Monitor System Resources of Your Linux Server With Glances
https://itsfoss.com/glances/
#Share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://itsfoss.com/glances/
#Share & #supportus
π @geekcode π
Don't forget to join us ππ»
It's FOSS
Glances - A Versatile System Monitoring Tool for Linux Systems
The most commonly used command line tools for process monitoring on Linux are top and its colorful, feature rich cousin htop .
To monitor temperature on Linux, you can use lm-sensors. Similarly, there are many utilities to monitor other real-time metricsβ¦
To monitor temperature on Linux, you can use lm-sensors. Similarly, there are many utilities to monitor other real-time metricsβ¦
π° Laralink v1.2.0 - Powerful URL Shortener Nulled Script Download π°
βοΈLaralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.
π»Demo Link: https://bit.ly/2YP7tHF
π»Download Link: https://bit.ly/31pjKnA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
βοΈLaralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.
π»Demo Link: https://bit.ly/2YP7tHF
π»Download Link: https://bit.ly/31pjKnA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π° Laralink v1.2.0 - Powerful URL Shortener Nulled Script Download π°
βοΈLaralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.
π»Demo Link: https://bit.ly/2YP7tHF
π»Download Link: https://bit.ly/31pjKnA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
βοΈLaralink is a link shortener, which allows you to manage links from a simple dashboard with advanced analytics.
π»Demo Link: https://bit.ly/2YP7tHF
π»Download Link: https://bit.ly/31pjKnA
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π₯ ONE OF THE PAID COURSE COLLECTION π₯
1)Affiliate Marketing
2)Amazon FBA
3)Audio Book
4) Copywriting skill books
5) Cryptocurrency Course
7)E-books
8) Email Marketing
https://mega.nz/folder/zuB0lKjY#x3uWqSZhzvvC8EMVReDJag/folder/CyhgHQjI
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
1)Affiliate Marketing
2)Amazon FBA
3)Audio Book
4) Copywriting skill books
5) Cryptocurrency Course
7)E-books
8) Email Marketing
https://mega.nz/folder/zuB0lKjY#x3uWqSZhzvvC8EMVReDJag/folder/CyhgHQjI
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
mega.nz
File folder on MEGA
MUST KNOW CYBER SECURITY TIPS π€
READ POST βπ»
If you like our work, then share our channel and join please.
(β€οΈ)
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
READ POST βπ»
If you like our work, then share our channel and join please.
(β€οΈ)
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
How to Check Dependencies of a Package in Ubuntu Linux
https://itsfoss.com/check-dependencies-package-ubuntu/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
https://itsfoss.com/check-dependencies-package-ubuntu/
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
It's FOSS
Check Dependencies of a Package in Ubuntu & Debian
The apt package manager provides different means of checking dependencies and reverse dependencies of the packages.
#course
Complete Cyber Security Masterclass: Beginner to Advance
Description π : Learn Cyber Security like a professional hacker! Start as a beginner and go all the way to launching cyber attacks.
Course Category π° : IT & Software
Course Length π : 3 hours
Enroll Now π :
https://www.udemy.com/course/complete-cyber-security-masterclass-beginner-to-advance/?source=coursemania.xyz&couponCode=JUNAAR
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Complete Cyber Security Masterclass: Beginner to Advance
Description π : Learn Cyber Security like a professional hacker! Start as a beginner and go all the way to launching cyber attacks.
Course Category π° : IT & Software
Course Length π : 3 hours
Enroll Now π :
https://www.udemy.com/course/complete-cyber-security-masterclass-beginner-to-advance/?source=coursemania.xyz&couponCode=JUNAAR
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#technews
#neuralink
π₯΅ Elon Musk has stated that Neuralink will demonstrate a working βdevice,β that is - a brain machine interface, at 6PM ET on Friday (today).
Set the reminder for this iconic event here.
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
#neuralink
π₯΅ Elon Musk has stated that Neuralink will demonstrate a working βdevice,β that is - a brain machine interface, at 6PM ET on Friday (today).
Set the reminder for this iconic event here.
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
AI Cybersecurity: A New Protection for Imaging Devices Diagnostic Imaging
https://www.diagnosticimaging.com/view/ai-cybersecurity-a-new-protection-for-imaging-devices
@geekcode
https://www.diagnosticimaging.com/view/ai-cybersecurity-a-new-protection-for-imaging-devices
@geekcode
Diagnostic Imaging
AI Cybersecurity: A New Protection for Imaging Devices
The dual-layer platform can identify malicious instructions from a host computer.
