β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ incredible hacking techniques BY UNDERCODE
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
1) Losing the "hand" will leak the password
> The temperature of the keyboard after the finger has been pressed will leak the password!
> SIM card hijacking makes your phone unable to make calls or access the Internet, and passwords of Google and FB accounts have also been tampered with
`` One finger '' ATM collection is convenient and safe! Japanese expert:
> Digital camera can interpret the finger vein map in 10 minutes by taking a photo of the palm
AI can generate fake fingerprints
2) "Hearing" powerful hacker attack
> "Dolphin Attack" technology can send sounds that are not received by human ears to smart voice assistants
> "Mosquito" (mosquito) proof-of-concept attack that uses a speaker or headset to transfer data from a networked or isolated computer
Control your current noise to `` listen '' to your screen
Speaker or headset can transfer computer data
3) Everything is horrible
Webcam at checkout counter, sneak shot of credit card information
Credit card information leaked, webcam fools when paying!
So fragile! Shouting computer system crashed
4) Crash! This can also be horrible
Even if you are not connected to the Internet, you can use the power line to transmit the changes in current to steal computer data.
Retreat practice! Hundreds of prisoners used the electronic system "JPay" loophole to jointly steal US $ 225,000 (about 6.89 million Taiwan dollars)
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ incredible hacking techniques BY UNDERCODE
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
1) Losing the "hand" will leak the password
> The temperature of the keyboard after the finger has been pressed will leak the password!
> SIM card hijacking makes your phone unable to make calls or access the Internet, and passwords of Google and FB accounts have also been tampered with
`` One finger '' ATM collection is convenient and safe! Japanese expert:
> Digital camera can interpret the finger vein map in 10 minutes by taking a photo of the palm
AI can generate fake fingerprints
2) "Hearing" powerful hacker attack
> "Dolphin Attack" technology can send sounds that are not received by human ears to smart voice assistants
> "Mosquito" (mosquito) proof-of-concept attack that uses a speaker or headset to transfer data from a networked or isolated computer
Control your current noise to `` listen '' to your screen
Speaker or headset can transfer computer data
3) Everything is horrible
Webcam at checkout counter, sneak shot of credit card information
Credit card information leaked, webcam fools when paying!
So fragile! Shouting computer system crashed
4) Crash! This can also be horrible
Even if you are not connected to the Internet, you can use the power line to transmit the changes in current to steal computer data.
Retreat practice! Hundreds of prisoners used the electronic system "JPay" loophole to jointly steal US $ 225,000 (about 6.89 million Taiwan dollars)
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Four bank card usage methods-some hacker can used after getting cc
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) Multi-dimensional and multi-scenario consumption. Shopping in malls, supermarket consumption, restaurant meals, airport ticket purchases, etc. Multi-scenario consumption and multi-dimensional consumption are the preferred methods for banks to use cards.
2) Monthly credit card spending accounts for more than half of the credit card limit. Banks like this method of using cards. In this way, the card is used to show that the cardholder really needs to swipe the card. If this demand lasts for more than 3 months and there is no abnormal use of the card, the bank will basically give you an increase
3) often in installments, often withdraw cash. These two are the main sources of revenue for bank credit card centers. The installment fee, cash withdrawal interest and commission fee are all paid by the cardholder to the bank. If cardholders often have the need for instalments and cash withdrawals, which brings profits to the bank's credit card center, of course the bank likes to raise funds for you.
4) Repay on time. All the monthly repayments should be repayable, and there is no overdue behavior, indicating that cardholders will not bring bad debt risk to the bank, and the bank likes such quality customers.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Four bank card usage methods-some hacker can used after getting cc
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
1) Multi-dimensional and multi-scenario consumption. Shopping in malls, supermarket consumption, restaurant meals, airport ticket purchases, etc. Multi-scenario consumption and multi-dimensional consumption are the preferred methods for banks to use cards.
2) Monthly credit card spending accounts for more than half of the credit card limit. Banks like this method of using cards. In this way, the card is used to show that the cardholder really needs to swipe the card. If this demand lasts for more than 3 months and there is no abnormal use of the card, the bank will basically give you an increase
3) often in installments, often withdraw cash. These two are the main sources of revenue for bank credit card centers. The installment fee, cash withdrawal interest and commission fee are all paid by the cardholder to the bank. If cardholders often have the need for instalments and cash withdrawals, which brings profits to the bank's credit card center, of course the bank likes to raise funds for you.
4) Repay on time. All the monthly repayments should be repayable, and there is no overdue behavior, indicating that cardholders will not bring bad debt risk to the bank, and the bank likes such quality customers.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to apply for ICBC Credit Card? What are the application requirements?
T.me/underCodeTesting
π¦ ππΌππ πππΈβπ :
There are three main requirements to apply for an ICBC credit card
γγLet me introduce you in detail below.
γγThe most important requirements for applying for an ICBC credit card are to meet the following three conditions:
γγ1. Age requirements: Generally a citizen who has reached the age of eighteen, you need to submit an identity document for certification.
γγ2. Stable repayment ability: Generally you are required to provide proof of work and income. In order to increase the application success rate and credit limit, it is generally recommended to provide proof of own real estate, proof of own vehicle, proof of bank assets, etc. The standards for issuing cards are different for each bank, depending on the bank requirements.
γγ3. The credit status is good: that is, you are required to have no bad credit history, and the bank will inquire on its own.
γγICBC Credit Card Master Card Processing Conditions
γγA natural person who is over 18 years of age and has full capacity for civil conduct, a work unit or a fixed residence where the card issuer is located, has a stable income and is above the local average level, and can apply for a peony credit card at any local ICBC business outlet. .
γγICBC Credit Card Gold Card Requirements
γγIf you want to apply for ICBC Gold Credit Card, in addition to meeting the above conditions, there are some other conditions.
γγ1.The applicant is a VIP customer of ICBC;
γγ2. The applicant's monthly income is over 10,000 and is very stable;
γγ3. At least four-star ICBC customers.
γγNote: If you choose βYesβ after you apply for a credit card under βUnable to approve the card grade, agree with the bank to automatically issue other grades of productsβ, then when the gold card is not approved, a general card may be issued for you.
γγIf the gold card application is unsuccessful, you are advised to use an ICBC credit card more often and repay it on the repayment date in order to gradually accumulate a good card record and lay a credit foundation for future gold card upgrades.
γγICBC Credit Card Online Application Conditions
γγ1.The conditions for the application of the main credit card of ICBC must be met;
γγ2.The resident city has ICBC business outlets;
γγ3.The city where the card is selected must be the place of your work unit or fixed residential address;
γγ4. Fill in the credit card online application information as required.
