🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰
1 691
Subscribers
No data24 hours
-17 days
-1330 days
Posts Archive
මූ පාවිච්චි කරන device දෙක 👇
(1) portapack h1
මෙක SDR Device එකක් ( Software Defined Radio)
Radio Frequency signal පාවිච්චි කරන radio communication systems වල signal modulating & demodulating කරන්න පාවිච්චි කරනව..
modulating & demodulating ??
මෙක data communication වල පාවිච්චි කරන ප්රධාන ක්රමයක් සරලවම දත්ත සහ තොරතුරු හුවමාරු කරගන්න මාධ්යක්
Radio Frequency car keys වල පාවිච්චි වෙනවද?
ඔව්, key එක එබුවහම RF system එකෙන් signal එකක් නිකුත් කරනව..( communication එකේ ආරක්ශාවට rolling codes තීනව)
ඉතින් PortaPack එකට පුලුවන් signal record ,listen ,decode වගේම signal transmit කරන්න පුලුවන් එලියට...එවගේම කිසිම පරිගණකයක් අවශ්ය වෙන්නෙ නෑ
(2) Flipper Zero
මෙක remote controller එකක්..හැබැයි නික්ම්ම car , tv remote වගෙ එකක් නෙවෙයි 😌
මෙකට පුලුවන් remote network එකක් capture කරලා එ විදිහට වැඩ කරන්න...
( card එකක් touch කරලා door open කරන system එකක් හිතන්න මෙයාට පුලුවන් එක කවුරු හරි කරන වෙලාවට එක capture කරලා card එක clone කරන්න )
Wireless device hack කරන්න පාවිච්චි කරන්නෙ..මූ car keys වල signal capture කරන්නෙ මෙකෙන් ආපිට original key එක නැතුව filpper එකට් clone කරං අරින්න පුලුවන්..
🔥 3
00:48
Video unavailableShow in Telegram
drugs ගහල නාස්ති වෙලා අද වෙනකොට pro cybersecurity expert කෙනෙක්...😌
Ryan Montgomery
#carhacking
🔥 7
"Cyber criminals never stop. They’re always working on new ways to exploit businesses and individuals online, and their methods get more sophisticated with every passing year."😌
ඉතින් යාලුවනේ cybersecurity ගැන උසස් අධ්යාපනය ට වගේම තමන්ගේ අනාගත රැකියාව විදිහට තෝරගත්තෙ එක වටිනව ද ? මොකද හිතෙන්නෙ....😌🙃
👍 4
2023 Security Threats research සහ බොහෝ අන්තර්ජාල තොරතුරු වලට අනුව digital platforms ,product ,application සහ digital technologies ඉතාමත් වේගයෙන් දියුණු වෙනව සහ ඊට සමානව සයිබර් ආරක්ෂණයට එම සමාගම් යොදම මුදල් ප්රමාණයත් ඉතා ඉහලයි කියලා.. මෙ වෙනකොට AI( Artificial intelligence)වල වේගවත් දියුණුව එක්ක මෙ දෙවල් තවත් අලුත් වෙලා සංකීර්ණ වෙලා තීනව..🥲 විශේෂයෙන් ම AI-fueled attack
උදා:- NotPetya Malware
Research වලට අනුව ,
⚡Human and Machine Identities 2.4x වර්ධනයක් තියෙනව කියල කියනව
( සරලවම මිනිසුන් සහ machines අතර සම්බන්දතාවය අදුරගන්නෙ මෙකෙන් servers,automated bots,VMs, digital application අතර ගණුදෙනු කරන්න පාවිච්චි කරන interfere එක) උදා:- SSH Keys,security krys & certificate , privilege access , APIs
⚡ SaaS tools deployment 68% පමණ වර්ධනය වෙලා තීනව..
(SaaS - Software as a Service සරලම මෘදුකාංග cloud servers පාවිච්චි කරලා තමන්ගේ service ලබා දෙන්න පාවිච්චි කරන එක තමයි SaaS වලින් කරන්නෙ. ගොඩාක් powerful business to business It service එකක්.
