β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS BASHTOP ?
Bashtop should work with most modern Linux distributions with a terminal that supports truecolor.
Because it's written in Bash, installing Bashtop is as easy as downloading the bashtop script from its project page (or from the release archive) and installing it somewhere in your PATH. However, it has several dependencies that you need to make sure they are installed on your system (besides additional dependencies, in most cases others should already be installed):
F E A T U R E S :
1) Bash (it needs version 4.4 or newer, so it won't work, for example, on Ubuntu 16.04 or CentOS 7)
2) Basic GNU utilities
3) GNU Grep
4) ps from procps-ng (version 3.1.15 or newer, usually a
5) package named procps that you already installed)
6) sed
7) awk
8) Optional:
lm-sensors to display the CPU temperature (the package is usually named lm-sensors or lm_sensors; you need to run sensors-detect as root after installation to detect your computer's sensors)
9) curl to display messages about Bashtop updates and the ability to download additional themes (the curl package is available on most, if not all Linux distributions)
10) Easy to use, with a game inspired menu system.
11) Fast and "mostly" responsive UI with UP, DOWN keys process selection.
12) Function for showing detailed stats for selected process.
13) Ability to filter processes.
14) Easy switching between sorting options.
15) Send SIGTERM, SIGKILL, SIGINT to selected process.
17) UI menu for changing all config file options.
18) Auto scaling graph for network usage.
19) Shows message in menu if new version is available
20) Shows current read and write speeds for disks
21) Multiple data collection methods which can be switched if running on Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone https://github.com/aristocratos/bashtop
2) If you haven't got python3 installed:
> brew install python3
3) python3 -m pip install psutil
4) cd bashtop
5) sudo make install
More info & usage https://github.com/aristocratos/bashtop
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS BASHTOP ?
Bashtop should work with most modern Linux distributions with a terminal that supports truecolor.
Because it's written in Bash, installing Bashtop is as easy as downloading the bashtop script from its project page (or from the release archive) and installing it somewhere in your PATH. However, it has several dependencies that you need to make sure they are installed on your system (besides additional dependencies, in most cases others should already be installed):
F E A T U R E S :
1) Bash (it needs version 4.4 or newer, so it won't work, for example, on Ubuntu 16.04 or CentOS 7)
2) Basic GNU utilities
3) GNU Grep
4) ps from procps-ng (version 3.1.15 or newer, usually a
5) package named procps that you already installed)
6) sed
7) awk
8) Optional:
lm-sensors to display the CPU temperature (the package is usually named lm-sensors or lm_sensors; you need to run sensors-detect as root after installation to detect your computer's sensors)
9) curl to display messages about Bashtop updates and the ability to download additional themes (the curl package is available on most, if not all Linux distributions)
10) Easy to use, with a game inspired menu system.
11) Fast and "mostly" responsive UI with UP, DOWN keys process selection.
12) Function for showing detailed stats for selected process.
13) Ability to filter processes.
14) Easy switching between sorting options.
15) Send SIGTERM, SIGKILL, SIGINT to selected process.
17) UI menu for changing all config file options.
18) Auto scaling graph for network usage.
19) Shows message in menu if new version is available
20) Shows current read and write speeds for disks
21) Multiple data collection methods which can be switched if running on Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone https://github.com/aristocratos/bashtop
2) If you haven't got python3 installed:
> brew install python3
3) python3 -m pip install psutil
4) cd bashtop
5) sudo make install
More info & usage https://github.com/aristocratos/bashtop
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to set up automatic kernel updates on Linux :
Manual kernel updates require a system reboot. This leads to downtime, which can be problematic, so reboots are usually scheduled at regular intervals. Since manual patching is performed during these cycles, this gives hackers a "time window" in which they can attack the server infrastructure.
1) Canonical Livepatch is a service that fixes a running kernel without rebooting your Ubuntu system. Livepatch is free to use on three Ubuntu systems. To use this service on more than three computers, you need to subscribe to the Ubuntu Advantage program.