π°How to Access DarkWeb or DeepWeb π°
βΌοΈSteps
βοΈThere are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.
βοΈ If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)
βοΈIf you're using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it's not safe.
#share & #supportus
@geekcode
βΌοΈSteps
βοΈThere are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers.
βοΈ If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL suggests that it's similar to the clear-net websites. However, internally, the way they work is nothing similar to the clear-net. Precisely, .onion is not part of the internet's DNS root, and hence, normal DNS servers can't resolve your request if you type the URL of a .onion website on your browser. TOR redirects these requests through it's own servers, similar to the way proxies work, and then we get to the website, without the involvement of DNS servers anywhere. This ensures that search engine bots can't browse around the deep web, and that anonymity is maintained, both of the client looking at the web pages, as well as the server serving the web pages (In other words, the server doesn't know who the client is, and the client doesn't know anything about where the server is.)
βοΈIf you're using Windows, you can download the Tor executable on web..versions for linux and mac available also you can use in your android device but it's not safe.
#share & #supportus
@geekcode
GeekCode pinned Β«π°How to Access DarkWeb or DeepWeb π° βΌοΈSteps βοΈThere are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to accessβ¦Β»
π° CCSA R80 Checkpoint Cbt Nuggets π°
Download link:-
https://drive.google.com/folderview?id=10WG7Kzz-vdN5j8iRQBgU7EFrFlYqSb0a
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Download link:-
https://drive.google.com/folderview?id=10WG7Kzz-vdN5j8iRQBgU7EFrFlYqSb0a
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
π°5 Basic Tools For Password Crackingπ°
ββββββββββββββββββββββββββββββ
#1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform.
#2 NCrack :- Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation.
#3 Hydra :- Hydra is a parallelized password cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.
#4 Medusa :- Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.
#5 Aircrack-ng : Aircrack-ng is a Free and a Very Common Tool Used for Cracking Password of WPA,WPA2 Hashesh. It is Mainly Used For Wireless Pen Testing. By Using Aircrack-ng You Can Crack Passwords Via Brute Force or Wordlist Based Attack.
#share & #supportus
π @geekcode π
Don't forget to join us π
ββββββββββββββββββββββββββββββ
#1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform.
#2 NCrack :- Crack is a Unix password cracking program designed to allow system administrators to locate users who may have weak passwords vulnerable to a dictionary attack. Crack was the first standalone password cracker for Unix systems and the first to introduce programmable dictionary generation.
#3 Hydra :- Hydra is a parallelized password cracker which supports numerous protocols to attack. It is very fast and flexible, and new modules are easy to add. This tool makes it possible for researchers and security consultants to show how easy it would be to gain unauthorized access to a system remotely.
#4 Medusa :- Medusa is a speedy, massively parallel, modular, login brute-forcer for network services created by the geeks at Foofus.net. It currently has modules for the following services: CVS, FTP, HTTP, IMAP, MS-SQL, MySQL, NCP (NetWare), PcAnywhere, POP3, PostgreSQL, rexec, rlogin, rsh, SMB, SMTP (VRFY), SNMP, SSHv2, SVN, Telnet, VmAuthd, VNC, and a generic wrapper module.
#5 Aircrack-ng : Aircrack-ng is a Free and a Very Common Tool Used for Cracking Password of WPA,WPA2 Hashesh. It is Mainly Used For Wireless Pen Testing. By Using Aircrack-ng You Can Crack Passwords Via Brute Force or Wordlist Based Attack.
#share & #supportus
π @geekcode π
Don't forget to join us π
Linux for Absolute Beginners!
Get started with Linux, app development, server configuration, networking, and become a system administrator!
https://www.udemy.com/course/linux-system-admin/?Join-@UdemyFree4You&couponCode=FREEAUG
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
Get started with Linux, app development, server configuration, networking, and become a system administrator!
https://www.udemy.com/course/linux-system-admin/?Join-@UdemyFree4You&couponCode=FREEAUG
#share & #supportus
π @geekcode π
Don't forget to join us ππ»
GeekCode pinned Β«π°5 Basic Tools For Password Crackingπ° ββββββββββββββββββββββββββββββ #1 John The Ripper :- John the Ripper is a free password cracking software tool. Originally developed for the Unix operating system, it can run on fifteen different platform. #2 NCrackβ¦Β»