vamshikrishnamraju.blogspot.com
Jadclipse 3.4.0 ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2012/06/jadclipse-340.html
Sunday, June 17, 2012. Jadclipse 3.4.0. Java Interview Questions part-6 ( Fundamentals of Java). Q1 What is the meaning of the return data type void? A An empty memory space is returned so that the developers can utilize it. B. Java Interview Questions part-5(IO streams). Q1 Given: import java.io.*; public class Forest implements Serializable { private Tree tree = new Tree(); pub. Path Traversal Attack or Dot-dot Slash. Java Interview Questions Part-8(AWT,Event Handling). Key logger in C#. Some ...
vamshikrishnamraju.blogspot.com
New Version of ByteCode Visualizer has released ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2012/06/new-version-of-bytecode-visualizer-has.html
Sunday, June 17, 2012. New Version of ByteCode Visualizer has released. Byte Code Visualizer released for eclipse. Read More on :-. Java Interview Questions part-6 ( Fundamentals of Java). Q1 What is the meaning of the return data type void? A An empty memory space is returned so that the developers can utilize it. B. Java Interview Questions part-5(IO streams). Q1 Given: import java.io.*; public class Forest implements Serializable { private Tree tree = new Tree(); pub. Key logger in C#. Some ...
vamshikrishnamraju.blogspot.com
Exploit writing-1 ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/04/exploit-writing-1.html
Monday, April 25, 2011. Hi guyzzz . Today we will be learning about the exploit writing . Before we move further i am assuming few things. 1)You understand the basic concept of the buffer overflows. 2)You know basic C/C and ASM knowledge. 3)Basic knowledge about the GDB. If you dnt know about anyone of the above assumptions , please learn them and come back. First of all let me write small c program. Int main ( int argc , char* argv[]). What is happening and why it is happening? How to bypass the SSP?
vamshikrishnamraju.blogspot.com
TOEFEL ESSAYS(Is it better to have few friends or many friends?) ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/11/toefel-essays.html
Tuesday, November 29, 2011. TOEFEL ESSAYS(Is it better to have few friends or many friends? Is it better to have few friends or many friends? Essay Score: 5.0/6.0. This essay has 293 words. I think I prefer to have many different friends because we can learn more from having many different types of friends. If we have just a few close friends, then we cannot learn as much as we can if we have many friends. Therefore, I think it is better to have many different friends. Finally, if we have many different ...
vamshikrishnamraju.blogspot.com
TOEFEL ESSAYS ( Should we ignore the past ??) ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/11/toefel-essays-should-we-ignore-past.html
Sunday, November 27, 2011. TOEFEL ESSAYS ( Should we ignore the past? Should we ignore the past? This essay was written by me (Erin) and has 593 words. Even though this essay is relatively long, I wrote it in under 20 minutes. Your essay should have 300 - 500 words. Estimated TOEFL Essay score: 6.0/6.0. So, in a very real sense, all learning depends on past events. Posted in: GRE AND TOEFL. Java Interview Questions part-6 ( Fundamentals of Java). Java Interview Questions part-5(IO streams). Q1 ...
vamshikrishnamraju.blogspot.com
Man-in-the-browser-attack ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/04/man-in-browser-attack.html
Tuesday, April 12, 2011. The Man-in-the-Browser attack is the same approach as Man-in-the-middle attack, but in this case a Trojan Horse is used to intercept and manipulate calls between the main application’s executable (ex: the browser) and its security mechanisms or libraries on-the-fly. The most common objective of this attack is to cause financial fraud by manipulating transactions of Internet Banking systems, even when other authentication factors are in use. Manipulation through DOM interface.
vamshikrishnamraju.blogspot.com
How to download videos from internet without any additional software's ?? ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/11/how-to-download-videos-from-internet.html
Thursday, November 24, 2011. How to download videos from internet without any additional software's? So you want to download your favorite videos from internet but your internet video downloading software is not working then what will you do? Hey don't worry i have a solution for that , you can download the videos from internet without using any additional software's! Using Firefox Addon's you can download the videos directly to your Computer. Step 1) For installing those addon's open your Firefox. A...
vamshikrishnamraju.blogspot.com
What is denail of service and brute force attack along with perventive measures ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2012/06/what-is-denail-of-service-and-brute.html
Sunday, June 17, 2012. What is denail of service and brute force attack along with perventive measures. Java Interview Questions part-6 ( Fundamentals of Java). Q1 What is the meaning of the return data type void? A An empty memory space is returned so that the developers can utilize it. B. Java Interview Questions part-5(IO streams). Q1 Given: import java.io.*; public class Forest implements Serializable { private Tree tree = new Tree(); pub. Path Traversal Attack or Dot-dot Slash. Key logger in C#.
vamshikrishnamraju.blogspot.com
TOEFEL ESSAYS (Is progress always a good thing?) ~ Latest Technology , Hacking & Information Secuirty
http://vamshikrishnamraju.blogspot.com/2011/11/toefel-essays-is-progress-always-good.html
Sunday, November 27, 2011. TOEFEL ESSAYS (Is progress always a good thing? Is progress always a good thing? Estimated score: 5.25/6.0:. Good ideas and good development and support, but needs smoother transitions and more even development. Some of the language and word choices are not quite right. The nobleness and the use of progress in any field, to an individual, or to the society on the whole, will depend on what use the progress is being put to, and I feel, cannot be generalized as stated above.