UNDERCODE COMMUNITY
Anonymity complete GUIDE.rtf
01-first tip
02-introduction
3 - first tips
04 - about proxies
05 - cookies
06 - ftp transfers
07 - secure transactions
08 - SSL tunelling
09 - anonymity on irc
10 - mail crypto (and pgp usage)
11 - icq privacy
12 - spyware
13 - cleaning tracks
14 - ending words
02-introduction
3 - first tips
04 - about proxies
05 - cookies
06 - ftp transfers
07 - secure transactions
08 - SSL tunelling
09 - anonymity on irc
10 - mail crypto (and pgp usage)
11 - icq privacy
12 - spyware
13 - cleaning tracks
14 - ending words
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Are you a hackerβs dish? The trick to effectively prevent hackers from intruding :
1) The cyber attacker is an opportunist and will only choose the harder and easier
72% of the respondents said they would give up the attack if they could not go back to collect information at a high price in a short time.
The majority (73%) of respondents said they like to attack easy and low-cost targets.
2) Time is the enemy of cyber attackers
As long as the time required for the attack is increased by about two days (40 hours), the attack can be reduced by up to 60%.
On average, a skilled hacker will move on to other targets if it takes about a week (209 hours) to achieve the goal.
3) The rich income is just a legend
Generally, hackers make money from malicious attacks, and the average annual income is less than US$30,000, which is only a quarter of the annual salary of the average network security professional.
4) Fourth, a strong security system can increase the time to implement an attack
A skilled cyber attacker dealing with a "first-class" IT security facility requires twice the time (147 hours versus 70 hours) to plan and implement an attack than a "typical" IT security facility.
72% of respondents said that they would stop attacking organizations with strong defense capabilities.
π¦What method can effectively prevent hackers from intruding
Make yourself a "difficult to attack" target
Adopting a security system that focuses on intrusion prevention, rather than passive detection and incident response, can increase the difficulty of hacker attacks and lengthen the time required for the attack to make the hacker give up the attack.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Are you a hackerβs dish? The trick to effectively prevent hackers from intruding :
1) The cyber attacker is an opportunist and will only choose the harder and easier
72% of the respondents said they would give up the attack if they could not go back to collect information at a high price in a short time.
The majority (73%) of respondents said they like to attack easy and low-cost targets.
2) Time is the enemy of cyber attackers
As long as the time required for the attack is increased by about two days (40 hours), the attack can be reduced by up to 60%.
On average, a skilled hacker will move on to other targets if it takes about a week (209 hours) to achieve the goal.
3) The rich income is just a legend
Generally, hackers make money from malicious attacks, and the average annual income is less than US$30,000, which is only a quarter of the annual salary of the average network security professional.
4) Fourth, a strong security system can increase the time to implement an attack
A skilled cyber attacker dealing with a "first-class" IT security facility requires twice the time (147 hours versus 70 hours) to plan and implement an attack than a "typical" IT security facility.
72% of respondents said that they would stop attacking organizations with strong defense capabilities.
π¦What method can effectively prevent hackers from intruding
Make yourself a "difficult to attack" target
Adopting a security system that focuses on intrusion prevention, rather than passive detection and incident response, can increase the difficulty of hacker attacks and lengthen the time required for the attack to make the hacker give up the attack.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to see FPS, CPU load and other parameters in a game on a smartphone with Samsung One UI 3.0 ?
1) Unlocking settings for developers
The option is located in a hidden developer menu. To open it, you need to enter the system settings and go to the "About phone" section. There, find the "Program Information" section. Seven times in a row, click on the build number, after which you will need to enter the pin code, password or pattern that you use to unlock the device. After that, return to the main settings page and under the "About phone" section, the "For Developers" section will appear.
2) Enabling GPUWatch
Go to the "For Developers" section and scroll down to the "Games" subsection. Here select GPUWatch. Activate the switch on the next page.
3) Setting parameters
Three widgets give you all the information you need. They can be customized in different ways depending on your tastes. First, select general settings and the drop-down menu "Refresh interval". The frequency of data refresh is set here.
4) The next two sections control the appearance of the widgets. You can change the background color and transparency, as well as some other parameters.
On the home page, you can select individual widgets to customize their appearance. The ability to resize, rename widgets, turn on and off descriptions, change the color of graphs is given.
5) Use the floating button to add a widget, predefined or customized by you. In the case of predefined widgets, the information is grouped together by default. For example, CPU and GPU load may be related to FPS in one widget, but FPS and CPU load are not related in another. Custom widgets remove this limitation.