γγUnits apply for ICBC Peony Credit Card
γγAll party and government agencies, social organizations, enterprises and institutions that have an account opening permit issued by the People's Bank of China, open a basic deposit account or a general deposit account at an ICBC domestic branch, have legal personality, or are legally registered with relevant departments can apply Peony Unit Card (Business Card).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to apply for ICBC Credit Card? What are the application requirements?
T.me/underCodeTesting
π¦ ππΌππ πππΈβπ :
There are three main requirements to apply for an ICBC credit card
γγLet me introduce you in detail below.
γγThe most important requirements for applying for an ICBC credit card are to meet the following three conditions:
γγ1. Age requirements: Generally a citizen who has reached the age of eighteen, you need to submit an identity document for certification.
γγ2. Stable repayment ability: Generally you are required to provide proof of work and income. In order to increase the application success rate and credit limit, it is generally recommended to provide proof of own real estate, proof of own vehicle, proof of bank assets, etc. The standards for issuing cards are different for each bank, depending on the bank requirements.
γγ3. The credit status is good: that is, you are required to have no bad credit history, and the bank will inquire on its own.
γγICBC Credit Card Master Card Processing Conditions
γγA natural person who is over 18 years of age and has full capacity for civil conduct, a work unit or a fixed residence where the card issuer is located, has a stable income and is above the local average level, and can apply for a peony credit card at any local ICBC business outlet. .
γγICBC Credit Card Gold Card Requirements
γγIf you want to apply for ICBC Gold Credit Card, in addition to meeting the above conditions, there are some other conditions.
γγ1.The applicant is a VIP customer of ICBC;
γγ2. The applicant's monthly income is over 10,000 and is very stable;
γγ3. At least four-star ICBC customers.
γγNote: If you choose βYesβ after you apply for a credit card under βUnable to approve the card grade, agree with the bank to automatically issue other grades of productsβ, then when the gold card is not approved, a general card may be issued for you.
γγIf the gold card application is unsuccessful, you are advised to use an ICBC credit card more often and repay it on the repayment date in order to gradually accumulate a good card record and lay a credit foundation for future gold card upgrades.
γγICBC Credit Card Online Application Conditions
γγ1.The conditions for the application of the main credit card of ICBC must be met;
γγ2.The resident city has ICBC business outlets;
γγ3.The city where the card is selected must be the place of your work unit or fixed residential address;
γγ4. Fill in the credit card online application information as required.
γγUnits apply for ICBC Peony Credit Card
γγAll party and government agencies, social organizations, enterprises and institutions that have an account opening permit issued by the People's Bank of China, open a basic deposit account or a general deposit account at an ICBC domestic branch, have legal personality, or are legally registered with relevant departments can apply Peony Unit Card (Business Card).
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
π Άπ Έππ »π°π±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UnderCodeNews
π Άπ Έππ »π°π±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTesting
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UnderCodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!
1) The default system will load / dev / shm, which is the so-called tmpfs. Some people say it is different from ramdisk (virtual disk). Like a virtual disk, tmpfs can use your RAM, but it can also use your swap partition for storage. Moreover, the traditional virtual disk is a block device and requires a command such as mkfs to really use it. Tmpfs is a file system, not a block device; you just install it and it will work.
tmpfs has the following advantages:
The size of the dynamic file system;
2) Another major benefit of tmpfs is its lightning speed. Because a typical tmpfs file system resides entirely in RAM, reading and writing can be almost instantaneous;
3) tmpfs data is not retained after a restart, because virtual memory is inherently volatile. So it is necessary to do some scripts for operations such as loading and binding.
π¦ Okay, let βs talk about some road principles, everyone is annoying, let βs talk about my application :)
1) First, create a tmp folder in / dev / shm, and then bind it with the actual / tmp:
mkdir / dev / shm / tmp
chmod 1777 / dev / shm / tmp
mount --bind / dev / shm / tmp / tmp
2) Application example: 1. Squid cache directory settings
vi /etc/squid/squid.conf
Modify it to
cache_dir ufs / tmp 256 16 256
3) The first 256 here means using 256M memory, I think the method of using ramdisk is not as good Use tmpfs directly, at least without using mkfs each time, and can also change the size dynamically. / Tmp at
4) this time is actually dev / shm / tmp.
Then restart the service, ok, now all squid cache files are saved in the tmpfs file system, soon.
π¦ Optimization of PHP performance
1) For a website with a large number of visits to Apache + PHP, there may be many temporary files under tmp, such as seesion or some cache files, then you can save it to a tmpfs file.
2) The way to save the seesion is very simple, just modify php.ini. Since I have bound / dev / stm / tmp to / tmp, it is not necessary to rewrite. As for the cache file generated by the php program, it can only be changed by itself. Php program
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!
1) The default system will load / dev / shm, which is the so-called tmpfs. Some people say it is different from ramdisk (virtual disk). Like a virtual disk, tmpfs can use your RAM, but it can also use your swap partition for storage. Moreover, the traditional virtual disk is a block device and requires a command such as mkfs to really use it. Tmpfs is a file system, not a block device; you just install it and it will work.
tmpfs has the following advantages:
The size of the dynamic file system;
2) Another major benefit of tmpfs is its lightning speed. Because a typical tmpfs file system resides entirely in RAM, reading and writing can be almost instantaneous;
3) tmpfs data is not retained after a restart, because virtual memory is inherently volatile. So it is necessary to do some scripts for operations such as loading and binding.
π¦ Okay, let βs talk about some road principles, everyone is annoying, let βs talk about my application :)
1) First, create a tmp folder in / dev / shm, and then bind it with the actual / tmp:
mkdir / dev / shm / tmp
chmod 1777 / dev / shm / tmp
mount --bind / dev / shm / tmp / tmp
2) Application example: 1. Squid cache directory settings
vi /etc/squid/squid.conf
Modify it to
cache_dir ufs / tmp 256 16 256
3) The first 256 here means using 256M memory, I think the method of using ramdisk is not as good Use tmpfs directly, at least without using mkfs each time, and can also change the size dynamically. / Tmp at
4) this time is actually dev / shm / tmp.
Then restart the service, ok, now all squid cache files are saved in the tmpfs file system, soon.
π¦ Optimization of PHP performance
1) For a website with a large number of visits to Apache + PHP, there may be many temporary files under tmp, such as seesion or some cache files, then you can save it to a tmpfs file.
2) The way to save the seesion is very simple, just modify php.ini. Since I have bound / dev / stm / tmp to / tmp, it is not necessary to rewrite. As for the cache file generated by the php program, it can only be changed by itself. Php program
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Speed ββOptimization-Linux System Speeding Notes full :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
A) 1) First, enable hard disk DMA support.
After the system is installed, the DMA of the hard disk is not turned on. My method is to
add / sbin / hdparm -d1 -c3 -m16 / dev / hda to the end of /etc/rc.d/rc.local After powering on, the DMA of the hard disk will be turned on, so there is no need to manually set it each time.
