Forwarded from UNDERCODE NEWS
Facebook paid a million dollar for refusing to transfer Russiansβ data to Russia. The threat of blocking looms.
#international
#international
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
some good hex editors free-
[HxD](https://mh-nexus.de/en/hxd/)
* [010 Editor](http://www.sweetscape.com/010editor/)
* [Hex Workshop](http://www.hexworkshop.com/)
* [HexFiend](http://ridiculousfish.com/hexfiend/)
* [Hiew](http://www.hiew.ru/)
* [hecate](https://github.com/evanmiller/hecate)
β β β Uππ»βΊπ«Δπ¬πβ β β β
some good hex editors free-
[HxD](https://mh-nexus.de/en/hxd/)
* [010 Editor](http://www.sweetscape.com/010editor/)
* [Hex Workshop](http://www.hexworkshop.com/)
* [HexFiend](http://ridiculousfish.com/hexfiend/)
* [Hiew](http://www.hiew.ru/)
* [hecate](https://github.com/evanmiller/hecate)
β β β Uππ»βΊπ«Δπ¬πβ β β β
mh-nexus.de
HxD - Freeware Hex Editor and Disk Editor | mh-nexus
Forwarded from UNDERCODE NEWS
InterScan Messaging Security expose a critical bugs could allow attackers to gain remotely control.
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦fACEBOOK PENTESTING:
Facebook friend info fetcher
Get ID from friend
Get ID friend from friend
Get group member ID
Get email friend
Get email friend from friend
Get a friend's phone number
Get a friend's phone number from friend
Mini Hack Facebook(Target)
Multi Bruteforce Facebook
Super Multi Bruteforce Facebook
BruteForce(Target)
Yahoo Checker
Bot Reactions Target Post
Bot Reactions group Post
BOT COMMENT Target Post
BOT COMMENT group Post
Mass delete Post
Mass accept friends
Mass delete friend
ACreate Post
Create Wordlist
Account Checker
See my group list
Profile Guard
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ git clone https://github.com/mkdirlove/FBTOOL
$ cd FBTOOL
$ sudo python2 fbtool.py
$ python2 fbtool.py
then choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦fACEBOOK PENTESTING:
Facebook friend info fetcher
Get ID from friend
Get ID friend from friend
Get group member ID
Get email friend
Get email friend from friend
Get a friend's phone number
Get a friend's phone number from friend
Mini Hack Facebook(Target)
Multi Bruteforce Facebook
Super Multi Bruteforce Facebook
BruteForce(Target)
Yahoo Checker
Bot Reactions Target Post
Bot Reactions group Post
BOT COMMENT Target Post
BOT COMMENT group Post
Mass delete Post
Mass accept friends
Mass delete friend
ACreate Post
Create Wordlist
Account Checker
See my group list
Profile Guard
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ git clone https://github.com/mkdirlove/FBTOOL
$ cd FBTOOL
$ sudo python2 fbtool.py
$ python2 fbtool.py
then choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mkdirlove/FBTOOL: All in one Facebook hacking tool for noobz.
All in one Facebook hacking tool for noobz. Contribute to mkdirlove/FBTOOL development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The law on "remote control" has been adopted. You can stay without communication with the authorities for no more than 2 days.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UNDERSTANDING REGISTRY:
Registry subkeys under HKEY_CLASSES_ROOT
The list of registry keys in the HKEY_CLASSES_ROOT hive is very long and just as confusing. We can't explain every one of the thousands of keys that you can see there, but we can break it down into several manageable parts that will hopefully clarify this part of the registry a bit.
π¦Here are some of the many file extension association keys you'll find in the HKEY_CLASSES_ROOT hive, most of which start with a period:
HKEY_CLASSES_ROOT \ .avi
HKEY_CLASSES_ROOT \ .bmp
HKEY_CLASSES_ROOT \ .exe
HKEY_CLASSES_ROOT \ .html
HKEY_CLASSES_ROOT \ .pdf
HKEY_CLASSES_ROOT \ AudioCD
HKEY_CLASSES_ROOT \ dllfile
...
