miércoles, 6 de mayo de 2020

Deepin Or UbuntuDDE

I'm sure nowadays many Deepin users are thinking in changing to UbuntuDDE, so let's explain some differences between both Linux distros.




1. Community

At least in the main telegram channel Deepin has more than 2.000 users, but UbuntuDDE is new in beta version and have about 500 users.

    2. Boot

Despite de booting sound is the same in both distros, Deepin's animation is nicer than ubuntu's which uses a too bright background.


 



    3. Default memory and CPU usage

The CPU usage is similar, but Deepin by default is using more processes, more network connections and more drivers than UbuntuDDE.






  4.  Workspaces

UbuntuDDE allows up to 7 workspaces meanwhile Deepin right now only allows 4.
Is not only more workspaces for UbuntuDDE, it's also the more eficient way to display them.





    5.  Software Versions

Deepin is based on Debian so the program versions on store and apt are old but stable, and can have problems with the old libraries installed on the system when compiling new software.

We can see below that Ubuntu's compiler version is quite new, the 9.3.0 which is quite well, but Deepin's version is 6.3.0.





Regarding the kernels, UbuntuDDE has the 5.4.0.21 and Deepin the 4.15.0-30, the libc in both systems is updated.


    6.  The store

Deepin's store is fast and polished and contain the main software, but and the UbuntuDDE












   Conclussions

Deepin is the most used of both and it's the original one, but many users are trying the UbuntuDDE (which is beta for now) because the need of using recent versions, also the 4 workspaces on Deepin is another limitation for some Linux users. Probably Deepin v20 will overcome the limitations but the main decision is between Debian as base system or ubuntu, and for more users the trend in workstations is ubuntu.


   Gallery













Continue reading
  1. Web Hacking 101
  2. Google Hacking Search
  3. What Is Growth Hacking
  4. Cosas De Hackers
  5. Hacking In Spanish
  6. Herramientas Hacking Etico
  7. Hacking Smart Tv
  8. Hacking Academy
  9. Programa De Hacking
  10. El Hacker
  11. Hacking Growth Pdf

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related word


martes, 5 de mayo de 2020

Bloquear Teclado Y Mouse En Windows

Bloquear el teclado y el mouse en Windows hoy en día ya no es un lió, y aunque existen varios métodos para dicho procedimiento queremos presentar un software muy seguro capaz de bloquear en segundos todas las funciones de estos periféricos. No queremos profundizar en las funciones que están alojadas en el sistema de Windows para evitar vueltas innecesarias, simplemente utilizaremos un software que después de estar instalado podemos desactivar y activar de manera rápida.
Creemos que muchos de ustedes que están dando lectura a este bloc ya conocen de manera lógica los procedimientos a utilizar para que funcione a la perfección este complemento, o simplemente perciben otra fórmula sin necesidad de instalar programas, pero si realizamos alguna encuesta sabemos que un 70% de nuestros seguidores desconocen de lleno la existencia de poder bloquear teclado y ratón (mouse) de nuestro ordenador.
https://www.dominatupc.com.co/
Sin más que decir vamos a proceder con el tutorial explicando la forma de cómo se utiliza y la manera correcta de poder asegurar nuestro ordenador para que nadie lo pueda manipular cuando no estamos cerca de la pantalla.
Los pasos a seguir seria descargar e instalar "Keyboard and Mouse" el cual dejamos el enlace al final del artículo, La instalación no es necesario explicar ya que es un programa portable que no necesita conocimiento para el mismo. Cuando ejecutes el software en modo administrador vas a conocer una interfaz simple y ya configurada con una secuencia de botones que trae por defecto los cuales puede modificar a su gusto.
Es fundamental no colocar dígitos difíciles y largos, para cuando quiera desbloquear su ordenador lo haga de manera rápida y sin problemas. No es necesario poner el más (+) ya que el programa automáticamente hace el trabajo, simplemente escribe la serie que recordara de forma normal y cuando lo tengas listo presionamos el botón (Lock) o la letra (L), esperamos 5 segundos y ya todo estará inhabilitado.
Una vez ejecutado, el teclado y Mouse quedaran bloqueados sin poder usarlos como es debido. Es importante tener marcada la casilla "Show Tool Tip" para recibir información en la pantalla sobre las teclas que se deben forzar para desbloquear.
Ya todo queda a su disposición para que pruebes la funcionalidad de Keyboard, que sin duda es un programa muy simple y útil para situaciones donde queremos dejar por unos minutos nuestro ordenador expuesto a personas traviesas. No olvides compartir y seguirnos en las diferentes redes sociales, su ayuda nos hace crecer. También te puede interesar:(Cómo recuperar la clave de inicio de Windows)


