- Starting by updating.
sudo apt-get update && sudo apt-get upgrade
- Installing snapd
sudo apt-get install snapd
- Adding some alias that I use
echo "alias cls=clear" >> ~/.bashrc
LETTERS = 'ABCDEFGHIJKLMNOPQRSTUVWXYZ' | |
def encrypt(string, shift=1): | |
''' | |
Caesar Cypher shifts the letters by the given shift, for example, if key=1 | |
then, a becomes b, be becomes c, and c becomes d, etc | |
''' | |
assert 1<=shift<26 |
__author__ = "Anmol Jhamb, https://instagram.com/thetechgeek_" | |
from PIL import Image | |
import os | |
import sys | |
def breakline(): | |
print("*"*50) |
#Using OOP | |
class Employee: | |
def __init__(self, name, salary): | |
self.name = name | |
self.salary = salary | |
def change_salary(self, change, increment=True): | |
if increment: | |
self.salary += change |
The Modern code by which EVERY PROGRAMMER should live, is, "NEVER EVER TRUST USER INPUT, FOR THE WORLD IS FULL OF HACKERS", and in this dedicated post, we'll be talking about UFUV, which also happens to be one of the OWASP Top 10 Vulnerablities. This vulnerability can lead to CSRF, SSRF, XSS, and even DOS attacks!
A few attacking scenarios that I TOTALLY DIDN'T READ FROM GOOGLE and I AM TOTALLY NOT PARAPHRASING.
When a file is uploaded on any server by user interface, there are several things like Filename, File type, File Identifier, File content and File size that are to be checked, the payloads can be embedded in the file name, even the file headers that can be edited by using simple hex editors like Bliss Hex Editor. The file identifier can be fooled by embedding wrong file signatures that can make the code think that the uploaded file is a jpg but the MIME can be crafted to carry the payload. Ev
- Making a bootable USB. This is a repo, I made, which takes care of EVERYTHING for making a Fedora ISO, i.e, downlodads ISO, verifies CHECKSUM, and burns it to USB.
git clone https://github.com/anmolj7/fedora_media_writer_linux.git
cd fedora_media_writer_linux
python3 main.py
- The next part is booting through the usb we just made. For that, just restart your device, and while it's booting, press the combination of keys required to bring the boot menu for your system. It can vary from system to system, for my system, ASUS TUF GAMING, it was, ESC.
- Once in the BootMenu, Select the pendrive we just made :P
There are no steps, really. It already comes installed on Fedora systems, and a person just needs to use the command
flatpak remote-add --if-not-exists flathub https://flathub.org/repo/flathub.flatpakrepo
There are 2 ways to achieve the following goal, one way would be to use the GUI to install Chromium, which is as simple as going to the software Center and Searching for Chromium :P Although, being a programmer, a CLI is always better and prefered to install things.
#include "bits/stdc++.h" | |
using namespace std; | |
typedef unsigned long long ull; | |
typedef long long ll; | |
int main(){ | |
ios_base::sync_with_stdio(0); |