Substitution cipher Programm in Java.

import java.util.*;
class Cipher
    public static final String str="abcdefghijklmnopqrstuvwxyz";
    public static String encrypt(String plaint,int key)
        String ciphert="";
        for(int i=0;i<plaint.length();i++)

By Hemdeep   Gamit  in Latest Technologies  on 8/25/2017 4:14:25 AM   Read more...

Batch programm to delete a file menually.

@echo off
color a
mode 100
set /p id=enter ID:
echo %id%
set /p sfile=Select the folder!
cd %sfile%
set /p dfile=Select the file which you wan''t to delete!
del /f %dfile%
echo %dfile%
echo "This is bat file"

By Hemdeep   Gamit  in Latest Technologies  on 6/25/2017 4:07:58 AM   Read more...

Steganography using cmd.

Type the following command in cmd.

copy /b image1.jpg+txtfile1.txt image2.jpg

To read the content behind the image type the following command.

copy /b image2.jpg txtfile2.txt

By Hemdeep   Gamit  in Latest Technologies  on 6/25/2017 4:04:03 AM   Read more...




The Java Ring is a stainless-steel ring, 16-millimeters (0.6 inches) in diameter

that houses a 1-million-transistor processor, called an iButt...............

By sharukh   multani  in Seminar Document  on 5/31/2017 3:59:33 AM   Read more...

How to control wifi using android.



You have to root your android device.

This app can''''t crack a wifi password it just control the wifi. So you need to enter into the wifi network then you may able to run this app.



Now download the app wifikill.apk from the internet. This app is not available on play store so you need to download from third parties



By Hemdeep   Gamit  in Latest Technologies  on 9/16/2016 1:48:03 AM   Read more...

How to make bootable pendrive using cmd.

First off all you have to run cmd as administrator mode.

Now insert your pendrive into your machine.

And type the following commands.




List disk              <- This command shows the portable storage device.



By Hemdeep   Gamit  in Latest Technologies  on 1/21/2016 9:07:53 PM   Read more...

Explain  Firewall ?


    There is a danger information leaking out or danger information leaking in particular viruses can bridge security destroy
valuable data and waste large amount of administrators time trying to clean up.

    consequently , mechanism are needed to keep good bits in and bad  bi...............

By Roshni   Sikligar  in Networking  on 10/5/2015 2:33:55 AM   Read more...

How to make an trojan horse virus to shutdown windows.


First of all right click on desktop -> New->shortcut

After that you can see the dialog box as given below.






In this dialog box type this text  (“Shutdown  –s  –t  5 –c  “Any comment”)


After that click on next button and this will...............

By Hemdeep   Gamit  in Latest Technologies  on 10/4/2015 9:57:30 PM   Read more...
First    Previous   Next   Last
Page 1 of 20