2) If your hard drive supports ATA33, you can add the -X66 parameter, ATA66 is -X68, like my hard drive is ATA66, then the complete parameter is / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda Tests show that before the DMA is turned on, the actual read efficiency is about 4.10 Mb per second. After the DMA is turned on, the actual read efficiency jumps to 20 Mb per second, which is about 5 times improvement.
Β§ Test without DMA
[root@firefly /root]# hdparm -d0 /dev/hda
/dev/hda:
setting using_dma to 0 (off)
using_dma = 0 (off)
[root@firefly /root]# hdparm -Tt /dev/hda
/dev/hda:
3) Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB/sec
Timing buffered disk reads: 64 MB in 15.58 seconds = 4.11 MB/sec
[root@firefly /root]# hdparm -d1 -X68 -c3 -m16 /dev/hda
/dev/hda:
setting 32-bit I/O support flag to 3
setting multcount to 16
setting using_dma to 1 (on)
setting xfermode to 69 (UltraDMA mode5)
multcount = 16 (on)
I/O support = 3 (32-bit w/sync)
using_dma = 1 (on)
[root @ firefly / root] # hdparm -Tt / dev / hda / dev / hda:
Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB / sec
Timing buffered disk reads: 64 MB in 3.20 seconds = 20.00 MB / sec
From the above data, we can see that whether the hard disk DMA is turned on has a great impact on the read efficiency.
π¦ B) 1) Shut down excess system services.
This is an old topic. Generally, when we are a desktop workstation, we only need to activate a few basic? Services. The others are not only useless, they will occupy system resources on the one hand, and there will be security on the other. Concerns, I usually only use it to connect to the Internet, play files, listen to music, and watch movies. Most of the time, it is only a client. There is really no need to activate the server service. Therefore, I only stay in Setup System Services. Download the following services, the rest are closed.
1. crond
2. network
3. syslogd
Really, believe me, as long as these four are enough!
C) Third, download Kernel and reprogram.
1) Kernel is installed by default for most computers. It is not optimized for your computer, so it looks bloated. Because Kernel directly controls everything in the computer, it has a great impact on system efficiency. .
2) My approach is: download the latest Kernel and reprogram, and directly program the hardware on my computer into Kernel. Do not make Modules. Do not program for those that are not needed. In this way, you can create a Kernel that is completely oriented to your environment. Use the power of your computer.
3) As for how Kernel is programmed? This is not my subject, you can go to CLDP and refer to the Chinese translation of KERNEL HOW-TO.
4) Fourth, reduce the number of virtual terminals.
5) The system default is six, which is the six of CTRL + ALT F1 ο½ F6. I turn off four of them, leaving only CTRL + ALT F1 ο½ F2, which saves about 4 Mbytes of memory, but in this case, X -Window will change from the original CTRL + ALT F7 to CTRL + ALT F3.
6) Modify / etc / inittab, add mingetty 3 to 6 all with # font size, and then issue the instruction #init q
7) Five, adjust the X-Windows environment- old win
π¦I am used to operating KDE, I am not familiar with GNOME, so the following are all for KDE Design, GNOME users, I think it should be almost the same!
1) The number of colors is set to 16 Bit, which has a very good effect. Besides the waste of resources, 24 Bit does not see any benefit.
2) Do not use screen savers.
3) Cancel the animation window function.
4) Try to use the same font.
5) Use Mozilla in your browser. Do not use Netscape.
6) Don't activate the sound server artd
π¦Speed ββOptimization-Linux System Speeding Notes full :
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
A) 1) First, enable hard disk DMA support.
After the system is installed, the DMA of the hard disk is not turned on. My method is to
add / sbin / hdparm -d1 -c3 -m16 / dev / hda to the end of /etc/rc.d/rc.local After powering on, the DMA of the hard disk will be turned on, so there is no need to manually set it each time.
2) If your hard drive supports ATA33, you can add the -X66 parameter, ATA66 is -X68, like my hard drive is ATA66, then the complete parameter is / sbin / hdparm -d1 -X68 -c3 -m16 / dev / hda Tests show that before the DMA is turned on, the actual read efficiency is about 4.10 Mb per second. After the DMA is turned on, the actual read efficiency jumps to 20 Mb per second, which is about 5 times improvement.
Β§ Test without DMA
[root@firefly /root]# hdparm -d0 /dev/hda
/dev/hda:
setting using_dma to 0 (off)
using_dma = 0 (off)
[root@firefly /root]# hdparm -Tt /dev/hda
/dev/hda:
3) Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB/sec
Timing buffered disk reads: 64 MB in 15.58 seconds = 4.11 MB/sec
[root@firefly /root]# hdparm -d1 -X68 -c3 -m16 /dev/hda
/dev/hda:
setting 32-bit I/O support flag to 3
setting multcount to 16
setting using_dma to 1 (on)
setting xfermode to 69 (UltraDMA mode5)
multcount = 16 (on)
I/O support = 3 (32-bit w/sync)
using_dma = 1 (on)
[root @ firefly / root] # hdparm -Tt / dev / hda / dev / hda:
Timing buffer-cache reads: 128 MB in 2.75 seconds = 46.55 MB / sec
Timing buffered disk reads: 64 MB in 3.20 seconds = 20.00 MB / sec
From the above data, we can see that whether the hard disk DMA is turned on has a great impact on the read efficiency.
π¦ B) 1) Shut down excess system services.
This is an old topic. Generally, when we are a desktop workstation, we only need to activate a few basic? Services. The others are not only useless, they will occupy system resources on the one hand, and there will be security on the other. Concerns, I usually only use it to connect to the Internet, play files, listen to music, and watch movies. Most of the time, it is only a client. There is really no need to activate the server service. Therefore, I only stay in Setup System Services. Download the following services, the rest are closed.
1. crond
2. network
3. syslogd
Really, believe me, as long as these four are enough!
C) Third, download Kernel and reprogram.
1) Kernel is installed by default for most computers. It is not optimized for your computer, so it looks bloated. Because Kernel directly controls everything in the computer, it has a great impact on system efficiency. .
2) My approach is: download the latest Kernel and reprogram, and directly program the hardware on my computer into Kernel. Do not make Modules. Do not program for those that are not needed. In this way, you can create a Kernel that is completely oriented to your environment. Use the power of your computer.
3) As for how Kernel is programmed? This is not my subject, you can go to CLDP and refer to the Chinese translation of KERNEL HOW-TO.
4) Fourth, reduce the number of virtual terminals.
5) The system default is six, which is the six of CTRL + ALT F1 ο½ F6. I turn off four of them, leaving only CTRL + ALT F1 ο½ F2, which saves about 4 Mbytes of memory, but in this case, X -Window will change from the original CTRL + ALT F7 to CTRL + ALT F3.
