UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
The first batch of Wi-Fi 6E router devices was introduced by TP-Link.
#Technologies
Forwarded from UNDERCODE NEWS
Amazon buys a fleet of airlines to autonomously deliver.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2021 FREE & LEGIT :

Day 1 - A Christmas Crisis
Day 2 - The Elf Strikes Back
Day 3 - Christmas Chaos
Day 4 - Santa's watching
Day 5 - Someone stole Santa's gift list!
Day 6 - Be careful with what you wish on a Christmas night
Day 7 - The Grinch Really Did Steal Christmas
Day 8 - What's Under the Christmas Tree?
Day 9 - Anyone can be Santa!
Day 10 - Don't be Elfish!
Day 11 - The Rogue Gnome
Day 12 - Ready, set, elf.
Day 13 - Coal for Christmas
Day 14 - Where's Rudolph?
Day 15 - There's a Python in my stocking!
Day 16 - Help! Where is Santa?
Day 17 - ReverseELFneering
Day 18 - The Bits of the Christmas
Day 19 - The Naughty or Nice List
Day 20 - PowershELlF to the rescue
Day 21 - Time for some ELForensics
Day 22 - Elf McEager becomes CyberElf
Day 23 - The Grinch strikes again!
Day 24 - The Trial Before Christmas

https://github.com/flyme2bluemoon/thm-advent

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Due to a harmful flaw, LG is planning a major recall of its smart TVs in Russia.
#International
Forwarded from UNDERCODE NEWS
The designer of "Gosoblak" acquired by VTB is searching for 2.5 billion Intel servers.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” How to add and remove GPG key on Ubuntu:

A) )What is a GPG key?
The G) is free software that provides cryptographic protecGPG key (which stands for Gnu Privacy Guard, aka GnuPtion of sensitive data and authentication.

It allows users to communicate securely using public key cryptography.

B ) ) How does a GPG key work in a repository?
All packages are signed with an accompanying private / public key pair.

The user's private key is kept secret and the public key can be shared with anyone the user wants to communicate with.

Each time you add a new repository to your system, you must also add the repository key so that the APT Package Manager trusts the newly added repository.

Once you've added the repository keys, you can ensure that you get the packages from a trusted source.

C ) ) How do I list the keys of a repository?
apt-key is used to manage the list of keys used by apt to authenticate packages.

Trusted keys are stored in the following locations:

/etc/apt/trusted.gpg - a bunch of local trusted keys, new keys will be added here.
/etc/apt/trusted.gpg.d/ - File fragments for trusted keys, additional keychains can be stored in this location.
Use the following command to list the trusted keys with figprints:

$ sudo apt-key list


/etc/apt/trusted.gpg

D ) ) How do I delete repository keys?
You can delete the repository key if it is no longer needed or the repository has already been removed from the system.

It can be removed by entering the fully quoted key as shown below (which has a hexadecimal value of 40 characters).

$ sudo apt-key del "D320 D0C3 0B02 E64C 5B2B B274 3766 2239 8999 3A70"
OK
Alternatively, you can remove the key by entering only the last 8 characters.

$ sudo apt-key del 89993A70
OK
After removing the repository key, run the apt command to update the repository index.

$ sudo apt update
You can verify that the above GPG key has been removed by running the following command.

$ sudo apt-key list

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
HACK/CVE/NEWS... AND MORE
Forwarded from UNDERCODE NEWS
The attack mechanism becomes more nuanced and delicate with Rockybot upgraded.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ” Windows security tips for people who use multiple devices at the same time:

1) Safe Wi-Fi in your home. This may seem like an easy task to some, but insecure or simple passwords in your home are a major problem that you can face day after day. The defaults are a bad idea in any advanced community. So make sure you change the default settings or ask your local professional to help you with this. When this is done, make sure the invited expert does not know your WPA2 password, so cover your keyboard while you set it. Remember that you are only responsible for providing the password to those you choose to trust.

2) Consider a VPN. Once you implement a virtual private network (VPN), your work from home is likely much safer. Identity thieves and hackers are more likely to extract your identity from outgoing traffic, so filtering is a good idea. Do not connect your devices to a VPN, as this makes your settings vulnerable and easier to hack.

