Forwarded from UNDERCODE DEV
⚫️TensorFlow program structure (in-depth analysis):
#TensorFlow
https://dev.undercode.help/tensorflow-program-structure-in-depth-analysis/
#TensorFlow
https://dev.undercode.help/tensorflow-program-structure-in-depth-analysis/
🦑What can the backdoor of the website left by the hacker do?
#Backdoor
https://undercode.help/what-can-the-backdoor-of-the-website-left-by-the-hacker-do/
#Backdoor
https://undercode.help/what-can-the-backdoor-of-the-website-left-by-the-hacker-do/
Undercode expects to launch its first space probe in September 2025
HACKERS ONLY:
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Now it's Free Limited, Official Cisco Intrusion Detection & Prevention course:
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
LinkedIn
What you should know - Cisco Routers Video Tutorial | LinkedIn Learning, formerly Lynda.com
Join Lisa Bock for an in-depth discussion in this video, What you should know, part of Cisco Network Security: Intrusion Detection and Prevention.
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
https://youtu.be/Y49CmATRggg
https://youtu.be/Y49CmATRggg
YouTube
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
These AI tools range from sophisticated malware creation to password cracking and much more. Explore how these darkweb AI models work, their origins, and what their rise means for the future of cybersecurity.
AI Marketplace: https://taimine.com/
Deep Learning…
AI Marketplace: https://taimine.com/
Deep Learning…