Airtel & Tigo Free Browsing tricks - 2017



Hello guy's whatsapp, i have been receiving messages from most of my Ghanaian readers on how to enjoy free browsing, so since sharing is caring, i think its high i drop this tricks for my Ghanaian readers to enjoy...most people prefer to take money before they give this steps but in  today's article i will be  dropping it for free as you know this blog is for free stuff  so without beating about the bush just follow the steps i'm about to drop and enjoy free browsing on both Airtel & Tigo.

Setps to browse  free on Airtel

 Requirement

  1.Registered Airtel Sim
  2.DriodVPN

Airtel Free Browsing tricks - 2017 


  
  2.  Visit this link DroidVPN.com/signup and create an account

  
  3. Open your DriodVPN app and tap on the navigation bar like below and click on settiings

 
  4. Select connection protocol ->> select TCP
  
  5. Click on Proxy settings and Enable proxy
  
  6. In the proxy server/Host section enter  195.189.123.135
  
  7. Now Enter 3128 as port
  
  8. Click on HTTP headers and insert like below
           
  
  Host: 180.179.103.247/ X-Online-Host:180.179.103.247
                     or
  Host: 180.179.103.247/ X-Online-Host:180.179.103.247
  
  9. Now go back, at the buttom of DriodVPN select any of the sever's and click start 
  
  10. enjoy your free browsing on airtel

 Setps to browse free on Tigo

  Requirement

  1.Registered Tigo Sim
   

 Tigo Free Browsing tricks - 2017 

  
  1. Subscribe to tigo tribe 
  
  2.download Phisphon Pro/handler
  
  3.Select Tunnel Whole Device
  
  4. On your data and click on the Start buttom wait till it connection
  
  5.Enjoy!!
  
  If you find any difficulties in setting up this trick kindly leave a comment below also let us know if this  works for you

How To Use Wireshark Complete Guide



It can be daunting trying to learn how to use a new piece of software, even if you already possess a fair amount of knowledge regarding information technology. And there are few other programs that have such a steep learning curve as Wireshark. In my humble opinion, it’s one of the best packet sniffers and protocol analyzers available, and it’s truly mind blowing how much detailed information it can gather. Believe it or not, a competent Wireshark user can even see personal information that is transmitted in plain text, provided they are using a man-in-the-middle attack or redirecting other users’ traffic via DNS-based attacks. It’s uses are seemingly endless, but before we dig into the inner
workings of this impressive piece of software, we need to lay some groundwork.


What is Wireshark?

Wireshark is a program that has the ability to record and analyze every last bit flowing through a network interface. In the I.T. world, it is sometimes called a protocol analyzer, packet sniffer, packet capture utility, or packet analyzer – and these terms are synonymous and are mostly interchangeable for all but the most anal network engineers.

The tool is actually rather sophisticated and allows network administrators and hackers to capture specific types of traffic. For example, if a network administrator wanted to see which websites and individual computer or group of computers were accessing, then he/she might run a packet capture for only HTTP and DNS traffic. On the other hand, a Wireshark user could choose to capture every single packet flowing over an interface, and the Not only is the software very powerful, but it is open source software that can be used free of charge. If you’re new to networking protocols already, the amount of data that it collects in real time might seem very intimidating. Just remember not to abuse the software, because wiretapping is illegal and it would raise some strange questions if you got caught using it at work, school, or on any network you don’t personally own. But we’re going to dig  a little deeper to show you how to run some captures on your home network.


What is Wireshark Used for?

As mentioned previously, the uses for Wireshark are virtually limitless, and are only bound by the number of protocols and individual computing systems that a hacker or administrator wishes to analyze. But understand that protocol analyzers are a doubled edged sword. Like an inanimate weapon, the choice whether it’s used for good or evil depends on who’s wielding it. Originally, it was created as a tool to allow network engineers to troubleshoot network problems.In addition, it was also used as a security tool. For example, an administrator may wish to verify that security software, such as a VPN tunnel, is truly encrypting data. By capturing the data and sifting through it in Wireshark, an administrator will be able to see if the payload was sent in plain text. The information it collects can also be used to debug network protocols that are invisible to the average user, and that makes it one of the best tools to learn different TCP/IP algorithms and to actually see how these protocols work at a highly technical level. But as you might expect, having all of this information at your
fingertips makes it easy to snoop through users’ data, which is one reason why hackers like it so much. Wireshark will help them uncover information about hosts that isn’t always visible with
other reconnaissance methods. Consider that ping sweeps, which are common and simple
ways to view other active network hosts on a LAN, are fundamentally flawed. A computer system may be configured to drop pings (ICMP packets) or to never respond to ICMP echo requests. This means that a ping sweep may not see all of the hosts and interfaces on a given sub net. However, these systems’ IP addresses and traffic will be visible if an attacker can capture them with Wireshark – especially if they can capture data from a single point of entry/exit over the LAN (like the LAN’s default gateway interface).

Wireshark’s Features




Wireshark is absolutely loaded with features, and there are so many of them that we couldn’t hope to list them all without writing a thick, comprehensive manual. However, at the very least, we can get a
high level understanding of its features as follow:

  • The ability to perform deep inspection on hundreds of network protocols
  •  A three pane packet browsing interfaces
  •  The ability to drill down through the different layers of a packet and display information from the header, various wrappers, and the payload
  •  Multi-platform support that includes Windows, Linux, Solaris, FreeBSD, NetBSD,OS X, among others (e.g. all the major operating system platforms)
  •  Network data that has been captured can be viewed in a convenient GUI or saved in databases that can be queried through the command line
  •  Extremely powerful, flexible, and robust filtering mechanisms that capture or display only select network protocol traffic
  • VoIP features that are able to analyze voice data that will reveal information such as the start time of a call, the stop time of a call, who initiated the call, various protocols information (H323, ISUP, UNISTIM, SIP, MGCP, etc.), the state of the call (call setup info, ringing, in call, canceled, completed, rejected, etc.), and IPaddresses
  • The ability to actually replay a captured VoIP call for select codecs
  • Coding that interfaces well with other file formats such as libpcap, tcpdump, Pcap NG, and many, many others
  • Capture and decompress gzip files on the fly
  •  Read live data from a smattering of types of physical interfaces including Ethernet, Wireless (802.11x), PPP, HDLC, ATM, USB, Bluetooth, Fram Relay, Token Ring, FDDI (Fiber Distributed Data Interface), and others – really just about anything you can imagine
  • Some special case decryption support for several popular protocols including WEP, WPA, WPA2, SSL/TLS, SNMPv3, ISAKMP, and Ipsec
  • The GUI includes a feature to set different types of traffic to different color schemes to more easily sift through and analyze data
  • All of the collected information can be exported to PostScript, CSV files, plain text, or XML
Remember that this certainly isn’t a comprehensive list of its features, but it should give you a good idea just how powerful this tool is and some of its major capabilities. Also understand that in order to use some of the more advanced features (like capturing a VoIP call and listening to the audio contents) is no easy task for a hacking novitiate.Though Wireshark allows you to see this data, you’ll also want to have an understanding of the various networking protocols and how they operate. There’s not really a shortcut or easy way around this, and it just takes some good ‘ol fashioned studying. That said, for some of the more simple tasks, all you need is a simple step by step guide (as we’ll provide you with shortly).

