UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ABOUT SOCIAL MEDIA TRACKING :

What could go wrong?

1) Although the end result is ideal for promoting highly complex phishing activities or intelligence gathering, Trustwave said it will help security professionals and ethical hackers provide the same tools as bad guys to test customers' security.

2) However, because the tool is now available in open source, anyone including bad guys or intelligence agencies can reuse facial recognition technology to build their own monitoring tools to search for the large amount of data that has been collected. further outlines some evil uses of the social mapper.

3) Once you have mastered the end result, these uses are limited to "only your imagination", which shows that it can be used for:

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Create a fake social media profile for the "friends" target, and then send its link to downloadable malware or obtain credentials for landing pages.
The goal of spoofing is to disclose their emails and phone numbers through vouchers and offers to turn to "phishing, predatory or predatory."

2) Create custom phishing campaigns for each social media platform, make sure the target has an account, and make these more real by including their profile picture in the email. Then capture the password to reuse it.

3) Look at the photo of the target, find the badge of the employee visit card, and get familiar with the interior of the building.


Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ before tracking an ip adress you must know this
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Detailed IP address summary
t.me/undercodeTesting


1) Classified IP address

Each type of address has another fixed-length field.
Network number: net-idβ€”marks the network to which the host (or router) is connected.

2) Host number: host-idβ€”marks that the host (or router)
two-level IP address can Expressed as:
IP address: = {<network number>, <host number>}
:: = stands for "defined as"
Class A address: network field number 1 byte 8 bits
Class B address: network field number 2 words Section 16-bit
class C address: Network field number 3 bytes 24 bits

πŸ¦‘ Some important characteristics of
IP address 1): IP address is a hierarchical address structure, the benefits of two levels

First: When the IP address management means to assign IP addresses,
assigned network number only
host number obtained by the number of units of the network Discretionary

second: The destination host number only router connected
to a network packet forwarding numbers
so it can make The number of entries in the routing table is greatly reduced, thereby reducing the
storage space occupied by the routing table.

Third:
The network numbers in the IP addresses of hosts or routers in the same local area network must be the same.

Fourth: The router always has two or more IP addresses
. Each interface of the router has an IP address with a different network number.

Fifth: The resolution from the IP address to the hardware address is automatic. The user of the host I
do n’t know this process of address resolution.
As long as the host or router wants
to communicate with another host or router with a known IP address on the network, the ARP protocol will automatically
resolve the IP address to the link layer. Hardware address
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Three-level IP address-subnet division :

1) Subnet division is purely internal to a unit, and the unit still behaves as a network without subnet division.

2) Borrowing several bits from the host number as a subnet number subnet- id, and the host number host-id is correspondingly
reduced by several bits
IP address :: = {<network number>, <subnet number>, <host number>}

3) Process and ideas
Any IP datagram sent from another network to a host of this unit
is still based on the destination network number net-id of the IP datagram, first find
the router connected to the network of this unit
and then this router After receiving the IP datagram,
find the destination subnet according to the destination network number net-id and subnet number subnet-id
Finally deliver the IP datagram directly to the destination host

4) The division of subnets only divides the host-id part of the IP address without changing the original network number of the IP address net-i

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW TO STAY ANONYMOUSLY ON INTERNET FULL BY UNDERCODE :


A) SOCIAL METHODES :


1) Get yourself another account
Today, email has become a universal identifier for a network user identity. Therefore, first of all, it is worth taking care of the second (third, fourth) email address. It can be either just an additional Gmail account, or one of the special mail services described in this article . After that, register on it new accounts in social networks and other necessary services. Never mix your public and private profile.

2) Do not use domestic services
I have nothing against our search, mail, social sites, in many ways they are even better. They are worse only in that, if necessary, interested people or structures can quite easily scratch out the information they need about you. Therefore, do not use the services of the country in which you reside.

