Skip to main content

Realistic coding..




Wanna write something very personal and yet there are a kabillion chances of anyone else reading it?
Use this code , and write whatever you want to….but only to the one who knows the way to cypher it , otherwise ……….. never mind , here goes-
The Pigpen Cipher was used by Freemasons in the 18th Century to keep their records private. The cipher does not substitute one letter for another; rather it substitutes each letter for a symbol. The alphabet is written in the grids shown, and then each letter is enciphered by replacing it with a symbol that corresponds to the portion of the pigpen grid that contains the letter.
QQQQ

Comments

Popular posts from this blog

Now you can breathe liquid!

DIVE DEEP The recommended absolute limit for recreational SCUBA divers is just 130 feet, and technical dives using Trimix bottom out at 330. Even then, you’ve got less than five minutes at depth before requiring monitored decompression to avoid getting the bends (the not-scary word for when nitrogen dissolves into your tissue under the massive pressure of the water column, is ejected into the bloodstream during ascent, and you die of a brain embolism). Interestingly though, once your body hits its nitrogen saturation limit, it doesn’t matter if you stay down for an hour or a month; your decompression time effectively maxes out. This technique, known as saturation diving, is how recovery divers working on the K-141 Kursk were able to spend hours 300 feet below sea level (amidst 10 atmospheres of pressure) and how the crew in The Abyss were able to do their jobs. LIQUID AIR Perhaps the best-remembered scene from the 1989 Sci-Fi classic The Abyss is when Ed Harris’ chara...

Can I determine if my computer has a key logger installed? – YES!!!

Detecting keyloggers is as simple as looking in the right place (which may or may not be simple depending on your viewpoint). The problem is knowing what to look for and where. What follows is a non-exhaustive few things you could do to check for keylogging modules. Firstly, the obvious easy way to build a keylogger is to use DLL Injection which can be achieved a number of ways. Most of these will result in a DLL showing up as mapped to the process’s address space. Take a look at this picture: What is the topmost entry in that list? It’s a pyd , or python extension, file. I’ve been messing with python-implemented COM servers and as a result, the DLL is loaded into Windows Explorer’s address space. DLL Injection of the keylogging variety will load its DLL into all of the target address spaces – can’t capture everything if you don’t. So one thing to look out for would be strange DLLs you cannot attribute to products whose purpose you know. They’ll show up in this list for...

The era of Minimalism in Web Design

The extraordinary brashness (or rather, brash extraordinariness) of overtly stylized webs with all the bells and whistles on never arouses indifference in their beholder. While some old-school designers continue in their attempt to create websites with spellbinding effects and to adorn their designs with colorful and glossy elements, the advocates of flat designs are growing at a brisk rate. Minimalism may or may not have replaced extravagance in web design as yet, but it is, without doubt, a trend that has only been getting trendier. In its bare bones, you call a design flat or minimal when it gets rid of its stylized and glossy attributes . What’s left is subtle, yet, equally fascinating. However, it has to be done right otherwise it just turns out to be dull. So, you remove the effects like shadows, fancy fonts, multiple colors, and any and all scream-out-loud effects, etc. Flat Designs Is What Everyone Seems To Be Leaning Towards World Baking Day There are reasons to...