UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘ ALL OLD MOBILE SECRET CODES
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW MOBILES SECRET CODES :

Field Mode: *3001#12345#*
Type *3001#12345#* into your phone's dialer and then press the green call button to access "Field Mode," which can give you access to info about local networks and cell towers.

You'll probably never ever have to know about your local cell tower's "Measured RSSi," but it's fun to look around for a bit.
General Test Mode: *#0*#
It works on Android. This prompts a library of different phone operations, which could be operated with a single push (e.g. Sleep, Front Cam, Vibration).
Display your IMEI: *#06#
To access it, type in the above code, and then the green call button to prompt your IMEI number.
The IMEI is unique to your device. Among other things, the number can help "blacklist" stolen devices or help with customer support.
Check Your Call Forwarding: *#67#
This code allows you to check which number your phone is currently forwarding calls to when you're busy or reject a call.

By default, this is probably your carrier's voicemail service, but you can change it to forward to a different number (a home number, office number, or third-party answering service for example). On an iPhone, you can change this number by going to Settings > Phone > Call Forwarding. On Android (varies from system to system), tap the Phone app > hamburger icon > Settings > Call > More Settings > Call forwarding
Get Even More Info on Call Forwarding: *#61#
On Galaxy phone, this code prompted a pop-up that explain how long until a call is forwarded to the message center. On the iPhone, regardless of carrier, this code just show the same info as *#67# .
Check Your Available Minutes: *646#
Apparently this one only works on postpaid plans. It work on Galaxy phone. Instead of showing the info on a new screen, it send to the phone a text message.
Check Your Bill Balance: *225#
On Android it prompt a SMS message with current balance due.
Hide Your Phone From Caller ID: #31#
Works on Android. But entering this code prompted a pop-up stating that Caller ID had been disabled. In order to re-instate Caller ID, enter *31# .
Check Your Billing Cycle: *3282#
Works on Android. It prompt an SMS message with billing info.
SMS Message Center: *5005*7672#
This code will tell you your SMS message center number.
Activate Call Waiting: *43#
This code will activate call waiting; you can deactivate it by entering #43#.
Quick Test Menu (Samsung Galaxy Only) *#7353#
This code only works on Samsung Galaxy models. This is similar to the General Test mode mentioned earlier, in that it brings up a menu with a number of one-tap test prompts.

Firmware (Samsung Galaxy Only) *#1234#
Only works on Galaxy devices. But it will let you know your phone's current firmware. So, have fun with that.

Codes working with most of cell phones
These code should work with most cell phones. Some may not be usable depending on the provider.
Code Function
press 1 for longer than one second Dial mailbox number (mailbox number must bve specified in the settings)
press # for longer than one seconds Activate/deactivate silent profile
*#0*# Can get into the service menu on modern smartphones
*#06# Display the IMEI (International Mobile Equipment Identity)
#31#[number][dial] Dial with own number being not displayed (replace [number] with the number to dial)
*31#[number][dial] Dial with own number being dispalyed (replace [number] with the number to dial)
*#33*[dial] Show status call locks
*43#[dial] Turn on tall waiting
#43#[dial] Turn off call waiting
*#43#[dial] Show status of call waiting
*135#[dia] Request own number (often does not work)
**04*[old Pin]*[new Pin]*[new Pin]# Change Pin (do not enter [ and ])
**05*[PUK]*[neue Pin]*[neue Pin]# Unlock Pin (do not enter [ and ])
**042*[old Pin2]*[new Pin2]*[new Pin2]# Change Pin2 (do not enter [ and ])
**052*[PUK]*[new Pin2]*[new Pin2]# Unlock Pin2 (do not enter [ and ])
*#0000# Display Software Version (Nokia and Samsung devices)
Codes for charges:
Codes Function
*100#[Dial] Request number and balance (Prepaid)
*101#[Dial] Request number and balance (Prepaid)
SMS:
Send SMS delayed:

Enter at the start of the SMS the text
*Later [seconds]#
and replace [secconds] with a number e.g. 10 for 10 seconds
Examplel:
*Later 30#Hello see you soon

Do not forget the space between later and the seconds!
This does not work with all providers.


