WEB DEVELOPMENT PROCESS AND STAGES OR STRATEGIES
CODE WITH CODING RIDERS
by Rohan Tyagi
3y ago
 The process of website development can be divided into following different Life Cycle steps: 1. Analysis :  - In this phase, all the information required for the web project is gathered. - Analysis of the requirement given by the customer is done by the group of programmers and designers. 2. Specification Building :  - In this phase, Software Requirement Specification (SRS) document is prepared. - In this document each and every element of the requirement is presented in detailed form. 3. Design and Development : - In design phase, the layouts and navigation will be design ..read more
Visit website
Hello cyber let clear cyber myth
CODE WITH CODING RIDERS
by mr_invisible
3y ago
                      Cyber Space and it's myths                                                                               Cyber space is like a space where demons do exists some are good and some are bad interesting thing is that Cyber Space has it's own conviction and nature it flows according to the nature of technology. Why Cyber Spac ..read more
Visit website
HiddenEye - The Kali Linux Phishing Tool
CODE WITH CODING RIDERS
by Rohan Tyagi
3y ago
 Hello Guys, Today we are going to discuss about how to do phishing in different social media accounts using Hidden Eye. So I am hoping that you have already installed Virtual Box and Kali if not then I will write some short steps. 1.     First we have to download Virtual Box from the Virtual Box Official site i.e. www.virtualbox.org 2.     Setup the virtual box by downloading Kali Linux ISO file from kali linux official website i.e. www.kali.org. 3.     Open virtual box and click on start button then it ..read more
Visit website
Mbr vs gpt
CODE WITH CODING RIDERS
by RITIK
3y ago
INFORMATION IS VERY SENSITIVE ⚠️TAKE IT SERIOUSLY?:-  Why partitions in the windows have a specific type and why are they necessary?Have you ever checked your c drive partition mode? i think sometimes its get's ? boring to study the stuff and go in details so let get it in easy way to cut the hole story and tell you the answers of what and why? so let us go and checkout the partition in your drive either it is mbr or Gpt ,so for that you have to run the terminal in an administrative mode and type DISKPART. Now here what you will see Now type list disk Now you see t ..read more
Visit website
DVWA SQL INJECTION
CODE WITH CODING RIDERS
by RITIK
3y ago
  SQL INJECTION USING DVWA:- ALERT:- WE don't promote the illegal hacking we uses the tools for the study purpose if you use this tool in a illegal manner do it at your own risk we can perform the SQL injection is the way that through which we can get the details of the  vulnerabilities of the sites and can also exploit the databases of the website the SQL injections can also be performed using different tools but this is one of the tools. step 1:- we need to change the directory.  cd /var/www/html/ Step 2:- we need to  clone the DVWA directory form the GitH ..read more
Visit website
Cyber Gyan
CODE WITH CODING RIDERS
by RITIK
3y ago
              Every thing doesn't Limits in Creating:- Today's changing worlds is having a great tech stack and most of the people in the development field in INDIA we have best developers of the worlds either it is in web development Application development  and more technologies. So for this we also need someone who can work on their security or ,i can say we want someone who can  investigate the vulnerabilities of the computer science. there are specific tools which can help one to become a best computer forensics investigator which can be ..read more
Visit website
BY RSS What is pointer in c? A p...
CODE WITH CODING RIDERS
by RITIK
4y ago
BY RSS What is pointer in c? A pointer is a variable whose value is the address of another variable, i.e., direct address of the memory location. Like any variable or constant, you must declare a pointer before using it to store any variable address. Why we use pointers? pointers are used to create dynamic data structures -- data structures built up from blocks of memory allocated from the heap at run-time.pointers are also used to handle variable parameters passed to functions. Pointers provides an alternative way to access information stored in arr ..read more
Visit website
Functions in C
CODE WITH CODING RIDERS
by Rohan Tyagi
4y ago
Today we are going to discuss about Functions... So firstly we will discuss What is Functions? A function is a group of statements that together perform a task.  Every C program has at least one function, which is main(), and all the most trivial programs can define additional functions. You can divide up your code into separate functions. How you divide up your code among different functions is up to you, but logically the division is such that each function performs a specific task. A function declaration tells the compiler about a function's name, return type, and parameters. A ..read more
Visit website
Storage class in C
CODE WITH CODING RIDERS
by Rohan Tyagi
4y ago
Today we are going to discuss about Storage classes in C... So firstly we will discuss about What is Storage Class? Storage Classes are used to describe the features of a variable/function. These features basically include the scope, visibility and life-time which help us to trace the existence of a particular variable during the runtime of a program. To fully define a variable one needs to mention not only its ‘type’ but also its ‘storage class’. In other words, not only do all variables have a data type, they also have a ‘storage class’. If we don’t specify the storage class of a vari ..read more
Visit website
C Preprocessor-I
CODE WITH CODING RIDERS
by Rohan Tyagi
4y ago
As we had discussed Macro Expansion in previous blog so now we will discuss the other directives- File Inclusion, Conditional Compilation and Miscellaneous Directives: File Inclusion This directive causes one file to be included in another. The preprocessor command for file inclusion looks like this: #include "filename" and it simply causes the entire contents of filename to be inserted into the source code at that point in the program. Of course this presumes that the file being included is existing.  Now the Question arises when and why this feature is used? So the answer is It ..read more
Visit website

Follow CODE WITH CODING RIDERS on FeedSpot

Continue with Google
Continue with Apple
OR