UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fix VPN VPN Issues for Privacy :
instagram.com/undercodeTesting



> Ineffective VPN service can be a source of trouble. Netflix and Hulu browsing will not work in countries where access to them is denied. You will not be protected on publicly accessible Wi-Fi networks. Worst of all, your provider will be able to see everything that you do, which is a big violation of privacy.

If the VPN service you have installed does not work or does not work fully, try the tips below.

1) Restart VPN
Often the problem is that the service is looping when trying to connect. This happens when you switch from one Wi-Fi network to another or to mobile Internet. The problem persists, there is no solution for it. Is that constantly work on the same network.

> To fix the connection problem, start the VPN application, turn it off and on again. Depending on the particular service, it may be quite simple to run the program and press a single button to turn it on and off. Or you can open the settings and turn the VPN off and on again.

2) Forced closing the VPN application
Even easier to completely close the VPN application. This can be done by opening the list of currently running applications and removing the VPN program from there. If you have an iPhone X or newer, the list of running applications opens with a gesture from the bottom of the screen up to the middle. On iPhone 8 and older models, double-click the Home button, then with a gesture up the VPN card, uninstall the application.

3) Reset LTE connection
If you travel a lot in your home country or between countries, network connection problems may occur. This may affect the VPN connection. Therefore, it is recommended that you reset the LTE connection. To do this, run the settings, go to the "Cellular" section, turn off and on the switch "Mobile data". After a few seconds, the VPN application will try to reconnect.

4) Reset network settings
Problems can be solved by resetting network settings. Go to Settings> General> Reset. Click on reset network settings, enter the pin code and confirm that it will lead to a reboot of the device and will clear all network settings.

> This is one of the best ways to solve all the connection problems, but it will erase all Wi-Fi networks and passwords for them.

5) Reboot iPhone
Even if the connection to the VPN is completed, it may not work correctly. For example, if you chose a server in another country because you want to bypass geographic restrictions on access to content, but could not bypass the restriction, the connection may be incorrect or the VPN does not work in the background. In this case,undercode- you should restart the iPhone and there are several ways to do this.

> Go to Settings> General> Turn Off, swipe the slider. Need iOS 11 or later.

> Use the AssistiveTouch shortcut (iOS 11 and later)

>Use voice control (iOS 13 and later)

> Press and hold the Sleep / Wake button, swipe the slider that appears (iPhone 8 and older)

> Press and hold the side button and one of the volume buttons, swipe the slider that appears (iPhone X and newer)

>If you use voice control or AssistiveTouch, the iPhone will turn off and on itself. Otherwise, you need to press and hold the side button or Sleep / Wake button before the unit turns on.
6) Force reboot iPhone
You can perform a hard reset of your iPhone:

Press and hold the volume control down and simultaneously on the Sleep / Wake button before the Apple logo appears (iPhone 7)
Press the volume control up, then down, then press and hold the side button or Sleep / Wake button until the Apple logo appears (iPhone 8 or later)
Press and hold the Sleep / Wake and Home buttons until the Apple logo appears (iPhone 6s and later)

7) Select a different region.
If the VPN connection is not working or working too slowly, try changing the region. Some services automatically select the server that they consider the most suitable. In some, you can specify the server yourself from a specific country or city. After changing the server, you may need to restart your iPhone.


8) Update your VPN application
If there are problems with the VPN, such as application freezes or crashes, you may need to update the program. In iOS 12 and older, launch the App Store, click on the "Updates" tab at the bottom, find your VPN application and click "Update." You can also search for your application in the store.

For iOS 13, open the App Store, click on the icon of your profile, find the VPN application and click "Update." You can also use the search.


9) Use a different VPN application
If all else fails, you can choose a different VPN service from the App Store. If you tried all the above tips and the application does not work correctly, it's time to try something else. Enter in the store in the search for VPN and choose any other program.




Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to find, delete and manage the sending of data from applications and sites to Facebook :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) What is activity outside of Facebook?
Although Facebook collects a lot of information about users on its platform, these are not all sources. The sites and applications you visit can also share collected data from Facebook. When you enter the application or website using your Facebook account or the website has a hidden Facebook tracker, all your actions are sent to this social network.

>You bought shoes in the online store

> An online store shares your activity with your business tools.

> Facebook receives your activity outside of Facebook and stores it in your account. Activity is saved as β€œVisit to the site of clothes and shoes” and β€œPurchase”.

> You see Facebook ads with a 10% discount on the following shoes or clothes in the online store.

2 ) What is Facebook doing with your activity?
The question is what Facebook is doing with information regarding your activity outside the social network. Facebook claims there are five uses for this activity:

>Targeted ad serving

>Offer groups, events, products that you may like

>Help finding companies and brands

>Helping organizations and enterprises understand how their sites, applications, and advertising reach the right people.

>Identify Suspicious Activity for Facebook Security

3) Search for activity outside of Facebook
There are a couple of ways to find an activity page outside of Facebook.

