cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

avatar

🇱🇰𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 𝙇𝙆🇱🇰

We Are 𝘾𝙔𝘽𝙀𝙍𝙎𝙀𝘾𝙐𝙍𝙄𝙏𝙔 fans!

Show more
Advertising posts
1 691
Subscribers
No data24 hours
-17 days
-1330 days
Posts Archive
00:54
Video unavailableShow in Telegram
thanks cudu nona..😚
Show all...
🤣 6
00:55
Video unavailableShow in Telegram
Flipper Zero Door Unlocked🫡
Show all...
🫡 4👍 1
Photo unavailableShow in Telegram
හ්ම්ම්...කුලී වැඩක් වත් කරමු එහෙනං..😂😒
Show all...
😁 5
මූ පාවිච්චි කරන device දෙක 👇 (1) portapack h1 මෙක SDR Device එකක් ( Software Defined Radio) Radio Frequency signal පාවිච්චි කරන radio communication systems වල signal  modulating  & demodulating කරන්න පාවිච්චි කරනව.. modulating  & demodulating ?? මෙක data communication වල පාවිච්චි කරන ප්‍රධාන ක්‍රමයක් සරලවම දත්ත සහ තොරතුරු හුවමාරු කරගන්න මාධ්‍යක් Radio Frequency  car keys වල පාවිච්චි වෙනවද? ඔව්, key එක එබුවහම RF system එකෙන් signal එකක් නිකුත් කරනව..( communication එකේ ආරක්ශාවට rolling codes තීනව) ඉතින් PortaPack එකට පුලුවන්  signal  record ,listen ,decode  වගේම signal transmit  කරන්න පුලුවන්  එලියට...එවගේම කිසිම පරිගණකයක් අවශ්‍ය වෙන්නෙ නෑ (2) Flipper Zero මෙක remote controller  එකක්..හැබැයි නික්ම්ම car , tv remote  වගෙ එකක් නෙවෙයි 😌 මෙකට පුලුවන්  remote network එකක් capture කරලා එ විදිහට වැඩ කරන්න... ( card එකක් touch කරලා door open කරන system  එකක් හිතන්න මෙයාට පුලුවන් එක කවුරු හරි කරන වෙලාවට එක capture කරලා card එක clone කරන්න  ) Wireless device hack කරන්න පාවිච්චි කරන්නෙ..මූ car keys වල signal capture කරන්නෙ මෙකෙන් ආපිට original key එක නැතුව filpper එකට් clone  කරං අරින්න පුලුවන්..
Show all...
🔥 3
00:48
Video unavailableShow in Telegram
drugs ගහල නාස්ති වෙලා අද වෙනකොට pro cybersecurity expert කෙනෙක්...😌 Ryan Montgomery #carhacking
Show all...
🔥 7
"Cyber criminals never stop. They’re always working on new ways to exploit businesses and individuals online, and their methods get more sophisticated with every passing year."😌 ඉතින් යාලුවනේ cybersecurity ගැන උසස් අධ්‍යාපනය ට වගේම තමන්ගේ අනාගත රැකියාව විදිහට තෝරගත්තෙ එක වටිනව ද ? මොකද හිතෙන්නෙ....😌🙃
Show all...
👍 4
2023 Security Threats research සහ බොහෝ අන්තර්ජාල තොරතුරු වලට අනුව digital platforms ,product ,application  සහ  digital technologies  ඉතාමත් වේගයෙන් දියුණු වෙනව සහ ඊට සමානව සයිබර් ආරක්ෂණයට එම සමාගම් යොදම මුදල් ප්‍රමාණයත් ඉතා ඉහලයි කියලා.. මෙ වෙනකොට AI( Artificial intelligence)වල වේගවත් දියුණුව එක්ක මෙ දෙවල් තවත් අලුත් වෙලා සංකීර්ණ වෙලා තීනව..🥲 විශේෂයෙන් ම AI-fueled attack උදා:- NotPetya Malware Research වලට අනුව , ⚡Human and Machine Identities 2.4x වර්ධනයක් තියෙනව කියල කියනව ( සරලවම මිනිසුන්  සහ  machines  අතර සම්බන්දතාවය අදුරගන්නෙ මෙකෙන් servers,automated bots,VMs, digital application අතර ගණුදෙනු කරන්න පාවිච්චි කරන interfere එක) උදා:- SSH Keys,security krys & certificate , privilege access , APIs ⚡ SaaS tools deployment 68% පමණ වර්ධනය වෙලා තීනව.. (SaaS - Software as a Service   සරලම මෘදුකාංග cloud servers පාවිච්චි කරලා තමන්ගේ service  ලබා දෙන්න පාවිච්චි කරන එක තමයි SaaS වලින් කරන්නෙ. ගොඩාක් powerful business to business It service එකක්. උදා:- Netflix,Amazon Prime , Disney + වැනි stream service  තුන්වන පාර්ශවයේ cloud service providers  ලා (google ,microsoft Azure ,Digital Ocean ) පාවිච්චි කරලා තමන්ගේ සේවාව ලොව පුරා අන්තර්ජාලය හරහා පරිශීලකයන්ට ලබා දීම.. ⚡ දත්ත වලට අනුව 2024 වෙනකොට saas product  වල වටිනාකම $ බිලියන 200 ආසන්න වන බව පුරෝකතනය කරනව. ⚡ Malware Attack Increase 89% පසුගිය මාස 12 ඇතුලත malware attack සෞඛ්‍ය සේවා සඳහා 97% ප්‍රමාණයක් එල්ලවෙලා තීනව. එවගේම malware attack වල ඉතාම සීඝ්‍ර දියුණුවක් ඇතිවෙලා තීනව AI වල බලපෑම නිසා.
