Собираю кластер на миниПК в корпусе


Группа ВК: vk.com/electronics_in_camera
Инстаграм: www.instagram.com/electronics_in_focus/
Инстаграм OGG: www.instagram.com/explore/tags/4techrev/

Часть 2 про кластер (ПО): www.youtube.com/watch?v=9Y5hVDt7S2U

Ссылки на комплектующие:
1) Nano Pi NEO2: www.friendlyarm.com/index.php?route=product/product

Игровой Lamborghini за 1.800$ / Мощь из прошлого / Показываю на что способен


Второй канал — goo.gl/VfzFJ6
Группа канала ВК — vk.com/murkmurkov
Инста — www.instagram.com/maddy_murk/
Музыка из видео — vk.com/c152music
— Всем привет дорогие друзья! Сегодня у нас новый видос с крутым и редким ноутбуком из прошлого, Asus Lamborghini VX2S.
Да, настоящий ноутбук созданный в коллаборации с брендом премиум автомобилей Ламборгини совместно с компанией ASUS.
Отличный и годный ноутбук, на момент своего выхода 2008-2009 годы.
Ноутбук покупался практически за 54.000 рублей, это была просто огромная сумма на тот момент времени, поэтому комплект ноутбука очень богатый, а сам ноутбук прошит кожей с красивой желтой строчкой.
Надеюсь, вам будет интересен данный редкий экземпляр, поэтому не забывайте ставить лайки, писать свои комментарии и конечно же подписываться.
— Таймкоды —
0:00 — Вступление
2:37 — Распаковка и комплектация
8:29 — Мышь и док станция
10:58 — Распаковка ноутбука
14:20 — Крутые фишки ноута
16:28 — Вебкамера
17:34 — Интерфейсы
18:30 — Самая крутая фишка
19:10 — Включение и сканер отпечатков
21:35 — Дисплей
23:22 — Тесты синтетика
25:04 — GTA IV
26:17 — STALKER
27:18 — HALFLIFE 2
27:58 — NFS U2
28:41 — TES V
29:25 — Интернет и ютуб
30:39 — Заключение

Top 10 Wireshark Filters


In this video, we cover the top 10 Wireshark display filters in analyzing network and application problems.

In short, the filters are here:
ip.addr == 10.0.0.1
tcp or dns
tcp.port == 443
tcp.analysis.flags
!(arp or icmp or dns)
follow tcp stream
tcp contains facebook
http.response.code == 200
http.request
tcp.flags.syn == 1

Like/Share/Subscribe for more Wireshark content!

----------------------FREE ON DEMAND TRAINING — Learn some new Wireshark tricks with my hands-on courses on Pluralsight.
Check out the free 10-Day Trial so you can watch them all. Just hit one of the links below.

Getting Started with Wireshark (Intro Course) — bit.ly/wiresharkprotocols
Foundational TCP with Wireshark — bit.ly/wiresharktcp
Mastering TCP with Wireshark — bit.ly/mastertcp
Troubleshooting Slow Networks with Wireshark — bit.ly/wiresharktshoot
Visualizing Network Traffic with Wireshark — bit.ly/wiresharkgraphs

——————- Essential TCP/IP Book for Analysts——————————
TCP/IP Illustrated, Volume 1: The Protocols (2nd Edition)
amzn.to/32l6Czg

— Books for Wireshark Beginners — amzn.to/3jeu349 — Practical Packet Analysis (Chris Sanders)
amzn.to/3gnhtgZ — Wireshark 101: Essential Skills (Laura Chappell)
amzn.to/2CVavSR — Learn Wireshark (Lisa Bock)

-------------------LIVE WIRESHARK TRAINING — Open enrollment Wireshark Course — Network Analysis Fundamentals — Two Days Remote via Zoom.
Check it out here — bit.ly/wiresharkintro

— Trace File Analysis Services — Got packet problems that you need help digging into?
www.packetpioneer.com/contact

Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk


Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subjects computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And «normal people» shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet. While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data. Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the «whois» system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools. Come join Micah as he examines how to move beyond «Googling it» in your personal and professional lives.

Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.

Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micahs SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and hes been a SANS Certified Instructor since 2013. Hes the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.

