Thursday, September 18, 2014
On 4:21 AM by Unknown 1 comment
Looking for a free ebooks on some topic? Your search ends here with these websites..
1. FreeBookSpot: This website contains over 4,000 free ebooks in 96 different categories ranging from engineering to fiction.
2. 4eBooks: This website has a pretty big collection of free ebooks on computer science.
3. Free-eBooks: This website can be used to download a number of free ebooks. They require registration though, which can be done for free.
4. ManyBooks: This website has over 20,000 free ebooks, which can be accessed from your iPad or ebook readers.
5. GetFreeEBooks: As the name suggests, this website contains a library of free ebooks, which can be downloaded by you.
6. FreeComputerBooks: This website contains 12 categories, which are further sub-divided into 150 different categories, all containing books on computers.
7. FreeTechBooks: This website contains books on computer science, engineering and other things to do with technology.
8. Scribd: This is like the GitHub for free ebooks. This allows online document sharing in Word, PDF and other formats.
9. KnowFree: Along with free ebooks, this website also contains video training and other materials.
10. OnlineFreeEBooks: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks. These are the nine categories that this website hosts.
11. MemoWare: This website has a number of ebooks, which have been optimised to be read on handheld devices.
12. OnlineComputerBooks: This website has free ebooks on computers and many other topics.
13. SnipFiles: This website has a number of free ebooks along with free software that you can download.
14. Bookyards: This website contains books, education materials and other content.
When looking for free ebooks, there are many resources online. But the problem is how to find the ones that are really trustworthy. There are quite a few websites available to this end. Here are 14 of the top websites where you can get free ebooks on technology and many other topics. |
1. FreeBookSpot: This website contains over 4,000 free ebooks in 96 different categories ranging from engineering to fiction.
2. 4eBooks: This website has a pretty big collection of free ebooks on computer science.
3. Free-eBooks: This website can be used to download a number of free ebooks. They require registration though, which can be done for free.
4. ManyBooks: This website has over 20,000 free ebooks, which can be accessed from your iPad or ebook readers.
5. GetFreeEBooks: As the name suggests, this website contains a library of free ebooks, which can be downloaded by you.
6. FreeComputerBooks: This website contains 12 categories, which are further sub-divided into 150 different categories, all containing books on computers.
7. FreeTechBooks: This website contains books on computer science, engineering and other things to do with technology.
8. Scribd: This is like the GitHub for free ebooks. This allows online document sharing in Word, PDF and other formats.
9. KnowFree: Along with free ebooks, this website also contains video training and other materials.
10. OnlineFreeEBooks: Automotive Ebooks, Business Ebooks, Engineering Ebooks, Gadget Ebooks, Hardware Ebooks, Health & Medical Ebooks, Hobbies Ebooks, Programming & Technology Ebooks, Sport & Martial Art Ebooks. These are the nine categories that this website hosts.
11. MemoWare: This website has a number of ebooks, which have been optimised to be read on handheld devices.
12. OnlineComputerBooks: This website has free ebooks on computers and many other topics.
13. SnipFiles: This website has a number of free ebooks along with free software that you can download.
14. Bookyards: This website contains books, education materials and other content.
On 4:18 AM by Unknown No comments
Did you know you could use HTML to hack a website? Here's how to do it!
1. First put in the username and password in the login form. You can put in any username and password. This will generate an error, telling you that the username and password entered are wrong. This is where the work starts.
2. Now right click on the error page and click on view source.
3. Before the next step, copy the URL of the website that you are in. This shows you the HTML coding and JavaScript. Look for something like <_form action=”…Login…”>.
4. The JavaScript that you see here is used to validate the information provided in the server. Now you have to delete the JavaScript. Do this carefully because this is what determines whether you’re going to be able to hack the website or not.
5. Now look for “<_input name="password" type="password">" (without the quote marks). Now replace this with "<_type=password>" with "<_type=text>". Check if the maximum length of the password is less than 11 and increase it to 11.
6. Now go to file, save as and save it somewhere on your hard drive with the .html extension.
7. Next you have to reopen the webpage by double clicking on the file that you saved. You will see a few changes in the current page as compared to the original one.
8. Now choose a username and password and you will have successfully logged into the account.
Yes folks, you can use HTML to hack a website. The eight steps described below will take you from zero to hero in no time whatsoever. So how do we do it? Read on to find out.. |
1. First put in the username and password in the login form. You can put in any username and password. This will generate an error, telling you that the username and password entered are wrong. This is where the work starts.
2. Now right click on the error page and click on view source.
3. Before the next step, copy the URL of the website that you are in. This shows you the HTML coding and JavaScript. Look for something like <_form action=”…Login…”>.
4. The JavaScript that you see here is used to validate the information provided in the server. Now you have to delete the JavaScript. Do this carefully because this is what determines whether you’re going to be able to hack the website or not.