Each of these registry keys stores information about what Windows should do when you double-click or double-tap a file with that extension. It may include a list of programs that can be found in the "Open With ..." section when right-clicking / tapping on a file, as well as the path to each of the listed applications.
For example, on your computer, when you open a file named draft.rtf, the file can be opened with WordPad. The registry data that is responsible for this is stored in the HKEY_CLASSES_ROOT \ .rtf key, which defines WordPad as the program that should open the RTF file.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UNDERSTANDING REGISTRY:
Registry subkeys under HKEY_CLASSES_ROOT
The list of registry keys in the HKEY_CLASSES_ROOT hive is very long and just as confusing. We can't explain every one of the thousands of keys that you can see there, but we can break it down into several manageable parts that will hopefully clarify this part of the registry a bit.
π¦Here are some of the many file extension association keys you'll find in the HKEY_CLASSES_ROOT hive, most of which start with a period:
HKEY_CLASSES_ROOT \ .avi
HKEY_CLASSES_ROOT \ .bmp
HKEY_CLASSES_ROOT \ .exe
HKEY_CLASSES_ROOT \ .html
HKEY_CLASSES_ROOT \ .pdf
HKEY_CLASSES_ROOT \ AudioCD
HKEY_CLASSES_ROOT \ dllfile
...
Each of these registry keys stores information about what Windows should do when you double-click or double-tap a file with that extension. It may include a list of programs that can be found in the "Open With ..." section when right-clicking / tapping on a file, as well as the path to each of the listed applications.
For example, on your computer, when you open a file named draft.rtf, the file can be opened with WordPad. The registry data that is responsible for this is stored in the HKEY_CLASSES_ROOT \ .rtf key, which defines WordPad as the program that should open the RTF file.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Designated as a specialized organization for combining pseudonym information, Samsung SDS, Statistics, etc.
#international
#international
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦host a malware detection sys:
A) AIDE (full name "Advanced Intrusion Detection Environment") is a host-based open source intrusion detection system. AIDE checks the integrity of system binary files and basic configuration files by checking the inconsistency of many file attributes. These file attributes include permissions, file types, inodes, number of links, link names, users, user groups, and file sizes. , Block count, modification time, access time, creation time, access control list (acl), SELinux security context, xattrs and md5/sha checksum.
B) AIDE builds a file attribute database by scanning the file system of a Linux server that has not been tampered with. Then, it checks the file attributes of the server against the database, and then when the server is running, it warns if there are any changes to the index file. It is for this reason that whenever the system is updated or configuration files are changed due to legitimate reasons, AIDE must re-index the protected files.
Β» For some customers, their security policy may require some kind of intrusion detection system (IDS) to be installed on the server. But whether the customer requires IDS or not, it is a good practice for system administrators to deploy IDS.
C) Install AIDE on CentOS or RHEL
The initial installation (and first run) of AIDE is best performed on the system where the operating system has just been installed, and no service is exposed to the Internet or even to the LAN. In this early stage, we can minimize the risk of all intrusions and tampering from the outside. In fact, this is the only way to ensure that the system is clean when AIDE builds its initial database.
Β»For this reason, after we install AIDE using the command # yum install aide, we need to disconnect our machine from the network and perform some basic configuration tasks, as described below.
D) Configure AIDE
The default configuration file is located in /etc/aide.conf. The file provides several example protection rules (such as FIPSR, NORMAL, DIR, and DATAONLY). Each rule is followed by an equal sign and a list of file attributes to be checked, or any predefined rules (separated by +). You can also use this format to define any custom rules.
FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256
NORMAL = FIPSR+sha512
Run AIDE for the first time
E) Run the following command to initialize the AIDE database:
# aide --init
The /var/lib/aide/aide.db.new.gz file generated according to /etc/aide.conf needs to be renamed to /var/lib/aide/aide.db.gz so that AIDE can read it:
# mv /var/lib/aide/aide.db.new.gz /var/lib/aide.db.gz
Now, itβs time to perform our first system check against the database. To do this, just run:
# aide
When called without options, AIDE assumes the use of --check.
