Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Ajay yadav
Page 4 of 4
How to Bypass YouTube ADs
Sometimes the random ads are irritating in YouTube video. I am showing how you can bypass YouTube Ads by using a simple trick.What to do?Open your browser.Visit YouTube.com URL.When you visit your favorite video on YouTube, on address bar, you need to add a dot [.]Done.POC ExampleWhen you visit a YouTube video, Url looks like YouTube.com/xyz, and here you will need to add youtube.com./xyz in URL.https://www.youtube.com/watch?v=xyz (Showing ADs)https://www.youtube.com./watch?v=xyz (Not Show ADs)Note - It will work on the desktop. For mobile browser, you need to use a desktop version of the video page.How does it worksIt's a commonly forgotten edge case, ...
Read MoreAndroid Debug Bridge Mode
Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The ADB is typical, used to communicate with a smartphone, tablet, smartwatch, set-top box, or any other device that can run the Android operating system. We can do things on an Android device that may not be suitable for everyday use, like, install apps outside of the Play Store, debug apps, access hidden features, and bring up a UNIX shell, etc. For security reasons, Developer Options need to be unlocked and you need to have USB Debugging Mode enabled as well. Not only that, ...
Read MoreHow to Secure ZOOM application
This article poses a common advisory and security measure note for the Zoom users to protect themself from presumptive hacking attempt, as this application is quite vulnerable to breach. Zoom is quite trending and its popularity mysteriously skyrocket in last 3 month in terms of downloads (20 CR) despite having other plethora of amazing video conferencing application. Zoom does not have the End-to-end encryption facility like whatsapp and WebEx and attackers can potentially gain control to the ZOOM without its user’s cognizance by mean of a secret tools called zWarDial.However, I am not going to discuss the usage of this ...
Read MoreBypass Anti-virus using Veil Framework
This article is intended to demonstrate, how to bypass the anti-virus detection using the Veil framework, as it is a collection of tools designed for use during penetration testing. It currently consists of the following modules −Veil-Evasion − a tool to generate antivirus-evading payloads using a variety of techniques and languagesVeil-Catapult − a psexec-style payload delivery system that integrates Veil-EvasionVeil-PowerView − a powershell tool to gain network situational awareness on Windows domainsVeil-Pillage − a modular post-exploitation framework that integrates Veil-EvasionRequirementsTo install the Veil- Framework, you are supposed to configure the latest Python packages into your machine.How to InstallThe important point ...
Read MoreSatellite Tracking
This article showcases the real − time satellite tracking and orbit prediction program for both the Linux and desktop using gpredict software. We can run in real-time, simulated real-time (fast forward and backward), and manual time control with this tool.Core features of GpredictTracking of a large number of satellites moving across the globe.Display the tracking data in lists, maps, polar plots and any combination of these.We can predict upcoming passes with the base stationDetailed information both the real-time and non-real time modesDoppler tuning of radios via Hamlib rigctldAntenna rotator control via Hamlib rotctldPrerequisiteThe satellite tracking software gpredict requires the following ...
Read MoreRemove vowels from a String in C++
The following C++ program illustrates how to remove the vowels (a, e, i, u, o) from a given string. In this context, we create a new string and process input string character by character, and if a vowel is found it is excluded in the new string, otherwise the character is added to the new string after the string ends we copy the new string into the original string. The algorithm is as follows;AlgorithmSTART Step-1: Input the string Step-3: Check vowel presence, if found return TRUE Step-4: Copy it to another array Step-5: Increment the counter ...
Read MoreReplacing words with asterisks in C++
This aim of this program to replace a particular word with asterisks in the string by using the c++ programming code. The essential function of vector and string class essay a key role to achieve the prospective results. The algorithm is as follows;AlgorithmSTART Step-1: Input string Step-2 Split the string into words and store in array list Step-3: Iterate the loop till the length and put the asterisk into a variable Step-4: Traverse the array foreah loop and compare the string with the replaced word Step-5: Print ENDNow, the following code is carved out based ...
Read MoreWrite a program for Happy Woman's Day in c++
The woman day which is celebrated on 7th October worldwide is carved into a c++ programming code as following;Example#include using namespace std; int main(){ // Initializing size of // design int n = 5; // Loop to print Circle // (Upper part of design) // Outer loop to // control height of // design for (int i = 0; i
Read More