Android Generic Hidden Codes
To enter these codes just pull up the default dialer app and use your chubby fingers to press the correct buttons.

Code Description
*#*#4636#*#* Display information about Phone, Battery and Usage statistics
*#*#7780#*#* Restting your phone to factory state-Only deletes application data and applications
*2767*3855# It’s a complete wiping of your mobile also it reinstalls the phones firmware
*#*#34971539#*#* Shows completes information about the camera
*#*#7594#*#* Changing the power button behavior-Enables direct poweroff once the code enabled
*#*#273283*255*663282*#*#* For a quick backup to all your media files
*#*#197328640#*#* Enabling test mode for service activity
*#*#232339#*#* OR *#*#526#*#* Wireless Lan Tests
*#*#232338#*#* Displays Wi-Fi Mac-address
*#*#1472365#*#* For a quick GPS test
*#*#1575#*#* A Different type GPS test
*#*#0283#*#* Packet Loopback test
*#*#0*#*#* LCD display test
*#*#0673#*#* OR *#*#0289#*#* Audio test
*#*#0842#*#* Vibration and Backlight test
*#*#2663#*#* Displays touch-screen version
*#*#2664#*#* Touch-Screen test
*#9090# Diagnostic configuration
*#872564# USB logging control
*#301279# HSDPA/HSUPA Control Menu
*2767*3855# Format device to factory state
*#9900# System dump mode
*#*#7780#*#* Reset the /data partition to factory state
*#7465625# Access phone lock status
*#12580*369# Software and hardware details
*#*#0588#*#* Proximity sensor test
*#*#3264#*#* Ram version
*#*#232331#*#* Bluetooth test
*#*#7262626#*#* Field test
*#*#232337#*# Displays bluetooth device address
*#*#8255#*#* For Google Talk service monitoring
*#*#4986*2650468#*#* PDA, Phone, Hardware, RF Call Date firmware info
*#*#1234#*#* PDA and Phone firmware info
*#*#1111#*#* FTA Software version
*#*#2222#*#* FTA Hardware verion
*#*#44336#*#* Displays Build time and change list number
*#06# Displsys IMEI number
*#*#8351#*#* Enables voice dialing logging mode
*#*#8350#*#* Disables voice dialing logging mode
##778 (+call) Brings up Epst menu
Testing Menu Code
The *#*#4636#*#* code is the most common one that people will use. There’s quite a bit of information you can pull up in this hidden menu.
Call diversion
Call diversion when busy:
Code Funktion
**67*number# Divert to the given number
#67# deactivate call diversion
##67# Erase call diversion
*#67# Request status for call diversion
Call diversion in case the handset is turned off or has not coverage:
Code Function
**62*number# Divert to the given number
#62# deactivate call diversion
##62# Erase call diversion
*#62# Request status for call diversion
Call diversion for not responding
Code Function
**61*number**x# Divert to the given number aber x seconds (x=5,10,15,20,25,30)
#61# Deactivate call diversion
##61# Erase call diversion
*#61# Request status of call diversion
Call diversion for all conditions above:
Code Function
*#004*number# Divert to the given number
#004# Deactivate call diversion
##004# Erase call diversion
*#004# Request status for call diversion
Always divert:
Code Function
*#21*number# Always divert to given number
#21# Deactivate call diversion
##21# Erase call diversion
*#21# Request status for call diversion
Erase all call diversions:
Code Function
##002#[dial] Remove all call diversions


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ ALL MOBILE SECRET CODES -NEW /OLD
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
t.me/UndercodeTesting

πŸ¦‘Exploit "raw bytes".

1) We ultimately want to inject the exploit into the target's memory, and directly run it. In order to do that, we need to inject only the relevant instructions (opcodes) and the necessary data.

2) Hence, we extract the code segment (the opcodes) from PIC.exe, and append the necessary data (the malformed font, font-data.bin) into a sequence of bytes.

3) This produces the "raw bytes" that we can directly inject into the target and call CreateRemoteThread() on.

4) This process is automated through the Python script named make-raw-bytes.py. The output is raw-bytes.bin.

πŸ¦‘Injection into target.
To convert the "raw bytes" into an .exe that actually injects the "raw bytes" into a target, we need to call WriteProcessMemory() & CreateRemoteThread().

