UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Establish a large-capacity Web-based Email system-FULL WRITTEN BY UNDERCODE :

β’Ύβ“ƒβ“ˆβ“‰β’Άβ“β“β’Ύβ“ˆβ’Άβ“‰β’Ύβ“„β“ƒ & β“‡β“Šβ“ƒ :


1) An Email system can be divided into a server and a client. The Email system of the Web interface puts the Email client on the Web server. Therefore, the Email system needs to implement an Email client of the Web interface. However, since this Email system requires a large number of users, there are specific requirements for the Email server.

γ€€γ€€β—† operating system and user databases

γ€€2) γ€€by providing high-capacity Email System requirements for the operating system and the database is very high, therefore, select the appropriate operating system and the database is the most basic question.

γ€€3) The storage of user data is usually in the form of a database that supports network access. Commonly used are ldap, standard database, and user database implemented by the email system itself. Among them, ldap is the standard for providing directory services, so it should be the best choice. Its commonly used open source code is openldap; while the standard database is easy to implement and has strong scalability, the most commonly used on the internet is mysql ; In addition, there are other ways to achieve.
γ€€γ€€β—† save messages

γ€€4) γ€€for bulk Email system, the most critical technical issue is how to handle mail storage, the manner in which to improve storage efficiency, we will determine the success of Email system or not.

5) γ€€γ€€Due to the large number of users, how to save the user's mail is a very important issue. Traditional Unix uses a single directory to store the mail of all users, which greatly reduces the performance of the file system when the number of users is large. Only by using multi-level directories, the number of files in each directory is limited, can the system consumption when opening files be reduced, or a simple file is no longer used to save mail, and a certain form of encapsulation is used. The form of database is used to store the mail completely. Because the user's mail operations are mostly file operations, and the size changes greatly, it will cause a large waste of performance and storage space.

γ€€6) γ€€Due to the huge number of users and the requirement to be accessed by multiple servers at the same time, servers or server clusters with large storage space must be used for storage, and the storage space must be shared through Fibre Channel or network file system NFS to make each user's mail storage The path is the same for each server. Fibre Channel is a very expensive solution. It is more common to use NFS. You can use a dedicated NFS server, such as NetApp, or use a PC Unix server with RAID capabilities.

γ€€7) γ€€When using NFS to share storage space, you must pay attention to a very important problem: due to the lack of file locking mechanism in NFS, when using the traditional user mail storage format mailbox, because all mail is stored in the same file, so mail The operation must be locked to ensure that there is no access violation, which makes it unsuitable for NFS storage. In order to solve this problem, qmail proposed the Maildir storage method, each mail is stored as a separate file in the user's personal mail directory, to avoid locking. Therefore, common free mail servers generally use Maildir to save users' mail.
8) γ€€γ€€If you do not intend to use the shared file system to save user mail, but intend to let each server only access user mail on its own hard disk storage space, then both the Email server and the client need to be customized so that they can pass the user name To find the real server to which the user belongs and hand over the access task to this server. The shortcomings of this method, in addition to the required large changes and complex system structure, but also because the server is divided according to users, is not conducive to sharing the load. Its advantage is also because it does not access other servers through the network, so it can use any mail storage format, including the use of a powerful cyrus system to save mail and provide services.

γ€€γ€€β—† mail server software

γ€€9) γ€€what kind of Email server software will ultimately affect the performance of the system, their own set of Email server may outweigh the benefits, now have two options: Sendmail and Qmail.

γ€€10) γ€€Standard Email software, such as sendmail, also provides some methods including aliases to support users of non-Unix systems, but these capabilities are not enough to implement this Email system. In order to support these Email users, they must use their own Email server software. However, since the existing Email software is quite mature, and it is also open source software, the usual practice is to modify the original Email software, such as sendmail, qmail, etc., to support specific Email users. Completely rewriting an Email service software is not desirable in terms of maturity and stability.
β—† Web client

γ€€1) γ€€what kind of script to use Web Email client program is not standard, but if the use of open source will save a lot of trouble.

γ€€2) γ€€Another important part of the Web interface Email system is the Web client. This part of the function will be like OutLook in the personal computer, which is responsible for providing users with the ability to access their own mail. Since Web access itself is connectionless, user security must be guaranteed. Basically, security can be guaranteed by the session ID, temporary directory established after login, and verification in the program.

γ€€γ€€3) The Web client must access the server in a unified manner. It can obtain the user's mail through direct file access, or through standard protocols such as POP3 and IMAP. For a system that uses a network file system to share user mail, the direct file access method is the most direct and convenient, and does not require additional consumption. The direct benefit of accessing the server through the POP3 and IMAP protocols is that the Web client and the Email server are separated, which improves system security.

γ€€γ€€4) At present, there are already quite mature open source web client software, in which IMP is implemented using PHP, and the web mail client software that accesses the server through the IMAP protocol; and WING is another web implemented using Perl Client software. These open source software are quite good, however, to integrate these software with your own system, you will need to make some changes. In addition, it should follow its licensing requirements and make the changed code public.

