Sunday, 19 October 2014

Today I am going to Show a Simple Calculator using VB.Net .

Write a program to develop a calculator using select case.

 *(Select case work Same as Switch case)


Module Module1

    Sub Main()
        Dim a, b, c, ch As Integer        // Declaration a,b,c,ch variable Integer type 
                  
        Console.WriteLine("Enter the two numbers")

        a = Integer.Parse(Console.ReadLine())      //Taking first number from user
        b = Integer.Parse(Console.ReadLine())     //Taking second number from user

        Console.WriteLine("CALCULATOR")                     /*        Showing output To User  
        Console.WriteLine("1.ADDITION")
        Console.WriteLine("2.SUBTRACTION")
        Console.WriteLine("3.MULTIPLICATION")
        Console.WriteLine("4.DIVISION")
        Console.WriteLine("Enter your choice(1-4)")                             */
      
        ch = Integer.Parse(Console.ReadLine())        //Taking value from user to select an option 
        Select Case ch                                                 //select case work same as Switch
            
            Case 1
                c = a + b
                Console.WriteLine("Addition of {0} and {1} is {2}", a, b, c)
            Case 2
                c = a - b
                Console.WriteLine("subtraction of {0} and {1} is {2}", a, b, c)
            Case 3
                c = a * b
                Console.WriteLine("Multiplication of {0} and {1} is {2}", a, b, c)
            Case 4
                Console.WriteLine("division of {0} and {1} is {2}", a, b, c)   /*{0},{1},{2} defines the                                                                                                                            position of variable here {0}                                                                                                                       points 'a' , {1} points 'b' and                                                                                                                                          {3} points 'c' */
            Case Else
                Console.WriteLine("INVALID CHOICE")
        End Select
        Console.Read()
    End Sub

End Module


**WHOLE PROGRAM IN VB.NET DOES'T CONTAIN TERMINATOR ";" 


Output



Friday, 13 June 2014

HACKERS DICTIONARY

ACRONYMS OF HACKING WORLD


  • SQL > Structured Query Language. It usually goes along with a word  after it , such as "SQL Injection

  • FUD> Fully Undetectable.

  • Nix>unix based operating system, usually referred to here when referring to DoS'ing.
  • VPN > Vistual Private Network.
  • DDoS>Distributed Denial of Service.
  • skid>Script kid/Script Kiddle.
  • Malware > Malicious Software.

  • XSS(CSS)> Cross Site Scripting.
  • FTP > File Transport Protocol. Used for transfering files over an FTP server.
  • SSH >Secured Shell , used to connect to Virtual Private Server.
  • HTTP > Hyper Text Transfer Protocol. The foundation of data communication for the world wide web.
  • SE > Social Engineering .
  • VPS > Virtual Private Server.
  • DrDoS > Distributed Reflection Denial of Service Attack ,uses a list of refelection  servers or other methods such as DNS  to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

  • R.A.T > Remote Administration Tool.remote administration tool (a RAT) is a piece of software that allows a remote "operator" to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses,






































WORDS

FUD  >  It stand for software that cannot be detected by anti-viruses when a scan is performed. The term is used in hacker circles to refer to something that appears to be clean to many anti-viruses, even though it is a hacking tool. FUD is also a more commonly used acronym for "Fear, Uncertainty and Doubt".



 LOIC   > LOIC performs a denial-of-service (DoS) attack (or when used by multiple individuals, a DDoS attack) on a target site by flooding the server with TCP or UDP packets with the intention of disrupting the service of a particular host. People have used LOIC to join voluntary botnets.


TROJAN  >  In computing is a generally non-self-replicating type of malware program containing malicious code that, when executed, carries out actions determined by the nature of the Trojan, typically causing loss or theft of data, and possible system harm.

A Trojan often acts as a backdoor, contacting a controller which can then have unauthorized access to the affected computer

ROOT  >  Highest permission level on a computer , able to modify anything on a system without any restriction.

BOTNET > Computer infected by worms and trojan and taken over by hacker and brought into network to send spam, more viruses , or launch denial of service attack.


WAZER > Software privacy.


SQL Injection > An SQL injection is a method often used to hack SQL database via a website , and  gain admin control on the site.

IP Grabber > A link that grabs someone's IP when they visit it. 

Thursday, 27 March 2014

Why Hackers Hack?

 

The main reason why Hackers hack is because they can hack. Hacking is a casual hobby for some Hackers — they just hack to see what they can hack and what they can’t hack, usually by testing their own systems. Many Hackers are the guys who get kicked out of corporate and government IT and security organizations. They try to bring down the status of the organization by attacking or stealing information.

  •  The knowledge that malicious Hackers gain and the ego that comes with that knowledge is like an addiction.Some Hackers want to make your life miserable, and others simply want to be famous. Some common motives of malicious Hackers are revenge, curiosity, boredom, challenge, theft for financial gain, blackmail, extortion, and corporate work pressure.



  • Many Hackers say they do not hack to harm or profit through their bad activities, which helps them justify their work. They often do not look for money full of pocket. Just proving a point is often a good enough reward for them.

Prevention from Hackers

What can be done to prevent Hackers from finding new holes in software and exploiting them?


  •  Information security research teams exist—to try to find these holes and notify vendors before they are exploited. There is a beneficial competition occurring between the Hackers securing systems and the Hackers breaking into those systems. This competition provides us with better and stronger security, as well as more complex and sophisticated attack techniques.

  •  Defending Hackers create Detection Systems to track attacking Hackers, while the attacking Hackers develop bypassing techniques, which are eventually resulted in bigger and better detecting and tracking systems. The net result of this interaction is positive, as it produces smarter people, improved security, more stable software,inventive problem-solving techniques, and even a new economy.
 Now when you need protection from Hackers, whom you want to call, “The Ethical Hackers”. 


An Ethical Hacker possesses the skills, mindset, and tools of a Hacker but is also trustworthy. Ethical Hackers perform the hacks as security tests computer systems.

  •  Ethical Hacking — also known as Penetration Testing or White-Hat Hacking —involves the same Tools, Tricks and Techniques that Hackers use, but with one major difference: Ethical hacking is Legal.

  •  Ethical hacking is performed with the target’s permission. The intent of Ethical Hacking is to discover vulnerabilities from a Hacker’s viewpoint so systems can be better secured. Ethical Hacking is part of an overall information Risk Management program that allows for ongoing security improvements. Ethical hacking can also ensure that vendors’ claims about the security of their products are legitimate.

  •  As Hackers expand their knowledge, so should you. You must think like them to protect your systems from them.You, as the ethical Hacker, must know activities Hackers carry out and how to stop their efforts. You should know what to look for and how to use that information to thwart Hackers’ efforts.

You don’t have to protect your systems from everything. You can’t.

The only protection against everything is to unplug your computer systems and lock them away so no one can touch them—not even you.




  •  That’s not the best approach to information security. What’s important is to protect your systems from knownVulnerabilities and common Hacker attacks.
  •  It’s impossible to overcome all possible vulnerabilities of your systems. You can’t plan for all possible attacks —

especially the ones that are currently unknown which are called Zero Day Exploits. These are the attacks which
are not known to the world. However in Ethical Hacking, the more combinations you try — the more you test
whole systems instead of individual units — the better your chances of discovering vulnerabilities.