උදා:- Netflix,Amazon Prime , Disney + වැනි stream service තුන්වන පාර්ශවයේ cloud service providers ලා (google ,microsoft Azure ,Digital Ocean ) පාවිච්චි කරලා තමන්ගේ සේවාව ලොව පුරා අන්තර්ජාලය හරහා පරිශීලකයන්ට ලබා දීම..
⚡ දත්ත වලට අනුව 2024 වෙනකොට saas product වල වටිනාකම $ බිලියන 200 ආසන්න වන බව පුරෝකතනය කරනව.
⚡ Malware Attack Increase 89%
පසුගිය මාස 12 ඇතුලත malware attack සෞඛ්ය සේවා සඳහා 97% ප්රමාණයක් එල්ලවෙලා තීනව. එවගේම malware attack වල ඉතාම සීඝ්ර දියුණුවක් ඇතිවෙලා තීනව AI වල බලපෑම නිසා.👍 1
Repost from 𝐇𝐀𝐂𝐊 | 𝐊𝐀𝐏
📍https://whatsapp.com/channel/0029Va9rbbX1HspqtpwAIg0C
🔹 ඔන්න අපේ Whatsapp Channel එක
මං හිතනවා Telegram Online එන්නේ නැති ගොඩක් අයට මේක Help එකක් වෙයි කියලා.
⭕️ බය වෙන්න දෙයක් නෑ මේක Group එකක් වගේ නෙවෙයි ඔයාලාගේ Contact කාටවත් බලන්න බෑ ‼️
හැබැයි මන් තාම කැමති Telegram වලට 😌❤️
❤ 1
Repost from N/a
Photo unavailableShow in Telegram
✔️ Devkithub 🇱🇰 ✔️
🕯 DevKitHub කියන්නේ Buy & Sell Multivendor Digital Download Market place එකක්. 🛍
👀මේක අපේ ලංකාවේ කොල්ලො සෙට් එකක වැඩක් 🇱🇰
🔥 ලංකාවෙ පිටට ඩොරල් යම්නෙත් නැ😁
✔️අලුතින් Freelancing පටන් ගන්න අයටත් මේ වගේ platform එකක් use කරලා ගේමක් ගහන්න පුලුවන් .
📊 ඔයාගේ product sell කරන්න කිසිම fees එකක් මේ platform එකෙන් ගන්නේ නෑ .
⚠️ Buyer Protection Period එකෙන් පස්සේ ඔයාට ඔයාගේ සල්ලි 💲 withdraw කර ගන්න පුළුවන් .
💲Crypto Payments / Payoneer / Bank Transfer විදිහට ඔයාට ඔයාගේ payout ගන්න පුළුවන් .
🥲එහෙනම් කල්පනා කර කර ඉන්න දෙයක් නෑ . ඔයාලා ගාව තියෙන plugins , Php Scripts , Automation Softwares , Configs.. etc ඕන දෙයක් මේකේ Sell & Buy කරන්න පුළුවන් .
ඒ වගේම ඔයාලට පුලුවන් සතියකට සැරයක් files 5ක් free download කරගන්න.📁
ආ තව දෙයක් random 10 දෙනෙක්ව තොරල 1$ OFFER එකකුත් දෙනවා.🤑
🔤🔤🔤🔤 - https://devkithub.com
😎ජය වේවා 😎
👍 3
Photo unavailableShow in Telegram
5 days free signals දෙන්නම් කැමති අය පල්ලෙහා තියෙන ලින්ක් එකෙන් wtzapp group එකට join වෙන්න ඒ දවස් තුන පොඩ්ඩක් ට්රයි කරලා බලන්න අපේ signal accuracy එක හොදයිද කියලා.
👉 https://chat.whatsapp.com/JjFYBRCn6OiHVCw7PBOHUR
Guys, Academic information තියන English language එකෙන් තියන පොත් සල්ලි දීල ලංකාවෙ ගන්න තැන් එහෙම දන්නවද?
Photo unavailableShow in Telegram
What is AI | Sirimath X 🎧 | Podcast No.01
☃️ Podcast Coming Soon.....🚀
🌝 Would you also like to join the AI Podcast and talk with us ? 👻Do you have knowledge about AI? . Then put a request before 7:00 tonight.📬
Good Bye Gys 🤙
👇👇👇
https://t.me/Sirimath_X
Repost from Digital Shield🛡
Photo unavailableShow in Telegram
Search Engine for Pentesters
====================
Join Our Telegram Channel
https://t.me/DigitalShieldLK
Photo unavailableShow in Telegram
🌿SQL Injection Attack :: (සිංහල)🧑💻✍
හැඳින්වීම :
අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන.
Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත් SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු
(1) SQL Injection එකක් කියන්නේ මොකක්ද?
(2) SQL Injection Types මොනවද?
(3) කොහොමද මේ SQLI වැඩ කරන්නේ?
(4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ?
(5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද?
🟢 Full Post >>>
.
.
Join our channel ✅ : @hack_kap0
Our community ✅ : @Hack_Kap
Happy Hacking 🥷🏻
Copyright Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏🔝⛔ Free binance signals....join group,giveaways for free usdt පුංචි වොලට් තියන අය ගොඩ දානවා 🌚❤️ https://t.me/gethub0chat
Photo unavailableShow in Telegram
5 Ways to get 1000 Dollars in a Week
There are five legitimate ways to potentially earn $1000 in a week:
1. Freelancing: Offer your skills online, such as graphic design, programming. 2. Gig Economy: Participate in gig jobs like food delivery, or task-based apps like Uber. 3. Online Selling: Utilize platforms like eBay to sell items you no longer need or create and sell digital products. 4. Rent or Share Assets: Rent out your spare room or share your car through car-sharing platforms. 5. Temp Work: Seek temporary job opportunities in your local area or through temp agencies for quick earning potentials.Each opportunity comes with its own set of risks and rewards. 🟢 Full Post through Medium >>> 🟢 Full Post through Telegram >>> . . Join our Channel ✅ : @berich_ofc Join our Medium ✅ :https://be-rich.medium.com/ Financial Wizard | Unleashing Abundance 🌟 | Join me on the path to rapid riches and financial freedom! 💰✨ #WealthCreation #Rich Copyright Ⓒ 2023 BE RICH
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory Online*
*සදුදා 8.30am to 10.30am*
✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
*Branded IT Online Class* එක
සාම්ප්රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න
✅ පොතට සීමා නොවී ක්ෂේශ්ත්රයේ ප්රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න
IT වලට ආස ළමයි විතරක් එන පංතිය
🎯 Be ready to become an IT expert, not just to get an A
JOIN WHATSAPP GROUP 👇
https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory Online*
*සදුදා 8.30am to 10.30am*
✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
*Branded IT Online Class* එක
සාම්ප්රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න
✅ පොතට සීමා නොවී ක්ෂේශ්ත්රයේ ප්රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න
IT වලට ආස ළමයි විතරක් එන පංතිය
🎯 Be ready to become an IT expert, not just to get an A
JOIN WHATSAPP GROUP 👇
https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
*SANKALPA WIJERATHNAICT*
📍 *2025 A/L ICT Theory Online*
*සදුදා 8.30am to 10.30am*
✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
*Branded IT Online Class* එක
සාම්ප්රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න
✅ පොතට සීමා නොවී ක්ෂේශ්ත්රයේ ප්රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න
IT වලට ආස ළමයි විතරක් එන පංතිය
🎯 Be ready to become an IT expert, not just to get an A
JOIN WHATSAPP GROUP 👇
https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
Repost from Digital Shield🛡
😈 Small Course Collection 😈
🎭 Blockchain Developer Nanodegree Program 🎭
🗃️ Link - https://www.mediafire.com/file/upmog2ko9z2pm0k/%2540H4CKT3R_bot-Udacity_-Blockchain_Developer_Nanodegree_Program.rar/file
🔋 Size - 2.21 GB
🎭 Data Structures and Algorithms Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/ce9x2g4hlwcngpc/%2540H4CKT3R_bot-Udacity-Data_Structures_and_Algorithms_Nanodegree.rar/file
🔋 Size - 2.15 GB
🎭 AI Programming with Python Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/12cg7ibg9xf3u1b/%2540H4CKT3R_bot-Udacity-AI_Programming_with_Python_Nanodegree.rar/file
🔋 Size - 1.96 GB
