Home
Tools
Tools
Work
Google-Plus
Facebook
Twitter
RSS
Flickr
Skype
Linkedin
Archive
12
4chan
abstraction
activist
and
Anonymous
Black Hat Hackers
C++
cipher
ciphers
comparison
computer science
conditions
cryptic
Cryptography
Cyber Crime
cyber criminals
data
DDoS Attack
DoS Attack
download
Downloads
else
error
explosions
Fake
false
FAQ's
features
First Crime
Flip
Fourth Crime
Grey Hat Hackers
GUI
Guido van Rossum
Hackers
Hacking
Hacktivist
HAPPY
Happy numbers
harshad
harshad numbers
harshad/niven numbers
help
hidden
hiding
hierarchy
history
HTML
HTML 5
I/O
identifier
if
india US germany
input
integer
legion
Logic bombs
logical
Macintosh
MALWARE
mathematics
maths
modules
monty
Monty Python
Mouse
nested conditions
Netherlands
new
niven
Niven numbers
not
numbers
operators
or
output
password
phishing
Pranks
Pranks fun office
programming language
PYTHON
python 2.7
python monty
python.org
raw input
runtime
series
special series
statement
string
syntax
tags
time bombs
tokens
true
Types of Virus
unhappy
unhappy numbers
UNIX
variables
Virus Dissemination
Viruses
Vishing
White Hat Hackers
Windows
Store
rss
Layout
Mobile version
Web version
Flipcard
Snapshot
Pages
Zero-Dot
AppWeb Plus
FUDgy-LOGiks
About Me
Python
Python
Examples
Hacking
Anonymous
Hacktivism
Hacking History
Others
Unsolved Ciphers
How to make a cipher
Cryptography
Overview(VIRUSES)
Watch out for
Famous cyber attacks
Download Our Android App
Programmers Arena: November 2012
About Me
nice
View my complete profile
×
GUIDE TO HTML 5!!!
Subscribe to:
Posts (Atom)
Pages
Home
Labels
12
(1)
4chan
(1)
abstraction
(1)
activist
(1)
and
(1)
Anonymous
(6)
Black Hat Hackers
(4)
C++
(1)
cipher
(1)
ciphers
(1)
comparison
(1)
computer science
(2)
conditions
(1)
cryptic
(1)
Cryptography
(1)
Cyber Crime
(6)
cyber criminals
(2)
data
(2)
DDoS Attack
(1)
DoS Attack
(1)
download
(1)
Downloads
(1)
else
(1)
error
(1)
explosions
(1)
Fake
(1)
false
(1)
FAQ's
(1)
features
(2)
First Crime
(4)
Flip
(1)
Fourth Crime
(1)
Grey Hat Hackers
(3)
GUI
(2)
Guido van Rossum
(1)
Hackers
(3)
Hacking
(5)
Hacktivist
(3)
HAPPY
(1)
Happy numbers
(1)
harshad
(1)
harshad numbers
(1)
harshad/niven numbers
(1)
help
(1)
hidden
(1)
hiding
(1)
hierarchy
(1)
history
(1)
HTML
(1)
HTML 5
(1)
I/O
(1)
identifier
(1)
if
(1)
india US germany
(1)
input
(1)
integer
(1)
legion
(1)
Logic bombs
(1)
logical
(1)
Macintosh
(1)
MALWARE
(2)
mathematics
(2)
maths
(2)
modules
(1)
monty
(4)
Monty Python
(7)
Mouse
(1)
nested conditions
(1)
Netherlands
(1)
new
(1)
niven
(1)
Niven numbers
(1)
not
(1)
numbers
(1)
operators
(1)
or
(1)
output
(1)
password
(1)
phishing
(1)
Pranks
(1)
Pranks fun office
(1)
programming language
(2)
PYTHON
(8)
python 2.7
(2)
python monty
(4)
python.org
(1)
raw input
(1)
runtime
(1)
series
(2)
special series
(1)
statement
(1)
string
(1)
syntax
(1)
tags
(1)
time bombs
(1)
tokens
(1)
true
(1)
Types of Virus
(3)
unhappy
(1)
unhappy numbers
(1)
UNIX
(2)
variables
(1)
Virus Dissemination
(2)
Viruses
(3)
Vishing
(1)
White Hat Hackers
(4)
Windows
(1)
Popular Posts
Introduction to Python
History of Python: Python was developed by Guido van Rossum in the late eighties and early nineties at the National Research Inst...
NIVEN / HARSHAD Numbers in Python
To all of you coding enthusiasts there, I've been working on some special series of mathematics, namely, Harshad/Niven Numbers, The Col...
