Posts

Showing posts from October, 2018

LET'S ENCRYPT THE NON-PROFIT SSL CERTIFICATION AUTHORITY BINDS WITH ONE OF MY PROJECT AUTOMATIC.ATHULJITH.COM | GET YOUR COST FREE SSL NOW

Image
Let’s Encrypt is a free, automated, and open certificate authority (CA), run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

We give people the digital certificates they need in order to enable HTTPS (SSL/TLS) for websites, for free, in the most user-friendly way we can. We do this because we want to create a more secure and privacy-respecting Web.

The key principles behind Let’s Encrypt are:

Free: Anyone who owns a domain name can use Let’s Encrypt to obtain a trusted certificate at zero cost.
Automatic: Software running on a web server can interact with Let’s Encrypt to painlessly obtain a certificate, securely configure it for use, and automatically take care of renewal.
Secure: Let’s Encrypt will serve as a platform for advancing TLS security best practices, both on the CA side and by helping site operators properly secure their servers.
Transparent: All certificates issued or revoked will be publicly recorded and available for a…

IPV6 COMPLETE DETAILS

Image
128 bits long (16 bytes). Basic architecture is 64 bits for the network number and 64 bits for the host number. Often, the host portion of an IPv6 address (or part of it) will be derived from a MAC address or other interface identifier.
Depending on the subnet prefix, IPv6 has a more complicated architecture than IPv4.

The number of IPv6 addresses is 1028 (79 228 162 514 264 337 593 543 950 336) times larger than the number of IPv4 addresses. The text form of the IPv6 address is xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx, where each x is a hexadecimal digit, representing 4 bits. Leading zeros can be omitted. The double colon (::) can be used once in the text form of an address to designate any number of 0 bits. For example, ::ffff:10.120.78.40 is an IPv4-mapped IPv6 address.

Allocation is in the earliest stages. The Internet Engineering Task Force (IETF) and Internet Architecture Board (IAB) have recommended that essentially every organization, home, or entity be allocated a /48 subnet …

WHAT IS GITHUB EDUCATION'S STUDENT DEVELOPER PACK

Image
GitHub Student Developer Pack will help you to make application without any struggle. Becasue you can get there almost 25 API website access, That world's most popular and successful business are helping github to make thier service struggle less. For example if you need an Domain name , it's not gonna cost or expensive any more. Namecheap is an Promotional partner of Github Student Developer Pack. As same all other application's are available like that.
Number of Partnered services with Github Student Developer Pack :

Algolia :
The Algolia model provides search as a service, offering web search across a client's website using an externally hosted search engine. Although in-site search has long been available from general web search providers such as Google, this is typically done as a subset of general web searching. The search engine crawls or spiders the web at large, including the client site, and then offers search features restricted to only that target site. Th…

Get $100 credit on Digital Ocean using This Referral code Only | Hurry | October 2018 Offer [ Hacktoberfest ]

Image
Everyone you refer gets $100 in credit over 60 days during Hacktoberfest!
Yes , it's true. Everyone gets $100 creadit when they signup to digitalocean using this referral code : https://m.do.co/c/afe025b6ae68 . This is very important, Because you can have a $100 credit directly in digital ocean for an year. But the credit will expire if you don't use it within 60 days of period. Mainly we can assume that this kind of referring method is quit new to datacenters or server space selling companies.

Previously Amazon and Alibaba Cloud has started an free trial [ 1 year ] program which will help users to get a free 1 year credit worth $300, and upto $1500 for Enterprise. Amazon is doing a great job , that they are providing an complete exploration of their products , unless this service no one gonna test what they have . This is exactly what google trid to do by offering ₹20000 credit on Google cloud platforms.
Here, we are discussing about DigitaOcean. So Go and get your offer from…

Create Own Tracking Website Using JS & Google Maps

Image
Build your own tracking website to create a Transport Tracker to track and manage moving assets like buses or delivery trucks. An Android app captures the location of your vehicles and stores it in a Firebase Realtime Database. A map built with the Google Maps JavaScript API provides realtime visibility of your vehicles, routes and schedules.


Hardwares used :
MediaTek Labs LinkIt ONE
Softwares used :
Apache Tomcat server Any Database MySQL, Access or MSSQL
For tracking ourselves or devices
So use this to track your self or your devices by converted into close box and fitted or have with you. Also use it for spying purpose.
Step 1: Materials Required


Materials Required
1) Mediatek Linkit one board with GPS Sensor, GPRS antenna and battery pack.
2) A PC with static IP or web hosting space with JSP support.
Software used
1) Arduino IDE for programming Mediatek linkit one.
2) Apache Tomcat server for JSP server.
3) Notepad to write JSP and Java Program.
4) Any Database MySQL, Access or MSSQL.
I use Window…

The Power of Google Servers | Are they having 2M Servers ? Is it True !!!

