InfoSecTube
1.71K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
InfoSecTube
🟢 Z-Library eBook site domains seized by U.S. Dept of Justice 🔴 دامنه های سایت Z-library ، یکی از سایتهایی که ازش کتاب و مقاله و مجلات رو دانلود می کردیم، توسط وزارت دادگستری آمریکا مصادره شده. 🥺توقیف این سایتها توسط FBI و دفتر دادستانی ایالات متحده در ناحیه…
@firstlibrarybot

این ربات سایت Zlibrary هست و اگر میخواین اکانتتون رو بهش متصل کنید باید یک بار به آدرس بالا برید و بعد اون همه کتاب ها رو از تلگرام دانلود کنید.

👈 برای متصل کردن این ربات به اکانتتون قبلا نیاز بود که وارد تور بشید. اما با این آدرس میتونید بدون تور اکانتتون رو به ربات وصل کنید و کتاب های زیر 50 مگابایت رو دانلود کنید . در هر صورت شما برای دانلود کتاب های بالای 50 مگابایت نیاز به تور دارید چون فایلش در تلگرام ارسال نمیشه.

https://singlelogin.me/

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
InfoSecTube
مجموعه ۳-۴) شامل اسناد مختلف مهندسی پیمانکاران پروژه پارس جنوبی - فاز ۲۲-۲۳-۲۴ part01: https://anonfiles.com/Oavch1Idyd/sp2224-four.part01_rar shasum: 00422a6d93d3cfe94edd5dc0df0e20174d74b024 part02: https://anonfiles.com/v091h5I1y3/sp2224-four.part02_rar…
مجموعه ۴-۱) شامل اسناد مختلف مهندسی پیمانکاران پروژه‌های پارس جنوبی


part01: https://anonfiles.com/w0P6sbI9y5/sp-doc-one.part01_rar
shasum: 2290fe5f3b9ae60532639b7f82b9560242b829bf

part02: https://anonfiles.com/h1O5sdI3yc/sp-doc-one.part02_rar
shasum: 9bf5bff68d78d2028a12a12e55c366337c8aca4f

part03: https://anonfiles.com/03NbsaI9y8/sp-doc-one.part03_rar
shasum: 733bbc2bb7f9d59c789f9f7f6f2e671d47c9c303

part04: https://anonfiles.com/b4G7s5Icyf/sp-doc-one.part04_rar
shasum: 432591feed8afa7625d0ab266759f72ea47176c2

part05: https://anonfiles.com/22G8s9I5yf/sp-doc-one.part05_rar
shasum: 9f6e871921a6aa7b80969a96d5ea2f0695b26a8a

part06: https://anonfiles.com/ocS2s8I1y5/sp-doc-one.part06_rar
shasum: 1ef8c98e23b54f70dd1429c5949e8e6cf11fa346

part07: https://anonfiles.com/mbSfs9I9yd/sp-doc-one.part07_rar
shasum: 1459cb65c769632d2bdb59dba9d4369d8e8cdeeb

part08: https://anonfiles.com/X6m6t5I3yb/sp-doc-one.part08_rar
shasum: 553002fedd4828fab03cde054a42f95b380f161f

part09: https://anonfiles.com/D4q9t3Ieyc/sp-doc-one.part09_rar
shasum: aa43616306bf1d952160c97ce3d95522ec1589b2

part10: https://anonfiles.com/J0k0tbI6y2/sp-doc-one.part10_rar
shasum: f95a1a48a48a14bbb8e82ad537c80a2c2fdfa398

part11: https://anonfiles.com/23l1t4I1yd/sp-doc-one.part11_rar
shasum: 7587dc624586f1b7f394cc137e6c8b8bd2c05fe8

part12: https://anonfiles.com/s7l8t8I4yb/sp-doc-one.part12_rar
shasum: cc5e814ecb46541a47a760cdb20a9eed6847d176

part13: https://anonfiles.com/yew3taI5y9/sp-doc-one.part13_rar
shasum: 11ba2c2ae6fac15cceacad0be44139e44243a310

part14: https://anonfiles.com/res1t2I4y0/sp-doc-one.part14_rar
shasum: aa7320cd3e2938668e8f957dc29cd045dd2b6078