Methods of Capturing User Data


Before we begin our capture, you need to understand that each capture runs on a specified interface. For example, if you wanted to capture all of the traffic through your Ethernet connection, you would need to run a capture on that specific interface. Likewise,to capture wireless packets, you would need to run a capture on an appropriate wireless interface.At this point you might be wondering how attackers use Wireshark to initiate attacks and gather information. After all, what’s the point of running a capture on your system’s local Ethernet interface? In truth, it won’t see any data transmitted by other computers to remote systems such as a public web server. To see such data that is transmitted by other hosts or the target of an attack, the attacker would need to trick the remote system into sending their data to the attacker’s computer, and then forward that data to the intended
destination.

This technique is most commonly facilitated with a man-in-the-middle attack, whereby the hacker tricks a target system into thinking that their MAC address (a layer 2 address), is the default gateway’s address. This is called MAC spoofing, but there are other ways to accomplish the same thing. For example, if an attacker had access to a local subnet’s DHCP server (Dynamic Host Configuration Protocol), they could employ some nasty tricks that leverage DNS.

You see, in a home environment, the default gateway – which is most typically a SOHO wireless router – supplies the DHCP parameters such as the IP addresses, subnet mask, and even the default DNS servers. An attacker could change the DNS parameter to a server that he/she controls. Then, the attacker has supreme control over where a users’ data goes on the Internet. For example, they could insert a bogus DNS record that causes www.google.com to resolve to an IP address of a server or workstation that the attacker also controls.

Then, every time a user sends data to Google, it first travels through the attackers network interface – where they are running a packet capture. Now consider how much data an attacker could gather if they broke into an ISP’s network. ISPs serve hundreds of thousands – even millions – of users every day. An attacker that had illegal access to an interface on an ISP network could run a capture with criteria that tracks all data destined to a certain website, such as www.Facebook.com, in an attempt to harvest login credentials. Though Facebook uses HTTPS to encrypt data, realize that this is only an
example.

Today we’re not going to run a capture that targets a remote system – doing so would be unethical, illegal, and frankly a little too difficult if you’ve never used Wireshark before. So, before we run our first captures, let’s start with the user interface


Understanding the Wireshark Interface

Wireshark for the first time, things can seem to be a little confusing. Before we dig into the the juicy details of how to run a packet capture, let’s first take a moment to familiarize ourselves with the interface. First off, note that I am referring to the latest version, which is Wireshark 2.0.3 (which was made available in 2016)After you have downloaded, installed, and launched the software, you will be presented with the main window. The main menu, which has sections including, file, edit, view, go,capture, analyze, and so forth is the best interface for newbies to use. We’ll just take a
moment to gain a high level understanding of this menu so you’ll know where all of the commands are stored in the interface.

  •  File: allows a user to open, save, print, export, and even merge capture files
  •  Edit: allows a user to set their global preferences, find specific packets, mark or reference packets based on timestamps, and make configurations
  •  View: allows a user to sift through data, indicate color preferences for different types of traffic, and show/collapse packet details through a tree structure
  • Capture: this feature is arguably the most important for novices, because it is here that all captures are started and stopped. In addition, users have the power to edit existing captures
  • Analyze: helps users sort data with display filters, enable/disable protocol dissection, and manipulate certain types of traffic such as TCP streams
  • Statistics: the statistics menu includes features that run statistical computations to generate information such as the total number of packets captured, protocol hierarchy data, and more
  • Telephony: though difficult to use for new users, the telephony menu includes options to help manipulate captured voice traffic
  •  Wireless: naturally, this menu contains tools to help users capture and manipulate 802.11 protocol information
You’ll also notice that there are a myriad of buttons underneath this menu. For now, just be aware that this menu is the best place to start. In my opinion, the most important menu items that new users should be focused on are file, edit, view, and capture – because this will allow a novice to run their first capture, edit some of its settings, save the capture, and view its contents.

Running Your First Capture

Today we’re going to keep things simple. We’re just going to run some simple captures on your own local network that you own and control. For the purposes of this demonstration, you will need the following:

  1. A computer with an Ethernet connection
  2.  A computer in which you have downloaded and installed the GUI version of Wireshark
  3.  Network connectivity (e.g. an IP address, default gateway, Internet connection, etc.)
After you have launched Wireshark, you should notice that there is a list of interfaces under the Capture column. Alternatively, you can use the Capture button in the menu as we discussed previously. Let’s assume that you just clicked on the interfaces name in the Capture column. Doing so would immediately start to record and capture all of the data leaving and entering your Ethernet interface. Even if you don’t have a web browser running, you’ll notice that the screen become
populated with a myriad of information and different colored rows and columns. The data you are seeing is network protocol data, and it’s likely that you never knew all of this was going on in the background. Also note that your computer will continue to monitor and record all of the data flowing through your interface until you stop the capture.


Stopping Your First Capture

You won’t want to let your capture run indefinitely, and by now you likely have more protocol data than you know what to do with. To start analyzing and sifting through the data you have collected, you’ll need to shut down your capture. Look for the fourth button from the left, located just below the View menu, and you’ll see an icon with a white ‘X’ surrounded by a red circle. Alternatively, you can shut down your capture from the Capture menu. Take a few moments to look through the data you’ve collected. If you want, you can begin a new capture and then browse to a website so you can view the details of the HTTP request between your computer and a webserver. Also, you’ll likely see some
familiar protocols like DNS, ARP, and DHCP among others.