Show all...
👍 1
📍https://whatsapp.com/channel/0029Va9rbbX1HspqtpwAIg0C 🔹 ඔන්න අපේ Whatsapp Channel එක මං හිතනවා Telegram Online එන්නේ නැති ගොඩක් අයට මේක Help එකක් වෙයි කියලා. ⭕️ බය වෙන්න දෙයක් නෑ මේක Group එකක් වගේ නෙවෙයි ඔයාලාගේ Contact කාටවත් බලන්න බෑ ‼️ හැබැයි මන් තාම කැමති Telegram වලට 😌❤️
Show all...
1
Repost from N/a
Photo unavailableShow in Telegram
✔️ Devkithub 🇱🇰 ✔️ 🕯 DevKitHub කියන්නේ Buy & Sell  Multivendor Digital Download Market place එකක්. 🛍 👀මේක අපේ ලංකාවේ කොල්ලො සෙට් එකක වැඩක් 🇱🇰 🔥 ලංකාවෙ පිටට ඩොරල් යම්නෙත් නැ😁 ✔️අලුතින් Freelancing පටන් ගන්න අයටත් මේ වගේ platform එකක් use කරලා ගේමක් ගහන්න පුලුවන් . 📊 ඔයාගේ product sell කරන්න කිසිම fees එකක් මේ platform එකෙන් ගන්නේ නෑ . ⚠️ Buyer Protection Period එකෙන් පස්සේ ඔයාට ඔයාගේ සල්ලි 💲 withdraw කර ගන්න පුළුවන් . 💲Crypto Payments / Payoneer / Bank Transfer විදිහට ඔයාට ඔයාගේ payout ගන්න පුළුවන්  . 🥲එහෙනම් කල්පනා කර කර ඉන්න දෙයක් නෑ . ඔයාලා ගාව තියෙන plugins , Php Scripts , Automation Softwares , Configs.. etc ඕන දෙයක් මේකේ Sell  & Buy කරන්න පුළුවන් . ඒ වගේම ඔයාලට පුලුවන් සතියකට සැරයක් files 5ක් free download කරගන්න.📁 ආ තව දෙයක් random 10 දෙනෙක්ව තොරල 1$ OFFER එකකුත් දෙනවා.🤑 🔤🔤🔤🔤 - https://devkithub.com 😎ජය වේවා 😎
Show all...
👍 3
Photo unavailableShow in Telegram
5 days free signals දෙන්නම් කැමති අය පල්ලෙහා තියෙන ලින්ක් එකෙන් wtzapp group එකට join වෙන්න ඒ දවස් තුන පොඩ්ඩක් ට්‍රයි කරලා බලන්න අපේ signal accuracy එක හොදයිද කියලා. 👉   https://chat.whatsapp.com/JjFYBRCn6OiHVCw7PBOHUR
Show all...
Guys, Academic information තියන English language එකෙන් තියන පොත් සල්ලි දීල ලංකාවෙ ගන්න තැන් එහෙම දන්නවද?
Show all...
Photo unavailableShow in Telegram
What is AI | Sirimath X 🎧 | Podcast No.01 ☃️ Podcast Coming Soon.....🚀 🌝 Would you also like to join the AI Podcast and talk with us ? 👻Do you have knowledge about AI? . Then put a request before 7:00 tonight.📬 Good Bye Gys 🤙 👇👇👇 https://t.me/Sirimath_X
Show all...
