β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Linux Tutorial Final Part 5:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
MORE ABOUT PERMISSION :@UNDERCODETESTING
1) you You will also notice that there is an s in place of an x ββin the user permission triples. 4
2) This shows that for this particular program, suid and executable bits are set. For this reason, when passwd runs, it will execute on behalf of the root user (with full superuser access), not on behalf of the user who runs it. Because passwd runs with root user access, the / etc / passwd file can be modified without any problems.
γγ
γγsuid / sgid caution note
γγ
3) We saw how suid works, and sgid works the same way. It allows the program to inherit the group ownership of the program instead of the current user's program ownership. Here is some other but important information about suid and sgid. First, suid and sgid occupy the same space as the x bits in the ls -l list. If the x bit is also set, the corresponding bit is represented as s (lowercase). However, if the x bit is not set, it is represented as S (uppercase). Another important note: suid and suid work well in many environments, but improper use of these bits can compromise system security. It is best to use as few "suid" programs as possible. The passwd command is one of the few commands that must use "suid".
γγ
γγChanging suid and sgid
γγ
γ4) settings and removing suid and sgid bits is fairly simple. Here we set the suid bit:
γγ
γγ# chmod u + s / usr / bin / myapp
γγ
γ5) Here we remove the sgid bit from a directory. We will see how the sgid bit affects the directories in the following screens:
γγ
γγ# chmod gs / home / drobbins
γγ
6) γγSo far we have looked at permissions from the perspective of regular files. The situation is a little different when looking at permissions from a directory perspective. Directories use the same permission flags, but they are interpreted to mean slightly different meanings. For a directory, if the "read" flag is set, you can list the contents of the directory; "write" means you can create files in the directory, and "execute" means you can enter the directory and access any subdirectories inside. Without the "execute" flag, file system objects within the directory are not accessible. Without the "read" flag, the file system objects in the directory are not viewable, but as long as someone knows the full path of the object on the disk, they can still access the objects in the directory. Directories and sgid If the "sgid" flag for a directory is enabled, any file system objects created within the directory will inherit the directory's group. This special feature is useful when you need to create a directory tree that is used by a group of people who belong to the same group. Just do this:
γγ
γγ# mkdir / home / groupspace
γγ
γγ# chgrp mygroup / home / groupspace
γγ
γγ# chmod g + s / home / groupspace
π¦Linux Tutorial Final Part 5:
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
MORE ABOUT PERMISSION :@UNDERCODETESTING
1) you You will also notice that there is an s in place of an x ββin the user permission triples. 4
2) This shows that for this particular program, suid and executable bits are set. For this reason, when passwd runs, it will execute on behalf of the root user (with full superuser access), not on behalf of the user who runs it. Because passwd runs with root user access, the / etc / passwd file can be modified without any problems.
γγ
γγsuid / sgid caution note
γγ
3) We saw how suid works, and sgid works the same way. It allows the program to inherit the group ownership of the program instead of the current user's program ownership. Here is some other but important information about suid and sgid. First, suid and sgid occupy the same space as the x bits in the ls -l list. If the x bit is also set, the corresponding bit is represented as s (lowercase). However, if the x bit is not set, it is represented as S (uppercase). Another important note: suid and suid work well in many environments, but improper use of these bits can compromise system security. It is best to use as few "suid" programs as possible. The passwd command is one of the few commands that must use "suid".
γγ
γγChanging suid and sgid
γγ
γ4) settings and removing suid and sgid bits is fairly simple. Here we set the suid bit:
γγ
γγ# chmod u + s / usr / bin / myapp
γγ
γ5) Here we remove the sgid bit from a directory. We will see how the sgid bit affects the directories in the following screens:
γγ
γγ# chmod gs / home / drobbins
γγ
6) γγSo far we have looked at permissions from the perspective of regular files. The situation is a little different when looking at permissions from a directory perspective. Directories use the same permission flags, but they are interpreted to mean slightly different meanings. For a directory, if the "read" flag is set, you can list the contents of the directory; "write" means you can create files in the directory, and "execute" means you can enter the directory and access any subdirectories inside. Without the "execute" flag, file system objects within the directory are not accessible. Without the "read" flag, the file system objects in the directory are not viewable, but as long as someone knows the full path of the object on the disk, they can still access the objects in the directory. Directories and sgid If the "sgid" flag for a directory is enabled, any file system objects created within the directory will inherit the directory's group. This special feature is useful when you need to create a directory tree that is used by a group of people who belong to the same group. Just do this:
γγ
γγ# mkdir / home / groupspace
γγ
γγ# chgrp mygroup / home / groupspace
γγ
γγ# chmod g + s / home / groupspace
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is Xwindows :
Xwindows from a programmer's perspective Full guide :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) X Window System is a window system of Client-Server architecture. It is a necessary graphical interface for modern Unix systems (including Linux, FreeBSD etc.).
2) undercode introduces several important features of the X Window System from the perspective of a programmer, so that readers have a clear X concept before starting to write X applications
2) What is X Window System ?
> Before 1984, many commercial companies began to develop graphical user interfaces (GUIs) for UNIX systems.
> Because the graphics interface specifications developed by each company were inconsistent, and most of the systems developed depended on the use of various companies. Computer systems (Mainframe, Mini Computer, WorkStation, etc.).
> As a result, not only can each graphics interface not communicate with each other, it is more difficult for applications to be executed on multiple systems.
> At the same time, due to different interface specifications, program writing The method will also be different depending on the platform, and programmers are also a lot of trouble.
> It is easy for a user to be familiar with a graphical interface system such as Microsoft Windows or Apple Macintosh, but for programmers, the methods and styles of writing Windows programs and writing Machintosh programs are completely different (because the program sets the interface Inconsistent);
> Furthermore, these window systems are limited to hardware environment and operating system manufacturers. Programs that can be run on the Crosoft Windows platform can neither be executed on the Macintosh nor limited to use in the PC environment. Refers to the program containing the graphical interface program code).
> For this reason, the Massachusetts Institute of Technology (MIT) began the X Window System development plan for the Client-Server architecture.
> The goal of X Window development is to "provide a hardware-independent, unified, and network transparent (Network Transparent) graphical interface environment" so that various operating systems and computer hardware can execute X Window (hardware-independent) programs. The design method is consistent (uniform), and can share X resources on other computers through the network.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is Xwindows :
Xwindows from a programmer's perspective Full guide :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) X Window System is a window system of Client-Server architecture. It is a necessary graphical interface for modern Unix systems (including Linux, FreeBSD etc.).
2) undercode introduces several important features of the X Window System from the perspective of a programmer, so that readers have a clear X concept before starting to write X applications
2) What is X Window System ?
> Before 1984, many commercial companies began to develop graphical user interfaces (GUIs) for UNIX systems.
> Because the graphics interface specifications developed by each company were inconsistent, and most of the systems developed depended on the use of various companies. Computer systems (Mainframe, Mini Computer, WorkStation, etc.).
> As a result, not only can each graphics interface not communicate with each other, it is more difficult for applications to be executed on multiple systems.
> At the same time, due to different interface specifications, program writing The method will also be different depending on the platform, and programmers are also a lot of trouble.
> It is easy for a user to be familiar with a graphical interface system such as Microsoft Windows or Apple Macintosh, but for programmers, the methods and styles of writing Windows programs and writing Machintosh programs are completely different (because the program sets the interface Inconsistent);
> Furthermore, these window systems are limited to hardware environment and operating system manufacturers. Programs that can be run on the Crosoft Windows platform can neither be executed on the Macintosh nor limited to use in the PC environment. Refers to the program containing the graphical interface program code).
> For this reason, the Massachusetts Institute of Technology (MIT) began the X Window System development plan for the Client-Server architecture.
> The goal of X Window development is to "provide a hardware-independent, unified, and network transparent (Network Transparent) graphical interface environment" so that various operating systems and computer hardware can execute X Window (hardware-independent) programs. The design method is consistent (uniform), and can share X resources on other computers through the network.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Server and Client X : (Client-Server Architecture)
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) X-a is the Window the System Configuration] [Client-Server graphical interface system. X Client refers to a variety of applications (word processing, database applications, network software, etc.),
2) while X Server is mainly processing requests from X Client applications and drawing graphics on the screen (so called Display Server ); And is responsible for managing available system resources such as glyphs and screen colors, reading user input (from the keyboard or mouse), and transmitting keyboard, mouse events, and window status information to the X Client (that is, the application).
π¦ X Server and Client X : (Client-Server Architecture)
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) X-a is the Window the System Configuration] [Client-Server graphical interface system. X Client refers to a variety of applications (word processing, database applications, network software, etc.),
2) while X Server is mainly processing requests from X Client applications and drawing graphics on the screen (so called Display Server ); And is responsible for managing available system resources such as glyphs and screen colors, reading user input (from the keyboard or mouse), and transmitting keyboard, mouse events, and window status information to the X Client (that is, the application).
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Protocol :(classed under Client-Server Architecture)
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) In the X Window System, X Server and X Client both use X Protocol to exchange messages.
2) X Protocol defines the message exchange format between X Server and X Client.
3) Regarding the X Protocol, readers will gradually appreciate its existence after contacting more X Programming information. At present, it may be useful to temporarily consider the role of the X Protocol in the X Window System, and imagine the HTTP protocol in the Web Server and Web Client. (Browser) plays the same communication role.
4) A special point in the X Window System is that the X Protocol allows X Server and X Client to exchange messages across the network. This means that X Server and X Client need not be restricted to run on the same machine and can be run on different computers. On the same time.
5) X Server and X Client execute on the same computer
>If you only want to activate the X Server and not run other X Clients, you can just enter the X command to execute it. After the execution, you usually only see a desktop with a gray background (also called RootWindow).
6) For programmers who write X Client, X Client and X Server are executed on different computers, and it does not affect the method of writing programs. Because the X Client obtains the location of the X Server from the environment variable DISPLAY, it is decided during the execution period to which X Server the execution result should be passed. These are because of the use of X Protocol. X Protocol makes the actual location of X Server and X Client (perhaps on the local machine or the network) transparent (the programmer cannot see or need to know) We call this feature "Network Transparent".
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ X Protocol :(classed under Client-Server Architecture)
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) In the X Window System, X Server and X Client both use X Protocol to exchange messages.
2) X Protocol defines the message exchange format between X Server and X Client.
3) Regarding the X Protocol, readers will gradually appreciate its existence after contacting more X Programming information. At present, it may be useful to temporarily consider the role of the X Protocol in the X Window System, and imagine the HTTP protocol in the Web Server and Web Client. (Browser) plays the same communication role.
