cybersecurity404 | Unsorted

Telegram-канал cybersecurity404 - 🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

2125

We Are 𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 fans!

Subscribe to a channel

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Here you go with the C code😏😝

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

වට්සැප් unbanned කරන්න දන්න අය ඉන්නවද?😢

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

System Monitoring and Maintenance: Explore tools and techniques for monitoring system performance, managing processes, and troubleshooting common issues in Linux. Learn about log files, system resource monitoring, and package updates.

System monitoring and maintenance are essential tasks for keeping a Linux system running smoothly. Here are some tools and techniques to help you monitor system performance, manage processes, and troubleshoot common issues in Linux:

1. Resource Monitoring:
- top: The top command displays real-time information about system resource usage, including CPU, memory, and processes. It allows you to monitor and manage running processes.
- htop: Similar to top, htop provides an interactive and enhanced view of system resources and processes, with options for sorting, searching, and filtering.
- vmstat: The vmstat command reports virtual memory statistics, providing insights into system memory, swap, and CPU usage.

2. Log Files:
- /var/log: Linux systems store log files in the /var/log directory. Common log files include /var/log/syslog, /var/log/messages, and /var/log/auth.log. Monitoring log files helps identify errors, warnings, and system events.
- tail: The tail command allows you to view the last few lines of a log file, providing a real-time update of log activity. For example, tail -f /var/log/syslog continuously displays new log entries as they are added.

3. Process Management:
- ps: The ps command displays information about running processes, including their process IDs (PIDs), resource usage, and parent-child relationships. For example, ps aux lists all running processes.
- kill: The kill command terminates a process using its PID. For example, kill PID terminates the process with the specified PID. The killall command allows you to kill processes by name.

4. Package Updates:
- Package Managers: Use the package management tools discussed earlier (APT or YUM) to update software packages. For example, sudo apt update && sudo apt upgrade updates all packages on an Ubuntu system.
- Unattended Upgrades: Configure the system to automatically install security updates using tools like unattended-upgrades (Debian-based) or yum-cron (Red Hat-based). This ensures that critical security patches are applied automatically.

5. Performance Monitoring Tools:
- sar: The sar command collects and reports system performance data, including CPU, memory, disk I/O, and network usage. It helps identify performance bottlenecks and historical trends.
- iostat: The iostat command provides input/output statistics for devices and partitions, helping identify disk I/O performance issues.
- nmon: The nmon command provides a comprehensive view of system resources, including CPU, memory, disk, network, and file system utilization. It displays real-time and historical data in a user-friendly format.

Regularly monitoring system performance, managing processes, and staying up to date with package updates are essential for maintaining a stable and secure Linux system. Explore additional monitoring tools and techniques based on your specific requirements and system setup.

Remember to consult the relevant man pages, distribution documentation, or online resources for detailed usage instructions and options specific to the tools mentioned above.

©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Shell Scripting: Get started with shell scripting using bash (Bourne Again Shell) or another shell. Learn how to write simple scripts to automate tasks and perform repetitive actions.


Shell scripting is a powerful way to automate tasks and perform repetitive actions in Linux. The Bash shell (Bourne Again Shell) is one of the most common shells used in Linux systems. Here are some basics to help you get started with shell scripting:

1. Script Creation:
- Choose a text editor: Use a text editor such as nano, vim, or gedit to create and edit your shell scripts. For example, nano script.sh.
- Set the script's interpreter: Begin your script with a shebang line that specifies the interpreter. For Bash scripts, use #!/bin/bash.

2. Variables:
- Variable assignment: Assign values to variables using the syntax variable_name=value. For example, name="John".
- Variable usage: Access variable values using the $ prefix. For example, echo "Hello, $name!".

3. Comments:
- Add comments: Use the # symbol to add comments in your script. Comments are ignored by the interpreter but provide explanations for human readers.

4. Command Execution:
- Run commands: Execute commands within your script using backticks (\`) or the $() syntax. For example, output=`ls -l" or output=$(ls -l).

5. Control Structures:
- If statements: Use conditional statements (if, elif, else) to perform different actions based on specific conditions. For example:

bash
if [ $age -ge 18 ]; then
echo "You are an adult."
else
echo "You are a minor."
fi


- Loops: Utilize loops (for, while) to repeat actions. For example:
bash
for i in 1 2 3; do
echo $i
done


6. Input and Output:
- Read user input: Use the read command to accept user input and assign it to variables. For example, read -p "Enter your name: " name.
- Print output: Use the echo command to display output on the terminal. For example, echo "Hello, World!".

7. File Operations:
- Read and write files: Use commands like cat, grep, sed, and awk to read and manipulate files within your script.