Moving Past Just Googling It: Harvesting and Using OSINT | SANS@MIC Talk


Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subjects computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And «normal people» shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet.

While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data.

Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the «whois» system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools.

Come join Micah as he examines how to move beyond «Googling it» in your personal and professional lives.

Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.

Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micahs SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and hes been a SANS Certified Instructor since 2013. Hes the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.

№294 - Наш печальный опыт судов по получению долгов и борьбы с недобросовестными клиентами в ИТ


Занимаясь бизнесом вы так или иначе столкнетесь с судебными претензиями, или сами подадите в суд в случае неплатежей. В этом видео делюсь нашим честным опытом судебных дел, хотя это самое крайнее что могу посоветовать — лучше договариваться…

Наши проекты:

Разработка мобильных приложений notissimus.com

Мониторинг цен конкурентов xmldatafeed.com

Защита от скликивания рекламы

Мы в социальных сетях:

youtube.com/c/maximkulgin

www.facebook.com/mkulgin

www.linkedin.com/in/mkulgin

How to be anonymous on the web? Tor, Dark net, Whonix, Tails, Linux


You can now support me on www.patreon.com/thehatedone and get access to more exclusive content.

Why should you become anonymous? And how can you even be anonymous on the web? Watch to learn how to use essential anonymity tools to become anonymous on the web.

If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at nordvpn.org/thehatedone or use my coupon code thehatedone at the checkout to save 75%!

In this online anonymity tutorial, you will learn what it means to be anonymous on the web, how to use essential anonymity tools, and you’ll learn some tips and habits to help you protect your online anonymity even better.

You will learn how to use Tor and install and run Tor Browser.
Youll discover how to install Whonix and how it can help you become anonymous even more.
Well learn how to install Tails and boot from a live USB.
Youll be introduced to Linux, mostly PureOS, Trisquel and Linux Mint Cinnamon.

Online anonymity is not something that’s just for criminals or persecuted individuals. It’s important if you don’t want a record of your interests, preferences, searches, emails, messages, contacts, browsing history, and social media activity stored indefinitely on remote data centers.

Bitcoin:
1C7UkndgpQqjTrUkk8pY1rRpmddwHaEEuf

Dash
Xm4Mc5gXhcpWXKN84c7YRD4GSb1fpKFmrc

Litecoin
LMhiVJdFhYPejMPJE7r9ooP3nm3DrX4eBT

Ethereum
0x6F8bb890E122B9914989D861444Fa492B8520575

All the tools for anonymity on the web:
Tor Browser Bundle
www.torproject.org/
DuckDuckGo onion address 3g2upl4pq6kufc4m.onion/

Tails
tails.boum.org/

NoScript Tutorial
www.youtube.com/watch?v=AC4ALEKZRfg

Whonix
www.whonix.org/
VirtualBox www.virtualbox.org/

Orbot, Orfox, and F-Droid
guardianproject.info/apps/

LineageOS lineageos.org/

PureOS www.pureos.net
Trisquel trisquel.info/
Linux Mint linuxmint.com/

Qubes OS
www.qubes-os.org/

Free encrypted cloud storage
nextcloud.com/

Sources:
On online anonymity www.whonix.org/wiki/Documentation
SPYING
www.washingtonpost.com/business/technology/google-tracks-consumers-across-products-users-cant-opt-out/2012/01/24/gIQArgJHOQ_story.html?noredirect=on
www.theguardian.com/technology/2016/oct/21/how-to-disable-google-ad-tracking-gmail-youtube-browser-history
www.theguardian.com/technology/2015/jun/23/google-eavesdropping-tool-installed-computers-without-permission
news.softpedia.com/news/microsoft-edge-sends-browsing-history-to-microsoft-how-to-block-it-490684.shtml
adexchanger.com/data-exchanges/a-marketers-guide-to-cross-device-identity/
www.recode.net/2016/6/14/11926124/facebook-ads-track-store-visits-retail-sales
www.zdnet.com/article/facebook-turns-user-tracking-bug-into-data-mining-feature-for-advertisers/
techcrunch.com/2017/03/07/facebook-advanced-measurement/
www.propublica.org/article/google-has-quietly-dropped-ban-on-personally-identifiable-web-tracking

