Let me see 1. Reliable 2 Good performance(speed etc) 3 Takes in the input and gives the desired output 4 Portable
Where is the code that you have written ??
Use the find command.Read the man page
Good Luck with this.Really your best chance is to ask your bf for his password and trust me it's your "best chance"
So there is no way of fooling these people unless you have complete info. Usually people try to get credit card info by trying hacking database of...
Where are you stuck at .Use google get some idea about what you wish to do put together some code paste it over here and then let's see where we go.
Suppose: If youre calling ur Computer company, saying ur ram has gone bad, and its in warrenty, they will send you the new part, and they will...
Well to successfully use credit cards for shopping you not only need the credit card number but also cvv no,name of holder and some other...
Yes it is check this out http://www.shopmania.in/shopping~online-components~search-ddr3.html
Avast and Avg both are good.Avg is lighter on the system.
Ha ha hack hotmail in 4 steps seen that a million times.Dude don't try that thats the way you get your own e-mail hacked his exact code filling...
Ok in one word NO.I mean your ISP and the IM server's you are using would be logging your IP but the other person you are chatting with would...
Well without knowing the decryption algo and the key I don't think it would be possible.You don't know possibly which decryption program is...
Precisely. That's why I said "do this INSTEAD". i.e. don't change the const variable with a pointer, cos you won't get the desired result. This...
Take it step by step try to find some 'pattern' that is there in the output.Try to from a logic on how you could print that than put something...
const int i=10; printf("%d",i); int *j=&i; *j*=2; printf("%d",i); Well I think the compiler might throw a warning in the above code but still...
Ok thanks that was helpfull
Check these links out.They pack a lot of info http://c-faq.com/~scs/cclass/notes/sx13.html http://www.cprogramming.com/tutorial/c/lesson14.html
Const is used with variables whose value remains constant throughout the program .You should use constant for variables whose value would not...
I have been working on a project which implements packet capture ,injection ,SYN attack,ARP poisoning and some other attacks.Now I'm almost done...
Separate names with a comma.