Shubh Kotwal

Phots

Blog

view:  full / summary

lazy_coding

Posted by [email protected] on July 7, 2017 at 6:45 AM Comments comments (0)

#!/bin/bash

 

 

######Colors#######

NONE='\033[00m'

RED='\033[01;31m'

GREEN='\033[01;32m'

YELLOW='\033[01;33m'

PURPLE='\033[01;35m'

CYAN='\033[01;36m'

WHITE='\033[01;37m'

BOLD='\033[1m'

UNDERLINE='033[4m'

 

 

clear

echo

echo

echo

echo -e ${YELLOW}" Welcome To My Official Code Generator and Compiler ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo

echo

echo -e ${CYAN}" 1.Edit Codes"

echo -e ${PURPLE}" 2.Create , Edit or Compile C Codes"

echo -e ${NONE}" 3.Create SQL Code"

echo -e ${RED}" 4.Compile C Code"

echo -e ${YELLOW}" 5.Show Files in Current Directory"

echo -e ${WHITE}" 6.EXIT"

echo -e ${GREEN}

read -p "Please Choose Any Option:" n

case $n in

1) clear

echo

echo

echo

echo -e ${YELLOW}" Codes Edit Mode ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo

echo -e ${CYAN}

 

read -p " Please Enter File Name:" a

nano $a

shubham

;;

2) clear

echo

echo

echo

echo -e ${YELLOW}" Create and Compile C Codes ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo

echo -e ${GREEN}

read -p " Please Choose a Name:" v

nano $v

echo

echo -e ${CYAN}

read -p " Press Enter To Compile...."

clear

echo

echo

echo

echo -e ${YELLOW}" Compiled Result ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo

 

echo

echo -e ${PURPLE}

gcc $v

./a.out

echo

echo -e ${RED}

read -p " Press Enter To Continue...."

shubham

;;

3) sudo -i -u postgres

srv001

psql

\c database shubh

shubham

;;

4) clear

echo

echo

echo

echo -e ${YELLOW}" Compile C Codes ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo -e ${PURPLE}

echo

echo -e ${GREEN}

read -p " Please Choose a Name:" l

echo

echo -e ${CYAN}

read -p " Press Enter To Compile...."

clear

echo

echo

echo

echo -e ${YELLOW}" Compiled Result ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo

 

echo

echo -e ${PURPLE}

gcc $l

./a.out

echo

echo -e ${RED}

read -p " Press Enter To Continue...."

shubham

;;

5) clear

echo

echo

echo

echo -e ${YELLOW}" Files Present in the Directory ${GREEN}.......by Shubh Kotwal"

echo -e ${RED}"______________________________________________________________________________________________________________________________________________________"

echo -e ${WHITE}" Time :"

date +%r

echo -e ${PURPLE}

 

ls

echo

echo

echo -e ${GREEN}

read -p " Press Enter To continue:"

shubham

;;

6) clear

echo -e ${RED}" *************************************************************************************************************************************

${CYAN}THANK YOU SO MUCH

${RED}*************************************************************************************************************************************"

echo

echo

echo

echo

echo

echo

sleep 3

;;

*) clear

echo

echo

echo -e ${GREEN}" *****${RED}Invalid option${GREEN}*****"

echo

echo

echo -e ${YELLOW}" Hit Enter To Continue"

echo

read xyz

shubh

;;

esac

sql

Posted by [email protected] on April 9, 2017 at 12:35 AM Comments comments (0)

Create Table example:

create table student(sno int primary key, name varchar(30),status char,birthdate date,salary money,pno int references project(pno)on delete cascade on update cascade);

 


Insert Into Table:

insert into studenht values(1,'shubham','I');

 


Select Examples:

select ename from employee,department where dname='finance' and city='Pune' and department.dno=employee.dno;

 


Update Example:

update student set class='SYBCS' where rno=3;

 


Delete Examples:

delete from project where pname='soft computing';

//for delete whole data :

delete from student;

 


Add New Column:

alter table tablename add colum_name datatype;

 


Drop Column:

alter table project drop remark;

 


Change Datatype:

alter table table_name alter column_name type new_datatype;

 


Rename Column:

alter table table_name rename oldcolumn_name to newcolumn_name;

 


Rename Table:

alter table table_name rename to newtable_name;

 


Add Constraint:

alter table table_name add contraint constraint_name unique(column_name);

 


Drop a Table:

drop table table_name;

 

10 Useful Windows Commands You Should Know

Posted by [email protected] on February 3, 2017 at 11:15 PM Comments comments (0)

ipconfig Quickly Find Your IP Address

You can find your IP address from the Control Panel, but this takes quite a few clicks. The ipconfig command is a fast way of determining your computer’s IP address and other information, such as the address of its default gateway — useful if you want to know the IP address of your router’s web interface.

 

To use the command, just type ipconfig into a Command Prompt window. You’ll see a list of all the network connections your computer is using. Look under Wireless LAN adapter if you’re connected to Wi-Fi or Ethernet adapter Local Area Connection if you’re connected to a wired network


 

ipconfig /flushdnsFlush Your DNS Resolver Cache

If you change your DNS server, the effects won’t necessarily take place immediately. Windows uses a cache that remembers DNS responses it’s received, saving time when you access the same addresses again in the future.

