HAPPY Numbers using Python
21:51
Okay so this is my second post in the special mathematical series, this time its HAPPY NUMBERS, this series of numbers is easy to understan...
21:51
Okay so this is my second post in the special mathematical series, this time its HAPPY NUMBERS, this series of numbers is easy to understan...
NIVEN / HARSHAD Numbers in Python
To all of you coding enthusiasts there, I've been working on some special series of mathematics, namely, Harshad/Niven Numbers, The Col...
19:25
It is a library which may contain classes, objects and functions. It is a normal .py file. Each module is related to a specific type of tas...
18:15
The input function in python is used to take the value of a user defined variable. The regular input function does not support string data....
19:34
If is a keyword used to condition the output. For example you want the greater of two variables. If a>b : Print a Else : Prin...
19:51
While using the GUI / interactive mode the errors can be spotted easily as the interactive mode won't allow your false codes to become ...
00:16
Tokens for python are somehow the same as C++, IDENTIFIER --> names given by a programmer to identify a variable, function etc. examp...
History of Python: Python was developed by Guido van Rossum in the late eighties and early nineties at the National Research Inst...
yeah so the lazy bum blogger was studying some new topics he found out. One of them came out to be cryptography. So, cryptography is the ...
03:10
Dear Friends, Much publicity has been gained by using tradecraft against the largest, most visible targets. However, very little of str...
Fifth crime ---> Phishing This crime takes in the confidential information of a personsuch as credit card numbers username-password co...
02:47
Dear Government Of India, We are Anonymous. It has come to our attention that you have blocked file sharing websites in India. We als...
5 CYBER CRIMES--Part 4 Crime 4
The Lazy Bum blogger is back... And he brings to you... Fourth Crime---> DoS Attack DoS Attack A Denial-of-Service(DoS) attack is an...
5 CYBER CRIMES--Part 3 Crime 3
Yeah so the lazy blogger is back. Here is the third cyber crime I found to be important, namely "LOGIC BOMBS". Third Crime---...
5 CYBER CRIMES--Part 2 Crime 2
So yeah, the blogger is out of bed and ready to type again... Second Crime---> Virus Dissemination So ever since I've crossed El...
5 CYBER CRIMES--Part 1 Crime 1
There are literally a dozen ways in which a cyber crime can be perpetrated, and you need to know what they are: First Crime---> Hackin...
Well if you read my last post you must have found out about the Anonymous. I pretty much liked their wallpapers when I searched so I'm...
Well if you searched Cyber crime you must be knowing who the anonymous are. If not let me tell you. It is a loosely associated hacktivist ...
17:44
You must be wondering what on earth is a cyber crime...? You may define cyber crime as - fundamentally any illegal activity committed u...
12:12
All the people who want to have the basic knowledge of HTML5 should download it from here . When you get there you can save it and get som...