6) Modify / etc / inittab, add mingetty 3 to 6 all with # font size, and then issue the instruction #init q
7) Five, adjust the X-Windows environment- old win
π¦I am used to operating KDE, I am not familiar with GNOME, so the following are all for KDE Design, GNOME users, I think it should be almost the same!
1) The number of colors is set to 16 Bit, which has a very good effect. Besides the waste of resources, 24 Bit does not see any benefit.
2) Do not use screen savers.
3) Cancel the animation window function.
4) Try to use the same font.
5) Use Mozilla in your browser. Do not use Netscape.
6) Don't activate the sound server artd
π¦ Speed ββUp X by Managing Font Setting Before you complain that X is not running fast enough,
check the font settings first, which may be a major culprit affecting performance.
First look at the FontPath settings in the / etc / X11 / XF86Config-4 file, if it is
as follows:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "unix /:-1"
EndSection
can refer to the font settings in the / etc / X11 / fs / config file Set the value, select a few font directories you like (all
are correct ) , for example, I set the following font directories directly:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "/ usr / X11R6 / lib / X11 / fonts / misc: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / 75dpi: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / Type1"
FontPath "/ usr / X11R6 / lib / X11 / fonts / mdk: unscaled"
FontPath "/ usr / share / fonts / ttf / big5" After the
π¦ EndSection
modification, reactivate startx and feel the cotton.
1) The original FontPath "unix /:-1" provided fonts by the X Font Server.
Ordinary users are not harmed by it first, so you can consider waiting for familiarity with the X Font Server function before using it.
In this way, you can turn off xfs
ps: don't use the default boot directly into x-window during trial, if not, it will get stuck in x-window
ps: quoted from http://twopensource.org/~marr/xfont_tip.
html six, adjust the application priority.
2) Generally, when we use any program, its NICE value is 0, which means the CPU's use weight. If our commonly used programs have a higher priority, the natural efficiency will be better. The value of the priority is from -20 to 19. The smaller the number, the higher the priority, but it should be noted that the average user can only lower it. (0 ~ 19), only root has the right to increase the priority (-20 ~ 19). We can use ps -fel to observe the NI column to know.
3) After speaking for a long time, how to adjust it? A command / bin / nice is used to do this, the usage is as follows: nice? -N? Program name? Parameter. οΌοΌοΌ
The value of n is from -20 to 19. This is a manual operation. In KDE, you can set it with the menu editor. The method is before the [command] column of the program whose priority you want to adjust, and add / bin / nice --n is fine.
For example, I often use Mozilla to browse the web. I changed it to / bin / nice --10 / usr / local / mozilla / mozilla so that when I execute Mozilla, it will have higher priority than other programs. In actual testing, , Mozilla activation speed and response are much faster, and some other commonly used programs can also be handled by comparison.
4) Postscript
Linux is really a great operating system. After this adjustment, the screen from booting up to the login window appears, from 48 seconds to 30 seconds. Use the top command (per second) to observe the CPU idle time. It also increased from 82% to 93%, and the response of the window program feels similar to Win me.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
check the font settings first, which may be a major culprit affecting performance.
First look at the FontPath settings in the / etc / X11 / XF86Config-4 file, if it is
as follows:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "unix /:-1"
EndSection
can refer to the font settings in the / etc / X11 / fs / config file Set the value, select a few font directories you like (all
are correct ) , for example, I set the following font directories directly:
Section "Files"
RgbPath "/ usr / X11R6 / lib / X11 / rgb"
# Multiple FontPath entries are allowed (they are concatenated together)
# By default, Mandrake 6.0 and later now use a font server independent of
# the X server to render fonts.
FontPath "/ usr / X11R6 / lib / X11 / fonts / misc: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / 75dpi: unscaled"
FontPath "/ usr / X11R6 / lib / X11 / fonts / Type1"
FontPath "/ usr / X11R6 / lib / X11 / fonts / mdk: unscaled"
FontPath "/ usr / share / fonts / ttf / big5" After the
π¦ EndSection
modification, reactivate startx and feel the cotton.
1) The original FontPath "unix /:-1" provided fonts by the X Font Server.
Ordinary users are not harmed by it first, so you can consider waiting for familiarity with the X Font Server function before using it.
In this way, you can turn off xfs
ps: don't use the default boot directly into x-window during trial, if not, it will get stuck in x-window
ps: quoted from http://twopensource.org/~marr/xfont_tip.
html six, adjust the application priority.
2) Generally, when we use any program, its NICE value is 0, which means the CPU's use weight. If our commonly used programs have a higher priority, the natural efficiency will be better. The value of the priority is from -20 to 19. The smaller the number, the higher the priority, but it should be noted that the average user can only lower it. (0 ~ 19), only root has the right to increase the priority (-20 ~ 19). We can use ps -fel to observe the NI column to know.
3) After speaking for a long time, how to adjust it? A command / bin / nice is used to do this, the usage is as follows: nice? -N? Program name? Parameter. οΌοΌοΌ
The value of n is from -20 to 19. This is a manual operation. In KDE, you can set it with the menu editor. The method is before the [command] column of the program whose priority you want to adjust, and add / bin / nice --n is fine.
For example, I often use Mozilla to browse the web. I changed it to / bin / nice --10 / usr / local / mozilla / mozilla so that when I execute Mozilla, it will have higher priority than other programs. In actual testing, , Mozilla activation speed and response are much faster, and some other commonly used programs can also be handled by comparison.
4) Postscript
Linux is really a great operating system. After this adjustment, the screen from booting up to the login window appears, from 48 seconds to 30 seconds. Use the top command (per second) to observe the CPU idle time. It also increased from 82% to 93%, and the response of the window program feels similar to Win me.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ i hope after those tutorial you will get alot of speed ..
UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β π¦ Speed Optimization-Use tmpfs to speed up your Linux server by undercode twitter.com/UnderCodeNews π¦ ππΌππ πππΈβπ : > cache files today and learned a trick is to use the virtual disk to store squid and seesion of php. A lot faster!β¦
For system underVM, its recommended also
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ftp service-is Pure-FTPd really strong :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) whole Spring Festival has been studying proftpd, but the results of the study feels better than Serv_U under windows Still not very flexible, I accidentally read another article today Pure-FTPd + LDAP + MySQL + PGSQL + Virtual-Users + Quota How To, and found that Pure-FTPd is very powerful, I do nβt need to look at anything else,
2) just looked at it The database structure combined with mysql knows that this software is very flexible. He can even use the database to configure the bandwidth, upload / download rate, and IP access restrictions. These three points are better than the proftpd database.
3) A master once said to me, if you are proficient in configuring proftpd, but you will not apply security patches to proftp, it is better not to use them. I really will not patch proftpd, although I am already familiar with him now It seems proftpd's security is very problematic. I don't know how secure Pure-FTPd is. If I can, I will abandon proftpd without any concerns. With Pure-FTPd, vsftp is safe, but the implementation of the function is really uncomfortable.