1) This process is handled by make-injector-cpp.py. The output is injector.cpp, a piece of code which, when compiled, takes a target PID and executes the exploit.

2) Convenience wrapper.
As a convenience, make.bat will produce injector.exe directly by performing the steps described above.

> In other words, make.bat will:

make-raw-bytes.py
make-injector-cpp.py
build injector.exe

πŸ¦‘download :
> https://github.com/vlad902/hacking-team-windows-kernel-lpe

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEBSITES TO DOWNLOAD ANYTHING CRACKED :


https://profreecrack.com.

https://www.ask4pc.net.

https://crackingpatching.com.

https://getintopc.com.

https://crackhomes.com.

https://www.piratecity.net.

https://www.onhaxcrack.me.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ torrents websites 2020-most popular :

#1 YTS.am

#2 ThePirateBay.org

#3 1337x.to

#4 Rutracker.org

#5 Rarbg.to

#6 Nyaa.si

#7 Torrentz2.eu

#8 eztv.io

#9 torrent9.uno (torrent9.nz)

#10 limetorrents.info

#11 Zooqle.com

#12 katcr.co

#13 Torrentdownloads.me

#14 Magnetdl.com

#15 torlock.com

#16 pcgamestorrents.com

#17 arenabg.com

#18 torrentgalaxy.org

#19 ettv.tv (ettv.to)

#20 torrentfunk.com

#21 seedpeer.me

#22 btdig.com

#23 yourbittorrent.com

#24 monova.org

#25 idope.se


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁\
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Marketplace Commercial Services .onion deep web- for tor browser :
2020 - 7/24 and 24/24

http://6w6vcynl6dumn67c.onion/ – Tor Market Board – Anonymous Marketplace Forums
http://wvk32thojln4gpp4.onion/ – Project Evil
http://5mvm7cg6bgklfjtp.onion/ – Discounted electronics goods
http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ – Unfriendlysolution – Legit hitman service
http://nr6juudpp4as4gjg.onion/torgirls.html – Tor Girls
http://tuu66yxvrnn3of7l.onion/ – UK Guns and Ammo
http://nr6juudpp4as4gjg.onion/torguns.htm – Used Tor Guns
http://ucx7bkbi2dtia36r.onion/ – Amazon Business
http://nr6juudpp4as4gjg.onion/tor.html – Tor Technology
http://hbetshipq5yhhrsd.onion/ – Hidden BetCoin
http://cstoreav7i44h2lr.onion/ – CStore Carded Store
http://tfwdi3izigxllure.onion/ – Apples 4 Bitcoin
http://e2qizoerj4d6ldif.onion/ – Carded Store
http://jvrnuue4bvbftiby.onion/ – Data-Bay
http://bgkitnugq5ef2cpi.onion/ – Hackintosh
http://vlp4uw5ui22ljlg7.onion/ – EuroArms
http://b4vqxw2j36wf2bqa.onion/ – Advantage Products
http://ybp4oezfhk24hxmb.onion/ – Hitman Network
http://mts7hqqqeogujc5e.onion/ – Marianic Technology Services
http://mobil7rab6nuf7vx.onion/ – Mobile Store
http://54flq67kqr5wvjqf.onion/ – MSR Shop
http://yth5q7zdmqlycbcz.onion/ – Old Man Fixer’s Fixing Services
http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png – PC Shop
http://storegsq3o5mfxiz.onion/ – Samsung StorE
http://sheep5u64fi457aw.onion/ – Sheep Marketplace
http://nr6juudpp4as4gjg.onion/betcoin.htm – Tor BetCoin
http://qizriixqwmeq4p5b.onion/ – Tor Web Developer
http://vfqnd6mieccqyiit.onion/ – UK Passports
http://en35tuzqmn4lofbk.onion/ – US Fake ID Store
http://xfnwyig7olypdq5r.onion/ – USA Citizenship
http://uybu3melulmoljnd.onion/ – iLike Help Guy
http://dbmv53j45pcv534x.onion/ – Network Consulting and Software Development
http://lw4ipk5choakk5ze.onion/raw/4585/ – Quick Solution (Hitman)
http://nr6juudpp4as4gjg.onion/tynermsr.htm – Tyner MSR Store

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Bugs
What makes bWAPP, our extremely buggy web application, so unique?