3) Change the connection location
If you want to further complicate the work of potential pursuers, then do not sit at home, but take a walk around the neighborhood. An attentive and thoughtful search will tell you dozens of available cafes, computer clubs, libraries from which you can use the Internet, without risking highlighting your real and network address.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOFTWARE METHODES HOW TO STAY ANONYMOUSLY ON INTERNET FULL BY UNDERCODE :


1) Proxies
Quite simply, a proxy is a service or program that acts as an intermediary between you and the site you are requesting. It turns out that all your surfing requests will be addressed to only one server, and it will already send them where necessary. In addition to the banal search in the network of open proxies, which are quite sufficient, including free ones, you can use this technology with more sophisticated methods, which we wrote about in the following articles:

How to access sites inaccessible in your country
4 free proxies to block ads
How to use Google services to access restricted sites

2) VPN
Virtual Private Network - these are several technologies and methods that allow you to create a special encrypted and inaccessible channel between a user and the Internet. This allows you to hide your real IP address and become anonymous, as well as encrypt your traffic. In the framework of this article, we will not dwell on deciphering the features of the operation of different VPN protocols, we only note that this method, in general, is quite reliable and easy to use. You can learn about its practical application from our following articles:

> ZenMate - Free VPN for Google Chrome

> Three easy ways to read blocked sites in your country

> TunnelBear - the easiest VPN on your Android

> Hotspot Shield - Internet Without Borders

3) TOR
TOR is a network of routers and software designed specifically to ensure user anonymity. Roughly speaking, when using this technology, your request to the site and the answer from it go through such a winding and complicated way through a chain of proxy servers that it is almost impossible to calculate the client

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Carding tip :

> Bank card fraud is called carding.

1) Let's start with the "classics". You came to withdraw money through an ATM. Hurry, literally on the run, enter the PIN code, while chatting on the phone. You didn’t even look at the inconspicuous guy in a baseball cap and dark glasses looking over your shoulder. But he watched you very carefully. He spied and memorized the numbers that you entered. Next elementary gop-stop - and goodbye, money.

2) Also, in the confusion, you can not see that in front of you is not a real ATM, but a fake. After all, the device is exactly like the real one. Stickers, instructions - everything is as it should. Insert the card, enter the PIN code, and the screen displays: β€œ

> The device is malfunctioning,” β€œA system error has occurred,” β€œNot enough money,” or something like that. Well, it happens. You go to look for another ATM. But before you find it, scammers will empty your account. After all, with the help of a phantom ATM, they already read all the necessary data about your card.

3) Often mimic the malfunction of ATMs . For example, late in the evening you return home and decide on the way to cash out your salary. We inserted a card, entered a PIN code, the amount - everything is going fine. The card reader gave the card, but the tray where the money should appear does not open. Has broken? Probably! Around it is dark, you need to call the bank and find out what happened. You walked literally ten meters, and nimble thieves had already removed the tape and took your money. Yes, yes, notes were not issued by simple adhesive tape.


πŸ¦‘ false
FREE ASSISTANT FOR ALIEXPRESS β„’
FREE ASSISTANT FOR ALIEXPRESS β„’
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
ALIRADAR WILL SHOW THE BEST DISCOUNTS AND FIND RELIABLE SELLERS - DO NOT LOSE MONEY!
MORE ON ALIRADAR.COM
YANDEX.DIRECT
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another carding trick is called the Lebanese noose :
t.me/undercodeTesting


1) This is when a lasso from the film is inserted into the card reader. If you get into it, the card can no longer be pulled out. As a rule, there is an β€œassistant" right there: "Yesterday I ate the card exactly the same way, I entered just such a combination and PIN code, and it worked." You try, fail, and go to the bank for help.

<> At this time, the good Samaritan takes the card and goes to empty it. He knows the PIN. You yourself have just entered it openly. Do you remember?

2) However, an ATM can be real and even serviceable. This is not a problem if attackers have a skimmer . This is a device for reading information encoded on the magnetic strip of the card. Physically, the skimmer is a patch block attached to the card reader, while it looks like part of the design of the ATM.

πŸ¦‘ how to protect a bank card ?

1) On the left - an ATM without a skimmer, on the right - with a skimmer
Using a transmitter, fraudsters receive information from a skimmer and make fake cards. They will use a skimmed card, but money will be debited from the original account. Hence the name of the method is skimming, from English β€œskim the cream”.

