1. Create a feature/fix branch Don’t work straight on the parent branch if you have to implement a feature/fix, atleast
Continue readingCategory: Computer
Fake Access Point
A created Fake AP can be used for many evil stuff like sniffing credentials (Rogue AP) or reqesting credentials (Evil
Continue readingCyclic dependencies (C++)
Issue The cyclic dependency is a problem which occurs if two classes includes each other in their header. hen.hpp egg.hpp
Continue readingSQL Injection
If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue readingOperating System APIs (C++)
Before using the OS APIs directly, take a look if the STL or boost already provides this functionality. Also be
Continue readingPush rejection (Git)
Reason: If you have updated a local branch and then trying to push it on remote you may got the
Continue readingCode documentation (Doxygen)
General Always document large software projects, so other programmers can understand your code. Consider using tools like Javadoc or Doxygen
Continue reading