If no changes have been made since the database was created, AIDE will return an OK message after finishing the check.
β β β Uππ»βΊπ«Δπ¬πβ β β β'
π¦host a malware detection sys:
A) AIDE (full name "Advanced Intrusion Detection Environment") is a host-based open source intrusion detection system. AIDE checks the integrity of system binary files and basic configuration files by checking the inconsistency of many file attributes. These file attributes include permissions, file types, inodes, number of links, link names, users, user groups, and file sizes. , Block count, modification time, access time, creation time, access control list (acl), SELinux security context, xattrs and md5/sha checksum.
B) AIDE builds a file attribute database by scanning the file system of a Linux server that has not been tampered with. Then, it checks the file attributes of the server against the database, and then when the server is running, it warns if there are any changes to the index file. It is for this reason that whenever the system is updated or configuration files are changed due to legitimate reasons, AIDE must re-index the protected files.
Β» For some customers, their security policy may require some kind of intrusion detection system (IDS) to be installed on the server. But whether the customer requires IDS or not, it is a good practice for system administrators to deploy IDS.
C) Install AIDE on CentOS or RHEL
The initial installation (and first run) of AIDE is best performed on the system where the operating system has just been installed, and no service is exposed to the Internet or even to the LAN. In this early stage, we can minimize the risk of all intrusions and tampering from the outside. In fact, this is the only way to ensure that the system is clean when AIDE builds its initial database.
Β»For this reason, after we install AIDE using the command # yum install aide, we need to disconnect our machine from the network and perform some basic configuration tasks, as described below.
D) Configure AIDE
The default configuration file is located in /etc/aide.conf. The file provides several example protection rules (such as FIPSR, NORMAL, DIR, and DATAONLY). Each rule is followed by an equal sign and a list of file attributes to be checked, or any predefined rules (separated by +). You can also use this format to define any custom rules.
FIPSR = p+i+n+u+g+s+m+c+acl+selinux+xattrs+sha256
NORMAL = FIPSR+sha512
Run AIDE for the first time
E) Run the following command to initialize the AIDE database:
# aide --init
The /var/lib/aide/aide.db.new.gz file generated according to /etc/aide.conf needs to be renamed to /var/lib/aide/aide.db.gz so that AIDE can read it:
# mv /var/lib/aide/aide.db.new.gz /var/lib/aide.db.gz
Now, itβs time to perform our first system check against the database. To do this, just run:
# aide
When called without options, AIDE assumes the use of --check.
If no changes have been made since the database was created, AIDE will return an OK message after finishing the check.
β β β Uππ»βΊπ«Δπ¬πβ β β β'
Forwarded from UNDERCODE NEWS
Human Credit Union,βInternet Newspaper and Quality Journalism Forumβ andβPress Awards Ceremonyβ
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANDROID 11 TIP:
Enabling chat notification bubbles on Android 11:
1) While in Android 10 only a few applications supported this functionality, primarily Android Messages, in Android 11 all applications support it. It is enough to enable this feature. It does not work in Developer Preview 4, but should appear in beta versions and the final version of the system.
2) Turn on notification bubbles
When a notification comes from any app in the Conversations section of the pull-down menu, swipe left or right on it. This will give access to a couple of buttons, among them click on the settings gear. Select "Priority". Once activated, all future notifications from this app will appear in the bubble and at the top of the Conversations section of the notification bar.
3) When you change a conversation to priority for the first time, a window appears informing you of additional benefits, including displaying the Conversations section at the top, showing your profile picture on the lock screen, and a bubble. Click "Got it" in the lower right corner for a bubble to appear.
4) The icon will be displayed on top of any open application. When you create a bubble for the first time, another window appears titled "Chat uses bubbles." It describes what bubbles are and what they can do. Click on the icon to see your correspondence. Another message appears stating that you can disable this feature using the "Manage" button.
