β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to remotely install applications on an Android smartphone :
Step 1. Open the Play Store in a browser
If you have a link to the app, you can follow it in a browser on any device and then go to step 3.
It usually starts with visiting the Play Store through the device's browser. If it's an iPhone or Mac, you can use the Safari browser. The store link looks like play.google.com/store.
Step 2. Find the app page in the store
You can jump directly to the application you want if you have a link to the page. Alternatively, you can search the store by name. It is possible to filter search results. For example, select only apps in a tab in the menu on the left. You can click "See More" next to the "Applications" section in the search results.
Step 3. Remote installation of the application
Click on the "Install" button. If the app is already installed on the device, this is reported. You need to sign in to your Google account, which is used on the Android device.
If you are already signed in and you are not using this Android device, you can change your account by clicking on your profile picture in the upper right corner.
You will see a list of Android devices associated with this account, including tablets and Android TVs. If the currently selected device is not where you will install the application, click on the name of the desired device in the drop-down menu. After selecting, click "Continue".
If this is the first time you do this, a window will appear asking when authorization is required. Whichever option you choose, a password is always required for a remote installation. You can also add the need to enter a password when shopping.
Select the option you want and click Save. After the download is complete, a message appears that the application is being installed.
Return to your smartphone and the installation of the application will begin. The duration depends on the connection speed.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to remotely install applications on an Android smartphone :
Step 1. Open the Play Store in a browser
If you have a link to the app, you can follow it in a browser on any device and then go to step 3.
It usually starts with visiting the Play Store through the device's browser. If it's an iPhone or Mac, you can use the Safari browser. The store link looks like play.google.com/store.
Step 2. Find the app page in the store
You can jump directly to the application you want if you have a link to the page. Alternatively, you can search the store by name. It is possible to filter search results. For example, select only apps in a tab in the menu on the left. You can click "See More" next to the "Applications" section in the search results.
Step 3. Remote installation of the application
Click on the "Install" button. If the app is already installed on the device, this is reported. You need to sign in to your Google account, which is used on the Android device.
If you are already signed in and you are not using this Android device, you can change your account by clicking on your profile picture in the upper right corner.
You will see a list of Android devices associated with this account, including tablets and Android TVs. If the currently selected device is not where you will install the application, click on the name of the desired device in the drop-down menu. After selecting, click "Continue".
If this is the first time you do this, a window will appear asking when authorization is required. Whichever option you choose, a password is always required for a remote installation. You can also add the need to enter a password when shopping.
Select the option you want and click Save. After the download is complete, a message appears that the application is being installed.
Return to your smartphone and the installation of the application will begin. The duration depends on the connection speed.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google
Android Apps on Google Play
Enjoy millions of the latest Android apps, games, music, movies, TV, books, magazines & more. Anytime, anywhere, across your devices.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ENCRYPT EMAIL :
use PKI/CA certification to encrypt encrypted mail
1) Most of the current email encryption systems are based on this encryption method. PKI (Public Key Infrastructure) refers to the public key infrastructure, and CA (Certificate Authority) refers to the certification center.
2) PKI technically solves various obstacles to network communication security; CA solves the problem of network trust from multiple perspectives such as operation, management, regulation, law, and personnel. Therefore, people collectively referred to as "PKI/CA".
3) From the perspective of the overall structure, PKI/CA is mainly composed of end users, certification centers and registration agencies. The working principle of PKI/CA is to establish a trust network by issuing and maintaining digital certificates. Users in the same trust network complete identity authentication and security processing through the digital certificates they apply for.
4) The registration center is responsible for reviewing the true identity of the certificate applicant. After the review is passed, it is responsible for uploading user information to the certification center through the network, and the certification center is responsible for the final certification processing.
5) The revocation and renewal of the certificate also needs to be submitted by the registration agency to the certification center for processing. In general, the certification center is oriented to each registration center, and the registration center is oriented to the end user, and the registration agency is the intermediate channel between the user and the certification center. The management of public key certificates is a complex system.
