Второй канал — goo.gl/VfzFJ6
Группа канала ВК — vk.com/murkmurkov
Инста — www.instagram.com/maddy_murk/
Музыка из видео — vk.com/c152music
— Всем привет дорогие друзья! Сегодня у нас новый видос с крутым и редким ноутбуком из прошлого, Asus Lamborghini VX2S.
Да, настоящий ноутбук созданный в коллаборации с брендом премиум автомобилей Ламборгини совместно с компанией ASUS.
Отличный и годный ноутбук, на момент своего выхода 2008-2009 годы.
Ноутбук покупался практически за 54.000 рублей, это была просто огромная сумма на тот момент времени, поэтому комплект ноутбука очень богатый, а сам ноутбук прошит кожей с красивой желтой строчкой.
Надеюсь, вам будет интересен данный редкий экземпляр, поэтому не забывайте ставить лайки, писать свои комментарии и конечно же подписываться.
— Таймкоды —
0:00 — Вступление
2:37 — Распаковка и комплектация
8:29 — Мышь и док станция
10:58 — Распаковка ноутбука
14:20 — Крутые фишки ноута
16:28 — Вебкамера
17:34 — Интерфейсы
18:30 — Самая крутая фишка
19:10 — Включение и сканер отпечатков
21:35 — Дисплей
23:22 — Тесты синтетика
25:04 — GTA IV
26:17 — STALKER
27:18 — HALFLIFE 2
27:58 — NFS U2
28:41 — TES V
29:25 — Интернет и ютуб
30:39 — Заключение
In this video, we cover the top 10 Wireshark display filters in analyzing network and application problems.
In short, the filters are here:
ip.addr == 10.0.0.1
tcp or dns
tcp.port == 443
tcp.analysis.flags
!(arp or icmp or dns)
follow tcp stream
tcp contains facebook
http.response.code == 200
http.request
tcp.flags.syn == 1
Like/Share/Subscribe for more Wireshark content!
----------------------FREE ON DEMAND TRAINING — Learn some new Wireshark tricks with my hands-on courses on Pluralsight.
Check out the free 10-Day Trial so you can watch them all. Just hit one of the links below.
-------------------LIVE WIRESHARK TRAINING — Open enrollment Wireshark Course — Network Analysis Fundamentals — Two Days Remote via Zoom.
Check it out here — bit.ly/wiresharkintro
Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subjects computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And «normal people» shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet. While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data. Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the «whois» system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools. Come join Micah as he examines how to move beyond «Googling it» in your personal and professional lives.
Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.
Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micahs SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and hes been a SANS Certified Instructor since 2013. Hes the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.
Every single day we use search engines to look for things on the internet. Defenders research a domain or IP that contains malware. Attackers look for email addresses for an upcoming phishing campaign. DFIR people examine locations and usernames that they acquired from a subjects computer. Policy and compliance people examine the risk that employees in their organizations might bring to work. Recruiters scour the internet looking for candidates. And «normal people» shop, date, geolocate, post, tweet, and otherwise send a huge amount of data to the public internet.
While search engines harvest, store, and index billions of web site data points every day, there is much they do not contain. These pieces of OSINT data can, when put in perspective and analyzed, reveal target geolocations, friends and associates, alcohol consumption, user passwords, and more. This talk will be a series of hands on, live demos where we put our OSINT skills to work in unconventional places to harvest this unindexed OSINT data.
Using free web sites, built in web browser tools, and free python scripts, Micah will show attendees how to harvest data from social media applications, the «whois» system, and from breach data that will not appear in search engine results. Students will gain a better understanding of JSON, APIs, reverse whois, and how to run python tools.
Come join Micah as he examines how to move beyond «Googling it» in your personal and professional lives.
Speaker Bio
Micah Hoffman has been active in the information technology field since 1998, working with federal government, commercial, and internal customers to discover and quantify cybersecurity weaknesses within their organizations. As a highly active member of the cybersecurity and OSINT communities, Micah uses his real-world Open-Source Intelligence (OSINT), penetration testing, and incident response experience to provide customized solutions to his customers and comprehensive instruction to his students.
Over the years, Micah has conducted cyber-related tasks like penetration testing, OSINT investigations, APT hunting, and risk assessments for government, internal, and commercial customers. Micahs SANS coursework, cybersecurity expertise, and inherent love of teaching eventually pulled him toward an instructional role, and hes been a SANS Certified Instructor since 2013. Hes the author of the SANS course SEC487: Open Source Intelligence Gathering and Analysis, and also teaches both SEC542: Web App Penetration Testing and Ethical Hacking and SEC567: Social Engineering for Penetration Testers.
Занимаясь бизнесом вы так или иначе столкнетесь с судебными претензиями, или сами подадите в суд в случае неплатежей. В этом видео делюсь нашим честным опытом судебных дел, хотя это самое крайнее что могу посоветовать — лучше договариваться…
Why should you become anonymous? And how can you even be anonymous on the web? Watch to learn how to use essential anonymity tools to become anonymous on the web.
If you like to protect yourself on the web and want to support my channel, sign up for NordVPN at nordvpn.org/thehatedone or use my coupon code thehatedone at the checkout to save 75%!
In this online anonymity tutorial, you will learn what it means to be anonymous on the web, how to use essential anonymity tools, and you’ll learn some tips and habits to help you protect your online anonymity even better.
You will learn how to use Tor and install and run Tor Browser.
Youll discover how to install Whonix and how it can help you become anonymous even more.
Well learn how to install Tails and boot from a live USB.
Youll be introduced to Linux, mostly PureOS, Trisquel and Linux Mint Cinnamon.
Online anonymity is not something that’s just for criminals or persecuted individuals. It’s important if you don’t want a record of your interests, preferences, searches, emails, messages, contacts, browsing history, and social media activity stored indefinitely on remote data centers.
The footage and images featured in the video were for critical analysis, commentary and parody, which are protected under the Fair Use laws of the United States Copyright act of 1976.
◆ Мощный WiFi роутер — ali.pub/qfrp3
◆ Надёжный USB адаптер — ali.pub/khlxi
◆ Стабильный Wi-Fi ретранслятор — ali.pub/cke4r
◆ WiFi адаптер всего за 160 рублей — ali.pub/nxcfu
▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰
В этом ролике показаны 5 простых надёжных и проверенных нами способа, как усилить радиус действия WiFi, и увеличить скорость беспроводной сети.
1- Расположение,
2- Каналы,
3- WiFi адаптер,
4- WiFi репитер,
5- Рефлектор.
▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰▰
► Группа ВКонтакте — vk.com/kreosann
► Александр Крюков — vk.com/kreosan
► Павел Павлов — vk.com/kreosannn
═══════════════════════════════════
У нас ещё много идей, но в связи с положением в нашем городе Луганске, катастрофически не хватает финансов. Но ты, наш зритель, можешь помочь нам, в наших опытах. Можешь не сомневаться, на нашем канале тебя ждут грандиозные эксперименты и невероятные открытия! С твоей поддержкой видео будут выходить гораздо чаще! Будем рады любой помощи.
— PayPal: kreosan@list.ru
— QIWI кошелек: 380509411337
— Яндекс кошелек: 410012480761910
— Сбербанк России: 4817 7600 2050 5032
— WebMoney: R222480076424, Z176331835879