Repost from Digital Shield🛡
Photo unavailableShow in Telegram
Search Engine for Pentesters ==================== Join Our Telegram Channel https://t.me/DigitalShieldLK
Show all...
Photo unavailableShow in Telegram
🌿SQL Injection Attack :: (සිංහල)🧑‍💻✍ හැඳින්වීම : අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන. Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ  Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්‍යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත්  SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු (1) SQL Injection එකක් කියන්නේ මොකක්ද? (2) SQL Injection Types මොනවද? (3) කොහොමද මේ SQLI වැඩ කරන්නේ? (4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ? (5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද? 🟢 Full Post >>> . . Join our channel ✅ : @hack_kap0 Our community ✅ : @Hack_Kap Happy Hacking 🥷🏻 Copyright  Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
Show all...
🔝⛔ Free binance signals....join group,giveaways for free usdt පුංචි වොලට් තියන අය ගොඩ දානවා 🌚❤️ https://t.me/gethub0chat
Show all...
Photo unavailableShow in Telegram
5 Ways to get 1000 Dollars in a Week There are five legitimate ways to potentially earn $1000 in a week:
1. Freelancing: Offer your skills online, such as graphic design, programming.

2. Gig Economy: Participate in gig jobs like food delivery, or task-based apps like Uber.

3. Online Selling: Utilize platforms like eBay to sell items you no longer need or create and sell digital products.

4. Rent or Share Assets: Rent out your spare room or share your car through car-sharing platforms.

5. Temp Work: Seek temporary job opportunities in your local area or through temp agencies for quick earning potentials.

Each opportunity comes with its own set of risks and rewards. 🟢 Full Post through Medium >>> 🟢 Full Post through Telegram >>> . . Join our Channel ✅ : @berich_ofc Join our Medium ✅ :https://be-rich.medium.com/ Financial Wizard | Unleashing Abundance 🌟 | Join me on the path to rapid riches and financial freedom! 💰✨ #WealthCreation #Rich Copyright  Ⓒ 2023 BE RICH
Show all...
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory Online* *සදුදා 8.30am to 10.30am* ✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට Individual වගේ කරන *Branded IT Online Class* එක සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න ✅ පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න IT වලට ආස ළමයි විතරක් එන පංතිය 🎯 Be ready to become an IT expert, not just to get an A JOIN WHATSAPP GROUP 👇 https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
Show all...
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory Online* *සදුදා 8.30am to 10.30am* ✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට Individual වගේ කරන *Branded IT Online Class* එක සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න ✅ පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න IT වලට ආස ළමයි විතරක් එන පංතිය 🎯 Be ready to become an IT expert, not just to get an A JOIN WHATSAPP GROUP 👇 https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6 *SANKALPA WIJERATHNAICT* 📍 *2025 A/L ICT Theory Online* *සදුදා 8.30am to 10.30am* ✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට Individual වගේ කරන *Branded IT Online Class* එක සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න ✅ පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් *practical* එක්ක හරියට ඉගෙන ගන්න IT වලට ආස ළමයි විතරක් එන පංතිය 🎯 Be ready to become an IT expert, not just to get an A JOIN WHATSAPP GROUP 👇 https://chat.whatsapp.com/K2Gtk9M1lwkGCK4eMuRlp6
Show all...