There are several additional options in the notification bar. Select "Unlock Widget" so you can move it. Select "Hide Widget" if you do not want to see graphs, but want to see information.
6) Setting performance parameters for your games
After activating and configuring GPUWatch, launch the game and view the data. Taking them into account, you can change the parameters of the game.
If you are not sure if the game supports 120fps, you can check in GPUWatch. If the machine is running slowly during the game, check the load on the CPU and GPU. You can monitor the impact of certain APIs such as OpenGL and Vulkan on the processor.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to see FPS, CPU load and other parameters in a game on a smartphone with Samsung One UI 3.0 ?
1) Unlocking settings for developers
The option is located in a hidden developer menu. To open it, you need to enter the system settings and go to the "About phone" section. There, find the "Program Information" section. Seven times in a row, click on the build number, after which you will need to enter the pin code, password or pattern that you use to unlock the device. After that, return to the main settings page and under the "About phone" section, the "For Developers" section will appear.
2) Enabling GPUWatch
Go to the "For Developers" section and scroll down to the "Games" subsection. Here select GPUWatch. Activate the switch on the next page.
3) Setting parameters
Three widgets give you all the information you need. They can be customized in different ways depending on your tastes. First, select general settings and the drop-down menu "Refresh interval". The frequency of data refresh is set here.
4) The next two sections control the appearance of the widgets. You can change the background color and transparency, as well as some other parameters.
On the home page, you can select individual widgets to customize their appearance. The ability to resize, rename widgets, turn on and off descriptions, change the color of graphs is given.
5) Use the floating button to add a widget, predefined or customized by you. In the case of predefined widgets, the information is grouped together by default. For example, CPU and GPU load may be related to FPS in one widget, but FPS and CPU load are not related in another. Custom widgets remove this limitation.
There are several additional options in the notification bar. Select "Unlock Widget" so you can move it. Select "Hide Widget" if you do not want to see graphs, but want to see information.
6) Setting performance parameters for your games
After activating and configuring GPUWatch, launch the game and view the data. Taking them into account, you can change the parameters of the game.
If you are not sure if the game supports 120fps, you can check in GPUWatch. If the machine is running slowly during the game, check the load on the CPU and GPU. You can monitor the impact of certain APIs such as OpenGL and Vulkan on the processor.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Various libraries (Libraries) and Android runtime environment (RunTime) :
This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:
1) C library: The standard library of C language, which is also one of the lowest level libraries in the system. The C library is implemented through Linux system calls.
2) Multimedia Framework (MediaFrameword): This part of the content is the core part of Android multimedia, based on PacketVideo (PV)
3) OpenCORE, functionally this library is divided into two parts, one part is the audio and video playback (PlayBack), and the other One part is audio and video records (Recorder).
4) SGL: 2D graphics engine.
5) SSL: The SecureSocket Layer is located between the TCP/IP protocol and various application layer protocols to provide security support for data communication.
6) OpenGL ES 1.0: This part provides support for 3D.
7) Interface management tool (Surface Management): This part provides functions such as managing the display subsystem.
8) SQLite: a general embedded database
9) WebKit: the core of the web browser
10) FreeType: The function of bitmap and vector font.
11) Various Android libraries are generally provided in the form of system middleware, and one of their distinctive features is that they are closely related to the applications of the mobile device platform. The Android operating environment mainly refers to the virtual machine technology-Dalvik. The Dalvik virtual machine is different from the general Java virtual machine (Java VM) in that it executes files in the Dalvik executable format (.dex) instead of the Java standard bytecode (bytecode). In the process of execution, each application is a process (a Process of Linux). The biggest difference between the two is that Java VM is a stack-based virtual machine (Stack-based), while Dalvik is a register-based virtual machine (Register-based). Obviously, the biggest advantage of the latter is that it can achieve greater optimization based on the hardware, which is more suitable for the characteristics of mobile devices.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Various libraries (Libraries) and Android runtime environment (RunTime) :
This level corresponds to the general embedded system and is equivalent to the middleware level. This level of Android is divided into two parts, one is various libraries, and the other is the Android runtime environment. The content of this layer is mostly implemented in C++. Among them, various libraries include:
1) C library: The standard library of C language, which is also one of the lowest level libraries in the system. The C library is implemented through Linux system calls.
2) Multimedia Framework (MediaFrameword): This part of the content is the core part of Android multimedia, based on PacketVideo (PV)
3) OpenCORE, functionally this library is divided into two parts, one part is the audio and video playback (PlayBack), and the other One part is audio and video records (Recorder).