5. Now look for “<_input name="password" type="password">" (without the quote marks). Now replace this with "<_type=password>" with "<_type=text>". Check if the maximum length of the password is less than 11 and increase it to 11.
6. Now go to file, save as and save it somewhere on your hard drive with the .html extension.
7. Next you have to reopen the webpage by double clicking on the file that you saved. You will see a few changes in the current page as compared to the original one.
8. Now choose a username and password and you will have successfully logged into the account.
Wednesday, September 17, 2014
On 9:46 AM by Unknown No comments
Here we bring to you 12 steps to become a hacker, together with all the books, tutorials and resources that you need to learn in the process. So pack your bags and get set for the journey!
Here are the 12 steps:
It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude.
Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.
The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and we do not recommend you to get involved into such activities.
Step 1: Learn To Program In C
C programming is one of the most powerful languages in computer programming. It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.
Here are 35 ebooks on C programming
Step 2: Learn More Than One Programming Language
When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.
Here are 32 free ebooks on JAVA
Here are 24 free ebooks on Perl
Here are 21 free ebooks on PHP
Here are 50 free ebooks on Python
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.
Here are 33 free ebooks on UNIX
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence, it is good to learn hacking Microsoft systems, which are closed-source systems.
According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.
Windows OS installers are distributed in binary, therefore, it is not easy for you to read the code. Binary code is basically the digital representation of text and data that computer understands. However, knowing how programs are written for Windows and how different applications behave on this operating system will help.
One of the recent vulnerabilities of a popular OS was that Java Web Start applications get launched automatically even if the Java plug-ins are disabled. How to be a hacker is about knowing the weaknesses of these operating systems and targeting them systematically.
Step 5: Learn Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it.
Apache Httpd is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other application layer protocol related endeavors.
Also Nmap is a powerful network scanning tool that is used by hackers and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics.
Step 6: Start Simple: Go Through Tutorials About Hacking
This is the simple and best way to start. Read as many tutorials as possible that are meant for hacking. These articles will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet; Both text and video tutorials are available for you to answer your question how to be a hacker.
Here are some of the video tutorials
Here are some of the text tutorials
Step 7: Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption.
Understand various techniques used for password cracking. There are dozens of tools available to do password cracking, and using it is not hacking. To be expert at hacking its important for you to understand how to create a program that can crack a password from cypher text.
Here are 20 free ebooks on Cryptography
Step 8: Experiment A Lot
This is an important step for setting yourself up as an expert hacker. Setup a laboratory on your own to experiment the learning on the practical applications. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.
It is good to try experimenting on your own computers, where you can rectify if you have done any mistake. Many hackers initially start off by downloading virtual lab applications such as Oracle VirtualBox. You require at least 3 GBs of RAM and a comparatively powerful processor to carry out your hacking experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, applications and different servers without affecting your own PC.
Some of the things you may need to keep in mind when doing experiments
- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks
Step 9: Read Some Good Books From Experts
Reading will always enhance your knowledge. Try to read as many books and articles as possible written by the experts in the field field of ethical hacking and enterprise security
Reading a lot about anything related is so important in the world of hacking that you must also consider enhancing your reading speed. If your reading speed is slow, then you may not be able to progress fast in this field. Practice speed reading techniques like skimming, chunk reading etc.
When it comes to reading a lot, it's also important to know that a majority of content on web is not worth your time. Many people use search engine tricks to attract traffic but have little value in it. If you skim through an article within seconds and decide not to read that is going to save you a lot of time for some really well researched content.
Step 10: Go Next Level: Write Vulnerability
Vulnerability of a program is the weakness of the program. It is a good approach to look for the vulnerability of an existing program and share the same with others. In this way you will have the option to collect varied opinions from different sources, enabling you to hone your current skill set.
The examples of computer vulnerabilities include memory safety violation, input validation error, privilege confusion bugs and user interface failure. For instance, Microsoft’s Internet Explorer 11 had the vulnerability bug in its preview version which several hackers exploited.
Identifying a new weakness in any software is the real work any expert hackers would perform.
Step 11: Contribute To Open Source Security Projects
Contributing to an open-source computer security project is a great platform to test your skills. This is not everyone’s cup of tea. Many organizations like Mozilla and Apache offer these types of open source projects. Try to be a part of these projects and add a valuable contribution to the benefit of the community.
Participating in the open source security projects such as anti-spam, anti-virus, firewall and data removals help you augment your dexterity as a hacker. Contribute your vulnerability findings to the global vulnerability databases and give back to the community.
Remember that it does not matter if your contribution is small, as long as you participate and add value it helps.