2) How do they recognize the PIN?

> In addition to the skimmer, they have other devices. For example, an overhead keyboard . It completely imitates the real one, but at the same time remembers the typed key combinations.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ carding tips are for learn not for steal !!!!!!!
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 new Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/leebaird/discover /opt/discover/

2) All scripts must be ran from this location.
cd /opt/discover/

3) ./update.sh


πŸ¦‘ RECON
1. Domain
2. Person
3. Parse salesforce

SCANNING
4. Generate target list
5. CIDR
6. List
7. IP, range, or domain
8. Rerun Nmap scripts and MSF aux

WEB
9. Insecure direct object reference
10. Open multiple tabs in Firefox
11. Nikto
12. SSL

MISC
13. Parse XML
14. Generate a malicious payload
15. Start a Metasploit listener
16. Update
17. Exit

πŸ¦‘ Tested on

> kali

> debian

> parrot

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 new A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
pinterest.com/undercode_Testing

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/codingo/Reconnoitre.git
After you have done this run setup.py with the following:

2) python3 setup.py install
After setup has run Reconnoitre will now be in your path (as reconnoitre) and you can launch it anywhere using:

reconnoitre <args>

3) Discover live hosts and hostnames within a range
reconnoitre -t 192.168.1.1-252 -o /root/Documents/testing/ --pingsweep --hostnames

4) Discover live hosts within a range and then do a quick probe for services
reconnoitre -t 192.168.1.1-252 -o /root/Documents/testing/ --pingsweep --services --quick

5) This will scan all services within a target range to create a file structure of live hosts as well as write recommendations for other commands to be executed based on the services discovered on these machines. Removing --quick will do a further probe but will greatly lengthen execution times.

6) Discover live hosts within a range and then do probe all ports (UDP and TCP) for services
reconnoitre -t 192.168.1.1-252 -o /root/Documents/testing/ --pingsweep --services


πŸ¦‘COMMANDS :

-h, --help Display help message and exit
-t TARGET_HOSTS Set either a target range of addresses or a single host to target. May also be a file containing hosts.
-o OUTPUT_DIRECTORY Set the target directory where results should be written.
-w WORDLIST Optionally specify your own wordlist to use for pre-compiled commands, or executed attacks.
--pingsweep Write a new target.txt file in the OUTPUT_DIRECTORY by performing a ping sweep and discovering live hosts.
--dns, --dnssweep Find DNS servers from the list of target(s).
--snmp Find hosts responding to SNMP requests from the list of target(s).
--services Perform a service scan over the target(s) and write recommendations for further commands to execute.
--hostnames Attempt to discover target hostnames and write to hostnames.txt.
--virtualhosts Attempt to discover virtual hosts using the specified wordlist. This can be expended via discovered hostnames.
--ignore-http-codes Comma separated list of http codes to ignore with virtual host scans.
--ignore-content-length Ignore content lengths of specificed amount. This may become useful when a server returns a static page on every virtual host guess.
--quiet Supress banner and headers and limit feedback to grepable results.
--quick Move to the next target after performing a quick scan and writing first-round recommendations.
--no-udp Disable UDP service scanning, which is ON by default.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ fast wifi hacking, snifff data updated :
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/xdavidhu/mitmAP"
starting:

2) Kali Linux -> "sudo python3 mitmAP.py"

3) Raspberry PI -> "sudo python3 mitmAP_rpi.py"

πŸ¦‘FEATURES :

SSLstrip2

Driftnet

Tshark

Full featured access point, with configurable speed limit

mitmproxy

Wireshark

DNS Spoofing

Saving results to file

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient
fb.com/undercodeTesting


πŸ¦‘ FEATURES :

