What is the most common failure of a PC?
Final Results
32%
Mother board
44%
Power supply unit
23%
RAM
1%
HDD
When it comes to repair the most fundamental part of all is what is where and what does it do.
When we lose a file from a drive we usually get a bit stressed, and angry sometimes but things seem to be a bit easy, we have two option to recover the files using the usual methods either a recovery software or unhanding them from the drive the two methods work this way:
The deleted files
The deleted files are the ones deleted accidentally or intentionally with a malicious intent, so if things got this way the choice we have around is to use recovery software and look for the files in the drive as the only choice.
The second and most usually occurring to a lot of us is the virus issue, which hide files from our flash drives and many other file storage devices. The easy way is to use antivirus software with the option to get back the files or use command promote (CMD) an old UI/OS for windows command line with the privilege of an administrator. So how is that done?
First open the CMD by typing CMD in the start button search area or by going to the RUN (Windows + R) option by typing the CMD will work.
Start >>All programs >>Accessories>> Command promote>>Right click >> run as Administrator (Best option).
Then when the CMD appear usually a black screen with texts only, then we type the following commands
The drive latter of the drive you are trying to recover from; then change the directory to it usually E: F: G: something like this.
Then typing this will eventually bring back your files from the hidden world
Attrib –s –h /d /s easy right?
We are not done yet, this command works usually if our system is not infected with the same virus causing it, so we now have to use another windows tool called the TASK MANAGER by pressing the Ctlr+Shift+Esc buttons on the key board then going to the PROCESSES tab and GOOGLING any unusual process names and ending the processes as well as deleting them from the folder they are located in(the usual caliper is the syswin32.exe) Trojan downloader which opens the back door for others like it. Mostly hiding itself in the directory
“C:\\Windows\system32\syswin32.exe”
GOOD LUCK!!!
The deleted files
The deleted files are the ones deleted accidentally or intentionally with a malicious intent, so if things got this way the choice we have around is to use recovery software and look for the files in the drive as the only choice.
The second and most usually occurring to a lot of us is the virus issue, which hide files from our flash drives and many other file storage devices. The easy way is to use antivirus software with the option to get back the files or use command promote (CMD) an old UI/OS for windows command line with the privilege of an administrator. So how is that done?
First open the CMD by typing CMD in the start button search area or by going to the RUN (Windows + R) option by typing the CMD will work.
Start >>All programs >>Accessories>> Command promote>>Right click >> run as Administrator (Best option).
Then when the CMD appear usually a black screen with texts only, then we type the following commands
The drive latter of the drive you are trying to recover from; then change the directory to it usually E: F: G: something like this.
Then typing this will eventually bring back your files from the hidden world
Attrib –s –h /d /s easy right?
We are not done yet, this command works usually if our system is not infected with the same virus causing it, so we now have to use another windows tool called the TASK MANAGER by pressing the Ctlr+Shift+Esc buttons on the key board then going to the PROCESSES tab and GOOGLING any unusual process names and ending the processes as well as deleting them from the folder they are located in(the usual caliper is the syswin32.exe) Trojan downloader which opens the back door for others like it. Mostly hiding itself in the directory
“C:\\Windows\system32\syswin32.exe”
GOOD LUCK!!!
Collection Of CBT Nuggets Course
List of course:-
CCIE
CISSP
Comptia A++
Comptia Linux+
Comptia Network+
Comptia Security+
Exchange 2003 Admin
Isa Server
Linux RHCE
MCSE 2000
MCSE 2003 Upgrade
Sql 2000
Win Xp
https://vabstutorials.com/collection-of-cbt-nuggets-course/
Share to help us..
List of course:-
CCIE
CISSP
Comptia A++
Comptia Linux+
Comptia Network+
Comptia Security+
Exchange 2003 Admin
Isa Server
Linux RHCE
MCSE 2000
MCSE 2003 Upgrade
Sql 2000
Win Xp
https://vabstutorials.com/collection-of-cbt-nuggets-course/
Share to help us..
