Forwarded from Backup Legal Mega
>This code handles untrusted input
Code runs without sandbox
Code is written in an unsafe programming language (C / C ++)
Code runs without sandbox
Code is written in an unsafe programming language (C / C ++)
Forwarded from Backup Legal Mega
1)So far, Google has been trying to use the sandbox method in Chrome. They isolate dozens of processes into their own sandboxes, and recently introduced the "site isolation" feature, which puts the resources of each site into their own sandbox processes. But Google engineers said that considering performance issues, their method of using sandboxed Chrome components has reached the maximum benefit, and they must now seek new methods.
2) Therefore, Google plans to research and develop custom C ++ libraries for use with Chrome βs codebase, which can better protect memory-related errors.
3) At the same time, Google is also exploring the MiraclePtr project, which aims to turn "use-after-free bugs into unsafe crashes with acceptable performance, memory, binary size, and minimal stability impact."
4) Finally, it is worth noting that Google has indicated that it plans to use "safe" language to explore when possible. Candidates include Rust, Swift, JavaScript, Kotlin, and Java.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
2) Therefore, Google plans to research and develop custom C ++ libraries for use with Chrome βs codebase, which can better protect memory-related errors.
3) At the same time, Google is also exploring the MiraclePtr project, which aims to turn "use-after-free bugs into unsafe crashes with acceptable performance, memory, binary size, and minimal stability impact."
4) Finally, it is worth noting that Google has indicated that it plans to use "safe" language to explore when possible. Candidates include Rust, Swift, JavaScript, Kotlin, and Java.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Min Linux Steam Requirements-from git sources :
team for Linux requires the following:
1 GHz Pentium 4 or AMD Opteron with:
1) x86-64 (AMD64) instruction set
2) CMPXCHG16B instruction support (cx16 in /proc/cpuinfo flags)
3) SSE3 instruction support (pni in /proc/cpuinfo flags)
4) 512 megabytes of RAM and 5 gigabytes of hard drive space, or better
5) Internet connection (Cable/DSL speeds recommended)
6) Latest Ubuntu LTS, fully updated
7) 64-bit (x86-64, AMD64) Linux kernel
8) 64-bit (x86-64, AMD64) and 32-bit (i386, IA32) graphics drivers and glibc
9) Latest graphics driver
10) NVidia driver support - For recent cards (e.g. series 8), you will need to install 310.x. For older cards, driver 304.x supports the NVidia 6 and 7 GPU series. To access these drivers, first update your cache and then install the specific driver you need from the list in Additional Drivers.
11) AMD driver support - For recent cards (e.g. series 5 and above), we recommend installing the 12.11 driver. For older cards, Catalyst 13.1 Legacy supports the HD 2400 Pro card and is the latest for the 2 and 4 GPU series.
12) Intel HD 3000/4000 driver support - you will need to use the latest Mesa drivers, Mesa 9 or later.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Min Linux Steam Requirements-from git sources :
team for Linux requires the following:
1 GHz Pentium 4 or AMD Opteron with:
1) x86-64 (AMD64) instruction set
2) CMPXCHG16B instruction support (cx16 in /proc/cpuinfo flags)
3) SSE3 instruction support (pni in /proc/cpuinfo flags)
4) 512 megabytes of RAM and 5 gigabytes of hard drive space, or better
5) Internet connection (Cable/DSL speeds recommended)
6) Latest Ubuntu LTS, fully updated
7) 64-bit (x86-64, AMD64) Linux kernel
8) 64-bit (x86-64, AMD64) and 32-bit (i386, IA32) graphics drivers and glibc
9) Latest graphics driver
10) NVidia driver support - For recent cards (e.g. series 8), you will need to install 310.x. For older cards, driver 304.x supports the NVidia 6 and 7 GPU series. To access these drivers, first update your cache and then install the specific driver you need from the list in Additional Drivers.
11) AMD driver support - For recent cards (e.g. series 5 and above), we recommend installing the 12.11 driver. For older cards, Catalyst 13.1 Legacy supports the HD 2400 Pro card and is the latest for the 2 and 4 GPU series.
12) Intel HD 3000/4000 driver support - you will need to use the latest Mesa drivers, Mesa 9 or later.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Modify the configuration file
After entering the project interface, click "Help"-> "Edit Custom VM Optionsβ¦" in the top menu bar of Idea. If you are prompted to create a file, click "Yes".
After entering the project interface, click "Help"-> "Edit Custom VM Optionsβ¦" in the top menu bar of Idea. If you are prompted to create a file, click "Yes".
π¦ At the end of the opened vmoptions edit window,
> add:-javaagent: idea\jetbrains-agent.jar
> add:-javaagent: idea\jetbrains-agent.jar
π¦ Please carefully check whether the patch path is correct. If it is wrong, the Idea will not open. At this time, you can delete the Idea folder in the user configuration directory:
1) windwos: C: \ Users \ user name \
2) macos: ~ / Library / Preferences /
3) ubuntu: ~
> After modifying the configuration file, restart Idea
4) Enter the activation code
After restarting Idea, click "Help"-> "Registerβ¦" in the menu bar, there are two activation methods:
> Choose the last license server activation method, fill in the address: http://jetbrains-license-server(it should be automatically filled in), or click the button: "Discover Server" to automatically fill in the address and complete the activation
5) If the server activation method cannot be activated, you can also select Activation code to activate, copy the activation code below :
pastebin.com/r8A6W7am
6) View the validity period
When your activation is complete, there will be a small registration prompt box in the lower right corner of Idea. The general content is: You copy is Licensed to XXX, it will tell you: Brother, you have activated successfully, and the source of the activation code is : XXX.