Resilience: If one tool crashes OWTF, will move on to the next tool/test, saving the partial output of the tool until it crashed.
Flexible: Pause and resume your work.
Tests Separation: OWTF separates its traffic to the target into mainly 3 types of plugins:
Passive : No traffic goes to the target
Semi Passive : Normal traffic to target
Active: Direct vulnerability probing
Extensive REST API.
Has almost complete OWASP Testing Guide(v3, v4), Top 10, NIST, CWE coverage.
Web interface: Easily manage large penetration engagements easily.
Interactive report:
Automated plugin rankings from the tool output, fully configurable by the user.
Configurable risk rankings
In-line notes editor for each plugin.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) $ python3 -m venv ~/.virtualenvs/owtf

2) $ source ~/.virtualenvs/owtf/bin/activate

3) $ brew install coreutils gnu-sed openssl
# We need to install 'cryptography' first to avoid issues

4) $ pip install cryptography --global-option=build_ext --global-option="-L/usr/local/opt/openssl/lib" --global-option="-I/usr/local/opt/openssl/include"

πŸ¦‘ Recommended:

1) docker is installed (https://www.docker.com/products/docker-desktop)
Using a virtualenv is highly recommended!

2) Create and start the PostgreSQL database server
Please make sure you have Docker installed!

3) Run make startdb to create and start the PostgreSQL server in a Docker container. In the default configuration, it listens on port 5342 exposed from Docker container.

4) Manual setup (painful and error-prone)
You can also use a script to this for you - find it in scripts/db_setup.sh. You'll need to modify any hardcoded variables if you change the corresponding ones in owtf/settings.py.

5) Start the postgreSQL server,

πŸ¦‘ macOS: brew install postgresql and pg_ctl -D /usr/local/var/postgres start

<> Kali: sudo systemctl enable postgresql; sudo systemctl start postgresql or sudo service postgresql start

πŸ¦‘Create the owtf_db_user user,

macOS: psql postgres -c "CREATE USER $db_user WITH PASSWORD '$db_pass';"
Kali: sudo su postgres -c "psql -c \"CREATE USER $db_user WITH PASSWORD '$db_pass'\""
Create the database,

macOS: psql postgres -c "CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;"
Kali: sudo su postgres -c "psql -c \"CREATE DATABASE $db_name WITH OWNER $db_user ENCODING 'utf-8' TEMPLATE template0;\""
Installing OWTF
pip install git+https://github.com/owtf/owtf#egg=owtf or clone the repo and python setup.py develop.
owtf and open localhost:8009 for the OWTF web interface or owtf --help for all available commands.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Storage backup-the difference between SAN, NAS, DAS and its architectureThe difference between SAN, NAS, DAS and its architecture
full by undercode:

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) γ€€With the development and wide application of computer technology, storage technology has been obtained Professionals in the industry and various application fields attach importance to it. The rapid growth of data volume raises new problems and requirements for the development of enterprises Host type data access and protection, etc. All of these call for the emergence of new network storage technology and its products.
γ€€γ€€
2) The emergence of SAN and NAS technologies and products not only expands the space for network development, but more importantly, they organically combine network technology with the emerging storage field, and have played an important role in the development of the IT industry.
γ€€γ€€
3) SAN and NAS are often regarded as two competing technologies. In fact, they can complement each other well to provide access to different types of data. SAN is aimed at massive, data-oriented data transmission, while NAS provides file-level data access.
γ€€γ€€
4) These two technologies can not only meet the needs of flexible storage access, but both SAN and NAS are based on open, industry-standard network protocols: Fibre Channel protocol for SAN and network protocol (such as TCP / IP) for NAS. The application range of SAN is more extensive, and can provide storage for NAS devices, and NAS is generally limited to the application of file-level data access. If you don't consider the differences between them, both SAN and NAS play an important role in today's enterprise-level storage and have more advantages than traditional server-attached storage.
γ€€γ€€
5) SAN and NAS are powerful additions and replacements to traditional server-connected storage in the field of data centers. As a result, enterprise users are gradually recognizing its many advantages, including improved flexibility, more convenient storage deployment, and lower total cost of ownership. Although SAN and NAS technologies can provide a competitive advantage, they are designed for specific environments and applications.