2) Before installing the service, you need to get a livepatch token from the Livepatch service website.
3) After installing the token and enabling the service by running the following two commands:
γ°οΈsudo snap install canonical-livepatch
γ°οΈsudo canonical-livepatch enable <your-key>
4) To check the status of the service, run:
γ°οΈsudo canonical-livepatch status --verbose
5) Later, if you want to unregister the machine, use this command:
γ°οΈsudo canonical-livepatch disable <your-key>
6) The same instructions apply for Ubuntu
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to set up automatic kernel updates on Linux :
Manual kernel updates require a system reboot. This leads to downtime, which can be problematic, so reboots are usually scheduled at regular intervals. Since manual patching is performed during these cycles, this gives hackers a "time window" in which they can attack the server infrastructure.
1) Canonical Livepatch is a service that fixes a running kernel without rebooting your Ubuntu system. Livepatch is free to use on three Ubuntu systems. To use this service on more than three computers, you need to subscribe to the Ubuntu Advantage program.
2) Before installing the service, you need to get a livepatch token from the Livepatch service website.
3) After installing the token and enabling the service by running the following two commands:
γ°οΈsudo snap install canonical-livepatch
γ°οΈsudo canonical-livepatch enable <your-key>
4) To check the status of the service, run:
γ°οΈsudo canonical-livepatch status --verbose
5) Later, if you want to unregister the machine, use this command:
γ°οΈsudo canonical-livepatch disable <your-key>
6) The same instructions apply for Ubuntu
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Signs of being hacked :
1) battery charge. If the battery of the smartphone begins to discharge rapidly, reducing the operating time of the device by several hours during normal use, then most likely this indicates the operation of malicious background applications;
2) The appearance in the general list of application icons of new ones that you have not installed may indicate that the device has been hacked;
3) notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of a request, if you have not had a hand in this, does not bode well either - for sure hackers already have your data;
4) balance. If your mobile account suffers losses, although you are convinced that you did not call paid numbers, did not order additional services and were not involved in any financial transactions, then we can say with certainty that your gadget has been hacked;
5) malfunctions. Strange signals during a conversation, extraneous noises or even disconnections with a good signal level can also indicate the use of the device's microphone or even listening to conversations;
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Signs of being hacked :
1) battery charge. If the battery of the smartphone begins to discharge rapidly, reducing the operating time of the device by several hours during normal use, then most likely this indicates the operation of malicious background applications;
2) The appearance in the general list of application icons of new ones that you have not installed may indicate that the device has been hacked;
3) notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of a request, if you have not had a hand in this, does not bode well either - for sure hackers already have your data;
4) balance. If your mobile account suffers losses, although you are convinced that you did not call paid numbers, did not order additional services and were not involved in any financial transactions, then we can say with certainty that your gadget has been hacked;
5) malfunctions. Strange signals during a conversation, extraneous noises or even disconnections with a good signal level can also indicate the use of the device's microphone or even listening to conversations;
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from WEB UNDERCODE - PRIVATE
Violent Python and Exploit Development.pdf
409.4 KB
A. Read and write simple Python scripts.
B. Perform network attacks, including port scanning, port knocking, and brute-forcing logins.
C. Compile Python scripts to Windows executables.
D. Bypass antivirus products with Python.
E. Find buffer overflow vulnerabilities with fuzzing.
F. Create remote code execution exploits for Linux and Windows targets.
G. Understand and defeat Windows defenses, including ASLR and DEP.
B. Perform network attacks, including port scanning, port knocking, and brute-forcing logins.
C. Compile Python scripts to Windows executables.
D. Bypass antivirus products with Python.
E. Find buffer overflow vulnerabilities with fuzzing.
F. Create remote code execution exploits for Linux and Windows targets.
G. Understand and defeat Windows defenses, including ASLR and DEP.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring ?
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring ?
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new update SIPVicious suite is a set of security tools that can be used to audit SIP based VoIP systems.:
1) svmap
this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP
2) servers
which it finds on the way. Also has the option to scan
hosts on ranges of ports.
