Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable shell script rc.local in systemd at boot of Linux system ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
4) Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
5) let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π¦ How to save file to Vi / Vim and exit ?
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
Here's what we see on the screen:
β rc-local.service - /etc/rc.local Compatibility
Loaded: loaded (/etc/systemd/system/rc-local.service; enabled-runtime; ven>
Drop-In: /usr/lib/systemd/system/rc-local.service.d
ββdebian.conf
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to enable shell script rc.local in systemd at boot of Linux system ?
1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.
2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.
3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.
I'm going to use the vim command:
$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡΡΠ΅Π΄Π°ΠΊΡΠΈΡΡΠΉΡΠ΅ ΡΠ°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local
4) Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here
5) let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect
# last line must be exit 0
exit 0
Save and close the file when using vim.
π¦ How to save file to Vi / Vim and exit ?
Make sure you set the executable permissions for the file with the chmod command:
$ sudo chmod -v +x /etc/rc.local
Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:
$ sudo systemctl enable rc-local.service
Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service
Here's what we see on the screen:
β rc-local.service - /etc/rc.local Compatibility
Loaded: loaded (/etc/systemd/system/rc-local.service; enabled-runtime; ven>
Drop-In: /usr/lib/systemd/system/rc-local.service.d
ββdebian.conf
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to track a person's location without their knowledge using an iPhone ?
Track Location with iKeyMonitor
This application also has geo-tracking. Follow the steps below to learn how to use iKeyMonitor.
We recommend that you read the full review of the iKeyMonitor mobile tracker , which describes a very detailed step-by-step instruction on setting up the application.
Step 1: Create an account at ikeymonitor.com
Step 2: You will receive a confirmation email to your email that should contain your login details.
Step 3: Install the app on the target device. Try the demo if you don't understand the installation.
Step 4: After successful installation, go to the control panel using the details that came with the email.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to track a person's location without their knowledge using an iPhone ?
Track Location with iKeyMonitor
This application also has geo-tracking. Follow the steps below to learn how to use iKeyMonitor.
We recommend that you read the full review of the iKeyMonitor mobile tracker , which describes a very detailed step-by-step instruction on setting up the application.
Step 1: Create an account at ikeymonitor.com
Step 2: You will receive a confirmation email to your email that should contain your login details.
Step 3: Install the app on the target device. Try the demo if you don't understand the installation.
Step 4: After successful installation, go to the control panel using the details that came with the email.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
The Russian authorities have allowed individuals to build main digital channels for the state.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP TERMUX TOOLS NEW LIST:
- termux-ubuntu - Ubuntu chroot on termux.
- bbqsql - SQL Injection Exploitation Tool.
- EggShell - iOS/macOS/Linux Remote Administration Tool.
- mfcuk - MiFare Classic Universal toolKit (MFCUK).
- mfoc - Mifare Classic Offline Cracker.
- termux-fedora - A script to install a Fedora chroot into Termux.
- AutoSploit - Automated Mass Exploiter.
- AutoPixieWps - Automated pixieWps python script.
- exploitdb - The official Exploit Database repository.
- WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack.
- Spammer-Grab
Β» A brand new, awakened version of the old Spammer-Grab..
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP TERMUX TOOLS NEW LIST:
- termux-ubuntu - Ubuntu chroot on termux.
- bbqsql - SQL Injection Exploitation Tool.
- EggShell - iOS/macOS/Linux Remote Administration Tool.
- mfcuk - MiFare Classic Universal toolKit (MFCUK).
- mfoc - Mifare Classic Offline Cracker.
- termux-fedora - A script to install a Fedora chroot into Termux.
- AutoSploit - Automated Mass Exploiter.
- AutoPixieWps - Automated pixieWps python script.
- exploitdb - The official Exploit Database repository.
- WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack.
- Spammer-Grab
Β» A brand new, awakened version of the old Spammer-Grab..