6) A typical, complete and effective CA system should at least have the following parts: public key cryptographic certificate management; blacklist release and management; key backup and recovery; automatic key update; historical key management; support for cross-certification, etc. Wait. The PKI/CA certification system is relatively mature, but when it is applied to an email encryption system, there are also complex key management. It is necessary to exchange keys before encryption and decryption operations, etc. The well-known email encryption system PGP uses this encryption process for encryption. .
7) This encryption method is only suitable for enterprises, organizations and some high-end users. Because of the trouble to obtain CA certificates and cumbersome exchanges, this type of email encryption mode has been difficult to popularize.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ENCRYPT EMAIL :
use PKI/CA certification to encrypt encrypted mail
1) Most of the current email encryption systems are based on this encryption method. PKI (Public Key Infrastructure) refers to the public key infrastructure, and CA (Certificate Authority) refers to the certification center.
2) PKI technically solves various obstacles to network communication security; CA solves the problem of network trust from multiple perspectives such as operation, management, regulation, law, and personnel. Therefore, people collectively referred to as "PKI/CA".
3) From the perspective of the overall structure, PKI/CA is mainly composed of end users, certification centers and registration agencies. The working principle of PKI/CA is to establish a trust network by issuing and maintaining digital certificates. Users in the same trust network complete identity authentication and security processing through the digital certificates they apply for.
4) The registration center is responsible for reviewing the true identity of the certificate applicant. After the review is passed, it is responsible for uploading user information to the certification center through the network, and the certification center is responsible for the final certification processing.
5) The revocation and renewal of the certificate also needs to be submitted by the registration agency to the certification center for processing. In general, the certification center is oriented to each registration center, and the registration center is oriented to the end user, and the registration agency is the intermediate channel between the user and the certification center. The management of public key certificates is a complex system.
6) A typical, complete and effective CA system should at least have the following parts: public key cryptographic certificate management; blacklist release and management; key backup and recovery; automatic key update; historical key management; support for cross-certification, etc. Wait. The PKI/CA certification system is relatively mature, but when it is applied to an email encryption system, there are also complex key management. It is necessary to exchange keys before encryption and decryption operations, etc. The well-known email encryption system PGP uses this encryption process for encryption. .
7) This encryption method is only suitable for enterprises, organizations and some high-end users. Because of the trouble to obtain CA certificates and cumbersome exchanges, this type of email encryption mode has been difficult to popularize.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANOTHER METHODE UNLOCK ENCRYPTED EXCEL:
Unlocking files with Microsoft Visual Basic for Applications
If you lose your password from Excel documents, one of the ways to recover it is to use the MS VBA program, which you need to download from the official Microsoft website.
Step 1: Run "VBA" and open the Excel spreadsheet, from which the passphrase is lost through the menu "File" - "Open"
Step 2: Click "Insert" in the toolbar and select the "Module" option
Step 3: Press the key combination "Alt + F11", then the "VBA" window will appear on the right
Step 4: Enter the command "VBA" in this window
Step 5: Next, you need to press "F5" to start the recovery process
Step 6: Wait a few minutes until the end of unlocking, after which a new window will appear with a set password, which can be used without restrictions for normal editing of our file
The only drawback of this method is that it is applicable only to one Excel sheet, and if there are several of them, you will have to repeat this procedure for each part of the table.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ANOTHER METHODE UNLOCK ENCRYPTED EXCEL:
Unlocking files with Microsoft Visual Basic for Applications
If you lose your password from Excel documents, one of the ways to recover it is to use the MS VBA program, which you need to download from the official Microsoft website.