8. Running Scripts:
- Make the script executable: Use the chmod command to make your script executable. For example, chmod +x script.sh.
- Execute the script: Run the script using ./script.sh or bash script.sh.

Remember to test and validate your scripts before using them on important tasks. Start with simple scripts and gradually build complexity as you gain more experience with shell scripting. Refer to shell scripting guides, tutorials, and documentation for more in-depth knowledge.

Shell scripting is a vast topic, and exploring additional concepts like functions, error handling, and regular expressions will expand your scripting capabilities. Practice, experiment, and leverage online resources to enhance your shell scripting skills.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hora Pusa High Speed V2ray Available For sale . (Digital Ocean Server)

Price :- 200LKR/month
Payment :- Ez Cash , Bank Transfer
contact me @hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Web site එකක් තියෙනවා ඒකෙ input එකක් ඉල්ලනවා ඒක පුරවලා generate එබුවහම photos දෙකක් එනවා, මට ඒ දෙක download කරගන්න ඕනි. (web scrapping)

මේ ටික automate කරගන්න පුලුවම් කෙනෙක් ඉන්නවනම් කියන්න.

contact me @hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

User and group management in Linux is crucial for controlling access, ensuring security, and managing resources effectively. Here are some key concepts and commands related to user and group management:

1. User Accounts:
• Creating a user account: Use the `useradd` or `adduser` command to create a new user account. For example, `sudo useradd username`.
• Modifying user account details: The `usermod` command allows you to modify user account details such as the username, home directory, or default shell. For example, `sudo usermod -d /newhome username`.
• Deleting a user account: To remove a user account, use the `userdel` command. For example, `sudo userdel username`.

2. User Groups:
• Creating a group: Use the `groupadd` command to create a new group. For example, `sudo groupadd groupname`.
• Modifying group details: The `groupmod` command allows you to modify group details such as the group name. For example, `sudo groupmod -n newgroupname oldgroupname`.
• Deleting a group: To remove a group, use the `groupdel` command. For example, `sudo groupdel groupname`.

3. User Permissions and Ownership:
• File ownership: Use the `chown` command to change the ownership of a file or directory. For example, `sudo chown username:groupname file.txt` changes the ownership to a specific user and group.
• File permissions: The `chmod` command is used to modify file permissions. You can assign read (r), write (w), and execute (x) permissions for the owner, group, and others. For example, `chmod u+rw file.txt` grants read and write permissions to the owner.

4. Access Control:
• The `sudo` command: Allows authorized users to execute commands with administrative privileges.
• File permissions: Linux uses a permission system with three levels: user (owner), group, and others. You can set permissions using numeric mode (e.g., `chmod 644 file.txt`) or symbolic mode (e.g., `chmod u=rw,g=r,o=r file.txt`).

It's important to note that managing users and groups often requires administrative privileges, so prefixing commands with `sudo` is common.

Understanding user permissions and access control is essential for maintaining the security and integrity of your system. Regularly reviewing and managing user accounts, groups, and file permissions helps ensure that access is granted appropriately and sensitive data is protected.

It's recommended to consult the Linux distribution's documentation or specific man pages (e.g., `man useradd`, `man chown`) for detailed information on the commands and options available on your system.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

👉 Want a tiny PC that won't break the bank? 💸
👉 Grab an Android TV box and make it run Ubuntu! 📺
👉 Voila! You have a mini computer for just 40 bucks! 💻

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

*සම්පූර්නයෙන් නොමිලේ... සූදානමින් සිටින්න.. යාලුවන්ට ahare කරල එකතු වෙන්න.. අලුත්ම වැඩක්.. අලුත්ම වෙනසක්.. ගම්පහ හොදම ගුරුවරු ටික ඔබේ exam එකට දෙන අලුත්ම help එක...*
පහත link එකෙන් අද 8.00ට set වෙන්න....

Join Zoom Meeting
https://zoom.us/j/94901170533?pwd=NGRyOVNYVkozVUlPbWVzS1N0K05TZz09

Meeting ID: 949 0117 0533
Passcode: 1835099

17 බදාදා රාත්‍රී 8.00ට :- ET-SFT-ICT Introduction + ET(paper discussion - සමාංශක චිත්‍ර)

▶️ දෙවන දිනය සහ සැලැස්ම අද කියනව.
ET , SFT & ICT Paper Discussion

කොත්තුවක් වගේ රහට

⬇️⬇️⬇️⬇️⬇️⬇️⬇️ සෙට් වෙන්න whatapp එකට පේපර්ස් ලින්ක් ඔක්කොම දාන්නේ ඒකට

https://chat.whatsapp.com/FIwdfur9Q810ECYMDmdOpO

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Command-Line Interface (CLI): Gain an understanding of the Linux command-line interface and how to use essential commands like cd, ls, mkdir, cp, mv, rm, and grep. Learn about command syntax, options, and arguments.

