أهلاً وسهلاً ومرحباً في قناة القبعة البيضاء المختصة في التقنية وعلوم الحاسوب من قبيل الشبكات والبرمجة وأنظمة التشغيل المختلفة وإختبار الإختراق الأخلاقي والمزيد المزيد من المفاجآت بحول الله وقوته. وسنتستمر لنصنع من أنفسنا هكرز أقوياء إن شاء الله ، ولكن أولاً سنبدأ بالأساسيات لنضع الأرضية التي سنشتغل عليها ، وبعدها سنمر للامور المتقدمة.
Oui khoya hadi badira zwiinaa o hta shabek wasihom idiroha o ncher 3andek f fb o telegram o hta instagram bach kolchi istafed o hta l groupat khoya l ghali l3ziz
Marhba khoya lhbib allah ya wedi marhba bik, Youssef drayef baghi i9ra wi t3alem men nas l 9lal li b9aw fhad l3alam baghin idiro chi haja mofida, o hta nta rak bayen bhalo allah ikemel khoya l3ziz
@@lhoucineouzio3242 Khoya l houcine ghir b9a dir ghir like o comment f aye video lehto wakha matkonch mehtam bih rah bghit nfid khoti walakin hata wahed mad3emni, rah hadchi li i9dar infe3kom ama tafaha akhoti raha walo, raha welit kanfaker nhbes tfa3lo m3ana l abghito wa chokran khoti
Khoya yacine ghir b9a dir ghir like o comment f aye video lehto wakha matkonch mehtam bih rah bghit nfid khoti walakin hata wahed mad3emni, rah hadchi li i9dar infe3kom ama tafaha akhoti raha walo, raha welit kanfaker nhbes tfa3lo m3ana l abghito wa chokran khoti
Wach wslti m3ana la base f python ola mazal? Rah tat3tl 3lina chwya Tadir joj lo4at c o python ma3rftch wach nbda fl5ra ola tankml python Ana 4aglt 3arf bli bsbab tafa3ol limakaynch lmohim m3a lw9t inchaellah ✅
@@w.h27 ala a5oya mathbsch lala ha sbr rah 3rfti bli bnadm maataydihach flhaja li4atnf3o ha tafaha ha kml kml rak wa3r finma tatloh chi vidéo tand5l lih 👌 A'a rah bdit f python wslt fiha ns lvidyo 35 ah 4adi f python taybanliya ndir dakchi liglti wlah ma3rt lmohim nkml chrh ta3k fpython 3ad nfjr wach ndouz l c
@@nobyoussef5472 Safi machi mochkil kemel C o doz l python, rah aba Youssef te9riban 2 years ago db o walo hata jaja makayna l RU-vid tayhareb fiya bchata lwasa2il bach mankemelch o bnadem makayda3mekch o hata had 20 ola 30 li katfareg makatbartaji ma walo lemen ghadi tkemel 2 years agao o 9anat fiha 2k hhahahhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhhh ach had tkharbbi9 f hal l3alam, ba Youssef khoya lhbi mbghina nfido bnadem walakin hta wahed ma bgha nkhaliw saha l tafihi idiro mabghaaaw asaln had l 3alam babah safi mcha
chokran akhoya Youssef wa bnadem kayhsablih ana ghadi nweli labas 3liya men RU-vid ola ana mehtaj L youTube hhhhhhhhhh hna ghir baghin nfido nas o safi, kif gotlek mo2akharan welit fi3lan kanfaker nhbes safi
Wa khoya lhbib rebi ikhalik walakin rah had charh khaso ktaar men 2k te9riban f 3amayen mafhamt ana be3da walo a khoya l3ziz ghr mtnsax liya like o partagi l video bachb itla3 rak madertich like khoya lhbib l3ziz rak tema
Thanks bro but i would ask about something in hacking if i hack important website such as government website can i enter to the server and add or delete sensitive information and thanks you again bro ❤
In most cases, you can't access the server despite you have hacked the website due to the Websites are designed to be a one-way street: visitors send requests to the web server, and the server responds with the requested information (like web pages) but doesn't allow outside access back into the server. exclamation Here's a breakdown of the security measures that prevent this: Firewalls: These act as gatekeepers, filtering incoming traffic and only allowing authorized connections.expand_more Port Restrictions: Web servers typically only listen on specific ports (like port 80 for HTTP traffic).expand_more Hackers can't access the server through ports that aren't open.exclamation User Permissions: Even if a hacker gains access to the website itself (through vulnerabilities like SQL injection), they likely wouldn't have the same level of access as the server administrator.exclamation This limits what they can do on the server. However, there are some exceptions: Vulnerable Websites: Websites with outdated software or weak security configurations may have vulnerabilities that hackers can exploit to gain a foothold on the server. Social Engineering: Hackers might trick website administrators into giving them unauthorized access through phishing emails or other deceptive tactics.expand_more Here's what you can do to improve website security: Keep Software Updated: Regularly update the website's content management system (CMS), plugins, and server software to patch known vulnerabilities.expand_more Strong Passwords: Enforce strong passwords for all website administrator accounts.expand_more Stay Informed: Keep up-to-date on the latest security threats and best practices. Remember, even though directly accessing the server through the website is uncommon, it's crucial to maintain good security practices to minimize the risk of other hacking attempts."
@@w.h27 after think in your answer i have a questions when we read or hear about data breaches or big companies are hacked and there information are stole are that companies let there information in the website or in big servers
@@America540 When we hear about data breaches or big companies being hacked and their information being stolen, it typically means that sensitive data stored by these companies has been accessed by unauthorized individuals. This information can be stored in various places, depending on the company's infrastructure and practices: 1. **Websites**: Some data breaches occur through vulnerabilities in websites. Hackers can exploit security flaws in web applications to gain access to databases containing user information. 2. **Servers**: Companies often store sensitive data on servers, which can be located on-premises or in the cloud. If these servers are not properly secured, they can be vulnerable to attacks. 3. **Cloud Storage**: Many companies use cloud storage solutions provided by third-party vendors. While cloud providers generally have robust security measures, misconfigurations or weak access controls by the company can lead to data breaches. 4. **Databases**: Databases are common targets for hackers because they store vast amounts of structured data. SQL injection attacks are a common method hackers use to gain access to databases. 5. **Employee Devices**: Sometimes, data breaches occur because of compromised employee devices, such as laptops or smartphones, especially if they are not properly secured or if they access sensitive information remotely without adequate protection. Companies can mitigate these risks by implementing strong security measures, such as encryption, regular security audits, patch management, access controls, and employee training on cybersecurity best practices.