7) To check the validity period, click: Help-> About Here you can see the version number, license source, validity period, and some environments of your Idea
There is no time limit for server activation, which is permanently valid
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
1) windwos: C: \ Users \ user name \
2) macos: ~ / Library / Preferences /
3) ubuntu: ~
> After modifying the configuration file, restart Idea
4) Enter the activation code
After restarting Idea, click "Help"-> "Registerβ¦" in the menu bar, there are two activation methods:
> Choose the last license server activation method, fill in the address: http://jetbrains-license-server(it should be automatically filled in), or click the button: "Discover Server" to automatically fill in the address and complete the activation
5) If the server activation method cannot be activated, you can also select Activation code to activate, copy the activation code below :
pastebin.com/r8A6W7am
6) View the validity period
When your activation is complete, there will be a small registration prompt box in the lower right corner of Idea. The general content is: You copy is Licensed to XXX, it will tell you: Brother, you have activated successfully, and the source of the activation code is : XXX.
7) To check the validity period, click: Help-> About Here you can see the version number, license source, validity period, and some environments of your Idea
There is no time limit for server activation, which is permanently valid
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Pastebin
license by undercode - Pastebin.com
The latest IDEA permanent activation tutorial
> How activate pycharm for free Lastest version
> How activate pycharm for free Lastest version
π¦CAN'T SAY CRACKED BY UNDERCODE XD, ALREADY REPORTING FOR THEIR TEAM(jetbrain) AND IN NEXT UPDATE THEY WILL PATCH IT I GUESS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to evaluate OS security ?
---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.
---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.
---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).
---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.
---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.
---- The following two factors make the OS security mechanism very important:
---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.
---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.
---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:
---- (1) UNIX system settings
---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)
---- (3) Provided by different manufacturers Security patches-The
operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.
---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
π¦ How to evaluate OS security ?
---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.
---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.
---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).
---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.
---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.
---- The following two factors make the OS security mechanism very important:
---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.
---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.
---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:
---- (1) UNIX system settings
---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)
---- (3) Provided by different manufacturers Security patches-The
operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.
---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
---- System Security Scanner (S3) from ISS is a security assessment tool that facilitates the management and implementation of security policies. It enables companies to implement security policies across heterogeneous operating platforms. Currently, S3 supports most popular UNIX versions, including Linux, SunOS4.1.3, Solaris, HP-UX, and AIX. It helps companies automatically conduct security assessment and maintenance on their operating system platforms. With this effective tool, companies can make full use of the potential of the network and continuously enhance their competitivenessβwithout worrying about security.
WRitten by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
WRitten by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to limit the speed of others by wireless router
A) Router settings
1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!
2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !
3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!
4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !
5. The editor here has already been set, click the button to add a new item without setting!
6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !
7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !
B) Settings on the computer
1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!
2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !
3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !
4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to limit the speed of others by wireless router
A) Router settings
1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!
2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !
3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!
4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !
5. The editor here has already been set, click the button to add a new item without setting!
6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !
7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !
B) Settings on the computer
1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!
2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !
3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !
4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST 2020 LINUX IDE RECOMMENDED BY UNDERCODE :
https://netbeans.org/features/cpp/index.html
http://www.codeblocks.org/
https://www.eclipse.org/cdt/
https://www.gnu.org/software/emacs/
https://www.qt.io/ide/
https://www.adacore.com/gnatpro/toolsuite/gps
http://anjuta.org/
https://www.geany.org/
https://www.kdevelop.org/
https://code.visualstudio.com/
https://www.jetbrains.com/clion/
https://www.sublimetext.com/
https://atom.io/
http://bluefish.openoffice.nl/
http://codelite.org/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST 2020 LINUX IDE RECOMMENDED BY UNDERCODE :
https://netbeans.org/features/cpp/index.html
http://www.codeblocks.org/
https://www.eclipse.org/cdt/
https://www.gnu.org/software/emacs/
https://www.qt.io/ide/
https://www.adacore.com/gnatpro/toolsuite/gps
http://anjuta.org/
https://www.geany.org/
https://www.kdevelop.org/
https://code.visualstudio.com/
https://www.jetbrains.com/clion/
https://www.sublimetext.com/
https://atom.io/
http://bluefish.openoffice.nl/
http://codelite.org/
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL
> This project contains scripts and patches to build packages for the Termux Android application.
>The packages available here are only from main set. We have some additional repositories:
1) https://github.com/termux/game-packages
Game packages, e.g. angband or moon-buggy.
2) https://github.com/termux/science-packages
Science-related packages like gap and gnucap.
3) https://github.com/termux/termux-root-packages
Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
4) https://github.com/termux/unstable-packages
Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
5) https://github.com/termux/x11-packages
Packages that require X11 Windows System.
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ
π¦CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL
> This project contains scripts and patches to build packages for the Termux Android application.
>The packages available here are only from main set. We have some additional repositories:
1) https://github.com/termux/game-packages
Game packages, e.g. angband or moon-buggy.
2) https://github.com/termux/science-packages
Science-related packages like gap and gnucap.
3) https://github.com/termux/termux-root-packages
Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).
4) https://github.com/termux/unstable-packages
Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.
5) https://github.com/termux/x11-packages
Packages that require X11 Windows System.
β β β ο½ππ»βΊπ«Δπ¬πβ β β ββ