0.00
0 читателей, 4798 топиков

Most Secure, Private and Usable Linux Distro


Discussing the different Linux distros that are focused on security and privacy but can be used as a daily driver. Which ones are the best and the most usable? What are the problems affecting their usability and how to fix that?

Im the Internet Privacy Guy. Im a public interest technologist. Im here to educate. You are losing your Internet privacy and Internet security every day if you dont fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN, antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. Im a licensed HAM operator.

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

bytzVPN.com Premium VPN with Cloud-Based TOR Routing

whatthezuck.net Cybersecurity Reference

brax.me Privacy Focused Social Media — Open Source — Encrypted Communications

rob.brax.me Store for BytzVPN, BraxWifi Router, and merchandise

Nmap Tutorial For Beginners - 1 - What is Nmap?


Welcome to Nmap for beginners! Nmap («Network Mapper») is a free and open source (license) utility for network discovery and security auditing.

Our Courses:
Python For Ethical Hacking — Develop Your Own Scripts: www.udemy.com/course/the-complete-python-3-developer-course/?couponCode=TCP3DC2019

The Complete Ethical Hacking Bootcamp: www.udemy.com/course/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019

OS Compatibility: Linux,Windows

The Art of Code - Dylan Beattie


Software and technology has changed every aspect of the world we live in. At one extreme are the ‘mission critical’ applications — the code that runs our banks, our hospitals, our airports and phone networks. Then there’s the code we all use every day to browse the web, watch movies, create spreadsheets… not quite so critical, but still code that solves problems and delivers services.

But what about the code that only exists because somebody wanted to write it? Code created just to make people smile, laugh, maybe even dance? Maybe even code that does nothing at all, created just to see if it was possible?

Join Dylan Beattie — programmer, musician, and creator of the Rockstar programming language — for an entertaining look at the art of code. We’ll look at the origins of programming as an art form, from Conways Game of Life to the 1970s demoscene and the earliest Obfuscated C competitions. We’ll talk about esoteric languages and quines — how DO you create a program that prints its own source code? We’ll look at quine relays, code golf and generative art, and we’ll explore the phenomenon of live coding as performance — from the pioneers of electronic music to modern algoraves and live coding platforms like Sonic Pi.

Check out more of our talks, courses, and conferences in the following links:
ndcconferences.com/
ndc-london.com/

Metasploit For Beginners - #1 - The Basics - Modules, Exploits


Hey, guys HackerSploit here, back again with another video. In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Our Courses:
Python For Ethical Hacking — Develop Your Own Scripts: www.udemy.com/course/the-complete-python-3-developer-course/?couponCode=TCP3DC2019

The Complete Ethical Hacking Bootcamp: www.udemy.com/course/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019

I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog.

HackerSploit Blog: hsploit.com/

✔️SOCIAL NETWORKS
— Facebook: www.facebook.com/HackerSploit/
Twitter: twitter.com/HackerSploit
Patreon: patreon.com/hackersploit
— Thanks for watching!
Благодаря за гледането
感谢您观看
Merci davoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
देखने के लिए धन्यवाद

How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous


How to setup Proxychains in Kali Linux to stay anonymous while hacking. Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
proxychains — a tool that forces any TCP connection made by any given application. to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: «user/pass» for SOCKS4/5, «basic» for HTTP. proxyresolv — DNS resolving. Used to resolve host names via proxy or TOR.

Links:
Kali Linux: www.google.com/url?sa=t

CSI LINUX - монстр для пробива. Операционная система OSINT разведки.


Все ссылки в Telegram:
t.me/black_triangle_tg/662
=====

«Спасти мир» и поддержать канал можно тутЬ:
DonationAlerts: www.donationalerts.com/r/black_triangl
Boosty: boosty.to/black_triangle
Анонимно криптовалютами: notabug.org/Black_Triangle/safe_world

=====
t.me/aliexpress_hacker — хакерское с AliExpress
t.me/komp_ali — компьютерное барахло с Ali
t.me/hi_anon — личный блог
t.me/open_source_friend — интересный софт
www.youtube.com/channel/UCYf_gVlTuMFodRQDsxUdAYg
=====
#OSINT #CSI_LINUX #Черный_треугольник
=====
Автор музыки из видео: «Стереополина» lnk.to/stereopolina

Анонимность Tor — миф и реальность


0x1.tv/20161028BI

Анонимность Tor — миф и реальность (Александр Лазаренко, SECR-2016)
* Александр Лазаренко

— В докладе будут рассмотрены механизмы обеспечения пользовательской приватности в сети Tor, а так же, методы деанонимизации, созданные с целью компрометирования пользователей.

Доклад рассчитан на аудиторию, интересующуюся технологиями обеспечения приватности и просто любопытных людей, которые хотят послушать про интересные штуки, которые доступны в сети.

Проблемы загрузки, установки Tails OS, Qubes OS, GNU/Linux...


В случае с Tails, если у вас графическая карта geforce, вам может помочь внесение:
nouveau.modeset=0
или
nouveau.noaccel=1
Если у вас карта от Radeon:
radeon.modeset=0
Для Qubes OS:
nouveau.modeset=0 rd.driver.blacklist=nouveau video=vesa:off
Ссылки
intel managment engine: ru.wikipedia.org/wiki/Intel_Management_Engine
youtu.be/Tiohs-bvEZw SunbooK
youtu.be/GhRyWFUeuzE Свободные альтернативы БИОС/UEFI
youtu.be/z8vgdn_6DgE Настройка GNU/Linux Debian и утилита для оптимизации энергозатрат графическими картами
6:52