HAPPY Numbers using Python
Okay so this is my second post in the special mathematical series, this time its HAPPY NUMBERS, this series of numbers is easy to understan...
5 CYBER CRIMES--Part 1 Crime 1
There are literally a dozen ways in which a cyber crime can be perpetrated, and you need to know what they are: First Crime---> Hackin...
An Open Letter to Anonymous And Everyone
Dear Friends, Much publicity has been gained by using tradecraft against the largest, most visible targets. However, very little of str...
5 CYBER CRIMES--Part 2 Crime 2
So yeah, the blogger is out of bed and ready to type again... Second Crime---> Virus Dissemination So ever since I've crossed El...
Tokens in Python
Tokens for python are somehow the same as C++, IDENTIFIER --> names given by a programmer to identify a variable, function etc. examp...
ERRORS
While using the GUI / interactive mode the errors can be spotted easily as the interactive mode won't allow your false codes to become ...
Modules
It is a library which may contain classes, objects and functions. It is a normal .py file. Each module is related to a specific type of tas...
CRYPTOGRAPHY
yeah so the lazy bum blogger was studying some new topics he found out. One of them came out to be cryptography. So, cryptography is the ...
Pages
Home
FUDgy-LOGiks
AppWeb+
ZeroDot
tumblr
Abhimanyu Krishna. Powered by
Blogger
.
Home
Drop a Question!
Spring.me--> http://new.spring.me/#!/user/abhimanyukrishn Ask.fm--> http://ask.fm/AbhimanyuKrishna
Popular Post
Introduction to Python
History of Python: Python was developed by Guido van Rossum in the late eighties and early nineties at the National Research Inst...
NIVEN / HARSHAD Numbers in Python
To all of you coding enthusiasts there, I've been working on some special series of mathematics, namely, Harshad/Niven Numbers, The Col...
HAPPY Numbers using Python
Okay so this is my second post in the special mathematical series, this time its HAPPY NUMBERS, this series of numbers is easy to understan...
5 CYBER CRIMES--Part 1 Crime 1
There are literally a dozen ways in which a cyber crime can be perpetrated, and you need to know what they are: First Crime---> Hackin...
An Open Letter to Anonymous And Everyone
Dear Friends, Much publicity has been gained by using tradecraft against the largest, most visible targets. However, very little of str...
5 CYBER CRIMES--Part 2 Crime 2
So yeah, the blogger is out of bed and ready to type again... Second Crime---> Virus Dissemination So ever since I've crossed El...
Tokens in Python
Tokens for python are somehow the same as C++, IDENTIFIER --> names given by a programmer to identify a variable, function etc. examp...
ERRORS
While using the GUI / interactive mode the errors can be spotted easily as the interactive mode won't allow your false codes to become ...
Modules
It is a library which may contain classes, objects and functions. It is a normal .py file. Each module is related to a specific type of tas...
CRYPTOGRAPHY
yeah so the lazy bum blogger was studying some new topics he found out. One of them came out to be cryptography. So, cryptography is the ...
Followers
Labels
12
(1)
4chan
(1)
abstraction
(1)
activist
(1)
and
(1)
Anonymous
(6)
Black Hat Hackers
(4)
C++
(1)
cipher
(1)
ciphers
(1)
comparison
(1)
computer science
(2)
conditions
(1)
cryptic
(1)
Cryptography
(1)
Cyber Crime
(6)
cyber criminals
(2)
data
(2)
DDoS Attack
(1)
DoS Attack
(1)
download
(1)
Downloads
(1)
else
(1)
error
(1)
explosions
(1)
Fake
(1)
false
(1)
FAQ's
(1)
features
(2)
First Crime
(4)
Flip
(1)
Fourth Crime
(1)
Grey Hat Hackers
(3)
GUI
(2)
Guido van Rossum
(1)