4) A special point in the X Window System is that the X Protocol allows X Server and X Client to exchange messages across the network. This means that X Server and X Client need not be restricted to run on the same machine and can be run on different computers. On the same time.
5) X Server and X Client execute on the same computer
>If you only want to activate the X Server and not run other X Clients, you can just enter the X command to execute it. After the execution, you usually only see a desktop with a gray background (also called RootWindow).
6) For programmers who write X Client, X Client and X Server are executed on different computers, and it does not affect the method of writing programs. Because the X Client obtains the location of the X Server from the environment variable DISPLAY, it is decided during the execution period to which X Server the execution result should be passed. These are because of the use of X Protocol. X Protocol makes the actual location of X Server and X Client (perhaps on the local machine or the network) transparent (the programmer cannot see or need to know) We call this feature "Network Transparent".
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hack a website using Android (Termux)
t.me/UndercOdeTesting
π¦ REQUIREMENTS:-
1) TERMUX (Available on playstore)
2) SQL MAP ( https://github.com/sqlmapproject/sqlmap/archive/master.zip )
3) FILE MANAGER (per default or ezfile exploret)
π¦ πβπππΈπππππΈπππβ & βπβ:
1) First install all apps from the above links and run them at least once. Download the sqlmap zip file and extract it in sdcard and change its name.
2) After that open Termux and run given command.
> apt update && apt upgrade
3) NOW NEXT STEP,
> pkg install python2
> This command will install Python in your termux. It asks you to install Python. Enter y for installing python2 in your termux.
4) need to findsqlmap.py script in your phone. In order to achieve this, navigate using cd. First you need to access root folder, so first run :cd /
> Then type & hit
> cd sdcard
cd ls
5) It will show all contained files. Now you need to find sqlmap-master (extracted folder).
6) cd sqlmap-master
7) Enter sqlmap-master (above command) two times.
8) If you already changed the name of sqlmap-master *to sqlmap* then you can run,
>cd sqlmap
>cd sqlmap-master
9) You can take help of ls command to list down all files on that location.
10) Navigate to the sqlmap-master folder where the sqlmap.py is stored. Now to run the sqlmap you need following command :
> python2 sqlmap.py
11) If you see this red color sqlmap then relax yourself! You are done with the installation of sqlmap. Now next step is hacking the website using sqlmap. You need to find a website with SQL vulnerability. For this, use sqlmap google dork to find websites.
12) If you are using google dork then type the following:
python2 sqlmap.py -g your_keyword
13) If you want to use direct URL then :
python2 sqlmap.py -u your_url
14) You can refer sqlmap official site for help or just type python2 sqlmap.py -h for Basic help & python2 sqlmap.py -hh for Advanced help.
15) If you want to hack entire site with all database and tables just append -a to the either of the commands
python2 sqlmap.py -g your_keyword or
> python2 sqlmap.py -u your_url
16) In google dork method, it will give you three option :
(a) Yes for attacking first site, which comes in result. For proceeding further, you need to type y. (b) For skipping to the next target you can use n (c)For quitting, use q
17) After that it will start attack on the victim site. Wait until it completes. It may prompt you with the following question, so just simply hit y
18) After that it will show you several tables and other data that it hacked. Donβt worry, you can view it in log when process is done.
19) Now if you want to see all the tables, you need to run following command :
> python2 sqlmap.py -u url βtables
20) It will return all tables name that are already hacked by sqlmap. Now choose the table you want to view by simply entering the following command.
π¦Tested by undercode on rooted android
> any doubt feel free to ask
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
python2 sqlmap.py -u url -T your_table name
20] This command will save your table data and log file in root folder which is not accessible to normal non rooted phone but no worry we have solution this terminal can access so we are going to copy this file to your internal storage for view it with non rooted phone also
cp source //sdcard
21] Just replace the source with source given by terminal in above command it will omit the dump file but donβt worry we donβt need it now navigate to the file using your inbuilt file manager or use ES file manager
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hack a website using Android (Termux)
t.me/UndercOdeTesting
π¦ REQUIREMENTS:-
1) TERMUX (Available on playstore)
2) SQL MAP ( https://github.com/sqlmapproject/sqlmap/archive/master.zip )
3) FILE MANAGER (per default or ezfile exploret)
π¦ πβπππΈπππππΈπππβ & βπβ:
1) First install all apps from the above links and run them at least once. Download the sqlmap zip file and extract it in sdcard and change its name.
2) After that open Termux and run given command.
> apt update && apt upgrade
3) NOW NEXT STEP,
> pkg install python2
> This command will install Python in your termux. It asks you to install Python. Enter y for installing python2 in your termux.
4) need to findsqlmap.py script in your phone. In order to achieve this, navigate using cd. First you need to access root folder, so first run :cd /
> Then type & hit
> cd sdcard
cd ls
5) It will show all contained files. Now you need to find sqlmap-master (extracted folder).
6) cd sqlmap-master
7) Enter sqlmap-master (above command) two times.
8) If you already changed the name of sqlmap-master *to sqlmap* then you can run,
>cd sqlmap
>cd sqlmap-master
9) You can take help of ls command to list down all files on that location.
10) Navigate to the sqlmap-master folder where the sqlmap.py is stored. Now to run the sqlmap you need following command :
> python2 sqlmap.py
11) If you see this red color sqlmap then relax yourself! You are done with the installation of sqlmap. Now next step is hacking the website using sqlmap. You need to find a website with SQL vulnerability. For this, use sqlmap google dork to find websites.
12) If you are using google dork then type the following:
python2 sqlmap.py -g your_keyword
13) If you want to use direct URL then :
python2 sqlmap.py -u your_url
14) You can refer sqlmap official site for help or just type python2 sqlmap.py -h for Basic help & python2 sqlmap.py -hh for Advanced help.
15) If you want to hack entire site with all database and tables just append -a to the either of the commands
python2 sqlmap.py -g your_keyword or
> python2 sqlmap.py -u your_url
16) In google dork method, it will give you three option :
(a) Yes for attacking first site, which comes in result. For proceeding further, you need to type y. (b) For skipping to the next target you can use n (c)For quitting, use q
17) After that it will start attack on the victim site. Wait until it completes. It may prompt you with the following question, so just simply hit y
18) After that it will show you several tables and other data that it hacked. Donβt worry, you can view it in log when process is done.
19) Now if you want to see all the tables, you need to run following command :
> python2 sqlmap.py -u url βtables
20) It will return all tables name that are already hacked by sqlmap. Now choose the table you want to view by simply entering the following command.
π¦Tested by undercode on rooted android
> any doubt feel free to ask
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
python2 sqlmap.py -u url -T your_table name
20] This command will save your table data and log file in root folder which is not accessible to normal non rooted phone but no worry we have solution this terminal can access so we are going to copy this file to your internal storage for view it with non rooted phone also
cp source //sdcard
21] Just replace the source with source given by terminal in above command it will omit the dump file but donβt worry we donβt need it now navigate to the file using your inbuilt file manager or use ES file manager
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How install keepassxc ON uBANTO ?
t.me/UndercOdeTesting
> KeePassXC for Ubuntu 19.10 is a Free Open Source Password Manager, which Helps you to Manage your Passwords in a Secure Way.
> you can put All your Passwords in One Database, which is Locked with One Master Key or a Key File.
> So you only have to Remember One Single Master Password or Select the Key File to Unlock the whole Database.
π¦ the KeePassXC Features:
1) Secure storage of passwords and other private data with AES, Twofish or ChaCha20 encryption
2) Cross-platform, runs on Linux, Windows and macOS without modifications
3) File format compatibility with KeePass2, KeePassX, MacPass, KeeWeb and many others (KDBX 3.1 and 4.0)
4) SSH Agent integration
5) Auto-Type on all supported platforms for automagically filling in login forms
6) Key file and YubiKey challenge-response support for additional security
7) TOTP generation (including Steam Guard)
8) CSV import from other password managers (e.g., LastPass)
9) Command line interface
10) Stand-alone password and passphrase generator
11) Password strength meter
12) Custom icons for database entries and download of website favicons
13) Database merge functionality
14) Automatic reload when the database was changed externally
15) Browser integration with KeePassXC-Browser for Google Chrome, Chromium, Vivaldi, and Mozilla Firefox.
π¦πβπππΈπππππΈπππβ & βπβ:
1) Open a Terminal Shell emulator window
Ctrl+Alt+t on Desktop
(Press βEnterβ to Execute Commands)
2) Adding KeePassXC PPA for Ubuntu GNU/Linux
3) Then to Add KeePassXC Repository for Ubuntu
Execute:
> sudo add-apt-repository ppa:phoerious/keepassxc
And then when needed to Refresh Apt Repos:
> sudo apt update
And for Ubuntu 20.04+ if Missing then Amend it Manually to the previous Release:
> sudo nano /etc/apt/sources.list.d/*keepass*.list
4) So for Instance modify βfocalβ in βeoanβ.
Ctrl+x to Save & Exit from nano.
5) Then Update the Aps Source again.
6) sudo apt install keypassxc
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How install keepassxc ON uBANTO ?
t.me/UndercOdeTesting
> KeePassXC for Ubuntu 19.10 is a Free Open Source Password Manager, which Helps you to Manage your Passwords in a Secure Way.
> you can put All your Passwords in One Database, which is Locked with One Master Key or a Key File.
> So you only have to Remember One Single Master Password or Select the Key File to Unlock the whole Database.
π¦ the KeePassXC Features:
1) Secure storage of passwords and other private data with AES, Twofish or ChaCha20 encryption
2) Cross-platform, runs on Linux, Windows and macOS without modifications
3) File format compatibility with KeePass2, KeePassX, MacPass, KeeWeb and many others (KDBX 3.1 and 4.0)
4) SSH Agent integration
5) Auto-Type on all supported platforms for automagically filling in login forms
6) Key file and YubiKey challenge-response support for additional security
7) TOTP generation (including Steam Guard)
8) CSV import from other password managers (e.g., LastPass)
9) Command line interface
10) Stand-alone password and passphrase generator
11) Password strength meter
12) Custom icons for database entries and download of website favicons
13) Database merge functionality
14) Automatic reload when the database was changed externally
15) Browser integration with KeePassXC-Browser for Google Chrome, Chromium, Vivaldi, and Mozilla Firefox.
π¦πβπππΈπππππΈπππβ & βπβ:
1) Open a Terminal Shell emulator window
Ctrl+Alt+t on Desktop
(Press βEnterβ to Execute Commands)
2) Adding KeePassXC PPA for Ubuntu GNU/Linux
3) Then to Add KeePassXC Repository for Ubuntu
Execute:
> sudo add-apt-repository ppa:phoerious/keepassxc
And then when needed to Refresh Apt Repos:
> sudo apt update
And for Ubuntu 20.04+ if Missing then Amend it Manually to the previous Release:
> sudo nano /etc/apt/sources.list.d/*keepass*.list
4) So for Instance modify βfocalβ in βeoanβ.