A) Via Facebook Settings
In an iOS app, click on the Facebook icon at the bottom of the navigation bar. If you have an older version of the application, click on the hamburger menu icon. On Android, click on the hamburger menu icon at the top in the navigation bar. In both cases, scroll down, click Settings and Privacy, then Settings. Scroll down again and select "Activity outside of Facebook."

B) Through privacy settings
You can click "Privacy Settings" in the "Settings and Privacy" section. Then scroll down and click on β€œView or clear activity outside of Facebook”.

4) View activity in individual applications and sites
On the β€œActivity outside of Facebook” page, you can click β€œManage activity outside of Facebook” or on the set of profile icons at the top. Here you can see a list of all applications and sites from where Facebook receives information.

> Each source in the list shows the date when Facebook received the information, and the number of similar cases above the icon. The maximum value of 20+ can be any large.

> Click on a source to analyze activity. At the top you will again see the date of receipt of information,

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW fix android Ransomware:
> network has appeared the source code of the ransomware SLocker Android, simulating WannaCry
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

>WannaCry malware interface , which infected hundreds of thousands of computers in countries around the world.

1) After infection, SLocker runs in the background of the victim without their knowledge and consent, encrypting images, documents and videos on mobile devices.

2) Once SLocker encrypted the files on the device, the ransomware takes complete control of the phone. He is also able to obtain administrator rights and control the microphone and camera devices.

πŸ¦‘ Smartphones that have been infected by malware
Here is a list of infected smartphones:

Galaxy Note 2
Galaxy Tab S2
LG G4
Galaxy S7
Xiaomi Mi 4i
Galaxy S4
Galaxy Note 4
ZTE x500
Galaxy Note 3
Galaxy Tab 2
Oppo n3
Galaxy Note 5
Vivo X6 plus
Nexus 5
Nexus 5X
Galaxy Note Edge
Asus zenfone 2
Galaxy A5
LenovoS90
OppoR7 plus
Xiaomi Redmi
Lenovo A850

πŸ¦‘How to protect yourself?

> We recommend that you take basic precautions to protect yourself from these threats:

1) Never open email attachments from unknown senders.

2) Never click on links in SMS or MMS messages.

3) Even if the letter looks normal from some company ,.

4) Go to Settings β†’ Security and disable "allow installation of applications from sources other than Google Play."

5) We do not recommend connecting to unknown Wi-Fi networks and turn off Wi-Fi when not in use.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

FIX GAMING ERROR 0x0000013 WINDOWS 7-WIN8 fro microsoft :
Twitter.com/undercodeNews

Press Windows key + X
Click Command Prompt (Admin)

Type in at the prompt OR Copy and Paste these one at a time : (Hit enter after each)

Dism /Online /Cleanup-Image /CheckHealth

Dism /Online /Cleanup-Image /ScanHealth

Dism /Online /Cleanup-Image /RestoreHealth

Also run the System File Checker utility:

Press Windows key + X
Click Command Prompt (Admin)

At the Command Prompt, type: sfc/scannow

This will check for any integrity violations

Restart your system

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ OpenVpn Vulnerabilities :
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) CVE-2017-7508 - the ability to remotely shut down a server or client by sending a specially designed IPv6 packet. The problem manifests itself when the β€œβ€“mssfix” option is enabled;

2) CVE-2017-7512 is a series of problems in the OpenSSL certificate parsing code caused by the leak of several bytes of memory during the processing of each connection attempt. Having generated a large number of requests, you can cause the exhaustion of all available memory for the server process and cause a crash or prepare the conditions for exploiting the vulnerability CVE-2017-7521;

3) CVE-2017-7520 - the possibility of remote crashes of client software or information leakage from the client at the stage prior to authentication (you can read 96 extra bytes of the stack, which may well contain a proxy password). The problem is caused by the ability to read from the memory area outside the buffer boundaries and is manifested in systems using the β€œ-http-proxy" option together with authentication via ntlm2. Operation can be accomplished by modifying traffic during the MITM attack between the client and the proxy;

4) CVE-2017-7522 - the ability to cause a server crash using the β€œ-x509-track" option when an authenticated client sends a certificate with a null character in the ASN.1 line. The problem is manifested in configurations compiled with the mbed TLS / PolarSSL library. An attack is unlikely since a certificate with a null character certified by a certification authority is required;
Function dereference of a null pointer
establish_http_proxy_passthru ()

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Well bad guys also fond corona virus as good way for hacking :
twitter.com/undercodeNews

1) The coronavirus epidemic has become a global pandemic, so many want to track its spread. Some organizations offer panels showing the distribution of COVID-19. Unfortunately, hackers were able to use these panels to spread viruses to computers.

2) Researchers Labs found that hackers use these cards to steal user information. Among other things, they steal names, passwords, credit card information and other data from the browser.

3) Attackers design coronavirus websites to force users to download the application. It supposedly shows the spread of coronavirus. In fact, the application generates a malicious binary file that is installed on users' computers.