🎭 Programming for Data Science Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/yxk04osy9h1ikh9/%2540H4CKT3R_bot-Udacity-Programming_for_Data_Science_Nanodegree.rar/file
🔋 Size - 2.21 GB
🎭 Front-End Web Developer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/bh82z9szh5v3mkt/%2540H4CKT3R_bot-Udacity-Front-End_Web_Developer_Nanodegree.rar/file
🔋 Size - 9.68 GB
🎭 Natural Language Processing Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/aaqfwptld0kcyhr/%2540H4CKT3R_bot-Udacity-Natural_Language_Processing_Nanodegree.rar/file
🔋 Size - 1.78 GB
🎭 Computer Vision Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/jsxbsgid766rn1v/%2540H4CKT3R_bot-Udacity-Computer_Vision_Nanodegree.rar/file
🔋 Size - 2.66 GB
🎭 Deep Reinforcement Learning Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/3vlcf3xiyrk1exz/%2540H4CKT3R_bot-Udacity-Deep_Reinforcement_Learning_Nanodegree.rar/file
🔋 Size - 2.30 GB
🎭 Become a Professional React Developer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/x7dxlp339mmjvvd/%2540H4CKT3R_bot-Udacity-Become_a_Professional_React_Developer_Nanodegree.rar/file
🔋 Size - 3.65 GB
🎭 Java Developer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/sw5q0ettgrwfovu/%2540H4CKT3R_bot-Udacity-Java_Developer_Nanodegree.rar/file
🔋 Size - 3.26 GB
🎭 Android Basics Nanodegree by Google 🎭
🗃️ Link - https://www.mediafire.com/file/juy3f6as0l7s7lb/%2540H4CKT3R_bot-Udacity-Android_Basics_Nanodegree_by_Google.rar/file
🔋 Size - 8.95 GB
🎭 Robotics Software Engineer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/hedptw1v3oix0na/%2540H4CKT3R_bot-Udacity-Robotics_Software_Engineer_Nanodegree.rar/file
🔋 Size - 4.93 GB
🎭 Digital Marketing Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/sjalkf2qcjshnsq/%2540H4CKT3R_bot-Udacity-Digital_Marketing_Nanodegree.rar/file
🔋 Size - 4.09 GB
🎭 Intro to Self-Driving Cars Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/2qla9nj9y8v596q/%2540H4CKT3R_bot-Udacity-_Intro_to_Self-Driving_Cars_Nanodegree.rar/file
🔋 Size - 3.35 GB
🎭 Machine Learning Engineer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/7x0u3pe25vcpq48/%2540H4CKT3R_bot-Udacity-Machine_Learning_Engineer_Nanodegree.rar/file
🔋 Size - 5.37 GB
🎭 Android Developer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/1xjj72a4851xyg8/%2540H4CKT3R_bot-Udacity-Android_Developer_Nanodegree.rar/file
🔋 Size - 6.24 GB
🎭 Data Scientist Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/upyxbzfejoevgsg/%2540H4CKT3R_bot-Udacity-Data_Scientist_Nanodegree.rar/file
🔋 Size - 7.80 GB
🎭 Intro to Programming Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/v3fg7zrqkpnkh4g/%2540H4CKT3R_bot-Udacity-Intro_to_Programming_Nanodegree_v3.rar/file
🔋 Size - 6.14 GB
🎭 Self Driving Car Engineer Nanodegree 🎭
🗃️ Link - https://www.mediafire.com/file/hscwk64oyix7ts1/%2540H4CKT3R_bot-Udacity-_Self_Driving_Car_Engineer_Nanodegree.rar/file
🔋 Size - 7.17 GB
🎁 Share Us For More - https://t.me/DigitalShieldLK
Photo unavailableShow in Telegram
🌿SQL Injection Attack :: Explain in (සිංහල)🧑💻✍
හැඳින්වීම :
අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන.
Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත් SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු
(1) SQL Injection එකක් කියන්නේ මොකක්ද?
(2) SQL Injection Types මොනවද?
(3) කොහොමද මේ SQLI වැඩ කරන්නේ?
(4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ?
(5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද?
🟢 Full Post >>>
.
.
Join our channel ✅ : @hack_kap0
Our community ✅ : @Hack_Kap
Happy Hacking 🥷🏻
Copyright Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏Photo unavailableShow in Telegram
Hora Pusa NFSW AI Bot Up Again!