3) svwar
identifies working extension lines on a PBX. A working extension is one that can be registered.
Also tells you if the extension line requires authentication or not.
4) svcrack
a password cracker making use of digest authentication.
It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files.
5) svreport
able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text.
6) svcrash
responds to svwar and svcrack SIP messages with a message that causes old versions to crash.
For usage help make use of -h or --help switch.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/enablesecurity/sipvicious.git
2) cd sipvicious/
Setup the tool.
3) python setup.py install
4) Fire-up the scripts one by one.
sipvicious_svmap --help
sipvicious_svcrack --help
sipvicious_svcrash --help
sipvicious_svwar --help
sipvicious_svreport --help
5) Installing via pip:
Simply using pip install sipvicious should do.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new update SIPVicious suite is a set of security tools that can be used to audit SIP based VoIP systems.:
1) svmap
this is a sip scanner. When launched against
ranges of ip address space, it will identify any SIP
2) servers
which it finds on the way. Also has the option to scan
hosts on ranges of ports.
3) svwar
identifies working extension lines on a PBX. A working extension is one that can be registered.
Also tells you if the extension line requires authentication or not.
4) svcrack
a password cracker making use of digest authentication.
It is able to crack passwords on both registrar servers and proxy servers. Current cracking modes are either numeric ranges or words from dictionary files.
5) svreport
able to manage sessions created by the rest of the tools and export to pdf, xml, csv and plain text.
6) svcrash
responds to svwar and svcrack SIP messages with a message that causes old versions to crash.
For usage help make use of -h or --help switch.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/enablesecurity/sipvicious.git
2) cd sipvicious/
Setup the tool.
3) python setup.py install
4) Fire-up the scripts one by one.
sipvicious_svmap --help
sipvicious_svcrack --help
sipvicious_svcrash --help
sipvicious_svwar --help
sipvicious_svreport --help
5) Installing via pip:
Simply using pip install sipvicious should do.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - EnableSecurity/sipvicious: SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developersβ¦
SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and applications. This toolset is useful in simulating VoIP hacking attacks...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A quick way to get the row count of all tables in a database is to query the data from the information_schema database directly:
#FastTips
// SELECT
table_name,
table_rows
FROM
information_schema.tables
WHERE
table_schema = 'classicmodels'
ORDER BY table_name; ////
1) This method is sometimes inaccurate because the number of rows in information_schema and the actual number of rows in the tables are out of sync. To avoid this, you must execute the ANALYZE TABLE statement before querying the row count from the information_schema database.
2) ANALYZE TABLE table_name, ...;
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A quick way to get the row count of all tables in a database is to query the data from the information_schema database directly:
#FastTips
// SELECT
table_name,
table_rows
FROM
information_schema.tables
WHERE
table_schema = 'classicmodels'
ORDER BY table_name; ////
1) This method is sometimes inaccurate because the number of rows in information_schema and the actual number of rows in the tables are out of sync. To avoid this, you must execute the ANALYZE TABLE statement before querying the row count from the information_schema database.
2) ANALYZE TABLE table_name, ...;
#FastTips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MySQL Security - Generate a random password :
MySQL has the ability to generate random passwords for user accounts, as an alternative to requiring explicit administrator-supplied literal passwords.
The database administrator can use CREATE USER, ALTER USER, or SET PASSWORD to generate random passwords for user accounts.