Forwarded from Бlаск Нат Наскэѓѕ®
Topic: Android Malware Analysis - From Zero to Hero
Section 1: Introduction
1. Introduction
2. Why Android
Section 2: Android Security Architecture
3. Android Platform
4. Android Security Architecture
5. Android Security Features
6. Google Security Features
Section 3: Mobile App Anatomy
7. Android Application Anatomy
8. APK File Structure
9. DEX File
Section 4: Mobile Malware Types
10. Mobile Malware Types
Section 5: Setup Your Lab
11. Attack Tools Explained
12. Setup Your Kali Lab
Section 6: Acquire Malicious Apps
13. Malware Distribution Mechanism
14. Acquire Malicious Mobile Apps
15. Create a Malicious Mobile App
16. Extract a Mobile App From a Phone
Section 7: Malware Analysis Types
17. Static vs Dynamic Malware Analysis
Section 8: Reverse Engineer a Mobile App
18. Unzip vs Decode
19. Decode and Decompile Android Apps
Section 9: Perform Static Malware Analysis
20. Keyword Search Techniques
21. Dangerous Permissions
22. Analysis of a Spyware APK
23. Analysis of a Stalkware APK
24. Analysis of a Trojan APK
Section 10: Perform Malware Injection
25. Inject Whatsapp Application with Malware
26. Inject a Legit APK and Analyze It
Section 11: Perform Dynamic Malware Analysis
27. Download and Setup an Emulator
28. Dynamic Analysis
29. SSL Interception
Link: https://youtu.be/2vop2MgrBgo
Share to help Us.
Section 1: Introduction
1. Introduction
2. Why Android
Section 2: Android Security Architecture
3. Android Platform
4. Android Security Architecture
5. Android Security Features
6. Google Security Features
Section 3: Mobile App Anatomy
7. Android Application Anatomy
8. APK File Structure
9. DEX File
Section 4: Mobile Malware Types
10. Mobile Malware Types
Section 5: Setup Your Lab
11. Attack Tools Explained
12. Setup Your Kali Lab
Section 6: Acquire Malicious Apps
13. Malware Distribution Mechanism
14. Acquire Malicious Mobile Apps
15. Create a Malicious Mobile App
16. Extract a Mobile App From a Phone
Section 7: Malware Analysis Types
17. Static vs Dynamic Malware Analysis
Section 8: Reverse Engineer a Mobile App
18. Unzip vs Decode
19. Decode and Decompile Android Apps
Section 9: Perform Static Malware Analysis
20. Keyword Search Techniques
21. Dangerous Permissions
22. Analysis of a Spyware APK
23. Analysis of a Stalkware APK
24. Analysis of a Trojan APK
Section 10: Perform Malware Injection
25. Inject Whatsapp Application with Malware
26. Inject a Legit APK and Analyze It
Section 11: Perform Dynamic Malware Analysis
27. Download and Setup an Emulator
28. Dynamic Analysis
29. SSL Interception
Link: https://youtu.be/2vop2MgrBgo
Share to help Us.
Forwarded from Бlаск Нат Наскэѓѕ®
Topic: Hacking Fundamentals: The Complete Nmap No-Nonsense Course
Course content
Section 1: Introduction
1. Introduction
Section 2: Nmap Installation and Setup
2. Install Kali Linux in VirtualBox
3. Install Nmap on MAC OS
4. Install Nmap on Microsfot Windows
5. Install Nmap on Linux (Debian\Ubuntu)
Section 3: Fundamentals
6. Scanning remote hosts and listing open ports
7. Identifying services of a remote hosts
8. Identifying live hosts in local networks
9. Scanning using specific port ranges
10. Specifying network interface for scanning
11. NSE scripts
Section 4: Gathering Information
12. Brute forcing DNS records
13. OS identification of remote hosts
14. UDP Services
15. Identifying protocols on remote hosts
16. Discovering and Identifying Firewalls
17. Identifying services with vulnerabilities
18. Using zombie hosts to spoof origin of ports scans
Section 5: Network Exploration
19. TCP SYN ping scans and host discovery
20. TCP ACK ping scans and host discovery
21. UDP ping scans and host discovery
22. ICMP ping scans and host discovery
23. IP protocol ping scans and host discovery
24. ARP ping scans and host discovery
25. Broadcast ping and host discovery
26. Traffic hiding with random data
3min
27. Information gathering using forced DNS resolution
28. Host exclusion from scanning
29. Broadcast scripts usage for information gathering
Section 6: Web Servers
30. Supported HTTP methods enumeration
31. HTTP proxy check
32. Discovering directories in web servers
33. User account enumeration
34. Detecting XST vulnerabilities
35. Detecting XSS vulnerabilities
36. Check if crawling utilities are allowed on the host
Section 7: Mail Servers
37. Open relay identification
38. SMTP passwords attacks
39. SMTP servers user enumeration
40. Detecting backdoor SMTP servers
41. IMAP servers
42. POP3 servers
Section 8: Large Networks
43. Scanning a range of IP addresses
44. Random target scanning
45. Speeding up time consuming scans
46. Setting nmap timing templates
Section 9: Using Nmap with Python
47. Environment Setup
48. Basic Scan Techniques
Link: https://youtu.be/I2Gt6HzyWDw
Share to help us.