You Can Create Beautiful Girls Using This Bot!.
👇👇👇👇
https://t.me/hora_pusa_ai_nfsw
Repost from Digital Shield🛡
00:05
Video unavailableShow in Telegram
*Free Web Design Course Available🔥*
*වෙබ් අඩවි නිර්මාණය ඉගෙනිමට කැමති ඔබත් අදම අප හා එක්වන්න,මෙම පාඨමාලාව නොමිලයෙ පවත්වනු ලබන අතර,ඉතා ගැඹුරු සිද්ධාන්ත සමග ඉගැන්වේ,ඔබගෙ යාලුවන්ව දැනුවත් කර ඔවුන් සමග දැනුම බෙදාගන්න.*
*Are you interested in learning web design and creating your own website? This is a fantastic opportunity for you! In this course, you'll receive comprehensive and in-depth knowledge about web design. The best part is, it's completely free of charge. So, join us as we educate and empower others in the field of web design.*
*💨Registration Form Link(Register Before 28 Of July)*
*https://surveyheart.com/form/64aba0a877738d5f12c720aa*
*💨Group Link(if you want a continue you'r registration join with Group)*
*https://chat.whatsapp.com/BMMedtx9YuOCm8xrebTdl8*
*By #Mr.Kaveesha_Rathnayaka*
*© 2022 UE Production,All Right Reserved*
Photo unavailableShow in Telegram
කෝල් ,මැසේජ් දදා කට්ටිය වද දෙනවද?
කෝල් ,මැසේජ් එන නම්බර් වල තොරතුරු දැනගන්න ඕනිද?
ඔයාට දැම් ඕනිම phone number එකක තොරතුරු අපගේ Telegram Bot සේවාව හරහා නොමිලේම සොයාගත හැක.
දැනට පොඩි features ටිකක් තියෙන්නෙ ඉස්සරහට හදන්නම් හොදට🤓
👇👇👇
https://t.me/hp_contacts_bot
කෝල් ,මැසේජ් දදා කට්ටිය වද දෙනවද?
කෝල් ,මැසේජ් එන නම්බර් වල තොරතුරු දැනගන්න ඕනිද?
ඔයාට දැම් ඕනිම phone number එකක තොරතුරු අපගේ Telegram Bot සේවාව හරහා නොමිලේම සොයාගත හැක.
👇👇👇
https://t.me/hp_contacts_bot
Photo unavailableShow in Telegram
🌿Packets Storm Attack:Explain in (සිංහල)🧑💻✍
Cyber Warfare එක තුළ මේ Packets Storm Attack කියන එක විනාශකාරීම බලවේගයක් වෙලා තියෙනවා.ඉතින් මේ Article එකෙන් කතා කරමු Packets Storm Attack ගැන.
1) මොකක්ද මේ Packets Storm Attack කියලා කියන්නේ.
2) Packets Storm Attack වැඩ කරන්නේ කොහොමද ?
3) ඇයි Hackers ලා Packets Storm Attack use කරන්නේ
4) Packets Storm Attack ගැන Real-World Examples
5) කොහොමද මේවායෙන් ආරක්ශා වෙන්නේ
🟢 Read Full Article >>>
🌙🌿 Please react & comment to post "/
Writen By : @Kap_Official
==================================
Join our channel ✅ : @hack_kap0
Our community ✅ : @Hack_Kap
Happy Hacking 🥷🏻
Copyright Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏Photo unavailableShow in Telegram
2024 ICT Networking සහේත්රා-දොම්පේ
රැල්ලට ගොස් අමාරුවේ වැටීමට පෙර දැන්වත් හරි තැනට
_එහෙනම් එන්න නොමිලේ networking හරියට ඉගෙන ගන්න._
✅MCQ ප්රශ්න 8 ක් ,STRUCTURE අනු කොටස් දෙකක් සහ
ESSAY 1 ප්රශ්නයක් ලේසියෙන් ම ගොඩ දා ගන්න
✅ 2023 සිසුන්ට ද සහබාගී විය හැක
✅ පොතට සීමා නොවී ක්ෂේශ්ත්රයේ ප්රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න
🎯 Be ready to become an IT expert, not just to get an A
විමසීම් ☎
⭕0767862124
⭕https://wa.me/+94767862124
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory නව පන්ති ආරම්භය*
Group Class With Individual Attention
ජූලි 4
Tuesday 3.30PM to 5.30PM
සිංහල & English Medium
✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට
Individual වගේ කරන
Branded IT Group Class එක
සාම්ප්රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න
✅ පොතට සීමා නොවී ක්ෂේශ්ත්රයේ ප්රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න
IT වලට ආස ළමයි විතරක් එන පංතිය
🎯 Be ready to become an IT expert, not just to get an A
SANKALPA WIJERATJNA
bsc(hons)software engineering
CCNA
විමසීම් ☎
⭕0767862124
⭕https://wa.me/+94767862124
Join to the WhatsApp Group Below
https://chat.whatsapp.com/KQ1RRGP4S2dK6IEEY08Lrg
Photo unavailableShow in Telegram
Crypto Whale | VIP ✅
Free & VIP SINGLE Service එකක් අලුතින් පටන් ගත්තා
3 Signals Per Day
Join වෙලාම බලන්න
🟢 Whatsapp Group
https://chat.whatsapp.com/KSFzU3If9zACoSP0JbsJaR
Photo unavailableShow in Telegram
100$ Free Airdrop!.