After a few days to study Pure-FTPd, it seems that I have a holiday with FTP this month, haha.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ftp service-is Pure-FTPd really strong :
instagram.com/UnderCodeTestingCompany
π¦ ππΌππ πππΈβπ :
1) whole Spring Festival has been studying proftpd, but the results of the study feels better than Serv_U under windows Still not very flexible, I accidentally read another article today Pure-FTPd + LDAP + MySQL + PGSQL + Virtual-Users + Quota How To, and found that Pure-FTPd is very powerful, I do nβt need to look at anything else,
2) just looked at it The database structure combined with mysql knows that this software is very flexible. He can even use the database to configure the bandwidth, upload / download rate, and IP access restrictions. These three points are better than the proftpd database.
3) A master once said to me, if you are proficient in configuring proftpd, but you will not apply security patches to proftp, it is better not to use them. I really will not patch proftpd, although I am already familiar with him now It seems proftpd's security is very problematic. I don't know how secure Pure-FTPd is. If I can, I will abandon proftpd without any concerns. With Pure-FTPd, vsftp is safe, but the implementation of the function is really uncomfortable.
After a few days to study Pure-FTPd, it seems that I have a holiday with FTP this month, haha.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Traditional proxy, transparent proxy, plug-gw, Apache reverse proxy, IP masquerading full by UnderCode :
> fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
Squid traditional proxy and transparent proxy: The
most widely used traditional proxy and transparent proxy on Linux is Squid. The default Squid is configured as the traditional proxy method.
In this way, the windows client needs to set the address and port number of the proxy server in the browser, and the client has
little work to do . You only need to specify the IP address and port number of the proxy server, and everything else is left to the proxy server
. An obvious feature in this mode is that when a windows client browses a webpage, a URL is also entered, and the DNS is also performed by the proxy
server. The DNS resolution process is based on the resolution order in the /etc/host.conf file set on the Linux server.
The general order is to first find / etc / hosts, and then find the DNS database bind. An interesting example in this case is if you set the
domain name of a site as a server on your intranet, then go to the intranet server first. If you set
192.168.11.3 www.yahoo.com, your browser will not be able to access yahoo sites on the Internet.
But if you set a transparent proxy, the DNS order will be changed to
windowshosts and then the Linux DNS database. It is no longer possible to check the / etc / hosts file on a Linux server.
About the introduction of transparent proxy, see another article in the article "How to set up transparent proxy in Linux"
package rewriting process of traditional proxy and transparent proxy: see the following figure
[PC] A [Linux squid server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
(Figure 1)
Set the proxy on the browser of user A to 192.168.11.5, the port number to 3128, and access the Internet through B.
If you visit www.linuxforum.net, as long as you set a proxy, the browser on the client side only
communicates with the Linux Squid server and never talks to the www.linuxforum.net server on the Internet. First, the squid proxy server
www.linuxforum.net performs resolution (find the resolution order in /etc/host.conf, first / etc / hosts and then DNS lookup)
to the IP address 202.106.124.185, and finally the proxy server replaces the client with the IP address For HTTP access,
the information returned is cached in the squid cache, and a copy is made to the client. The next time the user or other users access the same page,
they can be called from the squid cache to save time.
The process of transparent proxy is similar to traditional proxy, the difference is
1) The DNS resolution process is different, as mentioned earlier
2) The transparent proxy gateway must be set to the IP address of the Squid proxy server, which is not required for traditional proxy.
#) The transparent proxy needs to set the input rules of the fire protection chain. The
rest are the same as Squid's traditional proxy method.
plug-gw:
plug-gw is a common agent included with FWTK. Can be used to proxy applications such as POP3, HTTP and other services.
[PC] A [Linux POP3] C [Linux plug-gw] B
192.168.11.12_ | ______ | 192.168.11.1 ____ 192.168.11.5 | ___ 1.2.3.4__Internet
(Figure 2)
If there is a Linux on the internal network segment POP3 server C (192.168.11.1), I hope that external users can receive mail. You
can set the POP3 proxy of plug-gw on machine B as follows:
Put the following line in /etc/rc.d/rc.local
/ usr / local / etc / plug-gw -daemon 1.2.3.4:110 -name plug-gw-pop3 &
file / usr / local / etc / netperm-table has the following line
plug-gw-pop3: port 110 * -plug-to 192.168. 11.1 -port 110 The
user sets the POP3 server address in outlook express to 1.2.3.4. When receiving mail, the external
interface of machine B accepts user requests on port 110 of 1.2.3.4 and is subsequently plug-gw Processing, on the internal network segment,
a request is made by 192.168.11.5 to port 110 of 192.168.11.1. Copy the obtained data to the
external user through the 1.2.3.4 interface .
π¦ Traditional proxy, transparent proxy, plug-gw, Apache reverse proxy, IP masquerading full by UnderCode :
> fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
Squid traditional proxy and transparent proxy: The
most widely used traditional proxy and transparent proxy on Linux is Squid. The default Squid is configured as the traditional proxy method.
In this way, the windows client needs to set the address and port number of the proxy server in the browser, and the client has
little work to do . You only need to specify the IP address and port number of the proxy server, and everything else is left to the proxy server
. An obvious feature in this mode is that when a windows client browses a webpage, a URL is also entered, and the DNS is also performed by the proxy
server. The DNS resolution process is based on the resolution order in the /etc/host.conf file set on the Linux server.
The general order is to first find / etc / hosts, and then find the DNS database bind. An interesting example in this case is if you set the
domain name of a site as a server on your intranet, then go to the intranet server first. If you set
192.168.11.3 www.yahoo.com, your browser will not be able to access yahoo sites on the Internet.
But if you set a transparent proxy, the DNS order will be changed to
windowshosts and then the Linux DNS database. It is no longer possible to check the / etc / hosts file on a Linux server.
About the introduction of transparent proxy, see another article in the article "How to set up transparent proxy in Linux"
package rewriting process of traditional proxy and transparent proxy: see the following figure
[PC] A [Linux squid server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
(Figure 1)
Set the proxy on the browser of user A to 192.168.11.5, the port number to 3128, and access the Internet through B.
If you visit www.linuxforum.net, as long as you set a proxy, the browser on the client side only
communicates with the Linux Squid server and never talks to the www.linuxforum.net server on the Internet. First, the squid proxy server
www.linuxforum.net performs resolution (find the resolution order in /etc/host.conf, first / etc / hosts and then DNS lookup)
to the IP address 202.106.124.185, and finally the proxy server replaces the client with the IP address For HTTP access,
the information returned is cached in the squid cache, and a copy is made to the client. The next time the user or other users access the same page,
they can be called from the squid cache to save time.