Channel Link: https://bit.ly/39YRQBK
Course content
Section 1: Introduction
1. Introduction
Section 2: Nmap Installation and Setup
2. Install Kali Linux in VirtualBox
3. Install Nmap on MAC OS
4. Install Nmap on Microsfot Windows
5. Install Nmap on Linux (Debian\Ubuntu)
Section 3: Fundamentals
6. Scanning remote hosts and listing open ports
7. Identifying services of a remote hosts
8. Identifying live hosts in local networks
9. Scanning using specific port ranges
10. Specifying network interface for scanning
11. NSE scripts
Section 4: Gathering Information
12. Brute forcing DNS records
13. OS identification of remote hosts
14. UDP Services
15. Identifying protocols on remote hosts
16. Discovering and Identifying Firewalls
17. Identifying services with vulnerabilities
18. Using zombie hosts to spoof origin of ports scans
Section 5: Network Exploration
19. TCP SYN ping scans and host discovery
20. TCP ACK ping scans and host discovery
21. UDP ping scans and host discovery
22. ICMP ping scans and host discovery
23. IP protocol ping scans and host discovery
24. ARP ping scans and host discovery
25. Broadcast ping and host discovery
26. Traffic hiding with random data
3min
27. Information gathering using forced DNS resolution
28. Host exclusion from scanning
29. Broadcast scripts usage for information gathering
Section 6: Web Servers
30. Supported HTTP methods enumeration
31. HTTP proxy check
32. Discovering directories in web servers
33. User account enumeration
34. Detecting XST vulnerabilities
35. Detecting XSS vulnerabilities
36. Check if crawling utilities are allowed on the host
Section 7: Mail Servers
37. Open relay identification
38. SMTP passwords attacks
39. SMTP servers user enumeration
40. Detecting backdoor SMTP servers
41. IMAP servers
42. POP3 servers
Section 8: Large Networks
43. Scanning a range of IP addresses
44. Random target scanning
45. Speeding up time consuming scans
46. Setting nmap timing templates
Section 9: Using Nmap with Python
47. Environment Setup
48. Basic Scan Techniques
Link: https://youtu.be/I2Gt6HzyWDw
Share to help us.
