Go4Expert's Monthly Newsletter - Read Online
 
Logo - Please Enable Images
 


We're back with this month's edition of Go4Expert's Newsletter. We hope you enjoy it and pass on the word to your buddies. As always, we'd love to know what you would like to see in upcoming newsletters and we welcome you to submit your feedback.


Simple Regex Samples

  Regular expressions commonly known as ‘regex’ provide an abstract and Flexible means to compare strings. It’s mainly used for scrapping and extraction of useful data from strings. In this tutorial we’ll be looking at some regular expressions using grep in Unix/Linux and how to use them in...

Read more...
 

How to Fix Cannot use object of type stdClass as array

  Working in Wordpress I wanted to check the type of page. I.e. is the content type as page or post. I used the global $post Wordpress variable and when I did variable dump for the object using print_r.

Read more...
 

How to Hack Email Account with Cookie stealing [For Newbies]

  Today I am writing about a new topic Cookie Stealing. I observed that cookie stealing is neglected by some fellow hackers (even I was one of them). But, recently, I discovered that cookie stealing can be pretty handy to hack anEmail account. In the...

Read more...
 

Gmail Send Form Temporarily Stores the Files for Download

  This article is about manipulating Gmail to send emails containing form buttons and using the redirection to download files into the victims machine, granted that they are dumb enough to do so. All we need is a GMail account Steps: 1. Compose a new message in your gmail account 2. Copy this...

Read more...
 

Batch to Print or Delete Files by a Specified Age of Days

  This script excepts command line arguments and will either print to the command screen or delete files older than or less than the specified number of days.

Read more...
 

Passing more than 26 -31 tokens via FOR in DOS

  I have seen all over the net limitations with the FOR command in DOS and passing more than 26 - 31 tokens and the work around. I have come up with my own method for doing...

Read more...
 

How to Reduce Coding Errors when Writing Code - Part 1

  I've arrived at the source code of a widely know instant messenger Miranda IM (http://www.miranda-im.org/). Together with various plugins, this is a rather large project whose size is about 950 thousand code lines in C and C++. And like any other considerable project with a long development...

Read more...
 

Viruses / Virii / Worms History and Sources

  This article is a collaboration of articles found on the internet about various viruses / virii, what they are, history, different types, and some sample sources of code. All the information contained in this article is strictly for educational purposes and I shall not be held responsible for any...

Read more...
 

Export All vBulletin Templates to Html Files

  Wish you could work with your favorite HTML editor to edit vBulletin templates. You can do this with a hidden vBulletin feature. 1. Your vBulletin needs to be running in debug mode. Add $config['Misc']['debug'] = true; into your config.php file 2. Create a folder in your forum root called...

Read more...
 

Basics of Hashing and Why hashing is used ?

  The article explains why hashing have o(1) complexity. This article will clear your doubt that whay hashing has 0(1) time complexity but will not take you deeper . There are certain factors which can affect the time complexity like collision and performance of hashing depends on hashing algorithm....

Read more...
 

C Program to Calculate all possible Combinations of an n Digit Number

  Generally a question is asked that if you have given n bits then print out all the possible binary numbers of n bit and so I will try to explain how to get that done. Please don't Copy Paste. Understand The logic because it is useful in other problems as well for eg if n=1 then you can have 0...

Read more...
 

Exploiting buggy/weak Firewall's

  In this tutorial we'll be looking at a new way(at least for me) to bypass weak firewalls... A firewall is a device or set of devices designed to permit or deny network transmissions based upon a set of rules and is frequently used to protect networks from unauthorized access while permitting...

Read more...
 

Difference between Bind Shell and Reverse Shell

  Let us see the basic differences between a bind shell and a reverse shell.. What is a Shell A shell is a software that acts as a intermediary between user and the kernel. It provides the user an interface which provides access to the services of kernel. Eg : Bash shell etc.. Code:

Read more...
 

How to Reduce Coding Errors when Writing Code - Part 2

  This is the second article on avoiding certain errors at the early stage of code writing. In the previous post, we have already advised you to avoid a large number of calculations in one expression. However, we should investigate this question in detail. Let's see what's dangerous about complex...

Read more...
 
Announcements

Newsletter Feedback We Launched in March 2010

Donate for Japan Earthquake & Tsunami Damage

Be Part of Go4Expert Donation to CRY

Community Stats

+ 1,072 New Members
+ 267 New Threads and Articles
+ 1,229 New Posts and comments

RSSSubscribe via RSS

Get live updates in your web browser window.

TwitterFollow us on Twitter

Are you on Twitter? Follow us and get updated.

FacebookFind us on facebook

Share Go4Expert with your buddies on facebook.

Unsubscribe

If you no longer wish to receive this newsletter or want to edit your preferences you can do it here.

{!contact_address}