UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
The value of Robles is equivalent to $30 billion, beating Ubisoft and CDPR.
#International
Forwarded from UNDERCODE NEWS
Many businesses are refuting rumors: the Spring Festival this year will not close.
#International
Forwarded from UNDERCODE NEWS
Samsung’s folding screen will break at low temperatures, causing serious damage.
#Technologies
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑How to configure a host-based intrusion detection system on CentOS?

One of the first security measures that any system administrator wants to deploy on its production server is a mechanism to detect file tampering-criminals tamper with not only file content, but also file attributes.

AIDE (full name "Advanced Intrusion Detection Environment") is a host-based open source intrusion detection system. AIDE checks the integrity of system binary files and basic configuration files by checking the inconsistency of many file attributes. These file attributes include permissions, file types, inodes, number of links, link names, users, user groups, and file sizes. , Block count, modification time, access time, creation time, access control list (acl), SELinux security context, xattrs and md5/sha checksum.

AIDE builds a file attribute database by scanning the file system of a (untampered) Linux server. Then, it checks the file attributes of the server against the database, and then issues a warning if there are any changes to the index file while the server is running. It is for this reason that whenever the system is updated or the configuration file is changed due to legitimate reasons, AIDE must re-index the protected files.

For some customers, their security policy may require some kind of intrusion detection system (IDS) to be installed on the server. But whether the customer requires IDS or not, it is a good practice for system administrators to deploy IDS.

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS
A significant number of cases of loss of external reference connections have been triggered by the Twitter ban on President Trump.
#International
Forwarded from UNDERCODE NEWS
New Apple Products: Guide To What’s Coming Out in April ?
#Technologies
Forwarded from UNDERCODE NEWS
Cisco issued an announcement to refute that it has met all the conditions for completing the acquisition of Acacia.
#Updates
Forwarded from UNDERCODE NEWS
Microsoft is now planning for the Windows 10X Build 20280 version upgrade, which will correct the obstructive flaw.
#Updates
Hi all ! We start another new hacking block, few hours and will start uploading some awesome hacking tutorials, not like the telegram tutorials !

hack.undercode.help
(for now 403, till few hours)
Have a great day everyone !!!😊
Forwarded from UNDERCODE NEWS
Some media broke the news that Bank of Communications was hacked.
#CyberAttacks
Forwarded from UNDERCODE NEWS
In 2024, can Apple really mass-produce? Many analysts lack confidence.
#Technologies