The Command-Line Interface (CLI) in Linux provides a text-based way to interact with the operating system. It allows you to execute commands, manage files and directories, configure system settings, and perform various tasks. Here are some essential commands and concepts to understand in the Linux CLI:

1. cd: Change Directory
Usage: cd [directory]
Example: cd /home/user
Description: Used to change the current working directory.

2. ls: List Files and Directories
Usage: ls [options] [path]
Example: ls -l /home
Description: Lists files and directories in the specified path.

3. mkdir: Make Directory
Usage: mkdir [options] directory_name
Example: mkdir new_directory
Description: Creates a new directory with the specified name.

4. cp: Copy Files and Directories
Usage: cp [options] source_file destination
Example: cp file.txt /home/user
Description: Copies files and directories from the source to the destination.

5. mv: Move/Rename Files and Directories
Usage: mv [options] source destination
Example: mv file.txt /home/user
Description: Moves or renames files and directories.

6. rm: Remove Files and Directories
Usage: rm [options] file
Example: rm file.txt
Description: Deletes files and directories.
Caution: Be careful when using rm as it permanently deletes files without confirmation.

7. grep: Search Text within Files
Usage: grep [options] pattern [file]
Example: grep "keyword" file.txt
Description: Searches for a specific pattern or keyword within a file or multiple files.

Understanding the syntax, options, and arguments of commands is crucial. Here are some common elements:

• Options: Often preceded by a dash (-), options modify the behavior of commands. They provide additional functionalities or change how a command operates. For example, -l in ls -l shows detailed file information.

• Arguments: These are the parameters passed to a command. They can be file or directory names, text strings, or other values required by the command. For example, in cp file.txt /home/user, file.txt is the source and /home/user is the destination.

• Wildcards: Special characters such as * and ? can be used as wildcards in commands to represent multiple characters or any single character, respectively. For example, ls *.txt lists all files with a .txt extension.

• Command Help: To get detailed information about a command, you can use the --help option or refer to the command's manual page. For example, ls --help provides information about the ls command.

Remember to use commands with caution, especially when dealing with system-critical files and directories. Always double-check your commands before execution, as they can have significant consequences.

Practicing and exploring these essential commands will help you navigate and accomplish various tasks in the Linux CLI efficiently.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Linux Distributions: Learn about different Linux distributions such as Ubuntu, Fedora, Debian, and CentOS. Understand their features, target audience, and how to choose the right distribution for your needs.

Linux distributions, often referred to as distros, are different flavors of the Linux operating system that are based on the Linux kernel and bundled with various software packages. Here are some popular Linux distributions along with their features, target audience, and factors to consider when choosing the right distribution:

1. Ubuntu: Ubuntu is one of the most widely-used Linux distributions, known for its user-friendly interface and ease of installation. It offers a balance between usability and customization, making it suitable for both beginners and advanced users. Ubuntu is popular for desktop use and has a vast community and extensive software repository.

2. Fedora: Fedora is a community-driven distribution sponsored by Red Hat. It focuses on providing the latest open-source software and cutting-edge features, making it an excellent choice for developers, technophiles, and those interested in testing new technologies. Fedora also serves as a base for the enterprise-oriented Red Hat Enterprise Linux (RHEL).

3. Debian: Debian is known for its stability, reliability, and commitment to free software. It emphasizes the principles of open-source and community-driven development. Debian offers multiple editions, including the popular Debian GNU/Linux, and provides a vast collection of software packages. It is widely used in server environments and is favored by experienced Linux users.

4. CentOS: CentOS (Community Enterprise Operating System) is based on the source code of Red Hat Enterprise Linux (RHEL) and aims to provide a free, community-supported alternative. CentOS focuses on stability, security, and long-term support, making it ideal for server deployments. It is often used by organizations that require a reliable and secure Linux distribution.

When choosing a Linux distribution, consider the following factors:

• Purpose: Determine whether you need a distribution for desktop use, server deployment, or specialized tasks like ethical hacking, multimedia production, or scientific research.

• User Experience: Consider the level of technical expertise you possess and the user interface you prefer. Some distributions offer a beginner-friendly experience, while others are more suited for advanced users.

• Software Availability: Check if the distribution has a large software repository with the applications and packages you need. Additionally, consider the compatibility and availability of software for your specific use cases.

• Support and Community: Evaluate the availability of support resources such as documentation, forums, and active community involvement. A vibrant community can be valuable for troubleshooting, learning, and receiving assistance.