ඔයාලට මේකට සතයක් වත් වියදම් වෙන්නෙ නෑ.
ඔයාලට තියෙන්නෙ පල්ලෙහා link එකෙන් ගිහින් start ඔබලා ඒකෙ තියෙන විදියට කරන එක.
එතකොට ඔයාලගෙ airdrop එක trust wallet එකට withdraw කරගන්න පුලුවන්.
මේකට referral ඕනි වෙන්නෙත් නෑ.
Twitter account එකක් විතරයි අවශ්ය.
👇👇👇👇
https://t.me/AIT_AIRDROP_BOT?start=TkH7nDUfS
Repost from Digital Shield🛡
00:31
Video unavailableShow in Telegram
Temperature conversation programme in C 😜.
Wanna try this😝
Repost from Linux
Security: Gain awareness of essential Linux security practices, including user management, permissions, firewalls, and system updates. Understand the importance of keeping your Linux system secure.
Linux security practices are vital for protecting your system from unauthorized access, vulnerabilities, and potential threats. Here are some essential Linux security practices to help you maintain a secure environment:
1. User Management:
- Use strong passwords: Encourage users to use complex passwords that include a combination of uppercase and lowercase letters, numbers, and special characters. Consider implementing password policies or tools to enforce password strength.
- Limit user privileges: Assign users the minimum necessary privileges to perform their tasks. Regularly review and revoke unnecessary privileges.
- Disable or remove unused accounts: Remove or disable any user accounts that are no longer needed to reduce the potential attack surface.
- Implement multi-factor authentication (MFA): Enable MFA for user authentication, which adds an extra layer of security by requiring additional verification beyond a password.
2. File Permissions and Ownership:
- Set appropriate file permissions: Configure file and directory permissions to restrict access based on the principle of least privilege. Use
chmod
to set permissions (e.g., read, write, execute) for the owner, group, and others.
- Manage file ownership: Ensure that files and directories are owned by the appropriate users and groups using the chown
command. Restrict access to sensitive files by limiting ownership and permissions.
3. Firewall Configuration:
- Configure a firewall: Use tools like iptables
or firewalld
to set up a firewall and define rules that control inbound and outbound network traffic. Restrict access to necessary services and ports, and regularly review and update firewall rules.
4. Regular System Updates:
- Keep the system up to date: Install security patches and updates regularly to address vulnerabilities and bugs. Use the package manager (apt
, yum
, etc.) to update the system and its installed packages.
5. Security Auditing and Monitoring:
- Monitor system logs: Regularly review system logs located in /var/log
for any suspicious activities or error messages that could indicate security breaches or issues.
- Implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) to monitor and alert you of potential security threats.
- Use security auditing tools like lynis
or OpenSCAP
to scan the system for vulnerabilities and compliance with security best practices.
6. Security Awareness:
- Educate users: Promote security awareness among users and provide training on best practices such as avoiding phishing emails, practicing safe browsing habits, and being cautious with file downloads.