Related links
  1. Hacking Simulator
  2. Nivel Basico
  3. Growth Hacking Sean Ellis
  4. Hacking Tor Whatsapp
  5. Growth Hacking Instagram
  6. Hacking With Arduino
  7. Growth Hacking Marketing
  8. Social Hacking
  9. Live Hacking
  10. Hacking Mifare
  11. Aprender Hacking Desde Cero
  12. Hacking Programs
  13. Tipos De Hacker
  14. Grey Hat Hacking
  15. Experto En Seguridad Informática

$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.
More info

lunes, 4 de mayo de 2020

Recovering Data From An Old Encrypted Time Machine Backup

Recovering data from a backup should be an easy thing to do. At least this is what you expect. Yesterday I had a problem which should have been easy to solve, but it was not. I hope this blog post can help others who face the same problem.


The problem

1. I had an encrypted Time Machine backup which was not used for months
2. This backup was not on an official Apple Time Capsule or on a USB HDD, but on a WD MyCloud NAS
3. I needed files from this backup
4. After running out of time I only had SSH access to the macOS, no GUI

The struggle

By default, Time Machine is one of the best and easiest backup solution I have seen. As long as you stick to the default use case, where you have one active backup disk, life is pink and happy. But this was not my case.

As always, I started to Google what shall I do. One of the first options recommended that I add the backup disk to Time Machine, and it will automagically show the backup snapshots from the old backup. Instead of this, it did not show the old snapshots but started to create a new backup. Panic button has been pressed, backup canceled, back to Google.


Other tutorials recommend to click on the Time Machine icon and pressing alt (Option) key, where I can choose "Browse other backup disks". But this did not list the old Time Machine backup. It did list the backup when selecting disks in Time Machine preferences, but I already tried and failed that way.


YAT (yet another tutorial) recommended to SSH into the NAS, and browse the backup disk, as it is just a simple directory where I can see all the files. But all the files inside where just a bunch of nonsense, no real directory structure.

YAT (yet another tutorial) recommended that I can just easily browse the content of the backup from the Finder by double-clicking on the sparse bundle file. After clicking on it, I can see the disk image on the left part of the Finder, attached as a new disk.
Well, this is true, but because of some bug, when you connect to the Time Capsule, you don't see the sparse bundle file. And I got inconsistent results, for the WD NAS, double-clicking on the sparse bundle did nothing. For the Time Capsule, it did work.
At this point, I had to leave the location where the backup was present, and I only had remote SSH access. You know, if you can't solve a problem, let's complicate things by restrict yourself in solutions.

Finally, I tried to check out some data forensics blogs, and besides some expensive tools, I could find the solution.

The solution

Finally, a blog post provided the real solution - hdiutil.
The best part of hdiutil is that you can provide the read-only flag to it. This can be very awesome when it comes to forensics acquisition.


To mount any NAS via SMB:
mount_smbfs afp://<username>@<NAS_IP>/<Share_for_backup> /<mountpoint>

To mount a Time Capsule share via AFP:
mount_afp afp://any_username:password@<Time_Capsule_IP>/<Share_for_backup> /<mountpoint>

And finally this command should do the job:
hdiutil attach test.sparsebundle -readonly

It is nice that you can provide read-only parameter.

If the backup was encrypted and you don't want to provide the password in a password prompt, use the following:
printf '%s' 'CorrectHorseBatteryStaple' | hdiutil attach test.sparsebundle -stdinpass -readonly

Note: if you receive the error "resource temporarily unavailable", probably another machine is backing up to the device

And now, you can find your backup disk under /Volumes. Happy restoring!

