1 00:00:00,600 --> 00:00:08,640 So basically, we will be seeing how the NFL is about squashing so far that we need to see what are 2 00:00:08,640 --> 00:00:09,990 the folders? 3 00:00:09,990 --> 00:00:14,340 Are there trees that are being exploited by your NFL? 4 00:00:14,910 --> 00:00:15,920 Uh, file sharing. 5 00:00:16,380 --> 00:00:19,620 So let's say look at it. 6 00:00:19,620 --> 00:00:21,360 See export. 7 00:00:22,340 --> 00:00:22,630 It's. 8 00:00:23,830 --> 00:00:33,610 So this is similar to some of it, but it is using Linux, so you can see here the temperature is being 9 00:00:34,340 --> 00:00:37,690 a shade, so you can read. 10 00:00:37,690 --> 00:00:40,400 Right, and think into the notebook squish. 11 00:00:40,750 --> 00:00:43,900 So this is, uh, misconfiguration. 12 00:00:44,240 --> 00:00:47,820 If you see no roots, Goresh are no R-squared. 13 00:00:48,100 --> 00:00:55,480 That means this folder can be monitored and the file system can be changed within the root axis. 14 00:00:56,060 --> 00:00:59,230 So all you need to do is you need to go to your carry. 15 00:01:02,200 --> 00:01:05,150 So, uh, more on to the rapture. 16 00:01:07,450 --> 00:01:12,750 So now what you want is go to the name and address. 17 00:01:14,290 --> 00:01:14,780 OK. 18 00:01:14,800 --> 00:01:20,800 So now we need to mount this there. 19 00:01:21,850 --> 00:01:22,710 So let's go. 20 00:01:26,430 --> 00:01:35,970 More to come in and options agreed, right, you need to support version two and then IP address. 21 00:01:40,930 --> 00:01:42,760 So this is the IP address. 22 00:01:45,850 --> 00:01:50,980 covid is an IP address on the part that is Rushden. 23 00:01:51,910 --> 00:01:59,680 So this is the part of this machine and where you want to the destination here that is in my tree. 24 00:02:02,260 --> 00:02:06,340 And we may get a new for the. 25 00:02:09,060 --> 00:02:12,240 Live to an this ship. 26 00:02:17,440 --> 00:02:17,800 And. 27 00:02:22,720 --> 00:02:31,230 Now, you can move on to this term benefits less so you can see back up for the users. 28 00:02:31,990 --> 00:02:39,100 So if you go to Alaska, I'm going to see back of and their users. 29 00:02:39,370 --> 00:02:40,710 So know what you can do. 30 00:02:40,900 --> 00:02:46,860 You can operate the five operations as a user. 31 00:02:47,170 --> 00:02:50,470 So I can do S.P. Wimbush. 32 00:02:52,480 --> 00:02:59,800 Not so much, let's say dash or let's say cash and hit enter. 33 00:03:04,390 --> 00:03:14,200 I want to tell you this now, see, the tomato process is a. 34 00:03:15,150 --> 00:03:15,840 Ganesh. 35 00:03:18,350 --> 00:03:27,350 Useability sitting on so you can perform the rest minus out there, so this can be, uh, the should 36 00:03:27,350 --> 00:03:37,040 be done now that this miner said, OK, I'm going to dump less. 37 00:03:37,820 --> 00:03:39,770 So now you can see the cash. 38 00:03:39,800 --> 00:03:43,970 OK, now we can run cash. 39 00:04:03,210 --> 00:04:04,900 OK, I think the. 40 00:04:13,540 --> 00:04:15,960 So told you seeing our revenues. 41 00:04:18,120 --> 00:04:25,360 OK, we cannot use this simple machinery, so now what you can do is you can. 42 00:04:34,280 --> 00:04:35,510 We can create the 43 00:04:38,840 --> 00:04:39,620 rochell. 44 00:04:42,650 --> 00:04:43,520 So let's create a. 45 00:05:03,630 --> 00:05:08,970 OK, let me go with this IP and paste here. 46 00:05:18,010 --> 00:05:29,330 And you need to choose the format of Minnesota, and I'm sure you need to put that on and. 47 00:05:31,660 --> 00:05:32,950 So let me start. 48 00:05:32,960 --> 00:05:34,600 There is not on one, two, three, four. 49 00:05:48,940 --> 00:05:50,280 The luxury was to. 50 00:06:40,560 --> 00:06:45,290 So we do not keep this except shirt. 51 00:06:51,120 --> 00:06:52,920 So at 36, I'm sorry. 52 00:07:11,490 --> 00:07:14,040 All right, now the terrorist mindset of the. 53 00:07:38,010 --> 00:07:42,030 So I'm painting the saving in the whole tree as it comparators. 54 00:07:48,540 --> 00:07:50,340 So now let me copy. 55 00:08:02,750 --> 00:08:09,230 Now, you see we have the temperatures, so set the permission. 56 00:08:18,490 --> 00:08:24,100 So let's go back to our machine and tell us so now we can run this one. 57 00:08:32,840 --> 00:08:40,700 So connection from red to white group, so you can see we got the Rucha, so here the thing is, whenever 58 00:08:40,700 --> 00:08:45,590 you have this right, this. 59 00:09:00,560 --> 00:09:06,430 So whenever you have this small groups crash or no ours crash and have built for any further, you can 60 00:09:06,440 --> 00:09:12,470 mount it onto your car next mission and then you can do the operations as a result. 61 00:09:12,710 --> 00:09:18,100 So here we created the revolution and we have executed in the normal user context. 62 00:09:18,500 --> 00:09:21,120 So we have said that user bit down. 63 00:09:21,140 --> 00:09:26,510 So that's why we have run this binary without any soula or without any password.