part15: https://anonfiles.com/f0u7t1Iby6/sp-doc-one.part15_rar
shasum: e77e454a4871c8503bf69c04f3d1abf69d478919

part16: https://anonfiles.com/ees1t2I1y7/sp-doc-one.part16_rar
shasum: 264371947afdf181e3269754b055aa650408ff8d

part17: https://anonfiles.com/d8z9t0I7y2/sp-doc-one.part17_rar
shasum: 6977f586467bda4b2016d0db2ec73464d5c1a637

part18: https://anonfiles.com/l9f3ufI4y4/sp-doc-one.part18_rar
shasum: 34dcc7db05754d5f3a9052c9da954d5075e69dc0

part19: https://anonfiles.com/Zdd9u8I9y6/sp-doc-one.part19_rar
shasum: 3a748aef7b03b57512b2409824db1b79f52cf0cf



حجم تقریبی به‌صورت کاملا فشرده ۹۱ گیگابایت

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
InfoSecTube
مجموعه ۴-۱) شامل اسناد مختلف مهندسی پیمانکاران پروژه‌های پارس جنوبی part01: https://anonfiles.com/w0P6sbI9y5/sp-doc-one.part01_rar shasum: 2290fe5f3b9ae60532639b7f82b9560242b829bf part02: https://anonfiles.com/h1O5sdI3yc/sp-doc-one.part02_rar shasum: 9…
مجموعه ۴-۲) شامل اسناد مختلف مهندسی پیمانکاران پروژه‌های پارس جنوبی


part01: https://anonfiles.com/j2w8u0I6y2/sp-doc-two.part01_rar
shasum: 27e7e9e15daeacc50b06d9e0e2e6203a5fff44ca

part02: https://anonfiles.com/law3ueI6yb/sp-doc-two.part02_rar
shasum: c202e79f50909da3feb4e4ba6d864b00aaead017

part03: https://anonfiles.com/w5weu7I3ye/sp-doc-two.part03_rar
shasum: 4ca5a91a7349cc54a11fda1dcf2baf207f802410

part04: https://anonfiles.com/W4e0v8I1yd/sp-doc-two.part04_rar
shasum: 4e62986af35a5950f459bab03688abcfd217584e

part05: https://anonfiles.com/x7ndu6Idy9/sp-doc-two.part05_rar
shasum: a7c2efcfe170284bf1150b1987b7224594951f11

part06: https://anonfiles.com/43pcu1Icya/sp-doc-two.part06_rar
shasum: 443d98cc2140c8b32deb5c2252b8bcc75c889938

part07: https://anonfiles.com/V7kbvdI6y9/sp-doc-two.part07_rar
shasum: dafd1fd4b56d97e55ce74e7ad543dfb7912899e6

part08: https://anonfiles.com/w5k1v1Iayb/sp-doc-two.part08_rar
shasum: 5d1433a2efbd1355c3eed6f702033154a08b50ba

part09: https://anonfiles.com/S5j8v7Ieya/sp-doc-two.part09_rar
shasum: 1104564efabce42ed2fad38171c66ea2deab87d9



حجم تقریبی به‌صورت کاملا فشرده ۴۳ گیگابایت

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🏆2
⛔️ به لطف تحریم های اتحادیه اروپا، شرکت ابرآروان دامنه اصلی خودش یعنی arvancloud.com رو از دست داد که باعث از دسترس خارج شدن سایت این شرکت روی این دامنه، پنل مشتریان و همچنین اختلال روی سرویس CDN این شرکت برای مشتریانی که از این سرویس روی دامنه هاشون استفاده میکردن شد.

ابراروان این دامنه رو به وسیله شرکت امریکایی GoDaddy ثبت کرده بود که حالا این شرکت تصمیم به قطع سرویس دهی به ابراروان به دلیل تحریم های اتحادیه اروپا گرفته و احتمالا نتونه دیگه به این دامنه دست پیدا کنه. ابراروان برای ادامه سرویس دهیش حالا همه خدماتش رو به دامنه ir منتقل کرده.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍7👎1
#Interview #Cybersecurity
🛡How Do You Ensure That a Server Is Secure?
To
secure a server, it is vital to first establish a protected connection using SSH (Secure Shell) Protocol, as SSH access encrypts data transmissions. SSH uses port 22 by default, which is common knowledge to hackers—so use port numbers between 1024 and 32,767 to reduce the risk of attack. You should also authenticate an SSH server using SSH keys instead of a traditional password. To secure web administration areas, deploy a Secure Socket Layer (SSL) to safeguard server-client and server-server communications via the internet. Intrusion prevention software, firewalls, password requirements, and user management tactics can help maintain server security.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔹How Do You Differentiate Between Symmetric and Asymmetric Encryption?