Ctrl+x to Save & Exit from nano.
5) Then Update the Aps Source again.
6) sudo apt install keypassxc
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to Install Printer on GNU/Linux Distros
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
Install HP Printer Driver for Debian
1) First Access the Target:
> cd ~/Downloads
2) And Check the Package is there with:
> ls | grep hplip
(But if downloaded with Firefox it may be instead into /tmp/mozilla*)
Then Give Execution Permissions:
> chmod +x hplip*.run
3) If Got βUser is Not in Sudoers fileβ then see: How to Enable sudo
Finally, Run the Installation script:
> sudo ./hplip*.run
4) Confirm to βInstall as Rootβ to avoid potentials installation issuesβ¦
In Case of Upgrade when Prompted Confirm ro Re-Install with βiβ
For the others just Confirms the Defaults.
> The Installer will Provide Automatically to Manage all the Software Dependencies!
5) During Installation You may be Prompted about to Unplug and Re-Plug the USB Connected
6) other drivers for printer avaible per-default on debian repo
so simply install by typing
> sudo hp-setup
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to Install Printer on GNU/Linux Distros
fb.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
Install HP Printer Driver for Debian
1) First Access the Target:
> cd ~/Downloads
2) And Check the Package is there with:
> ls | grep hplip
(But if downloaded with Firefox it may be instead into /tmp/mozilla*)
Then Give Execution Permissions:
> chmod +x hplip*.run
3) If Got βUser is Not in Sudoers fileβ then see: How to Enable sudo
Finally, Run the Installation script:
> sudo ./hplip*.run
4) Confirm to βInstall as Rootβ to avoid potentials installation issuesβ¦
In Case of Upgrade when Prompted Confirm ro Re-Install with βiβ
For the others just Confirms the Defaults.
> The Installer will Provide Automatically to Manage all the Software Dependencies!
5) During Installation You may be Prompted about to Unplug and Re-Plug the USB Connected
6) other drivers for printer avaible per-default on debian repo
so simply install by typing
> sudo hp-setup
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to Getting-Started Making and Running a Bash Shell Script for Ubuntu 16.04 Xenial Xerus LTS GNU/Linux?
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) Open a Shell session
> Ctrl+Alt+t to open a Terminal emulator on Desktop
(Press βEnterβ to Execute Commands)
2) Editing a Bash Script on Home Directory with nano
First we Change to our Home with
> cd ~
3) Then we Make the Bash Script with
4) nano mybashscript.sh
5) To be Runnable directly as a Shell Script we append a Bash Shebang to the Top like
#!/bin/bash
6) Then for Testing the Execution we should Insert a classic Hello-Word greating
<> echo 'Hello World!'
7) The βechoβ Command simply Output a String on Terminal
So finally our simple Bash Script will be containing just
#!/bin/bash
date
echo 'Hello World!'
echo 'From the Bash Shell'
8) The Sequence of Bash Commands must be a Stack of sigle Commands
myBashCommand1
myBashCommand2
...
9) Or simply in a Line of Commands Divided by a β;β SemiColon
myBashCommand1 ; myBashCommand2 ...
10) Ctrl+x to Save & Exit from nano Editor
11) Executing the Hello-World Bash Script
We Need to give the Execution Permissions with
chmod +x ./mybashscript.sh
12) Then to Run our little Bash Script simply
./mybashscript.sh
13) Youβll be nicely greeted on Shell with something like
Sun Jan 10 10:31:26 PST 2016
Hello World!
From the Bash Shell
ENJOY BY U N D E R C O D E
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to Getting-Started Making and Running a Bash Shell Script for Ubuntu 16.04 Xenial Xerus LTS GNU/Linux?
t.me/iOsDeveloppers
π¦ ππΌππ πππΈβπ :
1) Open a Shell session
> Ctrl+Alt+t to open a Terminal emulator on Desktop
(Press βEnterβ to Execute Commands)
2) Editing a Bash Script on Home Directory with nano
First we Change to our Home with
> cd ~
3) Then we Make the Bash Script with
4) nano mybashscript.sh
5) To be Runnable directly as a Shell Script we append a Bash Shebang to the Top like
#!/bin/bash
6) Then for Testing the Execution we should Insert a classic Hello-Word greating
<> echo 'Hello World!'
7) The βechoβ Command simply Output a String on Terminal
So finally our simple Bash Script will be containing just
#!/bin/bash
date
echo 'Hello World!'
echo 'From the Bash Shell'
8) The Sequence of Bash Commands must be a Stack of sigle Commands
myBashCommand1
myBashCommand2
...
9) Or simply in a Line of Commands Divided by a β;β SemiColon
myBashCommand1 ; myBashCommand2 ...
10) Ctrl+x to Save & Exit from nano Editor
11) Executing the Hello-World Bash Script
We Need to give the Execution Permissions with
chmod +x ./mybashscript.sh
12) Then to Run our little Bash Script simply
./mybashscript.sh
13) Youβll be nicely greeted on Shell with something like
Sun Jan 10 10:31:26 PST 2016
Hello World!
From the Bash Shell
ENJOY BY U N D E R C O D E
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
ππΎππππ±π ΄
Youtube.com/c/Undercode
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
@iUNDERCODE
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestinG
@iUNDERCODE
πππ Έπππ ΄π
@iUNDERCODE
@UNDERCODENEWS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ This Tutorial Shows You Step-by-Step How to Install and Getting-Started with Appcelerator Titanium Studio for Ubuntu Vivid Vervet Amd64 GNU+Linux:
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Download Appcelerator Titanium Studio for Linux
> https://my.appcelerator.com/auth/signup (try usb vpn or wait if server down
2) Login into Your Appcelerator Account and Get Linux 64-bit Release.
3) Double-Click on Package and Extract into /tmp
or Install Titanium Studio Ubuntu Vivid Amd64 - Archive Extraction
Or from Command Line:
> unzip -d /tmp/ $HOME/Downloads/titanium.studio*.zip
4) Open Terminal Window
(Press βEnterβ to Execute Commands)
Ctrl+Alt+t
5) SetUp local PATH
echo 'export MOZILLA_FIVE_HOME=/usr/lib/mozilla' >> ~/.bashrc
bash
6) Install Required Packages for Titanium Studio
sudo su
7) If Got βUser is Not in Sudoers fileβ then see: How to Enable sudo
apt-get install libjpeg62 libwebkitgtk-1.0-0 lib32z1 lib32ncurses5 lib32bz2-1.0 ruby libncurses5:i386
8) How to Install Recommended Oracle Java JDK on Ubuntu
Here Install Oracle JDK for Ubuntu
9) How to Install the Oracle-Sun Java SE JDK on Linux Ubuntu
Relocate Titanium Studio
> sudo chown -R root:root /tmp/Appcelerator_Studio
mv /tmp/Appcelerator_Studio /opt/AppceleratorStudio
ln -s /opt/AppceleratorStudio/AppceleratorStudio /usr/local/bin/AppceleratorStudio
exit
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ This Tutorial Shows You Step-by-Step How to Install and Getting-Started with Appcelerator Titanium Studio for Ubuntu Vivid Vervet Amd64 GNU+Linux:
instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Download Appcelerator Titanium Studio for Linux
> https://my.appcelerator.com/auth/signup (try usb vpn or wait if server down
2) Login into Your Appcelerator Account and Get Linux 64-bit Release.
3) Double-Click on Package and Extract into /tmp
or Install Titanium Studio Ubuntu Vivid Amd64 - Archive Extraction
Or from Command Line:
> unzip -d /tmp/ $HOME/Downloads/titanium.studio*.zip
4) Open Terminal Window
(Press βEnterβ to Execute Commands)
Ctrl+Alt+t
5) SetUp local PATH
echo 'export MOZILLA_FIVE_HOME=/usr/lib/mozilla' >> ~/.bashrc
bash
6) Install Required Packages for Titanium Studio
sudo su
7) If Got βUser is Not in Sudoers fileβ then see: How to Enable sudo
apt-get install libjpeg62 libwebkitgtk-1.0-0 lib32z1 lib32ncurses5 lib32bz2-1.0 ruby libncurses5:i386
8) How to Install Recommended Oracle Java JDK on Ubuntu
Here Install Oracle JDK for Ubuntu
9) How to Install the Oracle-Sun Java SE JDK on Linux Ubuntu
Relocate Titanium Studio
> sudo chown -R root:root /tmp/Appcelerator_Studio
mv /tmp/Appcelerator_Studio /opt/AppceleratorStudio
ln -s /opt/AppceleratorStudio/AppceleratorStudio /usr/local/bin/AppceleratorStudio
exit
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How install system sound for Linux
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) start the computer, register with root, enter Linux, and execute the command:
# cd / usr / src / linux (enter the Linux kernel source directory)
γγ# startx (start X Window)
2) Click to launch the virtual terminal (Chinese terminal) and perform the following operations:
3) In the / usr / src / linux directory, execute the command: # make xconfig
4) After the kernel configuration menu screen appears, click Sound to enter the sound system configuration and find The following options:
γγy / m / n OSS sound modules
γγy / m / n Microsoft Sound System Support
5) In the y / m / n selection in front of the line, choose to click y. Find the following lines and modify the values ββbefore them to match your computer's configuration.
γγ530 MSS / WSS I / O base 530, 604, E80 or F40
γγ5 MSS / WSS IRQ 7, 9, 10 or 11
γγ1 MSS / WSS DMA 0, 1 or 3
γγ-1 MSS / WSS secand DMA (if possible) The
γγvalues ββabove 0, 1 or 3 can be obtained by the following methods:
6) From a laptop computer From the random manual, if you have not modified them, you can use the default value (initial value).
γγ* If the machine is also equipped with Windows operating system, you can find out from the system.
7) After the modification is completed, click the Main Menu button to return to the main menu, and then click Save and Exit and OK to end the kernel configuration.