The process of transparent proxy is similar to traditional proxy, the difference is
1) The DNS resolution process is different, as mentioned earlier
2) The transparent proxy gateway must be set to the IP address of the Squid proxy server, which is not required for traditional proxy.
#) The transparent proxy needs to set the input rules of the fire protection chain. The
rest are the same as Squid's traditional proxy method.
plug-gw:
plug-gw is a common agent included with FWTK. Can be used to proxy applications such as POP3, HTTP and other services.
[PC] A [Linux POP3] C [Linux plug-gw] B
192.168.11.12_ | ______ | 192.168.11.1 ____ 192.168.11.5 | ___ 1.2.3.4__Internet
(Figure 2)
If there is a Linux on the internal network segment POP3 server C (192.168.11.1), I hope that external users can receive mail. You
can set the POP3 proxy of plug-gw on machine B as follows:
Put the following line in /etc/rc.d/rc.local
/ usr / local / etc / plug-gw -daemon 1.2.3.4:110 -name plug-gw-pop3 &
file / usr / local / etc / netperm-table has the following line
plug-gw-pop3: port 110 * -plug-to 192.168. 11.1 -port 110 The
user sets the POP3 server address in outlook express to 1.2.3.4. When receiving mail, the external
interface of machine B accepts user requests on port 110 of 1.2.3.4 and is subsequently plug-gw Processing, on the internal network segment,
a request is made by 192.168.11.5 to port 110 of 192.168.11.1. Copy the obtained data to the
external user through the 1.2.3.4 interface .
Facebook
UndercOde Testing Company
UndercOde Testing Company. 97 likes Β· 3 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Apache reverse proxy.
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
The package rewriting process is similar to plug-gw
Note: In the three cases mentioned above, the request process is separated twice, and the middle is usually a squid proxy server or
plug-gw, Apache server, the data is copied between the two network cards of the server, but
the source address of the two requests is a randomly assigned high-end address, which is different. Between 1024 and 65535. But in general,
most of the random high-end addresses allocated by TCP / IP are allocated between 1024--5000. For example: For plug-gw:
if the IP address of an external dial-up user is 5.6.7.8. If the address and port are as follows: The
source address and port number and the destination address and port are:
5.6.7.8 1038 1.2.3.4 110
is rewritten by the plug-gw request is:
192.168.11.5 1045 192.168.11.1 110
The data returned by 192.168.11.1 is Copy to external customers.
But not all cases the source high end randomly assigned addresses are between 1024--5000. IP masquerading is an exception:
IP masquerading:
[PC] A [Linux MASQ server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
As shown above, PC A wants to surf the Internet through B masquerade. If you want to visit www.linuxforum.net, the packet rewriting process during masquerading is as follows:
source address / port number and destination address / port number are:
192.168.11.12 1047 202.106.124.185 80
masqueraded
source address and port number and The destination address / port number is:
1.2.3.4 62334 202.106.124.185 80 The
returned packet is
202.106.124.185 80-1.2.3.4 62334
is rewritten to PC A as:
202.106.124.185 80-192.168.11.12 1047
Generally speaking, the IP The source address is usually> 60000 and is between 61000--64999.
A checklist of IP masquerading is maintained on the firewall. Use the command / sbin / ipchains -M -L -n to see, for
example:
[root @ proxy etc] # / sbin / ipchains -M -L -n
IP masquerading entries
prot expire source destination ports
UDP 02: 18.86 192.168.11.12 205.188 .179.41 1215 (62615)-> 4000
TCP 17: 03.20 192.168.11.12 205.188.248.57 1049 (62584)-> 80
From the ports column you can check the match of the source address twice.
Port forwarding (port forwarding):
See another article in the blend article, "port forwarding by the internal network of external network services,"
the second part of the application of ways and the advantages and disadvantages of various agents of
the role of various agents of ways:
1) IP For masquerading, Squid's traditional proxy and transparent proxy are suitable for users without real IP addresses on the LAN to access the Internet.
2) Apache reverse proxy, plug-gw universal proxy, port forwarding is suitable for external users to access
the server without real IP address in the LAN .
π¦ The advantages and disadvantages of various proxy methods:
1) The advantage of Squid is that it requires few clients, as long as it can connect to the Squid server.
But each machine needs to set the proxy server IP address and port number
2) The advantage of Squid transparent proxy is that it does not need to set the proxy address and port of each client, which simplifies the
configuration of the client . However, the default gateway of each client needs to be set to Squid proxy server, and the client is required to do
DNS resolution
3) IP spoofing can be suitable for most application layer services, unlike Squid, which only supports http and ftp. The default
gateway is set to the address of the firewall. And unlike Squid, it has a cache function
4) plug-gw can proxy various servers like HTTP, POP3, etc. But Apache reverse proxy can only proxy http reverse requests.
5) Port forwarding is suitable for most services. It has nothing to do with the specific application. It is fast and implemented at the core IP layer. No special
application layer services are required to run. However, you may need to recompile the kernel.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Apache reverse proxy.
fb.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
The package rewriting process is similar to plug-gw
Note: In the three cases mentioned above, the request process is separated twice, and the middle is usually a squid proxy server or
plug-gw, Apache server, the data is copied between the two network cards of the server, but
the source address of the two requests is a randomly assigned high-end address, which is different. Between 1024 and 65535. But in general,
most of the random high-end addresses allocated by TCP / IP are allocated between 1024--5000. For example: For plug-gw:
if the IP address of an external dial-up user is 5.6.7.8. If the address and port are as follows: The
source address and port number and the destination address and port are:
5.6.7.8 1038 1.2.3.4 110
is rewritten by the plug-gw request is:
192.168.11.5 1045 192.168.11.1 110
The data returned by 192.168.11.1 is Copy to external customers.
But not all cases the source high end randomly assigned addresses are between 1024--5000. IP masquerading is an exception:
IP masquerading:
[PC] A [Linux MASQ server] B
192.168.11.12_ | _____ 192.168.11.5 | ___ 1.2.3.4 _________ Internet
As shown above, PC A wants to surf the Internet through B masquerade. If you want to visit www.linuxforum.net, the packet rewriting process during masquerading is as follows:
source address / port number and destination address / port number are:
192.168.11.12 1047 202.106.124.185 80
masqueraded
source address and port number and The destination address / port number is:
1.2.3.4 62334 202.106.124.185 80 The
returned packet is
202.106.124.185 80-1.2.3.4 62334
is rewritten to PC A as:
202.106.124.185 80-192.168.11.12 1047
Generally speaking, the IP The source address is usually> 60000 and is between 61000--64999.