γ€€γ€€β—† load balancing

γ€€γ€€5) load balancing system will be a long-term problem, which determines the scalability of the system.

γ€€6) γ€€Due to the need to provide access to a large number of users, a single server cannot meet this need, and must use a multi-server approach. In addition to segmentation according to functionality, such as the separation of Web servers, Email servers, and file servers, it is also necessary to use multiple servers for load balancing for some resource-intensive services. Although some commercial manufacturers have also proposed some server cluster solutions, the commonly used simple and effective methods are DNS loop resolution, Web server relocation, and NAT load balancing.

γ€€γ€€7) DNS loop resolution is to assign multiple IP addresses to the same name. It is used on quite large sites such as Yahoo, and the actual effect is also quite good. The web server relocation is that the web server randomly generates real page URLs on different servers, so that different browsers load pages on different servers, and using it can only achieve load balancing of the web client. NAT load balancing uses a layer 4 switch to redirect the same request to different servers. In addition to expensive switches, there are also some software that can complete the NAT function. I have modified FreeBSD's natd to support load balancing, which is also an option for users who have to reduce performance requirements due to switch price issues.

γ€€γ€€β—† case study

γ€€γ€€8) there are many domestic Web Email system, Netease, 21CN and Sina Email is one of the representatives.

γ€€9) γ€€At present, the most popular Web interface Email system in China is Netease's system, which uses qmail as the basic server software and then changes it. It uses the NFS network file system as the user's mail storage space, uses Maildir as the mail storage format, and provides a multi-level directory to support a large number of users. Their Web client is implemented by themselves, providing users with services by directly accessing users' mail. Regardless of the small problems of its software, this implementation is very popular and mature, and most free mail service systems use this model.
10) γ€€Another way is to use existing open source software as much as possible. One feasible solution is to use Postfix, OpenLDAP, cyrus, and IMP to implement a large-capacity email system. Among them, the main mail server uses Postfix to query the LDAP server, determine the user's real email address, and then forward it to the real mail host. The host confirms through LDAP query and puts the mail in the cyrus server, while IMP logs in cyrus and uses IMAP to access User mail. When the number of users increases and a cyrus server is not enough, you can place the newly added users on the newly added server. You only need to set the corresponding attributes on the LDAP server. In this way, because users are strictly divided by servers, which causes difficulties in management and other difficulties, this structure itself is more complicated. However, if the number of users is not large, there is no need to use multiple cyrus servers and LDAP servers, the complexity is greatly reduced, and it is more suitable for small and medium-sized sites.


Written by Undercode Team
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Establish a large-capacity Web-based Email system-FULL WRITTEN BY UNDERCODE ...as used before by us
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Make your gmail account Top secure by Google :

1) At Google, we take online security seriously. To protect your Google Account, we strongly recommend following the steps below regularly.

2) Note: If you’re a journalist, activist, or someone else at risk of targeted online attacks, learn about the Advanced Protection Program.

πŸ¦‘Step 1: Do a Security Checkup

1) Go to Security Checkup to get personalized security recommendations for your Google Account, including:

2) Add or update account recovery options
3) Turn on 2-Step Verification
4) Remove risky access to your data
5) Turn on screen locks

πŸ¦‘Step 2: Update your software

1) If your browser, operating system, or apps are out-of-date, the software might not be safe from hackers. Keep your software updated to help protect your account.

2) Update your browser

3) Update your operating system

4) Update your apps

πŸ¦‘Step 3: Use unique, strong passwords

1) It’s risky to use the same password on multiple sites. If your password for one site is hacked, it could be used to get in to your accounts for multiple sites.

2) Make sure to create a strong, unique password for each account.

3) Manage your passwords
Help protect your password from hackers

πŸ¦‘Step 4: Remove apps & browser extensions you don’t need
As more apps are installed on a device, it can become more vulnerable. Install only essential apps and browser extensions on devices that have access to sensitive information. Avoid installing unknown apps or apps from unknown sources to protect your device and personal info.

Learn how to:

1) Delete or disable apps on Android devices

2) Uninstall extensions on Chrome

3) Uninstall apps or extensions on Chromebooks
Note: For info on removing apps and extensions from other devices and browsers, visit the applicable support site.

πŸ¦‘Step 5: Protect against suspicious messages & content
Hackers can use emails, text messages, phone calls, and web pages to pretend to be institutions, family members, or colleagues.

1) Avoid suspicious requests

2) Avoid suspicious emails

3) Avoid suspicious web pages


@UndercodeTesting > google resource secure gmail..
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Updated telegram group scraper tool. fetch all information about group members 221 stars :

π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) pkg install -y git python

2) $ git clone https://github.com/th3unkn0n/TeleGram-Scraper.git

3) $ cd TeleGram-Scraper

Install requierments

4) $ python3 setup.py -i

setup configration file ( apiID, apiHASH )
5) $ python3 setup.py -c

6) To Genrate User Data
$ python3 scraper.py

( members.csv is default if you changed name use it )
Send Bulk sms To Collected Data

7) $ python3 smsbot.py members.csv

Update Tool
$ python3 setup.py -u

βœ…
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