8) Execute the following command to create a new kernel:
γγ# make dep # make clean (clear the old files)
γγ# make bzImage (create a kernel compressed image)
γγ# cp / boot / vmlinuz / boot /
γγvmlinuz.old (back up the old kernel files)
γγ# cp ./arch/i386/boot/bzImage / boot / vmlinuz (copy the new kernel to the boot directory)
@undercodetesting
9) Modify the lilo configuration file with an editor:
γγ# vi /etc/lilo.conf
10) Add the following lines to the file:
γγimage = / boot / vmlinuz.old (old kernel)
γγlable = old (label)
γγroot = / dev / hdax (your system root disk name)
γγread-only
11) Save the modified file, exit vi and execute the command:
γγ# / sbin / lilo (Reconstruct lilo)
γγ# reboot (Restart Linux) After the
12) system starts, enter X Window to test whether the sound system is normal. If it is abnormal, you should check the above steps are correct, especially the I / O port, DMA, IRQ settings are correct.
13) It is important to point out that although the manual states that it is compatible with the Sound Blaster Pro system, when configuring the kernel options, you cannot choose 100% Sound Blaster Pro, that is, you cannot choose a 100% sound Blaster card compatible sound system, you should choose MS Windows. Sound system (MSS / WSS), otherwise, it cannot succeed.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How install system sound for Linux
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) start the computer, register with root, enter Linux, and execute the command:
# cd / usr / src / linux (enter the Linux kernel source directory)
γγ# startx (start X Window)
2) Click to launch the virtual terminal (Chinese terminal) and perform the following operations:
3) In the / usr / src / linux directory, execute the command: # make xconfig
4) After the kernel configuration menu screen appears, click Sound to enter the sound system configuration and find The following options:
γγy / m / n OSS sound modules
γγy / m / n Microsoft Sound System Support
5) In the y / m / n selection in front of the line, choose to click y. Find the following lines and modify the values ββbefore them to match your computer's configuration.
γγ530 MSS / WSS I / O base 530, 604, E80 or F40
γγ5 MSS / WSS IRQ 7, 9, 10 or 11
γγ1 MSS / WSS DMA 0, 1 or 3
γγ-1 MSS / WSS secand DMA (if possible) The
γγvalues ββabove 0, 1 or 3 can be obtained by the following methods:
6) From a laptop computer From the random manual, if you have not modified them, you can use the default value (initial value).
γγ* If the machine is also equipped with Windows operating system, you can find out from the system.
7) After the modification is completed, click the Main Menu button to return to the main menu, and then click Save and Exit and OK to end the kernel configuration.
8) Execute the following command to create a new kernel:
γγ# make dep # make clean (clear the old files)
γγ# make bzImage (create a kernel compressed image)
γγ# cp / boot / vmlinuz / boot /
γγvmlinuz.old (back up the old kernel files)
γγ# cp ./arch/i386/boot/bzImage / boot / vmlinuz (copy the new kernel to the boot directory)
@undercodetesting
9) Modify the lilo configuration file with an editor:
γγ# vi /etc/lilo.conf
10) Add the following lines to the file:
γγimage = / boot / vmlinuz.old (old kernel)
γγlable = old (label)
γγroot = / dev / hdax (your system root disk name)
γγread-only
11) Save the modified file, exit vi and execute the command:
γγ# / sbin / lilo (Reconstruct lilo)
γγ# reboot (Restart Linux) After the
12) system starts, enter X Window to test whether the sound system is normal. If it is abnormal, you should check the above steps are correct, especially the I / O port, DMA, IRQ settings are correct.
13) It is important to point out that although the manual states that it is compatible with the Sound Blaster Pro system, when configuring the kernel options, you cannot choose 100% Sound Blaster Pro, that is, you cannot choose a 100% sound Blaster card compatible sound system, you should choose MS Windows. Sound system (MSS / WSS), otherwise, it cannot succeed.
@UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ IpVanish Pro ACcounts
> some accounts login via special location so if account not work try another
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
rcarter@stacontractinginc.com:Leslie1011! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/12/2020
darquelh41@gmail.com:Jumper@15 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/28/2020
ricky.hildreth@gmail.com:22781rH$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/1/2020
nicholasthomas90@gmail.com:Samtron1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
jhhgreen89@gmail.com:J@neth65 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/16/2020
doctorwhovian89@gmail.com:werdna12 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/6/2020
ray.alex1@gmail.com:L@vonte74 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/1/2020
iluvwow1894@gmail.com:Legithunter147! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/4/2020
robbman11@gmail.com:@11Military | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/9/2020
richardson.darrent@gmail.com:Uptown40! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/2/2020
r_rodriguez246@yahoo.com:Fr33$tyl3 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/25/2020
jadorno77@yahoo.com:Itsme5477! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/18/2020
gmk_1994@yahoo.com:Tisith12! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/26/2020
yugo6043765281@gmail.com:Gilmore@32 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/15/2020
randt95@verizon.net:Littledick_1 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/18/2020
swl3014@gmail.com:Swl@3014 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/26/2020
Christopherbjornolsen@gmail.com:Topher84! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/9/2020
danteb823@gmail.com:M0nster1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/14/2020
munizjulio99@gmail.com:Fresnoca19$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/21/2020
macpunn@yahoo.com:1Navyblue! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/7/2020
rodriguezneftali02@gmail.com:Pook2257! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/22/2020
jmg1891@gmail.com:exotic18 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 9/16/2020
keston-5@hotmail.com:Geneva-09 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/18/2020
drew.sauls@gmail.com:Godslove1st! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
a.tarabay@yahoo.com:Marie4707! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/26/2020
saf298@gmail.com:1234sathya | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/9/2020
estocker52@aol.com:Tangela52$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 6/29/2020
awofford2013@gmail.com:Hkarmy806! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/17/2020
bacalaocastro@gmail.com:Makaila07 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/29/2020
hartman.zack@gmail.com:2007Chrysler! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/19/2020
relaminatejml@gmail.com:Higurashi3! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/30/2020
bjobson@mail.usf.edu:dynomite86 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/2/2020
josie1124@live.com:David572* | ACCOUNT TYPE = 2 | EXPIRATION DATE = 5/7/2020
jescamilla79@live.com:Raiders1$ | ACCOUNT TYPE = 3 | EXPIRATION DATE = 1/24/2020
mikeajoy15@yahoo.com:Suc4life! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/25/2020
samward15@hotmail.co.uk:Bleach15? | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/26/2020
navarrowyatt@yahoo.com:Studmuffin88 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/28/2020
eac1907@yahoo.com:Antonio1907 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/28/2020
scotty.avery@yahoo.com:December.1216 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
hollyborrego@gmail.com:Hershey20!7 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/26/2020
bad-72@hotmail.com:Costarica.2 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/10/2020
marques.ware@gmail.com:That1!dude | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/16/2020
cammy.laury@gmail.com:Ieatrapes1 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/17/2020
arri99011@gmail.com:M@dden112 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/15/2021
dlwms06@bellsouth.net:Batmite10@ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/27/2020
everald.jeffers@yahoo.com:Collegeb0y$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/10/2020
michaelcole_25248@yahoo.com:Saved48$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/31/2020
(Powred by brothers)
π¦ IpVanish Pro ACcounts
> some accounts login via special location so if account not work try another
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
rcarter@stacontractinginc.com:Leslie1011! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/12/2020
darquelh41@gmail.com:Jumper@15 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/28/2020
ricky.hildreth@gmail.com:22781rH$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/1/2020
nicholasthomas90@gmail.com:Samtron1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
jhhgreen89@gmail.com:J@neth65 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/16/2020
doctorwhovian89@gmail.com:werdna12 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/6/2020
ray.alex1@gmail.com:L@vonte74 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/1/2020
iluvwow1894@gmail.com:Legithunter147! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/4/2020
robbman11@gmail.com:@11Military | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/9/2020
richardson.darrent@gmail.com:Uptown40! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/2/2020
r_rodriguez246@yahoo.com:Fr33$tyl3 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/25/2020
jadorno77@yahoo.com:Itsme5477! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/18/2020
gmk_1994@yahoo.com:Tisith12! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/26/2020
yugo6043765281@gmail.com:Gilmore@32 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/15/2020
randt95@verizon.net:Littledick_1 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/18/2020
swl3014@gmail.com:Swl@3014 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/26/2020
Christopherbjornolsen@gmail.com:Topher84! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/9/2020
danteb823@gmail.com:M0nster1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/14/2020
munizjulio99@gmail.com:Fresnoca19$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/21/2020
macpunn@yahoo.com:1Navyblue! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/7/2020
rodriguezneftali02@gmail.com:Pook2257! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/22/2020
jmg1891@gmail.com:exotic18 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 9/16/2020
keston-5@hotmail.com:Geneva-09 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/18/2020
drew.sauls@gmail.com:Godslove1st! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
a.tarabay@yahoo.com:Marie4707! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/26/2020
saf298@gmail.com:1234sathya | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/9/2020
estocker52@aol.com:Tangela52$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 6/29/2020
awofford2013@gmail.com:Hkarmy806! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/17/2020
bacalaocastro@gmail.com:Makaila07 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/29/2020
hartman.zack@gmail.com:2007Chrysler! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/19/2020
relaminatejml@gmail.com:Higurashi3! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/30/2020
bjobson@mail.usf.edu:dynomite86 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/2/2020
josie1124@live.com:David572* | ACCOUNT TYPE = 2 | EXPIRATION DATE = 5/7/2020
jescamilla79@live.com:Raiders1$ | ACCOUNT TYPE = 3 | EXPIRATION DATE = 1/24/2020
mikeajoy15@yahoo.com:Suc4life! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/25/2020
samward15@hotmail.co.uk:Bleach15? | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/26/2020
navarrowyatt@yahoo.com:Studmuffin88 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/28/2020
eac1907@yahoo.com:Antonio1907 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/28/2020
scotty.avery@yahoo.com:December.1216 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/27/2020
hollyborrego@gmail.com:Hershey20!7 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/26/2020
bad-72@hotmail.com:Costarica.2 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/10/2020
marques.ware@gmail.com:That1!dude | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/16/2020
cammy.laury@gmail.com:Ieatrapes1 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 2/17/2020
arri99011@gmail.com:M@dden112 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 4/15/2021
dlwms06@bellsouth.net:Batmite10@ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/27/2020
everald.jeffers@yahoo.com:Collegeb0y$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 10/10/2020
michaelcole_25248@yahoo.com:Saved48$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/31/2020
(Powred by brothers)
austinmccormack@gmail.com:751901a4 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/7/2020
murph3369@yahoo.com:Gjbj236911! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/25/2020
cmfv40@gmail.com:Mrandmrs40! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 9/19/2020
jermainethom144@gmail.com:Summer@3 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/18/2020
scotthdoyle@yahoo.com:Court8182$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/27/2020
atuppince@gmail.com:Maxima1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/2/2020
btrusky@gmail.com:Millertime22! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/4/2020
leaveilflowers@gmail.com:Proverbs7! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/21/2020
preaalesu@gmail.com:L@ncerev0 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/31/2020
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
murph3369@yahoo.com:Gjbj236911! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 1/25/2020
cmfv40@gmail.com:Mrandmrs40! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 9/19/2020
jermainethom144@gmail.com:Summer@3 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/18/2020
scotthdoyle@yahoo.com:Court8182$ | ACCOUNT TYPE = 2 | EXPIRATION DATE = 11/27/2020
atuppince@gmail.com:Maxima1! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 12/2/2020
btrusky@gmail.com:Millertime22! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/4/2020
leaveilflowers@gmail.com:Proverbs7! | ACCOUNT TYPE = 2 | EXPIRATION DATE = 3/21/2020
preaalesu@gmail.com:L@ncerev0 | ACCOUNT TYPE = 2 | EXPIRATION DATE = 8/31/2020
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Usage of netstat to check the network status
>@UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> commands a very useful --netstat, use the netstat command to monitor the TCP / IP network configurations and operating conditions.
