UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
The Fully Remote Attack Surface of the iPhone .pdf
308.4 KB
The Most #requested tutorial
The Fully Remote Attack Surface of the iPhone
full
with pictures
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘4 dependency injection methods of Spring Bean by Undercode:
)

The so-called dependency injection is actually assigning values to properties in the object, because there are other objects in the object, so dependencies are formed. Spring has 4 ways to assign values to attributes:

1) Constructor injection
Constructor injection refers to injecting attributes or objects in the constructor to achieve dependency injection. As shown below, define a bean with id userDaoImpl in the tag, and inject the value of name as username and value as admin. After the injection is completed Get the value admin directly through this.username. The reference type uses the ref attribute, and the basic type uses the value attribute.

public class UserDaoImpl {

private String username;

public UserDaoImpl(String username) {
this.username = username;
}
<bean id="userDaoImpl" class="com.example.UserDaoImpl">
<constructor-arg name="username" value="admin"></constructor-arg>
</bean>

2) set method injection
The set method injection is to realize the dependency injection of attributes or objects by implementing get and set methods in the class. As shown below, define a Bean with an id of userDaoImpl in the label, and inject the value of name as username and value as admin , After the injection is completed, the value admin is directly obtained through getUsername().

public class UserDaoImpl {

private String username;


public String getUsername() {
return username;
}

public void setUsername(String username) {
this.username = username;
}
}
<bean id="userDaoImpl" class="com.example.UserDaoImpl">
<property name="username" value="admin"></property>
</bean>

3) Automatic assembly
Spring provides the function of automatic assembly, which simplifies our configuration. Automatic assembly is not turned on by default. There are two common ways:

byName: Automatic assembly by parameter name, as shown below, after the autowire with id of userService is set to byName, the IOC container will auto-assemble by name, and find that there is an attribute called userDao in the UserService class, and then look at the IOC container Is there an id of userDao, if so, install it.

 id="userDao" class="com.example.UserDao"></bean>
<bean id="userService" class="com.example.UserService" autowire="byName"/>

4) Annotation
The @Undercode_Autowired as example annotation can realize automatic assembly, as long as the annotation is marked on the corresponding attribute, but the @autowired_autowired annotation is only injected according to byType.

 class UserController {

@Autowired_example
private IUserService userService;
}

πŸ¦‘The @Resource annotation can realize automatic assembly. It has two important attributes: name and type. The name attribute is resolved to the name of the bean, and the type attribute is resolved to the type of the bean. So if the name attribute is used, the automatic injection strategy of byName is used, and the automatic injection strategy of byType is used if the type attribute is used. If neither the name nor the type attribute is specified, then the byName automatic injection strategy will be used through the reflection mechanism.


ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘All Popular WAYS TO HACK YOUR WIRELESS NETWORK?

Wireless Attacks have grown to be a very popular as it’s an easy way to attack a company’s network and steal information. Hackers use various methods and styles to steal your WiFi password and information. Below are a few ways a hacker can attack your wireless network to gain access to your data. Make sure you have security protocols and measures in place to for each!

1) Rouge Access Point
When an unauthorized access point (AP) is installed on your network and broadcasts a WiFi signal (SSID) that a hacker uses to hack your network.

2) Man in the Middle Attack
Hackers trick computers or mobile devices into sending their transmissions to the attacker’s system using various methods like creating duplicate wireless signals (SSID).

3) War Driving
War driving is when someone drives around with a WiFi scanning device and special software looking for vulnerable access points hack. They’ve even have taken it a step further and are now using drones to look for vulnerable access points in high rise offices. Ways to address this is turn down he power of your access point signal or hide your WiFi signal.

4) WEP ATTACKS
WEP Attacks: If your Wireless Network is using WEP Encryption to password protect it, you might as well call your WiFi SSID β€œFREE NETWORK ACCESS STEAL FROM ME”. Why? WEP is an earlier encryption method for WiFi that hackers have mastered how to crack quite easily.

5) Bluetooth Attacks: There are a variety of ways to attack a Bluetooth device that allows a hacker to takeover and steal information.

6) Bluejacking. This is the practice of sending unsolicited messages to nearby Bluetooth devices. It usually happens in crowded areas where a sender can find devices that are broadcasting their Bluetooth signal they can send messages to.

Bluesnarfing. Any unauthorized access to or theft of information from a Bluetooth connection is bluesnarfing.

Bluebugging. Allows an attacker to take over a device / phone. Attackers can listen in on phone conversations, enable call forwarding, send messages, and more.

Make sure that you put password protection on your Bluetooth device, keep you devices software up to date, and turn off your Bluetooth when not in use.

