Posts

Showing posts from August, 2011

C Program to get day, date and time @linux

/*  * Program to get day, date  and time details  */   #include #include int main() {  time_t t;  char  buf[80];  struct tm *ts;  t=time(0);  ts= localtime(&t);  strftime(buf, sizeof(buf),  "%a %Y-%m-%d %H:%M:%S %Z", ts);  printf("The day, date and  time %s\n", buf);  return 0; } output : The day, date and  time  Mon 2011-08-22 01:54:28 PDT

Kind of malware and Names for malicious code

We commonly come across the security issues while using PC/Smart phones, we commonly call it as virus attack. here is gist of few terms(very few) what are the terms used to explain kind of threats malicious code(malware) is mainly classified based on the ability to self replicate i.e. 1) Self replicating malware          example: Virus, Worms       2) Non-self replicating malware          example: Trojan horse Non-replicating malware typically hide their presence on computer or its malicious function We call as Virus if it attaches to itself to running program and start creating damage to victim, it depends on the execution of the  host program,  at some point of execution Virus hijacks execution of running program and executes the malicious code, which could create panic or cause damage to victim we call as Worm  is program , it will look for victim(computer which is not protected) through network ...

App for turning phone to hacking tool

Android App called “Anti” is designed and developed by an Israeli security firm called Zimperium Anti is kind of Android Network Toolkit. it seems it is collection hacking tools available to test smartphones. full story is available at http://www.itnext.in/content/android-app-turn-your-phone-hacking-tool.html?utm_source=newsletter-core&utm_medium=email&utm_campaign=20110809 courtesy IT NEXT