If you are trying to get access to an account of a target and your dictionaries aren’t containing the password,
Continue readingCategory: Computer
ARP Spoofing
This technique creates a Man-In-The-Middle situation, so that we can modifiy the communication in any way we want or just
Continue readingSession Hijacking (via Sniffing or XSS)
If a user is communicating with a site on a webserver via HTTP the website will give him a Session-ID.
Continue readingUsage of variables in regex
If you want to replace lots of text and all of them are based on the same pattern, it would
Continue readingOperating System APIs (C++)
Before using the OS APIs directly, take a look if the STL or boost already provides this functionality. Also be
Continue readingPush rejection (Git)
Reason: If you have updated a local branch and then trying to push it on remote you may got the
Continue readingCode documentation (Doxygen)
General Always document large software projects, so other programmers can understand your code. Consider using tools like Javadoc or Doxygen
Continue readingWhen to use which cast (C++)
Types Type Area Risk static_cast – Converts fundamental types– Non-const to const– Down-casts (dangerous) Medium dynamic_cast – Down- and side-casts
Continue readingRebase branch on rebased parent (Git)
This is necessary when you develop on an child-feature-branch and the parent-feature-branch has been rebased. 0. Initial situation 1. Rebase
Continue readingNetwork components (Selection)
Repeater A repeater just repeats the signals it receives. They can be wired (with 2 ports) or wireless. Therfore it
Continue reading