Repost from Digital Shield🛡
😈 Small Course Collection 😈 🎭 Blockchain Developer Nanodegree Program 🎭 🗃️ Link - https://www.mediafire.com/file/upmog2ko9z2pm0k/%2540H4CKT3R_bot-Udacity_-Blockchain_Developer_Nanodegree_Program.rar/file 🔋 Size - 2.21 GB 🎭 Data Structures and Algorithms Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/ce9x2g4hlwcngpc/%2540H4CKT3R_bot-Udacity-Data_Structures_and_Algorithms_Nanodegree.rar/file 🔋 Size - 2.15 GB 🎭 AI Programming with Python Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/12cg7ibg9xf3u1b/%2540H4CKT3R_bot-Udacity-AI_Programming_with_Python_Nanodegree.rar/file 🔋 Size - 1.96 GB 🎭 Programming for Data Science Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/yxk04osy9h1ikh9/%2540H4CKT3R_bot-Udacity-Programming_for_Data_Science_Nanodegree.rar/file 🔋 Size - 2.21 GB 🎭 Front-End Web Developer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/bh82z9szh5v3mkt/%2540H4CKT3R_bot-Udacity-Front-End_Web_Developer_Nanodegree.rar/file 🔋 Size - 9.68 GB 🎭 Natural Language Processing Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/aaqfwptld0kcyhr/%2540H4CKT3R_bot-Udacity-Natural_Language_Processing_Nanodegree.rar/file 🔋 Size - 1.78 GB 🎭 Computer Vision Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/jsxbsgid766rn1v/%2540H4CKT3R_bot-Udacity-Computer_Vision_Nanodegree.rar/file 🔋 Size - 2.66 GB 🎭 Deep Reinforcement Learning Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/3vlcf3xiyrk1exz/%2540H4CKT3R_bot-Udacity-Deep_Reinforcement_Learning_Nanodegree.rar/file 🔋 Size - 2.30 GB 🎭 Become a Professional React Developer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/x7dxlp339mmjvvd/%2540H4CKT3R_bot-Udacity-Become_a_Professional_React_Developer_Nanodegree.rar/file 🔋 Size - 3.65 GB 🎭 Java Developer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/sw5q0ettgrwfovu/%2540H4CKT3R_bot-Udacity-Java_Developer_Nanodegree.rar/file 🔋 Size - 3.26 GB 🎭 Android Basics Nanodegree by Google 🎭 🗃️ Link - https://www.mediafire.com/file/juy3f6as0l7s7lb/%2540H4CKT3R_bot-Udacity-Android_Basics_Nanodegree_by_Google.rar/file 🔋 Size - 8.95 GB 🎭 Robotics Software Engineer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/hedptw1v3oix0na/%2540H4CKT3R_bot-Udacity-Robotics_Software_Engineer_Nanodegree.rar/file 🔋 Size - 4.93 GB 🎭 Digital Marketing Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/sjalkf2qcjshnsq/%2540H4CKT3R_bot-Udacity-Digital_Marketing_Nanodegree.rar/file 🔋 Size - 4.09 GB 🎭 Intro to Self-Driving Cars Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/2qla9nj9y8v596q/%2540H4CKT3R_bot-Udacity-_Intro_to_Self-Driving_Cars_Nanodegree.rar/file 🔋 Size - 3.35 GB 🎭 Machine Learning Engineer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/7x0u3pe25vcpq48/%2540H4CKT3R_bot-Udacity-Machine_Learning_Engineer_Nanodegree.rar/file 🔋 Size - 5.37 GB 🎭 Android Developer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/1xjj72a4851xyg8/%2540H4CKT3R_bot-Udacity-Android_Developer_Nanodegree.rar/file 🔋 Size - 6.24 GB 🎭 Data Scientist Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/upyxbzfejoevgsg/%2540H4CKT3R_bot-Udacity-Data_Scientist_Nanodegree.rar/file 🔋 Size -  7.80 GB 🎭 Intro to Programming Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/v3fg7zrqkpnkh4g/%2540H4CKT3R_bot-Udacity-Intro_to_Programming_Nanodegree_v3.rar/file 🔋 Size - 6.14 GB 🎭 Self Driving Car Engineer Nanodegree 🎭 🗃️ Link - https://www.mediafire.com/file/hscwk64oyix7ts1/%2540H4CKT3R_bot-Udacity-_Self_Driving_Car_Engineer_Nanodegree.rar/file 🔋 Size - 7.17 GB 🎁 Share Us For More - https://t.me/DigitalShieldLK
Show all...
Photo unavailableShow in Telegram
🌿SQL Injection Attack :: Explain in (සිංහල)🧑‍💻✍ හැඳින්වීම : අද අපි කතා කරන්න හිතුවේ SQL Injections ගැන. ඉතින් SQL Injections ගැන කතා කරන්න කලින් අපි දැනගන්න ඕනී මේ SQL කියන්නේ මොකක්ද කියන එක ගැන. Structured Query Language එහෙමත් නැත්තම් SQL කියලා කියන්නේ  Data Base වල Backend එකේ Data Manage කරන්න පුලුවන් Language එකක්. ඔයාලා දන්නවා ඇති Data Base එකක Data සාමාන්‍යෙන් Store වෙන්නේ Tables වල කියලා. ඉතින් මේ Store වෙන Data Manage කරන්නත්, මේ Tables Manage කරන්නත්  SQL භාවිතා වෙනවා. එහෙනම් දැන් අපි වැඩේට බහිමු (1) SQL Injection එකක් කියන්නේ මොකක්ද? (2) SQL Injection Types මොනවද? (3) කොහොමද මේ SQLI වැඩ කරන්නේ? (4) Hackers ලා ඇයි SQL Injection භාවිතා කරන්නේ? (5) SQL Injection Attack වලින් ආරක්ශා වෙන්නේ කොහොමද? 🟢 Full Post >>> . . Join our channel ✅ : @hack_kap0 Our community ✅ : @Hack_Kap Happy Hacking 🥷🏻 Copyright  Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
Show all...
