Forwarded from UNDERCODE NEWS
Fujitsu disposes of 5 officers due to TSE system failure, President Tokita reduces monthly remuneration 50% for 4 months.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦lINUX parameters :
dev
Interpret special character or block devices in the file system.
nodev
Do not interpret special character or block devices on the file system.
diratime
Update the inode access time of a directory on this filesystem. This is the default. (This parameter is ignored if noatime is set .)
nodiratime
Do not update directory inode access times on this filesystem. (This parameter is implied if noatime is set .)
dirsync
All directory updates on the file system must be synchronous. This affects the following system calls: creat, link, unlink, symlink, mkdir, rmdir, mknod, and rename.
exec
Allow executing binaries.
noexec
Do not allow direct execution of any binaries on the mounted filesystem.
group
Allow a regular user to mount the file system if one of the user's groups matches the device group. This parameter implies the nosuid and nodev parameters (unless overridden by subsequent parameters in the group, dev, suid option line ).
iversion
Each time the inode changes, the i_version field will increment.
noiversion
Don't increment the i_version inode field.
mand
Allow mandatory locking on this file system. See fcntl .
nomand
Do not allow forced locks on this file system.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦lINUX parameters :
dev
Interpret special character or block devices in the file system.
nodev
Do not interpret special character or block devices on the file system.
diratime
Update the inode access time of a directory on this filesystem. This is the default. (This parameter is ignored if noatime is set .)
nodiratime
Do not update directory inode access times on this filesystem. (This parameter is implied if noatime is set .)
dirsync
All directory updates on the file system must be synchronous. This affects the following system calls: creat, link, unlink, symlink, mkdir, rmdir, mknod, and rename.
exec
Allow executing binaries.
noexec
Do not allow direct execution of any binaries on the mounted filesystem.
group
Allow a regular user to mount the file system if one of the user's groups matches the device group. This parameter implies the nosuid and nodev parameters (unless overridden by subsequent parameters in the group, dev, suid option line ).
iversion
Each time the inode changes, the i_version field will increment.
noiversion
Don't increment the i_version inode field.
mand
Allow mandatory locking on this file system. See fcntl .
nomand
Do not allow forced locks on this file system.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
New way to earn money. Revenue increases with views, Voicy is a new way to monetize distributors starting next year
#Updates
#Updates
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Basics of mounting and using the mount command
A) What is mount
Mounting in Linux allows you to access the contents of the disk and organize the structure of the file system. Using mount, you can also open a disk image (for example, created with the dd program ) for operation , as well as open a variety of file systems and disk images (for example, virtual machine disk images) for access and editing; even remote network directories can be mounted, making them available as if they were files on any other local storage.
In addition to the fact that you can work with disk images using mount, correct mount settings are necessary for the computer to which the disk for forensic analysis is connected - for example, this disk should not be automatically mounted with write rights (so as not to be corrupted).
Linux has such a thing as βmountingβ a disk. To access the files on this drive, you must first mount it. The question may arise, why such difficulties? Mounting is one of the most powerful things that lets you customize your filesystem with amazing flexibility!
The essence of mounting is that a new directory (regular folder) is created in the file system, for example, this is the / mnt / disk_d folder . And then the mount command indicates that now, for example, the / dev / sda disk is mounted in the / mnt / disk_d directory . After that, you can access the files on the / dev / sda disk by opening the / mnt / disk_d folder in any file manager
B) With the help of this approach - when any disk can be any folder in the system, you can make a very flexible setting. The most common example encountered in practice: user files are stored in the / home / username / folder , for example, I have this folder / home / mial / . When installing the operating system, I can make it so that my second or third disk (and not the system one) will be mounted at / home / mial / . That is, the entire operating system will be located on one disk, and all my user files on the other. What does it do? In case of reinstalling the system, I will re-configure mounting the disk with my files to the / home / mial / folder and as a result, in the new, just installed system, all my documents, photos and so on will already be in place!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Basics of mounting and using the mount command
A) What is mount
Mounting in Linux allows you to access the contents of the disk and organize the structure of the file system. Using mount, you can also open a disk image (for example, created with the dd program ) for operation , as well as open a variety of file systems and disk images (for example, virtual machine disk images) for access and editing; even remote network directories can be mounted, making them available as if they were files on any other local storage.
In addition to the fact that you can work with disk images using mount, correct mount settings are necessary for the computer to which the disk for forensic analysis is connected - for example, this disk should not be automatically mounted with write rights (so as not to be corrupted).
Linux has such a thing as βmountingβ a disk. To access the files on this drive, you must first mount it. The question may arise, why such difficulties? Mounting is one of the most powerful things that lets you customize your filesystem with amazing flexibility!