Step 1: Run "VBA" and open the Excel spreadsheet, from which the passphrase is lost through the menu "File" - "Open"
Step 2: Click "Insert" in the toolbar and select the "Module" option
Step 3: Press the key combination "Alt + F11", then the "VBA" window will appear on the right
Step 4: Enter the command "VBA" in this window
Step 5: Next, you need to press "F5" to start the recovery process
Step 6: Wait a few minutes until the end of unlocking, after which a new window will appear with a set password, which can be used without restrictions for normal editing of our file
The only drawback of this method is that it is applicable only to one Excel sheet, and if there are several of them, you will have to repeat this procedure for each part of the table.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform--In the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click Web service extension, click the properties of php, "Required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Change PHP's default Fastcgi mode to ISAPI mode (only run in Windows environment)
1) Download the ZIP file package of PHP at http://www.php.net (note that the version should correspond)
2) Copy the php4isapi.dll in the sapi directory to the c:\php directory
3) Enter the virtual host "Website Management"-"Virtual Host" of the management platform--In the server settings, modify the PHP mapping to change the original:
.php,C:\PHP\php.exe,5,GET,HEAD,POST,TRACE|
Change Into:
.php,C:\PHP\php4isapi.dll,5,GET,HEAD,POST,TRACE|
4) (Required only for IIS 6) Open the IIS manager, click Web service extension, click the properties of php, "Required File"---Add in--Select "C:\PHP\php4isapi.dll", after confirming, PHP can call.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
for you Splunk Admin & Architect: Complete Tutorials + 30 Days Lab
Once you have completed all course modules you will be able to clear Splunk Power User and Splunk Admin certification. !
https://uploadproper.net/dj0x4l9yxext
Once you have completed all course modules you will be able to clear Splunk Power User and Splunk Admin certification. !
https://uploadproper.net/dj0x4l9yxext
uploadproper.net
Download [Coursedevil com]Splunk Admin Architect Complete Tutorials Days Lab rar
Download File [Coursedevil com]Splunk Admin Architect Complete Tutorials Days Lab rar
New The Complete React Developer Course (w Hooks and Redux)
https://drive.google.com/drive/folders/144BToUqetDVYwP-MVgu5ICLSqf6uKwpR
https://drive.google.com/drive/folders/144BToUqetDVYwP-MVgu5ICLSqf6uKwpR
Google
[FreeCourseLab.com] Udemy - The Complete React Developer Course (w Hooks and Redux) - Google Drive
Uploaded by http://t.me/torrentleech_bot (504501114_d7AJjZWNc7lvysp9wyuK)
Good to learn :
1)2D Animation Essentials in Anime Studio Pro Adobe Illustrator Crash Course
2)Fundamentals of Photoshop: Getting Started with the Interface, Tools, and Layers (Photoshop I)
3)Fundamentals of Photoshop: Drawing, Layers, Masks, and Selections (Photoshop II)
4)Fundamentals of Photoshop: Typography and the Pen Tool (Photoshop III)
5)Fundamentals of Photoshop: Color, Swatches, and Blending (Photoshop IV)
6)Fundamentals of Photoshop: Creating Efficient Workflows, Tips, and Tricks (Photoshop V)
7)Master Game Development With Unity Game Engine Volume 1 - 16
8)Video Editing with Adobe Premiere Pro 2018 for Beginners
https://mega.nz/folder/F0JUhJJS#Ybc0czEkrREY6h3s5E46aQ
1)2D Animation Essentials in Anime Studio Pro Adobe Illustrator Crash Course
2)Fundamentals of Photoshop: Getting Started with the Interface, Tools, and Layers (Photoshop I)
3)Fundamentals of Photoshop: Drawing, Layers, Masks, and Selections (Photoshop II)
4)Fundamentals of Photoshop: Typography and the Pen Tool (Photoshop III)
5)Fundamentals of Photoshop: Color, Swatches, and Blending (Photoshop IV)
6)Fundamentals of Photoshop: Creating Efficient Workflows, Tips, and Tricks (Photoshop V)
7)Master Game Development With Unity Game Engine Volume 1 - 16
8)Video Editing with Adobe Premiere Pro 2018 for Beginners
https://mega.nz/folder/F0JUhJJS#Ybc0czEkrREY6h3s5E46aQ
mega.nz
File folder on MEGA
Data Structures and Algorithms in C++ For Coding Interview
Covers Algorithmic Problems in C++ That range a variety of data structures which often pop up during a coding interview.
https://mega.nz/folder/ehQgna5R#arlnwkovZKhZIBKzLvkcZA
Covers Algorithmic Problems in C++ That range a variety of data structures which often pop up during a coding interview.
https://mega.nz/folder/ehQgna5R#arlnwkovZKhZIBKzLvkcZA
mega.nz
File folder on MEGA
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to find the Sniffer ?
