Skip to main content

Posts

Showing posts from 2014

Cheat Sheet for Windows Command Prompt

To open the Windows command prompt you may do one of the following: - Click Start -> Programs -> Accessories -> Command Prompt - Click Start (or hit the Windows key), type “cmd” in search, then hit [ENTER] - Windows Key + R (#r, not the pound symbol) brings up Run. Then type “cmd” then [ENTER] - SHIFT + right-click in any folder or desktop, then select “open command window here” Basic Command Prompt Commands x /? = provides syntax info and complete list of all parameters for x (a command, like “cd”) cd = change directory cd .. = move to the parent directory cd\ = move to the root of current drive cd x = move to the current\x directory cd z: = change to the z root directory (as opposed to c:\) copy x y = copy file x to directory y (Ex: D:\games\galaga.exe C:\programs[\awesome.exe]), [] = optional copy file con = display file contents in console copy con file.txt = create text file in the console window, end with ctrl+z (^z or F6) date = change the date de

Procedure to enable wireless LAN adapter in vmware!

I have went to find the way in which wlan in Kali Linux could be made listed my airmon-ng command. Most of the videos and posts suggested me that it is necessary to have another wi-fi adapter to have connected to wifi network. But this is not necessary. The procedure to do this is as follows: 1. Download this package in Virtual Machine(Kali linux) " http://wireless.kernel.org/download/compat-wireless-2.6/compat-wireless-2010-06-26-p.tar.bz2" 2.Unzip this package in terminal i.e navigate to place where you have downloaded this file , say desktop then type : cd Desktop for unzip type : tar -jxvf compat-wireless-2010-06-26-p.tar.bz2 3. Navigate into the uncompressed directory and type: i."make unload"  (only words within the quotes are the commands) ii."make load" Done!  now airmon-ng  should have the list of the required devices.

Intuitive Way of understanding voltage!

Formal definition in an Electromagnetic course tells us that it is "It is the amount of work done in bringing a unit positive charge from infinity to that point".(definition of potential,voltage is potential difference) So it is basically work , and it is particular form of work i.e of a unit charge carrying work. Well the problem with this is we encounter the notion of infinity here. So infinity is bit paradox in nature. Lets try to get idea of infinity by some metaphor. Lets assume you are ant , but a scientific research ant and ant community is as good as human community. All facilities are to the scale of ant community.The ant present in a garden and mapping of garden and discovering many things and phenomenon in garden is work of generations for ant. So they have no idea of earth, planets or solar system.They would be calling that world beyond this park is infinity, it means the measure is way beyond the potential to measure such thing. All the story gave a perspec

Why cross method of multiplication or vedic method of multiplication works?

It is evident the truth remains eternal even though you have many ways to reach it. With that quote .. So one perspective of the famous vedic method of multiplication can be broken down as follows: let there be two 2 digit numbers  , say       12     and  21   , so writing with their place values, we get (10+2)  and (20+1)  , so if we watch the operation we do in (a+b)(c+d)  is  ac+ad+bc+bd , the same holds good for any numbers. The application of  (a+b)^2 for square of a number is also a simplified version of the above notion. SO the cross multiplication method isn't that spooky , right?

Introduction to Computer Virus !

Computer virus is code in a host which has its source which is external. Its main intention is to gain resources in host which is not legitimate in normal case. There is a fancy expansion for VIRUS i.e Vital Information Retrieval Under  Siege. Mark Ludwig in his book titled “The Gaint Black Book of Computer Virus” expresses that all the virus can be broadly classified into three types. They are: i)Over writing ii)Companion iii)Parasitic. All the malicious code will exhibit either or all of the above mentioned basic behavior. To play with code ,especially virus it is really essential to get closer to the machine. In the sense, it is necessary to learn the assembly language(May be 8086). And this is it for intro!  Hope that I would find time to post further details in the upcoming posts.
The college Tech Club is Inaugurated tomorow . Facebook Page:     https://www.facebook.com/pages/Peopleware/815406885151112