(darkwiki)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to implement user management in MySQL :

1)) What is the main function of the authorization mechanism?
The basic function of the authorization mechanism is to give a user on a host the select, insert, update, and delete permissions for a database. And its additional functions include whether to allow anonymous use of the database, using some specific functions of MysQL,

2)) How does the authorization mechanism work?
The combination of host and user is regarded as the only sign in MySQL. For example, the user lee on host 1 and host 2 are actually different, and their permissions to use MySQL can also be different. The core problem of the entire authorization mechanism is to solve the problem of granting a user who logs in from a host to use a database. You can test the authority of a user on a host for database operations through the script mysqlaccess. All authorization information is stored in the user, host and db tables of the database mysql. We can connect to this database through mysql mysql commands, and display the contents of each data table through select from user (or db, host).

3))The permissions granted in the user table are the basic authorization of the entire authorization mechanism, that is to say, the definition in user is applicable to any user + host, unless otherwise defined in the db table, therefore, for the user It is best to authorize based on a certain database. The main purpose of the host table is to maintain a list of "safe" servers. When considering the authority of a certain user/host to a certain database, we also need to study the matching search mechanism of the authorization mechanism:

4))First, we need to introduce the concept of a wildcard, which includes "% ", which means any (host, user or database), and if a record is empty, it also means any.

5))Secondly, a user's password can be encrypted in the authorization mechanism, and it must be encrypted. The encryption method is password ('password'). If the password is directly filled in, the database will be inaccessible.

ENJOYβ€οΈπŸ‘πŸ»
written by
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install ZFS Filesystem on Ubuntu :

ZFS is a file system created by Sun Microsystems. It was first shipped with Solaris but now available in other LINUX and UNIX operating systems. ZFS uses virtual storage pools known as zpools that can deal with the storage and management of a large amount of data.
Removing the ZFS storage pool

F E A T U R E S :

Let’s take a look at some of the features of ZFS file system:

> High storage capacity
> Data integrity
> Protection against data corruption
> Efficient data protection
> Date compression

πŸ¦‘Installing ZFS Filesystem on Ubuntu
We will be using the command line Terminal application for the installation of the ZFS filesystem. To launch the command line Terminal, use the Ctrl+Alt+T keyboard shortcut.

Now to install the ZFS filesystem on Ubuntu, issue the following command in Terminal:

1) $ sudo apt install zfsutils-linux

2) When prompted for the password, provide the sudo password.

3) After running the above command, the system might ask for confirmation that if you want to continue the installation or not. Press y to continue; after that, the package will be installed on your system.

To verify ZFS file system installation, issue the following command in Terminal:

$ which zfs

4) Creating the ZFS storage pool
After the installation is completed, we will now create a storage pool for our drives. Here are the steps to do so:

> First, find out the names of the drives for the pool. Use the following command in Terminal to do so:

$ sudo fdisk –l

5) To create the striped pool, use the following syntax:

$ sudo zpool create <pool_name> <drive1> <drive2>
To create the mirror pool, use the following syntax:

$ sudo zpool create <pool_name> mirror <drive1> <drive2>

6) If any error occurs, try forcing the command using the -f option after the zpool create command.

In the following example, we will create the striped pool named β€œtest” using the /dev/sdb and /dev/sdc.

$ sudo zpool create test /dev/sdb /dev/sdc

7 )To find out where the pool has been mounted, use the following command in Terminal:

$ df –h

8 )From the above command, we can see that the pool has been mounted at the /test. You can also change the mount point for the pool using the following syntax:

$ sudo zfs set mountpoint=<path> <pool_name>
For example, to set export/zfs as the new mount point, the command would be:

$ sudo zfs set mountpoint=/export/zfs test

9) Then use the following command to verify if the mount point has changed:

$ df –h | grep test

10) You can also create the directories under the storage pool. For example, to create a directory named files under the storage pool, the command would be:

$ sudo zfs create test/files

11) To view all the ZFS storage pools on the system, you can use the following command in Terminal:

$ zpool list
It lists all the pools along with their size, space usage, health, and some other information.

12) To view all the configurations and status of each device in the ZFS storage pool, use the following command in Terminal:

$ zfs status

13) If you experience some issues related to drives in the pool, you can use the events option. Issue the following command in Terminal to view events associated with a specific pool:

$ sudo zpool events pool_name –v

14) Removing the ZFS storage pool
If you no longer need the pool, you can remove it. However, note that removing the pool will also remove the files contained within it.

Use the following command syntax to remove the storage pool:

$ sudo zpool destroy pool_name
In this article, you have learned how to install the ZFS file system on Ubuntu 20.04 LTS (Focal Fossa). You have also learned how to create a storage pool in the ZFS file system and remove it when you no longer need it.