Ultimately, the choice of Linux distribution depends on your personal preferences, technical requirements, and the purpose for which you intend to use Linux. Experimenting with different distributions through live USBs or virtual machines can help you find the one that best suits your needs.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Ramesses Reezy Telegram Channel Available ‼️

Ramesses Reezy ගේ Fan ලා ඉන්නවනම් අනිවාරෙන් ජොයින් වෙන්න අලුත් වැඩ ටිකක් බලාගන්න පුලුවන් මේ සැරේ

Join & Subscribe Now : /channel/RamessesReezy

Post Verifyed Done ✅

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

🌿මොකක්ද මේ Polymorphic Virus එකක් කියලා කියන්නේ 🧑‍💻✍

හැඳින්වීම :

ඇත්තටම Polymorphic Virus එකක් කියලා කියන්නේ, සාමාන්‍ය Virus එකක් එහෙමත් නැත්තම් Malware එකකට වඩා ගොඩක් වෙනස් වෙනස් විශේෂයක්.

ඉතින් මේකේ තියෙනේ විශේෂත්වය තමයි, මේ Malware Source Code එකේ අන්තර්ගතය හැමතිස්සෙම එයාටම ආවේණික විදියට එයා විසින්ම වෙනස් කරගන්න එක

දැන් ඔයාලා බලනවා ඇති මේකේ තියෙන බලපෑම් මොකක්ද කියලා. Anitivirus Software ගැන ඔයාලා දන්නවනේ ඉතින් ඒවායේන් Malware, Virus , Trojan වගේ දේවල් Detected කරගන්නේ, ඒ ඒ Virus,Trojan වලටම අනන්‍ය වෙච්ච Codes පාවිච්චි වෙන නිසා. එතකොට Antivirus එකෙන් Automatically අර පුරුදු Codes වලට එරෙහිව ක්‍රියාත්මක වෙනවා ඒවා හඳුනගෙන.

ඉතින් දැන් පේනවනේ සැරින් සැරේ වෙනස් වෙන Code එකක් තිබ්බොත් Antivirus වලට මොකවද වෙන්නේ කියලා. එයාලට හරියටම Detected කරගන්න බැරි වෙනවා මේ මොකක්ද කියලා...

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Fix Python Code Bugs With wolverine!

python code වල bugs fix කරන
එක කියන්නෙ developers ලට කම්මැලිම දෙයක්නෙ.
ඔන්න ඒකට අලුතින් පොඩි tool එකක් ඇවිත් තියෙනවා wolverine කියලා🙃

මේක chatgpt එක්ක තමා වැඩ කරන්නෙ .
ඔයාලත් උත්සාහ කරලා බලන්න.

GitHub Repo Link : https://github.com/biobootloader/wolverine

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hora Pusa AI beta version .

The bot is updated with the latest information .😱
No registration Required 🙊
check out 🫡
👇👇👇
@hora_pusa_ai

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Temperature conversation programme in C 😜.

Wanna try this😝

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Security: Gain awareness of essential Linux security practices, including user management, permissions, firewalls, and system updates. Understand the importance of keeping your Linux system secure.

Linux security practices are vital for protecting your system from unauthorized access, vulnerabilities, and potential threats. Here are some essential Linux security practices to help you maintain a secure environment:

1. User Management:
- Use strong passwords: Encourage users to use complex passwords that include a combination of uppercase and lowercase letters, numbers, and special characters. Consider implementing password policies or tools to enforce password strength.
- Limit user privileges: Assign users the minimum necessary privileges to perform their tasks. Regularly review and revoke unnecessary privileges.
- Disable or remove unused accounts: Remove or disable any user accounts that are no longer needed to reduce the potential attack surface.
- Implement multi-factor authentication (MFA): Enable MFA for user authentication, which adds an extra layer of security by requiring additional verification beyond a password.

2. File Permissions and Ownership:
- Set appropriate file permissions: Configure file and directory permissions to restrict access based on the principle of least privilege. Use chmod to set permissions (e.g., read, write, execute) for the owner, group, and others.
- Manage file ownership: Ensure that files and directories are owned by the appropriate users and groups using the chown command. Restrict access to sensitive files by limiting ownership and permissions.

3. Firewall Configuration:
- Configure a firewall: Use tools like iptables or firewalld to set up a firewall and define rules that control inbound and outbound network traffic. Restrict access to necessary services and ports, and regularly review and update firewall rules.

4. Regular System Updates:
- Keep the system up to date: Install security patches and updates regularly to address vulnerabilities and bugs. Use the package manager (apt, yum, etc.) to update the system and its installed packages.

5. Security Auditing and Monitoring:
- Monitor system logs: Regularly review system logs located in /var/log for any suspicious activities or error messages that could indicate security breaches or issues.
- Implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) to monitor and alert you of potential security threats.
- Use security auditing tools like lynis or OpenSCAP to scan the system for vulnerabilities and compliance with security best practices.

