Learn Artificial Intelligence with TensorFlow —1.84 GB
https://mega.nz/#F!OhEnTahQ!eIH-kn6EH6xQOPA3Yph4Rg
https://mega.nz/#F!OhEnTahQ!eIH-kn6EH6xQOPA3Yph4Rg
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
Forwarded from UNDERCODE NEWS
Social media giant Facebook launched Facebook Pay in August of this year, a payment program for small and medium-sized businesses’ online transactions
#Updates
_
#Updates
_
Forwarded from UNDERCODE NEWS
Go up against the breeze! Google aims to amend guidance to reiterate that its charging scheme must be used for in-app transactions.
#international
_
#international
_
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
The Bank of China will stop moving money from the cell phone edition of Windows Phone tomorrow.
#Updates
_
#Updates
_
Forwarded from UNDERCODE NEWS
Microsoft CEO talks about the negotiation of acquiring Tiktok: the taste has changed, I will never participate
#international
_
#international
_
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE COMMUNITY
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 ANDROID MALWARE:
Generic Android Deobfuscator :
Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used.
🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :
1) Building requires the Java Development Kit 8 (JDK) to be installed.
Because this project contains submodules for Android frameworks, either clone with --recursive:
git clone --recursive https://github.com/CalebFenton/simplify.git
Or update submodules at any time with:
git submodule update --init --recursive
2) Then, to build a single jar which contains all dependencies:
./gradlew fatjar
3) The Simplify jar will be in simplify/build/libs/. You can test it's working by simplifying the provided obfuscated example app. Here's how you'd run it (you may need to change simplify.jar):
java -jar simplify/build/libs/simplify.jar -it 'org/cf/obfuscated' -et 'MainActivity' simplify/obfuscated-app.a
🦑FULL USAGE & EXAMPLE :
https://github.com/CalebFenton/simplify
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 ANDROID MALWARE:
Generic Android Deobfuscator :
Simplify virtually executes an app to understand its behavior and then tries to optimize the code so that it behaves identically but is easier for a human to understand. Each optimization type is simple and generic, so it doesn't matter what the specific type of obfuscation is used.
🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽 :
1) Building requires the Java Development Kit 8 (JDK) to be installed.
Because this project contains submodules for Android frameworks, either clone with --recursive:
git clone --recursive https://github.com/CalebFenton/simplify.git
Or update submodules at any time with:
git submodule update --init --recursive
2) Then, to build a single jar which contains all dependencies:
./gradlew fatjar
3) The Simplify jar will be in simplify/build/libs/. You can test it's working by simplifying the provided obfuscated example app. Here's how you'd run it (you may need to change simplify.jar):
java -jar simplify/build/libs/simplify.jar -it 'org/cf/obfuscated' -et 'MainActivity' simplify/obfuscated-app.a
🦑FULL USAGE & EXAMPLE :
https://github.com/CalebFenton/simplify
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑TERMUX HACKING TOOLS LIST & USAGE :
- [Clickjacking-Tester](https://github.com/D4Vinci/Clickjacking-Tester) - A python script designed to check if the website if vulnerable of clickjacking and create a poc.[](https://github.com/D4Vinci/Clickjacking-Tester/stargazers/)
- [Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.[](https://github.com/D4Vinci/Dr0p1t-Framework/stargazers/)
- [elpscrk](https://github.com/D4Vinci/elpscrk) - A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v.[](https://github.com/D4Vinci/elpscrk/stargazers/)
- [SecLists](https://github.com/danielmiessler/SecLists) - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more..[](https://github.com/danielmiessler/SecLists/stargazers/)
- [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script.[](https://github.com/darkoperator/dnsrecon/stargazers/)
- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye) - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ].[](https://github.com/DarkSecDevelopers/HiddenEye/stargazers/)
- [Intersect-2.5](https://github.com/deadbits/Intersect-2.5) - Post-Exploitation Framework.[](https://github.com/deadbits/Intersect-2.5/stargazers/)
- [wifite](https://github.com/derv82/wifite) - No description provided[ - A python script designed to check if the website if vulnerable of clickjacking and create a poc.[](https://github.com/D4Vinci/Clickjacking-Tester/stargazers/)
- [Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.[](https://github.com/D4Vinci/Dr0p1t-Framework/stargazers/)
- [elpscrk](https://github.com/D4Vinci/elpscrk) - A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v.[](https://github.com/D4Vinci/elpscrk/stargazers/)
- [SecLists](https://github.com/danielmiessler/SecLists) - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more..[](https://github.com/danielmiessler/SecLists/stargazers/)
- [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script.[](https://github.com/darkoperator/dnsrecon/stargazers/)
- [HiddenEye](https://github.com/DarkSecDevelopers/HiddenEye) - Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ].[](https://github.com/DarkSecDevelopers/HiddenEye/stargazers/)
- [Intersect-2.5](https://github.com/deadbits/Intersect-2.5) - Post-Exploitation Framework.[](https://github.com/deadbits/Intersect-2.5/stargazers/)
- [wifite](https://github.com/derv82/wifite) - No description provided[ Server cabinet cooling systems
The choice of server cabinet will depend on the cooling system implemented in your data center and server room.
Hot Aisle Containment (HAC) and Cold Aisle Containment (CAC) systems are highly efficient air control processes that optimize the use of cold air by improving the flow of chilled air through aisles and server enclosures.
In connection with the increase in the cost of electricity energy planning it is also an important factor to be taken into account, because such action may include reducing the amount of used by the PDU, rack selection with improved cabling and space for ventilation.