Channel Link: https://bit.ly/39YRQBK
YouTube
Hacking Fundamentals: The Complete Nmap No-Nonsense Course
Topic: Hacking Fundamentals: The Complete Nmap No-Nonsense Course
Course content
Section 1: Introduction
1. Introduction
Section 2: Nmap Installation and Setup
2. Install Kali Linux in VirtualBox
3. Install Nmap on MAC OS
4. Install Nmap on Microsfot Windows…
Course content
Section 1: Introduction
1. Introduction
Section 2: Nmap Installation and Setup
2. Install Kali Linux in VirtualBox
3. Install Nmap on MAC OS
4. Install Nmap on Microsfot Windows…
Forwarded from Бlаск Нат Наскэѓѕ®
Topic: The Art of Doing Learn the Linux Command Line
Course content
Section 1: Virtual Box
1. Installing Virtual Box
2. Installing Kali Linux Virtual Machine
Section 2: Entering Terminal Commands: Getting to Know Your Computer
3. whoami, uname
4. ifconfig, ip, and ping
5. df, free, ps, top, kill
Section 3: Navigating the Terminal
6. Changing Directories
7. Important Directories and Looking at What They Contain
8. Editing Files Within a Directory
Section 4: Making and Manipulating Files
9. Making and Manipulating Files
10. Making and Manipulating Directories
11. Knowledge Check Challenge 1: Terminal Navigation and Manipulating Files
Section 5: Searching Through Files
12. Piping and Redirection
13. Searching With Grep
14. Awk: Grabbing Only What You Want
15. Knowledge Check Challenge 2: Piping, Grep, Awk, and Redirecting Output
Section 6: Changing File Permissions and Executing Files
16. What Are Permissions
17. Owner, Group, All Users
18. Changing Permissions and Executing Files
19. Adding to the Sudo Group
20. Knowledge Check Challenge 3: File Permissions, Users, and Groups
Section 7: Installing Software
21. The Advanced Packaging Tool APT
22. Updating Our System and Installing Software
23. Knowledge Check Challenge 4: Installing New Software and Learning How to use it.
Section 8: Compressing and Extracting Files
24. Compressing Files With Gzip
25. Creating Archives with Tar
26. Knowledge Check Challenge 5: Compressing and Extracting Files
Section 9: Basics of Bash Scripting
27. Writing Your First Script With Echo
28. An Introduction to Expansion
29. Parameter and Command Expansion
30. Arithmetic Expansion and Getting User Input
31. Tests and If Statements
32. Looping With For
33. Looping with While and Until
34. Knowledge Check Challenge 6: Bash Scripting
Link: https://youtu.be/T-UwrZPmahc
Share to help us.
Channel Link: https://bit.ly/39YRQBK
Course content
Section 1: Virtual Box
1. Installing Virtual Box
2. Installing Kali Linux Virtual Machine
Section 2: Entering Terminal Commands: Getting to Know Your Computer
3. whoami, uname
4. ifconfig, ip, and ping
5. df, free, ps, top, kill
Section 3: Navigating the Terminal
6. Changing Directories
7. Important Directories and Looking at What They Contain
8. Editing Files Within a Directory
Section 4: Making and Manipulating Files
9. Making and Manipulating Files
10. Making and Manipulating Directories
11. Knowledge Check Challenge 1: Terminal Navigation and Manipulating Files
Section 5: Searching Through Files
12. Piping and Redirection
13. Searching With Grep
14. Awk: Grabbing Only What You Want
15. Knowledge Check Challenge 2: Piping, Grep, Awk, and Redirecting Output
Section 6: Changing File Permissions and Executing Files
16. What Are Permissions
17. Owner, Group, All Users
18. Changing Permissions and Executing Files
19. Adding to the Sudo Group
20. Knowledge Check Challenge 3: File Permissions, Users, and Groups
Section 7: Installing Software
21. The Advanced Packaging Tool APT
22. Updating Our System and Installing Software
23. Knowledge Check Challenge 4: Installing New Software and Learning How to use it.
Section 8: Compressing and Extracting Files
24. Compressing Files With Gzip
25. Creating Archives with Tar
26. Knowledge Check Challenge 5: Compressing and Extracting Files
Section 9: Basics of Bash Scripting
27. Writing Your First Script With Echo
28. An Introduction to Expansion
29. Parameter and Command Expansion
30. Arithmetic Expansion and Getting User Input
31. Tests and If Statements
32. Looping With For
33. Looping with While and Until
34. Knowledge Check Challenge 6: Bash Scripting
Link: https://youtu.be/T-UwrZPmahc
Share to help us.
Channel Link: https://bit.ly/39YRQBK
YouTube
The Art of Doing Learn the Linux Command Line
Topic: The Art of Doing Learn the Linux Command Line
Course content
Section 1: Virtual Box
1. Installing Virtual Box
2. Installing Kali Linux Virtual Machine
Section 2: Entering Terminal Commands: Getting to Know Your Computer
3. whoami, uname
4. ifconfig…
Course content
Section 1: Virtual Box
1. Installing Virtual Box
2. Installing Kali Linux Virtual Machine
Section 2: Entering Terminal Commands: Getting to Know Your Computer
3. whoami, uname
4. ifconfig…