4) SGL: 2D graphics engine.
5) SSL: The SecureSocket Layer is located between the TCP/IP protocol and various application layer protocols to provide security support for data communication.
6) OpenGL ES 1.0: This part provides support for 3D.
7) Interface management tool (Surface Management): This part provides functions such as managing the display subsystem.
8) SQLite: a general embedded database
9) WebKit: the core of the web browser
10) FreeType: The function of bitmap and vector font.
11) Various Android libraries are generally provided in the form of system middleware, and one of their distinctive features is that they are closely related to the applications of the mobile device platform. The Android operating environment mainly refers to the virtual machine technology-Dalvik. The Dalvik virtual machine is different from the general Java virtual machine (Java VM) in that it executes files in the Dalvik executable format (.dex) instead of the Java standard bytecode (bytecode). In the process of execution, each application is a process (a Process of Linux). The biggest difference between the two is that Java VM is a stack-based virtual machine (Stack-based), while Dalvik is a register-based virtual machine (Register-based). Obviously, the biggest advantage of the latter is that it can achieve greater optimization based on the hardware, which is more suitable for the characteristics of mobile devices.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to copy Kubernetes secrets between namespaces :
1) Creating Kubernetes secrets
We will create a secret with username and password from a file.
echo -n 'admin' > ./username.txt
echo -n 'Password' > ./password.txt
2) Run the kubectl create secret command to pack these files into a secret and create an object on the API server.
$ kubectl create secret generic my-user-pass --from-file=./username.txt --from-file=./password.txt
secret/my-user-pass created
Let's list our secrets:
$ kubectl get secrets
3) Copying Kubernetes secrets between namespaces
Use the following kubectl command syntax to copy a secret from one namespace to another namespace.
kubectl get secret <secret-name> \
--namespace=<source-nemespace> \
--export -o yaml | \
kubectl apply --namespace=<new-namespace> -f -
4) In my example, I will execute:
kubectl get secret my-user-pass \
--namespace=namespace1 \
--export -o yaml | \
kubectl apply --namespace=namespace2 -f -
5) Command execution output:
secret/my-user-pass created
Confirm the creation of the secret in the namespace.
$ kubectl get secret -n namespace2 my-user-pass
NAME TYPE DATA AGE
my-user-pass Opaque 2 38s
6) Decrypt the secret to confirm the correctness of the data:
secret_name="my-user-pass"
namespace="namespace2"
kubectl get secret -n $namespace $secret_name -o go-template='{{range $k,$v := .data}}{{printf "%s: " $k}}{{if not $v}}{{$v}}{{else}}{{$v | base64decode}}{{end}}{{"\n"}}{{end}}'
7) Command output:
password.txt: Password
username.txt: admin
If you have jq, you can use the following command to decrypt.
$ kubectl get secret my-user-pass -o json | jq '.data | map_values(@base64d)'
{
"password.txt": "Password",
"username.txt": "admin"
}
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦βΈοΈ How to copy Kubernetes secrets between namespaces :
1) Creating Kubernetes secrets
We will create a secret with username and password from a file.
echo -n 'admin' > ./username.txt
echo -n 'Password' > ./password.txt
2) Run the kubectl create secret command to pack these files into a secret and create an object on the API server.
$ kubectl create secret generic my-user-pass --from-file=./username.txt --from-file=./password.txt
secret/my-user-pass created
Let's list our secrets:
$ kubectl get secrets
3) Copying Kubernetes secrets between namespaces
Use the following kubectl command syntax to copy a secret from one namespace to another namespace.
kubectl get secret <secret-name> \
--namespace=<source-nemespace> \
--export -o yaml | \
kubectl apply --namespace=<new-namespace> -f -
4) In my example, I will execute:
kubectl get secret my-user-pass \
--namespace=namespace1 \
--export -o yaml | \
kubectl apply --namespace=namespace2 -f -
5) Command execution output:
secret/my-user-pass created
Confirm the creation of the secret in the namespace.
$ kubectl get secret -n namespace2 my-user-pass
NAME TYPE DATA AGE
my-user-pass Opaque 2 38s
6) Decrypt the secret to confirm the correctness of the data:
secret_name="my-user-pass"
namespace="namespace2"
kubectl get secret -n $namespace $secret_name -o go-template='{{range $k,$v := .data}}{{printf "%s: " $k}}{{if not $v}}{{$v}}{{else}}{{$v | base64decode}}{{end}}{{"\n"}}{{end}}'
7) Command output:
password.txt: Password
username.txt: admin
If you have jq, you can use the following command to decrypt.