Step 12: Continue Learning And Keep Listening To Security Talks
The key to success in the hacking career is continuous learning. Reading blogs for hacking available at sites such as hackerfactor blog and IKEA hacker blog; participating in the forums such as hackforums.net and elite hack are great ways to refresh your knowledge as a hacker. The online video forums like TED or TechTalk are good sources to know more about the emergent hacking techniques and technologies that are being deployed. You should also try following the posts of famous hackers such as Adrian Lamo, Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.
Courtesy: Himanshu Teotia
Hacking is a fascinating field but it definitely isn't easy. Here we have listed 12 of the most important steps essential to become a hacker, together with all the resources that you need for learning. Here we focus on the skills and attitude needed to become a hacker. Breaking the security system and entering into the system is not the only thing a hacker does. One requires knowledge of a wide variety of subjects and in depth knowledge of programming languages and operating systems. And needless to say, learning is essential in the journey... |
Here are the 12 steps:
It is not an easy task to become a hacker. As a hacker, you need to have an attitude and curiosity. Reading the hacking manifesto can teach you the attitude of a hacker. Nurturing the hacker attitude is more about developing competence in the languages rather than having a stereotypical attitude.
Though a lot of people consider that a hacker is a criminal, in real life, they are hired by big companies for protecting information and minimizing potential damage. The act of hacking actually is that of being over-curious and outwitting authority. As a hacker, you should be hell bent on breaching authoritarian rules, secrecy and censorship. Deception is another arsenal which will allow you to dodge the vigilant eyes of authority.
The act of stealing something or doing harm to someone is not hacking. Such people are commonly called crackers in the community. Crackers are involved in illegal activities and we do not recommend you to get involved into such activities.
Step 1: Learn To Program In C
C programming is one of the most powerful languages in computer programming. It is necessary to really master this language. This programming language was invented by Denise Ritchie in between the years 1969 and 1973 at AT&T Bell Labs. C programming will essentially help you divide the task in smaller pieces and these pieces can be expressed by a sequence of commands. Try writing some program on your own by assessing the logic.
Here are 35 ebooks on C programming
Step 2: Learn More Than One Programming Language
When you are trying to become a hacker, it is very important to learn other modern computer programming languages such as JAVA, Perl, PHP and Python. One of the best ways to learn these is by reading books from experts.
Here are 32 free ebooks on JAVA
Here are 24 free ebooks on Perl
Here are 21 free ebooks on PHP
Here are 50 free ebooks on Python
Step 3: Learn UNIX
UNIX is a multi-tasking and multi-user computer operating system that is designed to provide good security to the systems. This operating system was developed by some employees of AT&T in Bell Labs. The best way to learn it is to get into an open-source version (e.g. centos) and install/run the same on your own. You can operate internet without learning UNIX, but it is not possible for you to be an internet hacker without understanding UNIX.
Here are 33 free ebooks on UNIX
Step 4: Learn More Than One Operating Systems
There are many other operating systems apart from UNIX. Windows operating system is one of the most commonly compromised systems, hence, it is good to learn hacking Microsoft systems, which are closed-source systems.
According to the National Vulnerability Database, Microsoft operating systems have a large number of vulnerabilities.
Windows OS installers are distributed in binary, therefore, it is not easy for you to read the code. Binary code is basically the digital representation of text and data that computer understands. However, knowing how programs are written for Windows and how different applications behave on this operating system will help.
One of the recent vulnerabilities of a popular OS was that Java Web Start applications get launched automatically even if the Java plug-ins are disabled. How to be a hacker is about knowing the weaknesses of these operating systems and targeting them systematically.
Step 5: Learn Networking Concepts
The networking concept needs to be sharp when you want to be a hacker.
Understanding how the networks are created is important, however, you need to know the differences between different types are networks. Having a clear understanding of TCP/IP and UDP protocol is a must to be able to exploit the vulnerabilities on world wide web.
Understand what is subnet, LAN, WAN and VPN.
The networking commands to do a HTTP request needs to be on your fingertips. The HTTP protocol, is the gateway through which one enters the internet world. Hence, it is necessary to learn this protocol in order to break the barriers. The hackers often use the HTTP gateway to breach the security of the system and take control over it.
Apache Httpd is one of the most commonly used web servers and knowing in and out of it is going to empower you on any HTTP or other application layer protocol related endeavors.
Also Nmap is a powerful network scanning tool that is used by hackers and security professional across the world to identify vulnerable hosts. However, to effectively start using it you must understand the networking basics.
Step 6: Start Simple: Go Through Tutorials About Hacking
This is the simple and best way to start. Read as many tutorials as possible that are meant for hacking. These articles will give you insight and help you develop the attitude to be a hacker. Some tutorials will initiate you with Nmap, Nessus and SuperScan, some of the hacking programs or tools that hackers generally use. These tutorials are readily available over the internet; Both text and video tutorials are available for you to answer your question how to be a hacker.
