CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
39K subscribers
301 photos
373 files
276 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
⭕️ G-Mail keyboard shortcuts ⭕️
#pc_feature #OldPost

Here is the complete list of Gmail keyboard shortcuts:

Compose and Chat

<Shift> + <Esc> : Focus main window
<Esc> : Focus latest chat or compose
<Ctrl> + . : Advance to next chat or compose
<Ctrl> + , : Advance to previous chat or compose
<Ctrl> + <Enter> : Send
<Ctrl> + <Shift> + c : Add cc recipients
<Ctrl> + <Shift> + b : Add bcc recipients
<Ctrl> + <Shift> + f : Access custom from
<Ctrl> + k : Insert a link
<Ctrl> + ; : Go to previous misspelled word
<Ctrl> + ' : Go to next misspelled word
<Ctrl> + m : Open spelling suggestions

Formatting

<Ctrl> + <Shift> + 5 : Previous font
<Ctrl> + <Shift> + 6 : Next font
<Ctrl> + <Shift> + - : Decrease text size
<Ctrl> + <Shift> + + : Increase text size
<Ctrl> + b : Bold
<Ctrl> + i : Italics
<Ctrl> + u : Underline
<Ctrl> + <Shift> + 7 : Numbered list
<Ctrl> + <Shift> + 8 : Bulleted list
<Ctrl> + <Shift> + 9 : Quote
<Ctrl> + [ : Indent less
<Ctrl> + ] : Indent more
<Ctrl> + <Shift> + l : Align left
<Ctrl> + <Shift> + e : Align center
<Ctrl> + <Shift> + r : Align right
<Ctrl> + <Shift> + , : Set right-to-left
<Ctrl> + <Shift> + . : Set left-to-right
<Ctrl> + \ : Remove formatting


Jumping

g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label

Threadlist selection

* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations

Navigation

u : Back to threadlist
k / j : Newer/older conversation
o or <Enter> : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section

Application

c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open "more actions" menu
v : Open "move to" menu
l : Open "label as" menu
? : Open keyboard shortcut help

Actions

, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
<Shift> + r : Reply in a new window
a : Reply all
<Shift> + a : Reply all in a new window
f : Forward
<Shift> + f : Forward in a new window
<Shift> + n : Update conversation
] / [ :  Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
<Shift> + i : Mark as read
<Shift> + u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
- : Mark as not important
<Shift> + t : Add conversation to Tasks
👍12🔥1
Ethical hacking tools for recon
👍15
Here is an interesting channel to learn more about bitcoin, crypto & web3.

I already shared tips on earning money from crypto and how you can combine Programming with crypto for more opportunities
👇👇
https://news.1rj.ru/str/Bitcoin_Crypto_Web
👍2
31_Days_Before_Your_CCNA_Exam_A_Day_By_Day_Review_Guide_for_the.pdf
12.7 MB
31 Days Before Your CCNA Exam
Allan Johnson, 2020
2👍2
CCNA_Cloud_Complete_Study_Guide_Exam_210_451_and_Exam_210_455.epub
10 MB
CCNA Cloud
Complete Study Guide

Todd Montgomery, 2018
👍41
Common CyberSecurity Careers
👍154
neal-allen-network-maintenance-and-troubleshooting.pdf
20.5 MB
Network Maintenance and Troubleshooting Guide
Neal Allen, 2010
3🍓3👏1
Introduction to Cyber Security.pdf
5 MB
Introduction to Cyber Security
Jeetendra Pande, 2017
🤷‍♀5👍2🤩1
Introduction to Cyber Security.pdf
5 MB
Introduction to Cyber Security
Jeetendra Pande, 2017
👍1
Steps to Learn Ethical Hacking 👇

1. Basic IT Knowledge: Build a strong foundation in IT, including understanding of operating systems, networks, and programming languages.

2. Learn Networking: Study computer networks, protocols, and how data is transmitted over the internet.

3. Programming Skills: Learn languages like Python, which are commonly used in ethical hacking for noscripting and automation.

4. Operating Systems: Gain expertise in Windows and Linux operating systems.

5. Cybersecurity Fundamentals: Understand the basics of cybersecurity, including encryption, firewalls, and intrusion detection systems.

6. Study Tools: Familiarize yourself with ethical hacking tools and software like Wireshark, Metasploit, and Nmap.

7. Online Courses: Take online courses or certifications in ethical hacking and cybersecurity, like Certified Ethical Hacker (CEH) or CompTIA Security+.

8. Hands-on Practice: Set up a virtual lab environment to practice hacking techniques safely. Experiment on your own systems or those you have permission to test.

9. CTFs and Challenges: Participate in Capture The Flag (CTF) competitions and online challenges to apply your skills.

10. Legal and Ethical Guidelines: Always follow ethical and legal standards. Hacking without proper authorization is illegal and unethical.

11. Stay Informed: Continuously update your knowledge as the field of cybersecurity evolves rapidly.

12. Community Involvement: Join forums, online communities, and connect with ethical hackers to learn and share experiences.

13. Certifications: Consider pursuing advanced certifications like Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM).

14. Specialize: Choose an area of specialization, such as penetration testing, network security, or web application security.

15. Ethical Mindset: Remember that the goal of ethical hacking is to protect systems, not exploit them.

Free Resources to learn Ethical Hacking:

https://news.1rj.ru/str/EthicalHackingToday/4

https://news.1rj.ru/str/ethicalhackingtutorialsforfree/100

ENJOY LEARNING 👍👍
👍154