> It can display the kernel routing table,
active network status, and useful statistics for each network interface.
-a displays information about all Internet connections, including those that are listening.
-i displays statistics for all network devices.
-c displays the network update status continuously. This parameter using the netstat network every second output state
list until the program is interrupted
-n displays the remote address, local address and port information, rather than resolve the host name in digital / original form
and server
-o display counters and end time The back off condition of each network connection
-r shows the kernel routing table
-t shows only TCP socket information, including information being monitored
-u shows only UDP socket information
-v shows netstat version information
-w shows raw (raw ) Socket info-
x show UNIX domain socket info
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Usage of netstat to check the network status
>@UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> commands a very useful --netstat, use the netstat command to monitor the TCP / IP network configurations and operating conditions.
> It can display the kernel routing table,
active network status, and useful statistics for each network interface.
-a displays information about all Internet connections, including those that are listening.
-i displays statistics for all network devices.
-c displays the network update status continuously. This parameter using the netstat network every second output state
list until the program is interrupted
-n displays the remote address, local address and port information, rather than resolve the host name in digital / original form
and server
-o display counters and end time The back off condition of each network connection
-r shows the kernel routing table
-t shows only TCP socket information, including information being monitored
-u shows only UDP socket information
-v shows netstat version information
-w shows raw (raw ) Socket info-
x show UNIX domain socket info
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Configure your network :
> instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
> If the ifconfig command is followed by only the port device name, then it will display the configuration of this port; if there is no parameter, the ifconfig command will display all the information of the interface configured so far; if the -a option is provided, Then you can also display the currently inactive interfaces.
An ifconfig call that checks the Ethernet interface eth0 can get the following output:
#ifconfig eth0
eth0 Link encap 10Mbps Ethernet HWaddr 00: 00: C0: 90: B3: 44
inet addr xxx.xxx.xxx.xxx Bcast xxx.xxx.xxx .255 Mask 255.255.255.0
UP BROADCAST RUNNING MTU 1500 Metric 0
RX packets 3136 errors 217 dropped 7 overrun 26
TX packets 1752 errors 25 dropped 0 overrun 0
(Note: where XXX.XXX.XXX.XXX is the IP address)
2) The
two columns MTU and Metric show the maximum data transfer value and interface metric value of the current eth0 interface. Interface metrics represent the cost of sending a packet on this path. Routing is not currently used in the kernel, but may be used in the future. The RX (received packet) and TX (transmitted packet) lines show the number of received and transmitted packets, as well as the number of packet errors, the number of lost packets (one possible reason is less memory), and the number of overruns (usually between Occurs when the receiver receives data faster than the core can process it).
Parameters represent various parameters supported by ifconfig.
3) Using these parameters, you can easily monitor and change the status of the network interface.
ifconfig command line arguments:
up activates the specified interface
down and closes the specified interface. This parameter can be effectively prevented by the specified interface IP information
flow, if you want to permanently shut down the interface, we need from the core routing table in
the routing information interface to delete all
netmask mask for the interface to set the IP network mask. Prefix 0x mask may be 32-bit hexadecimal
numbers, separated by dots may be four decimal numbers. If you do not intend to divide your network into
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Configure your network :
> instagram.com/UndercOdeTestingCompany
π¦ ππΌππ πππΈβπ :
> If the ifconfig command is followed by only the port device name, then it will display the configuration of this port; if there is no parameter, the ifconfig command will display all the information of the interface configured so far; if the -a option is provided, Then you can also display the currently inactive interfaces.
An ifconfig call that checks the Ethernet interface eth0 can get the following output:
#ifconfig eth0
eth0 Link encap 10Mbps Ethernet HWaddr 00: 00: C0: 90: B3: 44
inet addr xxx.xxx.xxx.xxx Bcast xxx.xxx.xxx .255 Mask 255.255.255.0
UP BROADCAST RUNNING MTU 1500 Metric 0
RX packets 3136 errors 217 dropped 7 overrun 26
TX packets 1752 errors 25 dropped 0 overrun 0
(Note: where XXX.XXX.XXX.XXX is the IP address)
2) The
two columns MTU and Metric show the maximum data transfer value and interface metric value of the current eth0 interface. Interface metrics represent the cost of sending a packet on this path. Routing is not currently used in the kernel, but may be used in the future. The RX (received packet) and TX (transmitted packet) lines show the number of received and transmitted packets, as well as the number of packet errors, the number of lost packets (one possible reason is less memory), and the number of overruns (usually between Occurs when the receiver receives data faster than the core can process it).
Parameters represent various parameters supported by ifconfig.
3) Using these parameters, you can easily monitor and change the status of the network interface.
ifconfig command line arguments:
up activates the specified interface
down and closes the specified interface. This parameter can be effectively prevented by the specified interface IP information
flow, if you want to permanently shut down the interface, we need from the core routing table in
the routing information interface to delete all
netmask mask for the interface to set the IP network mask. Prefix 0x mask may be 32-bit hexadecimal
numbers, separated by dots may be four decimal numbers. If you do not intend to divide your network into
t.me/UndercOdeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to install phpmyadmin under Linux by UndercOde ?
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> When installing fedora, choose the basic components that should be selected, including Appache, mysql, and php, but when we manage the database, there is still a graphical interface more convenient, so we install phpmyadmin The installation is very simple.
> phpMyAdmin is a MySQL management tool that manages MySQL directly from the web.
> Assuming your web (web hosting) root directory is / var / www / Assuming your host web access is like this http://192.168.1.11/
> You can install it to / var / www / phpmyadmin, or any subdirectory of / var / www /
> Note that this directory name is best known only by the administrator. Therefore we assume / var / www / onlyyouknow
A) First download the latest phpMyAdmin program from the official website of phpMyAdmin
http://superb-east.dl.sourceforge.net/sourceforge/phpmyadmin/phpMyAdmin-2.11.3-all-languages.tar.gz
Download phpMyAdmin-2.11.3-all-languages.tar.bz2 to / var / www /
#cd / var / www /
#wget http://superb-east.dl.sourceforge.net/sourceforge/phpmyadmin/phpMyAdmin-2.11.3-all-languages.tar.gz
Of course, you can also go to your own windows machine and edit it before uploading it to the web server @undercodetesting
B) Unzip this file
# tar zxvf phpMyAdmin-2.11.3-all-languages.tar.gz
At this point the path /var/www/phpMyAdmin-2.11.3-all-languages
C) Change the directory name to / var / www / onlyyoukown
# mv /var/www/phpMyAdmin-2.11.3-all-languages ββ/ var / www / onlyyoukown
D) Modify the profile
1) Find the /libraries/config.default.php file (config.default.php is copied to the phpmyadmin directory and then renamed to config.inc.php). WordPad (don't use Notepad, this is UTF8 encoding) for editing, directly use vim under Linux.
2) Find $ cfg ['PmaAbsoluteUri'] and change it to the phpMyAdmin URL you will upload to the space
For example: $ cfg ['PmaAbsoluteUri'] = 'http://192.168.1.11/onlyyouknow/';
3) Find $ cfg ['Servers'] [$ i] ['host'] = 'localhost'; (usually use the default, there are exceptions, you don't need to modify)
4) Find $ cfg ['Servers'] [$ i] ['auth_type'] = 'config';
Debug in your own machine with config; if you use cookies in the space on the network, since we have already added the URL here, we will modify them to cookies. We recommend using cookies here.
5) Find $ cfg ['Servers'] [$ i] ['user'] = 'root'; // MySQL user (mysql user name, use root on your machine;)
6) Find $ cfg ['Servers'] [$ i] ['password'] = ''; // MySQL password (the password of the mysql user, your own server is usually the password of the mysql user root)
7) Find $ cfg ['Servers'] [$ i] ['only_db'] = ''; // If set to a db-name, only (If you have only one data, set it; if you are on the machine or want to Setting up the server, then it is recommended to leave it blank)
8) Find $ cfg ['DefaultLang'] = 'zh'; (Here is the choice of language, zh stands for Simplified Chinese, I do nβt know if I fill in gbk here)
9) Save after setting
If "Configuration file now requires top secret phrase password (blowfish_secret)" then please set your website cookie in the equal sign of $ cfg ['blowfish_secret'] = ''; For example: $ cfg ['blowfish_secret'] = ' Arbitrary character '; this is because of your "$ cfg [' Servers'] [$ i] ['auth_type'] = 'cookie'.
E) Testing
Open your browser, http://192.168.1.11/onlyyoukown/
π¦ A little personal opinion
We don't think that controlling mysql by the root user of mysql from the web is not a very safe way. So my suggestion is that if it is your own server, you can put the phpadmin directory into a directory that the web cannot access when you run out. Use the mv command to move the entire directory back to the original location.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to install phpmyadmin under Linux by UndercOde ?
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
> When installing fedora, choose the basic components that should be selected, including Appache, mysql, and php, but when we manage the database, there is still a graphical interface more convenient, so we install phpmyadmin The installation is very simple.
> phpMyAdmin is a MySQL management tool that manages MySQL directly from the web.