Here are some of the video tutorials
Here are some of the text tutorials
Step 7: Learn Cryptography
As an expert hacker, you need to understand and master the art of cryptography. The technology of cryptography and encryption is very important for internet and networking. It is the practice and study of techniques that are used for secure communication in the presence of third parties. The encryption is done for various aspects of information security such as confidentiality of the data, integrity of the data and authentication. Moreover, the technology of cryptography is extensively used in ATM cards, computer passwords and e-commerce. While hacking, these encrypted codes needs to be broken, which is called decryption.
Understand various techniques used for password cracking. There are dozens of tools available to do password cracking, and using it is not hacking. To be expert at hacking its important for you to understand how to create a program that can crack a password from cypher text.
Here are 20 free ebooks on Cryptography
Step 8: Experiment A Lot
This is an important step for setting yourself up as an expert hacker. Setup a laboratory on your own to experiment the learning on the practical applications. A simplest lab will have your computer, however once you advance you may want to add more and more computers and required hardware for your experiments.
It is good to try experimenting on your own computers, where you can rectify if you have done any mistake. Many hackers initially start off by downloading virtual lab applications such as Oracle VirtualBox. You require at least 3 GBs of RAM and a comparatively powerful processor to carry out your hacking experiments. Setting up the virtual machine is crucial, as it will allow you to test virus, applications and different servers without affecting your own PC.
Some of the things you may need to keep in mind when doing experiments
- Keep a backup before any experiment.
- Start small and have check points.
- Know when to stop.
- Document your progress
- Keep improvising
- Automate repetitive tasks
Step 9: Read Some Good Books From Experts
Reading will always enhance your knowledge. Try to read as many books and articles as possible written by the experts in the field field of ethical hacking and enterprise security
Reading a lot about anything related is so important in the world of hacking that you must also consider enhancing your reading speed. If your reading speed is slow, then you may not be able to progress fast in this field. Practice speed reading techniques like skimming, chunk reading etc.
When it comes to reading a lot, it's also important to know that a majority of content on web is not worth your time. Many people use search engine tricks to attract traffic but have little value in it. If you skim through an article within seconds and decide not to read that is going to save you a lot of time for some really well researched content.
Step 10: Go Next Level: Write Vulnerability
Vulnerability of a program is the weakness of the program. It is a good approach to look for the vulnerability of an existing program and share the same with others. In this way you will have the option to collect varied opinions from different sources, enabling you to hone your current skill set.
The examples of computer vulnerabilities include memory safety violation, input validation error, privilege confusion bugs and user interface failure. For instance, Microsoft’s Internet Explorer 11 had the vulnerability bug in its preview version which several hackers exploited.
Identifying a new weakness in any software is the real work any expert hackers would perform.
Step 11: Contribute To Open Source Security Projects
Contributing to an open-source computer security project is a great platform to test your skills. This is not everyone’s cup of tea. Many organizations like Mozilla and Apache offer these types of open source projects. Try to be a part of these projects and add a valuable contribution to the benefit of the community.
Participating in the open source security projects such as anti-spam, anti-virus, firewall and data removals help you augment your dexterity as a hacker. Contribute your vulnerability findings to the global vulnerability databases and give back to the community.
Remember that it does not matter if your contribution is small, as long as you participate and add value it helps.
Step 12: Continue Learning And Keep Listening To Security Talks
The key to success in the hacking career is continuous learning. Reading blogs for hacking available at sites such as hackerfactor blog and IKEA hacker blog; participating in the forums such as hackforums.net and elite hack are great ways to refresh your knowledge as a hacker. The online video forums like TED or TechTalk are good sources to know more about the emergent hacking techniques and technologies that are being deployed. You should also try following the posts of famous hackers such as Adrian Lamo, Kevin Mitnick, Kevin Poulsen and Robert Tappan Morris.
Courtesy: Himanshu Teotia
Monday, September 15, 2014
On 10:32 AM by Unknown No comments
JavaScript animation libraries which bypass jQuery actually deliver incredible performance as they avoid DOM manipulation as much as possible.
These libraries act 20 times faster than jQuery. So if you want to use JavaScript in your UI animations then go through the following facts and steps:
1. JavaScript Use:
CSS animations are definitely convenient if you want to sprinkle property transitions into your style sheets. They deliver fantastic performance out of the box. But when you use CSS transitions to power rich motion design it becomes too difficult to manage all the features.
But in JavaScript, you have an infinite amount of logical control. The key features of JavaScript animation are cross-browser SVG support, physics-based loader animations, timeline control and Bezier translations.
2. Velocity and GSAP:
The two most popular JavaScript animation libraries are Velocity.js and GSAP. These libraries work both with and without jQuery. If they are used with jQuery, then there is no degradation in your performance.
If jQuery is present on your page, you can use Velocity and GSAP just like you would jQuery’s $.animate().
