows data-exchange between devices on the network..This is mainly used in linux OS's to access shell accounts , shell commands etc... SSH was mainly designed as a replacement modification to telnet etc..other insecure remote shells...

Read more...
 

Basics of How SMTP Works

  SMTP stands for Simple Mail Transfer Protocol as the name suggest it is basically used for emails.. SMTP specified for outgoing mail uses and default sits on TCP Port 25..(Uses 587 in new versions) Electronic mail servers uses SMTP for send and receive emails while the User Client interface only...

Read more...
 

Bouncy Castle - .Net Implementation . Triple DES Algorithm

  In this article, we will go through a simple example to demonstrate Encryption and Decryption techniques using Triple DES algorithms. We will use Bouncy Castle APIs for performing below steps. Encryption steps -...

Read more...
 

Digital Certificates and Smart Cards

  Digital certificates are files which are used to prove the authenticity of the user or computer to whom it is issued. It is very similar to an identification proof like passport, driving license or PAN, which gives assurance to the other party that the transaction of information from the...

Read more...
 

Digital Certificate formats and filename extensions

  In this article, we will learn about the available formats of Digital certificate, their purpose and some of the technical commands used for requesting and issuing the certificates. We shall use *OpenSSL*, which is an open source toolkit for performing cryptographic operations ...

Read more...
 

How Proxy Works?

  In a network of computers, a Proxy (or a Proxy server) acts as an inter-mediator for relaying of requests from set of clients seeking resources from other set of servers. A Proxy generally while acting on the requests may filter the data based on specific requirement of the Proxy. Most web based...

Read more...
 

Understanding Format Strings and Their Vulnerbilities

  Format strings are the strings mainly associated with printf's set of instructions (like printf,fprintf etc..) which basically stands for print format.... These functions accept several arguments and put them on the stack..and as a format specifier is noted in the string the function pops the data...

Read more...
 

How to make a simple shellcode (The basics)

  Shell-code is a piece of object codes that can be injected into the executable stack to get the execution access...Shell-code is so called because it is basically used to get a shell (/bin/bash).. We'll see how make a simple exit shell-code...

Read more...
 

CUBE function in SQL Server

  CUBE generates a result set that represents aggregates for all combinations of values in the selected columns. CUBE automatically generates a summation rollup to the top level of a GROUP BY. Lets us look one Example. ...

Read more...
 
Announcements

lionaneesh Promoted to Author

Community Stats

+ 1,481 New Members
+ 360 New Threads and Articles
+ 1,582 New Posts and comments

RSSSubscribe via RSS

Get live updates in your web browser window.

TwitterFollow us on Twitter

Are you on Twitter? Follow us and get updated.

FacebookFind us on facebook

Share Go4Expert with your buddies on facebook.

Unsubscribe

If you no longer wish to receive this newsletter or want to edit your preferences you can do it here.

{!contact_address}