Ethical Hacking Java How to Build a Spying Tool Using Java Today we are going to build a spying tool using Java. In order to spy on a victim’s computer, we will use two things. Screenshot and voice recording from his microphone. Our basic idea is to capture the screen and voice. And we can inject this malware inside any game or custom software as a […] Written by Farhat Shahir October 2, 2020October 2, 2020 Saving Bookmark this article Bookmarked
username / alphanumeric validation in Laravel Laravel provide a rich set of pre-bult validation rules. If you need to validate alpha – numeric value you can use – alpha The field under validation must be entirely alphabetic characters. alpha_dash The field under validation may have alpha-numeric characters, as well as dashes and underscores. alpha_num The field under validation must be entirely […] Written by Ashiqur Rahman February 11, 2021February 11, 2021 Saving Bookmark this article Bookmarked
github1s One second to read GitHub code with VS Code Github1s stands for One second to read GitHub code with VS Code Today I discovered a small project on GitHub that allows you to easily read a git repository in VSCode without cloning it. Github1s allows you to read a GitHub project with an online version of VSCode. You just need to add 1s after GitHub and press Enter in […] Written by Ashiqur Rahman February 10, 2021February 10, 2021 Saving Bookmark this article Bookmarked
username / alphanumeric validation in Laravel Laravel provide a rich set of pre-bult validation rules. If you need to validate alpha – numeric value you can use – alpha The field under validation must be entirely alphabetic characters. alpha_dash The field under validation may have alpha-numeric characters, as well as dashes and underscores. alpha_num The field under validation must be entirely […] Written by Ashiqur Rahman February 11, 2021February 11, 2021 Saving Bookmark this article Bookmarked
How to Build a Spying Tool Using Java Today we are going to build a spying tool using Java. In order to spy on a victim’s computer, we will use two things. Screenshot and voice recording from his microphone. Our basic idea is to capture the screen and voice. And we can inject this malware inside any game or custom software as a […] Written by Farhat Shahir October 2, 2020October 2, 2020 Saving Bookmark this article Bookmarked
Deploy scalable Laravel app in AWS Written by Ashiqur Rahman July 16, 2020July 16, 2020 Saving Bookmark this article Bookmarked