What type of language is Python?
Python is capable of scripting, but in general it is a programming language.
How is Python an interpreted language?
An interpreted language is any programming language which is not in machine level code before runtime. Given that, python is an interpreted language.
What is PEP in Python?
PEP in python stands for Python Enhancement Proposal. It is a set of rules that specify and indicate how to format python codes for maximum readability.
What are Python Iterations?
Iterations are objects which can be traversed through or iterated upon.
What is memory managed in python?
Memory management in python is managed by python private heap space. All python objects and data structures are in private heap. The programme does not have access to this private heap. The python interpreter takes care of it instead.
What is named space in Python?
A namespace in python is naming system used to make sure that names are unique to avoid naming conflicts.
What are functions in Python?
A function is a block of code which is executed only when it is called. To define a python function, the “def” keyword is used.
What are Python modules?
Python modules are files containing python codes. These codes can be function, classes or variables. A python module is a file containing executable codes.
Is Python case sensitive?
Yes, python is a case sensitive language.
What are local and global variables in Python?
Global variables are variables declared outside a function. These variables can be accessed by any function in the program.
Local variables are any variable declared inside a function.
BANKING & SAVINGS – NellyVince Blog
Is indentation required in Python?
Identification is necessary for python. It specifies a block of code. All codes within loops, classes, functions are within an identified block. It is usually done using four space characters. If your code is not indented necessarily, it will not execute.
What is init-function?
Init- function is a method or construction in python. This method is automatically called to allocated memory when a new object of a class is created. All classes have the “init” method.
What is Lambda function?
An anonymous function is known as a Lambda function. This function can have any number of parameters but have just one statement.
Example: a = Lambda x, y: X +Y
Print (a(x+y)
What is self in Python?
Self is an instance on an object of a class. In python, this is explicitly included as the first parameter. This is not the case in Java where it is optional. It helps to differentiate between the methods and attributes of a class with local variables. The self-variable in the innit method refers to the newly created object while in the other methods, it refers to the object whose method was called.
What is type conversion?
Type conversion is the conversion of object from one data type to another data type.
Example: int(), float(), set(), list().
How To Become A Great Ethical Hacker
1.Learn Linux, Unix, Windows – You can do this using vmware or any virtual desktop utility.
3. Learn a programming language that’s compatible with all OS – Perl, Python, C, ASM
4. Learn HTML, PHP, JavaScript, ASP, XML, SQL, XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack some programs for serials easy ones like mirc, winzip, winrar or old games.
6. Code a fuzzer for common protocols – ftp, pop3, 80, 8080 – Pick some free software like ftp server, mail server, Apache or IIS webserver or a webserver all-in-one pack or TeamSpeak, Ventrilo, mumble.
7. Code a tool that uses grep to sort out unique code in source codes.
8. Make a custom Iptables, IPsec firewall that blocks all incoming traffic and outgoing traffic and add filters to accept certain ports that your software or scripts use.
9. Pick a kernel in Linux or Unix, also pick a Microsoft OS version lets say Winxp pro sp2 put them on the virtual desktops (VMware) and find and code a new local exploit in those versions, then install a Apache webserver on the Linux/Unix and a IIS webserver on the winxp pro and attempt to find and code a new local reverse tcp shell exploit.
10. Learn Cisco Router and Switch configuration and setup.
11. Learn Checkpoint Setup and Configuration.
12. Learn Wi-Fi scanning, cracking, sniffing.
14. Use your information gathering skills to get all the information off a website like a shop then use the spoof caller-id software or hack your phone to show a new number of the Webserver’s Tech Support number then ring the shop owner and try get the shop site password.
15. Do the same thing but attempt to use a web attack against a site or shop to gain admin access.
16. Once got access upload a shell and attempt to exploit the server to gain root using an exploit you coded not someone else
s exploit.
17. Make your own Linux Distro
18. Use your own Linux Distro or use a vanilla Linux gnome (not kde) keep it with not much graphics so you can learn how to
depend on the terminal and start from scratch install applications that you will only need for a Blackbox (Security test box), make folders for fuzzers, exploits, scanners. Etc. Then load them up with your own scripts and other tools ( By this stage you shouldn’t need to depend on other people’s scripts).
19. Learn macosx and attempt to gain access to a Macosx box whether it be your own or someone’s else.
20. Create a secure home network and
secure your own systems with your own
Security policies and firewall settings.
GIPHY App Key not set. Please check settings
One Comment