Image
Google data centers are the large data center facilities Google uses to provide their services, which combine large amounts of digital storage (mainly hard drives and SSDs), compute nodes organized in aisles of racks, internal and external networking, environmental controls (mainly cooling and dehumidification), and operations software (especially as concerns load balancing and fault tolerance). This article describes the technological infrastructure behind Google's websites as presented in the company's public announcements.

Locations of Google Datacenters :

United States:

Berkeley County, South Carolina 33°03′50.8″N 80°02′36.1″W since 2007, expanded in 2013, 150 employment positions
Council Bluffs, Iowa 41°13′17.7″N 95°51′49.92″W announced 2007, first phase completed 2009, expanded 2013 and 2014, 130 employment positionsDouglas County, Georgia 33°44′59.04″N 84°35′5.33″W since 2003, 350 employment positionsJackson County, AlabamaLenoir, North Carolina 35°53′54.78″N 81°32′50.58″W…

Get upto 8GB file space in seedr | What i got ? 7GB Storage & 210TB Transfer :-)

Image
In the BitTorrent file distribution system, a torrent file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms.[1] A torrent file does not contain the content to be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. The term torrent may refer either to the metadata file or to the files downloaded, depending on the context.

In a nutshell, a torrent file is like an index, with information of content (not the content itself) and address of world wide computers available with the content. Torrent file itself and the method of using torrent file have been created to ease load on servers and with help of torrents, one can download the required file from other c…

What is Torrent & How to download torrent directly using Seedr

Image
In the BitTorrent file distribution system, a torrent file is a computer file that contains metadata about files and folders to be distributed, and usually also a list of the network locations of trackers, which are computers that help participants in the system find each other and form efficient distribution groups called swarms.[1] A torrent file does not contain the content to be distributed; it only contains information about those files, such as their names, sizes, folder structure, and cryptographic hash values for verifying file integrity. The term torrent may refer either to the metadata file or to the files downloaded, depending on the context.

In a nutshell, a torrent file is like an index, with information of content (not the content itself) and address of world wide computers available with the content. Torrent file itself and the method of using torrent file have been created to ease load on servers and with help of torrents, one can download the required file from othe…

What is Shorewall & How To Install it On Linux

Image
Shorewall is a front-end command line environment, that uses a number of text files for its configuration. Shorewall is an open source software published under GNU General Public License. It is a gateway/firewall configuration tool for Linux. It is a robust firewall system, which can be used over a network of system. In this article, we will learn the procedures to install Shorewall. Here we use two-interface configuration, that consists of a system with two Ethernet ports.
To install ShorewallFor Debian/Ubuntu/Linux Mint
Run the following command to install Shorewall. $ sudo apt-get install shorewall6For RHEL/CentOS/Fedora
Run the below command to install Shorewall. [root@athuljith.com ~]# yum install shorewall6
Loaded plugins: fastestmirror, langpacks
Loading mirror speeds from cached hostfile
* base: centos.excellmedia.net
* epel: ftp.cuhk.edu.hk
* extras: centos.excellmedia.net
* updates: centos.excellmedia.net
Resolving Dependencies
--> Running transaction check
---> Package shorewall…

What is AZORult | The Latest Trojan Malware

Image
AZORult is a trojan malware that harvests and exfiltrates data from the compromised system. It is installed on a system via a first-stage malware, such as Seamless. The malware searches for the following information and sends it to its C2 server: Saved passwords, such as those from browsers, email and FTP servers;Cookies from browsers and forms, including autofill;wallet.dat files from popular bitcoin clients;Skype message history;Files from chat history;Desktop files;Files with specified extensions from Desktop and files in folders;List of installed programs;List of running processes; andUsername, computer name, and operating system type.
In July 2018, AZORult was substantially updateded, improving both on its stealer and downloader functionality. It was immediately seen in a large email campaign, leveraging its new capabilities to distribute Hermes ransomware. The advertisement for AZORult version 3.2 notes the following updates: Added stealing of history from browsers (except IE and E…

The Privacy Policy & Terms and Conditions of Hackers

Image
PRIVACY POLICY :
Privacy Notice This privacy notice discloses the privacy practices for (digileaks). This privacy notice applies solely to information collected by this website. It will notify you of the following: What personally identifiable information is collected from you through the website, how it is used and with whom it may be shared. What choices are available to you regarding the use of your data. The security procedures in place to protect the misuse of your information. How you can correct any inaccuracies in the information. Information Collection, Use, and Sharing We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via signup or other direct contact from you. We will not sell or rent this information to anyone. We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization. Unless you…