> SQL, HTML, iFrame, SSI, OS Command, PHP, XML, XPath, LDAP, Host Header and SMTP injections

> Cross-Site Scripting (XSS), Cross-Site Tracing (XST) and Cross-Site

>Request Forgery (CSRF)

> AJAX and Web Services issues (jQuery/JSON/XML/SOAP/WSDL)

> Authentication, authorization and session issues, file upload flaws and backdoor files

>Arbitrary file access, directory traversals, local and remote file inclusions (LFI/RFI)

> Configuration issues: Man-in-the-Middle, cross-domain policy files, information disclosures,...

> HTTP parameter pollution, HTTP response splitting and HTTP verb tampering

> Insecure DistCC, FTP, NTP, Samba, SNMP, VNC and WebDAV configurations

> HTML5 ClickJacking, Cross-Origin Resource Sharing (CORS) and web storage issues

> XML External Entity attacks (XXE) and Server Side Request Forgery (SSRF)

> Heartbleed and Shellshock vulnerability (OpenSSL), Denial-of-Service (DoS) attacks

> Parameter tampering, cookie and password reset poisoning

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘IndexedDB vs LocalStorage :


1) Both IndexedDB and LocalStorage are used to store data in the browser, but they use different technologies and have different uses.

2) You need to choose which one to use according to your situation. LocalStorage stores data in key-value mode, but unlike IndexedDB, its data is not stored in object form. The data it stores is in the form of strings. If you want LocalStorage to store objects, you need to use the JSON.stringify()ability to turn the object into a string form, and then use JSON.parse()the string to restore the object. But if you want to store a lot of complex data, this is not a good solution. After all, localstorage is specifically designed for small amounts of data, and its APIs are synchronized.

3) IndexedDB is very suitable for storing large amounts of data, and its API is called asynchronously. IndexedDB uses indexes to store data, and various database operations are performed in transactions. IndexedDB even supports simple data types. IndexedDB is much more powerful than local storage, but its API is also relatively complex.

4) For simple data, you should continue to use local storage, but when you want to store a large amount of data, IndexedDB will obviously be more suitable. IndexedDB can provide you with a more complicated way to query data.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘This specification introduces a set of APIs to manipulate client-side databases using SQL.> ANONYMOUSLY ! :

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹:


1) This specification introduces a set of APIs to manipulate client-side databases using SQL.

2) The API is asynchronous, so authors are likely to find anonymous functions (lambdas) very useful in using this API.

3) Here is an example of a script using this API. First, a function prepareDatabase() is defined. This function returns a handle to the database, first creating the database if necessary. The example then calls the function to do the actual work, in this case showDocCount().

function prepareDatabase(ready, error) {
return openDatabase('documents', '1.0', 'Offline document storage', 5*1024*1024, function (db) {
db.changeVersion('', '1.0', function (t) {
t.executeSql('CREATE TABLE docids (id, name)');
}, error);
});
}

function showDocCount(db, span) {
db.readTransaction(function (t) {
t.executeSql('SELECT COUNT(*) AS c FROM docids', [], function (t, r) {
span.textContent = r.rows[0].c;
}, function (t, e) {
// couldn't read database
span.textContent = '(unknown: ' + e.message + ')';
});
});
}

prepareDatabase(function(db) {
// got database
var span = document.getElementById('doc-count');
showDocCount(db, span);
}, function (e) {
// error getting database
alert(e.message);
});
Forwarded from PRIVATE UNDERCODE
πŸ¦‘The executeSql() method has an argument intended to allow variables to be substituted into statements without risking SQL injection vulnerabilities:

db.readTransaction(function (t) {
t.executeSql('SELECT title, author FROM docs WHERE id=?', [id], function (t, data) {
report(data.rows[0].title, data.rows[0].author);
});
});
Sometimes, there might be an arbitrary number of variables to substitute in. Even in these case, the right solution is to construct the query using only "?" characters, and then to pass the variables in as the second argument:

function findDocs(db, resultCallback) {
var q = "";
for each (var i in labels)
q += (q == "" ? "" : ", ") + "?";
db.readTransaction(function (t) {
t.executeSql('SELECT id FROM docs WHERE label IN (' + q + ')', labels, function (t, data) {
resultCallback(data);
});
});
}