A checklist of IP masquerading is maintained on the firewall. Use the command / sbin / ipchains -M -L -n to see, for
example:
[root @ proxy etc] # / sbin / ipchains -M -L -n
IP masquerading entries
prot expire source destination ports
UDP 02: 18.86 192.168.11.12 205.188 .179.41 1215 (62615)-> 4000
TCP 17: 03.20 192.168.11.12 205.188.248.57 1049 (62584)-> 80
From the ports column you can check the match of the source address twice.
Port forwarding (port forwarding):
See another article in the blend article, "port forwarding by the internal network of external network services,"
the second part of the application of ways and the advantages and disadvantages of various agents of
the role of various agents of ways:
1) IP For masquerading, Squid's traditional proxy and transparent proxy are suitable for users without real IP addresses on the LAN to access the Internet.
2) Apache reverse proxy, plug-gw universal proxy, port forwarding is suitable for external users to access
the server without real IP address in the LAN .
π¦ The advantages and disadvantages of various proxy methods:
1) The advantage of Squid is that it requires few clients, as long as it can connect to the Squid server.
But each machine needs to set the proxy server IP address and port number
2) The advantage of Squid transparent proxy is that it does not need to set the proxy address and port of each client, which simplifies the
configuration of the client . However, the default gateway of each client needs to be set to Squid proxy server, and the client is required to do
DNS resolution
3) IP spoofing can be suitable for most application layer services, unlike Squid, which only supports http and ftp. The default
gateway is set to the address of the firewall. And unlike Squid, it has a cache function
4) plug-gw can proxy various servers like HTTP, POP3, etc. But Apache reverse proxy can only proxy http reverse requests.
5) Port forwarding is suitable for most services. It has nothing to do with the specific application. It is fast and implemented at the core IP layer. No special
application layer services are required to run. However, you may need to recompile the kernel.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOSTING BY UNDERCODE TUTORIAL FOR BEGINER
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> httpd.conf file comments for Apache ServerThe reference here is the Apache Server
1) ServerType standalone #Set whether the
server is to be started in standalone mode or by the internet server program inetd. The former is generally used.
2) ServerRoot "d: / Apache" #Set the home
directory of the server, which is used to store server settings files, error files, and log files.
3) PidFile logs / httpd.pid #When the
program starts, save the process ID (process id) of the parent process httpd in this file. This file name can be changed with the PidFile command.
4) ScoreBoardFile logs / apache_status #Set
the log files of some execution programs of the WWW server on the network.
#ResourceConfig conf / srm.conf
#AccessConfig conf / access.conf #The
contents of these two files are already included in the httpd.conf file.
5) Timeout 300 #If the
client has not been connected for 300 seconds, or the server has not transmitted data to the client for 300 seconds, it will automatically disconnect.
6) KeepAlive On #Set
whether to support the resume function.
7) MaxKeepAliveRequests 100 #Set
the number of functions that support resume transmission . The larger the number, the more hard disk space is wasted. Set to 0 for more than continuous transmission.
8) KeepAliveTimeout 15 #If
the user has not sent a request to the server after 15 seconds, then he cannot resume the transmission.
9) MaxRequestsPerChild 0
#Set the number of child processes in the same time.
ThreadsPerChild 50 #Set
the number of processes used by the server.
#Listen 3000
#Listen 12.34.56.78:80 #Allow
access to the server using another port or IP. In this example, the Port is 3000 and the IP is 12.34.56.78:80.
#BindAddress * #Set
Apache to listen on all IP, you can also specify it specifically.
#LoadModule anon_auth_module modules / ApacheModuleAuthAnon.dll
... #Open
the module that is not currently active.
#ExtendedStatus On #Set
the status information generated by the server.
π¦ The reference here is the Apache Server1_3_12_win32 version.
Port 80 #Set the port
used by the server.
ServerAdmin you@your.address #Set
the E-Mail address of the server administrator.
#ServerName new.host.name
#Host name of the server. If you have a fixed IP address, you don't need to set it.
DocumentRoot "d: / Apache / htdocs" #Set
the directory where the html files of the site are stored.
<Directory />
Options FollowSymLinks
AllowOverride None
</ Directory>
π¦ # Set / Directory directive. Specifically:
Option: defines the operations that can be performed in the directory. None means that you can only browse. FollowSymLinks allows pages to be connected elsewhere. ExecCGI allows CGI to be performed. MultiViews allows you to watch animations or listen to music. Indexes allows the server to return a formatted list of directories. Includes allows SSI. These settings can be checked. All can do anything but excludes MultiViews.
AllowOverride: Adding the None parameter means that anyone can browse the files in this directory. Other parameters are: FileInfo, AuthConfig, Limit.
UserDir "d: / Apache / users /"
#Define the directory where users store html files.
DirectoryIndex index.html #Defines
the file to be displayed first.
AccessFileName .htaccess #Define
the name of the access control file for each directory.
#CacheNegotiatedDocsDefines the
proxy server not to cache your pages. Not recommended for use.
UseCanonicalName On #The
server uses the server name specified by ServerName and the port address specified by Port.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HOSTING BY UNDERCODE TUTORIAL FOR BEGINER
t.me/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> httpd.conf file comments for Apache ServerThe reference here is the Apache Server
1) ServerType standalone #Set whether the
server is to be started in standalone mode or by the internet server program inetd. The former is generally used.
2) ServerRoot "d: / Apache" #Set the home
directory of the server, which is used to store server settings files, error files, and log files.
3) PidFile logs / httpd.pid #When the
program starts, save the process ID (process id) of the parent process httpd in this file. This file name can be changed with the PidFile command.
4) ScoreBoardFile logs / apache_status #Set
the log files of some execution programs of the WWW server on the network.
#ResourceConfig conf / srm.conf
#AccessConfig conf / access.conf #The
contents of these two files are already included in the httpd.conf file.
5) Timeout 300 #If the
client has not been connected for 300 seconds, or the server has not transmitted data to the client for 300 seconds, it will automatically disconnect.
6) KeepAlive On #Set
whether to support the resume function.
7) MaxKeepAliveRequests 100 #Set
the number of functions that support resume transmission . The larger the number, the more hard disk space is wasted. Set to 0 for more than continuous transmission.
8) KeepAliveTimeout 15 #If
the user has not sent a request to the server after 15 seconds, then he cannot resume the transmission.
9) MaxRequestsPerChild 0
#Set the number of child processes in the same time.
ThreadsPerChild 50 #Set
the number of processes used by the server.
#Listen 3000
#Listen 12.34.56.78:80 #Allow
access to the server using another port or IP. In this example, the Port is 3000 and the IP is 12.34.56.78:80.
#BindAddress * #Set
Apache to listen on all IP, you can also specify it specifically.
#LoadModule anon_auth_module modules / ApacheModuleAuthAnon.dll
... #Open
the module that is not currently active.
#ExtendedStatus On #Set
the status information generated by the server.
π¦ The reference here is the Apache Server1_3_12_win32 version.