6. Security Awareness:
- Educate users: Promote security awareness among users and provide training on best practices such as avoiding phishing emails, practicing safe browsing habits, and being cautious with file downloads.
- Stay informed: Keep up to date with Linux security news, vulnerabilities, and security advisories relevant to your distribution. Subscribe to security mailing lists or follow reputable sources for timely information.

Maintaining a secure Linux system requires ongoing effort and vigilance. Regularly review and update security practices to adapt to evolving threats and new vulnerabilities. Consult official documentation, security resources, and community forums to stay informed about the latest security recommendations for your specific Linux distribution.

©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Networking: Understand basic networking concepts in Linux, including IP addressing, network configuration, and troubleshooting network connectivity issues. Learn how to use tools like ifconfig, ping, and netstat.


Networking is a fundamental aspect of Linux system administration. Understanding basic networking concepts and utilizing essential tools can help you configure and troubleshoot network connectivity. Here are some key networking topics and tools in Linux:

1. IP Addressing:
- IP address: An IP address uniquely identifies a device on a network. Learn about IPv4 and IPv6 addressing schemes and how to assign static or dynamic IP addresses to your Linux system.
- Subnetting: Understand subnetting to divide a network into smaller subnetworks.

2. Network Configuration:
- ifconfig: The ifconfig command displays and configures network interfaces, including assigning IP addresses, enabling or disabling interfaces, and modifying network settings.
- ip command: In recent Linux distributions, the ip command is replacing ifconfig. It provides more advanced functionalities for managing network interfaces, routing, and other network-related tasks.

3. Network Connectivity:
- ping: The ping command is used to check network connectivity between your Linux system and another device by sending ICMP echo request packets.
- traceroute: The traceroute command traces the path packets take from your system to a destination host, showing the IP addresses and response times of intermediate hops.
- netstat: The netstat command displays active network connections, listening ports, routing tables, and various network statistics.

4. DNS (Domain Name System):
- DNS resolution: Understand how DNS works and how Linux systems resolve domain names to IP addresses. Learn how to configure DNS servers and troubleshoot DNS-related issues.
- nslookup and dig: The nslookup and dig commands are used to query DNS servers and retrieve information about domain names, IP addresses, and DNS records.

5. Firewall and Security:
- iptables: The iptables command is a powerful tool for configuring firewall rules to filter network traffic, control access, and enhance system security.
- firewalld: In modern Linux distributions, firewalld is often used as a frontend for managing firewall rules. It provides a more user-friendly and dynamic interface.

6. Network File Sharing:
- NFS (Network File System): Learn how to configure NFS to share files and directories across a network.
- Samba: Explore Samba to enable file and printer sharing between Linux and Windows systems.

7. Network Troubleshooting:
- tcpdump: The tcpdump command captures and analyzes network packets, helping diagnose network issues and investigate network traffic.
- Wireshark: Wireshark is a graphical packet analyzer that allows you to capture, inspect, and analyze network packets in real-time.

Mastering networking concepts and tools takes practice and hands-on experience. Additionally, online resources, Linux networking tutorials, and forums dedicated to networking topics can provide further guidance and practical examples to deepen your understanding of Linux networking.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hora Pusa Free VPN bot.

Free internet යන්න කැමති අයට මම ගානෙ 😌.

👇👇
@horapusa_vpn_bot

contact me @hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

*_OL වලින් පස්සේ මොකද වෙන්නෙ...?_*

OL නම් ඉවරයි.
කරන්නම් වාලේ යාලුවෝ පස්සෙ ගිහින් AL ඇනගන්න කලින් නිවරදි මග පෙන්වීමකින් යුතුව
විශය ධාරවන් තෝරාගැනීම

මෙහිදී, විද්‍යා,ගණිත,කලා,වානිජ හා තාක්ෂණය යන සියලූම විෂය දාරාවන් සහ ඒවයේ ඇති සෙසු විශයන් ගැන දැන දැනුවත් කිරීම.

වැඩිම ‍‍‍Z අගයක් ලැබෙන පරිදි විශයයන් ගැලපීම හා එම විශයයන් තෝරාගැනීමෙන් ඔබට යා හැකි විශ්වවිද්‍යාලයයන් පිලිබද දැනුවත් කරීම

*9 සිකුරාදා රාත්‍රී 9.00 ට*


*මේ සදහා සහබාගී වීමට කැමති සිසුන් පහත whatsapp group එකට add වෙන්න*

https://chat.whatsapp.com/BCfkOTNInqc0vCocz84iHN

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

📢 Job Opportunities Available! 🌟

1️⃣ PHP/Laravel/ReactJS Internship:
We are currently offering internship opportunities for individuals with skills in PHP, Laravel, and ReactJS. If you're eager to learn and grow, join our dynamic team! To apply, send your CV to hr@parallax.lk.