- Stay informed: Keep up to date with Linux security news, vulnerabilities, and security advisories relevant to your distribution. Subscribe to security mailing lists or follow reputable sources for timely information.
Maintaining a secure Linux system requires ongoing effort and vigilance. Regularly review and update security practices to adapt to evolving threats and new vulnerabilities. Consult official documentation, security resources, and community forums to stay informed about the latest security recommendations for your specific Linux distribution.
©GameSploit
#gamesploit
Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!Repost from Linux
System Monitoring and Maintenance: Explore tools and techniques for monitoring system performance, managing processes, and troubleshooting common issues in Linux. Learn about log files, system resource monitoring, and package updates.
System monitoring and maintenance are essential tasks for keeping a Linux system running smoothly. Here are some tools and techniques to help you monitor system performance, manage processes, and troubleshoot common issues in Linux:
1. Resource Monitoring:
- top: The
top
command displays real-time information about system resource usage, including CPU, memory, and processes. It allows you to monitor and manage running processes.
- htop: Similar to top
, htop
provides an interactive and enhanced view of system resources and processes, with options for sorting, searching, and filtering.
- vmstat: The vmstat
command reports virtual memory statistics, providing insights into system memory, swap, and CPU usage.
2. Log Files:
- /var/log: Linux systems store log files in the /var/log
directory. Common log files include /var/log/syslog
, /var/log/messages
, and /var/log/auth.log
. Monitoring log files helps identify errors, warnings, and system events.
- tail: The tail
command allows you to view the last few lines of a log file, providing a real-time update of log activity. For example, tail -f /var/log/syslog
continuously displays new log entries as they are added.
3. Process Management:
- ps: The ps
command displays information about running processes, including their process IDs (PIDs), resource usage, and parent-child relationships. For example, ps aux
lists all running processes.
- kill: The kill
command terminates a process using its PID. For example, kill PID
terminates the process with the specified PID. The killall
command allows you to kill processes by name.
4. Package Updates:
- Package Managers: Use the package management tools discussed earlier (APT or YUM) to update software packages. For example, sudo apt update && sudo apt upgrade
updates all packages on an Ubuntu system.
- Unattended Upgrades: Configure the system to automatically install security updates using tools like unattended-upgrades
(Debian-based) or yum-cron
(Red Hat-based). This ensures that critical security patches are applied automatically.
5. Performance Monitoring Tools:
- sar: The sar
command collects and reports system performance data, including CPU, memory, disk I/O, and network usage. It helps identify performance bottlenecks and historical trends.
- iostat: The iostat
command provides input/output statistics for devices and partitions, helping identify disk I/O performance issues.
- nmon: The nmon
command provides a comprehensive view of system resources, including CPU, memory, disk, network, and file system utilization. It displays real-time and historical data in a user-friendly format.
Regularly monitoring system performance, managing processes, and staying up to date with package updates are essential for maintaining a stable and secure Linux system. Explore additional monitoring tools and techniques based on your specific requirements and system setup.
Remember to consult the relevant man pages, distribution documentation, or online resources for detailed usage instructions and options specific to the tools mentioned above.
©GameSploit
#gamesploit
Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!Repost from Linux
Networking: Understand basic networking concepts in Linux, including IP addressing, network configuration, and troubleshooting network connectivity issues. Learn how to use tools like ifconfig, ping, and netstat.
Networking is a fundamental aspect of Linux system administration. Understanding basic networking concepts and utilizing essential tools can help you configure and troubleshoot network connectivity. Here are some key networking topics and tools in Linux:
1. IP Addressing:
- IP address: An IP address uniquely identifies a device on a network. Learn about IPv4 and IPv6 addressing schemes and how to assign static or dynamic IP addresses to your Linux system.
- Subnetting: Understand subnetting to divide a network into smaller subnetworks.
2. Network Configuration:
- ifconfig: The
ifconfig
command displays and configures network interfaces, including assigning IP addresses, enabling or disabling interfaces, and modifying network settings.
- ip command: In recent Linux distributions, the ip
command is replacing ifconfig
. It provides more advanced functionalities for managing network interfaces, routing, and other network-related tasks.
3. Network Connectivity:
- ping: The ping
command is used to check network connectivity between your Linux system and another device by sending ICMP echo request packets.