Photo unavailableShow in Telegram
Hora Pusa NFSW AI Bot Up Again! You Can Create Beautiful Girls Using This Bot!. 👇👇👇👇 https://t.me/hora_pusa_ai_nfsw
Show all...
Repost from Digital Shield🛡
00:05
Video unavailableShow in Telegram
*Free Web Design Course Available🔥* *වෙබ් අඩවි නිර්මාණය ඉගෙනිමට කැමති ඔබත් අදම අප හා එක්වන්න,මෙම පාඨමාලාව නොමිලයෙ පවත්වනු ලබන අතර,ඉතා ගැඹුරු සිද්ධාන්ත සමග ඉගැන්වේ,ඔබගෙ යාලුවන්ව දැනුවත් කර ඔවුන් සමග දැනුම බෙදාගන්න.* *Are you interested in learning web design and creating your own website? This is a fantastic opportunity for you! In this course, you'll receive comprehensive and in-depth knowledge about web design. The best part is, it's completely free of charge. So, join us as we educate and empower others in the field of web design.* *💨Registration Form Link(Register Before 28 Of July)* *https://surveyheart.com/form/64aba0a877738d5f12c720aa* *💨Group Link(if you want a continue you'r registration join with Group)* *https://chat.whatsapp.com/BMMedtx9YuOCm8xrebTdl8* *By #Mr.Kaveesha_Rathnayaka* *© 2022 UE Production,All Right Reserved*
Show all...
Photo unavailableShow in Telegram
කෝල් ,මැසේජ් දදා කට්ටිය වද දෙනවද? කෝල් ,මැසේජ් එන නම්බර් වල තොරතුරු දැනගන්න ඕනිද? ඔයාට දැම් ඕනිම phone number එකක තොරතුරු අපගේ Telegram Bot සේවාව හරහා නොමිලේම සොයාගත හැක. දැනට පොඩි features ටිකක් තියෙන්නෙ ඉස්සරහට හදන්නම් හොදට🤓 👇👇👇 https://t.me/hp_contacts_bot
Show all...
කෝල් ,මැසේජ් දදා කට්ටිය වද දෙනවද? කෝල් ,මැසේජ් එන නම්බර් වල තොරතුරු දැනගන්න ඕනිද? ඔයාට දැම් ඕනිම phone number එකක තොරතුරු අපගේ Telegram Bot සේවාව හරහා නොමිලේම සොයාගත හැක. 👇👇👇 https://t.me/hp_contacts_bot
Show all...
Photo unavailableShow in Telegram
🌿Packets Storm Attack:Explain in (සිංහල)🧑‍💻✍ Cyber Warfare එක තුළ මේ Packets Storm Attack කියන එක විනාශකාරීම බලවේගයක් වෙලා තියෙනවා.ඉතින් මේ Article එකෙන් කතා කරමු Packets Storm Attack ගැන. 1) මොකක්ද මේ Packets Storm Attack කියලා කියන්නේ. 2) Packets Storm Attack වැඩ කරන්නේ කොහොමද ? 3) ඇයි Hackers ලා Packets Storm Attack use කරන්නේ 4) Packets Storm Attack ගැන Real-World Examples 5) කොහොමද මේවායෙන් ආරක්ශා වෙන්නේ 🟢 Read Full Article >>> 🌙🌿 Please react & comment to post "/ Writen By : @Kap_Official ================================== Join our channel ✅ : @hack_kap0 Our community ✅ : @Hack_Kap Happy Hacking 🥷🏻 Copyright  Ⓒ 2023 𝐇𝐀𝐂𝐊|𝐊𝐀𝐏
Show all...
Photo unavailableShow in Telegram
2024 ICT Networking සහේත්‍රා-දොම්පේ රැල්ලට ගොස් අමාරුවේ වැටීමට පෙර දැන්වත් හරි තැනට _එහෙනම් එන්න නොමිලේ networking හරියට ඉගෙන ගන්න._ ✅MCQ ප්‍රශ්න 8 ක් ,STRUCTURE අනු කොටස් දෙකක් සහ ESSAY 1 ප්‍රශ්නයක් ලේසියෙන් ම ගොඩ දා ගන්න ✅ 2023 සිසුන්ට ද සහබාගී විය හැක ✅ පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න 🎯 Be ready to become an IT expert, not just to get an A විමසීම් ☎ ⭕0767862124 ⭕https://wa.me/+94767862124
Show all...
