UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
KonaWiki3 leave millions of users vulnerables against attacks.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to solve the failure of copy and paste function in win10 system ?

What to do if the copy and paste function of win10 system fails

1) First, you need to right-click the blank space of the win10 system taskbar, and click the "Task Manager" item in the pop-up right-click menu.

2) At this time, the Task Manager window will pop up, find the item "Windows Explorer" in the "Process" tab in the window, right-click with the mouse and select "Restart".


3) If you still cannot copy and paste after restarting the Explorer, you can try to open the specified folder according to the path of "C:\Windows\System32" and find out whether there is a "clip" folder, if not, create a new folder and rename it Just "clip".

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Intel is being sold out piece by piece. The company's important business goes to the Chinese

#international
πŸ¦‘Now it's free--Learn Amazon Web Services (AWS): The complete introduction

Sign
up to Amazon Web Services (AWS)

Navigate around the AWS console

Use the command line interface to control AWS

Build a simple AWS serverless system

Build Windows and Linux servers

Create a Wordpress website in 5 minutes!

Be familiar with every service in AWS today

https://www.udemy.com/course/learn-amazon-web-services-the-complete-introduction/
Forwarded from UNDERCODE NEWS
Company is seeking to slow down the pre-installation of Russian gadget apps.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to properly protect sysctl on Linux from spoofing and Syn flooding

1) The sysctl system also helps prevent attacks such as SYN floods and IP spoofing.

It also logs some types of suspect packets - spoofed packets, source routed packets, and forwarded packets.

2) You can change kernel parameters at run time using the sysctl command, or you can make changes to the system configuration file to make these changes more permanent.

3) I want to show you how you can protect sysctl by quickly editing the config file.

This configuration will be as follows:
Disable IP forwarding
Disable packet forwarding
Disable accepting ICMP redirects
Enable protection against incorrect error messages
What you need:

4) Linux
User with sudo privileges
Note: I will be demonstrating an example on Ubuntu Server 18.04, but the process is the same for most Linux distributions.
How to edit sysctl config file
Log into your Linux server or desktop and open a terminal window.

5) In the terminal, enter the command:
sudo nano /etc/sysctl.conf
First required parameter:
# net.ipv4.ip_forward = 1
change to:

net.ipv4.ip_forward = 0
Next line:

# net.ipv4.conf.all.send_redirects = 0
change to:

net.ipv4.conf.all.send_redirects = 0
Find the line:

# net.ipv4.conf.all.accept_redirects = 0
change to:

net.ipv4.conf.all.accept_redirects = 0
Add the following line below that:

net.ipv4.conf.default.accept_redirects = 0
Finally, add the following lines to the end of the file:

net.ipv4.icmp_ignore_bogus_error_responses = 1
net.ipv4.tcp_syncookies = 1
net.ipv4.tcp_max_syn_backlog = 2048
net.ipv4.tcp_synack_retries = 3
net.ipv4.netfilter.ip_conntrack_tcp_timeout_syn_recv = 45

6) The above settings do the following:

Includes protection against incorrect error messages
Enable SYN cookies to prevent the server from dropping connections when the SYN queue is full
Increase SYS queue size to 2048
W akryvayut state SYN_RECV compound pre
Decrease SYN_RECV timeout value to help mitigate SYN flood attack

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Bitcoin stands at 17,000 USD/coin, continuing to hit a new high since January 2018.
#Updates
Forwarded from UNDERCODE NEWS
Hackers bombing famous adult content sites, Mulsmoke campaign.
#CyberAttacks
Forwarded from UNDERCODE NEWS
Among β€œ1,500 information security vulnerabilities in October”… the lowest in the year.
#Analytiques #Vulnerabilities
Forwarded from UNDERCODE NEWS
Apple and Lenovo tech maker fell victim to ransomware.
#Malwares
Forwarded from UNDERCODE NEWS
'ModPipe', a modular backdoor aimed at POS software, was discovered.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TYPES OF FIREWALLS :

1) Firewall Types:
Firewall Package Filtering:
This firewall form tracks TCP packet headers at the level of TCP, and searches for source address, target address, source port, destination port, and protocol. They authorize or disallow packets in compliance with written laws, depending on these information.

Any 80 Allow – this rule tells the firewall to permit any packet from any source to port 80 from any source.

2) Firewall Circuit Level:

The session levels are operated and the links are filtered. They are searching for trustworthy connections and filter dependent on trusted connections right before the packets are transferred.

3) Firewalls application:

Alternatively they are called the Proxy firewall; operate on the server layer, filtering packets of the application level. There are various rules for filtering the data at the proxy. Web servers normally accessed by internet users can be positioned as proxy servers outside the internal network and all connections to the proxy can therefore be directed; the internal network can then be shielded from external links.


4) Firewall state-of-the-art:

This is the firewalls mix. It functions on the Network Layer, filters transport speeds, connections at the session level and applications data. This has a state table with separate links status and a law table. It has a state table. It also tracks the number of sequences to deter related attacks.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
GPU will be the savior of vRAN or Softbank's speculation.
#Technologies