Advanced Capture Options


Next, we’re going to take a brief look at how you can fine-tune the parameters of your capture to weed out types of data that you don’t necessarily want to analyze. All you need to do is browse through the Capture menu and then select Options. Then, a dialog box will open that allows you to change various details. Clicking on the Capture Filter option will allow you to only capture certain types of traffic, such as TCP traffic, UDP traffic, or traffic streams that operate on a specific port. For example, to capture only DNS traffic, you would want to filter by port 53. Then, simply rerun the capture again.

Wireshark, Certifications, and Practical Applications

Wireshark is an undoubtedly useful tool with as many uses as you can imagine. And one of it’s uses is helping you pass various certification exams, such as the CEH, Network+, CCNA, and Security+ exams. In fact, Wireshark (and packet sniffers/protocol analyzers in general) are part of many security exams content and questions. For instance, if you hope to pass the Security+ exam, you’re going to need to know what a protocl analyzer is and how it works. And as they say, experience is the best teacher. I would highly recommend downloading a free version of Wireshark and playing around
with it to get an idea of what information it can capture from a networking interface.

But Wireshark isn’t the only method of capturing packets. As a penetration tester, you’re going to need to know how to use several different types of packet capture tools. For example, Cisco ASA’s have a command line utility that allows you to capture traffic on any of the ASA’s networking interfaces. I can’t tell you how many times I ran a packet capture on an ASA to verifiy that certain traffic was or wasn’t passing through the firewall as a means to test and verify the firewall rules were configured appropriately. In addition, Wireshark and other packet capture tools can help you troubleshoot different types of network protocols. As an example, note that I’ve spent time in the past using Wireshark to check a network interface to validate VPN tunnel negotiation and to check
various handshaking processes.

These skills and knowledge are invaluable to a penetration tester, and Wireshark can help you understand how various protocols work on a highly detailed and technical level. If you’re studying for the CCNA exam, being able to actually see protocol packets, such as ARP requests, will help you understand how protocols and computer systems ‘talk’ to each other. Being able to see these processes is critical to your success, because otherwise it all seems like theoretical knowledge that just happens ‘invisibly’ in the background. Furthermore, note that if you get hired for any kind of I.T. security role and you show up on day one without knowing what Wireshark is, you’re likely going to become the victim of a lot of jokes. Your coworkers will laugh you out of the office, and you’ll look
extremely inexperienced. The bottom line is that Wireshark (and similar tools) are used on an extremely frequent basis in the security realm, so you’d better know what your doing before you get hired. I’d highly recommend using Wireshark to pick apart different types of traffic before sitting your exams, too.

Final Thoughts

Wireshark is an incredibly powerful tool used to capture and analyze just about every type of protocol traffic you can think of. It can even be used to verify if your encryption technologies are actually doing their job, or if a configuration error is sending data in plain text. The bottom line is that knowing how to use Wireshark is a critical skill crucial to your success in any security discipline as well as for standard network engineering. Last but not least, it’s a lot of fun to use. You wouldn’t believe all the data that gets passed around between computers in the background, and Wireshark will help lift the veil so you can watch traffic move across an interface in real time.

List Of Android device That Would be Receiving The Android 8.0 Upgrade

Tags


Android 8.0 named Oreo was recently launched and Android phone users are excited and eager to lay their hands on the latest OS. I know you have questions regarding if your device is fit for the latest OS update but don't worry i have that all covered.




 In this post i have compiled a list of smartphones that will be getting the update to Android Oreo Operating System. Kindly note that some smartphone manufacturers made information available regarding the Android 8.0 OS while other manufacturers didn't

 Below is the official list of Android devices that would be receiving the Android 8.0 upgrade as confirmed by manufacturers, other devices would be added to the list soon.

ACER DEVICES:
Acer iconia Talk S
Acer liquid Z6 Plus
Acer Liquid Z6
Acer Liquid X2
Acer Liquid Zest
Acer Liquid Zest Plus


GOOGLE DEVICES:

Google Pixel (Available to download)
Google Pixel XL (Available to download)
Google Pixel 2
Google Pixel C (Available to download)
Google Nexus Player (Available to download)

SAMSUNG DEVICES:
Samsung Galaxy S8(G950F, G950W)
Samsung Galaxy Note 8 (Upcoming)
Samsung Galaxy S8 Plus(G955,G955FD)
Samsung Galaxy S7 Edge(G935F, G935FD, G935W8)
Samsung Galaxy S7(G930FD, G930F, G930, G930W8)
Samsung Galaxy A3( 2017)(A320F)
Samsung Galaxy A5( 2017)(A520F)
Samsung Galaxy A7 ( 2017)(A720F, A720DS)
Samsung Galaxy A8 ( 2017)(A810F, A810DS)
Samsung Galaxy C9 Pro
Samsung Galaxy J7v
Samsung Galaxy J7 Max (2017)
Samsung Galaxy J7 Pro(2017)
Samsung Galaxy J7 Prime(G610F, G610DS, G610M/DS)
Samsung Galaxy A9 (2016)(SM-A9100)
Samsung Galaxy A7 (2016)(A710F, A710DS)
Samsung Galaxy A5 (2016)(A510F, A510F)
Samsung Galaxy A8 (2016)(A810F, A810DS)
Samsung Galaxy Note FE


LG DEVICES:
LG G6( H870, H870DS, US987, All carrier models supported as well)
LG G5( H850, H858, US996, H860N, All carrier models supported as well)
LG V30 (Upcoming)
LG V20(H990DS, H990N, US996, All carrier models supported as well)
LG V10(H960, H960A, H960AR)
LG Nexus 5X (Available to download)
LG Q8
LG Q6
LG X Venture
LG Pad IV 8.0

MOTOROLA DEVICES:
Motorola Moto G5 Plus( XT1684, XT1685, XT1687)
Motorola Moto G5( All Models)
Motorola Moto G4 Plus( All models)
Motorola Moto G4( All models)
Motorola Moto Z( XT1635-03)
Motorola Moto Z2 Play
Motorola Moto Z Play
Motorola Moto Z Style
Motorola Moto Z Force