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Muhstik botnet aggressively attacked domestic cloud servers, thousands of servers have been lost :

>undercode detected a large number of attacks originating from overseas IP and some domestic IP against domestic cloud server tenants. The attacker blasted into the server via SSH (port 22), then executed malicious commands to download the Muhstik botnet Trojan, set up a botnet and controlled the lost server to execute SSH lateral movement, download the Monero mining Trojan, and accept remote commands to initiate DDoS attacks.

> After user authorization conducted a traceability analysis of the attack and found that the cloud servers of many well-known domestic companies were attacked by the botnet. At present, thousands of servers have been compromised, experts recommend that relevant companies take necessary measures to intercept intruders and restore systems that have been compromised.

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated WireSpy enables the automation of various WiFi attacks to conduct Man-In-The-Middle-Attacks (MITMAs).

> WireSpy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionality is implemented in order to keep records of the victims' traffic/activities. Other tools can be used together with Wirespy to conduct more advanced attacks.

πŸ¦‘Two type of attacks are supported at the moment:

1) Evil twin: Force victims to auto-connect to the honeypot by spoofing a "trusted" hotspot (clone an existing access point and de-authenticate its users to force them to transparently connect to the spoofed honeypot).

2) Honeypot: Set up a simple rogue hotspot and wait for clients to connect.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/aress31/wirespy.git

2) cd wirespy

3) $ chmod +x wirespy.sh

4) $ sudo ./wirespy.sh

5) COMMANDS :
Attacks:
eviltwin > launch an evil twin attack
honeypot > launch a rogue access point attack

F E A T U R E S :

> Capture victims' traffic.

> MAC address spoofing.

> Set-up honeypot and evil twin attacks.

> Show the list of in range access points.
Wireless adapter|card|dongle power amplification.

πŸ¦‘Tested by Undercode On :

- ubuntu

- undercode Linux

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TeamViewer exposes vulnerable computers that can be hacked without passwords by browsing specific web pages
:

> TeamViewer officially announced that a vulnerability has recently been fixed, which may allow an attacker to quietly establish a connection with your computer and further exploit the system. Vulnerability number: CVE-2020-13699, this vulnerability affects TeamViewer versions: 8,9,10,11,12,13,14,15.

> The picture above shows the CVE-2020-13699 PoC demonstration. Using an invisible iframe code in the web page will start the TeamViewer Windows desktop client and force it to open the remote SMB share . That is to say, the attacker does not need to know the TeamViewer password. This vulnerability will The system session permission of the victim machine is automatically authenticated and obtained permission.

> Windows will perform NTLM authentication when opening the SMB share, and can forward the request (using a tool such as a responder) to execute code (or capture the
request for hash cracking).

#news
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Information Security Professional (CISSP Preparation).pdf
530.5 KB
Information Security Professional (CISSP Preparation)
#FULL
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Repair USB disk and other removable devices via linux :
#FastTips

For our purposes, let's assume that you've already identified the problematic device / dev / sdb.

1) First, you need to make sure the drive is offline:

> sudo umount / dev / sdb


2) Now run the fsck command:

> sudo fsck / dev / sdb

3) Check the output for errors. If nothing appears, check the exit code with echo $ ?.

> There are also some flag options that we can add to enable automatic fixes.

4) Regardless, you can use -pfsck for automatic repair.

> sudo fsck -p / dev / sdb


5) Likewise, -y fixes will be applied to any detected file system corruption.

#FastTips
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

T E R M S :

πŸ¦‘The DNS ( Domain Name System ) is indisputably one of the most important parts of the internet. DNS is used to translate an actual name into these IP address numbers. Each device connected to the Internet has a unique IP address that other machines use to find the device. DNS records explain the link

πŸ¦‘Alexa traffic rank is determined by the web information company Alexa. Alexa internet, inc. is a California based subsidiary company of Amazone.com that provides commercial web traffic data. All Website ranking data provided by Alexa ( Amazon ) Tool. Check your Alexa rank now free our Tool Alexa rank checker.

πŸ¦‘What is ROT13 Encoding
It’s a letter substitution cipher and the latter’s are or are short for rotate. we rotating well each letter in the alphabet hash a numeric position 1 to 26 a is at position 1 and b is at position2 and z is a last position 26.

πŸ¦‘What is URL Encoding
URL encoding is simply just a way we can safely transfer data in the URL it is typically used inside the URL for things like URL parameter and query strings. when submitting get request or form posts request. it is simply just an encoding technique.