 

To ensure Windows is getting addresses from the new DNS servers instead of using old, cached entries, run the ipconfig /flushdns command after changing your DNS server.


ping, tracertTroubleshoot Network Connection Issues

If you’re experiencing issues connecting to a website or other network connection issues, Windows and other operating systems have some standard tools you can use to identify problems.

 

First, there’s the ping command. Type ping google.com and Windows will send packets to Google.com. Google will respond and let you know it’s received them. You’ll be able to see if any packets didn’t make it to Google.com — perhaps you’re experiencing packet loss — and how long it took you to hear back — perhaps the network is saturated and packets are taking a while to reach their destinations.

There’s also the tracert command, which traces the route it takes for a packet to reach a destination. For example, run tracert google.com and you’ll see the path your packet takes to reach Google. If you’re having issues connecting to a website, tracert can show you where the problem is occurring.

 

shutdownCreate Shutdown Shortcuts on Windows 8

The shutdown command is particularly useful on Windows 8. You can use it to create your own shortcuts and place them on your Start screen or desktop, allowing you to more easily shut down Windows without digging through the charms bar or logging out first.

This command can also be used to restart your computer. On Windows 8, you can even use a special switch to restart your computer into the advanced startup options menu.

 

Shut Down: shutdown /s /t 0

Restart: shutdown /r /t 0

Restart Into Startup Options: shutdown /r /o

 

recimg Create Custom Recovery Images

The Refresh Your PC feature on Windows 8 allows you to restore your computer’s system state to its original state — either from a clean Windows install or as the computer came from its manufacturer. You can create your own custom recovery images, but this feature is hidden — you have to do it with the recimg command from a command line. This allows you to remove manufacturer-installed bloatware or add your favorite desktop programs to your recovery image.

 

wbadmin start backupCreate System Recovery Images

Windows 8.1 removes the Windows 7 backup interface, which allowed you to create system backup images. These system images contain a complete snapshot of every single file on the system, so they’re different from Windows 8’s recovery images.

 

While the graphical interface has been removed, system administrators and geeks can still create system image backups by running the wbadmin start backup cmdlet in a PowerShell window. Unlike all the other commands here, this command-line tool must be run from within PowerShell, not the Command Prompt.

 

 


 

sfc /scannowScan System Files for Problems

Windows includes a system file checker tool that scans its system files and looks for problems. If system files are missing or corrupted, the system file checker will repair them. This may fix problems with some Windows systems.

 

To use this tool, open a Command Prompt window as Administrator and run the sfc /scannow command.


 


 

 

10Private Search Engines That Do Not Track You

Posted by [email protected] on February 3, 2017 at 7:45 AM Comments comments (0)


1 DuckDuckGo

DuckDuckGo is a very secure search engine that never tracks your searches while providing you really good search experience. The main purpose of building this search engine is for people who likes to remain private while searching, and delivers instant results without tailored ads on the search pages. DuckDuckGo gets around 10M+ searches a day.

2 WolframAlpha

This is a great computable search engine which provides very accurate answers and offers open knowledge. WolframAlpha’s main purpose is to serve knowledge and nonetheless it does not track what you search for.

WolframAlpha performs dynamic calculations using built-in algorithms and delivers an expert knowledge about calculations, people, money & finance, health & medicines, music & movies and much more.

3 Startpage

Startpage is a powerful search engine which provides accurate results while protecting your searches and avoiding tracking your steps. Startpage offers browsing through a proxy server and helps protecting you from websites that track your IP address or location. You can add Startpage to your browser, on Firefox or Chrome , and even change its color theme.

4 Privatelee

There is nothing much to talk about Privatelee but it enables strict filters and secure searches if you need it. Privatelee doesn’t keeps your search keywords to be used for surveillance or adds. It offers ‘PowerSearch‘ commands that lets you configure search source and more. It is also famous by name Qrobe.it.

 

5 Yippy

Yippy allows you to manually filter the results according to categories and flag any inappropriate result. Unlike some engines, it allows searching of many types of content including images, web, news, blogs, jobs, government data, etc.

Yippy lets you view cached pages (like Google) and filter results by tags like sources, clouds, websites. Yippy does not track your search queries and doesn’t show customized ads.

6 Hulbee

This is a private search that delivers instant searches while not tracking your location history or search. Hulbee provides very intelligent information yet never analyses or stores its visitor’s details.

All your searches are encrypted for security against man in the middle attacks and data leaks. There is an option to choose a region for most relevant search results and then lets you ‘clear your activity‘ to avoid any trace of information.

7 Gibiru

Gibiru is a fully uncensored yet encrypted search engine that prevents data leaks to third parties. It works faster than most other private search engines because it uses the ‘Google Custom Search‘ to provide its service but removes all tracking methods followed by Google.

8 Disconnect Search

Just like Gibiru, Disconnect Search uses search assistance from major search engines like Google, Yahoo and Bing but it does not track your online activities or searches or IP address. It lets you search by location so that you get accurate and relevant search results based on the information you provided.

