InfoSecTube
🟢 Z-Library eBook site domains seized by U.S. Dept of Justice 🔴 دامنه های سایت Z-library ، یکی از سایتهایی که ازش کتاب و مقاله و مجلات رو دانلود می کردیم، توسط وزارت دادگستری آمریکا مصادره شده. 🥺توقیف این سایتها توسط FBI و دفتر دادستانی ایالات متحده در ناحیه…
@firstlibrarybot
این ربات سایت Zlibrary هست و اگر میخواین اکانتتون رو بهش متصل کنید باید یک بار به آدرس بالا برید و بعد اون همه کتاب ها رو از تلگرام دانلود کنید.
👈 برای متصل کردن این ربات به اکانتتون قبلا نیاز بود که وارد تور بشید. اما با این آدرس میتونید بدون تور اکانتتون رو به ربات وصل کنید و کتاب های زیر 50 مگابایت رو دانلود کنید . در هر صورت شما برای دانلود کتاب های بالای 50 مگابایت نیاز به تور دارید چون فایلش در تلگرام ارسال نمیشه.
https://singlelogin.me/
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
این ربات سایت Zlibrary هست و اگر میخواین اکانتتون رو بهش متصل کنید باید یک بار به آدرس بالا برید و بعد اون همه کتاب ها رو از تلگرام دانلود کنید.
👈 برای متصل کردن این ربات به اکانتتون قبلا نیاز بود که وارد تور بشید. اما با این آدرس میتونید بدون تور اکانتتون رو به ربات وصل کنید و کتاب های زیر 50 مگابایت رو دانلود کنید . در هر صورت شما برای دانلود کتاب های بالای 50 مگابایت نیاز به تور دارید چون فایلش در تلگرام ارسال نمیشه.
https://singlelogin.me/
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
InfoSecTube
مجموعه ۳-۴) شامل اسناد مختلف مهندسی پیمانکاران پروژه پارس جنوبی - فاز ۲۲-۲۳-۲۴ part01: https://anonfiles.com/Oavch1Idyd/sp2224-four.part01_rar shasum: 00422a6d93d3cfe94edd5dc0df0e20174d74b024 part02: https://anonfiles.com/v091h5I1y3/sp2224-four.part02_rar…
مجموعه ۴-۱) شامل اسناد مختلف مهندسی پیمانکاران پروژههای پارس جنوبی
part01: https://anonfiles.com/w0P6sbI9y5/sp-doc-one.part01_rar
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
part01: https://anonfiles.com/w0P6sbI9y5/sp-doc-one.part01_rar
shasum: 2290fe5f3b9ae60532639b7f82b9560242b829bfpart02: https://anonfiles.com/h1O5sdI3yc/sp-doc-one.part02_rar
shasum: 9bf5bff68d78d2028a12a12e55c366337c8aca4fpart03: https://anonfiles.com/03NbsaI9y8/sp-doc-one.part03_rar
shasum: 733bbc2bb7f9d59c789f9f7f6f2e671d47c9c303part04: https://anonfiles.com/b4G7s5Icyf/sp-doc-one.part04_rar
shasum: 432591feed8afa7625d0ab266759f72ea47176c2part05: https://anonfiles.com/22G8s9I5yf/sp-doc-one.part05_rar
shasum: 9f6e871921a6aa7b80969a96d5ea2f0695b26a8apart06: https://anonfiles.com/ocS2s8I1y5/sp-doc-one.part06_rar
shasum: 1ef8c98e23b54f70dd1429c5949e8e6cf11fa346part07: https://anonfiles.com/mbSfs9I9yd/sp-doc-one.part07_rar
shasum: 1459cb65c769632d2bdb59dba9d4369d8e8cdeebpart08: https://anonfiles.com/X6m6t5I3yb/sp-doc-one.part08_rar
shasum: 553002fedd4828fab03cde054a42f95b380f161fpart09: https://anonfiles.com/D4q9t3Ieyc/sp-doc-one.part09_rar
shasum: aa43616306bf1d952160c97ce3d95522ec1589b2part10: https://anonfiles.com/J0k0tbI6y2/sp-doc-one.part10_rar
shasum: f95a1a48a48a14bbb8e82ad537c80a2c2fdfa398part11: https://anonfiles.com/23l1t4I1yd/sp-doc-one.part11_rar