> Let's take a quick look at using MySQL 8.0
MySQL SQL> SELECT VERSION ();
+ ----------- +
| VERSION () |
+ ----------- +
| 8.0.19 |
+ ----------- +
1) Create user account
To create a new MySQL user account with a random password, use the CREATE USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:
MySQL SQL>
CREATE USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | M3BA1Po% as1Kse8Jt! AC |
+ ---------- + ----------- + ---------------------- +
2) Change user account
To assign a new random password for the MySQL user account, use the ALTER USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:
MySQL SQL>
ALTER USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| AndreyEx | localhost | SjAA * @ (LA & fd43IOj> vS |
+ ---------- + ----------- + ---------------------- +
3) Assign a password
Another way to assign a new random password to the MySQL user account is to use the SET PASSWORD statement with the TO RANDOM clause:
MySQL SQL>
4) SET PASSWORD FOR aUser @ localhost TO RANDOM;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | 7kaJY ^% x1 <b8kT & 84Du, |
+ ---------- + ----------- + ---------------------- +
5) Please note that by default the generated random passwords are 20 characters long.
This length is controlled by the generate_random_password_length system variable, which has a range of 5 to 255.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MySQL Security - Generate a random password :
MySQL has the ability to generate random passwords for user accounts, as an alternative to requiring explicit administrator-supplied literal passwords.
The database administrator can use CREATE USER, ALTER USER, or SET PASSWORD to generate random passwords for user accounts.
> Let's take a quick look at using MySQL 8.0
MySQL SQL> SELECT VERSION ();
+ ----------- +
| VERSION () |
+ ----------- +
| 8.0.19 |
+ ----------- +
1) Create user account
To create a new MySQL user account with a random password, use the CREATE USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:
MySQL SQL>
CREATE USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | M3BA1Po% as1Kse8Jt! AC |
+ ---------- + ----------- + ---------------------- +
2) Change user account
To assign a new random password for the MySQL user account, use the ALTER USER statement with the IDENTIFIED BY RANDOM PASSWORD clause:
MySQL SQL>
ALTER USER aUser @ localhost IDENTIFIED BY RANDOM PASSWORD;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| AndreyEx | localhost | SjAA * @ (LA & fd43IOj> vS |
+ ---------- + ----------- + ---------------------- +
3) Assign a password
Another way to assign a new random password to the MySQL user account is to use the SET PASSWORD statement with the TO RANDOM clause:
MySQL SQL>
4) SET PASSWORD FOR aUser @ localhost TO RANDOM;
+ ---------- + ----------- + ---------------------- +
| user | host | generated password |
+ ---------- + ----------- + ---------------------- +
| Stella | localhost | 7kaJY ^% x1 <b8kT & 84Du, |
+ ---------- + ----------- + ---------------------- +
5) Please note that by default the generated random passwords are 20 characters long.
This length is controlled by the generate_random_password_length system variable, which has a range of 5 to 255.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
How To Shot Web.pdf
9.9 MB
Find the road less traveled
^ means find the application (or parts of an application) less tested.
1. *.acme.com scope is your friend
2. Find domains via Google (and others!) a. Can be automated well via recon-ng and other tools.
3. Port scan for obscure web servers or services (on all domains)
4. Find acquisitions and the bounty acquisition rules a. Google has a 6 month rule
5. Functionality changes or re-designs
6. Mobile websites
7. New mobile app versions
^ means find the application (or parts of an application) less tested.