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
πŸ¦‘ specification introduces a set of APIs to manipulate client-side databases using SQL.> ANONYMOUSLY ! FULL CODE
Forwarded from PRIVATE UNDERCODE
Forwarded from PRIVATE UNDERCODE
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Common hacker software usage classification :
Pinterest.com/Undercode_Testing
πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹:

1) Prevention:
This is from From the perspective of security, a type of software involved, such as firewalls, virus checking software, system process monitors, port management programs, etc., are all such software .

> This type of software can ensure the safety and personal privacy of computer users to the greatest extent, and will not be destroyed by hackers. The network server also attaches great importance to the needs of such software, such as log analysis software and system intrusion software, which can help administrators maintain the server and track hackers who invade the system.

2) Information collection:
There are many types of information collection software, including scanning software such as port scanning, vulnerability scanning, weak password scanning, etc.; And spyware such as interception and interception of information packets. Most of them are software that is right and wrong.

> That is to say, no matter whether it is a decent hacker, an evil hacker, a system administrator, or a general computer user, user software can accomplish different purposes. In most cases, the frequency of hacker user software is higher because they need to rely on such software to scan the server in an all-round way to obtain as much information about the server as possible. After having a full understanding of the server In order to hack.

3) Third, Trojans and worms:
These are two types of software, but they work on the same principle, both are hidden and destructive by viruses. In addition, such software can also be operated by people with control rights, or by prior A well- designed program completes certain work. Of course, this type of software can also be used by system administrators as a tool for remote management of servers.

4) Flood: The
so-called "flood" is an information spam bomb. A large number of spam requests can cause the target server to overload and collapse. In recent years, DOS distributed attacks have become popular on the network. Simply put, it can also be classified here. Software. The flood software can also be used as a mail bomb or a chat bomb. These are simplified and fool-proof software programmed by cybersecurity enthusiasts, and are often used in the hands of β€œpseudo hackers” accused at the beginning of this book .

5) Password cracking:
The most practical way to guarantee network security is to rely on a password system with various encryption algorithms. A hacker may easily obtain a cipher password file, but without an encryption algorithm, it still cannot obtain a real password. Therefore, the use of password cracking software is imperative. Taking advantage of the high-speed computing power of the computer, such software can restore encrypted ciphertext using a password dictionary or exhaustive methods.

6) Deception:
If you want to obtain the plaintext password mentioned above, the hacker needs to restore the encryption algorithm of the ciphertext, but if it is a complex password, it is not so simple to crack. But is it more convenient for someone who knows the password to tell the hacker the prototype of the password directly? Deceptive software is designed for this purpose.

7) Disguise:
Various operations performed on the network will be recorded by the ISP and the server. If hacking is performed without good disguise, it will be easily traced to the hacker ’s location by anti-tracking technology, so disguise his own IP Address and identity are a very important compulsory course for hackers, but camouflage technology requires deep network knowledge. This kind of software will be used at the beginning without a solid foundation.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The classification of network security software
twitter.com/UndercodeNews

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹:

> Now let's take a look at the classification of network security software, because learning hacker knowledge is two interrelated processes: both learning how to hack, but also learn how to prevent hacking.


1) Firewall:

> This is the most common security mechanism software on the network. There are hardware and software in the firewall. Most readers may see software firewalls. Its functions are mainly to filter spam (to ensure that the system will not be attacked by bombs), prevent worm intrusion, prevent hacker intrusion, increase system privacy (protect sensitive data),

> monitor system resources in real time, prevent system crashes, and regularly maintain databases Back up the main information ... The firewall can patch the loopholes of the system itself, so that hackers have no chance to start. In addition, for enterprises with LANs, firewalls can restrict the opening of system ports and prohibit certain network services (to prevent Trojans).

2) Detection software:
There are tools on the Internet specifically for the removal of a hacker program, but this type of software is more integrated in antivirus software or firewall software. It can detect and remove Trojans and worms in the system.