NOKIA DEVICES
Nokia 3
Nokia 5
Nokia 6
Nokia 8

ONEPLUS DEVICES:

OnePlus 5
OnePlus 3T
OnePlus 3

HUAWEI DEVICES
Huawei P10( VTR-L09, VTRL29, VTR-AL00, VTR-TL00)
Huawei P10 lite (Lx1, Lx2, Lx3)
Huawei Honor 9(AL00, AL10, TL10)
Huawei P8 Lite 2017 (Huawei P9 Lite (2017), Huawei Honor 8 Lite, Huawei Nova Lite, Huawei GR3
(2017)
Huawei Y7 Prime (Controversial)
Huawei Nova 2(PIC-AL00)
Huawei Nova 2 Plus(BAC-AL00)
Huawei Honor 8 Pro
Huawei P10 Plus
Huawei Mate 9 Porsche Design
Huawei Mate 9
Huawei Mate 9 Pro
Huawei Nexus 6P (Available to download)

ASUS DEVICES:
Asus ZenFone 4 (ZE554KL)
Asus ZenFone Pro (ZS551KL)
Asus ZenFone 4 Max (ZC520KL)
Asus ZenFone 4 Max Pro (ZC554KL)
Asus ZenFone 4 Selfie (ZD553KL)
Asus ZenFone 4 Selfie Pro (ZD552KL)
Asus Zenpad Z8s (ZT582KL)
Asus Zenfone Go(ZB552KL)
Asus Zenfone Live(ZB501KL)
Asus Zenfone 3s MaxAsus Zenfone AR
Asus Zenfone 3 Zoom
Asus Zenfone 3 Max
Asus Zenfone 3 Deluxe 5.5
Asus Zenfone 3 Laser
Asus Zenfone 3
Asus Zenfone 3 Ultra
Asus ZenPad Z8s
Asus ZenPad 3s 8.0
Asus ZenPad 3s 10
Asus ZenPad Z10

LENOVO DEVICES:
Lenovo Zuk Edge
Lenovo P2 (Controversial)
Lenovo K6 (Controversial)
Lenovo K6 Note
Lenovo K6 Power
Lenovo Zuk Z2 (Controversial)
Lenovo Zuk Z2 Plus (Controversial)
Lenovo Zuk Z2 Pro
Lenovo A6600 Plus (Controversial)

OPPO DEVICES:
OPPO F3 Plus
OPPO R11
OPPO R11 PlusOPPO Find 9

SONY DEVICES:
Sony Xperia XZ Premium( G8141, G8142)
Sony Xperia L1(G3311, G3312, G3313)(Controversial)
Sony Xperia XZS(G8231, G8232)
Sony Xperia XA1(G3121, G3123, G3125
Sony Xperia XZ( F8331, F8332)
Sony Xperia XA1 Ultra( G3221, G3212, G3223, G3226)
Sony Xperia XA Ultra(Controversial)
Sony Xperia XA(Controversial)
Sony Xperia XA Ultra
Sony Xperia XA
Sony Xperia X Performance
Sony Xperia Z5 Premium(Controversial)
Sony Xperia Z5(Controversial)
Sony X

peria X( F5121, F5122)
Sony Xperia X Compact
Sony Xperia E5(Controversial)

HTC DEVICES:
HTC U11
HTC U Ultra
HTC U Play
HTC Desire 10 Pro
HTC Desire 10 Lifestyle
HTC 10 Evo
HTC 10

XIAOMI DEVICES:
Xiaomi Mi 6
Xiaomi Redmi Note 5 (Upcoming)
Xiaomi Redmi Pro 2 (Upcoming)
Xiaomi Mi 5s
Xiaomi Redmi Note 4
Xiaomi Mi Max
Xiaomi Mi Max 2
Xiaomi Mi 5s Plus
Xiaomi Mi Note 2
Xiaomi Mi Mix
Xiaomi Mi 5X
Xiaomi Redmi 5A

VIVO DEVICES:
VIVO X9 Plus
VIVO X9

YU SMARTPHONE DEVICES
Yu Yunique 2
Yu Yurek Black
Yu Yunicorn
Yu Yureka SYu Yureka Note

ZTE DEVICES:
ZTE Axon 7
ZTE Axon 7 Mini
ZTE Blade V8
ZTE Blade V7
ZTE Axon Pro
ZTE Axon 7s
ZTE Nubia Z17
ZTE Max XL
ZTE Axon Elite
ZTE Axon Mini


Thanks for visiting....more update coming your way.. 

How To Hack Any Android Device Using AndroRAT App Binder



Hello guys, Welcome to another exciting topic for today, In today's article we are going to talk about how to  Hacking Any Android Device Using AndroRAT App Binder,Usually any Android Device can be hacked using Metasploit Meterpreter attack but many people are not aware of that  process as it is not user friendly. But using a simple tool called AndroRAT (Android Remote Administration Tool) it is possible for anyone to hack any Android device. By successfully running this tool, one can retrieve the following information from target Android device.


  • Get contacts (and all theirs information)
  • Do vibrate the phone
  • Get call logs
  • Open an URL in the default browser
  • Get all messages
  • Send a text message
  • Location by GPS/Network
  • Do a toast
  • Monitoring received messages in live
  • Streaming video (for activity based client only)
  • Monitoring phone state in live (call received, call sent, call missed..)
  • Stream sound from microphone (or other sources..)
  • Take a picture from the camera


You can do almost anything with this tool. All you need to do is to install a simple application on target Android device. This application is generated by AndroRAT tool which further can be bind (joined) with any android application for stealth(Anonymity). Once you have installed the deploy package(.apk) on Android device you can control the device anonymously through a user-friendly GUI.

Disclaimer:Controlling others Android Mobile without their permission is illegal. This post is for educational purpose only and never try to misuse it. To prevent these kind of hacks, make sure you read all the app permissions before you install any application.

 

Requirement/Things you'll need


1. AndroRAT (Android Remote Administration Tool), download Here
(Please Turn off Anti-virus and Windows defender, this zip file is not virus but the anti-virus alerts it as virus because it is a Hacking Software).