But these two libraries can also work when jQuery is not present on the page. This means you don't need to limit an animation call onto a jQuery element object and you would pass the target element(s) to the animation call by:
/* Working without jQuery */
Velocity(element, { opacity: 0.5 }, 1000); // Velocity
TweenMax.to(element, 1, { opacity: 0.5 }); // GSAP
On the other hand, GSAP uses an object-oriented API design so that you get full control over animations.
3. Working Without jQuery:
Let’s explore querySelectorAll as it will likely be your best weapon if you are into animation without jQuery:
document.querySelectorAll("body"); // Get the body element
document.querySelectorAll(".squares"); // Get all elements with the "square" class
document.querySelectorAll("div"); // Get all divs
document.querySelectorAll("#main"); // Get the element with an id of "main"
document.querySelectorAll("#main div"); // Get the divs contained by "main"
You can simply pass querySelectorAll a CSS selector (the same selectors you would use in your style sheets), and it will return all matched elements in an array. As you're attaching animations to jQuery element objects, you may be wondering how we can chain animations back to back, like this:
$element // jQuery element object
.velocity({ opacity: 0.5 }, 1000)
.velocity({ opacity: 1 }, 1000);
With Velocity, you can just call animations one after another:
/* These animations automatically chain onto one another. */
Velocity(element, { opacity: 0.5 }, 1000);
Velocity(element, { opacity: 1 }, 1000);
If you're animating this way then there is no chance of any performance drawback. This one-Velocity-call-at-a-time process has a huge benefit too like if you’re using promises with your Velocity animations, then you will get an actionable promise object with each Velocity call. In the case of GSAP, there is an expressive object-oriented API which allows you to place your animations in a timeline. It gives you control over scheduling and synchronization.
Animation is an experimental process and you need to play with timing. While CSS transitions are easy to use, they become unmanageable as soon as you attempt to sequence even moderately complex animations. Velocity has its UI pack designed in a way so that it deals with multi-animation complexity, and GSAP offers nestable timelines.
4. JavaScript Functions: Physics:
There are several powerful effects which can be achieved exclusively via JavaScript. You can explore the same with physics-based animation. The utility of physics in motion design is that interfaces flow naturally from the user’s input, which means, interfaces adhere to how motion works in the real world.
GSAP offers physics plugins which adapt to the constraints of your UI. Velocity offers an easing type which is based on spring physics. Velocity offers an easing type based on spring physics. With the typical easing options, you pass in a named easing type.
5. JavaScript Functions: Scrolling:
Velocity enables the user to scroll the browser to the edge of any element by passing in scroll as Velocity’s first argument (instead of a properties map). The scrollcommand behaves in a similar way to a standard Velocity call; options are taken and they can be queued too. Elements can be scrolled within containers and you can scroll horizontally too.
GSAP has ScrollToPlugin and it offers similar functionality. It automatically relinquishes control when the user interacts with the scroll bar.
6. JavaScript Functions: Reverse:
Velocity and GSAP have reverse commands enabling you to animate an element back to the values prior to its last animation. GSAP enables you to retain a reference to the animation object. Then invoke its reverse()method at any time: var tween = TweenMax.to(element, 1, {opacity:0.5});
tween.reverse();
6. Transform Control:
CSS animation contains all transform components in a single CSS property including scale, transla-tion, rotation and skew. So it cannot be animated independently using different durations. For rich motion design independent control is imperative. Both Velocity and GSAP allow you to animate transform components individually.
So we can come to this conclusion that JavaScript animation has better browser support and more features in comparison to CSS animation. JavaScript provides a more manageable workflow for animation sequences. Most importantly you don’t need to use jQuery for animation with JavaScript libraries, without affecting performance level.
A belief is very much present there in the web development community that if you want to make animations on the web, CSS animation is the only way. Hence several developers abandon JavaScript-based animation. But the reality is that JavaScript-based animation is often as fast as CSS-based animation, sometimes it's faster. JavaScript animation libraries which bypass jQuery actually deliver incredible performance as they avoid DOM manipulation as much as possible. |
These libraries act 20 times faster than jQuery. So if you want to use JavaScript in your UI animations then go through the following facts and steps:
1. JavaScript Use:
CSS animations are definitely convenient if you want to sprinkle property transitions into your style sheets. They deliver fantastic performance out of the box. But when you use CSS transitions to power rich motion design it becomes too difficult to manage all the features.
But in JavaScript, you have an infinite amount of logical control. The key features of JavaScript animation are cross-browser SVG support, physics-based loader animations, timeline control and Bezier translations.
2. Velocity and GSAP:
The two most popular JavaScript animation libraries are Velocity.js and GSAP. These libraries work both with and without jQuery. If they are used with jQuery, then there is no degradation in your performance.
