Podcasting – Mobile Hacking – How to Hack an Android Phone? A mobile device allows communication between users on radio frequencies. It is used to send emails, multimedia sharing, and also used for internet access. In this period of time mobile has taken over desktops and computers as mobile phones now enable the user toRead More
What is Pickling and How Pickling is done in Python
Today we are going to talk about the pickling and unpickling concept in Python. It is a part of our standard library with the basic installation of Python. What is Pickling in Python? Pickling is the concept of serializing a python object into a byte stream. The basic concept of pickle is to store theRead More
Implementing Static IP address for Raspberry Pi?
For a raspberry pi device that was configured for DHCP service in the network. What if the router has become unavailable and the device IP assignment is not done in the network. In such cases, the device will not be accessible in the network as there is no IP address available to it. But withRead More
Working with Text Files in Python: The Basics
We’re going to learn the fundamentals of operating with text files in Python Training. What is the significance of Python file handling? And how to read files, how to write data to them, and why files should be locked. 1) Importance of reading and writing text files. Reading and writing files in any programming languageRead More
How to Connect MySQL Database with PHP Website
When many developers refer to a database, they are usually referring to MySQL, a very popular DBMS that powers projects of all sizes. Create MySQL Database at the Localhost First, let me tell you what PHPMyAdmin is. It is a control panel from where you can manage your database that you have created. Open yourRead More
HOW TO CHECK IF THE LINUX SERVER IS HACKED?
Symptoms of compromised server When servers are invaded by inexperienced attackers or automated attack programs, they often consume 100% of the resources. They may consume CPU resources to mine digital currencies or send spam, or they may consume bandwidth to launch DoS attacks. So the first manifestation of the problem is that the server “slowedRead More
While loop in Python
We have some basic data types in python programming language, which we use to do our work or can say that we use to write our code in python. But for how long we have been working on single data type. Working with a single datatype like x = 10 is simply the most basicRead More
Configuring the X Window System
This document describes how to obtain , Install, configure (configure) XFree86 of Linux system . XFree86 is an enhanced version of Windows x 11r5, mainly in all kinds of support to intel i386 / 486 hard Unix system body platform, of course, this also includes the Linux. It currently supports a considerable number of videoRead More
Interacting with Python
Since you have a working Python arrangement, you’ll perceive how to really execute Python code and run Python programs. Before the finish of this article, you’ll know how to: Use Python intelligently by composing code legitimately into the translator. Execute code contained in a content document from the order line. Work inside a Python IntegratedRead More
Automation with Python
We will utilize a Python module Py Auto GUI that mechanizes our mouse and console. “How might you mechanize your Computer Mouse and Keyboard utilizing Python”.The motivation behind Py Auto GUI is to give a cross-stage Python module for GUI robotization for individuals. The API is intended to be as basic as conceivable with reasonableRead More