> biggest danger of Sniffer Sniffer is that it is difficult to find. It is relatively easy to find a Sniffer in a stand-alone situation. It can be realized by checking all the programs currently running on the computer. Of course, this is not necessarily reliable.
1) The following command can be used under UNIX system: ps-aux. This command lists all current processes, the user who started these processes, the time they occupy the CPU, how much memory they occupy, and so on.
2) In the Windows system, you can press Ctrl+Alt+Del to view the task list. However, even if the Sniffer with high programming skills is running, it will not appear here.
3) Another method is to search the system to find suspicious files. But the invaders may use their own programs, so this makes it difficult to find Sniffer. There are many tools that can be used to check whether your system is in promiscuous mode, so as to find out if there is a Sniffer running.
> However, it is very difficult to detect which host is running Sniffer under network conditions, because Sniffer is a passive attack software. It does not send data packets to any host, but just runs quietly, waiting to be captured. The packets go through.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to find the Sniffer ?
> biggest danger of Sniffer Sniffer is that it is difficult to find. It is relatively easy to find a Sniffer in a stand-alone situation. It can be realized by checking all the programs currently running on the computer. Of course, this is not necessarily reliable.
1) The following command can be used under UNIX system: ps-aux. This command lists all current processes, the user who started these processes, the time they occupy the CPU, how much memory they occupy, and so on.
2) In the Windows system, you can press Ctrl+Alt+Del to view the task list. However, even if the Sniffer with high programming skills is running, it will not appear here.
3) Another method is to search the system to find suspicious files. But the invaders may use their own programs, so this makes it difficult to find Sniffer. There are many tools that can be used to check whether your system is in promiscuous mode, so as to find out if there is a Sniffer running.
> However, it is very difficult to detect which host is running Sniffer under network conditions, because Sniffer is a passive attack software. It does not send data packets to any host, but just runs quietly, waiting to be captured. The packets go through.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux hacking tools :
aircrack-ng pkg install root-repo
pkg install aircrack-ng
bettercap pkg install root-repo
pkg install bettercap
metasploit pkg install unstable-repo
pkg install metasploit
nmap pkg install nmap
pkg install root-repo
tshark
pkg install tshark
pkg install unstable-repo
sqlmap
pkg install sqlmap
pkg install x11-repo
wireshark-gtk
pkg install wireshark-gtk
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux hacking tools :
aircrack-ng pkg install root-repo
pkg install aircrack-ng
bettercap pkg install root-repo
pkg install bettercap
metasploit pkg install unstable-repo
pkg install metasploit
nmap pkg install nmap
pkg install root-repo
tshark
pkg install tshark
pkg install unstable-repo
sqlmap
pkg install sqlmap
pkg install x11-repo
wireshark-gtk
pkg install wireshark-gtk
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GPU-based Onion hash generator :
At a high level, Scallion works like this:
Generates RSA key using OpenSSL on the CPU
Sends a key to the GPU
Increases the public exponent of the key
Hashes the key
E fusion hashed key is not a partial collision, proceeds to step 3
If the key does not pass the health checks recommended by PKCS
DOWNLOAD:
https://github.com/lachesis/scallion/archive/gpg.zip
USAGE:
> $ mono scallion / bin / Debug / scallion.exe -d 0 prefix
Cooking up some delicious scallions ...
Using kernel optimized from file kernel.cl (Optimized4)
Using work group size 128
Compiling kernel ... done.
Testing SHA1 hash ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GPU-based Onion hash generator :
At a high level, Scallion works like this:
Generates RSA key using OpenSSL on the CPU
Sends a key to the GPU
Increases the public exponent of the key
Hashes the key
E fusion hashed key is not a partial collision, proceeds to step 3
If the key does not pass the health checks recommended by PKCS
DOWNLOAD:
https://github.com/lachesis/scallion/archive/gpg.zip
USAGE:
> $ mono scallion / bin / Debug / scallion.exe -d 0 prefix
Cooking up some delicious scallions ...
Using kernel optimized from file kernel.cl (Optimized4)
Using work group size 128
Compiling kernel ... done.
Testing SHA1 hash ...
β β β Uππ»βΊπ«Δπ¬πβ β β β