shasum: 7587dc624586f1b7f394cc137e6c8b8bd2c05fe8part12: https://anonfiles.com/s7l8t8I4yb/sp-doc-one.part12_rar
shasum: cc5e814ecb46541a47a760cdb20a9eed6847d176part13: https://anonfiles.com/yew3taI5y9/sp-doc-one.part13_rar
shasum: 11ba2c2ae6fac15cceacad0be44139e44243a310part14: https://anonfiles.com/res1t2I4y0/sp-doc-one.part14_rar
shasum: aa7320cd3e2938668e8f957dc29cd045dd2b6078part15: https://anonfiles.com/f0u7t1Iby6/sp-doc-one.part15_rar
shasum: e77e454a4871c8503bf69c04f3d1abf69d478919part16: https://anonfiles.com/ees1t2I1y7/sp-doc-one.part16_rar
shasum: 264371947afdf181e3269754b055aa650408ff8dpart17: https://anonfiles.com/d8z9t0I7y2/sp-doc-one.part17_rar
shasum: 6977f586467bda4b2016d0db2ec73464d5c1a637part18: https://anonfiles.com/l9f3ufI4y4/sp-doc-one.part18_rar
shasum: 34dcc7db05754d5f3a9052c9da954d5075e69dc0part19: https://anonfiles.com/Zdd9u8I9y6/sp-doc-one.part19_rar
shasum: 3a748aef7b03b57512b2409824db1b79f52cf0cfحجم تقریبی بهصورت کاملا فشرده ۹۱ گیگابایت
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
InfoSecTube
مجموعه ۴-۱) شامل اسناد مختلف مهندسی پیمانکاران پروژههای پارس جنوبی part01: https://anonfiles.com/w0P6sbI9y5/sp-doc-one.part01_rar shasum: 2290fe5f3b9ae60532639b7f82b9560242b829bf part02: https://anonfiles.com/h1O5sdI3yc/sp-doc-one.part02_rar shasum: 9…
مجموعه ۴-۲) شامل اسناد مختلف مهندسی پیمانکاران پروژههای پارس جنوبی
part01: https://anonfiles.com/j2w8u0I6y2/sp-doc-two.part01_rar
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
part01: https://anonfiles.com/j2w8u0I6y2/sp-doc-two.part01_rar
shasum: 27e7e9e15daeacc50b06d9e0e2e6203a5fff44capart02: https://anonfiles.com/law3ueI6yb/sp-doc-two.part02_rar
shasum: c202e79f50909da3feb4e4ba6d864b00aaead017part03: https://anonfiles.com/w5weu7I3ye/sp-doc-two.part03_rar
shasum: 4ca5a91a7349cc54a11fda1dcf2baf207f802410part04: https://anonfiles.com/W4e0v8I1yd/sp-doc-two.part04_rar
shasum: 4e62986af35a5950f459bab03688abcfd217584epart05: https://anonfiles.com/x7ndu6Idy9/sp-doc-two.part05_rar
shasum: a7c2efcfe170284bf1150b1987b7224594951f11part06: https://anonfiles.com/43pcu1Icya/sp-doc-two.part06_rar
shasum: 443d98cc2140c8b32deb5c2252b8bcc75c889938part07: https://anonfiles.com/V7kbvdI6y9/sp-doc-two.part07_rar
shasum: dafd1fd4b56d97e55ce74e7ad543dfb7912899e6part08: https://anonfiles.com/w5k1v1Iayb/sp-doc-two.part08_rar
shasum: 5d1433a2efbd1355c3eed6f702033154a08b50bapart09: https://anonfiles.com/S5j8v7Ieya/sp-doc-two.part09_rar
shasum: 1104564efabce42ed2fad38171c66ea2deab87d9حجم تقریبی بهصورت کاملا فشرده ۴۳ گیگابایت
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🏆2
⛔️ به لطف تحریم های اتحادیه اروپا، شرکت ابرآروان دامنه اصلی خودش یعنی arvancloud.com رو از دست داد که باعث از دسترس خارج شدن سایت این شرکت روی این دامنه، پنل مشتریان و همچنین اختلال روی سرویس CDN این شرکت برای مشتریانی که از این سرویس روی دامنه هاشون استفاده میکردن شد.