Port 80 #Set the port
used by the server.
ServerAdmin you@your.address #Set
the E-Mail address of the server administrator.
#ServerName new.host.name
#Host name of the server. If you have a fixed IP address, you don't need to set it.
DocumentRoot "d: / Apache / htdocs" #Set
the directory where the html files of the site are stored.
<Directory />
Options FollowSymLinks
AllowOverride None
</ Directory>
π¦ # Set / Directory directive. Specifically:
Option: defines the operations that can be performed in the directory. None means that you can only browse. FollowSymLinks allows pages to be connected elsewhere. ExecCGI allows CGI to be performed. MultiViews allows you to watch animations or listen to music. Indexes allows the server to return a formatted list of directories. Includes allows SSI. These settings can be checked. All can do anything but excludes MultiViews.
AllowOverride: Adding the None parameter means that anyone can browse the files in this directory. Other parameters are: FileInfo, AuthConfig, Limit.
UserDir "d: / Apache / users /"
#Define the directory where users store html files.
DirectoryIndex index.html #Defines
the file to be displayed first.
AccessFileName .htaccess #Define
the name of the access control file for each directory.
#CacheNegotiatedDocsDefines the
proxy server not to cache your pages. Not recommended for use.
UseCanonicalName On #The
server uses the server name specified by ServerName and the port address specified by Port.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
This media is not supported in your browser
VIEW IN TELEGRAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦So Now The posted Tutorials :
1) ftp service-is Pure-FTPd really strong tutorial
2) Traditional proxy, transparent proxy, plug-gw
3) Apache reverse proxy, IP masquerading full
4) HOSTING BY UNDERCODE TUTORIAL FOR BEGINER (About httpd.config
5) BIN Crunchyroll
6) BIN SCRIBD
MORE COMING LATER ...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦So Now The posted Tutorials :
1) ftp service-is Pure-FTPd really strong tutorial
2) Traditional proxy, transparent proxy, plug-gw
3) Apache reverse proxy, IP masquerading full
4) HOSTING BY UNDERCODE TUTORIAL FOR BEGINER (About httpd.config
5) BIN Crunchyroll
6) BIN SCRIBD
MORE COMING LATER ...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Firewall in Network :
fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> Firewall technology is an important element in network security. It is a barrier and a sentinel when communicating between the external network and the internal network. In addition to deeply understanding the types and working principles of firewall technology, as a network security manager, you should also be familiar with the configuration and maintenance of various common firewalls.At a minimum, you should know the simple configuration of the firewall:
1) Use of common personal firewall software;
2) ACL-based packet filtering firewall configuration (such as Windows-based IPSec configuration, Cisco router-based ACL configuration, etc.)
3) Firewall configuration (Ipchains / Iptables) based on Linux operating system;
4) ISA configuration;
5) Cisco PIX configuration;
6) Check Point firewall configuration;
7) VPN configuration based on Windows, Unix, Cisco router.Reference books: "Network Security and Firewall Technology", "Linux Firewall", "Advanced Firewall ISA Server 2000", "Cisco Access Table Configuration Guide", "Check Point NG Security Management", "Virtual Private Network (VPN) Refinement"
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Firewall in Network :
fb.com/UnderCodeTesting
π¦ ππΌππ πππΈβπ :
> Firewall technology is an important element in network security. It is a barrier and a sentinel when communicating between the external network and the internal network. In addition to deeply understanding the types and working principles of firewall technology, as a network security manager, you should also be familiar with the configuration and maintenance of various common firewalls.At a minimum, you should know the simple configuration of the firewall:
1) Use of common personal firewall software;
2) ACL-based packet filtering firewall configuration (such as Windows-based IPSec configuration, Cisco router-based ACL configuration, etc.)
3) Firewall configuration (Ipchains / Iptables) based on Linux operating system;
4) ISA configuration;
5) Cisco PIX configuration;
6) Check Point firewall configuration;
7) VPN configuration based on Windows, Unix, Cisco router.Reference books: "Network Security and Firewall Technology", "Linux Firewall", "Advanced Firewall ISA Server 2000", "Cisco Access Table Configuration Guide", "Check Point NG Security Management", "Virtual Private Network (VPN) Refinement"
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 97 likes Β· 3 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Who can give a network security learning route-THEORICAL ?
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> Decryption and encryptionSoftware
1) encryption and decryption is a fascinating field of research, and it can be closely integrated with almost any computer technology-cryptography, programming languages, operating systems, data structures.
2) Without encryption technology, any network security is a piece of paper.
3) The application of cryptography runs through the entire network security learning process.First look at the programs in your computer. Programs written in high-level languages ββare compiled into machine language and executed in the CPU, such as Visual C ++.
4) Because machine language and assembly language have a one-to-one correspondence, machine language can be converted into assembly language. This process is called disassembly. The assembly language may be more readable, so that you can analyze the program flow and analyze its functions. This process is decryption (commonly known as cracking). In other words, the foundation of decryption is based on the assembly language level, so if you want to get involved in this field, assembly language must be learned well.
5) After the assembly is learned, it is recommended to master Win32 programming.Learning to decrypt and encrypt is very tiring, it takes a lot of time, and it will often run into a wall.
6) No progress for three or five days is very common. There is no other secret except hard work and persistence. But mastering this technology can improve your debugging skills, understand other people's program ideas, and write better programs through tracking software.Reference books: "Windows Programming", "32-Bit Assembly Language Programming in the Windows Environment", "Cryptography",
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Who can give a network security learning route-THEORICAL ?
twitter.com/UnderCodeNews
π¦ ππΌππ πππΈβπ :
> Decryption and encryptionSoftware
1) encryption and decryption is a fascinating field of research, and it can be closely integrated with almost any computer technology-cryptography, programming languages, operating systems, data structures.
2) Without encryption technology, any network security is a piece of paper.
3) The application of cryptography runs through the entire network security learning process.First look at the programs in your computer. Programs written in high-level languages ββare compiled into machine language and executed in the CPU, such as Visual C ++.
4) Because machine language and assembly language have a one-to-one correspondence, machine language can be converted into assembly language. This process is called disassembly. The assembly language may be more readable, so that you can analyze the program flow and analyze its functions. This process is decryption (commonly known as cracking). In other words, the foundation of decryption is based on the assembly language level, so if you want to get involved in this field, assembly language must be learned well.
5) After the assembly is learned, it is recommended to master Win32 programming.Learning to decrypt and encrypt is very tiring, it takes a lot of time, and it will often run into a wall.
6) No progress for three or five days is very common. There is no other secret except hard work and persistence. But mastering this technology can improve your debugging skills, understand other people's program ideas, and write better programs through tracking software.Reference books: "Windows Programming", "32-Bit Assembly Language Programming in the Windows Environment", "Cryptography",
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE TESTING (@UndercodeNews). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North