Photo unavailableShow in Telegram
📍 *2025 A/L ICT Theory නව පන්ති ආරම්භය* Group Class With Individual Attention ජූලි 4 Tuesday 3.30PM to 5.30PM සිංහල & English Medium ✅ Theory සහ Practical දෙකම හරියටම, වෙනස්ම විදියකට Individual වගේ කරන Branded IT Group Class එක සාම්ප්‍රදායික IT class එකක් නොවන බව කරුණාවෙන් සලකන්න ✅ පොතට සීමා නොවී ක්ෂේශ්ත්‍රයේ ප්‍රවිණයෙකුගෙන් practical එක්ක හරියට ඉගෙන ගන්න IT වලට ආස ළමයි විතරක් එන පංතිය 🎯 Be ready to become an IT expert, not just to get an A SANKALPA WIJERATJNA bsc(hons)software engineering CCNA විමසීම් ☎ ⭕0767862124 ⭕https://wa.me/+94767862124 Join to the WhatsApp Group Below https://chat.whatsapp.com/KQ1RRGP4S2dK6IEEY08Lrg
Show all...
Photo unavailableShow in Telegram
Crypto Whale | VIP ✅ Free & VIP SINGLE Service එකක් අලුතින් පටන් ගත්තා 3 Signals Per Day Join වෙලාම බලන්න 🟢 Whatsapp Group https://chat.whatsapp.com/KSFzU3If9zACoSP0JbsJaR
Show all...
Photo unavailableShow in Telegram
100$ Free Airdrop!. ඔයාලට මේකට සතයක් වත් වියදම් වෙන්නෙ නෑ. ඔයාලට තියෙන්නෙ පල්ලෙහා link එකෙන් ගිහින් start ඔබලා ඒකෙ තියෙන විදියට කරන එක. එතකොට ඔයාලගෙ airdrop එක trust wallet එකට withdraw කරගන්න පුලුවන්. මේකට referral ඕනි වෙන්නෙත් නෑ. Twitter account එකක් විතරයි අවශ්‍ය. 👇👇👇👇 https://t.me/AIT_AIRDROP_BOT?start=TkH7nDUfS
Show all...
Repost from Digital Shield🛡
Here you go with the C code😏😝
Show all...
Repost from Digital Shield🛡
00:31
Video unavailableShow in Telegram
Temperature conversation programme in C 😜. Wanna try this😝
Show all...
Repost from Linux
Security: Gain awareness of essential Linux security practices, including user management, permissions, firewalls, and system updates. Understand the importance of keeping your Linux system secure. Linux security practices are vital for protecting your system from unauthorized access, vulnerabilities, and potential threats. Here are some essential Linux security practices to help you maintain a secure environment: 1. User Management: - Use strong passwords: Encourage users to use complex passwords that include a combination of uppercase and lowercase letters, numbers, and special characters. Consider implementing password policies or tools to enforce password strength. - Limit user privileges: Assign users the minimum necessary privileges to perform their tasks. Regularly review and revoke unnecessary privileges. - Disable or remove unused accounts: Remove or disable any user accounts that are no longer needed to reduce the potential attack surface. - Implement multi-factor authentication (MFA): Enable MFA for user authentication, which adds an extra layer of security by requiring additional verification beyond a password. 2. File Permissions and Ownership: - Set appropriate file permissions: Configure file and directory permissions to restrict access based on the principle of least privilege. Use chmod to set permissions (e.g., read, write, execute) for the owner, group, and others. - Manage file ownership: Ensure that files and directories are owned by the appropriate users and groups using the chown command. Restrict access to sensitive files by limiting ownership and permissions. 3. Firewall Configuration: - Configure a firewall: Use tools like iptables or firewalld to set up a firewall and define rules that control inbound and outbound network traffic. Restrict access to necessary services and ports, and regularly review and update firewall rules. 4. Regular System Updates: - Keep the system up to date: Install security patches and updates regularly to address vulnerabilities and bugs. Use the package manager (apt, yum, etc.) to update the system and its installed packages. 5. Security Auditing and Monitoring: - Monitor system logs: Regularly review system logs located in /var/log for any suspicious activities or error messages that could indicate security breaches or issues. - Implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) to monitor and alert you of potential security threats. - Use security auditing tools like lynis or OpenSCAP to scan the system for vulnerabilities and compliance with security best practices. 6. Security Awareness: - Educate users: Promote security awareness among users and provide training on best practices such as avoiding phishing emails, practicing safe browsing habits, and being cautious with file downloads. - Stay informed: Keep up to date with Linux security news, vulnerabilities, and security advisories relevant to your distribution. Subscribe to security mailing lists or follow reputable sources for timely information. Maintaining a secure Linux system requires ongoing effort and vigilance. Regularly review and update security practices to adapt to evolving threats and new vulnerabilities. Consult official documentation, security resources, and community forums to stay informed about the latest security recommendations for your specific Linux distribution. ©GameSploit #gamesploit Channel :- https://t.me/linux444 Group :- https://t.me/linux555 Join our Linux community and discover a world of endless possibilities with open-source technology!