Probably it would have been quicker to either enable the remote GUI, or to physically travel to the system and login locally, but that would spoil the fun.
Related news

  1. Fake Hacking
  2. Hacking 2019
  3. Hacking Definicion
  4. Hacking Etico Pdf
  5. Start Hacking
  6. Hacking Pdf
  7. Hacking Curso
  8. El Hacker

viernes, 1 de mayo de 2020

Storium Theory: Reading Ahead - Outcomes As Inspiration

I've written a bit before about how challenge outcomes provide guidelines for writing during a challenge...how they provide the effective limits of what can happen during a challenge, and how they reveal what the players should be writing towards when playing Strengths and Weaknesses.

Today, I'd just like to take a little time to look at that from a slightly different angle: Outcomes as inspiration.

This falls along similar lines to what I said above: Challenge outcomes reveal what players should be writing towards when playing their cards.

Because of this...challenge outcomes provide ideas.

If you have trouble writing on a challenge, one of the first things you should do is take another look (you did take a first look, right?) at the outcomes for that challenge.

Think about what they mean.

What happens in the outcomes?

What does it mean for the story?

What does it mean for your character?

Then, think about what events might lead to those outcomes.

And now...think about what your character might do that causes those events.

These steps can help you to draw inspiration from the challenge outcomes. They tell you what your character's involvement in the tale is. They tell you what the challenge means to your character - how he sees himself in the midst of the problem at hand. They tell you what your character thinks she is fighting for, or struggling to accomplish. They tell you what your character thinks is slipping away when things go wrong.

They tell you where the possibilities lie. They tell you what paths lead to the different potential endings.

And when you can see a path, and see what your character values in a situation, it can start to become quite a bit easier to think of what your character would do in such a situation. It gives you context, and context is an excellent guide for storytelling.

By taking a look at where the challenge can go, you can make it easier to determine how your character can take it closer to where it can go.

One important point, here: Even if a challenge's path is at this point "certain" - if, for instance, there are 4 Strengths and 1 Weakness or 4 Weaknesses and 1 Strength and there's only two card slots left - I still advise reading both outcomes when you're using this method. Both outcomes still provide valuable context. The Strong outcome still shows what could have gone right. The Weak outcome still shows what could have gone wrong.

In the process, both show what your character's actions would lead towards...even if there's no longer a possibility of the challenge actually getting there. They show what can be nearly grasped...or what can be threatened, but end up avoided.

I encourage reading outcomes ahead of time anyway, simply because of the focus they provide to the story...but they're a great resource when you need a little nudge, a little context, to get yourself thinking on just how you can progress the story of a challenge. They should not be your only resource when you need inspiration, but remember that they are there and put them to good use!

Download Charectar Replace Mod For Gta Sandea












This mod is only for gta sandeas
to control this mod read discription
                                                                                  
                                                                  discription
CHARECTOR MOD

TO  GO FRANKLIN PRESS=ALT+UP ARROW KEY (AND ALT+F10)
TO GO MICHELL PRESS=ALT+RIGHT ARROW KEY (AND ALT+F9)
TO GO TREVOUR PRESS+ALT+RIGHT ARROW KEY(AND ALT+F12)

PHONE MOD

TO BBRING YOUR CALL PRESS= TAB AND ENTER KEY
TO USE YOUR PHONE PRESS=ALT+P OR SHIFT+P KEY
TO UNLOCK YOUR PHONE PRESS SHIFTE KEY
TO BACK YOR PHONE PRESS RIGHT ARROW KEY

  USE MORE FUNCTION TO THIS SO PLESE RED ME FILE ON THIS MOD


                                                                   MOD DISCRIPTION
THIS MOD CAN CHANGE ALL MAP AN PHONE AND CHARCTOR SKINS  PLAYER
IT COULD NOT CHANGE YOU GRAPHIC AND MISSON OF GTA SNADEAS IT COULD USE
IN MINNIMUM 2GB RAM AND 500 GRAPHIC CRAD  SO REMEMBER ALL NOTES TO US\E MORE FUNCTION OF THIS MOD SO PLESE DOWNOAD AND READ README FILE


                                                                        TO USE THIS MOD
DOWNLOAD WINRAR LATEST UPDATE SOFTAWRETO USE THIS MOD DOWNLOAD IT FROM HERE


                                                          GET FREE WIN RAR SOFTWARE

mod password is=fulla1
DOWNLOAD THIS MOD FROM HERE