> Assuming your web (web hosting) root directory is / var / www / Assuming your host web access is like this http://192.168.1.11/
> You can install it to / var / www / phpmyadmin, or any subdirectory of / var / www /
> Note that this directory name is best known only by the administrator. Therefore we assume / var / www / onlyyouknow
A) First download the latest phpMyAdmin program from the official website of phpMyAdmin
http://superb-east.dl.sourceforge.net/sourceforge/phpmyadmin/phpMyAdmin-2.11.3-all-languages.tar.gz
Download phpMyAdmin-2.11.3-all-languages.tar.bz2 to / var / www /
#cd / var / www /
#wget http://superb-east.dl.sourceforge.net/sourceforge/phpmyadmin/phpMyAdmin-2.11.3-all-languages.tar.gz
Of course, you can also go to your own windows machine and edit it before uploading it to the web server @undercodetesting
B) Unzip this file
# tar zxvf phpMyAdmin-2.11.3-all-languages.tar.gz
At this point the path /var/www/phpMyAdmin-2.11.3-all-languages
C) Change the directory name to / var / www / onlyyoukown
# mv /var/www/phpMyAdmin-2.11.3-all-languages ββ/ var / www / onlyyoukown
D) Modify the profile
1) Find the /libraries/config.default.php file (config.default.php is copied to the phpmyadmin directory and then renamed to config.inc.php). WordPad (don't use Notepad, this is UTF8 encoding) for editing, directly use vim under Linux.
2) Find $ cfg ['PmaAbsoluteUri'] and change it to the phpMyAdmin URL you will upload to the space
For example: $ cfg ['PmaAbsoluteUri'] = 'http://192.168.1.11/onlyyouknow/';
3) Find $ cfg ['Servers'] [$ i] ['host'] = 'localhost'; (usually use the default, there are exceptions, you don't need to modify)
4) Find $ cfg ['Servers'] [$ i] ['auth_type'] = 'config';
Debug in your own machine with config; if you use cookies in the space on the network, since we have already added the URL here, we will modify them to cookies. We recommend using cookies here.
5) Find $ cfg ['Servers'] [$ i] ['user'] = 'root'; // MySQL user (mysql user name, use root on your machine;)
6) Find $ cfg ['Servers'] [$ i] ['password'] = ''; // MySQL password (the password of the mysql user, your own server is usually the password of the mysql user root)
7) Find $ cfg ['Servers'] [$ i] ['only_db'] = ''; // If set to a db-name, only (If you have only one data, set it; if you are on the machine or want to Setting up the server, then it is recommended to leave it blank)
8) Find $ cfg ['DefaultLang'] = 'zh'; (Here is the choice of language, zh stands for Simplified Chinese, I do nβt know if I fill in gbk here)
9) Save after setting
If "Configuration file now requires top secret phrase password (blowfish_secret)" then please set your website cookie in the equal sign of $ cfg ['blowfish_secret'] = ''; For example: $ cfg ['blowfish_secret'] = ' Arbitrary character '; this is because of your "$ cfg [' Servers'] [$ i] ['auth_type'] = 'cookie'.
E) Testing
Open your browser, http://192.168.1.11/onlyyoukown/
π¦ A little personal opinion
We don't think that controlling mysql by the root user of mysql from the web is not a very safe way. So my suggestion is that if it is your own server, you can put the phpadmin directory into a directory that the web cannot access when you run out. Use the mv command to move the entire directory back to the original location.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ PHP CODE FORWARD A INSTALLED PHPMYADMIN (SQL MANGER TOOL)
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
<style type="text/css">
body {
background-color: #D4D0C8;
}
.m_fieldset {
padding: 0,10,5,10;
text-align: center;
width: 150px;
}
.m_legend {
font-family: Tahoma;
font-size: 11px;
padding-bottom: 5px;
}
.m_frameborder {
border-left: 2px inset #D4D0C8;
border-top: 2px inset #D4D0C8;
border-right: 2px inset #FFFFFF;
border-bottom: 2px inset #FFFFFF;
width: 100px;
height: 19px;
background-color: #FFFFFF;
overflow: hidden;
text-align: right;
font-family: "Tahoma";
font-size: 10px;
}
.m_arrow {
width: 16px;
height: 8px;
font-family: "Webdings";
font-size: 7px;
line-height: 2px;
padding-left: 2px;
cursor: default;
}
.m_input {
width: 18px;
height: 14px;
border: 0px solid black;
font-family: "Tahoma";
font-size: 9px;
text-align: right;
ime-mode:disabled;
}
</style>
<script language="javascript">
function minute(name,fName)
{
this.name = name;
this.fName = fName || "m_input";
this.timer = null;
this.fObj = null;
this.toString = function()
{
var objDate = new Date();
var sMinute_Common = "class=\"m_input\" maxlength=\"2\" name=\""+this.fName+"\" onfocus=\""+this.name+".setFocusObj(this)\" onblur=\""+this.name+".setTime(this)\" onkeyup=\""+this.name+".prevent(this)\" onkeypress=\"if (!/[0-9]/.test(String.fromCharCode(event.keyCode)))event.keyCode=0\" onpaste=\"return false\" ondragenter=\"return false\"";
var sButton_Common = "class=\"m_arrow\" onfocus=\"this.blur()\" onmouseup=\""+this.name+".controlTime()\" disabled"
var str = "";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">"
str += "<tr>"
str += "<td>"
str += "<div class=\"m_frameborder\">"
str += "<input radix=\"24\" value=\""+this.formatTime(objDate.getHours())+"\" "+sMinute_Common+">:"
str += "<input radix=\"60\" value=\""+this.formatTime(objDate.getMinutes())+"\" "+sMinute_Common+">:"
str += "<input radix=\"60\" value=\""+this.formatTime(objDate.getSeconds())+"\" "+sMinute_Common+">"
str += "</div>"
str += "</td>"
str += "<td>"
str += "<table border=\"0\" cellspacing=\"2\" cellpadding=\"0\">"
str += "<tr><td><button id=\""+this.fName+"_up\" "+sButton_Common+">5</button></td></tr>"
str += "<tr><td><button id=\""+this.fName+"_down\" "+sButton_Common+">6</button></td></tr>"
str += "</table>"
str += "</td>"
str += "</tr>"
str += "</table>"
return str;
}
this.play = function()
{
this.timer = setInterval(this.name+".playback()",1000);
}
this.formatTime = function(sTime)
{
sTime = ("0"+sTime);
return sTime.substr(sTime.length-2);
}
this.playback = function()
{
var objDate = new Date();
var arrDate = [objDate.getHours(),objDate.getMinutes(),objDate.getSeconds()];
var objMinute = document.getElementsByName(this.fName);
for (var i=0;i<objMinute.length;i++)
{
objMinute[i].value = this.formatTime(arrDate[i])
}
}
this.prevent = function(obj)
{
clearInterval(this.timer);
this.setFocusObj(obj);
var value = parseInt(obj.value,10);
var radix = parseInt(obj.radix,10)-1;
if (obj.value>radix||obj.value<0)
{
obj.value = obj.value.substr(0,1);
}
}
this.controlTime = function(cmd)
{
event.cancelBubble = true;
if (!this.fObj) return;
clearInterval(this.timer);
var cmd = event.srcElement.innerText=="5"?true:false;
var i = parseInt(this.fObj.value,10);
var radix = parseInt(this.fObj.radix,10)-1;
if (i==radix&&cmd)
{
i = 0;
}
else if (i==0&&!cmd)
{
i = radix;
}
else
{
cmd?i++:i--;
}
this.fObj.value = this.formatTime(i);
this.fObj.select();
}
this.setTime = function(obj)
{
obj.value = this.formatTime(obj.value);
}
this.setFocusObj = function(obj)
{
eval(this.fName+"_up").disabled = eval(this.fName+"_down").disabled = false;
this.fObj = obj;
}
this.getTime = function()
{
var arrTime = new Array(2);
for (var i=0;i<document.getElementsByName(this.fName).length;i++)
{
arrTime[i] = document.getElementsByName(this.fName)[i].value;
}
return arrTime.join(":");
}
}
</script>
π¦ PHP CODE FORWARD A INSTALLED PHPMYADMIN (SQL MANGER TOOL)
T.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
<style type="text/css">
body {
background-color: #D4D0C8;
}
.m_fieldset {
padding: 0,10,5,10;
text-align: center;
width: 150px;
}
.m_legend {
font-family: Tahoma;
font-size: 11px;
padding-bottom: 5px;
}
.m_frameborder {
border-left: 2px inset #D4D0C8;
border-top: 2px inset #D4D0C8;
border-right: 2px inset #FFFFFF;
border-bottom: 2px inset #FFFFFF;
width: 100px;
height: 19px;
background-color: #FFFFFF;
overflow: hidden;
text-align: right;
font-family: "Tahoma";
font-size: 10px;
}
.m_arrow {
width: 16px;
height: 8px;
font-family: "Webdings";
font-size: 7px;
line-height: 2px;
padding-left: 2px;
cursor: default;
}
.m_input {
width: 18px;
height: 14px;
border: 0px solid black;
font-family: "Tahoma";
font-size: 9px;
text-align: right;
ime-mode:disabled;
}
</style>
<script language="javascript">
function minute(name,fName)
{
this.name = name;
this.fName = fName || "m_input";
this.timer = null;
this.fObj = null;
this.toString = function()
{
var objDate = new Date();
var sMinute_Common = "class=\"m_input\" maxlength=\"2\" name=\""+this.fName+"\" onfocus=\""+this.name+".setFocusObj(this)\" onblur=\""+this.name+".setTime(this)\" onkeyup=\""+this.name+".prevent(this)\" onkeypress=\"if (!/[0-9]/.test(String.fromCharCode(event.keyCode)))event.keyCode=0\" onpaste=\"return false\" ondragenter=\"return false\"";
var sButton_Common = "class=\"m_arrow\" onfocus=\"this.blur()\" onmouseup=\""+this.name+".controlTime()\" disabled"
var str = "";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">"
str += "<tr>"
str += "<td>"
str += "<div class=\"m_frameborder\">"
str += "<input radix=\"24\" value=\""+this.formatTime(objDate.getHours())+"\" "+sMinute_Common+">:"
str += "<input radix=\"60\" value=\""+this.formatTime(objDate.getMinutes())+"\" "+sMinute_Common+">:"
str += "<input radix=\"60\" value=\""+this.formatTime(objDate.getSeconds())+"\" "+sMinute_Common+">"
str += "</div>"
str += "</td>"
str += "<td>"
str += "<table border=\"0\" cellspacing=\"2\" cellpadding=\"0\">"
str += "<tr><td><button id=\""+this.fName+"_up\" "+sButton_Common+">5</button></td></tr>"
str += "<tr><td><button id=\""+this.fName+"_down\" "+sButton_Common+">6</button></td></tr>"
str += "</table>"
str += "</td>"
str += "</tr>"
str += "</table>"
return str;
}
this.play = function()
{
this.timer = setInterval(this.name+".playback()",1000);
}
this.formatTime = function(sTime)
{
sTime = ("0"+sTime);
return sTime.substr(sTime.length-2);
}
this.playback = function()
{
var objDate = new Date();
var arrDate = [objDate.getHours(),objDate.getMinutes(),objDate.getSeconds()];
