c stuff

we are all fond of c as a programmer .....
we loved it......
i hope all you people watched the movie "matrix"...
here is a c program which displays like a matrix type fall of letters.....
try it...modify it....enjoy it......

falling letters like in the movie matrix

#include
#include
#include
#include

void main()
{
char c,d;
int i,j;
char a[15]={' ','A','D',' ','I','T','Y',' ','A',' ','A','D',' ','I','
'};//here characters are taken as my name
//u can change it to any other characters as yr own name
char far* p;
p=(char far*)0xb0008000;// vga memory address

clrscr();

randomize();
while(!kbhit())
{
delay(0);
for(i=0;i<160;i=i+6)
{
for(int j=0;j<50;j++)
{ *(p+160*j+i+1)=2;
*(p+160*j+i)=a[random(15)];

delay(0);
}
delay(0);
}
delay(200);

for(int k=0;k<10;k++)
{
for(i=0;i<160;i+=6)
{
for(j=0;j<25;j++)
{ c=*(p+160*j+i);
d=*(p+160*(j+1)+i);
*(p+160*(j+1)+i)=c;
c=d;
}
delay(0);
*(p+i)=c;
}
delay(0);
}

}
}

7 comments:

CYBERHACKPROS@GMAIL.COM is a professional hacker that specializes in exposing cheating spouse,and every other hacking related issues. he helps catch cheating spouse by hacking their communications like call, Facebook, text, emails, Skype and many more. i have used this service before and he did a very good job, he gave me every proof i needed to know that my fiancee was cheating. You can contact him on his email CYBERHACKPROS@GMAIL.COM to help you catch your cheating spouse, or for any other hacking related problems, he will definitely help you, he has helped a lot of people, contact him and figure out your relationship status. i wish you the best too call/text

+1 512 605 1256

I sincerely didn’t like the idea, but this is my way of saying thank you to the Quora user that recommended a hacker (CYBERHACKPROS@GMAIL.COM)

I hired him for a very private and difficult matter of helping me hack a my spouse’s phone and social networks and some other personal stuffs and he far exceeded my expectations. which Jeremie, helped me get the info(whatsapp, facebook, text messages, call logs etc) faster and cheaper than I had imagined. The first time we spoke, we had a very long phone consultation in he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. he is a fantastic investigator and a great person. If you need a professional, reliable and efficient hacker, then you should contact this guy ; CYBERHACKPROS@GMAIL.COM
You can also call him or send him a text: +1 512 605 1256 INSTAGRAM:Cyberhackprofessional

My husband was so smooth at hiding his infidelity so I had no proof for months, I was referred to some hacker and decided to give him a try.. the result was incredible because all my cheating husband's text messages, whatsapp, facebook and even phone conversations was wired directly to my cellphone. CYBERHACKPROS@GMAIL.COM helped me put a round-the-clock monitoring on him and I got concrete evidence and he showed me proof..if your spouse is an expert at hiding his cheating adventures contact him via email/phone CYBERHACKPROS@GMAIL.COM or +1 512 605 1256 Tell him i reffered you.He will help you INSTAGRAM:Cyberhackprofessionals


★ HACKING is a broad term Engagement.
It depends on what you want to hack. Mobile device,PC or Website, emails etc
I will brief you through the process of hacking and securing Website since most of the Hackers are after it. All the startup owners or aspirants should know.
In order to hack you need Information hell of alot.
Wanna hack website Or A Database ?

• You need to get it’s Ip addresses, Open Ports,file transfer medium (FTP or SSH),Email addresses,Detecting Insecure code(SQLi & SSH),System architecture ( 64 bit, 32 bit).

• Ok so why do we need these informations???

• Open Ports : If there is an open port that means website is ready to listen connection . Take example of FTP open ports. If it’s open then it can be bruteforced ).

• Tip: Use SSH instead of ftp, it’s secure and encrypted mean when you send files over SSH first thing it does is encrypts your files So even if hacker gain access to your files they will see encrypted files not plain texts.

• Emails? Email is needed for social engineering. With just a one click a backdoor will be installed in your system/browser. There is incredibly powerful software for exploiting that is BEEF pre-installed in kali All you need is to do is send hook.js file to your victim and trick him to click(Which is easy) and BAM start doing evil things.

• Tip : if you type whois http://yourdomain.com in Linux you will find details like Domain registrar email address,phone number his address etc . So when you register your domain and purchase hosting do buy icann protection with it, it does not cost that much. in this way you will be able to protect your info.

• Detecting SQLi vulnerability is easy just write single inverted comma after url php?id=1 Like php?id=1′ if it returns an error .Then It’s ready to be hacked.