1. *.acme.com scope is your friend
2. Find domains via Google (and others!) a. Can be automated well via recon-ng and other tools.
3. Port scan for obscure web servers or services (on all domains)
4. Find acquisitions and the bounty acquisition rules a. Google has a 6 month rule
5. Functionality changes or re-designs
6. Mobile websites
7. New mobile app versions
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WHATSAPP CHAT-BOTS :
https://www.engati.com/
https://www.aivo.co/en/agentbot-automatic-support-chat/
https://www.messengerpeople.com/
https://botsociety.io/whatsapp-bot
https://panel.rapiwha.com/landing/#service
https://www.gupshup.io/developer/docs/bot-platform/guide/build-deploy-test-bots-on-whatsapp
https://whatsapp.yalochat.com/demo?utm_source=website5.0&utm_medium=WhatsAppDemo
https://www.liveperson.com/products/ai-chatbots/
https://www.chatcompose.com/whatsappen.html
https://landbot.io/whatsapp/
https://morph.ai/whatsapp
https://www.botsza.com/
https://snatchbot.me/
https://flow.ai/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WHATSAPP CHAT-BOTS :
https://www.engati.com/
https://www.aivo.co/en/agentbot-automatic-support-chat/
https://www.messengerpeople.com/
https://botsociety.io/whatsapp-bot
https://panel.rapiwha.com/landing/#service
https://www.gupshup.io/developer/docs/bot-platform/guide/build-deploy-test-bots-on-whatsapp
https://whatsapp.yalochat.com/demo?utm_source=website5.0&utm_medium=WhatsAppDemo
https://www.liveperson.com/products/ai-chatbots/
https://www.chatcompose.com/whatsappen.html
https://landbot.io/whatsapp/
https://morph.ai/whatsapp
https://www.botsza.com/
https://snatchbot.me/
https://flow.ai/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.engati.ai
The best free AI Chatbot & Live Chat Platform | Chatbot solution
Engati is the best free, no-code chatbot & live chat platform to build AI chatbots and engage in real-time conversations on WhatsApp, Website, Messenger, etc.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL WAYS REBOOT LINUX- ubuntu
Since restarting the server is a functionally critical task, it can only be performed by users with administrator rights. In other words, you need to be superuser or use sudo to run commands to restart or shutdown the system.
1) Use the reboot command
If you want to restart your Ubuntu server immediately, you can use this command:
> sudo reboot now
If you don't use "now" in the above command, it will reboot the system after one minute.
If for some reason your Ubuntu server won't restart, you can try restarting it with the -f option.
> sudo reboot -f
2) Use the shutdown command
There are other ways as well. Our preferred way is to use the shutdown command on Linux. With the -r option, the shutdown command will reboot the system rather than just shutting down.
> sudo shutdown -r now
You can specify a timestamp instead. 0 means immediate shutdown / reboot. You can also use the -h option to stop. With this option, the system will first kill all processes and then shutdown the CPU.
> sudo shutdown -r -h +0
3) Use the systemd command
Ubuntu uses systemd, so you can also use the systemd command to reboot your server:
> sudo systemctl reboot
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL WAYS REBOOT LINUX- ubuntu
Since restarting the server is a functionally critical task, it can only be performed by users with administrator rights. In other words, you need to be superuser or use sudo to run commands to restart or shutdown the system.
1) Use the reboot command
If you want to restart your Ubuntu server immediately, you can use this command:
> sudo reboot now
If you don't use "now" in the above command, it will reboot the system after one minute.
If for some reason your Ubuntu server won't restart, you can try restarting it with the -f option.
> sudo reboot -f
2) Use the shutdown command
There are other ways as well. Our preferred way is to use the shutdown command on Linux. With the -r option, the shutdown command will reboot the system rather than just shutting down.
> sudo shutdown -r now
You can specify a timestamp instead. 0 means immediate shutdown / reboot. You can also use the -h option to stop. With this option, the system will first kill all processes and then shutdown the CPU.
> sudo shutdown -r -h +0
3) Use the systemd command
Ubuntu uses systemd, so you can also use the systemd command to reboot your server:
> sudo systemctl reboot
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HASH CRACKING FREE ONLINE :
Best popular websites -list 2
md5cracker.org.
md5decrypt.org.
crackstation.net.
hashkiller.co.uk.
crackstation.net
hashkiller.co.uk
reverse-hash-lookup.online-domain-tools.com
md5decrypt.net
onlinehashcrack.com
cmd5.org
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HASH CRACKING FREE ONLINE :
Best popular websites -list 2
md5cracker.org.
md5decrypt.org.
crackstation.net.
hashkiller.co.uk.
crackstation.net
hashkiller.co.uk
reverse-hash-lookup.online-domain-tools.com
md5decrypt.net
onlinehashcrack.com
cmd5.org
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix vs. Sendmail :
#fastTips
Postfix and Sendmail are in the same category of Mail Transfer Agents. When selecting the MTA (Mail Transfer Agent) for your system, to choose the best option that meets your needs, you must consider a few important features, such as performance, security, documentation, and feasibility. The following points are given, based on which you can explore some technical aspects of MTAs:
1) More than one configuration file
2) Minimal syntax
3) Which type of scripting language is used
4) Check code stability
5) Source code contribution
6) Set of minimum features
Postfix vs. Sendmail β Comparison
Postfix and Sendmail are both MTAs, but the Postfix mail server is security-oriented, whereas Sendmail is a standard mail transfer agent for Unix systems. Based on the following features, we can easily compare some major differences.