4) These sites do show genuine coronavirus distribution maps, but the URL and information are different from the original source.

5) Currently, only Windows computers are in danger. Researchers suggest that versions of the malicious offer for other operating systems will soon appear.

6) New option AZORult sets up a secret administrator account for remote attacks.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘YOUR FAVOR LINUX DISTRO IS :
Anonymous Poll
24%
PARROT ?
58%
KALI ?
5%
UBUNTU ?
5%
REDHATS ?
7%
OTHER ?
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tor launches bug bounty program
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Now, the Tor Project, with the support of the Open Technology Fund, has teamed up with HackerOne and finally announced the launch of an open program for everyone. It is proposed to search for bugs in the Tor browser and the Tor network daemon. We consider vulnerabilities that allow escalation of privileges, remote execution of arbitrary code, unauthorized access to user data, as well as information about attack methods that can be used to extract encrypted data from nodes and clients.

2) The Tor Project announced its intention to launch the bug bounty program at the end of December 2015 during a speech by the Tor project admins at the Haos Communication Congress (CCC), held in Hamburg, Germany.

3) Depending on the severity of the problem, Tor Project is ready to pay researchers between $ 100 and $ 4,000. So, highly dangerous bugs are estimated at 2000-4000 dollars, on vulnerabilities of medium danger you can earn 500-2000 dollars, and for detecting very minor problems you can get 100 or even be left without a cash prize, but get a t-shirt, stickers and a place in Hall of Fame Tor.

4) In addition, less serious problems will be rewarded with corporate T-shirts, stickers and mentions in the Tor Hall of Fame.

5) The project first announced plans to launch a bug bounty program after Tor accused the FBI, commissioned by researchers from Carnegie Mellon University, of at least $ 1 million to help them crack the Tor chain and reveal the IP addresses of users, but the FBI categorically denies the claim.

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The best video cards of 2020-graphic-for gaming recommended by undercode
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Best entry-level graphics cards (no more than $ 100)
Radeon RX 550 vs GeForce GT 1030

2) The best mainstream video cards (no more than $ 200)
Radeon RX 580 vs RX 570 vs RX 5500 XT vs GeForce GTX 1650 Super

3) Best mid-range graphics cards ($ 200 - $ 350)
GeForce GTX 1660 Super vs GeForce RTX 2060 vs Radeon RX 5600 XT

4) Best top-level graphics cards for 1440p ($ 400 +)
Radeon 5700 XT vs Radeon 5700 vs RTX 2070 Super vs RTX 2060 / Super

5) Best top-level graphics cards for 4K resolution (over $ 600)
GeForce RTX 2080 Ti vs GeForce RTX 2080 Super

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best VPN Services for Windows & Why ?
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) ExpressVPN

> Very high speeds

>Works with Netflix & iPlayer

>Efficient and easy application for Windows

>Advanced privacy features like split tunneling

>Servers in 94 countries with secure connections
Minuses

2) NordVPN

>High speeds

>Work with popular services like Netflix

>Application with user-friendly interface and settings

>Connect up to 6 devices simultaneously
Extensive server list

>Even if NordVPN was located in the United States or Great Britain, no entries are kept here. No information regarding users is stored and not collected, so they cannot be tracked.

>Thanks to this provider, content on Netflix and BBC iPlayer services is available from any country, and in terms of speed, NordVPN is one of the three fastest. In terms of support, there is no need to complain. 24/7 live chat support with quick and helpful answers.

>NordVPN is superior to ExpressVPN in terms of price, which is lower here. This makes the service one of the best in terms of price and quality.

3) IPVanish

>High speed global connectivity

>Works with popular apps like Netflix

>Powerful Windows program with solid privacy settings

>Lack of logs
Connect to 50 countries

This service does not maintain logs, although many users can remember the story of how this provider handed information to the authorities.

The appearance of the application is not as attractive as that of ExpressVPN and NordVPN. Its dark green colors give the program a technological look, not too friendly for beginners.

4) CyberGhost

High speeds
Easy Netflix Access
Simple and effective Windows application
Complete lack of logs
Connecting to servers in 87 countries

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Why need vpn spacial windows ?
t.me/undercodeTesting

>The Microsoft Windows operating system is still the most popular on personal computers around the world. For this reason, it is a primary goal for hackers who want to steal users or gain access to personal information.


1) VPN will protect your computer and the data stored on it. There is a wide selection of VPN providers, some of which work better on Windows, others worse.

2) To make your choice easier, we’ll look at reviews of VPN providers on Windows and tell you which ones are the best.

3) If you are looking for a free VPN for your computer, there are some on Windows. You only need to understand that their work quality is not as high as that of the paid VPN services described in this article.

πŸ¦‘What should a VPN on Windows have?

Windows app with user friendly interface
Reliable connection at high speeds
High level of security and privacy.
Clear logging policy with emphasis on confidentiality
Access popular streaming services
Access to torrents and P2P traffic

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