If jQuery is present on your page, you can use Velocity and GSAP just like you would jQuery’s $.animate().
But these two libraries can also work when jQuery is not present on the page. This means you don't need to limit an animation call onto a jQuery element object and you would pass the target element(s) to the animation call by:
/* Working without jQuery */
Velocity(element, { opacity: 0.5 }, 1000); // Velocity
TweenMax.to(element, 1, { opacity: 0.5 }); // GSAP
On the other hand, GSAP uses an object-oriented API design so that you get full control over animations.
3. Working Without jQuery:
Let’s explore querySelectorAll as it will likely be your best weapon if you are into animation without jQuery:
document.querySelectorAll("body"); // Get the body element
document.querySelectorAll(".squares"); // Get all elements with the "square" class
document.querySelectorAll("div"); // Get all divs
document.querySelectorAll("#main"); // Get the element with an id of "main"
document.querySelectorAll("#main div"); // Get the divs contained by "main"
You can simply pass querySelectorAll a CSS selector (the same selectors you would use in your style sheets), and it will return all matched elements in an array. As you're attaching animations to jQuery element objects, you may be wondering how we can chain animations back to back, like this:
$element // jQuery element object
.velocity({ opacity: 0.5 }, 1000)
.velocity({ opacity: 1 }, 1000);
With Velocity, you can just call animations one after another:
/* These animations automatically chain onto one another. */
Velocity(element, { opacity: 0.5 }, 1000);
Velocity(element, { opacity: 1 }, 1000);
If you're animating this way then there is no chance of any performance drawback. This one-Velocity-call-at-a-time process has a huge benefit too like if you’re using promises with your Velocity animations, then you will get an actionable promise object with each Velocity call. In the case of GSAP, there is an expressive object-oriented API which allows you to place your animations in a timeline. It gives you control over scheduling and synchronization.
Animation is an experimental process and you need to play with timing. While CSS transitions are easy to use, they become unmanageable as soon as you attempt to sequence even moderately complex animations. Velocity has its UI pack designed in a way so that it deals with multi-animation complexity, and GSAP offers nestable timelines.
4. JavaScript Functions: Physics:
There are several powerful effects which can be achieved exclusively via JavaScript. You can explore the same with physics-based animation. The utility of physics in motion design is that interfaces flow naturally from the user’s input, which means, interfaces adhere to how motion works in the real world.
GSAP offers physics plugins which adapt to the constraints of your UI. Velocity offers an easing type which is based on spring physics. Velocity offers an easing type based on spring physics. With the typical easing options, you pass in a named easing type.
5. JavaScript Functions: Scrolling:
Velocity enables the user to scroll the browser to the edge of any element by passing in scroll as Velocity’s first argument (instead of a properties map). The scrollcommand behaves in a similar way to a standard Velocity call; options are taken and they can be queued too. Elements can be scrolled within containers and you can scroll horizontally too.
GSAP has ScrollToPlugin and it offers similar functionality. It automatically relinquishes control when the user interacts with the scroll bar.
6. JavaScript Functions: Reverse:
Velocity and GSAP have reverse commands enabling you to animate an element back to the values prior to its last animation. GSAP enables you to retain a reference to the animation object. Then invoke its reverse()method at any time: var tween = TweenMax.to(element, 1, {opacity:0.5});
tween.reverse();
6. Transform Control:
CSS animation contains all transform components in a single CSS property including scale, transla-tion, rotation and skew. So it cannot be animated independently using different durations. For rich motion design independent control is imperative. Both Velocity and GSAP allow you to animate transform components individually.
So we can come to this conclusion that JavaScript animation has better browser support and more features in comparison to CSS animation. JavaScript provides a more manageable workflow for animation sequences. Most importantly you don’t need to use jQuery for animation with JavaScript libraries, without affecting performance level.
Sunday, September 14, 2014
On 6:25 PM by Unknown No comments
So you've used HTML5 and other languages to hack. Now it is PHP's turn. Learn how to do it.
The PHP language can be and is used by many for hacking. You can hack into websites, servers etc. and use simple PHP scripts to do so. Watch these videos to find out more!
1. Password Storage (And Hacking) in PHP by Anthony Ferrara at the PHP Benelux Conference 2013
This video answers questions like how should passwords be stored? Or how will they be attacked? Password storage is a task that every developer has to deal with efficiently.
2. How to create a facebook phishing page
This is a five step process to creating a Facebook phishing page using PHP.
3. Hacking PHP
Did you know you could hack a server with a simple PHP script? This video will show you how to do that.
4. Hacking Websites with SQL Injection
This is how you can hack websites written in PHP using SQL Injection.
5. Hacking (PHP Shell like an Image)
Vulnerabilities in a web application can be used in order to upload malware like shell and hack into a website. This tutorial teaches you how to upload a PHP Shell-like image on a website.
