Showing posts with label uber. Show all posts
Showing posts with label uber. Show all posts

Thursday, April 14, 2022

Freebsd is nice

pkg install -y nano

pkg install -y xorg

pkg install -y xfce

pkg install -y slim slim-themes

sysrc dbus_enable=yes

sysrc hald_enable=yes

sysrc slim_enable=yes

sysrc sound_load=yes

sysrc snd_hda_load=yes

nano /home/your-user/.xinitrc

exec startxfce4

pkg install -y xfce4-pulseaudio-plugin

pkg install -y firefox libreoffice gimp thunderbird vlc tree

reboot

pkg install editors/vscode

pkg install vscode



RAM usage in HTOP = 790 MB = freebsd + xfce + firefox +youtube


Veoma sam prijetno iznenadjen jednostavnošću instalacije freebsd operativnog sistema.
Veoma je brz u xfce grafičkom okruženju, koristi vrlo malo memorije u odnosu na gomilu Linux distribucija. FreeBDS je mnogo brži od Arch, Manjaro xfce, Endeavour xfce, NuTyX xfce, MX xfce, Xubuntu, Linux Lite is ostalih xfce distribucija.

Kao dugogodišnji distrohopper u Linuxu, probao sam skoro sve bitnije Linux distribucije, kao i OpenBSD. OpenBSD se ne može porediti po jednostavnosti instalacije sa FreeBSD, naime FreeBSD je mnogo bolji, potpuniji i jednostavniji za instalaciju.
Šta reći, a ne zaplakati od sreće.
Čak i čuveni i nezaobilazni Microsoft Visual Studio Code (vsc) radi bolje nego pod Linuxom.
Programeri, nemate razloga da ne predjete na FreeBSD xfce. macOSX korisnicima će FreeBSD biti prilično poznat.




su
gpart show
boot0cfg -B ada0

shutdown -r now

df

uname -a

Monday, November 5, 2018

Koji su sve windows update-i instalirani na kompjuteru (testirano na Windows 7)

LISTAJ-UPDATE-OVE.cmd

color 0a
path %SystemRoot%\System32\Wbem
wmic qfe get Caption,Description,HotFixID,InstalledOn
rem wmic
pause 

------
Ovo je upotreba WMI preko CMD prompta u Windows 7,8,10.







MORE TIPS:

https://www.howtogeek.com/howto/19982/how-to-make-the-windows-command-prompt-wider/

http://www.oxid.it/cain.html
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol's standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some "non standard" utilities for Microsoft Windows users.

Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and  some not so common utilities related to network and system security.


https://www.checkmarx.com/

https://www.hex-rays.com/


https://excess-xss.com/