Top 10 Termux command 1) - cp - v ; used to prints informative massage 2) - cp -r ; used to copy any directory 3) - mv -u ; update-move when source is newer than destination 4) - mv -v ; to move any directory 5) - ls - n ; to display UID and GID directory 6) - ls --version ; to check the version of ls command 7) - cd -- ; show last working directory from where we moved 8) - ls -l ; show file action like - modified, date and time, owner of file, permissions Etc. 9) - ls help ; show display how to use "ls" command 10) - cp -n ; no file overwrite
if-else program in python code ; sub1 = int(input("enter your maths sub marks\n :")) sub2 = int(input("enter your sciance sub marks\n :")) sub3 = int(input("enter your gujarati sub marks\n :")) if (sub1>40): print("you are pass") else: print("you are a fail") if (sub2>40): print("you are pass") else: print("you are a fail") if (sub3>40): print("you are pass") else: print("you are a fail") print(sub1,sub2,sub3) OUT PUT ; enter your maths sub marks :65 enter your sciance sub marks :57 enter your gujarati sub marks :86 you are pass you are pass you are pass 65 57 86
If-else (program in python) Code : """ @author: Sanjay Sharma """ names=["Mom","Papa","Sis","Friends"] name=input("please enter your name\n") if name in names: print("you are important in my life") else: print("my heart is busy please try again") Out Put : please enter your name GF my heart is busy please try again
Chopper – Definition and Working Principle What is a Chopper? A chopper is a static device that converts fixed DC input voltage to a variable DC output voltage. It is basically a high speed ON/OFF semiconductor switch. It may be thought of as DC equivalent of an AC transformer since they behave in an identical manner. Chopper is fed through a constant DC voltage source and its output is variable DC voltage. The average value of output DC voltage may be less than or higher than the input DC voltage source. A simple diagram defining the chopper is shown below. A chopper is a DC equivalent to an AC transformer having continuously variable turn ratio. Like a transformer, a it can be used to step-up or step-down the fixed DC input voltage. On this basis, there are two types of chopper: Step-up and Step-down Chopper. A chopper whose average value of DC output voltage is more than the fixed DC input voltage is called Step-up Chopper. While, a chopper whose average value of DC output vol
TRIAC In this tutorial, we will learn about some of the basics of TRIAC. In the process, we will understand the structure, symbol, working, characteristics, applications of TRIAC. Introduction As we know that the SCR as a unidirectional device and has a reverse blocking characteristics that prevents the current flow in reverse biased condition. But for many applications, bidirectional control of current is required, particularly in AC circuits. To achieve this with SCRs, two SCRs must be connected in anti-parallel to control over both positive and negative half cycles of the input. However, this structure can be replaced by special semiconductor device known as a TRIAC to accomplish the bidirectional control. The TRIAC is a bidirectional switching device that can control the AC power efficiently and accurately. These are often used in motor speed controllers, AC circuits, pressure control systems, light dimmers and other AC control equipments. TRIAC Basics The triac is an important
Introduction The Silicon Controlled Rectifier (SCR) is the most important and mostly used member of the thyristor family. SCR can be used for different applications like rectification, regulation of power and inversion, etc. Like a diode, SCR is a unidirectional device that allows the current in one direction and opposes in another direction. SCR is a three terminal device; anode, cathode and gate as shown in figure. SCR has built in feature to turn ON or OFF and its switching is controlled by biasing conditions and gate input terminal. This results in varying the average power delivered at the load , by varying the ON periods of the SCR. It can handle several thousands of voltages and currents. SCR symbol and its terminals are shown in figure. Construction of Silicon Controlled Rectifier The SCR is a four layer and three terminal device. The four layers made of P and N layers, are arranged alternately such that they form three junctions J1, J2 and J3. These junctions are either allo
Maltego Website : https://www.paterva.com/web7/ Maltego is different in that it works within a digital forensic sphere. Maltego is a platform that was designed to deliver an overall cyber threat picture to the enterprise or local environment in which an organization operates. One of the awesome things about Maltego which likely makes it so popular (and included in the Kali Linux Top Ten) is its's unique perspective in offering both network and resource based entities is the aggregation of information sourced throughout the web.