Lobbying
www.wsj.com/articles/tech-executives-warn-of-overregulation-in-privacy-push-1537987795?mod=pls_whats_news_us_business_f
www.recode.net/2018/4/22/17267740/facebook-record-lobbying-spending-tech-companies-amazon-apple-google
theintercept.com/2018/09/28/california-privacy-law-big-tech/
www.theregister.co.uk/2011/05/05/google_backs_do_not_track_opposition/
arstechnica.com/tech-policy/2017/05/google-and-facebook-lobbyists-try-to-stop-new-online-privacy-protections/
www.recode.net/2017/10/21/16512414/apple-amazon-facebook-google-tech-congress-lobbying-2017-russia-sex-trafficking-daca
news.softpedia.com/news/Facebook-to-Follow-Google-Microsoft-in-Cutting-Ties-with-Conservative-Lobby-Group-ALEC-459747.shtml

The Chinese Google search engine
theintercept.com/2018/09/14/google-china-prototype-links-searches-to-phone-numbers/

Music by Chuki Beats www.youtube.com/user/CHUKImusic

Follow me:
twitter.com/The_HatedOne_
www.bitchute.com/TheHatedOne/
www.reddit.com/r/thehatedone/
www.minds.com/The_HatedOne

The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.

✅Усиление WiFi. 5 способов доступных каждому.


◆ Мощный WiFi роутер — ali.pub/qfrp3
◆ Надёжный USB адаптер — ali.pub/khlxi
◆ Стабильный Wi-Fi ретранслятор — ali.pub/cke4r
◆ WiFi адаптер всего за 160 рублей — ali.pub/nxcfu
▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰
В этом ролике показаны 5 простых надёжных и проверенных нами способа, как усилить радиус действия WiFi, и увеличить скорость беспроводной сети.
1- Расположение,
2- Каналы,
3- WiFi адаптер,
4- WiFi репитер,
5- Рефлектор.
▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰
► Группа ВКонтакте — vk.com/kreosann
► Александр Крюков — vk.com/kreosan
► Павел Павлов — vk.com/kreosannn
═══════════════════════════════════

У нас ещё много идей, но в связи с положением в нашем городе Луганске, катастрофически не хватает финансов. Но ты, наш зритель, можешь помочь нам, в наших опытах. Можешь не сомневаться, на нашем канале тебя ждут грандиозные эксперименты и невероятные открытия! С твоей поддержкой видео будут выходить гораздо чаще! Будем рады любой помощи.
— PayPal: kreosan@list.ru
— QIWI кошелек: 380509411337
— Яндекс кошелек: 410012480761910
— Сбербанк России: 4817 7600 2050 5032
— WebMoney: R222480076424, Z176331835879

Анализатор Wi-Fi сетей: compmastera.com/wifi-router-modem/analizator-wi-fi-setej-vybiraem-samyj-bystryj-i-vysokochastotnyj-kanal/
InnSider:http://freesoft.ru/inssider
Анализатор сетей для Android: wifi-analyzer.ru.uptodown.com/android
На нашем канале видео про необычные эксперименты с электричеством, опыты и изобретения. Здесь мы делимся новыми идеями, отличающимися от привычного мышления большинства. Подпишись, и ты узнаешь много интересного! www.youtube.com/user/kreosan Делись своими идеями в нашей группе: vk.com/kreosann

Что такое сервер? Какие они вообще бывают для Java?


Что такое сервер? Какие они вообще бывают для Java?
GRASP and GoF Design patterns Advanced On-line Course- bit.ly/39v8Grk
Курсы JAVA — bit.ly/2QabpOV
Курсы C#/.NET — bit.ly/2sygAPT
Курсы ANDROID С НУЛЯ — bit.ly/2ZErRu6
Курсы Automation QA (Java) — bit.ly/2SErXjZ
Курсы FRONT-END — bit.ly/2MIRcOf
Курсы UI/UX дизайна — bit.ly/2SAArZo
Курсы WordPress Developer — bit.ly/2sALPcX
Сайт Foxminded: bit.ly/2MH4YB2
Foxminded в ФБ: www.facebook.com/foxmindedco
FoxmindEd в Instagram: www.instagram.com/foxminded.ua/

Мой Telegram: t.me/nemchinskiyOnBusiness

Мой блог: www.nemchinsky.me