While
symmetric encryption uses a single key for encryption and decryption, asymmetric encryption uses a public key for encryption and a private key for decryption. The success of symmetric encryption necessitates a secure exchange of the key, and the technique is typically used to transfer large volumes of data. Asymmetric encryption is a slower but more secure technique that is generally deployed to transfer small amounts of data. While symmetric encryption offers confidentiality, asymmetric encryption guarantees confidentiality as well as authenticity and non-repudiation.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Network Layer:
The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.

The transport layer:
takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.


🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Flow control mechanisms can be classified by whether or not the receiving node sends feedback to the sending node. Flow control is important because it is possible for a sending computer to transmit information at a faster rate than the destination computer can receive and process it.

Flow control tells the sender how much data should be sent to the receiver so that it is not lost.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity

Binary search is an efficient algorithm for finding an item from a sorted list of items. It works by repeatedly dividing in half the portion of the list that could contain the item, until you've narrowed down the possible locations to just one.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
#Interview #Cybersecurity
Merge sort is a sorting algorithm based on the Divide and conquer strategy. It works by recursively dividing the array into two equal halves, then sort them and combine them. It takes a time of (n logn) in the worst case.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#Interview #Cybersecurity

Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization.

Confidentiality :
is roughly equivalent to privacy. Confidentiality measures are designed to prevent sensitive information from unauthorized access attempts. It is common for data to be categorized according to the amount and type of damage that could be done if it fell into the wrong hands. More or less stringent measures can then be implemented according to those categories.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
InfoSecTube
#Interview #Cybersecurity Confidentiality, integrity and availability, also known as the CIA triad, is a model designed to guide policies for information security within an organization. Confidentiality : is roughly equivalent to privacy. Confidentiality…
🔹Integrity
involves maintaining the consistency, accuracy and trustworthiness of data over its entire lifecycle. Data must not be changed in transit, and steps must be taken to ensure data cannot be altered by unauthorized people (for example, in a breach of confidentiality).

🔹Availability:
means information should be consistently and readily accessible to authorized parties. This involves properly maintaining hardware and technical infrastructure and systems that hold and display the information.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
🔹What is the Diffie Hellman algorithm used for?

The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.
🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔹What are some common techniques used to extract information from malware samples?

Some common techniques used to extract information from malware samples include reverse engineering, static analysis, and dynamic analysis.
Reverse engineering involves looking at the code of a malware sample to understand how it works.
Static analysis involves analyzing the code without running it, in order to understand what it does.
Dynamic analysis involves running the code in a controlled environment in order to observe its behavior.


🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🔥1
🔹Can you explain the difference between a virus, worm, and Trojan horse?

A virus is a type of malware that is able to replicate itself and spread to other computers. A worm is a type of malware that is able to spread itself without the need to attach to other programs or files. A Trojan horse is a type of malware that is disguised as a legitimate program or file in order to trick users into downloading and installing it.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍4🔥1
Reloadium: Advanced Hot Reloading & Profiling

• Reloadium adds hot reloading and profiling features to any Python application

📌How to install:

>>> pip install reloadium


📌How to use:

>>> reloadium run example.py

Supports:

° Django
° Flask
° Sqlalchemy
° Pandas

✔️Github: https://github.com/reloadware/reloadium

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
👍1
#Interview #Cybersecurity
🔸What do you understand about polymorphism in context with malware analysis?

Polymorphism
is a technique that malware authors use to make their malware more difficult to detect and analyze. By changing the code of the malware slightly each time it is run, or by encrypting it in different ways, the malware can avoid detection by signature-based detection systems. This makes it more difficult for analysts to understand how the malware works, and makes it more likely to slip past security defenses.



🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
3