The essence of mounting is that a new directory (regular folder) is created in the file system, for example, this is the / mnt / disk_d folder . And then the mount command indicates that now, for example, the / dev / sda disk is mounted in the / mnt / disk_d directory . After that, you can access the files on the / dev / sda disk by opening the / mnt / disk_d folder in any file manager
B) With the help of this approach - when any disk can be any folder in the system, you can make a very flexible setting. The most common example encountered in practice: user files are stored in the / home / username / folder , for example, I have this folder / home / mial / . When installing the operating system, I can make it so that my second or third disk (and not the system one) will be mounted at / home / mial / . That is, the entire operating system will be located on one disk, and all my user files on the other. What does it do? In case of reinstalling the system, I will re-configure mounting the disk with my files to the / home / mial / folder and as a result, in the new, just installed system, all my documents, photos and so on will already be in place!
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP BUGS IN ANDROID 11:
A) New power menu is worse without Google Home
Many praise the power menu in Android 11. There are switches for controlling home appliances. If you don't use the Google Home app or don't have smart appliances, the menu gets worse.
1) You cannot click on an empty space to close the menu, you must use the back gesture.
2) The Restart and Shutdown buttons are at the very top and are difficult to reach due to the empty space where the buttons for household appliances could be.
3) The Lock button is hidden behind another menu to make room for fixture buttons you don't have.
4) The menu supports smart home applications, but applications do not yet support this menu.
B) Not ready audio controls in quick settings
First you need to enable the hidden developer menu to activate the audio controls. These elements are bugged and sometimes disappear. If this happens, you need to disable this setting, reboot the device, turn it on again and then reboot again. In advanced view, items are not centered. This does not always happen, but it does often, in devices like the Pixel 4 XL.
C) Custom launchers can be reset
This bug will be fixed in future beta versions, but now the system periodically returns to the Pixel Launcher on its own instead of the launcher you installed. Usually, the screen turns off and on, after which your launcher returns.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOP BUGS IN ANDROID 11:
A) New power menu is worse without Google Home
Many praise the power menu in Android 11. There are switches for controlling home appliances. If you don't use the Google Home app or don't have smart appliances, the menu gets worse.
1) You cannot click on an empty space to close the menu, you must use the back gesture.
2) The Restart and Shutdown buttons are at the very top and are difficult to reach due to the empty space where the buttons for household appliances could be.
3) The Lock button is hidden behind another menu to make room for fixture buttons you don't have.
4) The menu supports smart home applications, but applications do not yet support this menu.
B) Not ready audio controls in quick settings
First you need to enable the hidden developer menu to activate the audio controls. These elements are bugged and sometimes disappear. If this happens, you need to disable this setting, reboot the device, turn it on again and then reboot again. In advanced view, items are not centered. This does not always happen, but it does often, in devices like the Pixel 4 XL.
C) Custom launchers can be reset
This bug will be fixed in future beta versions, but now the system periodically returns to the Pixel Launcher on its own instead of the launcher you installed. Usually, the screen turns off and on, after which your launcher returns.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacking dockers :
`docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
`docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
`docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
`docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacking dockers :
`docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
docker pull diogomonica/docker-bench-security - Docker Bench for Security`docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
docker pull danmx/docker-owasp-webgoat - OWASP WebGoat Project docker image`docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
docker pull citizenstig/nowasp - OWASP Mutillidae II Web Pen-Test Practice Application`docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
docker pull phocean/msf - Docker Metasploitβ β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - OWASP/NodeGoat: The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to webβ¦
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them. - OWASP/NodeGoat
Forwarded from UNDERCODE NEWS
Russian officials can turn to pirated and foreign antiviruses because of the freedom to procure.
#international
#international
Linux_for_beginners.pdf
175.6 KB
1GeneralremarksontheoperatingsystemUNIX/Linux
2Firststepsatthecomputer
3Filesystems
4Editingandprintingtextο¬les
Moreimportantcommands
5UNIX-shells
6Processadministration
7TheprogramminglanguageC++-anoverview
8Fortran90/95-anoverview
9Creatingexecutableprograms
2Firststepsatthecomputer
3Filesystems
4Editingandprintingtextο¬les
Moreimportantcommands
5UNIX-shells
6Processadministration
7TheprogramminglanguageC++-anoverview
8Fortran90/95-anoverview
9Creatingexecutableprograms
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Explain in detail the edge computing layout strategy of the five major U.S. technology giants.
#international #Analytiques
#international #Analytiques