Show all...
Repost from Linux
System Monitoring and Maintenance: Explore tools and techniques for monitoring system performance, managing processes, and troubleshooting common issues in Linux. Learn about log files, system resource monitoring, and package updates. System monitoring and maintenance are essential tasks for keeping a Linux system running smoothly. Here are some tools and techniques to help you monitor system performance, manage processes, and troubleshoot common issues in Linux: 1. Resource Monitoring: - top: The top command displays real-time information about system resource usage, including CPU, memory, and processes. It allows you to monitor and manage running processes. - htop: Similar to top, htop provides an interactive and enhanced view of system resources and processes, with options for sorting, searching, and filtering. - vmstat: The vmstat command reports virtual memory statistics, providing insights into system memory, swap, and CPU usage. 2. Log Files: - /var/log: Linux systems store log files in the /var/log directory. Common log files include /var/log/syslog, /var/log/messages, and /var/log/auth.log. Monitoring log files helps identify errors, warnings, and system events. - tail: The tail command allows you to view the last few lines of a log file, providing a real-time update of log activity. For example, tail -f /var/log/syslog continuously displays new log entries as they are added. 3. Process Management: - ps: The ps command displays information about running processes, including their process IDs (PIDs), resource usage, and parent-child relationships. For example, ps aux lists all running processes. - kill: The kill command terminates a process using its PID. For example, kill PID terminates the process with the specified PID. The killall command allows you to kill processes by name. 4. Package Updates: - Package Managers: Use the package management tools discussed earlier (APT or YUM) to update software packages. For example, sudo apt update && sudo apt upgrade updates all packages on an Ubuntu system. - Unattended Upgrades: Configure the system to automatically install security updates using tools like unattended-upgrades (Debian-based) or yum-cron (Red Hat-based). This ensures that critical security patches are applied automatically. 5. Performance Monitoring Tools: - sar: The sar command collects and reports system performance data, including CPU, memory, disk I/O, and network usage. It helps identify performance bottlenecks and historical trends. - iostat: The iostat command provides input/output statistics for devices and partitions, helping identify disk I/O performance issues. - nmon: The nmon command provides a comprehensive view of system resources, including CPU, memory, disk, network, and file system utilization. It displays real-time and historical data in a user-friendly format. Regularly monitoring system performance, managing processes, and staying up to date with package updates are essential for maintaining a stable and secure Linux system. Explore additional monitoring tools and techniques based on your specific requirements and system setup. Remember to consult the relevant man pages, distribution documentation, or online resources for detailed usage instructions and options specific to the tools mentioned above. ©GameSploit #gamesploit Channel :- https://t.me/linux444 Group :- https://t.me/linux555 Join our Linux community and discover a world of endless possibilities with open-source technology!
Show all...