Follow the link to view the solutions from WTLAN - https://wtlan.ru/catalog/Napolnyeshkafy/
2) Power management
Power distribution units (PDUs) and backup battery are also important factors to consider when choosing a server cabinet and the number of outlets required.
Remote power tools such as smart power strips can help reduce server downtime, and reboot problems can be resolved from a remote location via internet access, whereas standard power strips can provide vital information and must be locally controlled.
3) Server cabinet size
Server cabinets and internal racks are available in a wide range of sizes up to 48U, 19 '' and ETSI standard, in a wide range of widths from 600 mm, 800 mm and 1000 mm, in a wide range of depths from 600 mm, 800 mm, 900 mm, 1000 mm and 1200 mm.
Key features and benefits may include: - modular design, factory assembled, bay design (using a docking kit), hybrid design, thermal efficiency, hot and cold aisle isolation, robust locking solutions, a variety of cabling and accessory options.
4) Security
Companies are constantly looking for ways to improve their security solutions, as security and protection are very important for a growing number of businesses to protect against vandalism.
Floor-standing server cabinets can provide the following security options: - fire protection, highly reliable locking solutions
Additional measures include lockable front and rear doors, limiting the number of windows in a building and ensuring safe entrances and exits, and installing video surveillance for additional security measures.
5) Server cabinet design
Selecting the right server cabinets and racks and installing them according to your business needs will keep your IT equipment running reliably and efficiently and help improve power protection, cabling, and physical security.
When designing a server cabinet, consider: - the height of the internal cabinet, width, depth, and rated load, cabinet layout, room characteristics, electrical equipment placement, cabling and environmental protection.
You can also choose from several cabinet options and accessories, including: - cable trunking kit, chassis rail kit, shelves, top and side panels, mounting rails, heavy duty wheel kit, and paint color.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑🗄WTLAN | Five Key Considerations When Choosing Floor Standing Server Cabinets ?
1) Server cabinet cooling systems
The choice of server cabinet will depend on the cooling system implemented in your data center and server room.
Hot Aisle Containment (HAC) and Cold Aisle Containment (CAC) systems are highly efficient air control processes that optimize the use of cold air by improving the flow of chilled air through aisles and server enclosures.
In connection with the increase in the cost of electricity energy planning it is also an important factor to be taken into account, because such action may include reducing the amount of used by the PDU, rack selection with improved cabling and space for ventilation.
Follow the link to view the solutions from WTLAN - https://wtlan.ru/catalog/Napolnyeshkafy/
2) Power management
Power distribution units (PDUs) and backup battery are also important factors to consider when choosing a server cabinet and the number of outlets required.
Remote power tools such as smart power strips can help reduce server downtime, and reboot problems can be resolved from a remote location via internet access, whereas standard power strips can provide vital information and must be locally controlled.
3) Server cabinet size
Server cabinets and internal racks are available in a wide range of sizes up to 48U, 19 '' and ETSI standard, in a wide range of widths from 600 mm, 800 mm and 1000 mm, in a wide range of depths from 600 mm, 800 mm, 900 mm, 1000 mm and 1200 mm.
Key features and benefits may include: - modular design, factory assembled, bay design (using a docking kit), hybrid design, thermal efficiency, hot and cold aisle isolation, robust locking solutions, a variety of cabling and accessory options.
4) Security
Companies are constantly looking for ways to improve their security solutions, as security and protection are very important for a growing number of businesses to protect against vandalism.
Floor-standing server cabinets can provide the following security options: - fire protection, highly reliable locking solutions
Additional measures include lockable front and rear doors, limiting the number of windows in a building and ensuring safe entrances and exits, and installing video surveillance for additional security measures.
5) Server cabinet design
Selecting the right server cabinets and racks and installing them according to your business needs will keep your IT equipment running reliably and efficiently and help improve power protection, cabling, and physical security.
When designing a server cabinet, consider: - the height of the internal cabinet, width, depth, and rated load, cabinet layout, room characteristics, electrical equipment placement, cabling and environmental protection.
You can also choose from several cabinet options and accessories, including: - cable trunking kit, chassis rail kit, shelves, top and side panels, mounting rails, heavy duty wheel kit, and paint color.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
wtlan.ru
Напольные шкафы - купить серверный шкаф 19" телекоммуникационный шкаф 19", комплектующие
Напольные серверные и телекоммуникационные шкафы 19" W&T - купить по лучшей цене на рынке с учётом базовой комплектации! WTLAN - качественное оборудование с гарантией
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑🕵️What you need for Anonymity and security ?
1) Setting up the working environment. Improved and revised work with virtual machines (perhaps the only analogy with the previous course);
2) Fine work with different cryptocurrencies;
3) Selection, rental, administration and protection of VPS (70% of the work in the course takes place on servers);
4) Lifting and configuring services on VPS and working with them;
5) Fine work with Tor services;
6) Squeezing the maximum out of the Raspberry Pi;
7) Anonymous routers;
8) Lifting, configuring and administering the Tor node;
9) Work with PC hardware. Removing hardware bookmarks;
10) Risk minimization and ... authoring.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑🕵️What you need for Anonymity and security ?
1) Setting up the working environment. Improved and revised work with virtual machines (perhaps the only analogy with the previous course);
2) Fine work with different cryptocurrencies;
3) Selection, rental, administration and protection of VPS (70% of the work in the course takes place on servers);
4) Lifting and configuring services on VPS and working with them;
5) Fine work with Tor services;
6) Squeezing the maximum out of the Raspberry Pi;
7) Anonymous routers;
8) Lifting, configuring and administering the Tor node;
9) Work with PC hardware. Removing hardware bookmarks;
10) Risk minimization and ... authoring.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