2.Router Port Forwarder (Only if you are using a wireless router), download from Here

3.An Android device to test the deploy package.

4.A good internet connection.

5.Basic computer knowledge.

6.A bit of patience.

Requirement(for wireless router users)

1.Download the Router Port Forwarder tool from the above link.
2.Install it on you PC and open it.
3.The software automatically detects your router model number and displays it.
4.Now in the "Port forwarding" tab click "Add".
5.In the next window enter the name of the port as you like, leave the protocol as tcp, enter the port you would like to open (Ex. 8080,1234,4444...).
6.And finally the internal ip address.
7.To know your internal IP address open Start > Run, and then enter ncpa.cpl, this opens active network connections.(you must be connected to the internet)
8.Right click on the connected network and click status and then click details.In the details windows check the Ipv4 address, it should be something like 192.168.XX.XX.
9.Note the Ip address for further use. This is your internal ip address.

Note: You should check your internal ip only when you are connected to the internet.


Procedure to create a deploy package


1.Download the AndroRAT Zip and install it. 

2.Download any Android application like Temple run, Subway Surfers with which you would like to bind the hacking application.

3.Open the extracted folder and then run the application AndroRat Binder. 

4.Now in the Ip box enter your internal ip address which you have noted in the prerequisites.(If you don't know your ip address read Requirement(for wireless router users) from step 7.)

5.In the second box enter the port which you have opened in port forwarder tool (only wireless router users, other can enter the port whatever they like).

6.In the third box, browse and select the target application with which you would like to bind the hacking application.

7.Now hit 'Go' and wait for the AndroRat to build the deploy apk. Once the process completes you will find the result application in the same AndroRat folder.

8.Now Install it one any Android device and open it.(Note that the device should have an active internet connection)


Steps to control the Target Android Device

Once you have successfully installed the result apk that was generated by AndroRat, you can control the victim's Android device through a well designed GUI.

1.In the AndroRat folder, again open the AndroRat folder.In that folder you will find a java application named "AndroRat". When you open it for the first time, allow the firewall exception for the application.

2.Now click server at the top and enter the port which you have opened before.

3.Save it and restart the application. Now the application starts listening to the new port.

4.In this application you will find the list of connected devices. Double click the device you would like to access and you see a window with full built-in controls.Note that the target device is listed as long as he is connected to the internet and is using the deploy application created by AndroRat.


Note:If the application does not work and no devices are listed in the AndroRat application, try building just the Hacking application instead of binding it other application.For the users who are using wireless routers, port forwarding is a must.Before trying it on others devices try it on your own Android first.Turn off the Anti-virus before extracting the AndroRat zip which you have downloaded.If possible turn off Firewall too.Make sure you have a Good internet connection

Download VMware Workstation Pro 12.5.7 Latest Full Version With Keys For Free


VMware Workstation 12 is one of the best desktop virtualization applications available.If you need to run an operating system in a virtual machine, VMware Workstation is one of your best options. It is feature packed and offers support for tons of operating systems. VMware is dedicated to updating their applications to support the latest operating systems and hardware, including Windows 10 and USB 3.0.provides power users, system administrators and developers with the necessary capabilities to run and test multiple operating systems on the same computer.To put it more simple,enables you to run multiple virtual machines on your PC, allowing for extensive testing and development of complex networked server-class applications.



Features

Unmatched OS Support for Ultimate Compatibility
Virtual Machine Cross Compatibility
Protect Your Work and Save Tim
Expiring Virtual Machines
Restricted Virtual
Display Powerful 3D Graphics
Ready for High Resolution Displays
Support for the Latest Processors
Create Powerful Virtual Machines
User Interface Improvements
Ready for the Latest Hardware
Ready for the Latest Laptops and Tablet
Leverage the Power of vSphere and vCloud Air
Enhanced Usability and Productivity
Built for Microsoft Windows 10 and More 
Much More


How To Activate

1.Download VMware Workstation Pro 12.5.7 Latest Full Version Below and Install The Program


2.Use Given below  Serial Key To Register the Program

FZ5X2-DKYE2-H88TP-3DQZC-YYUG6
CY54K-0DWEP-H89DZ-F4PGX-YFUZ2
ZG1RK-4PZ94-0809Z-2QQNV-Q62W0
ZC55U-2QXDH-M80AZ-CZQZT-XF8A6
AZ398-8MD53-M81RZ-VPM5X-W7AE2

3.Enjoy VMware Workstation 12.5 Full Version

You can also Download More Keys Below

Thank You! for visiting my blog and don't forget to leave a comment should in case you need more details about this wonderful Article ....your comment always keeps me strong

How To Hack Credit Card(CC) - Beginners Guide



Welcome to my blog, Hope you are good? In my previous article i posted on How To Card And How To Prevent Your Self Rippers and the messages have been receiving  from my readers  are, how they can get or hack Credit Card (CC), Well in today's article i'm going to tell you how you can get someone's Credit Card details (CC), Besides people have their own reasons  why they need or they want to hack Credit Card, To my own opinion  people hack Credit Card for :

  1. Credit Card Scams ( usually used for earning money , some times for shopping )
  2. Credit Card Shop admin Hacking ( just for fun, knowledge, shopping on internet )
Yeah you head me right, but let take them one after the other and explain them into details for better understanding, So without spending much time on this, Let get started.

Note:This Article Is Only For Educational Propose I May Not Be Responsible For Any Damage Cost.

1.Hacking Through Scam

Hacking Through Scam method is usually used to hack for earning money. What happens in this method is you  create a clone page.clone page means copying of the current page and all object on it, and insert a duplicate after the current page.

Mostly hackers Target: its basically eBay.com or paypal.com for general credit cards, or if you want to target any specific cash able bank like regionbank.com then you have to create a clone page for that bank.

What is eBay.com?

Its a shopping site world wide which is used by many of billion people which use their credit cards on eBay. What you need to do is, make a similar page same as eBay and upload it on  a  hosting site which don’t have any law restrictions, try to find hosting in Europe they will make your scam up for long time, and email the users of eBay.


How to get the emails of their users?