Repost from Linux
Networking: Understand basic networking concepts in Linux, including IP addressing, network configuration, and troubleshooting network connectivity issues. Learn how to use tools like ifconfig, ping, and netstat. Networking is a fundamental aspect of Linux system administration. Understanding basic networking concepts and utilizing essential tools can help you configure and troubleshoot network connectivity. Here are some key networking topics and tools in Linux: 1. IP Addressing: - IP address: An IP address uniquely identifies a device on a network. Learn about IPv4 and IPv6 addressing schemes and how to assign static or dynamic IP addresses to your Linux system. - Subnetting: Understand subnetting to divide a network into smaller subnetworks. 2. Network Configuration: - ifconfig: The ifconfig command displays and configures network interfaces, including assigning IP addresses, enabling or disabling interfaces, and modifying network settings. - ip command: In recent Linux distributions, the ip command is replacing ifconfig. It provides more advanced functionalities for managing network interfaces, routing, and other network-related tasks. 3. Network Connectivity: - ping: The ping command is used to check network connectivity between your Linux system and another device by sending ICMP echo request packets. - traceroute: The traceroute command traces the path packets take from your system to a destination host, showing the IP addresses and response times of intermediate hops. - netstat: The netstat command displays active network connections, listening ports, routing tables, and various network statistics. 4. DNS (Domain Name System): - DNS resolution: Understand how DNS works and how Linux systems resolve domain names to IP addresses. Learn how to configure DNS servers and troubleshoot DNS-related issues. - nslookup and dig: The nslookup and dig commands are used to query DNS servers and retrieve information about domain names, IP addresses, and DNS records. 5. Firewall and Security: - iptables: The iptables command is a powerful tool for configuring firewall rules to filter network traffic, control access, and enhance system security. - firewalld: In modern Linux distributions, firewalld is often used as a frontend for managing firewall rules. It provides a more user-friendly and dynamic interface. 6. Network File Sharing: - NFS (Network File System): Learn how to configure NFS to share files and directories across a network. - Samba: Explore Samba to enable file and printer sharing between Linux and Windows systems. 7. Network Troubleshooting: - tcpdump: The tcpdump command captures and analyzes network packets, helping diagnose network issues and investigate network traffic. - Wireshark: Wireshark is a graphical packet analyzer that allows you to capture, inspect, and analyze network packets in real-time. Mastering networking concepts and tools takes practice and hands-on experience. Additionally, online resources, Linux networking tutorials, and forums dedicated to networking topics can provide further guidance and practical examples to deepen your understanding of Linux networking. ©GameSploit #gamesploit Channel :- https://t.me/linux444 Group :- https://t.me/linux555 Join our Linux community and discover a world of endless possibilities with open-source technology!
Show all...
Repost from Linux
Shell Scripting: Get started with shell scripting using bash (Bourne Again Shell) or another shell. Learn how to write simple scripts to automate tasks and perform repetitive actions. Shell scripting is a powerful way to automate tasks and perform repetitive actions in Linux. The Bash shell (Bourne Again Shell) is one of the most common shells used in Linux systems. Here are some basics to help you get started with shell scripting: 1. Script Creation: - Choose a text editor: Use a text editor such as nano, vim, or gedit to create and edit your shell scripts. For example, nano script.sh. - Set the script's interpreter: Begin your script with a shebang line that specifies the interpreter. For Bash scripts, use #!/bin/bash. 2. Variables: - Variable assignment: Assign values to variables using the syntax variable_name=value. For example, name="John". - Variable usage: Access variable values using the $ prefix. For example, echo "Hello, $name!". 3. Comments: - Add comments: Use the # symbol to add comments in your script. Comments are ignored by the interpreter but provide explanations for human readers. 4. Command Execution: - Run commands: Execute commands within your script using backticks (\`) or the $() syntax. For example, output=`ls -l" or output=$(ls -l). 5. Control Structures: - If statements: Use conditional statements (if, elif, else) to perform different actions based on specific conditions. For example:
bash
     if [ $age -ge 18 ]; then
         echo "You are an adult."
     else
         echo "You are a minor."
     fi
     

- Loops: Utilize loops (for, while) to repeat actions. For example:
bash
     for i in 1 2 3; do
         echo $i
     done
     

6. Input and Output: - Read user input: Use the read command to accept user input and assign it to variables. For example, read -p "Enter your name: " name. - Print output: Use the echo command to display output on the terminal. For example, echo "Hello, World!". 7. File Operations: - Read and write files: Use commands like cat, grep, sed, and awk to read and manipulate files within your script. 8. Running Scripts: - Make the script executable: Use the chmod command to make your script executable. For example, chmod +x script.sh. - Execute the script: Run the script using ./script.sh or bash script.sh. Remember to test and validate your scripts before using them on important tasks. Start with simple scripts and gradually build complexity as you gain more experience with shell scripting. Refer to shell scripting guides, tutorials, and documentation for more in-depth knowledge. Shell scripting is a vast topic, and exploring additional concepts like functions, error handling, and regular expressions will expand your scripting capabilities. Practice, experiment, and leverage online resources to enhance your shell scripting skills. ©GameSploit #gamesploit Channel :- https://t.me/linux444 Group :- https://t.me/linux555 Join our Linux community and discover a world of endless possibilities with open-source technology!
Show all...