🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰
1.33K subscribers
478 photos
97 videos
15 files
298 links
We Are 𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 fans!
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Hora Pusa Free VPN bot.

Free internet යන්න කැමති අයට මම ගානෙ 😌.

👇👇
@horapusa_vpn_bot

contact me @hora_pusa
Forwarded from Linux
Shell Scripting: Get started with shell scripting using bash (Bourne Again Shell) or another shell. Learn how to write simple scripts to automate tasks and perform repetitive actions.


Shell scripting is a powerful way to automate tasks and perform repetitive actions in Linux. The Bash shell (Bourne Again Shell) is one of the most common shells used in Linux systems. Here are some basics to help you get started with shell scripting:

1. Script Creation:
- Choose a text editor: Use a text editor such as nano, vim, or gedit to create and edit your shell scripts. For example, nano script.sh.
- Set the script's interpreter: Begin your script with a shebang line that specifies the interpreter. For Bash scripts, use #!/bin/bash.

2. Variables:
- Variable assignment: Assign values to variables using the syntax variable_name=value. For example, name="John".
- Variable usage: Access variable values using the $ prefix. For example, echo "Hello, $name!".

3. Comments:
- Add comments: Use the # symbol to add comments in your script. Comments are ignored by the interpreter but provide explanations for human readers.

4. Command Execution:
- Run commands: Execute commands within your script using backticks (\`) or the $() syntax. For example, output=`ls -l" or output=$(ls -l).

5. Control Structures:
- If statements: Use conditional statements (if, elif, else) to perform different actions based on specific conditions. For example:
bash
if [ $age -ge 18 ]; then
echo "You are an adult."
else
echo "You are a minor."
fi


- Loops: Utilize loops (for, while) to repeat actions. For example:
bash
for i in 1 2 3; do
echo $i
done


6. Input and Output:
- Read user input: Use the read command to accept user input and assign it to variables. For example, read -p "Enter your name: " name.
- Print output: Use the echo command to display output on the terminal. For example, echo "Hello, World!".

7. File Operations:
- Read and write files: Use commands like cat, grep, sed, and awk to read and manipulate files within your script.

8. Running Scripts:
- Make the script executable: Use the chmod command to make your script executable. For example, chmod +x script.sh.
- Execute the script: Run the script using ./script.sh or bash script.sh.

Remember to test and validate your scripts before using them on important tasks. Start with simple scripts and gradually build complexity as you gain more experience with shell scripting. Refer to shell scripting guides, tutorials, and documentation for more in-depth knowledge.

Shell scripting is a vast topic, and exploring additional concepts like functions, error handling, and regular expressions will expand your scripting capabilities. Practice, experiment, and leverage online resources to enhance your shell scripting skills.


©GameSploit
#gamesploit

Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!
Forwarded from Linux
Networking: Understand basic networking concepts in Linux, including IP addressing, network configuration, and troubleshooting network connectivity issues. Learn how to use tools like ifconfig, ping, and netstat.


Networking is a fundamental aspect of Linux system administration. Understanding basic networking concepts and utilizing essential tools can help you configure and troubleshoot network connectivity. Here are some key networking topics and tools in Linux:

1. IP Addressing:
- IP address: An IP address uniquely identifies a device on a network. Learn about IPv4 and IPv6 addressing schemes and how to assign static or dynamic IP addresses to your Linux system.
- Subnetting: Understand subnetting to divide a network into smaller subnetworks.

2. Network Configuration:
- ifconfig: The ifconfig command displays and configures network interfaces, including assigning IP addresses, enabling or disabling interfaces, and modifying network settings.
- ip command: In recent Linux distributions, the ip command is replacing ifconfig. It provides more advanced functionalities for managing network interfaces, routing, and other network-related tasks.

3. Network Connectivity:
- ping: The ping command is used to check network connectivity between your Linux system and another device by sending ICMP echo request packets.
- traceroute: The traceroute command traces the path packets take from your system to a destination host, showing the IP addresses and response times of intermediate hops.
- netstat: The netstat command displays active network connections, listening ports, routing tables, and various network statistics.

4. DNS (Domain Name System):
- DNS resolution: Understand how DNS works and how Linux systems resolve domain names to IP addresses. Learn how to configure DNS servers and troubleshoot DNS-related issues.
- nslookup and dig: The nslookup and dig commands are used to query DNS servers and retrieve information about domain names, IP addresses, and DNS records.

