UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
81K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Turtle Beach headphone producer purchases Neat Microphones to extend industry beyond gaming.
#Technologies
Forwarded from UNDERCODE NEWS
In the second half of the year, the camera under the exposure screen may be mass-produced in Xiaomi.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to use Huawei switch port security commands ?

1. Log in to the Huawei switch and enter the system view mode.



2. Enter the Huawei switch interface view.



3. Enable the port security function in the interface view.

Command: port-security enable



4. After enabling port security, enable the Sticky MAC function of the interface.



5. Configure the protection action of the port function.

Command: port-security protect-action protect



6. Configure the MAC address learning limit under the interface, and set one to allow only one host to access.

Command: port-security max-mac-num 1
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Old processor support would vanish from the Linux kernel.
#Updates
Forwarded from UNDERCODE NEWS
The programmer missed a flash drive password worth hundreds of millions of dollars.
#International
Forwarded from UNDERCODE NEWS
In February, Intel CEO Bob Swan will leave office; the stock is soaring in trading.
#International
Forwarded from UNDERCODE NEWS
Fitch confirms Israel's credit rating: A + with a stable outlook.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘4.5 rating// 2 days left !
C++ Tutorial for Complete Beginners


You'll be able to develop powerful C++ programs


You'll be able to apply for C++ jobs, with at least a possibility of success


You'll understand the basics of computer programming, including Object Orientation


https://www.udemy.com/course/free-learn-c-tutorial-beginners/
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The fintech company Rapid raised $ 400 million at a value of $ 2.5 billion.
#Analytiques
Forwarded from UNDERCODE NEWS
There is also a full blood edition of the Intel 11th generation Core game book.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Introduction to PPTP, L2TP and SSTP:

PPTP: Point-to-Point Tunneling Protocol

(PPTP: Point to Point Tunneling Protocol)
Default port number: 1723 (TCP) Point to Point Tunneling Protocol
(PPTP) is a network technology that supports multi-protocol virtual private networks. It works on the second layer. Through this protocol, remote users can safely access the company network through the Microsoft Windows operating system and other systems equipped with a point-to-point protocol, and can dial to connect to the local ISP and securely link to the company network through the Internet.

L2TP: Layer 2 Tunneling Protocol

(L2TP: Layer 2 Tunneling Protocol)
Default port number: 1701 (UDP)
L2TP is an industry-standard Internet tunneling protocol. Its function is roughly similar to that of PPTP. For example, it can also encrypt network data streams. However, there are also differences. For example, PPTP requires the network to be an IP network, and L2TP requires a point-to-point connection for data packets; PPTP uses a single tunnel, and L2TP uses multiple tunnels; L2TP provides header compression and tunnel verification, but PPTP does not support it.

About PPTP and L2TP

Both PPTP and L2TP belong to the second layer of tunneling protocols. The PPP protocol is used to encapsulate data, and then additional headers are added for data transmission on the Internet. Although the two protocols are very similar, there are still differences in the following aspects:


1. PPTP requires the Internet to be an IP network. L2TP only requires the tunnel medium to provide a packet-oriented point-to-point connection. L2TP can be used on IP (using UDP), Frame Relay Permanent Virtual Circuits (PVCs), X.25 Virtual Circuits (VCs), or ATM networks.

2. PPTP can only establish a single tunnel between two ends. L2TP supports the use of multiple tunnels between two ends. Using L2TP, users can create different tunnels for different quality of service.

3. L2TP can provide header compression. When compressing the packet header, the system overhead (overhead) occupies

4 bytes, while the PPTP protocol occupies 6 bytes4
. L2TP can provide tunnel authentication, while PPTP does not support tunnel authentication. However, when L2TP or PPTP is used together with IPsec, IPsec can provide tunnel authentication, and there is no need to verify the tunnel on the layer 2 protocol.

5. PCVPN customized login device supports PPTP and L2TP (IPSEC) key functions.

SSTP: Secure Socket Tunneling Protocol

SSTP can create a VPN tunnel transmitted over HTTPS, thereby eliminating many problems associated with VPN connections based on PPTP (Point-to-Point Tunneling Protocol) or L2TP (Layer 2 Tunneling Protocol). Because these protocols may be blocked by some Web proxies, firewalls, and network address translation (NAT) routers between the client and the server.

This SSTP is only suitable for remote access, and cannot support VPN tunnels between sites.
Microsoft hopes that SSTP can help customers reduce problems related to IPSec VPN when IPSec VPN connections are blocked by firewalls or routers. In addition, SSTP will not cause reservation problems, because it will not change the end user's VPN control. SSTP based on VPN tunnel can be directly inserted into the interface of current Microsoft VPN client and server software.

(beaware from copyright reports and don't clone any tutorial from here :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