$ kubectl get secret my-user-pass -o json | jq '.data | map_values(@base64d)'
{
"password.txt": "Password",
"username.txt": "admin"
}
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME WEBSITES FOR FREE BOOKS/PDFs Downloads:
https://digilibraries.com/
https://www.free-ebooks.net/
https://archive.org/details/books
https://bookboon.com/en
https://www.pdfdrive.com/
https://manybooks.net/
http://www.pdfsearchengine.net/
http://en.bookfi.net/
http://www.pdfbooksworld.com/books
https://www.sciencedirect.com/
http://calameo.pdf-downloader.com/
https://www.obooko.com/
https://play.google.com/store/books/
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME WEBSITES FOR FREE BOOKS/PDFs Downloads:
https://digilibraries.com/
https://www.free-ebooks.net/
https://archive.org/details/books
https://bookboon.com/en
https://www.pdfdrive.com/
https://manybooks.net/
http://www.pdfsearchengine.net/
http://en.bookfi.net/
http://www.pdfbooksworld.com/books
https://www.sciencedirect.com/
http://calameo.pdf-downloader.com/
https://www.obooko.com/
https://play.google.com/store/books/
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.free-ebooks.net
Free-eBooks.net | Download free Fiction, Marketing,electronic publishing ebooks
Read and Download eBooks for Free - Anytime! Find the help you seek, the information you need or simply fun reading to enjoy
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME GOOD HARDDISK REPAIRING TOOLS FOR WINDOWS :
http://windirstat.info/
http://clonezilla.org/
http://www.osforensics.com/tools/mount-disk-images.html
http://www.piriform.com/defraggler
http://ssd-life.com/eng/download-ssdlife.html
http://www.dban.org/
http://www.hdtune.com/index.html
http://crystalmark.info/software/CrystalDiskInfo/index-e.html
http://www.piriform.com/recuva
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME GOOD HARDDISK REPAIRING TOOLS FOR WINDOWS :
http://windirstat.info/
http://clonezilla.org/
http://www.osforensics.com/tools/mount-disk-images.html
http://www.piriform.com/defraggler
http://ssd-life.com/eng/download-ssdlife.html
http://www.dban.org/
http://www.hdtune.com/index.html
http://crystalmark.info/software/CrystalDiskInfo/index-e.html
http://www.piriform.com/recuva
β β β Uππ»βΊπ«Δπ¬πβ β β β
windirstat.net
Windows Directory Statistics
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Broadly speaking, the data used for tracking has three related applications:
1) Long-term data receiver
According to use cases, long-term storage such as HDFS can open large-scale analysis to discover "what is normal" in the network and then identify historical trends. It is a simple way to get data to the ELK (Elasticsearch Logstash Kibana) stack to perform search and trend analysis. This method of quickly searching for known IOCs uses an open source stack, while detecting any deviations from normal values.
2) Monitor
The monitor counts various DNS transmissions, such as the number of NXDOMAIN, the number of bytes requested, the number of requests, the number of user requests, or the requested distribution TLD, etc. It is very helpful to understand hourly and daily trends. Monitoring applications such as (Graphite) generate graphs and statistics for different data points and allow us to proactively identify anomalies.
3) Real-time threat tracking
When the data arrives, this user process records and detects threats in real time, and constantly searches for malicious transmission patterns, but it performs anomaly detection. Time series analysis, using link libraries such as Karios, to help track, detect abnormal behavior and all data interruptions or cycles.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Broadly speaking, the data used for tracking has three related applications:
1) Long-term data receiver
According to use cases, long-term storage such as HDFS can open large-scale analysis to discover "what is normal" in the network and then identify historical trends. It is a simple way to get data to the ELK (Elasticsearch Logstash Kibana) stack to perform search and trend analysis. This method of quickly searching for known IOCs uses an open source stack, while detecting any deviations from normal values.
2) Monitor
The monitor counts various DNS transmissions, such as the number of NXDOMAIN, the number of bytes requested, the number of requests, the number of user requests, or the requested distribution TLD, etc. It is very helpful to understand hourly and daily trends. Monitoring applications such as (Graphite) generate graphs and statistics for different data points and allow us to proactively identify anomalies.
3) Real-time threat tracking
When the data arrives, this user process records and detects threats in real time, and constantly searches for malicious transmission patterns, but it performs anomaly detection. Time series analysis, using link libraries such as Karios, to help track, detect abnormal behavior and all data interruptions or cycles.
don't copy our tutorials
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β