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Neo-Oli/termux-ubuntu: Ubuntu chroot on termux
Ubuntu chroot on termux. Contribute to Neo-Oli/termux-ubuntu development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Find Username, Password & CVV Data Using Google Dorks.pdf
164.4 KB
A SIMPLE EXAMPLE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended anti malware android applications 2020 :
https://play.google.com/store/apps/details?id=com.avira.android
https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity
https://play.google.com/store/apps/details?id=com.antivirus
https://play.google.com/store/apps/details?id=com.bitdefender.antivirus
https://play.google.com/store/apps/details?id=com.drweb.pro
https://play.google.com/store/apps/details?id=com.eset.ems2.gp
https://play.google.com/store/apps/details?id=com.kms.free
https://play.google.com/store/apps/details?id=com.lookout
https://play.google.com/store/apps/details?id=org.malwarebytes.antimalware
https://play.google.com/store/apps/details?id=com.wsandroid.suite
https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended anti malware android applications 2020 :
https://play.google.com/store/apps/details?id=com.avira.android
https://play.google.com/store/apps/details?id=com.avast.android.mobilesecurity
https://play.google.com/store/apps/details?id=com.antivirus
https://play.google.com/store/apps/details?id=com.bitdefender.antivirus
https://play.google.com/store/apps/details?id=com.drweb.pro
https://play.google.com/store/apps/details?id=com.eset.ems2.gp
https://play.google.com/store/apps/details?id=com.kms.free
https://play.google.com/store/apps/details?id=com.lookout
https://play.google.com/store/apps/details?id=org.malwarebytes.antimalware
https://play.google.com/store/apps/details?id=com.wsandroid.suite
https://play.google.com/store/apps/details?id=com.symantec.mobilesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Avira Security Antivirus & VPN - Apps on Google Play
Fast Antivirus & VPN, Identity Protection and App-Locker
Forwarded from UNDERCODE NEWS
TCL spends 3.75 billion US dollars in half a year. M&A or βleakageβ Samsung?
#Analytiques
#Analytiques
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Working instagram liker application:
https://itunes.apple.com/us/app/magic-liker-for-like-tags/id1218151216?mt=8
https://itunes.apple.com/us/app/easytags-likes-on-instagram/id1280454009?mt=8
https://itunes.apple.com/us/app/magic-likes-meter/id1273323127?mt=8
https://itunes.apple.com/us/app/starliker-get-instagram-likes/id1375882738?mt=8
https://www.getjar.com/categories/social-and-messaging-apps/social-networks/Turbo-Like-for-Instagram-get-more-real-likes-911572
https://play.google.com/store/apps/details?id=socials.com.application&hl=en_US
https://play.google.com/store/apps/details?id=com.dreamdesignup.stats&hl=en&showAllReviews=true
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Working instagram liker application:
https://itunes.apple.com/us/app/magic-liker-for-like-tags/id1218151216?mt=8
https://itunes.apple.com/us/app/easytags-likes-on-instagram/id1280454009?mt=8
https://itunes.apple.com/us/app/magic-likes-meter/id1273323127?mt=8
https://itunes.apple.com/us/app/starliker-get-instagram-likes/id1375882738?mt=8
https://www.getjar.com/categories/social-and-messaging-apps/social-networks/Turbo-Like-for-Instagram-get-more-real-likes-911572
https://play.google.com/store/apps/details?id=socials.com.application&hl=en_US
https://play.google.com/store/apps/details?id=com.dreamdesignup.stats&hl=en&showAllReviews=true
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS TAMPER ATTACK ?
1) Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a misnomer unless some limitations on the tampering party's resources is explicit or assumed.
2) An item secured with special screw heads may be considered tamperproof by casual passers-by, but can be removed by someone equipped with particular tools.
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or others with physical access to it.
3) Tamper resistance ranges from simple features like screws with special drives, more complex devices that render themselves inoperable or encrypt all data transmissions between individual chips, or use of materials needing special tools and knowledge. Tamper-resistant devices or features are common on packages to deter package or product tampering.