Netsparker Website : https://www.netsparker.com/web-vulnerability-scanner/ Netsparker is the only False positive free web application security scanner. Simply point it at your website and it will automatically discover the flaws that could leave you dangerously exposed.
Tor Website : https://www.torproject.org/ Tor is free software and an open network that helps you defend against traffic analysis, a from of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.
1) : Cyber Forensics Table of Contents 1. Networks and Network Security 2. Introduction to Cybercrime 3. Classification of Cybercrime 4. Cybercrime the Present and the Future 5. Introduction to Cyber Forensics 6. Digital Evidence 7. Cyber Forensics the Present and the Future 8. Acquisition and Handling of Digital Evidence 9. Analysis of Digital Evidence 10. Admissibility of Digital Evidence 11. Cybercrime Case Studies 12. Introduction to Cyber Laws 13. Cyber Laws in India and Case Studies 14. International Cyber Laws and Case Studies. Link: https://amzn.to/3vLZvxR 2) : Digital Forensic This book is for those who desire to learn more about investigating and fighting digital crimes. It covers latest challenges faced in digital forensic like email forensic, mobile forensic and cloud forensic. It also sequentially explains disk forensic, network forensic, memory forensic, mobile forensic and cloud forensic. The lucid content of the book and the questions provided in each chapter help th
Numpy Maths Function (IN PYTHON) #Nummpy Maths functions #Mean import numpy as np n1=np.array([10,20,30,40,50,60]) np.mean(n1) Out Put : 35.0 #Median import numpy as np n1=np.array([11,44,5,96,67,85]) np.median(n1) OUT PUT : 55.5 #standard Deviation import numpy as np n1=np.array([1,5,3,100,4,48]) np.std(n1) OUT PUT : 36.59424666377065
Metasploit website : https://www.metasploit.com Metasploit is most popular and powerful Exploit development, testing and deployment framework which is widely adapted and used by the security researcher and hacker. it is available open source and for all the major operating systems i.e. windows, Linux based and os x. It is mostly used penetration testing software. Metasploit is capable of Web application vulnerability assessment, social engineering attacks, password auditing, mobile platform exploitation and other smart exploitations. It is written with Ruby on Rails and is developed in such a way to make the process of writing and exploitation payloads as simple as possible
Best Programming Language for Hacking 1. Python The de-facto language for hacking programming, Python is heralded as the best programming language for hacking – and for good reasons so. Ethical hackers often use this dynamic programming language for scripting their on-demand hacking programs on the go. From testing the integrity of corporate servers to automating most of your hacking programs, Python lets you do almost anything if used the right way. Highlights of this hacking coding language The interpreted nature of Python allows it to run without the need for compilation. An easy-to-read language that’s helpful for beginning ethical hackers. Has a massive community that wields useful 3rd-party plugins/library every day. One of the best programming language for hacking into web servers. Makes it fairly easy to write automation scripts. Python lets you do a fast reconnaissance of the target network and makes prototyping much faster. 2. SQL SQL stands for Structured Query Language
Top 5 best Ethical hacking book for beginners 1) : Hacking for Beginners: Learn Practical Hacking Skills! All About Computer Hacking, Ethical Hacking, Black Hat, Penetration Testing, And Much More! (Hacking, ... Hacking, Tor Browser, Penetration Testing) Kindle Edition by Cooper Alvin LINK : https://amzn.to/3cuS3xV 2) : Computer Hacking Beginners Guide: How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack Kindle Edition by Alan T. Norman (Author) Format: Kindle Edition LINK : https://amzn.to/3bK4lUk 3) : Hacking: A Beginners’ Guide to Computer Hacking, Basic Security, Ethical Hacking and Penetration Testing Kindle Edition by John Slavio (Author) Fo rmat: Kindle Edition LINK : https://amzn.to/3vnzwwc 4) : Hacking For Beginners: The complete and practical guide to mastering the art of computer hacking, wireless networks, computer programming and cyber security Kindle Edition by Allan Williams (Author)