InfoSecTube
1.7K subscribers
681 photos
44 videos
273 files
1.71K links
Subscribe to this channel if… you enjoy fun and educational videos about technology & CyberSecurity & ...
YouTube Channel:
https://youtube.com/c/InfoSecTube


Contact:
@InfoSecTube_Bot
Download Telegram
🚀OSV-Scanner

🪝Use OSV-Scanner to find existing vulnerabilities affecting your project's dependencies.

🚧OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them.

Link

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
😈h4PpY NEw ye4r 2023 ❤️🎉
🔥4👍1
OSI Model Part 2
Link
🚀OSV-Scanner

🪝Use OSV-Scanner to find existing vulnerabilities affecting your project's dependencies.

🚧OSV-Scanner provides an officially supported frontend to the OSV database that connects a project’s list of dependencies with the vulnerabilities that affect them.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
عملکرد کانال InfoSecTube در سال 2022 را چگونه ارزیابی کرده اید؟
Final Results
43%
خوب
38%
متوسط
19%
ضعیف
🖥 سری ویدیو های آموزشی Node.Js
👨‍💻مدرس : میثم منصف

🔹آشنایی مقدماتی با nodejs
https://youtu.be/Vjb6l8xNRAQ
🔹آشنایی با معماری نود جی اس(Node.js)
https://youtu.be/guOhZ20ZGwg
🔹نصب محیط برنامه نویسی نود جی اس
https://youtu.be/6n3ebW3z0rc
🔹نصب نود جی اس روی لینوکس
https://youtu.be/f_fgncga6qQ
🔹راه اندازی phpstorm و Nodemon
https://youtu.be/Fb6t4GeYbHM
🔹متغییر ها در نود جی اس
https://youtu.be/-XxYjeFCRqA
🔹توابع در نود جی اس
https://youtu.be/0yRI2rcAMdc
🔹تعیین سطح دسترسی و محدوده در نود جی اس
https://youtu.be/Xy1P58RXWKY
🔹آشنایی با لاگ در نود جی اس
https://youtu.be/xo4IFyoLs4U
🔹آشنایی با Async در نود جی اس
https://youtu.be/-697ez4e6vw

🔝 @InfoSecTube
🖥 🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #cybersecurity

🔶What is RFC?

A Request for Comments (RFC) is a formal document from the Internet Engineering Task Force (IETF) that contains specifications and organizational notes about topics related to the internet and computer networking, such as routing, addressing and transport technologies.

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #cybersecurity #Terminology

Node: A device that implement IPV6
Router: A node that forwards IPV6 packets not explicitly addressed to itself.
Host: Any node that is not a router

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
#interview #Cybersecurity #router
🔶Routing methods

Direct Connected
Static Routes
Dynamic Routes

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
This media is not supported in your browser
VIEW IN TELEGRAM
در 29 و 30 دی ماه اینترنت در کل کشور در ساعات برگزاری مرحله اول کنکور، قطع خواهد شد.

بهترین تدبیر و روش همیشه نزد مسئولین هست 🤬
🔝 @InfoSecTube
🖥 youtube.com/c/InfoSecTube
🍁 instagram.com/info_sec_tube
🏆3
🔥2
#interview #cybersecurity
🔶Data Leakage can be divided into 3 categories based on how it happens:

🚀Accidental Breach:
An entity unintentionally send data to an unauthorized person due to a fault or a blunder
🚀Intentional Breach: The authorized entity sends data to an unauthorized entity on purpose
🚀System Hack: Hacking techniques are used to cause data leakage

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube
🖥You can prevent MITM attack by using the following practices:

Use VPN
Use strong WEP/WPA encryption
Use Intrusion Detection Systems
Force HTTPS
Public Key Pair Based Authentication

🔝 @InfoSecTube
🖥 youtube
🍁 instagram.com/info_sec_tube