#FastTips
unixforum
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Postfix vs. Sendmail :
#fastTips
Postfix and Sendmail are in the same category of Mail Transfer Agents. When selecting the MTA (Mail Transfer Agent) for your system, to choose the best option that meets your needs, you must consider a few important features, such as performance, security, documentation, and feasibility. The following points are given, based on which you can explore some technical aspects of MTAs:
1) More than one configuration file
2) Minimal syntax
3) Which type of scripting language is used
4) Check code stability
5) Source code contribution
6) Set of minimum features
Postfix vs. Sendmail β Comparison
Postfix and Sendmail are both MTAs, but the Postfix mail server is security-oriented, whereas Sendmail is a standard mail transfer agent for Unix systems. Based on the following features, we can easily compare some major differences.
#FastTips
unixforum
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to control your Mac with an iPhone :
1) Download Gateway on Mac
First you need to install Gateway on your computer.
> You can download the application from the Momentous Studio website https://www.momentous.studio/gateway or via the link below.
> The app is not available in the Mac App Store. It only works on macOS 10.13 High Sierra or newer.
Gateway Desktop for Mac https://gateway-software-update-bucket.s3.eu-west-1.amazonaws.com/Gateway.dmg
2) Install Gateway Desktop for Mac
Double click on the DMG file, which should be in the Downloads folder. The installation of the application will begin. When the disk image opens in a new window, add the Gateway Desktop to the Applications folder by dragging and dropping the icon there.
3) In the Applications folder, double-click the Gateway Desktop. Since this is a third-party program, you need to click on launch confirmation. Click "Open". You may need to change your gatekeeper settings if there is no Open button.
4) Give Gateway Desktop full disk access
When you start Gateway Desktop for the first time, some information is given. On the last page, you need to give a few permissions. The app asks for full disk access, which it needs to communicate and control your Mac with the iPhone. You can click the arrow button to open Settings> Security & Privacy.
5) If you click Next instead, you will be able to manually configure the settings. Before that, click on the Gateway Desktop icon in the Mac menu, then click on (β’β’β’) and "Exit". Now there will be no request to do this later.
6) Open the system settings, go to the "Security and privacy" section. From the Privacy tab in the left pane, select Full Disk Access. If the settings are locked, click on the lock at the bottom left, enter your password and click "Unlock".
If you do not see Gateway in the list of applications, click on the plus sign (+), find and select Gateway Desktop, click Open and make sure the checkbox is checked.
7) Give Gateway Desktop Accessibility
Before closing the settings, you need to give access to accessibility features. This allows the app to control your Mac from your iPhone. Select accessibility in the left pane, select Gateway from the list. If the app is not here, click on the (+) button, select Gateway Desktop, and click Open. Click on the lock at the bottom left to prevent further changes and exit the settings.
8) Reboot Gateway Desktop
You will need to log out and back in the Gateway Desktop application to apply the changes.
9) Select a password for remote access (optional)
When the Gateway Desktop application is running, click on the icon in the menu, select (β’β’β’) and go to settings. The "Security" tab should be open, where you need to enter the password and exit the settings. This step is optional, but provides an additional layer of security.
10) Installing Gateway on iPhone
On Mac, the installation is almost complete, now you need to install the program on your iPhone. The app is available in the iOS App Store. Requires iOS 13.2 or later. You can install the application on iPhone, iPad, iPod touch.