- traceroute: The traceroute
command traces the path packets take from your system to a destination host, showing the IP addresses and response times of intermediate hops.
- netstat: The netstat
command displays active network connections, listening ports, routing tables, and various network statistics.
4. DNS (Domain Name System):
- DNS resolution: Understand how DNS works and how Linux systems resolve domain names to IP addresses. Learn how to configure DNS servers and troubleshoot DNS-related issues.
- nslookup and dig: The nslookup
and dig
commands are used to query DNS servers and retrieve information about domain names, IP addresses, and DNS records.
5. Firewall and Security:
- iptables: The iptables
command is a powerful tool for configuring firewall rules to filter network traffic, control access, and enhance system security.
- firewalld: In modern Linux distributions, firewalld
is often used as a frontend for managing firewall rules. It provides a more user-friendly and dynamic interface.
6. Network File Sharing:
- NFS (Network File System): Learn how to configure NFS to share files and directories across a network.
- Samba: Explore Samba to enable file and printer sharing between Linux and Windows systems.
7. Network Troubleshooting:
- tcpdump: The tcpdump
command captures and analyzes network packets, helping diagnose network issues and investigate network traffic.
- Wireshark: Wireshark is a graphical packet analyzer that allows you to capture, inspect, and analyze network packets in real-time.
Mastering networking concepts and tools takes practice and hands-on experience. Additionally, online resources, Linux networking tutorials, and forums dedicated to networking topics can provide further guidance and practical examples to deepen your understanding of Linux networking.
©GameSploit
#gamesploit
Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!Repost from Linux
Shell Scripting: Get started with shell scripting using bash (Bourne Again Shell) or another shell. Learn how to write simple scripts to automate tasks and perform repetitive actions.
Shell scripting is a powerful way to automate tasks and perform repetitive actions in Linux. The Bash shell (Bourne Again Shell) is one of the most common shells used in Linux systems. Here are some basics to help you get started with shell scripting:
1. Script Creation:
- Choose a text editor: Use a text editor such as nano, vim, or gedit to create and edit your shell scripts. For example,
nano script.sh
.
- Set the script's interpreter: Begin your script with a shebang line that specifies the interpreter. For Bash scripts, use #!/bin/bash
.
2. Variables:
- Variable assignment: Assign values to variables using the syntax variable_name=value
. For example, name="John"
.
- Variable usage: Access variable values using the $
prefix. For example, echo "Hello, $name!"
.
3. Comments:
- Add comments: Use the #
symbol to add comments in your script. Comments are ignored by the interpreter but provide explanations for human readers.
4. Command Execution:
- Run commands: Execute commands within your script using backticks (\`) or the $()
syntax. For example, output=`ls -l
" or output=$(ls -l)
.
5. Control Structures:
- If statements: Use conditional statements (if
, elif
, else
) to perform different actions based on specific conditions. For example:
bash if [ $age -ge 18 ]; then echo "You are an adult." else echo "You are a minor." fi- Loops: Utilize loops (
for
, while
) to repeat actions. For example:
bash for i in 1 2 3; do echo $i done6. Input and Output: - Read user input: Use the
read
command to accept user input and assign it to variables. For example, read -p "Enter your name: " name
.
- Print output: Use the echo
command to display output on the terminal. For example, echo "Hello, World!"
.
7. File Operations:
- Read and write files: Use commands like cat
, grep
, sed
, and awk
to read and manipulate files within your script.
8. Running Scripts:
- Make the script executable: Use the chmod
command to make your script executable. For example, chmod +x script.sh
.
- Execute the script: Run the script using ./script.sh
or bash script.sh
.
Remember to test and validate your scripts before using them on important tasks. Start with simple scripts and gradually build complexity as you gain more experience with shell scripting. Refer to shell scripting guides, tutorials, and documentation for more in-depth knowledge.
Shell scripting is a vast topic, and exploring additional concepts like functions, error handling, and regular expressions will expand your scripting capabilities. Practice, experiment, and leverage online resources to enhance your shell scripting skills.
©GameSploit
#gamesploit
Channel :- https://t.me/linux444
Group :- https://t.me/linux555
Join our Linux community and discover a world of endless possibilities with open-source technology!