6. Hack Yeah - Simple PHP Honeypot
This video teaches you to create a quite simple honeypot that can be used to log the IP address and hostname of attackers, who are connecting to you.
7. Web Hacking (PHP WebShell Upload)
This is another useful hacking tutorial concerning PHP that you can use.
8. PHP upload form weakness
This is one way you could exploit a server. This will work on any unsecure php upload forms. I used a new tool included in backtrack 5 to evade any antivirus software by encrypting the php backdoor. If you are sucessful, you can then run any command on the targeted server.
The PHP language can be and is used by many for hacking. You can hack into websites, servers etc. and use simple PHP scripts to do so. Watch these videos to find out more!
1. Password Storage (And Hacking) in PHP by Anthony Ferrara at the PHP Benelux Conference 2013
This video answers questions like how should passwords be stored? Or how will they be attacked? Password storage is a task that every developer has to deal with efficiently.
2. How to create a facebook phishing page
This is a five step process to creating a Facebook phishing page using PHP.
3. Hacking PHP
Did you know you could hack a server with a simple PHP script? This video will show you how to do that.
4. Hacking Websites with SQL Injection
This is how you can hack websites written in PHP using SQL Injection.
5. Hacking (PHP Shell like an Image)
Vulnerabilities in a web application can be used in order to upload malware like shell and hack into a website. This tutorial teaches you how to upload a PHP Shell-like image on a website.
6. Hack Yeah - Simple PHP Honeypot
This video teaches you to create a quite simple honeypot that can be used to log the IP address and hostname of attackers, who are connecting to you.
7. Web Hacking (PHP WebShell Upload)
This is another useful hacking tutorial concerning PHP that you can use.
8. PHP upload form weakness
This is one way you could exploit a server. This will work on any unsecure php upload forms. I used a new tool included in backtrack 5 to evade any antivirus software by encrypting the php backdoor. If you are sucessful, you can then run any command on the targeted server.
Friday, August 22, 2014
On 7:09 AM by Unknown No comments
Comfort in the source code editor is very important for a programmer to be productive.
1. SubEthaEdit
SubEthaEdit is a powerful and lean text editor. And it's the only collaborative one that is a joy to use. By combining the ease of Bonjour with the world's best text collaboration engine, it makes working together not only possible but even fun.(Official Website)
2. Aptana Studio
The world’s most powerful open-source web development IDE just got better. Rebuilt from the ground-up. It's now much faster, customizable and includes new features to help you be more productive. (Official Website)
3. UltraEdit
This is an HTML and HEX editor that can manage advanced Perl, Java, PHP etc. as well.
4. Komodo Edit
This is the FOSS version of the Komodo IDE.
5. Eclipse
This is perhaps the most popular integrated development environment for Java.
6. TextMate
TextMate brings Apple's approach to operating systems into the world of text editors. By bridging UNIX underpinnings and GUI, TextMate cherry-picks the best of both worlds to the benefit of expert scripters and novice users alike. (Official Website)
7. Scriptly
Scriptly is an extensive Windows freeware code editor for writing HTML and programming with PHP. (Official Website)
When it comes to editing source codes, every programmer has his or her own choice. There are a number of options available, but some are more popular than the others. Here are seven of the top source code editors that you can use. |
1. SubEthaEdit
SubEthaEdit is a powerful and lean text editor. And it's the only collaborative one that is a joy to use. By combining the ease of Bonjour with the world's best text collaboration engine, it makes working together not only possible but even fun.(Official Website)
2. Aptana Studio
The world’s most powerful open-source web development IDE just got better. Rebuilt from the ground-up. It's now much faster, customizable and includes new features to help you be more productive. (Official Website)
3. UltraEdit
This is an HTML and HEX editor that can manage advanced Perl, Java, PHP etc. as well.
4. Komodo Edit
This is the FOSS version of the Komodo IDE.
5. Eclipse
This is perhaps the most popular integrated development environment for Java.
6. TextMate
TextMate brings Apple's approach to operating systems into the world of text editors. By bridging UNIX underpinnings and GUI, TextMate cherry-picks the best of both worlds to the benefit of expert scripters and novice users alike. (Official Website)
7. Scriptly
Scriptly is an extensive Windows freeware code editor for writing HTML and programming with PHP. (Official Website)
On 7:05 AM by Unknown No comments
The importance of encryption tools lies in one simple fact. Prevention is better than cure.
File encryption is of paramount importance nowadays. There are various software that you can use in order to ensure proper protection. Here is a list that will help you with that.
1. Folder Lock
This software allows you to encrypt your files and folders by password protecting them. It is one of the best known and most used encryption software.
2. Advanced Encryption Package Pro
This is another well known encryption app, which has encryption, decryption and self-decryption features.
3. SensiGuard
This is a file encryption software that is quite easy to use.