2️⃣ Part-Time DevOps Engineer:
Are you experienced in Kubernetes, Azure, and DevOps? We have a part-time opening for a DevOps Engineer with expertise in Kubernetes and Azure. If you're interested, send your CV to thilinaad@gmail.com.

3️⃣ Java Developer Position:
Are you ready to take your Java development career to new heights? Join our team of skilled developers and embark on an exciting journey! To apply, send your resume to malini@softvilmedia.com, including your salary expectation and notice period.

4️⃣ HR Role for Freshers/Interns:
An esteemed organization in Colombo is urgently hiring freshers and school leavers for an HR role. If you're interested, call 0773583002 to learn more about this opportunity.

🏢 Databox Technologies:
Databox Technologies, a software solutions startup in Colombo, Sri Lanka, is seeking talented individuals to join their team. They currently have openings for:

Trainee/Intern Software Engineer (PHP/Laravel)
Trainee/Intern Software Engineer (Javascript/NodeJs/PHP)
Trainee/Intern QA Engineer
If you're a SLIIT graduate or a 3rd or 4th-year student, seize this chance! Review the attached company profile for more information and send your CV to vidura.adikari@databoxtech.com.

Don't miss out on these exciting opportunities! Take the first step towards your dream career today. #hiring #internship #jobopening #careerdevelopment


Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Package Management: Explore package management systems like APT (Advanced Package Tool) or YUM (Yellowdog Updater, Modified) to install, update, and remove software packages. Understand how to use package repositories and package managers to manage software on your Linux system.

Package management is a critical aspect of managing a Linux system, allowing you to install, update, and remove software packages efficiently. Two common package management systems are APT (Advanced Package Tool) and YUM (Yellowdog Updater, Modified). Here are some basic concepts to understand about package management in Linux:

1. Package Repositories: Package repositories are collections of software packages available for download and installation. Repositories can be official, maintained by the Linux distribution vendor, or third-party, maintained by individuals or organizations.

2. Package Managers: Package managers are tools used to install, update, and remove software packages on a Linux system. They are responsible for resolving dependencies and ensuring that the software is installed correctly.

3. APT (Advanced Package Tool): APT is a command-line package manager used primarily in Debian-based distributions such as Ubuntu. APT uses package repositories to download and install software packages, and it can handle dependencies and conflicts between packages.

4. YUM (Yellowdog Updater, Modified): YUM is a command-line package manager used primarily in Red Hat-based distributions such as Fedora and CentOS. YUM uses package repositories to download and install software packages, and it can handle dependencies and conflicts between packages.

Here are some basic commands for using APT and YUM:

APT commands:

'sudo apt update': Updates the local package repository database to ensure that the latest packages are available.

'sudo apt install package': Installs the specified package and its dependencies.

'sudo apt upgrade': Upgrades all installed packages to the latest versions.

'sudo apt remove package': Removes the specified package and its dependencies.

'sudo apt search keyword': Searches the package repository for packages that match the specified keyword.

YUM commands:

'sudo yum update': Updates all installed packages to the latest versions.

'sudo yum install package': Installs the specified package and its dependencies.

'sudo yum upgrade': Upgrades all installed packages to the latest versions.

'sudo yum remove package': Removes the specified package and its dependencies.

'sudo yum search keyword': Searches the package repository for packages that match the specified keyword.

It's essential to use package managers with caution and ensure that you download packages from trusted repositories to avoid security risks. Also, remember to update your system regularly to ensure that you have the latest security patches and bug fixes.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Chat GPT - 4 ගන්න බැරුව අනාත උනාද?

එහෙනම් Chat GPT-4 with Internet Access තියෙන bot කෙනෙක් මම ගානෙ 😌.
100% Free.
Group එකට දන්න හැමෝවම ඇඩ් කරන්න.

👇👇👇
/channel/hora_pusa_ai

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Digitalocean Free Trail Account එකක් තියෙන කෙනෙක් ඉන්නවනම් inbox එන්න.
@hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Linux File System: Familiarize yourself with the Linux file system hierarchy, including directories like /home, /etc, /var, and /bin. Learn how to navigate the file system and work with files and directories.

Familiarizing yourself with the Linux file system hierarchy is essential for navigating and working with files and directories. Here are some key directories in the Linux file system:

1. /: The root directory is the top-level directory in the file system hierarchy. All other directories and files are located beneath it.