❌ ابراروان این دامنه رو به وسیله شرکت امریکایی GoDaddy ثبت کرده بود که حالا این شرکت تصمیم به قطع سرویس دهی به ابراروان به دلیل تحریم های اتحادیه اروپا گرفته و احتمالا نتونه دیگه به این دامنه دست پیدا کنه. ابراروان برای ادامه سرویس دهیش حالا همه خدماتش رو به دامنه ir منتقل کرده.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
❌ ابراروان این دامنه رو به وسیله شرکت امریکایی GoDaddy ثبت کرده بود که حالا این شرکت تصمیم به قطع سرویس دهی به ابراروان به دلیل تحریم های اتحادیه اروپا گرفته و احتمالا نتونه دیگه به این دامنه دست پیدا کنه. ابراروان برای ادامه سرویس دهیش حالا همه خدماتش رو به دامنه ir منتقل کرده.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍7👎1
#Interview #Cybersecurity
🛡How Do You Ensure That a Server Is Secure?
To secure a server, it is vital to first establish a protected connection using SSH (Secure Shell) Protocol, as SSH access encrypts data transmissions. SSH uses port 22 by default, which is common knowledge to hackers—so use port numbers between 1024 and 32,767 to reduce the risk of attack. You should also authenticate an SSH server using SSH keys instead of a traditional password. To secure web administration areas, deploy a Secure Socket Layer (SSL) to safeguard server-client and server-server communications via the internet. Intrusion prevention software, firewalls, password requirements, and user management tactics can help maintain server security.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🛡How Do You Ensure That a Server Is Secure?
To secure a server, it is vital to first establish a protected connection using SSH (Secure Shell) Protocol, as SSH access encrypts data transmissions. SSH uses port 22 by default, which is common knowledge to hackers—so use port numbers between 1024 and 32,767 to reduce the risk of attack. You should also authenticate an SSH server using SSH keys instead of a traditional password. To secure web administration areas, deploy a Secure Socket Layer (SSL) to safeguard server-client and server-server communications via the internet. Intrusion prevention software, firewalls, password requirements, and user management tactics can help maintain server security.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔹How Do You Differentiate Between Symmetric and Asymmetric Encryption?
While symmetric encryption uses a single key for encryption and decryption, asymmetric encryption uses a public key for encryption and a private key for decryption. The success of symmetric encryption necessitates a secure exchange of the key, and the technique is typically used to transfer large volumes of data. Asymmetric encryption is a slower but more secure technique that is generally deployed to transfer small amounts of data. While symmetric encryption offers confidentiality, asymmetric encryption guarantees confidentiality as well as authenticity and non-repudiation.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔹How Do You Differentiate Between Symmetric and Asymmetric Encryption?
While symmetric encryption uses a single key for encryption and decryption, asymmetric encryption uses a public key for encryption and a private key for decryption. The success of symmetric encryption necessitates a secure exchange of the key, and the technique is typically used to transfer large volumes of data. Asymmetric encryption is a slower but more secure technique that is generally deployed to transfer small amounts of data. While symmetric encryption offers confidentiality, asymmetric encryption guarantees confidentiality as well as authenticity and non-repudiation.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Network Layer:
The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.
The transport layer:
takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Network Layer:
The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.
The transport layer:
takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Flow control mechanisms can be classified by whether or not the receiving node sends feedback to the sending node. Flow control is important because it is possible for a sending computer to transmit information at a faster rate than the destination computer can receive and process it.
Flow control tells the sender how much data should be sent to the receiver so that it is not lost.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Flow control mechanisms can be classified by whether or not the receiving node sends feedback to the sending node. Flow control is important because it is possible for a sending computer to transmit information at a faster rate than the destination computer can receive and process it.