3) Keep your devices locked. Data is largely stolen and re-hashed via insecure devices that are used without any passwords or security software. Any security, such as passwords, fingerprints, templates, or graphical passes, reduces the risk of data disclosure. However, be careful with facial recognition software as you can likely run into problems in financial operating systems when your face is imprinted on the system. Remember, your devices know what you look like, so use fingerprints.

4) Protect your smart TVs and smartphones with additional software. They are the most insecure and can reveal your personal information. This approach is absolutely unacceptable. However, you cannot let others spy on you through their devices. Look out for sophisticated antivirus software that allows you to use browser extensions, smartphone apps, and security gateways for your IoT environment.

5) Enhance your knowledge. Explore as many options as possible of how the Internet of Things is attacked daily by hackers and identity thieves. Improve your information security competencies. Be knowledgeable about internet security and remember that your interconnected gadgets are your weakness. As Machine Learning (ML) and Artificial Intelligence (AI) become more advanced, consider them as your key weapons against cyber attacks.

6) Don't jailbreak iOS! The latter can be borderline illegal, but be aware. If the system has vulnerabilities, your antivirus software is unlikely to help you. Buy licensed security software if you really want your system to be protected and up to date. Why is the focus on your phone? Because nowadays, you can practically control your entire IoT with it. Therefore, they should be prioritized in your intellectual environment.

7) Choose the best and most comprehensive protection from a trusted antivirus vendor. If you are not sure what features one antivirus has over another, check the comparison of the most important factors. Remember that your antivirus shouldn't be too expensive as there are price reduction options, but at the same time it should have options for all your devices, so if only computer security is offered, this is not enough.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Is personal details been leaked to 1.3 million Hyundai Motor Corporation Russia customers? The Deep Web Post Sales Posts.
#DataBreaches
Forwarded from UNDERCODE NEWS
If leaks of sensitive knowledge happen... After a business, five steps to take.
#CyberAttacks
Forwarded from UNDERCODE NEWS
AI chatbot'Achieved ', the cornerstone of several scandals, is increasing questions regarding the disclosure of personal knowledge.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ” Monitoring Linux system resources with SAR (System Activity Report) ::

πŸ” Installing Bashtop - Monitoring Resources From Terminal For Linux | macOS | FreeBSD

SAR or System Activity Report is used to monitor Linux system resources.

It can be used to generate reports related to system performance, i.e. CPU reports, memory reports, disk reports, etc.

πŸ” Installing Sensu Go Monitoring Tool on CentOS 8 / RHEL 8

It stores reports as logs on your system.

In this guide, we will learn about system resource monitoring with SAR with some examples, but first, we will install SAR on our system.

πŸ” Installing and Configuring Checkmk on CentOS 8 and Monitoring Linux Hosts with Checkmk Agent

Installation
The SYSSTAT package is required to install the SAR utility on a system.
To install sysstat, run:
$ yum install sysstat
Now start and enable the sysstat service to start using SAR,
$ systemctl start sysstat
$ systemctl enable sysstat
After activating the service, log files for the current day will be created in the β€œ/ var / log / sa” folder in the β€œsa15” file, where 15 is the current date.

Older files will be archived.

We can also change the number of days for which we keep our log files by changing the "HISTORY" parameter in the sysstat configuration file, for example, "/ etc / sysconfig / sysstat".

SAR utility syntax
The syntax for using sar is:

$ sar option interval (in seconds) number of records
An example would be:
$ sar 2 5
In this example, sar will provide a report generated at 2 second intervals with a total of 5 records.
Examples of SAR use
Generating a CPU report
Sar command to generate CPU report:

$ sar -u 2 5
Generating a memory report
The parameter used with sar to generate a memory report is "-r"
$ sar -r 2 5
Generating device statistics
The device report generation option is "-d" and it is used with "-p" to make the report in a readable format,

$ sar -d -p 2 5
Generating a SWAP Usage Report
Ability to generate a SWAp memory report for the system - "-S",

$ sar S 2 5

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