πŸ¦‘What is base64 encoding
Base64 is a group of binary-to-text encoding schemes that represent binary data in an ASCII string format by translating it into a radix-64 representation. Each Base64 digit represents exactly 6 bits of data.

base64 is a way to take any form of data to transform it into a long string of plaintext to be sent over the web.

E N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁'
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘RANDOM TIPS RELATED TO GNOME :
#FastTips

> GNOME has many libraries and components, but now we only need to know two of them: GTK+ and GNOME. You may have heard of TK, which is another toolkit for writing graphical interface applications using perl. TK The task is to tell X Server how to draw buttons, menus, dialog boxes, etc., and return some signals to trigger the corresponding Perl function to handle some changes.

> As an intermediary between the Perl program and X Server. GTK+ does similar work , But it turns out that it works more beautifully. It can provide all graphical elements, such as: buttons, text labels, text input, etc., using a loop waiting for events to achieve interaction.

> The GNOME library establishes an abstraction on top of GTK+ The first layer provides more advanced graphical objects, such as: main application window, about window, button panel, dialog box, color and font selection box, and provides collaboration with other GNOME environment programs (such as spelling checkers, calculators) interface.

@UNDERCODE_Testing
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Random pc hacking tips :

1) Control your computer through the "mouse hole"
:

> The night was dark and the wind was high, and a black figure rushed into a computer room. Skillfully opened a computer with important data. However, the data in this computer has been encrypted. To obtain these data, an administrator account must be used. The black shadow smiled disdainfully, and used a known ordinary authority account to enter the system. With the "help" of Microsoft Windows keyboard event privilege escalation vulnerability, it is easy to obtain administrator privileges to steal data. After leaving the computer room, his figure disappeared into the boundless darkness.

γ€€γ€€
2) Discover new vulnerabilities

> Due to design flaws, Windows desktop applications have overflow errors when processing keyboard events sent through the keybd_event() function. Attackers can send malicious keyboard events to desktop applications running with higher authority (such as explorer.exe). Execute arbitrary code with administrator rights. This vulnerability allows an account with ordinary user rights to use administrator rights to perform arbitrary operations on the system. The systems affected..

3) ready for intrusion tools

> pulist: A process PID viewer, you can view the PID value of the current system process at the command prompt.

γ€€γ€€
> keybd: An overflow tool for keyboard event privilege escalation vulnerability, through which system administrator privileges can be obtained.

γ€€γ€€
> nc: The "Swiss Army Knife" of hacker intrusion, a powerful tool for system port monitoring.

γ€€γ€€
4) Invasion process

γ€€γ€€
> One, get the process PID value

γ€€γ€€
> According to the characteristics of the vulnerability, we need to obtain the process PID value of a desktop application (such as explorer.exe). In the "Task Manager" of the system, we can't see the PID value of the process, so we need to use a small tool that can view the PID value of the system process-pulist. Run "pulist.exe" in the "command prompt" to display the PID value of the current system process...

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘bs2.dll manual deletion methode :

1. Click start, choose'run'
2. Type'cmd'-You should now have a DOS-commando window open.
3. Type cd "%WinDir%\System"
4. regsvr32 /u "..\rem00001.dll "
5. regsvr32 /u "..\bs2.dll"
6. regsvr32 /u "..\bs3.dll"
7. Click start, choose'run '
8. Type'regedit '
9. Find the key
HKEY_LOCAL_MACHINE\Software \Microsoft\Windows\CurrentVersion\Run
and delete the entry'BookedSpace' (BS2 variant) or'Bsx3' (BS3 variant).
10. Reboot your computer
11. Delete the'rem00001.dll','bs2.dll' or ' bs3.dll' file in the Windows folder.
12. Click start, choose'run' 13. Type'regedit

14. delete the key

HKEY_LOCAL_MACHINE\Software\Remanent or HKEY_LOCAL_MACHINE_Software\BookedSpace


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)

1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)

2) Copy the php4isapi.dll in the sapi directory to the c:\php directory

3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|

4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)

1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)

2) Copy the php4isapi.dll in the sapi directory to the c:\php directory

3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform-in the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|

4) (Required only for IIS 6) Open the IIS manager, click on the Web service extension, click on the properties of php, "required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.|

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Massive XS-Search over multiple Google products.pdf
539.1 KB
Massive XS-Search over multiple Google products
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses :

1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.

2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.

4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.

5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hacker methods to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses :

1) Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software that has not been anti-virus after downloading from the Internet , etc. These necessary habits will make you The computer is more secure.

2) Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3) Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc. Therefore, we should regularly download the latest security patches from the Microsoft website to prevent Before it happens.

4) Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.

5) Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect the network to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6) Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7) It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8) Users should also install personal firewall software to prevent hacking. Due to the development of the network, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hacker methods to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