Go to Google.com and type “Email Harvestor” or any Email Spider and search for eBay Buyers and eBay Sellers and you will get a long list. That list is not accurate but out of 1000 at least 1 email would be valid. At least you will get one.Well you create a clone page of eBay, and mail the list you create from spider which will ask them to visit the link below and enter your info billing, and the scam page have programmed so  when they enter their Credit Card information it comes directly to your email. In the form page you have PIN required so you also get the PIN number through which you can cash through ATM .
Now if you run eBay  or paypal scam, its up to your luck who’s your victim is. A client of bank of america or of Citibank or of region, its about luck, maybe you get cash able,may be you don’t its just luck, nothing else. Search on google to download a scam site and study it ! (download good one at Bulk Email Software Superstore – Email Marketing Internet Advertising) and create a good email list.And you need to find a mailer (mass sending mailer) which send mass – emails to all emails with the message of updating their account on your scam page ). In from to, use email eBay@reply3.ebay.com  and in subject use : eBay – Update Your eBay Account and in Name use eBay

NOTE: Make sure your hosting remains up or the link in the email you will send, and when your victim emails visit it, it will show page cannot be displayed, and your plan will be failed. Hardest point is to find hosting which remains up in scam. even i don’t find it easily, its very very hard part. Maybe you have contacts with someone who own hosting company and co locations or dedicated he can hide your scam in some of dedicated without restrictions. Finding a good email list (good means = actually users) Your mass mailing software land the emails in inbox of users.



2.Shop admin Hacking

This method is used for testing the knowledge or for getting the credit card for shopping on internet, or for fun, or any way but not for cashing – because you will not get PIN from this method, this  method only gives cc number , cvv2 and other basic information.

Hacking VP-ASP SHOP

I hope you will see whenever you try to buy some thing on the internet with Credit Card (CC), they will show you a very secure, well programmed form. They are carts, like vp-asp xcarts. Specific sites are not hacked, but carts are hacked-able. Below I will be  posting a tutorial on how to hack VP ASP cart. Now every site which use that cart can be hacked, and through their mdb file you can get their clients ’credit card details’, company secrets.

How To Hack VP ASP cart

Type     : VP-ASP Shopping Cart
Version : 5.00


How to find VP-ASP 5.00 sites?

Finding VP-ASP 5.00 sites is very  simple, You first of all Go to google.com and type: VP-ASP Shopping Cart 5.00 You will find many websites with VP-ASP 5.00 cart software installed Now let’s go to the exploit.The page will be like below:

****://***.victim.com/shop/shopdisplaycategories.asp and the The exploit is: diag_dbtest.asp

Now you need to clear shopdisplaycategories.asp from link and replace it with diag_dbtest.asp
like below :
****://***.victim.com/shop/diag_dbtest.asp 

After  going through the above steps a page will pop up contain:
  • xDatabase
  • shopping140
  • xDblocation
  • resx
  • xdatabasetypexEmailxEmail
NamexEmailSubjectxEmailSy
stemxEmailTypexOrdernumbe r

Example:The most important thing here is xDatabase

xDatabase: shopping140, Ok, now the URL will be like this: 

****://***.victim.com/shop/shopping140.mdb
If you didn’t download the Database, try this while there is dblocation:

xDblocation, resx

The url will be: ****://***.victim.com/shop/resx/shopping140.mdb

If you see an  error message you have to try this :
****://***.victim.com/shop/shopping500.mdb

 
Download the mdb file and you should be able to open it with any mdb file viewer, you should be able to find one at download.com, or use MS Office Access.Inside you should be able to find credit card information, and you should even be able to find the admin username and password for the website.The admin login page is usually located here: ****://***.victim.com/shop/shopadmin.asp
Should in case you get an incorrect, or you cannot find the mdb file at all, then try to find the admin login page and 
enter the default passwords which are like below:

Username: admin
password: admin
OR
Username: vpasp
password: vpasp

Five (5) Reasons Why PC Crash



In today's article we are going to learn about one important topic which normally  worry computer user, sometimes you will be using your computer and all you could see on the screen is a blue screen with a pop up message like below

"Your Pc run into a problem and needs to restart.we're just collecting some error info,and then we'ill restart to you.(0% complete)"



Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it from  happening?

Five 5 Reasons Why PC Crash


1. Hardware conflict:


 Number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.For example, a printer usually connects internally on IRQ 7. The keyboard
usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

Start->Settings->Control Panel->System->Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it. Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a sound-card, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.To be fair to Microsoft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.



2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing. But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances
that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble. EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmers.


3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.Once inside the BIOS, great care should be taken. It is a good idea to write  down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display. Microsoft  Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).



4. Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to de-fragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

Start->Programs->Accessories->System Tools->Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is de-fragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.The Task Scheduler should be one of the small icons on the bottom right of the
Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimization. This can be adjusted by going to

Start->Settings->Control Panel->System Icon->Performance->File System->Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

Start->Programs->Accessories->System Tools->Scan Disk
Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

 

5. Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.These can often be resolved easily by reducing the resolution of the video display. Go to

Start->Settings->Control Panel->Display-Settings

Here you should slide the screen area bar to the left. Take a look at the color settings on the left of that window. For most desktops, high color 16-bit depth is adequate If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to 

Start->Settings->Control Panel->System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.The way to resolve a hardware conflict is to un-check  the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.
Another useful way to resolve video problems is to go to

Start->Settings->Control Panel->System->Performance->Graphics
Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).Look up your video card's manufacturer on the internet and search for the most recent drivers for it.


Thank You! for visiting my blog and don't forget to leave a comment should in case you need more details about this wonderful Article ....your comment always keeps me strong

YOU CAN ALSO DONATE BY  GIVING US ANY AMOUNT USING PAYPAL.....THANKS 

How To Subscribe To Vodafone Ekikimi Promotion In Ghana


Good news to all Vodafone users,unfortunate we were enjoying Glo free browsing but it seems not to be working anymore lol, But don't worrying in my article for today i'm going tell you how to subscribe To Vodafone Ekikimi Promotion In Ghana so without wasting much time let get started



What is Vodafone Ekikimi

Vodafone Ekikimi is an ongoing  Promotion by Vodafone In Ghana where by 3 people can use one  Recharge card thrice at the same price. The first user uses the card by dialing the shoot code *134* pin # while the next two users uses  *135*pin #...example 

First user = *134* 674068724536288078 # 

Next two user = *134*674068724536288078 #


Steps To Subscribe To Vodafone Ekikimi Promotion 

With this awesome promotion by Vodafone Ghana you don't  need  any form of Subscription, Just follow the simple steps below and enjoy this awesome promotion from Vodafone Ghana.

