mehdiEnglish – grammar

Examples Grammar Explanation infinite:i have considered all of the evidence that you have presentedgerund:having considered all of the evidence that you have presented ما دو نوع فعل داریم : infinite و gerund : infinite = base verb + to => emphasize on subjectgerund = base verb + ing => emphasize on verb appellant => اِپیلنت […]


persian things that you want to say how do we say it hello and thanks a lot because of the time and the  oppotunity you gave me to support my application cause     honostly and seriously i believe the determination of my case wasn’t really fair enough   the officer has mentioned several reasons about […]

python – Charles Severance

a typical processor is designed to ask the “what should i do?” 3,000,000,000 times per second 32 or 64 pins the back of a cpu are instructions a typical Main Memory or RAM our program is working in ram and from there it will tell CPU that what it should do and CPU after processing […]

Useful websites for programmers

When learning CS, there are some useful sites you must know to get always informed to do your technologies even better and learn new things. Here is a non-exhaustive list of massive sites you should visit. This list will get updated as soon as I can get another link, but you can also contribute by […]

how to start hacking?

I’d like to learn how to hack, how do I start? This question has been asked and answered many times. We’ll summarize the opinion of our fellow redditors, but we encourage you check on every thread and read every single answer. Define your interests You really need to decide what area you are interested in. […]

How To Send Fake Mail Anonymously Using SETOOLKIT [Kali Linux]

The information security environment has changed vastly over the years. Now, in spite of having security policies, compliance, and infrastructure security elements such as firewalls, IDS/IPS, proxies, and honey pots deployed inside every organization, we hear news about how hackers compromise secured facilities of the government or ofprivate organizations because of the human element involved […]

restarting modem with CLI

در این مقاله کوتاه نحوه Reboot کردن مودم های UTEL از طریق خط فرمان را بررسی کرده ایم. برای اینکار ما یک اسکریپت ساده با زبان پایتون خواهیم نوشت و آن را به عنوان یک دستور ثبت می کنیم تا از طریق خط فرمان نیز قابل دسترس باشد. و سپس با اجرای دستور زیر می […]

The Ultimate Cracking Guide For Beginners

WHAT IS CRACKING ? As a beginner you need to know what you’re doing and what is cracking about, so basically cracking is finding a combolist ( An email:password or user:password list ) with various methods and then try the combinations in different sites/platform to see if any of them works. The concept behind this is that […]

file transformation with LAN

اتصال دو کامپیوتر به یک دیگر از طریق کابل 1- یک طرف کابل LAN را به کامپیوتر اول و طرف دوم آن را به کامپیوتر دوم متصل کنید.   حالا اتصالات فیزیکیمون برقراره و میریم سراغ تنظیمات نرم افزاری. برای برقراری ارتباط دو کامپیوتر باید به هر دو کامپیوتر به صورت دستی آی پی دهیم […]