var objMinute = document.getElementsByName(this.fName);
for (var i=0;i<objMinute.length;i++)
{
objMinute[i].value = this.formatTime(arrDate[i])
}
}
this.prevent = function(obj)
{
clearInterval(this.timer);
this.setFocusObj(obj);
var value = parseInt(obj.value,10);
var radix = parseInt(obj.radix,10)-1;
if (obj.value>radix||obj.value<0)
{
obj.value = obj.value.substr(0,1);
}
}
this.controlTime = function(cmd)
{
event.cancelBubble = true;
if (!this.fObj) return;
clearInterval(this.timer);
var cmd = event.srcElement.innerText=="5"?true:false;
var i = parseInt(this.fObj.value,10);
var radix = parseInt(this.fObj.radix,10)-1;
if (i==radix&&cmd)
{
i = 0;
}
else if (i==0&&!cmd)
{
i = radix;
}
else
{
cmd?i++:i--;
}
this.fObj.value = this.formatTime(i);
this.fObj.select();
}
this.setTime = function(obj)
{
obj.value = this.formatTime(obj.value);
}
this.setFocusObj = function(obj)
{
eval(this.fName+"_up").disabled = eval(this.fName+"_down").disabled = false;
this.fObj = obj;
}
this.getTime = function()
{
var arrTime = new Array(2);
for (var i=0;i<document.getElementsByName(this.fName).length;i++)
{
arrTime[i] = document.getElementsByName(this.fName)[i].value;
}
return arrTime.join(":");
}
}
</script>
<style type="text/css">
body {
background-color: #D4D0C8;
}
.c_fieldset {
padding: 0,10,5,10;
text-align: center;
width: 180px;
}
.c_legend {
font-family: Tahoma;
font-size: 11px;
padding-bottom: 5px;
}
.c_frameborder {
border-left: 2px inset #D4D0C8;
border-top: 2px inset #D4D0C8;
border-right: 2px inset #FFFFFF;
border-bottom: 2px inset #FFFFFF;
background-color: #FFFFFF;
overflow: hidden;
font-family: "Tahoma";
font-size: 10px;
width:160px;
height:120px;
}
.c_frameborder td {
width: 23px;
height: 16px;
font-family: "Tahoma";
font-size: 11px;
text-align: center;
cursor: default;
}
.c_frameborder .selected {
background-color:#0A246A;
width:12px;
height:12px;
color:white;
}
.c_frameborder span {
width:12px;
height:12px;
}
.c_arrow {
width: 16px;
height: 8px;
font-family: "Webdings";
font-size: 7px;
line-height: 2px;
padding-left: 2px;
cursor: default;
}
.c_year {
font-family: "Tahoma";
font-size: 11px;
cursor: default;
width:55px;
height:19px;
}
.c_month {
width:75px;
height:20px;
font:11px "Tahoma";
}
.c_dateHead {
background-color:#808080;
color:#D4D0C8;
}
</style>
<script language="javascript">
// Written by cloudchen, 2004/03/16
function calendar(name,fName)
{
this.name = name;
this.fName = fName || "calendar";
this.year = new Date().getFullYear();
this.month = new Date().getMonth();
this.date = new Date().getDate();
//private
this.toString = function()
{
var str = "";
str += "<table border=\"0\" cellspacing=\"3\" cellpadding=\"0\" onselectstart=\"return false\">";
str += "<tr>";
str += "<td>";
str += this.drawMonth();
str += "</td>";
str += "<td align=\"right\">";
str += this.drawYear();
str += "</td>";
str += "</tr>";
str += "<tr>";
str += "<td colspan=\"2\">";
str += "<div class=\"c_frameborder\">";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" class=\"c_dateHead\">";
str += "<tr>";
str += "<td>ζ₯</td><td>δΈ</td><td>δΊ</td><td>δΈ</td><td>ε</td><td>δΊ</td><td>ε </td>";
str += "</tr>";
str += "</table>";
str += this.drawDate();
str += "</div>";
str += "</td>";
str += "</tr>";
str += "</table>";
return str;
}
//private
this.drawYear = function()
{
var str = "";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">";
str += "<tr>";
str += "<td>";
str += "<input class=\"c_year\" maxlength=\"4\" value=\""+this.year+"\" name=\""+this.fName+"\" id=\""+this.fName+"_year\" readonly>";
//DateField
str += "<input type=\"hidden\" name=\""+this.fName+"\" value=\""+this.date+"\" id=\""+this.fName+"_date\">";
str += "</td>";
str += "<td>";
str += "<table cellspacing=\"2\" cellpadding=\"0\" border=\"0\">";
str += "<tr>";
str += "<td><button class=\"c_arrow\" onfocus=\"this.blur()\" onclick=\"event.cancelBubble=true;document.getElementById('"+this.fName+"_year').value++;"+this.name+".redrawDate()\">5</button></td>";
str += "</tr>";
str += "<tr>";
str += "<td><button class=\"c_arrow\" onfocus=\"this.blur()\" onclick=\"event.cancelBubble=true;document.getElementById('"+this.fName+"_year').value--;"+this.name+".redrawDate()\">6</button></td>";
str += "</tr>";
str += "</table>";
str += "</td>";
str += "</tr>";
str += "</table>";
return str;
}
//priavate
this.drawMonth = function()
{
var aMonthName = ["δΈ","δΊ","δΈ","ε","δΊ","ε ","δΈ","ε «","δΉ","ε","εδΈ","εδΊ"];
var str = "";
str += "<select class=\"c_month\" name=\""+this.fName+"\" id=\""+this.fName+"_month\" onchange=\""+this.name+".redrawDate()\">";
for (var i=0;i<aMonthName.length;i++) {
str += "<option value=\""+(i+1)+"\" "+(i==this.month?"selected":"")+">"+aMonthName[i]+"ζ</option>";
}
str += "</select>";
return str;
}
//private
this.drawDate = function()
{
var str = "";
var fDay = new Date(this.year,this.month,1).getDay();
var fDate = 1-fDay;
var lDay = new Date(this.year,this.month+1,0).getDay();
var lDate = new Date(this.year,this.month+1,0).getDate();
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" id=\""+this.fName+"_dateTable"+"\">";
for (var i=1,j=fDate;i<7;i++)
{
str += "<tr>";
body {
background-color: #D4D0C8;
}
.c_fieldset {
padding: 0,10,5,10;
text-align: center;
width: 180px;
}
.c_legend {
font-family: Tahoma;
font-size: 11px;
padding-bottom: 5px;
}
.c_frameborder {
border-left: 2px inset #D4D0C8;
border-top: 2px inset #D4D0C8;
border-right: 2px inset #FFFFFF;
border-bottom: 2px inset #FFFFFF;
background-color: #FFFFFF;
overflow: hidden;
font-family: "Tahoma";
font-size: 10px;
width:160px;
height:120px;
}
.c_frameborder td {
width: 23px;
height: 16px;
font-family: "Tahoma";
font-size: 11px;
text-align: center;
cursor: default;
}
.c_frameborder .selected {
background-color:#0A246A;
width:12px;
height:12px;
color:white;
}
.c_frameborder span {
width:12px;
height:12px;
}
.c_arrow {
width: 16px;
height: 8px;
font-family: "Webdings";
font-size: 7px;
line-height: 2px;
padding-left: 2px;
cursor: default;
}
.c_year {
font-family: "Tahoma";
font-size: 11px;
cursor: default;
width:55px;
height:19px;
}
.c_month {
width:75px;
height:20px;
font:11px "Tahoma";
}
.c_dateHead {
background-color:#808080;
color:#D4D0C8;
}
</style>
<script language="javascript">
// Written by cloudchen, 2004/03/16
function calendar(name,fName)
{
this.name = name;
this.fName = fName || "calendar";
this.year = new Date().getFullYear();
this.month = new Date().getMonth();
this.date = new Date().getDate();
//private
this.toString = function()
{
var str = "";
str += "<table border=\"0\" cellspacing=\"3\" cellpadding=\"0\" onselectstart=\"return false\">";
str += "<tr>";
str += "<td>";
str += this.drawMonth();
str += "</td>";
str += "<td align=\"right\">";
str += this.drawYear();
str += "</td>";
str += "</tr>";
str += "<tr>";
str += "<td colspan=\"2\">";
str += "<div class=\"c_frameborder\">";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" class=\"c_dateHead\">";
str += "<tr>";
str += "<td>ζ₯</td><td>δΈ</td><td>δΊ</td><td>δΈ</td><td>ε</td><td>δΊ</td><td>ε </td>";
str += "</tr>";
str += "</table>";
str += this.drawDate();
str += "</div>";
str += "</td>";
str += "</tr>";
str += "</table>";
return str;
}
//private
this.drawYear = function()
{
var str = "";
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\">";
str += "<tr>";
str += "<td>";
str += "<input class=\"c_year\" maxlength=\"4\" value=\""+this.year+"\" name=\""+this.fName+"\" id=\""+this.fName+"_year\" readonly>";
//DateField
str += "<input type=\"hidden\" name=\""+this.fName+"\" value=\""+this.date+"\" id=\""+this.fName+"_date\">";
str += "</td>";
str += "<td>";
str += "<table cellspacing=\"2\" cellpadding=\"0\" border=\"0\">";
str += "<tr>";
str += "<td><button class=\"c_arrow\" onfocus=\"this.blur()\" onclick=\"event.cancelBubble=true;document.getElementById('"+this.fName+"_year').value++;"+this.name+".redrawDate()\">5</button></td>";
str += "</tr>";
str += "<tr>";
str += "<td><button class=\"c_arrow\" onfocus=\"this.blur()\" onclick=\"event.cancelBubble=true;document.getElementById('"+this.fName+"_year').value--;"+this.name+".redrawDate()\">6</button></td>";
str += "</tr>";
str += "</table>";
str += "</td>";
str += "</tr>";
str += "</table>";
return str;
}
//priavate
this.drawMonth = function()
{
var aMonthName = ["δΈ","δΊ","δΈ","ε","δΊ","ε ","δΈ","ε «","δΉ","ε","εδΈ","εδΊ"];
var str = "";
str += "<select class=\"c_month\" name=\""+this.fName+"\" id=\""+this.fName+"_month\" onchange=\""+this.name+".redrawDate()\">";
for (var i=0;i<aMonthName.length;i++) {
str += "<option value=\""+(i+1)+"\" "+(i==this.month?"selected":"")+">"+aMonthName[i]+"ζ</option>";
}
str += "</select>";
return str;
}
//private
this.drawDate = function()
{
var str = "";
var fDay = new Date(this.year,this.month,1).getDay();
var fDate = 1-fDay;
var lDay = new Date(this.year,this.month+1,0).getDay();
var lDate = new Date(this.year,this.month+1,0).getDate();
str += "<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" id=\""+this.fName+"_dateTable"+"\">";
for (var i=1,j=fDate;i<7;i++)
{
str += "<tr>";
for (var k=0;k<7;k++)
{
str += "<td><span"+(j==this.date?" class=\"selected\"":"")+" onclick=\""+this.name+".redrawDate(this.innerText)\">"+(isDate(j++))+"</span></td>";
}
str += "</tr>";
}
str += "</table>";
return str;
function isDate(n)
{
return (n>=1&&n<=lDate)?n:"";
}
}
//public
this.redrawDate = function(d)
{
this.year = document.getElementById(this.fName+"_year").value;
this.month = document.getElementById(this.fName+"_month").value-1;
this.date = d || this.date;
document.getElementById(this.fName+"_year").value = this.year;
document.getElementById(this.fName+"_month").selectedIndex = this.month;
document.getElementById(this.fName+"_date").value = this.date;
if (this.date>new Date(this.year,this.month+1,0).getDate()) this.date = new Date(this.year,this.month+1,0).getDate();
document.getElementById(this.fName+"_dateTable").outerHTML = this.drawDate();
}