4. SafeHouse Personal Edition
This software uses passwords and strong encryption in order to protect your personal files and folders.
5. SecureIT
This is an Android app that protects your smartphone from malware, performs call intercepts etc.
6. File Encryption XP
This encryption software brings a common folder tree and file lists that makes it easy for users to work with.
7. CryptoForge
Official Description: CryptoForge™ is easy-to-use file encryption software for personal and professional data security. It allows you to protect the privacy of sensitive files, folders, or email messages, by encrypting them with up to four strong encryption algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network -like the Internet- and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest encryption available today into the Windows environment.
8. Dekart Keeper
This software is designed to be easy-to-use and helps in memorising your strong passwords etc.
9. SafeBit Disk Encryption
Compatible with all 64-bit platforms, this software also provides command line functions.
10. KetuFile
This is an encryption software that works only on Windows and can be used to encrypt files. Encrypted files can not be opened without the 'secret key', which is known to the user alone.
11. GNU Privacy Guard
From the website: GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880. GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.
12. TrueCrypt
TrueCrypt is a very widely used encryption tool that creates a virtual encrypted disk within a file and mounts it as a real disk.
13. AES Crypt
Official Description:AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.
14. AxCrypt
Official Description: AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files.
File encryption is of paramount importance nowadays. There are various software that you can use in order to ensure proper protection. Here is a list that will help you with that.
1. Folder Lock
This software allows you to encrypt your files and folders by password protecting them. It is one of the best known and most used encryption software.
2. Advanced Encryption Package Pro
This is another well known encryption app, which has encryption, decryption and self-decryption features.
3. SensiGuard
This is a file encryption software that is quite easy to use.
4. SafeHouse Personal Edition
This software uses passwords and strong encryption in order to protect your personal files and folders.
5. SecureIT
This is an Android app that protects your smartphone from malware, performs call intercepts etc.
6. File Encryption XP
This encryption software brings a common folder tree and file lists that makes it easy for users to work with.
7. CryptoForge
Official Description: CryptoForge™ is easy-to-use file encryption software for personal and professional data security. It allows you to protect the privacy of sensitive files, folders, or email messages, by encrypting them with up to four strong encryption algorithms. Once the information has been encrypted, it can be stored on insecure media or transmitted on an insecure network -like the Internet- and still remain secret. Later, the information can be decrypted into its original form. CryptoForge integrates the strongest encryption available today into the Windows environment.
8. Dekart Keeper
This software is designed to be easy-to-use and helps in memorising your strong passwords etc.
9. SafeBit Disk Encryption
Compatible with all 64-bit platforms, this software also provides command line functions.
10. KetuFile
This is an encryption software that works only on Windows and can be used to encrypt files. Encrypted files can not be opened without the 'secret key', which is known to the user alone.
11. GNU Privacy Guard
From the website: GnuPG is the GNU project's complete and free implementation of the OpenPGP standard as defined by RFC4880. GnuPG allows to encrypt and sign your data and communication, features a versatile key management system as well as access modules for all kinds of public key directories. GnuPG, also known as GPG, is a command line tool with features for easy integration with other applications. A wealth of frontend applications and libraries are available. Version 2 of GnuPG also provides support for S/MIME.
12. TrueCrypt
TrueCrypt is a very widely used encryption tool that creates a virtual encrypted disk within a file and mounts it as a real disk.
13. AES Crypt
Official Description:AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.
14. AxCrypt
Official Description: AxCrypt is the leading open source file encryption software for Windows. It integrates seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual files.
Subscribe to:
Posts (Atom)
Search
Popular Posts
-
The importance of encryption tools lies in one simple fact. Prevention is better than cure. File encryption is of paramount importance...
-
This is the age of connectivity. We randomly switch from smartphone to tablet to computer many times every single day, so much so that some...
-
Looking for a free ebooks on some topic? Your search ends here with these websites.. When looking for free ebooks, there are many reso...
-
Hi friends some of the viewers had messaged me to give hacking books so that they can learn every thing offline.So here i am providing with...
-
The following keyloggers are handy tools for hacking/surveillance. Keylogger is basically a surveillance software that has the capabi...
-
Carrying around an actual computer is now possible since we have USB sticks that you can use to store all the basic utilities you need and ...
-
Hacking tools are available aplenty. Top hackers in the world today recommend hacking tools made for Linux and Windows operating systems. I...
-
Did you know you could use HTML to hack a website? Here's how to do it! Yes folks, you can use HTML to hack a website....
-
While a great deal of time and effort is invested in designing and developing a software, it only takes a few seconds to bring it down on...
-
Whether it is the iPhone, iPad or Android-based systems, building an app quickly is an imperative for developers. Developers often ...
Copy Rights 2014 Himanshu_Teotia. Powered by Blogger.