2. /bin: This directory contains essential binary executable files (commands) that are available to all users. Common commands such as ls (list files), cp (copy files), and mkdir (create directories) are stored here.

3. /etc: System configuration files are stored in this directory. It contains various configuration files for system services, network settings, user accounts, and more.

4. /home: Each user on the system has their own directory within the /home directory. User-specific files and personal settings are typically stored here.

5. /var: This directory contains variable data files, such as logs, spool files, and temporary files generated by system services and applications.

6. /usr: This directory is used for installing user-accessible programs and resources. It includes subdirectories like /usr/bin (user binaries), /usr/lib (libraries), and /usr/share (shared data).

7. /tmp: The /tmp directory is used for temporary files that are typically deleted upon system reboot. It is accessible to all users and often used for temporary storage or interprocess communication.

8. /dev: This directory contains device files representing hardware devices, such as hard drives, USB devices, and terminals. These files allow communication with and control of the hardware.

9. /proc: This directory provides an interface to system and process information. It contains virtual files that allow access to system status, process details, and configuration.

To navigate the file system, you can use the following commands in the command-line interface (CLI):

• pwd: Displays the current working directory.
• cd: Changes the current directory.
• ls: Lists the contents of a directory.
• mkdir: Creates a new directory.
• rm: Removes files and directories.
• mv: Moves or renames files and directories.
• cp: Copies files and directories.

For example, to navigate to the /home directory and list its contents, you can use the following commands:

bash

cd /home
ls

Learning these commands and understanding the file system hierarchy will enable you to navigate, manage, and work with files and directories effectively in Linux.


©GameSploit
#gamesploit

Channel :- /channel/linux444
Group :- /channel/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

hp-v2 V1.4 Released

New Features
- User expire date with automatic expire.
- User bandwith cap feature.
- Server controlled via telegram bot

👇👇👇

https://github.com/horapusa-lk/hp-v2

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

ඉතින් මේ Article  එක ලියන්න මූලිකම හේතුව උනේ මම දැකපු තවත් Article එකක්..

ඉතින් ඒ Article එක ලියලා තිබ්බේ ChatGPT පාවිච්චි කරලා මේ වගේ Self Code එක වෙනස් කරගන්න පුලුවන් Keylogger එකක් ගැන.

මෙතනින් එහාට ඒ Article එකම ඔයාලට කියවන්න මම දාන්නම්.

" අහල තියනවද black mamba ගැන?

සමහර විට මේ වෙනකොට වෙන කොට ඔයාලා එක black mamba කෙනෙක් ගැන අහල ඇති. ඒ උග්‍ර විෂ තියෙන සර්ප විශේෂයක්.

හැබැයි අද මම කතා කරන්න බලාපොරොත්තු වෙන්නේ බ්ලැක් මම්බා කියන සර්පයා ගැන නම් නෙවෙයි. මම කතා කරන්නෙ මුල්ම වරට කෘතීම බුද්ධියක් එක්ක එකතු වෙලා හදපු පරිඝනක වෛරසය ගැන.

HAYS ආයතනයේ ජෙෆ් සිම්ස් කියන පරිගණක ආරක්ෂන විශේෂඥයා ChatGPT උදව් කරගෙන මුල්ම වතාවට තමන්ගේ හැඩය වෙනස් කර ගන්න පුළුවන් විදියට, එහෙමත් නැතිනම් තමන් විසින් ම තමන්ව ප්‍රතිනිර්මාණය කර ගන්න පුළුවන් විදියට පරිගණක වැඩසටහනක් හදනවා (ඇත්තෙන්ම මේක කී ලොගර් එකක්; ඒ කියන්නෙ ටයිප් කරන දේවල් එකතු කරලා ප්‍රහාරකයාට ලබාදෙන වර්ගයේ මෘදුකාංගයක්.) අන්න ඒ වැඩසටහන පරිගණක ආරක්ෂණ ක්ෂේත්රයේ ලොකු බලපෑමක් මේ වෙනකොට ඇති කරලා තියෙනවා. හේතුව තමයි මේ වැඩසටහන තමන් විසින්ම තමන්ව ප්‍රතිනිර්මාණය කර ගන්න නිසා මේක අඳුර ගන්න තියෙන අපහසුතාවය.