//public
this.getDate = function(delimiter)
{
if (!delimiter) delimiter = "/";
var aValue = [this.year,(this.month+1),this.date];
return aValue.join(delimiter);
}
}
</script>
<table border="0">
<tr><td>
<fieldset class="c_fieldset"><legend class="c_legend">ζ₯ζ(T)</legend>
<!-- θ°η¨ζ₯ε -->
<script>
var c = new calendar("c");
document.write(c);
</script>
<!-- θ°η¨ζ₯ε -->
</fieldset>
</td>
<td valign="top">
<fieldset class="m_fieldset"><legend class = "m_legend"> time (T) </ legend> var m = new minute ("m"); <script>
><!-call time
#@UndercOdeTesting
m.play();
document.write(m);
</script>
<!-- θ°η¨ζΆι΄ι -->
</fieldset>
</td></tr>
<tr>
<td colspan="2">
<button onclick="alert(c.getDate())" style="font:8px Webdings;width:15px;height:15px;line-height:6px;">4</button>
<button style="font:10px Arial;height:15px;height:16px;border:0px;" onfocus="this.blur()">GetDate</button>
<button onclick="alert(m.getTime())" style="font:8px Webdings;width:15px;height:15px;line-height:6px;">4</button>
<button style="font:10px Arial;height:15px;height:16px;border:0px;" onfocus="this.blur()">GetTime</button>
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
{
str += "<td><span"+(j==this.date?" class=\"selected\"":"")+" onclick=\""+this.name+".redrawDate(this.innerText)\">"+(isDate(j++))+"</span></td>";
}
str += "</tr>";
}
str += "</table>";
return str;
function isDate(n)
{
return (n>=1&&n<=lDate)?n:"";
}
}
//public
this.redrawDate = function(d)
{
this.year = document.getElementById(this.fName+"_year").value;
this.month = document.getElementById(this.fName+"_month").value-1;
this.date = d || this.date;
document.getElementById(this.fName+"_year").value = this.year;
document.getElementById(this.fName+"_month").selectedIndex = this.month;
document.getElementById(this.fName+"_date").value = this.date;
if (this.date>new Date(this.year,this.month+1,0).getDate()) this.date = new Date(this.year,this.month+1,0).getDate();
document.getElementById(this.fName+"_dateTable").outerHTML = this.drawDate();
}
//public
this.getDate = function(delimiter)
{
if (!delimiter) delimiter = "/";
var aValue = [this.year,(this.month+1),this.date];
return aValue.join(delimiter);
}
}
</script>
<table border="0">
<tr><td>
<fieldset class="c_fieldset"><legend class="c_legend">ζ₯ζ(T)</legend>
<!-- θ°η¨ζ₯ε -->
<script>
var c = new calendar("c");
document.write(c);
</script>
<!-- θ°η¨ζ₯ε -->
</fieldset>
</td>
<td valign="top">
<fieldset class="m_fieldset"><legend class = "m_legend"> time (T) </ legend> var m = new minute ("m"); <script>
><!-call time
#@UndercOdeTesting
m.play();
document.write(m);
</script>
<!-- θ°η¨ζΆι΄ι -->
</fieldset>
</td></tr>
<tr>
<td colspan="2">
<button onclick="alert(c.getDate())" style="font:8px Webdings;width:15px;height:15px;line-height:6px;">4</button>
<button style="font:10px Arial;height:15px;height:16px;border:0px;" onfocus="this.blur()">GetDate</button>
<button onclick="alert(m.getTime())" style="font:8px Webdings;width:15px;height:15px;line-height:6px;">4</button>
<button style="font:10px Arial;height:15px;height:16px;border:0px;" onfocus="this.blur()">GetTime</button>
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 updated GNOME time tracker For Linux
> Hamster is time tracking for individuals. It helps you to keep track of how much time you have spent during the day on activities you choose to track.
>fb.com/UndercOdeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/projecthamster/hamster
2) cd hamster
3) Locate the latest db
> ls --reverse -clt ~/.local/share/hamster*/*.db
Backup the last file in the list.
4) Kill hamster daemons
When trying a different version, make sure to kill the running daemons:
# either step-by-step, totally safe
> pkill -f hamster-service
> pkill -f hamster-windows-service
# check (should be empty)
> pgrep -af hamster
# or be bold and kill them all at once:
pkill -ef hamster
5) Install from packages
OpenSUSE
https://software.opensuse.org/package/hamster-time-tracker
Snap
Easy installation on any distribution supporting snap:
https://snapcraft.io/hamster-snap
6) Install from sources
Dependencies
Debian-based
Ubuntu (tested in 19.04 and 18.04)
> sudo apt install gettext intltool python3-gi-cairo python3-distutils python3-dbus python3-xdg
# and for documentation
> sudo apt install gnome-doc-utils yelp
π¦openSUSE
Leap-15.0 and Leap-15.1:
> sudo zypper install intltool python3-pyxdg python3-cairo python3-gobject-Gdk
sudo zypper install gnome-doc-utils xml2po yelp
RPM-based
RPM-based instructions below should be updated for python3 (issue #369).
> yum install gettext intltool dbus-python
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 updated GNOME time tracker For Linux
> Hamster is time tracking for individuals. It helps you to keep track of how much time you have spent during the day on activities you choose to track.
>fb.com/UndercOdeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/projecthamster/hamster
2) cd hamster
3) Locate the latest db
> ls --reverse -clt ~/.local/share/hamster*/*.db
Backup the last file in the list.
4) Kill hamster daemons
When trying a different version, make sure to kill the running daemons:
# either step-by-step, totally safe
> pkill -f hamster-service
> pkill -f hamster-windows-service
# check (should be empty)
> pgrep -af hamster
# or be bold and kill them all at once:
pkill -ef hamster
5) Install from packages
OpenSUSE
https://software.opensuse.org/package/hamster-time-tracker
Snap
Easy installation on any distribution supporting snap:
https://snapcraft.io/hamster-snap
6) Install from sources
Dependencies
Debian-based
Ubuntu (tested in 19.04 and 18.04)
> sudo apt install gettext intltool python3-gi-cairo python3-distutils python3-dbus python3-xdg
# and for documentation
> sudo apt install gnome-doc-utils yelp
π¦openSUSE
Leap-15.0 and Leap-15.1:
> sudo zypper install intltool python3-pyxdg python3-cairo python3-gobject-Gdk
sudo zypper install gnome-doc-utils xml2po yelp
RPM-based
RPM-based instructions below should be updated for python3 (issue #369).
> yum install gettext intltool dbus-python
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How Secure my Dsl Router :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Change the default password
If you do nothing else to secure your router, change the default password. Change it to be something long and strong. If your router supports it, a passphrase of three or more words might be ideal
2) Disable remote management
βRemote Managementβ is a feature that allows your router to be administered from anywhere on the internet.
3) Turn off Universal Plug and Play
Universal Plug and Play (UPnP) is a technology that allows software running on your machine to configure services like port forwarding (a way of allowing computers outside your network access your local computers directly) without you having to go in and administer the router manually.
4) Add a WPA2 key
5) Disable WPS
WPS, or Wi-Fi Protected Setup, doesnβt live up to its name β itβs not very βprotectedβ at all.
WPS was intended as a way to make setting up a protected Wi-Fi network easy. WPS would, with the push of a button, set up Wi-Fi encryption between the router and clients that supported it.
6) Turn off logging
This has less to do with configuring a secure router and more to do with maintaining your privacy.
This is also about making sure logging is still turned off, since if a router supports any kind of logging at all, itβll likely be off by default.
7) Secure your router physically
As weβve already seen, even if the default administrative password is unique to your device, itβs still visible to anyone with physical access to the router who can see the sticker on which itβs printed
8) Check for firmware updates
Routers (and access points) are really just small computers dedicated to a single task: handling network traffic. Normally the software β referred to as βfirmwareβ, since itβs stored within the deviceβs hardware β is solid and just works.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How Secure my Dsl Router :
t.me/UndercOdeTesting
π¦ ππΌππ πππΈβπ :
1) Change the default password
If you do nothing else to secure your router, change the default password. Change it to be something long and strong. If your router supports it, a passphrase of three or more words might be ideal
2) Disable remote management
βRemote Managementβ is a feature that allows your router to be administered from anywhere on the internet.
3) Turn off Universal Plug and Play
Universal Plug and Play (UPnP) is a technology that allows software running on your machine to configure services like port forwarding (a way of allowing computers outside your network access your local computers directly) without you having to go in and administer the router manually.
4) Add a WPA2 key
5) Disable WPS
WPS, or Wi-Fi Protected Setup, doesnβt live up to its name β itβs not very βprotectedβ at all.
WPS was intended as a way to make setting up a protected Wi-Fi network easy. WPS would, with the push of a button, set up Wi-Fi encryption between the router and clients that supported it.
6) Turn off logging
This has less to do with configuring a secure router and more to do with maintaining your privacy.
This is also about making sure logging is still turned off, since if a router supports any kind of logging at all, itβll likely be off by default.
7) Secure your router physically
As weβve already seen, even if the default administrative password is unique to your device, itβs still visible to anyone with physical access to the router who can see the sticker on which itβs printed
8) Check for firmware updates
Routers (and access points) are really just small computers dedicated to a single task: handling network traffic. Normally the software β referred to as βfirmwareβ, since itβs stored within the deviceβs hardware β is solid and just works.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β