  1. Buy a Vodafone (Airtime) Recharge  Card .
  2. And load the (Airtime) Recharge Card Using shoot code *134*pin # 
  3. Give the same used Recharge Card to 2 of your  friends using Vodafone Network 
  4. And have them load the same  used Recharge Card using *135*pin #
  5. They will also enjoy the same Airtime as a top up bonus
  6. Done!!

This is one of the awesome promotion by Vodafone Ghana so far,So for those wondering if it's working, the answer is Yes, its 100% working so don't be left out enjoy  the Ekikimi promotion by Vodafone Ghana.Vodafone power to you!.

Hacking Facebook , Twitter accounts Using WI-FI



Today is yet another day with another awesome trick, and  with this tricks we  will be learning how to hack Facebook , Twitter accounts Using WI-FI. Well i know some might know this awesome trick and they can testify how it works,To those who are new to hacking Facebook and Twitter, Just have a coffee of tea and relax. In today article we are not going to use phishing method !,we will be using an extension called Firesheep .

Monetize your website traffic with yX Media

What is Firesheep ?


Answer by Wikipedia : Firesheep is an extension for the Firefox web browser that uses a packet sniffer to intercept unencrypted session cookies from websites such as Facebook and twitter.The plugin eavesdrops on WI-FI communication listening for session cookies.i guess you now what Firesheep is, so without beating about the bush let's get started.


Hacking Facebook , Twitter accounts Using WI-FI


Note : Only For Educational Propose.>!!!



1. We first need to download Firesheep extension and install it in our Firefox browser you can download Firesheep extension here.


2. After  installing Firesheep extension it will open a sidebar window into your Firefox browser.



3. This  will show all the people who are connected to the unsecured WiFi network.Once they login into your Facebook or twitter account you will get a notification and with a single click you can login into their account.


This whole thing works on the technique of cookie hijacking.Once your session cookie is hacked then anybody can login into your account. These cookies can be easily caputered on unsecured WiFi network.

How to Prevent Your self from hijacking The best way to protect yourself from such a hacking trick is to avoid using your Facebook or twitter accounts on unsecured WiFi networks as it is a security lapse from the websites not on your side.or you can enable safe  browsing in Facebook just go to account settings!










Thank You! for visiting my blog and don't forget to leave a comment should in case you need more details about this wonderful Article ....your comment always keeps me strong

A Brief Look at C++

Tags

Hello Readers, We are still trying our possible best to give some simple tutorials on C++  programming, Without taking much time let get to the main article for today.

A Brief Look at C++ 

This note describes some key aspects of what C++ is and of how C++ has developed over the years. The perspective is that of an experienced C++ user looking at C++ as a practical tool. No attempts are made to compare C++ to other languages, though I have tried to answer some questions that I have often heard asked by Lisp programmers.

Introduction


Like all living languages, C++ has grown and changed over the years. For me, the improvements to C++ have seemed almost glacially slow and inevitable; they are natural developments of C++’s own internal logic and deliberate responses to the experiences of hundred of thousands of users. To many who wanted to use C++ aggressively, this growth has been frustratingly slow and timid. To some who considered C++ only infrequently, the developments have seem like unpredictable lurches into the unknown. To others, C++ has simply been something peripheral about which little concrete was known, but about which a multitude of strange rumors persisted. However you look at it, C++ has developed significantly since its first appearance. As an example, consider a simple function that sorts a container and then counts the number of entries between Dahl and Nygaard:

template int cnt(C& v)
{
sort(c.begin(),v.end());
C::iterator d = find(v.begin(), v.end(), "Dahl");
return count(d, find(d, v.end(), "Nygaard"));
}

A container is seen as a sequence of elements from begin() to end(). An iterator identifies an element
in a container.
This template function will work as described for any container that conforms to the conventions of the C++ standard library with elements that can be compared to string literals. For example:

vector v; // vector of Cstyle
strings
list lst; // list of C++ strings
// ...
int i1 = cnt(v);
int i2 = cnt(lst);

The types vector, list, and string are parts of the standard C++ library.
Naturally, we need not build the string values Dahl and Nyggard into our little function. In fact, it is
easy to generalize the function to do perform an arbitrary action on a range of values of arbitrary types in a container of arbitrary type.

Clearly, this style of programming is far from traditional C programming. However, C++ has not lost
touch with C’s primary virtues: flexibility and efficiency. For example, the C++ standard library algorithm sort() used here is for many simple and realistic examples several times faster than the C standard library qsort() function.

Monetize your website traffic with yX Media

The C++ Standard

C++ is a statically typed general purpose language relying on classes and virtual functions to support
object-oriented programming, templates to support generic programming, and providing low  level
facilities to support detailed systems programming. That fundamental concept is sound. I don’t think this can be proven in any strict sense, but I have seen enough great C++ code and enough successful large-scale projects using C++ for it to satisfy me of its validity.

By 1989, the number of C++ users and the number of independent C++ implementors and tools providers made standardization inevitable. The alternative was to allow C++ to fracture into dialects. In 1995, the ANSI and ISO C++ standards committees reached a level of stability of the language and standard library features and a degree of precision of the description that allowed a draft standard to be issued [Koenig,1995]. A formal standard is likely in late 1996 or early 1997.

During standardization, significant features and libraries were added to C++. In general, the standards
process confirmed and strengthened the fundamental nature of C++ and made it more coherent. A description of the new features and some of the reasoning that led to their adoption can be found in [Stroustrup,1994]. So can discussions of older features and of features that were considered but didn’t make it into C++.