5. Firewall and Security:
- iptables: The iptables command is a powerful tool for configuring firewall rules to filter network traffic, control access, and enhance system security.
- firewalld: In modern Linux distributions, firewalld is often used as a frontend for managing firewall rules. It provides a more user-friendly and dynamic interface.

6. Network File Sharing:
- NFS (Network File System): Learn how to configure NFS to share files and directories across a network.
- Samba: Explore Samba to enable file and printer sharing between Linux and Windows systems.

7. Network Troubleshooting:
- tcpdump: The tcpdump command captures and analyzes network packets, helping diagnose network issues and investigate network traffic.
- Wireshark: Wireshark is a graphical packet analyzer that allows you to capture, inspect, and analyze network packets in real-time.

Mastering networking concepts and tools takes practice and hands-on experience. Additionally, online resources, Linux networking tutorials, and forums dedicated to networking topics can provide further guidance and practical examples to deepen your understanding of Linux networking.


©GameSploit
#gamesploit

Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!
Forwarded from Linux
System Monitoring and Maintenance: Explore tools and techniques for monitoring system performance, managing processes, and troubleshooting common issues in Linux. Learn about log files, system resource monitoring, and package updates.

System monitoring and maintenance are essential tasks for keeping a Linux system running smoothly. Here are some tools and techniques to help you monitor system performance, manage processes, and troubleshoot common issues in Linux:

1. Resource Monitoring:
- top: The top command displays real-time information about system resource usage, including CPU, memory, and processes. It allows you to monitor and manage running processes.
- htop: Similar to top, htop provides an interactive and enhanced view of system resources and processes, with options for sorting, searching, and filtering.
- vmstat: The vmstat command reports virtual memory statistics, providing insights into system memory, swap, and CPU usage.

2. Log Files:
- /var/log: Linux systems store log files in the /var/log directory. Common log files include /var/log/syslog, /var/log/messages, and /var/log/auth.log. Monitoring log files helps identify errors, warnings, and system events.
- tail: The tail command allows you to view the last few lines of a log file, providing a real-time update of log activity. For example, tail -f /var/log/syslog continuously displays new log entries as they are added.

3. Process Management:
- ps: The ps command displays information about running processes, including their process IDs (PIDs), resource usage, and parent-child relationships. For example, ps aux lists all running processes.
- kill: The kill command terminates a process using its PID. For example, kill PID terminates the process with the specified PID. The killall command allows you to kill processes by name.

4. Package Updates:
- Package Managers: Use the package management tools discussed earlier (APT or YUM) to update software packages. For example, sudo apt update && sudo apt upgrade updates all packages on an Ubuntu system.
- Unattended Upgrades: Configure the system to automatically install security updates using tools like unattended-upgrades (Debian-based) or yum-cron (Red Hat-based). This ensures that critical security patches are applied automatically.

5. Performance Monitoring Tools:
- sar: The sar command collects and reports system performance data, including CPU, memory, disk I/O, and network usage. It helps identify performance bottlenecks and historical trends.
- iostat: The iostat command provides input/output statistics for devices and partitions, helping identify disk I/O performance issues.
- nmon: The nmon command provides a comprehensive view of system resources, including CPU, memory, disk, network, and file system utilization. It displays real-time and historical data in a user-friendly format.

Regularly monitoring system performance, managing processes, and staying up to date with package updates are essential for maintaining a stable and secure Linux system. Explore additional monitoring tools and techniques based on your specific requirements and system setup.

Remember to consult the relevant man pages, distribution documentation, or online resources for detailed usage instructions and options specific to the tools mentioned above.

©GameSploit
#gamesploit

Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!
Forwarded from Linux
Security: Gain awareness of essential Linux security practices, including user management, permissions, firewalls, and system updates. Understand the importance of keeping your Linux system secure.

Linux security practices are vital for protecting your system from unauthorized access, vulnerabilities, and potential threats. Here are some essential Linux security practices to help you maintain a secure environment:

1. User Management:
- Use strong passwords: Encourage users to use complex passwords that include a combination of uppercase and lowercase letters, numbers, and special characters. Consider implementing password policies or tools to enforce password strength.
- Limit user privileges: Assign users the minimum necessary privileges to perform their tasks. Regularly review and revoke unnecessary privileges.
- Disable or remove unused accounts: Remove or disable any user accounts that are no longer needed to reduce the potential attack surface.
- Implement multi-factor authentication (MFA): Enable MFA for user authentication, which adds an extra layer of security by requiring additional verification beyond a password.