9 Lukol

Lukol uses a proxy server to give you customized search results from Google using its own enhanced custom search. It conserves your privacy by removing traceable entities. It is considered as one of the best private search engines that protects from online information and keeps the spammers away from you by safeguarding you from inappropriate and misleading sites. It ensures full anonymity for your searches.

10 MetaGer

MetaGer lets you make confidential untraceable searches that leave no footprints. It also integrates a proxy server so that you can open any link anonymously from the search result pages and yet keep your IP address hidden from the destination server. It also never tracks your keywords.

This prohibits third parties or advertisers to target you for ads or any of malicious attacks. Its default language is in German.

How does Hackers Cracking Passwords �?? Top 6 Techniques Explained

Posted by [email protected] on February 3, 2017 at 7:40 AM Comments comments (0)


1. Dictionary Attack

Dictionary Attack is a technique used by most of the regular hackers to determine the passphrase by trying their luck many times. Unlike its name, it works like a dictionary it is just a simple file which contains some unusual words that many people uses as their password it is one of the easy ways to hack into anyone’s account. But putting up a tough password can beat this attack.

2. BruteForce Attack

The main motto of Brute force attack is to crack passwords, It will try its level best and try every possible combination until the password is found, But nowadays people are smarter, so the growing size of passwords is making Brute Force attack difficult to crack any password. It is much similar to Dictionary attack it is something like the upgraded version of Dictionary attack.

3. Phising

Phishing is the easiest method used by hackers, It does nothing, it simply ask users for their passwords, But the process of asking password is unique and different, Hackers used to create the fake page, fake emails, fake apps etc. It simply asks you to log in with your Id and password. and once you have entered the detail your details are transferred into hacker’s server.

 

4. Trojans, Viruses, And Other Malware

These programs are usually developed by hackers for the sole purpose of generating the target destruction. Viruses and worms usually added to a user’s system so that they can make the full use of a machine or a network as a whole, and are usually spread by email or either it is hidden in any applications.

5. Shoulder Surfing

Shoulder surfing is the practice of spying on the user of a cash-dispensing machine or another electronic device in order to obtain their personal identification number, password, etc. It is mostly found in the eye-catching notes stuck in front of your LCD monitor which keep asking you to login into them.

6. Port Scan Attack

This is a technique often used to find weaknesses on a given server. It is normally used by those who are responsible for security to find vulnerabilities in the system. Port Scan Attack is used to send a message to a port and wait for a response, The received data from the open port is an invitation for hackers to hack into your server.

Now how to delete the undeletable folder? Follow below steps again!

Posted by [email protected] on February 3, 2017 at 7:35 AM Comments comments (0)


Step. open your CMD again, type E: hit enter and again type rd con\ (Remove Directory) hit enter.

To Delete The Same Folder Type rd con\

Your file is deleted. everything is fine, just put the value or code correctly and you got what you want. Just make sure whether you are a programmer or not, typing a perfect code is the only genuine work, if you mislead or mistype then your code then it will not perform.

How To Create Undeletable Folder In Windows

Posted by [email protected] on February 3, 2017 at 7:25 AM Comments comments (0)


Step1. Open CMD as Command Prompt. (Go to Start and type CMD)

Command Prompt

    Note: After this step make sure that you will not select a root directory, means, you can only create this folder on non-rooted drives such as D, E, F, G not the C drive because you have installed your windows on that Drive.

Step2. Open CMD and type E: and hit enter.

Select Your Desire Drive I have selected E:

Step3. Now type md con\ (MD represent Make Directory) Hit enter.

   Note Why We Use con?: Files may be copied to devices. For example, copy file con outputs file to the screen console. Devices themselves may be copied to a destination file, For example, copy con file takes the text typed into the console and puts it into FILE, stopping when EOF (Ctrl+Z) is typed.

 

Now Type md con\

  Note: You just created a new folder on E Drive, just check it out whether it worked or not, Confirm? OK if yes that means you created a folder, now delete that folder to make sure it is working as undeletable as Title of the tutorial mentioned, now put some folders and music files under con and again try to delete con folder if you see no changes that mean it worked on your computer.

Change the Colour of a Folder In Windows

Posted by [email protected] on February 3, 2017 at 7:15 AM Comments comments (0)

 Step 1. Download Folder Colorizer from download.cnet.com or you can download the full free version of Folder Colorizer from here.

 Step 2. After downloading Folder Colorizer you need to install it. Double click on Setup file and open the file.

 Step 3. It will ask you to accept their license Agreement. Accept the agreement and click Next.

 Step 4. In the next step, the setup will ask you to customize your installation. You can select your installation drive here, but if you want the program to be installed in default Windows drive then simply click on “Install Now“

 Step 5. It will not give you any welcome note etc once it is installed, but that doesn’t mean that you haven’t correctly installed the program. Select a folder and click right on it, you will see a new option called: Colorize!

 Step 6. And on the side of the program, it shows the color patterns. Just choose your color preference and the color change will be made instantly.

 Step 7. Now if you want to restore the original color of your folder just right click on the folder select colorize and then select the option of “Restore Original color” Your folder color will be changed to the default one.


Rss_feed