සාමාන්‍යයෙන් මේ වගේ අනිෂ්ඨ මෘදුකාංගයක් එහෙමත් නැත්තම් මැල්වෙයාර් එකක් හඳුනාගන්නේ පරිගණකයේ තියෙන antivirus මෘදුකාංගය හරහා. නමුත් බොහෝ වෙලාවට ආයතන වල මේ සඳහා EDR හෝ XDR වර්ගයේ මෘදුකාංග භාවිතා කරනවා. මේ මෘදුකාංග දෙකේ කාර්යය තමයි යම්කිසි වූ තර්ජනයක් (මැල්වෙයා එකක්) කලින් හඳුනා ගතහොත් ඒ සඳහා වන ප්‍රතික්‍රියා මාර්ග automatically තනියම ගන්න තියෙන හැකියාව. නමුත් ඒ සඳහා "තර්ජනය කලින් හඳුනාගැනීම" අවශ්‍ය වෙනවා. මේ කලින් හඳුනාගැනීම සිද්ධ කරන්නේ මේ මදුකාංගවල තියෙන කේත වල ඇඟිලි සලකුණ එහෙමත් නැත්නම් ඒ කේත වල වර්ගීකරණයෙන් වගේ කියලා අපට සරළවම හඳුන්වන්න පුළුවන්. නමුත් නිතරම සිය හැඩය වෙනස් කරගන්න මේ වගේ කෘතිම බුද්ධිය භාවිතා කරන වැඩසටහන් මේ ක්‍රමවේදය හරහා හඳුනාගන්න එක කරන්න බැහැ.

ඒ වැඩේ වෙන්නෙ මෙහෙමයි. මේ වැඩසටහන ක්‍රියාත්මක වෙන හැම වෙලාවකම වැඩසටහන කරන්නේ ChatGPT හරහා අලුත්ම කේත ප්‍රමාණයක් ලබාගන්න එක. ඊට පස්සේ ලබා ගත්ත කේතය හරහා මේ වැඩසටහන නැවත වතාවක් තමන් විසින්ම තමන්ව ප්‍රතිනිර්මාණය කර ගන්නවා, ඒ කියන්නේ කියන්නෙ තමන්ගෙ තියෙන අනිෂ්ට ක්‍රියාමාර්ග සේරම අලුත් කේතයට අනුගත කරනවා. ඒක හරියටම ටර්මිනේටර් චිත්‍රපට මාලාවේ එන T1000 රොබෝව වගේ. එතකොට මේ වැඩසටහනට නිශ්චිත හැඩයක් නෑ.

අන්න ඒ නිසා මේ වෙනකොට පරිගණක ආරක්ෂක ක්ෂේත්‍රයේ මේ ගැන ලොකු කතාබහක් අලුතෙන්ම නිර්මාණය වෙලා තියෙනවා. සාම්ප්‍රදායික පද්ධති ආරක්ෂක ක්‍රමවේද මේ වගේ අලුත් අභියෝගයක් හමුවේ සෑහෙන දුරකට අඩපන වූ නිසාම මේ වසර ඇතුලේ ඒ ක්‍රමවේද වල ලොකු වෙනස්කම් වෙයි කියලා ඒ නිසා අපි බලාපොරොත්තු වෙනවා. බොහෝවිටම ඒවාගේ හඳුනාගැනීම් ක්‍රමවේද කෘතිම බුද්ධිය හා සහසම්බන්ධව මේ කාර්‍යය ඉෂ්ඨ කරාවිය කියන එකත්, ChatGPT වගේ කෘතීම බුද්ධියක් මුදාහරිනකොට එහි ක්‍රියාකාරකම් පාලනයත් මේ වසරේ අවධානයට යොමුවෙන කරුණු අතර තිබෙනු ඇතැයි අපි සිතනවා."


References

📍https://www.hyas.com/blog/blackmamba-using-ai-to-generate-polymorphic-malware

.
.
.

🌙🌿 Please react & comment to post "/


Writen By :
@Kap_Official

==================================


Join our channel ✅ :
@hack_kap0
Our community ✅ :
@Hack_Kap


Happy Hacking 🥷🏻

Copyright  Ⓒ 2023
𝐇𝐀𝐂𝐊|𝐊𝐀𝐏

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

පරන Github account එකක් (මාසයක් වත් පරන වෙන්න ඕනි) දෙන කෙනෙක්ට free domain එකක් දෙනවා.
sub domain කෑලි නෙමේ full domain එකම දෙනවා ඔයාලගෙ cloudfare එකට ඇඩ් කරගන්න.

contact me @hora_pusa

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

HEROKU ACCOUNT FOR SALE

🎯JUST 5 TRX😍

🎯PAYMENTS - TRX / BTC / LTC / TON / USDT✅

Dm @accgivenbot

Читать полностью…

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

Hora Pusa Aurudu Special Vless ws V2ray Server 2TB

vless://4cbbba2d-dfae-46cd-aa54-929d5b6ca117@aurudu-special.horapusa.me:443?path=%2F&security=tls&encryption=none&type=ws&sni=your.package.sni#HoraPusa-Aurudu-Special-2TB

Powered by Digitalocean

Читать полностью…
Subscribe to a channel