2. File Permissions and Ownership:
- Set appropriate file permissions: Configure file and directory permissions to restrict access based on the principle of least privilege. Use chmod to set permissions (e.g., read, write, execute) for the owner, group, and others.
- Manage file ownership: Ensure that files and directories are owned by the appropriate users and groups using the chown command. Restrict access to sensitive files by limiting ownership and permissions.

3. Firewall Configuration:
- Configure a firewall: Use tools like iptables or firewalld to set up a firewall and define rules that control inbound and outbound network traffic. Restrict access to necessary services and ports, and regularly review and update firewall rules.

4. Regular System Updates:
- Keep the system up to date: Install security patches and updates regularly to address vulnerabilities and bugs. Use the package manager (apt, yum, etc.) to update the system and its installed packages.

5. Security Auditing and Monitoring:
- Monitor system logs: Regularly review system logs located in /var/log for any suspicious activities or error messages that could indicate security breaches or issues.
- Implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) to monitor and alert you of potential security threats.
- Use security auditing tools like lynis or OpenSCAP to scan the system for vulnerabilities and compliance with security best practices.

6. Security Awareness:
- Educate users: Promote security awareness among users and provide training on best practices such as avoiding phishing emails, practicing safe browsing habits, and being cautious with file downloads.
- Stay informed: Keep up to date with Linux security news, vulnerabilities, and security advisories relevant to your distribution. Subscribe to security mailing lists or follow reputable sources for timely information.

Maintaining a secure Linux system requires ongoing effort and vigilance. Regularly review and update security practices to adapt to evolving threats and new vulnerabilities. Consult official documentation, security resources, and community forums to stay informed about the latest security recommendations for your specific Linux distribution.

©GameSploit
#gamesploit

Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!
100$ Free Airdrop!.

ඔයාලට මේකට සතයක් වත් වියදම් වෙන්නෙ නෑ.
ඔයාලට තියෙන්නෙ පල්ලෙහා link එකෙන් ගිහින් start ඔබලා ඒකෙ තියෙන විදියට කරන එක.
එතකොට ඔයාලගෙ airdrop එක trust wallet එකට withdraw කරගන්න පුලුවන්.
මේකට referral ඕනි වෙන්නෙත් නෑ.
Twitter account එකක් විතරයි අවශ්‍ය.

👇👇👇👇
https://t.me/AIT_AIRDROP_BOT?start=TkH7nDUfS
👍1
Crypto Whale | VIP

Free & VIP SINGLE Service එකක් අලුතින් පටන් ගත්තා

3 Signals Per Day

Join වෙලාම බලන්න

🟢 Whatsapp Group

https://chat.whatsapp.com/KSFzU3If9zACoSP0JbsJaR
📍 *2025 A/L ICT Theory නව පන්ති ආරම්භය*
Group Class With Individual Attention

ජූලි 4
Tuesday 3.30PM to 5.30PM

සිංහල & English Medium

Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
Branded IT Group Class එක
සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න

පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න

IT වලට ආස ළමයි විතරක් එන පංතිය

🎯 Be ready to become an IT expert, not just to get an A

SANKALPA WIJERATJNA
bsc(hons)software engineering
CCNA

විමසීම්
0767862124
https://wa.me/+94767862124

Join to the WhatsApp Group Below

https://chat.whatsapp.com/KQ1RRGP4S2dK6IEEY08Lrg
2024 ICT Networking සහේත්‍රා-දොම්පේ
රැල්ලට ගොස් අමාරුවේ වැටීමට පෙර දැන්වත් හරි තැනට

_එහෙනම් එන්න නොමිලේ networking හරියට ඉගෙන ගන්න._

MCQ ප්‍රශ්න 8 ක් ,STRUCTURE අනු කොටස් දෙකක් සහ
ESSAY 1 ප්‍රශ්නයක් ලේසියෙන් ම ගොඩ දා ගන්න

2023 සිසුන්ට ද සහබාගී විය හැක

පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න

🎯 Be ready to become an IT expert, not just to get an A

විමසීම්
0767862124
https://wa.me/+94767862124
🌿Packets Storm Attack:Explain in (සිංහල)🧑‍💻

Cyber Warfare එක තුළ මේ Packets Storm Attack කියන එක විනාශකාරීම බලවේගයක් වෙලා තියෙනවා.ඉතින් මේ Article එකෙන් කතා කරමු Packets Storm Attack ගැන.

