We're back with this month's edition of Go4Expert's Newsletter. We hope you enjoy it and pass on the word to your buddies. As always, we'd love to know what you would like to see in upcoming newsletters and we welcome you to submit your feedback.
Simple Regex Samples
Regular expressions commonly known as ‘regex’ provide an abstract and Flexible means to compare strings. It’s mainly used for scrapping and extraction of useful data from strings.
In this tutorial we’ll be looking at some regular expressions using grep in Unix/Linux and how to use them in...
Read more...
How to Fix Cannot use object of type stdClass as array
Working in Wordpress I wanted to check the type of page. I.e. is the content type as page or post. I used the global $post Wordpress variable and when I did variable dump for the object using print_r.
Read more...
How to Hack Email Account with Cookie stealing [For Newbies]
Today I am writing about a new topic Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack anEmail account. In the...
Read more...
Gmail Send Form Temporarily Stores the Files for Download
This article is about manipulating Gmail to send emails containing form buttons and using the redirection to download files into the victims machine, granted that they are dumb enough to do so. All we need is a GMail account
Steps:
1. Compose a new message in your gmail account
2. Copy this...
Read more...
Batch to Print or Delete Files by a Specified Age of Days
This script excepts command line arguments and will either print to the command screen or delete files older than or less than the specified number of days.
Read more...
Passing more than 26 -31 tokens via FOR in DOS
I have seen all over the net limitations with the FOR command in DOS and passing more than 26 - 31 tokens and the work around.
I have come up with my own method for doing...
Read more...
How to Reduce Coding Errors when Writing Code - Part 1
I've arrived at the source code of a widely know instant messenger Miranda IM (http://www.miranda-im.org/). Together with various plugins, this is a rather large project whose size is about 950 thousand code lines in C and C++. And like any other considerable project with a long development...
Read more...
Viruses / Virii / Worms History and Sources
This article is a collaboration of articles found on the internet about various viruses / virii, what they are, history, different types, and some sample sources of code. All the information contained in this article is strictly for educational purposes and I shall not be held responsible for any...
Read more...
Export All vBulletin Templates to Html Files
Wish you could work with your favorite HTML editor to edit vBulletin templates. You can do this with a hidden vBulletin feature.
1. Your vBulletin needs to be running in debug mode. Add $config['Misc']['debug'] = true; into your config.php file
2. Create a folder in your forum root called...
Read more...
Basics of Hashing and Why hashing is used ?
The article explains why hashing have o(1) complexity. This article will clear your doubt that whay hashing has 0(1) time complexity but will not take you deeper . There are certain factors which can affect the time complexity like collision and performance of hashing depends on hashing algorithm....
Read more...
C Program to Calculate all possible Combinations of an n Digit Number
Generally a question is asked that if you have given n bits then print out all the possible binary numbers of n bit and so I will try to explain how to get that done. Please don't Copy Paste. Understand The logic because it is useful in other problems as well
for eg
if n=1 then you can have
0...
Read more...
Exploiting buggy/weak Firewall's
In this tutorial we'll be looking at a new way(at least for me) to bypass weak firewalls...
A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting...
Read more...
Difference between Bind Shell and Reverse Shell
Let us see the basic differences between a bind shell and a reverse shell..
What is a Shell
A shell is a software that acts as a intermediary between user and the kernel. It provides the user an interface which provides access to the services of kernel.
Eg : Bash shell etc..
Code:
Read more...
How to Reduce Coding Errors when Writing Code - Part 2
This is the second article on avoiding certain errors at the early stage of code writing. In the previous post, we have already advised you to avoid a large number of calculations in one expression. However, we should investigate this question in detail. Let's see what's dangerous about complex...
Read more...
|
Community Stats
+ 1,072 New Members
+ 267 New Threads and Articles
+ 1,229 New Posts and comments |
Subscribe via RSS
Get live updates in your web browser window. |
Follow us on Twitter
Are you on Twitter? Follow us and get updated. |
Find us on facebook
Share Go4Expert with your buddies on facebook. |
Unsubscribe
If you no longer wish to receive this newsletter or want to edit your preferences you can do it here. | |