Hackers
(3)
Hacking
(5)
Hacktivist
(3)
HAPPY
(1)
Happy numbers
(1)
harshad
(1)
harshad numbers
(1)
harshad/niven numbers
(1)
help
(1)
hidden
(1)
hiding
(1)
hierarchy
(1)
history
(1)
HTML
(1)
HTML 5
(1)
I/O
(1)
identifier
(1)
if
(1)
india US germany
(1)
input
(1)
integer
(1)
legion
(1)
Logic bombs
(1)
logical
(1)
Macintosh
(1)
MALWARE
(2)
mathematics
(2)
maths
(2)
modules
(1)
monty
(4)
Monty Python
(7)
Mouse
(1)
nested conditions
(1)
Netherlands
(1)
new
(1)
niven
(1)
Niven numbers
(1)
not
(1)
numbers
(1)
operators
(1)
or
(1)
output
(1)
password
(1)
phishing
(1)
Pranks
(1)
Pranks fun office
(1)
programming language
(2)
PYTHON
(8)
python 2.7
(2)
python monty
(4)
python.org
(1)
raw input
(1)
runtime
(1)
series
(2)
special series
(1)
statement
(1)
string
(1)
syntax
(1)
tags
(1)
time bombs
(1)
tokens
(1)
true
(1)
Types of Virus
(3)
unhappy
(1)
unhappy numbers
(1)
UNIX
(2)
variables
(1)
Virus Dissemination
(2)
Viruses
(3)
Vishing
(1)
White Hat Hackers
(4)
Windows
(1)
Blog Archive
July
(2)
August
(1)
July
(4)
June
(1)
March
(1)
February
(1)
January
(4)
December
(5)
November
(1)
May
(2)
Labels
12
(1)
4chan
(1)
abstraction
(1)
activist
(1)
and
(1)
Anonymous
(6)
Black Hat Hackers
(4)
C++
(1)
cipher
(1)
ciphers
(1)
comparison
(1)
computer science
(2)
conditions
(1)
cryptic
(1)
Cryptography
(1)
Cyber Crime
(6)
cyber criminals
(2)
data
(2)
DDoS Attack
(1)
DoS Attack
(1)
download
(1)
Downloads
(1)
else
(1)
error
(1)
explosions
(1)
Fake
(1)
false
(1)
FAQ's
(1)
features
(2)
First Crime
(4)
Flip
(1)
Fourth Crime
(1)
Grey Hat Hackers
(3)
GUI
(2)
Guido van Rossum
(1)
Hackers
(3)
Hacking
(5)
Hacktivist
(3)
HAPPY
(1)
Happy numbers
(1)
harshad
(1)
harshad numbers
(1)
harshad/niven numbers
(1)
help
(1)
hidden
(1)
hiding
(1)
hierarchy
(1)
history
(1)
HTML
(1)
HTML 5
(1)
I/O
(1)
identifier
(1)
if
(1)
india US germany
(1)
input
(1)
integer
(1)
legion
(1)
Logic bombs
(1)
logical
(1)
Macintosh
(1)
MALWARE
(2)
mathematics
(2)
maths
(2)
modules
(1)
monty
(4)
Monty Python
(7)
Mouse
(1)
nested conditions
(1)
Netherlands
(1)
new
(1)
niven
(1)
Niven numbers
(1)
not
(1)
numbers
(1)
operators
(1)
or
(1)
output
(1)
password
(1)
phishing
(1)
Pranks
(1)
Pranks fun office
(1)
programming language
(2)
PYTHON
(8)
python 2.7
(2)
python monty
(4)
python.org
(1)
raw input
(1)
runtime
(1)
series
(2)
special series
(1)
statement
(1)
string
(1)
syntax
(1)
tags
(1)
time bombs
(1)
tokens
(1)
true
(1)
Types of Virus
(3)
unhappy
(1)
unhappy numbers
(1)
UNIX
(2)
variables
(1)
Virus Dissemination
(2)
Viruses
(3)
Vishing
(1)
White Hat Hackers
(4)
Windows
(1)
Featured Posts
Label
12
4chan
abstraction
activist
and
Anonymous
Black Hat Hackers
C++
cipher
ciphers
comparison
computer science
conditions
cryptic
Cryptography
Cyber Crime
cyber criminals
data
DDoS Attack
DoS Attack
download
Downloads
else
error
explosions
Fake
false
FAQ's
features
First Crime
Flip
Fourth Crime
Grey Hat Hackers
GUI
Guido van Rossum
Hackers
Hacking
Hacktivist
HAPPY
Happy numbers
harshad
harshad numbers
harshad/niven numbers
help
hidden
hiding
hierarchy
history
HTML
HTML 5
I/O
identifier
if
india US germany
input
integer
legion
Logic bombs
logical
Macintosh
MALWARE
mathematics
maths
modules
monty
Monty Python
Mouse
nested conditions
Netherlands
new
niven
Niven numbers
not
numbers
operators
or
output
password
phishing
Pranks
Pranks fun office
programming language
PYTHON
python 2.7
python monty
python.org
raw input
runtime
series
special series
statement
string
syntax
tags
time bombs
tokens
true
Types of Virus
unhappy
unhappy numbers
UNIX
variables
Virus Dissemination
Viruses
Vishing
White Hat Hackers
Windows
Copyright ©
Programmers Arena