Ajay yadav

Ajay yadav

38 Articles Published

Articles by Ajay yadav

Page 3 of 4

Printing Pyramid in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 498 Views

This article yields a “pyramid-like structure” as an output using the C++ programming code. In which the pyramid height and space are being determined by traversing double for loop constructs as following;Example#include using namespace std; int main() {    int space, rows=6;    for(int i = 1, k = 0; i

Read More

Printing Different pattern Bash in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 438 Views

This article is intended to print a half-pyramid pattern bash using the C++ programming language. In the view of the stipulated pattern to be printed, the following algorithm is being orchestrated to achieve our goal as;AlgorithmStep-1 Set the length of the Bash (Height) Step-2 Outer loop to handle the number of rows Step-3 Inner loop to handle columns Step-4 Print the pattern with the character (@) Step-5 Set the pointer to a new line after each row (outside the inner loop) Step-6 Repeat the loop till the Bash HeightExampleSo, the following C++ source code is ultimately carved out by complying ...

Read More

Toggle all characters in the string in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 995 Views

This program translates the characters of a string into uppercase. However, this task can be easily achieved by using the toUpper() method of the c++ class library. But in this program, we perform this by calculating the ASCII value of characters in uppercase. The Algorithm is as follows;AlgorithmSTART    Step-1: Declare the array of char    Step-2: Check ASCII value of uppercase characters which must grater than A and lesser than Z    Step-3: Check ASCII value of lower characters which must grater than A and lesser than Z ENDThe toggleChar() method gets the array of characters as an input. ...

Read More

Swap Upper diagonal with Lower in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 394 Views

This tutorial is designed to swap the upper row of a three-diagonal array to its lower one using c++ code. Moreover, if a three-diagonal array is an input, the coveted results must be something like that as;For this, the course of action is briefed in the algorithm as follows;AlgorithmStep-1: Input a diagonal array Step-2: Pass it to Swap() method Step-3: Traverse the outer loop till 3 Step-4: increment j= i+ 1 in the inner loop till 3 Step-5: put the array value in a temp variable Step-6: interchange the value arr[i][j]= arr[j][i] Step-7: put the temp data to arr[j][i] Step-8: ...

Read More

Sqrt, sqrtl, and sqrtf in C++ programming

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 381 Views

Math ClassThis article demonstrates the usage of math class essentials functions sqrt(), sqrtl(), and sqrtf() to calculate the square root of double, long, and float type variables with precision respectively. The Math class of C++ offers a wide range of functions to calculate mathematical calculations including sin, cos, square root, ceil, floor, etc..It is, therefore, mandatory to import the definition of header class library in the program in order to avail all calculative methods.Sqrt MethodThe double sqrtl () method of the Math class returns the square root of a double variable with precision. The syntax of this function is ...

Read More

Replacing space with a hyphen in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 2K+ Views

In this C++ program, the space in the string will be replaced with the hyphen. Firstly, the length of the string is determined by the length() function of the cstring class, then hyphen is filled into the space of the sentence by traversing the string as follows.Example#include #include using namespace std; int main(){    // raw string declaration    string str = "Coding in C++ programming";    cout

Read More

Validate IP Address in C++

Ajay yadav
Ajay yadav
Updated on 11-Mar-2026 3K+ Views

This article is serving the purpose of validating the correct IP (internet protocol) address by virtue of C++ code programming. The IP address is a 32-bit dot-decimal-notation, broken into four decimal numbers segments ranging from 0 to 255. Furthermore, these numbers are separated by dots consecutively. The IP address serves the purpose of identifying a host machine in the network in a unique manner in order to establish a connection among them.So, in order to validate the correct IP address input from the user-end, the following algorithm briefs how exactly the code sequence is materialized to identify the correct IP ...

Read More

Malicious QR Code with QRGen

Ajay yadav
Ajay yadav
Updated on 29-Sep-2020 1K+ Views

The QR codes are machine-readable data formats used for anything that needs to be scanned automatically. It is possible to exploit the common vulnerabilities using exploits packed into custom QR codes as it is everywhere, from product packaging to airline boarding passes, etc. Hacker used a tool QRGen that create malicious QR codes to target vulnerable devices. QR code attacks are potent because humans can't read or understand the information contained in a QR code without scanning it, potentially exposing any device used to attempt to decipher the code to the exploit contained within. A human can't spot a malicious ...

Read More

Android app Vulnerability Scanner

Ajay yadav
Ajay yadav
Updated on 29-Sep-2020 1K+ Views

AndroBugs Framework is an Android vulnerability analysis system that helps developers or hackers find potential security vulnerabilities in Android applications. We share our personal data through mobile apps if they are not secure its mean we not secured, let start Find vulnerability of android Mobile App - App security. Through this we can...find vulnerability in Appcheck the codeDangerous shell commandcollect information of appRequirementsBasic knowledge of LinuxApp which you testKali Linux MachineNow clone the Androbug – Framework. This framework is android vulnerability scanner tool; This tool is help-full for hacker and android penetration tester.git clone https://github.com/AndroBugs/AndroBugs_Frameworkgitcd AndroBugs_Frameworkpython androbugs.py -f /root/Desktop/Secure.apk -o ...

Read More

Build Your Own Botnet

Ajay yadav
Ajay yadav
Updated on 29-Sep-2020 9K+ Views

BYOB provides a framework for security researchers and developers to build and operate a basic botnet to deepen their understanding of the sophisticated malware that infects millions of devices every year and spawns modern botnets, in order to improve their ability to develop counter-measures against these threats. It is designed to allow developers to easily implement their own code and add cool new features without having to write a RAT or Command & Control server from scratch.FeaturesNothing Written To The Disk − clients never write anything to the disk - not even temporary files because remote imports allow arbitrary code ...

Read More
Showing 21–30 of 38 articles
Advertisements