1) මොකක්ද මේ Packets Storm Attack කියලා කියන්නේ.

2) Packets Storm Attack වැඩ කරන්නේ කොහොමද ?

3) ඇයි Hackers ලා Packets Storm Attack use කරන්නේ

4) Packets Storm Attack ගැන Real-World Examples

5) කොහොමද මේවායෙන් ආරක්ශා වෙන්නේ


🟢 Read Full Article >>>


🌙🌿 Please react & comment to post "/


Writen By :
@Kap_Official

==================================


Join our channel :
@hack_kap0
Our community : @Hack_Kap


Happy Hacking 🥷🏻

Copyright  Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
4
කෝල් ,මැසේජ් දදා කට්ටිය වද දෙනවද?

කෝල් ,මැසේජ් එන නම්බර් වල තොරතුරු දැනගන්න ඕනිද?

ඔයාට දැම් ඕනිම phone number එකක තොරතුරු අපගේ Telegram Bot සේවාව හරහා නොමිලේම සොයාගත හැක.

දැනට පොඩි features ටිකක් තියෙන්නෙ ඉස්සරහට හදන්නම් හොදට🤓

👇👇👇

https://t.me/hp_contacts_bot
👍1
Hora Pusa NFSW AI Bot Up Again!
You Can Create Beautiful Girls Using This Bot!.
👇👇👇👇
https://t.me/hora_pusa_ai_nfsw
👍3🥰2
Forwarded from KAP
🌿SQL Injection Attack :: Explain in (සිංහල)🧑‍💻


හැඳින්වීම :

අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන.

Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ  Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්‍යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත්  SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු

(1) SQL Injection එකක් කියන්නේ මොකක්ද?

(2) SQL Injection Types මොනවද?

(3) කොහොමද මේ SQLI වැඩ කරන්නේ?

(4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ?

(5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද?


🟢 Full Post >>>
.
.

Join our channel : @hack_kap0
Our community :
@Hack_Kap


Happy Hacking 🥷🏻

Copyright  Ⓒ 2023
𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
👍2
📍 *2025 A/L ICT Theory Online*

*සදුදා 8.30am to 10.30am*

Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
*Branded IT Online Class* එක
සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න

පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න

IT වලට ආස ළමයි විතරක් එන පංතිය

🎯 Be ready to become an IT expert, not just to get an A

JOIN WHATSAPP GROUP 👇

https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
👎1
5 Ways to get 1000 Dollars in a Week

There are five legitimate ways to potentially earn $1000 in a week:

1. Freelancing: Offer your skills online, such as graphic design, programming.

2. Gig Economy: Participate in gig jobs like food delivery, or task-based apps like Uber.

3. Online Selling: Utilize platforms like eBay to sell items you no longer need or create and sell digital products.

4. Rent or Share Assets: Rent out your spare room or share your car through car-sharing platforms.

5. Temp Work: Seek temporary job opportunities in your local area or through temp agencies for quick earning potentials.

Each opportunity comes with its own set of risks and rewards.

🟢 Full Post through Medium >>>
🟢 Full Post through Telegram >>>
.
.
Join our Channel : @berich_ofc
Join our Medium :https://be-rich.medium.com/

Financial Wizard | Unleashing Abundance 🌟 | Join me on the path to rapid riches and financial freedom! 💰 #WealthCreation #Rich

Copyright  Ⓒ 2023 BE RICH
👍1
🔝 Free binance signals....join group,giveaways for free usdt පුංචි වොලට් තියන අය ගොඩ දානවා 🌚❤️ https://t.me/gethub0chat
🌿SQL Injection Attack :: (සිංහල)🧑‍💻


හැඳින්වීම :

අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන.

Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ  Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්‍යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත්  SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු

(1) SQL Injection එකක් කියන්නේ මොකක්ද?

(2) SQL Injection Types මොනවද?

(3) කොහොමද මේ SQLI වැඩ කරන්නේ?

(4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ?

(5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද?


🟢 Full Post >>>
.
.

Join our channel : @hack_kap0
Our community :
@Hack_Kap


Happy Hacking 🥷🏻

Copyright  Ⓒ 2023
𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
3👍1🔥1