5) Interacting with notification bubbles
When a bubble is active, all new messages from this conversation appear as a pop-up in that bubble. You can also still receive notifications in the notification center.
6) If you enable bubbles for many apps, only the most recent message icon will be displayed on the screen. When you select a bubble, each correspondence is shown, you can switch using the corresponding icon.
π¦This also applies to different conversations within the same application, each of which has its own icon.
(1) One correspondence, (2) Telegram correspondence 1 to 1, group chat in Telegram, Google Voice message.
You can drag the bubble anywhere on the edge of the screen. To get rid of the chat bubble, drag the icon to the X at the bottom of the screen.
Bubble Management
You can manage your correspondence in several ways. There is a new "Conversations" menu that turns off the priority of any correspondence. You can find it in Settings> Apps & notifications> Conversations.
Select a conversation to customize it, including disabling priority or bubbles. Select βAll Bubble Settingsβ and change which conversation can be displayed in the bubble. You can bubble both individual and all conversations within the application.
You can change these settings by going to the Application Information page and selecting Notifications. Select a specific conversation and manage its settings, or select "Bubbles". Here you can set which individual conversations or all conversations will appear in bubbles in this application.
There is also a menu under Settings> Apps & notifications> Notifications> Bubbles. Here you can only enable and disable bubbles for the application as a whole. If you don't need them, turn off the switch.
Finally, the quickest way to disable bubbles is to use the new icon in the lower right corner of the message notification.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANDROID 11 TIP:
Enabling chat notification bubbles on Android 11:
1) While in Android 10 only a few applications supported this functionality, primarily Android Messages, in Android 11 all applications support it. It is enough to enable this feature. It does not work in Developer Preview 4, but should appear in beta versions and the final version of the system.
2) Turn on notification bubbles
When a notification comes from any app in the Conversations section of the pull-down menu, swipe left or right on it. This will give access to a couple of buttons, among them click on the settings gear. Select "Priority". Once activated, all future notifications from this app will appear in the bubble and at the top of the Conversations section of the notification bar.
3) When you change a conversation to priority for the first time, a window appears informing you of additional benefits, including displaying the Conversations section at the top, showing your profile picture on the lock screen, and a bubble. Click "Got it" in the lower right corner for a bubble to appear.
4) The icon will be displayed on top of any open application. When you create a bubble for the first time, another window appears titled "Chat uses bubbles." It describes what bubbles are and what they can do. Click on the icon to see your correspondence. Another message appears stating that you can disable this feature using the "Manage" button.
5) Interacting with notification bubbles
When a bubble is active, all new messages from this conversation appear as a pop-up in that bubble. You can also still receive notifications in the notification center.
6) If you enable bubbles for many apps, only the most recent message icon will be displayed on the screen. When you select a bubble, each correspondence is shown, you can switch using the corresponding icon.
π¦This also applies to different conversations within the same application, each of which has its own icon.
(1) One correspondence, (2) Telegram correspondence 1 to 1, group chat in Telegram, Google Voice message.
You can drag the bubble anywhere on the edge of the screen. To get rid of the chat bubble, drag the icon to the X at the bottom of the screen.
Bubble Management
You can manage your correspondence in several ways. There is a new "Conversations" menu that turns off the priority of any correspondence. You can find it in Settings> Apps & notifications> Conversations.
Select a conversation to customize it, including disabling priority or bubbles. Select βAll Bubble Settingsβ and change which conversation can be displayed in the bubble. You can bubble both individual and all conversations within the application.
You can change these settings by going to the Application Information page and selecting Notifications. Select a specific conversation and manage its settings, or select "Bubbles". Here you can set which individual conversations or all conversations will appear in bubbles in this application.
There is also a menu under Settings> Apps & notifications> Notifications> Bubbles. Here you can only enable and disable bubbles for the application as a whole. If you don't need them, turn off the switch.
Finally, the quickest way to disable bubbles is to use the new icon in the lower right corner of the message notification.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS