This example demonstrates how to use AlarmManager in Android.Step 1 − Create a new project in Android Studio, go to File ⇒ New Project and fill all required details to create a new project.Step 2 − Add the following code to res/layout/activity_main.xml. Step 3 − Add the following code to src/MainActivity.ktimport android.app.AlarmManager import android.app.PendingIntent import android.content.BroadcastReceiver import android.content.Context import android.content.Intent import android.os.Build import android.os.Bundle import android.util.Log import android.widget.Button import android.widget.TimePicker import android.widget.Toast import androidx.appcompat.app.AppCompatActivity import java.util.* class MainActivity : AppCompatActivity() { lateinit var btnSetAlarm: Button lateinit var timePicker: TimePicker override fun ... Read More
The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create malicious QR codes to target vulnerable devices. QR code attacks are potent because humans can't read or understand the information contained in a QR code without scanning it, potentially exposing any device used to attempt to decipher the code to the exploit contained within. A human can't spot a malicious ... Read More
SolutionThe solution is explained below −Using the annuity tableRate for 4% for 10 years will be 0.130Annual depreciation charge = 200000 * 0.130 => 26000 Lease accountDebit sideCredit sideYearYear1To cashTo interest20000080001920001By DepreciationBy Balance c/d260001660001920002To balance b/dTo interest16600066401593602To DepreciationTo balance c/d260001333601593603To balance b/dTo interest13336053341280263To DepreciationTo balance c/d260001020261280264To balance b/dTo interest1020264081979454To DepreciationTo balance c/d2600071945979455To balance b/dTo interest719452878690675To DepreciationTo balance c/d2600043067690676To balance b/d43067Year 1Debit side: Cash – interest => 200000 – (200000*4%) => 200000 – 8000 => 192000Credit side: 192000 – Depreciation amount => 192000 – 26000 => 166000Year 2Debit side: balance – interest ... Read More
AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through this we can...find vulnerability in Appcheck the codeDangerous shell commandcollect information of appRequirementsBasic knowledge of LinuxApp which you testKali Linux MachineNow clone the Androbug – Framework. This framework is android vulnerability scanner tool; This tool is help-full for hacker and android penetration tester.git clone https://github.com/AndroBugs/AndroBugs_Frameworkgitcd AndroBugs_Frameworkpython androbugs.py -f /root/Desktop/Secure.apk -o ... Read More
BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT or Command & Control server from scratch.FeaturesNothing Written To The Disk − clients never write anything to the disk - not even temporary files because remote imports allow arbitrary code ... Read More
Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a YouTube video, Url looks like YouTube.com/xyz, and here you will need to add youtube.com./xyz in URL.https://www.youtube.com/watch?v=xyz (Showing ADs)https://www.youtube.com./watch?v=xyz (Not Show ADs)Note - It will work on the desktop. For mobile browser, you need to use a desktop version of the video page.How does it worksIt's a commonly forgotten edge case, ... Read More
It is imperative to fully cover your tracks you made on the systems during assault. This tool is designed for pen testing "covering tracks" phase, before exiting the infected server. Or, permanently disable system logs for post-exploitation.This tool allows you to clear log files such as −/var/log/messages # General message and system related stuff/var/log/auth.log # Authenication logs/var/log/kern.log # Kernel logs/var/log/cron.log # Crond logs/var/log/maillog # Mail server logs/var/log/boot.log # System boot log/var/log/mysqld.log # MySQL database server log file/var/log/qmail # Qmail log directory/var/log/httpd # Apache access and error logs directory/var/log/lighttpd # Lighttpd access and error logs directory/var/log/secure # Authentication log/var/log/utmp # Login ... Read More
Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that may not be suitable for everyday use, like, install apps outside of the Play Store, debug apps, access hidden features, and bring up a UNIX shell, etc. For security reasons, Developer Options need to be unlocked and you need to have USB Debugging Mode enabled as well. Not only that, ... Read More
Company finances its assets by capital structure. It can finance its assets by either only equity or combination of debt and equity.Modigliani and miller proposed a theory in 1950s, which says, valuation of a company is irrelevant to its capital structure. It is also irrelevant, to whether company is highly leveraged or low debt because of its market value. It depends only on operating profits of company. This theory is also called as capital structure irrelevance principle.Modigliani and miller approach states the valuation of company is irrelevant to its capital structure. Let us say, Company X is financed by equity ... Read More
Return on investment Operating leverage Financial leverage Combined leverageRs.Sales (S)1000000Variable cost (VC)375000Fixed cost (FC)95000Debt425000Interest on debt10%Equity capital590000SolutionThe solution is given below −return on investment = EBIT/ (D + E) return on investment = (S – VC – FC)/ (D + E) return on investment = (1000000 – 375000 – 95000)/ (425000 + 590000) return on investment = 530000/ 1015000 return on investment = 52.22%operating leverage (OL) = (S – VC)/ EBIT operating leverage = (1000000 – 375000)/ 530000 operating leverage = 625000/ 530000 operating leverage = 1.18financial leverage (FL) =EBIT/ EBT financial leverage = 530000/ (EBIT – I) financial leverage = 530000/ (530000 ... Read More
Data Structure
Networking
RDBMS
Operating System
Java
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP