Protected: For Some Special One
There is no excerpt because this is a protected post.
This author has yet to write their bio.Meanwhile lets just say that we are proud admin contributed a whooping 7 entries.
There is no excerpt because this is a protected post.
Lets develop a source code from (android)apk executable : Reverse engineering approach There are 5 steps of cracking any type of android application code. 1. Having an executable(apk) with us. One way to download APK file is, go to google playstore copy the URL of the application and paste it in the urlhttp://apps.evozi.com/apk-downloader/ OR http://downloader-apk.com/ OR http://apkleecher.com/ and […]
step1: For only x64 bit os add support of x86 libraries by executing below commands sudo dpkg –add-architecture i386 sudo apt-get update sudo apt-get install ia32-libs For 32bit os nothing to just : sudo apt-get update step2: Download the android ADT Bundle from google site.extract that zip file to any location then goto adt bulndle […]
LayerSlider Responsive Word LayerSlider Responsive WordPress Slider Plugin Press Slider Plugin LayerSlider Responsive WordPress Slider Plugin
Welcome to WordPress. This is your first post. Edit or delete it, then start blogging!
#ls now check #echo $(ls -l) output of “ls -l” is submitted to echo so echo prints the output so this is will be more useful when we are redirecting the output of one command to another task example 2: #ls -l $(which ifconfig) here o/p of which ifconfig file properties are printed like this
Linux Terminal commands for ninja's.