> Software In order to protect the system from infringement, it will automatically protect the hard disk data, automatically maintain the registry file, detect the content and code, and monitor the open state of the system port. If the user needs, the software can also write relevant scripts to block the specified port (the firewall also has this function).

3) Backup tool: a tool
specifically used to back up data can help the server regularly back up the data and update the data at a set time, so that even if a hacker destroys the database on the server, the software can completely repair the received data in a short time .

> In addition, for individual users, this type of software can perform a full image backup of the hard disk. Once the system crashes, users can use this type of software to restore the system to its original state. For example, Ghost is the leader in this type of software.

4) Log recording and analysis tools:
For the server, log files are indispensable. Administrators can understand the server's request type and request source through the log, and judge whether the system has been hacked according to the log.

> Through the log analysis software, the administrator can easily trace back the invading hackers, find the source of the hackers' attacks, and then catch the hackers. This is why hackers often use IP address masquerading, server jumps when attacking, and clear log files after invading the server.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from PRIVATE UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘PREMIUM PROXIES :

168.227.229.96 8888
2825 ms 12% (61) br Brazil - Aguai Elite -
159.8.114.37 8123
438 ms 88% (41) fr France - Clichy Elite -
103.119.54.188 8888
4571 ms 12% (68) cn China Elite -
88.198.33.232 1080
3626 ms 33% (68) de Germany - Unterfoehring Elite -
58.96.135.93 8080
4807 ms 6% (78) au Australia Elite -
85.90.215.111 3128
3317 ms 15% (70) ua Ukraine - Kharkiv Elite -
85.172.104.162 8000
697 ms 54% (56) ru Russia - Gelendzhik Elite -
80.187.140.26 8080
671 ms 100% (57) de Germany Elite -
64.225.112.121 8080
1654 ms 54% (58) us United States - New York Elite -
222.93.72.121 8118
3004 ms 13% (62) cn China - Suzhou Elite -
175.100.30.156 25
3506 ms 33% (56) kh Cambodia Elite -
139.199.201.249 1080
4022 ms 14% (69) cn China - Beijing Elite -
120.79.48.160 8080
2751 ms 30% (61) cn China Elite -
193.112.113.26 1080
3580 ms 12% (70) cn China Elite -
157.119.207.36 6666
3954 ms 15% (71) in India - Satara Elite -
159.138.1.185 80
3702 ms 21% (64) hk Hong Kong Elite -
103.70.162.181 8080
3344 ms 7% (72) in India - New Delhi Elite -
155.93.240.101 8080
2575 ms 22% (61) za South Africa - Brackenfell Elite -
134.249.141.148 8080
4769 ms 15% (64) ua Ukraine - Lviv Elite -
144.76.214.156 1080
3011 ms 44% (53) de Germany Elite -
118.24.89.206 1080
4111 ms 11% (59) cn China Elite -
182.253.31.82 8080
3877 ms 7% (73) id Indonesia - Surabaya Elite -
91.192.4.162 8090
3998 ms 10% (76) iq Iraq - Baghdad Elite -
101.4.136.34 80
1057 ms 48% (55) cn China Elite -
103.216.51.210 8080
1126 ms 12% (71) kh Cambodia - Phnom Penh Elite -
46.99.255.235 8080
3266 ms 8% (69) al Albania Elite -
91.207.61.196 1182
849 ms 5% (88) ua Ukraine Elite -
91.209.25.157 8080
2292 ms 16% (65) fr France - Maurepas Elite -
79.115.245.227 8080
2917 ms 17% (62) ro Romania - Oradea Elite -
78.46.40.156 8118
1262 ms 18% (70) de Germany - Nuremberg Elite -
46.28.229.78 3128
644 ms 3% (84) ru Russia - St Petersburg Elite -
200.70.22.74 8080
3349 ms 8% (67) ar Argentina - Rosario Elite -
200.108.183.2 8080
3065 ms 20% (77) uy Uruguay Elite -
145.239.121.218 3129
1739 ms 84% (48) gb United Kingdom Elite -
176.114.128.131 3128
4622 ms 3% (69) ru Russia - Bratsk Elite

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