Language Features

Basically Standard C++ is the language described in ‘‘The C++ Programming Language (2nd edition)’’[Stroustrup,1991] with namespaces, run time type information, plus a few minor features added. Among the many minor improvements, the refinements to the template mechanisms are the most significant. Here is one of the classical examples of object-oriented programming in C++:

class Shape {
virtual void draw() = 0:
virtual void rotate(int) = 0;
// ...
};

Class Shape is an abstract class; that is, a type that specifies an interface, but no implementation. Specific types that conforms to that interface can be defined. For example, this defines Circle to be a kind of Shape:

class Circle : public Shape {
Point center;
int radius;
public:
Circle(Point, int); // constructor
void draw();
void rotate(int) { }
// ...
};

We can now manipulate all kinds of shapes through their common interface. For example, this function
rotates a vector of arbitrary Shapes r degrees:

void rotate_all(vector& v, int r)
{
for (int i = 0; i
rotate(r);
}

For each Shape, the appropriate rotate() is called. In particular, if the Shape rotated is a Circle,
Circle::rotate() is called. 
Consider reading Shapes from a stream:
void
user(istream& ss)
{
io_obj* p = get_obj(ss); // read object from stream
if (Shape* sp = dynamic_cast(p)) { // is it a Shape?
sp>
draw(); // use the Shape
// ...
}
else // oops: nonshape
in Shape file
throw unexpected_shape();
}

Here, the dynamic_cast operator is used to check that the objects really are Shapes. Any kind of
Shape, for example a Circle, is acceptable. We throw an exception if an object that is not a Shape is
encountered.

This example is rather trivial. However, the techniques presented and the language features supporting them have been used in the construction of some of the largest and most demanding applications ever built


The Standard Library

The lack of a solid standard library has always been one of C++’s greatest weaknesses. This lack caused a
proliferation of incompatible ‘‘foundation libraries,’’ and diverted novice C++ programmers from getting 
real work done into designing basic library facilities. The latter was particularly nasty because it is far 
harder to design and implement good basic library facilities than using them. This lack of a standard library 
forced many programmers to deal with advanced C++ features before they had mastered the basics.
The facilities provided by the standard library can be classified like this:
  • Basic run time 
    language support (for allocation, RTTI, etc.).
  • The standard C library (with very minor modifications to minimize violations of the type system).
  •  Strings and I/O streams (with support for international character sets and localization).
  •  A framework of containers (such as, vector, list, and map) and algorithms using containers (such as general traversals, sorts, and merges).
  •  Support for numeric computation (complex numbers plus vectors with arithmetic operations, BLASlike and generalized slices, and semantics designed to ease optimization).
The main criteria for including a class in the library was that it would somehow be used by almost every C++ programmer (both novices and experts), that it could be provided in a general form that did not add significant overheads compared to a simpler version of the same facility, and that simple uses should be easy to learn. Essentially, the C++ standard library provides the most common fundamental data structures together with the fundamental algorithms used on them. 
         Every algorithm works with every container without the use of conversions. This framework, conventionally called the STL [Stepanov,1994], is extensible in the sense that users can easily provide containers and algorithms in addition to the ones provided as part of the standard and have these work directly with the standard containers and algorithms.

Tools, Environments, and Libraries

The stability resulting from by the near completion of the standard is causing a boom in work on programming environments, libraries, and tools. Traditionally, much of the effort in the C++ world has been aimed at producing a language that could be used effectively for significant industrial projects even in the absence of advanced tools and environments. This has not stopped excellent C++ tools and environments from appearing, but the evolution of the language has been a significant drag on the C++ implementation and tools communities.

I expect to see really great program development environments to become almost universal over the
next few years. Already, features that people had deemed impossible for C++ are available in shipped products. For example, Sun’s C++ implementation allows you to stop an executing program at a break point,rewrite a function, and restart using the new function. This is something that people using interpreted and dynamically typed languages have taken for granted for decades. However, it is one interesting and significant step towards my goal of a program development environment combining the strengths of a statically typed language with the benefits of a sophisticated environment like the ones usually associated with dynamically typed languages.

       One of the benefits of a large user community is the availability of libraries. By now, there is a bewildering variety of C++ libraries, but the development of libraries have been hampered by both the differences between compilers and by the lack of a standard library. The former problem has led to unnecessary segmentation of the community, and to the emergence of libraries especially designed to allow cross platform development. The latter problem forced library developers to reinvent
basic concepts, such as string and list, over and over again. Though it will takes years to work these problems out of the system, we now have an alternative and can get on with more important and interesting tasks.
       Automatic garbage collection is possibly the issue over which the C and Lisp communities has traditionally been most at odds. The Lisp community was certain that memory management was far too important to leave to users, and the C community was sure that memory management was far too important to leave to the system. C++ takes an intermediate approach. Automatic garbage collection is possible, but not compulsory in C++. Traditionally, this simply meant that C++ programs didn’t use automatic garbage collection, but now both commercial and free garbage collectors for C++ has found their way into non experimental use. The performance of these collectors is respectable, and in particular, far better than the pessimistic predictions that I have repeatedly heard over the years. Even where a garbage collector isn’t used, well designed C++ programs suffer far less from memory management problems than traditional C programs. Memory management is often encapsulated in user defined types so that users don’t have to allocate and deal locate memory directly. In particular, standard containers such as string, vector, and list do their own memory management and provide variable sized data structures.


Programming Styles

C++ is a multi-paradigm language. In other words, C++ was designed to support a range of styles. No single language can support every style. However, a variety of styles that can be supported within the framework of a single language. Where this can be done, significant benefits arise from sharing a common type system, a common tool set, etc. These technical advantages translates into important practical benefits such as enabling groups with moderately differing needs to share a language rather than having to apply a number of specialized languages.

 For starters, C++ supports traditional C style. Other styles emphasize the use of classes, abstract
classes, class hierarchies, and templates to express concepts and relationships between concepts directly, cleanly, and affordably. For example, §1 used generic programming and §2.1 demonstrated abstract classes and class hierarchies.

Much of the work on styles (for example [Kornig,1995b]) and patterns (for example, [Gamma,1994]) in the C++ community has focused on finding ways to express ideas from a variety of languages and systems in a way that can be effectively and efficiently be utilized by C++ programmers writing larger production systems. The emphasis is on effective use of C++’s flexible and extensible static type system.


Thank You! for visiting my blog and don't forget to leave a comment should in case you need more details about this wonderful Article ....your comment always keeps me strong

YOU CAN ALSO DONATE BY  GIVING US ANY AMOUNT USING PAYPAL.....THANKS 

Blogroll