Flow control tells the sender how much data should be sent to the receiver so that it is not lost.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Binary search is an efficient algorithm for finding an item from a sorted list of items. It works by repeatedly dividing in half the portion of the list that could contain the item, until you've narrowed down the possible locations to just one.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Binary search is an efficient algorithm for finding an item from a sorted list of items. It works by repeatedly dividing in half the portion of the list that could contain the item, until you've narrowed down the possible locations to just one.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Merge sort is a sorting algorithm based on the Divide and conquer strategy. It works by recursively dividing the array into two equal halves, then sort them and combine them. It takes a time of (n logn) in the worst case.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Merge sort is a sorting algorithm based on the Divide and conquer strategy. It works by recursively dividing the array into two equal halves, then sort them and combine them. It takes a time of (n logn) in the worst case.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
Confidentiality :
is roughly equivalent to privacy. Confidentiality measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.
Confidentiality :
is roughly equivalent to privacy. Confidentiality measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
InfoSecTube
#Interview #Cybersecurity Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Confidentiality : is roughly equivalent to privacy. Confidentiality…
🔹Integrity
involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).
🔹Availability:
means information should be consistently and readily accessible to authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).
🔹Availability:
means information should be consistently and readily accessible to authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
🔹What is the Diffie Hellman algorithm used for?
The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔹What are some common techniques used to extract information from malware samples?
Some common techniques used to extract information from malware samples include reverse engineering, static analysis, and dynamic analysis.
Reverse engineering involves looking at the code of a malware sample to understand how it works.
Static analysis involves analyzing the code without running it, in order to understand what it does.
Dynamic analysis involves running the code in a controlled environment in order to observe its behavior.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔹What are some common techniques used to extract information from malware samples?
Some common techniques used to extract information from malware samples include reverse engineering, static analysis, and dynamic analysis.
Reverse engineering involves looking at the code of a malware sample to understand how it works.
Static analysis involves analyzing the code without running it, in order to understand what it does.
Dynamic analysis involves running the code in a controlled environment in order to observe its behavior.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
🔹Can you explain the difference between a virus, worm, and Trojan horse?
A virus is a type of malware that is able to replicate itself and spread to other computers. A worm is a type of malware that is able to spread itself without the need to attach to other programs or files. A Trojan horse is a type of malware that is disguised as a legitimate program or file in order to trick users into downloading and installing it.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
A virus is a type of malware that is able to replicate itself and spread to other computers. A worm is a type of malware that is able to spread itself without the need to attach to other programs or files. A Trojan horse is a type of malware that is disguised as a legitimate program or file in order to trick users into downloading and installing it.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍4🔥1
Reloadium: Advanced Hot Reloading & Profiling
• Reloadium adds hot reloading and profiling features to any Python application
📌How to install:
>>>
>>>
° Django
° Flask
° Sqlalchemy
° Pandas
✔️Github: https://github.com/reloadware/reloadium
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
• Reloadium adds hot reloading and profiling features to any Python application
📌How to install:
>>>
pip install reloadium
📌How to use:>>>
reloadium run example.py
✅ Supports:° Django
° Flask
° Sqlalchemy
° Pandas
✔️Github: https://github.com/reloadware/reloadium
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔸What do you understand about polymorphism in context with malware analysis?
Polymorphism is a technique that malware authors use to make their malware more difficult to detect and analyze. By changing the code of the malware slightly each time it is run, or by encrypting it in different ways, the malware can avoid detection by signature-based detection systems. This makes it more difficult for analysts to understand how the malware works, and makes it more likely to slip past security defenses.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔸What do you understand about polymorphism in context with malware analysis?
Polymorphism is a technique that malware authors use to make their malware more difficult to detect and analyze. By changing the code of the malware slightly each time it is run, or by encrypting it in different ways, the malware can avoid detection by signature-based detection systems. This makes it more difficult for analysts to understand how the malware works, and makes it more likely to slip past security defenses.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
❤3