11) Find your Mac in Gateway Control
Open Gateway on iPhone, then wait for Mac to appear there. If you don't see it, make sure your computer and smartphone are on the same Wi-Fi network and then try again. When the device is found, the default Mac name and IP address will appear in the list. Click on it, enter your password and click "Connect". If you have not set a password, you can connect without it.
12) .Use the Gateway to remotely control your Mac
When you access your Mac via the iPhone app, you will see the System Control remote. Various functions can be performed here. When you select one of these, you need to grant more Gateway Desktop rights before you can use these features. Here's what you can do:
Sleep mode . The computer will be put to sleep without locking the screen.
Reboot .
Screen lock . To unlock, you will need to enter a password.
Shutdown .
Muting the sound .
Volume control .
π¦How to control your Mac with an iPhone :
1) Download Gateway on Mac
First you need to install Gateway on your computer.
> You can download the application from the Momentous Studio website https://www.momentous.studio/gateway or via the link below.
> The app is not available in the Mac App Store. It only works on macOS 10.13 High Sierra or newer.
Gateway Desktop for Mac https://gateway-software-update-bucket.s3.eu-west-1.amazonaws.com/Gateway.dmg
2) Install Gateway Desktop for Mac
Double click on the DMG file, which should be in the Downloads folder. The installation of the application will begin. When the disk image opens in a new window, add the Gateway Desktop to the Applications folder by dragging and dropping the icon there.
3) In the Applications folder, double-click the Gateway Desktop. Since this is a third-party program, you need to click on launch confirmation. Click "Open". You may need to change your gatekeeper settings if there is no Open button.
4) Give Gateway Desktop full disk access
When you start Gateway Desktop for the first time, some information is given. On the last page, you need to give a few permissions. The app asks for full disk access, which it needs to communicate and control your Mac with the iPhone. You can click the arrow button to open Settings> Security & Privacy.
5) If you click Next instead, you will be able to manually configure the settings. Before that, click on the Gateway Desktop icon in the Mac menu, then click on (β’β’β’) and "Exit". Now there will be no request to do this later.
6) Open the system settings, go to the "Security and privacy" section. From the Privacy tab in the left pane, select Full Disk Access. If the settings are locked, click on the lock at the bottom left, enter your password and click "Unlock".
If you do not see Gateway in the list of applications, click on the plus sign (+), find and select Gateway Desktop, click Open and make sure the checkbox is checked.
7) Give Gateway Desktop Accessibility
Before closing the settings, you need to give access to accessibility features. This allows the app to control your Mac from your iPhone. Select accessibility in the left pane, select Gateway from the list. If the app is not here, click on the (+) button, select Gateway Desktop, and click Open. Click on the lock at the bottom left to prevent further changes and exit the settings.
8) Reboot Gateway Desktop
You will need to log out and back in the Gateway Desktop application to apply the changes.
9) Select a password for remote access (optional)
When the Gateway Desktop application is running, click on the icon in the menu, select (β’β’β’) and go to settings. The "Security" tab should be open, where you need to enter the password and exit the settings. This step is optional, but provides an additional layer of security.
10) Installing Gateway on iPhone
On Mac, the installation is almost complete, now you need to install the program on your iPhone. The app is available in the iOS App Store. Requires iOS 13.2 or later. You can install the application on iPhone, iPad, iPod touch.
11) Find your Mac in Gateway Control
Open Gateway on iPhone, then wait for Mac to appear there. If you don't see it, make sure your computer and smartphone are on the same Wi-Fi network and then try again. When the device is found, the default Mac name and IP address will appear in the list. Click on it, enter your password and click "Connect". If you have not set a password, you can connect without it.
12) .Use the Gateway to remotely control your Mac
When you access your Mac via the iPhone app, you will see the System Control remote. Various functions can be performed here. When you select one of these, you need to grant more Gateway Desktop rights before you can use these features. Here's what you can do:
Sleep mode . The computer will be put to sleep without locking the screen.
Reboot .
Screen lock . To unlock, you will need to enter a password.
Shutdown .
Muting the sound .
Volume control .