Thursday 29 October 2015

Differences Between Python 2.x and Python 3.x


Other than the differences that the 3.x version is an attempt to clear the desks and reorganize the internal structure of Python language and that 2.x is at the end of it's life cycle, here are the differences between the two major versions of the Python Language.

Python 2.x
Python 3.x
Reached end of life. Support will be discontinued.Is the future of Python and will be supported in future.
Is backward compatibleHas less regards for backward compatibility.
Had a lot of clutter piling up due to unplanned growth and
development of the language.
Has cleaned up the clutter int o a better organised structure
Lacked extensive Unicode supportSupports the Unicode encoding better
Less consistent in it's own bulk due to fragmentationMore consistent and thus easier for newcomers to learn
Extensive library supportSlightly worse library support

Surely, Python 3.x is still a work in progress and it will soon overcome its few counted drawbacks.

Reference: Detailed report on the differences 

Sunday 18 January 2015

Tips for Smartphone Photography

Tips for Smartphone Photography

Whether it is vacations, summers or winters, taking photos never goes out of favourite hobbies of a majority of people. And this trend has only gained more adoption as our dainty smartphones have started to pack more beastly and powerful cameras. So here are some quick tips to churning out the best photos out of your smartphone cameras.


Monday 3 November 2014

Spoofing MAC filters and Captive Portals on Public Wifi Networks

Spoofing MAC filters and Captive Portals on Public WiFi Networks

MAC filters are implemented on the networks to white-list particular devices and restrict access to the access point. At many public internet access points, a Captive Portal service is used to authenticate users. But what this service does to maintain that session is track MAC addresses of the authorised devices. As MAC filters are not inherently implemented in WiFi 802.11 standards, spoofing the captive portals through masked or spoofed MAC addresses is fairly easy. Here is how..

Saturday 25 October 2014

How to know what was used in your PC in your Absense

Today an important trick is going to be unleashed..This trick will help you in your PC’s safety.
You can find what data had been used in your computer in your absence..YES all data.

Sunday 28 September 2014

Deauthorising Everybody on a Wireless Network

De-authorising Everybody on a Wireless Network

Wireless networks have always been the easiest to use, yet they have been the most easily breachable networks. There is a wide array of utilities out there to help one do so. In this tutorial, we will be using Aircrack-ng suite of utilities to deauthorise selected nodes on a WiFi network. Kali Linux comes pre-installed with these utilities, so we would be following this tutorial on this OS. But these utilities are also available for Windows family of OSes, here.

Tuesday 23 September 2014

Sending a Broadcast Message to All Users on a Unix Network

Broadcast a Message on Unix Network !

This is a simple tutorial in the Unix / Linux environment, to broadcast a message to all the users logged into that machine or network. You can even direct the message to a particular user by giving additional options. So here's how it goes.