NIVEN / HARSHAD Numbers in Python
To all of you coding enthusiasts there, I've been working on some special series of mathematics, namely, Harshad/Niven Numbers, The Col...The Input statements
The input function in python is used to take the value of a user defined variable. The regular input function does not support string data....IF-ELSE conditions
If is a keyword used to condition the output. For example you want the greater of two variables. If a>b : Print a Else : Prin...Tokens in Python
Tokens for python are somehow the same as C++, IDENTIFIER --> names given by a programmer to identify a variable, function etc. examp...
Introduction to Python
History of Python: Python was developed by Guido van Rossum in the late eighties and early nineties at the National Research Inst...
CRYPTOGRAPHY
yeah so the lazy bum blogger was studying some new topics he found out. One of them came out to be cryptography. So, cryptography is the ...An Open Letter to Anonymous And Everyone
Dear Friends, Much publicity has been gained by using tradecraft against the largest, most visible targets. However, very little of str...
5 CYBER CRIME--Part 5 Crime 5
Fifth crime ---> Phishing This crime takes in the confidential information of a personsuch as credit card numbers username-password co...Anonymous writes an open letter to Government of India before nation wide protest on Saturday 9th June 2012.
Dear Government Of India, We are Anonymous. It has come to our attention that you have blocked file sharing websites in India. We als...
5 CYBER CRIMES--Part 4 Crime 4
The Lazy Bum blogger is back... And he brings to you... Fourth Crime---> DoS Attack DoS Attack A Denial-of-Service(DoS) attack is an...
5 CYBER CRIMES--Part 3 Crime 3
Yeah so the lazy blogger is back. Here is the third cyber crime I found to be important, namely "LOGIC BOMBS". Third Crime---...
5 CYBER CRIMES--Part 2 Crime 2
So yeah, the blogger is out of bed and ready to type again... Second Crime---> Virus Dissemination So ever since I've crossed El...
5 CYBER CRIMES--Part 1 Crime 1
There are literally a dozen ways in which a cyber crime can be perpetrated, and you need to know what they are: First Crime---> Hackin...
Wallpapers--ANONYMOUS
Well if you read my last post you must have found out about the Anonymous. I pretty much liked their wallpapers when I searched so I'm...