Wednesday, October 10, 2018
Last call for the 29 years aniversary 1989-2018 on the 13rd October...how to manipulate the input "0" !!!! Let me give you a piece of advise...you don't know what this means , as a level of difficulty in Algebra!!!...you don't understand, that IF i GET this CALL THEN I shutoff worldwide internet!!!! Be aware that...nuclear centrals can work without system for 1.30h without blowing up the refrigarition sys...and that life support works without web...so...welcome back to war!...
1989-2018 Aniversary ...13rd October (18.10.10, wednesday, 06.50 am)
Good morning. Here's the dissecation of the problem...
like............This sample allows users to use the network transport protocol independence of JMF in RTP. Users can run RTP over any underlying transport protocol. By default, JMF uses RTP over UDP. Users running RTP over a non UDP transport, can use the RTPSocket object defined in javax.media.rtp.RTPSocket and its accompanying interfaces.
The RTPSocketPlayer.java sampleapp explains the use of the RTPSocket using UDP as its underlying protocol. To use the sample, users need to change the address and port to that of their RTP session. The variables "address" and "port" (line 50) need to match those your RTP server is streaming data to. Recompile the file and run RTPSocketPlayer as
java RTPSocketPlayer
The RTPSocket will stream data over from UDP to the RTPSessionManager
Only the first stream received on the session is played back in this case.
HACKING
Hacking !!!!!! 1) Install and ensure Fail2Ban is working. Fail2Ban locks unauthorised users out of SSH, GUI and Webmin after 3 unsuccessful attempts by placing them in a jail. The only way to regain access is to remove them from a jail. FreePBX systems (other than PIAF) DO NOT include this by default. This is your first line of defence. http://www.fail2ban.org/wiki/index.php/MANUAL_0_8
2) Do not use common or easy to guess passwords for ANYTHING. Use a mixture of upper and lower case and symbols e.g. Wh0@r3you?_6581 . Every extra digit increases the complexity exponentially. Use a password generator like LastPass if you are not creative
3) Only open ports that you must have open. Close any unused ports e.g POP3, IAX2 etc if you are not using them. It is pointless to change your SSH port because an NMAP scan will pick it up anyway.You can try and change SIP port to something other than 5060 though as this is a commonly targeted port.
4) Disable root login on SSH. Let users authenticate with their normal user login and pass and the SU that will require a root level password. This doubles the security on SSH.
5) Use a separate outbound route for all international calls that has a dial plan that matches 00. then pin protect it. Give the client CEO the pin and let him decide who has access to it.
like............This sample allows users to use the network transport protocol independence of JMF in RTP. Users can run RTP over any underlying transport protocol. By default, JMF uses RTP over UDP. Users running RTP over a non UDP transport, can use the RTPSocket object defined in javax.media.rtp.RTPSocket and its accompanying interfaces.
The RTPSocketPlayer.java sampleapp explains the use of the RTPSocket using UDP as its underlying protocol. To use the sample, users need to change the address and port to that of their RTP session. The variables "address" and "port" (line 50) need to match those your RTP server is streaming data to. Recompile the file and run RTPSocketPlayer as
java RTPSocketPlayer
The RTPSocket will stream data over from UDP to the RTPSessionManager
Only the first stream received on the session is played back in this case.
HACKING
Hacking !!!!!! 1) Install and ensure Fail2Ban is working. Fail2Ban locks unauthorised users out of SSH, GUI and Webmin after 3 unsuccessful attempts by placing them in a jail. The only way to regain access is to remove them from a jail. FreePBX systems (other than PIAF) DO NOT include this by default. This is your first line of defence. http://www.fail2ban.org/wiki/index.php/MANUAL_0_8
2) Do not use common or easy to guess passwords for ANYTHING. Use a mixture of upper and lower case and symbols e.g. Wh0@r3you?_6581 . Every extra digit increases the complexity exponentially. Use a password generator like LastPass if you are not creative
3) Only open ports that you must have open. Close any unused ports e.g POP3, IAX2 etc if you are not using them. It is pointless to change your SSH port because an NMAP scan will pick it up anyway.You can try and change SIP port to something other than 5060 though as this is a commonly targeted port.
4) Disable root login on SSH. Let users authenticate with their normal user login and pass and the SU that will require a root level password. This doubles the security on SSH.
5) Use a separate outbound route for all international calls that has a dial plan that matches 00. then pin protect it. Give the client CEO the pin and let him decide who has access to it.
Tuesday, October 9, 2018
HACKING AUDIO - VULNERABILITY
hello everybody...we are at a party...and snowden come up...(the "my" opinio already knew...snowden was on purpose for delivering power points to the russians, no way it was a keystroke...no fax machine (!!!!! I supoose Mknin ...) so, actually today 15 years after Pentagon...inside treadt comes with this accelometer board, used for robotics manipulation...and even a girl lol...could just "ear" music socket...
INVENSENSE.COM
The MPU-6050™ parts are the world’s first MotionTracking devices designed for the low power, low cost, and high-performance requirements of smartphones, tablets and wearable sensors.
buenas! so taking about MKNin entertainment decoy...Let's talk about super agents and the CIA...secret drug development
EN.WIKIPEDIA.ORG
The 5-HT7 receptor is a member of the GPCR superfamily of cell surface receptors and is activated by the neurotransmitter serotonin (5-hydroxytryptamine, 5-HT)[5] The 5-HT7 receptor is coupled to Gs (stimulates the production of the intracellular signaling molecule cAMP)[6][7] and is expressed in a....
Subscribe to:
Posts (Atom)