4) Anti-tamper devices have one or more components: tamper resistance, tamper detection, tamper response, and tamper evidence.
In some applications, devices are only tamper-evident rather than tamper-resistant.
from wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS TAMPER ATTACK ?
1) Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a misnomer unless some limitations on the tampering party's resources is explicit or assumed.
2) An item secured with special screw heads may be considered tamperproof by casual passers-by, but can be removed by someone equipped with particular tools.
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or others with physical access to it.
3) Tamper resistance ranges from simple features like screws with special drives, more complex devices that render themselves inoperable or encrypt all data transmissions between individual chips, or use of materials needing special tools and knowledge. Tamper-resistant devices or features are common on packages to deter package or product tampering.
4) Anti-tamper devices have one or more components: tamper resistance, tamper detection, tamper response, and tamper evidence.
In some applications, devices are only tamper-evident rather than tamper-resistant.
from wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
The IT industry suddenly brakes with the new corona, and there is a risk that the slump will be prolonged due to project cancellation.
#international
#international
π¦4.5 ratingβ Excel Pivot Table Basics :
Start analyzing data with Excel's most powerful data analysis tool, Pivot Tables. They're easier than you think
Use basic Pivot Tables in Excel
Analyze large sets of information
Use Excel more efficiently
Structure information more effectively
free
https://www.udemy.com/course/pivot-table-basics/
Start analyzing data with Excel's most powerful data analysis tool, Pivot Tables. They're easier than you think
Use basic Pivot Tables in Excel
Analyze large sets of information
Use Excel more efficiently
Structure information more effectively
free
https://www.udemy.com/course/pivot-table-basics/
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 73 million students. Learn programming, marketing, data science and more.
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) Linux
1) git clone https://github.com/Lvl4Sword/Killer.git
2) cd ./Killer
3) mkdir -p ~/.virtualenvs/
4) python3 -m venv ~/.virtualenvs/killer
5) source ~/.virtualenvs/killer/bin/activate
6) python -m pip install -U pip
7) python -m pip install -U -r requirements.txt
8) python -m pip install -U -r dev-requirements.txt
B) Windows
1) git clone https://github.com/Lvl4Sword/Killer.git
2) Set-Location -Path .\Killer
3) New-Item -ItemType Directory -Force -Path
$env:USERPROFILE\.virtualenvs\
4) py -3 -m venv $env:USERPROFILE\.virtualenvs\killer
$env:USERPROFILE\.virtualenvs\Scripts\Activate.ps1\
5) python -m pip install -U pip
7) pip install -U -r requirements.txt
8) pip install -U -r dev-requirements.txt
π»π΄π 'π π π π°π π :
python -m killer --help
THEN SET OPTIONS SIMPLY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) Linux
1) git clone https://github.com/Lvl4Sword/Killer.git
2) cd ./Killer
3) mkdir -p ~/.virtualenvs/
4) python3 -m venv ~/.virtualenvs/killer
5) source ~/.virtualenvs/killer/bin/activate
6) python -m pip install -U pip
7) python -m pip install -U -r requirements.txt
8) python -m pip install -U -r dev-requirements.txt
B) Windows
1) git clone https://github.com/Lvl4Sword/Killer.git
2) Set-Location -Path .\Killer
3) New-Item -ItemType Directory -Force -Path
$env:USERPROFILE\.virtualenvs\
4) py -3 -m venv $env:USERPROFILE\.virtualenvs\killer
$env:USERPROFILE\.virtualenvs\Scripts\Activate.ps1\
5) python -m pip install -U pip
7) pip install -U -r requirements.txt
8) pip install -U -r dev-requirements.txt
π»π΄π 'π π π π°π π :
python -m killer --help
THEN SET OPTIONS SIMPLY
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Lvl4Sword/Killer: πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet.
πͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet. - Lvl4Sword/Killer