πŸ¦‘ Key Features of

1) γ€€γ€€SAN As a network infrastructure, SAN is designed to provide a flexible, high-performance, and highly scalable storage environment. The SAN achieves this by connecting between servers and storage devices (such as disk storage systems and tape libraries).
γ€€γ€€
2) High-performance Fibre Channel switches and Fibre Channel network protocols can ensure that device connections are both reliable and effective. These connections are based on local fiber or SCSI (via a SCSI-to-Fibre Channel converter or gateway). One or more Fibre Channel switches provide interconnection between host servers and storage devices in the form of a network topology (SAN architecture).
γ€€γ€€
3) Since SAN is optimized for transferring large blocks of data between servers and storage devices, SAN is an ideal choice for the following applications:
γ€€γ€€
4) mission critical database applications, where the predictable response time, availability and scalability are essential elements.
γ€€γ€€
5) Centralized storage backup, in which performance, data consistency and reliability can ensure the safety of enterprise critical data.
γ€€γ€€
6) High availability and failover environment can ensure lower cost and higher application level.
γ€€γ€€
7) Scalable storage virtualization can separate storage from direct host connection and ensure dynamic storage partitioning.
γ€€γ€€
8) The improved disaster tolerance feature provides high performance and extended distance of Fibre Channel (up to 150 kilometers) between the host server and its connected devices.
πŸ¦‘ The main advantages of SAN
γ€€γ€€
1) Facing the rapidly growing data storage requirements, large enterprises and service providers gradually began to choose SAN as the network infrastructure because of its excellent scalability. In fact, SAN has more significant advantages than traditional storage architectures. For example, traditional server-attached storage is often difficult to update or centrally manage. Each server must be shut down to add and configure new storage. In comparison, a SAN can increase storage without having to go down and interrupt the connection to the server. SAN can also centralize data management, thereby reducing the total cost of ownership.
γ€€γ€€
2) Using Fibre Channel technology, the SAN can efficiently transmit data blocks. By supporting the transfer of massive data blocks between storage and servers, SAN provides an effective way to back up data. Therefore, the network bandwidth traditionally used for data backup can be saved for other applications.
γ€€γ€€
3) Open, industry-standard Fibre Channel technology also makes the SAN very flexible. SAN overcomes the traditional cable limitation connected to SCSI, greatly expands the distance between the server and storage, thereby increasing the possibility of more connections. The improved scalability also simplifies the deployment and upgrade of the server and protects the investment of the original hardware equipment.
γ€€γ€€
4) In addition, SAN can better control the storage network environment, which is suitable for the performance and availability requirements of transaction-based systems. SAN uses high-reliability and high-performance Fibre Channel protocols to meet this need.
γ€€γ€€
5) Another strength of SAN is the ability to transfer data blocks to enterprise-level data-intensive applications. In the process of data transmission, the processing cost of the SAN on communication nodes (especially servers) is less, because the data is divided into smaller data blocks during transmission. Therefore, the Fibre Channel SAN is very effective in transferring large data blocks, which makes the Fibre Channel protocol very suitable for storage-intensive environments.
γ€€γ€€
6) Today, SAN has been gradually integrated with the NAS environment to provide high-performance mass storage for NAS devices. In fact, many SANs are currently used in the background of NAS devices to meet storage scalability and backup needs.

πŸ¦‘ Benefits of SAN
γ€€γ€€
1) One benefit of SAN is that it greatly improves the reliability and scalability of enterprise data backup and recovery operations. SAN-based operations can significantly reduce backup and recovery time, while reducing information traffic on the corporate network.
γ€€γ€€
2) By extending the SAN to the metropolitan area network infrastructure, the SAN can also be seamlessly connected to remote devices, thereby improving disaster tolerance. The SAN deploys metropolitan area network infrastructure to increase the distance between SAN devices, up to 150 kilometers, and hardly degrades performance. Enterprises can use this to improve disaster tolerance by deploying mission-critical applications and remote data replication for critical application servers. Backup and recovery equipment is needed to achieve remote management.
γ€€γ€€
3) In addition, transaction-based database applications have benefited from SAN deployment. Its ability to seamlessly increase storage can reduce the time for data backup.