• TIP Use PDO instead of Mysqli or Mysql. If you are not familiar with PDO(can also be used with MYSQLi) then make sure you use htmlspecialchars and htmlentities. Example: Lets say you are getting value from browser. Do below thing to make your code secure
if(isset($_POST[“Name”])
{
$name=htmlentities($_POST[“Name”]);
}

This is the least you can do to protect yourself from hackers agianst SQLi.

Sorry i cant go into details here.

Kindly Contact Us For More Details And For ALL Kinds Of Hacking services you desire via Compositehacks @ gmail . com

However Let Me Quickly Brief You About My Team:

• COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives.

★ COMPOSITE HACKS offer BEST quality professional hacking services that can't be matched with other hacker for hire company. Our professional hackers have most advanced hacking technique to hack Facebook, Twitter, Instagram, Email accounts, SmartPhone, Website, Database and many more. Also you can request for customized hack. These days hiring a Legit hacker is difficult. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scammers that are advertising false professional hacking services.

★ Contact Us For Your Desired Hacking Services Via : compositehacks @ gmail . com

★We Treat Every Request With Utmost Confidentiality★


★ HACKING is a broad term Engagement.
It depends on what you want to hack. Mobile device,PC or Website, emails etc
I will brief you through the process of hacking and securing Website since most of the Hackers are after it. All the startup owners or aspirants should know.
In order to hack you need Information hell of alot.
Wanna hack website Or A Database ?

• You need to get it’s Ip addresses, Open Ports,file transfer medium (FTP or SSH),Email addresses,Detecting Insecure code(SQLi & SSH),System architecture ( 64 bit, 32 bit).

• Ok so why do we need these informations???

• Open Ports : If there is an open port that means website is ready to listen connection . Take example of FTP open ports. If it’s open then it can be bruteforced ).

• Tip: Use SSH instead of ftp, it’s secure and encrypted mean when you send files over SSH first thing it does is encrypts your files So even if hacker gain access to your files they will see encrypted files not plain texts.

• Emails? Email is needed for social engineering. With just a one click a backdoor will be installed in your system/browser. There is incredibly powerful software for exploiting that is BEEF pre-installed in kali All you need is to do is send hook.js file to your victim and trick him to click(Which is easy) and BAM start doing evil things.

• Tip : if you type whois http://yourdomain.com in Linux you will find details like Domain registrar email address,phone number his address etc . So when you register your domain and purchase hosting do buy icann protection with it, it does not cost that much. in this way you will be able to protect your info.

• Detecting SQLi vulnerability is easy just write single inverted comma after url php?id=1 Like php?id=1′ if it returns an error .Then It’s ready to be hacked.

• TIP Use PDO instead of Mysqli or Mysql. If you are not familiar with PDO(can also be used with MYSQLi) then make sure you use htmlspecialchars and htmlentities. Example: Lets say you are getting value from browser. Do below thing to make your code secure
if(isset($_POST[“Name”])
{
$name=htmlentities($_POST[“Name”]);
}

This is the least you can do to protect yourself from hackers agianst SQLi.

Sorry i cant go into details here.

Kindly Contact Us For More Details And For ALL Kinds Of Hacking services you desire via Compositehacks @ gmail . com

However Let Me Quickly Brief You About My Team:

• COMPOSITE HACKS is a Team Of Professional HACKERS , a product of the coming together of Legit Hackers from the Dark-Web (pentaguard, CyberBerkut, White Hack and Black Hat,) whose system is a very strong and decentralized command structure that operates on ideas and directives.

★ COMPOSITE HACKS offer BEST quality professional hacking services that can't be matched with other hacker for hire company. Our professional hackers have most advanced hacking technique to hack Facebook, Twitter, Instagram, Email accounts, SmartPhone, Website, Database and many more. Also you can request for customized hack. These days hiring a Legit hacker is difficult. You might get scammed for wrong hacking services or by fake hackers on the Internet. Don't get fooled by scammers that are advertising false professional hacking services.

★ Contact Us For Your Desired Hacking Services Via : compositehacks @ gmail . com

★We Treat Every Request With Utmost Confidentiality★

in need of a professional hacker? i recommend you to contact jorgecyberhack. He can hack any social media ( instagram, gmail, whatsapp, facebook e.t.c.) He helped me get info on my cheating boyfriend. This is a way of saying thanks to him. you can contact him on instagram @ jorge_cole_01 or gmail @ jorgecyberhack@gmail.com. He is fast, efficient, affordable and reliable.Trust me you will not be disappointed

If you need help you can read this.

I had just realised I had made a mistakes at my place of work and these mistakes will get me fired but then my friend introduced me to an organisation of computer geniuses Softtechgeeks@gmail.com that saved my job.

They hacked into the company's data base and helped me correct my mistakes the fun part was that they covered there tracks so well no one knew they were ever in the data base.

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More