Комментарии:
Great video! Useful
ОтветитьExcellent
Ответитьcrystal clear Thumbs Up .. Great tutorial Thanks a ton dude
ОтветитьNot quite complete. Good start though.
Ответитьthank you for your help
Ответитьgreat stuff as always
ОтветитьThank you very much. This is amazing tutorial.
ОтветитьIf you have the simple setting as below your security is fine in ubuntu/linux
sudo ufw status verbose
Status: active
Logging: on (low)
Default: deny (incoming), allow (outgoing), disabled (routed)
Completely unnecessarily to open any door/port. It make s your system weak in my opinion.
very great video , many thanks
ОтветитьWhy when i enabled a specific port, it stil does not work? What can be the reason?
Ответитьis their any way to backup
ОтветитьHi, in this ufw can we create any rules like web content filtering, game sites blocking, chat box blocking, like that. Is it possible in this..
ОтветитьExcellent video! Liked and subbed 👍
ОтветитьHow to instal UFW on mac?
Ответитьexcellent. thank you. subed
ОтветитьSeria muito útil diferencia o que ele escreveu pro que foi gerado a partir de código
Ответить🔥🔥🔥 for this 🔥wall guide, sir.
ОтветитьDoes port forwarding require our public ip?
ОтветитьThanks for your videos and share your knowledge (from France)
ОтветитьNice, funny enough that "useless" command was exactly what I was looking for haha
ОтветитьNice and clear. Superb
ОтветитьBetter if you state what's possible fix if happened you restrict ssh only for your ip address and suddenly change. How can you access if that happen?
Ответитьthank you so much sir.
ОтветитьI would switch to root user to do all this vs type sudo 1000 times. Complete insanity when doing firewall maintenance or a demo to not be logged in as root. Otherwise good solid tutorial.
ОтветитьThis might be a bad question but how can I get the "background" that you have with all the system info
Ответитьiptable is depreciated, why using another software on top of iptable ???
Ответитьhi, how about allowing from a certain mac address? i.e. just a device
ОтветитьPlease more of this
ОтветитьGreat Video, is there anything built-in for geo-location deny...
ОтветитьWhen I run the command ' ufw status ' as root, the only output I get is ' :active ' , nothing else is shown... no TO , ACTION of FROM?
ОтветитьVery crisp and to the point videos with nice explanation. Now onto the other 6 vids...
ОтветитьYou look like “Walter”
In series "scorpion" 🔥
Can anyone help me that from where should i start learning , i am new here🥺
Ответитьquestion: How to attack private network with double NAT ?? I want to test how secure my network is, target is second router, how to punch trough the NAT ? In Ur videos most attacks are fired in LAN, and the target machine is in the same network with attacker. What about hacking trough WAN ?? Sorry for bad English
ОтветитьAre you from Egypt
Ответитьhow can i run my phishing over wan 24x7 so that it keeps on running even my pc is shutdown or i can access that from any where
ОтветитьUncle hacker, help me become a hacker
ОтветитьBro
I need your urgent help
I want to set rat on my brother phone it is very important he goes on betting sites which making him in debt
I know about rats an all
I create rat by 888 rat
Problem is static ip
I take static ip from no ip site
But it is only for some days after that account freezes
There is something important to know that can help in yhis case
When he return to home he connects to same wifi router
So using this can we put aside the internet and work only with lan
I give my pc custom ip and connects to my rat on device connected on same router
Please never stop posting vedios, sir💛
Ответить@Hackersploit, thanks for all yr videos. I want to keep on going, but i get keeping output ( hash of expected file 17544910 weak) when i try to update kali linux or parrot os
ОтветитьQuestion. what if instead of IP we enter a DDOS domain that is linked to my IP and refreshes the IP as soon as it changes.
ОтветитьYou are great
ОтветитьMore more more thanks bruhh
Ответить