i need help with the hydra command

Can anyone help me regarding this command hydra -s 80 -l admin -P /root/Desktop/wl/cctvpass.txt -e ns -t 16 192.168.146.49 http-post-form Hydra v9.0 (c) 2019 by van Hauser/THC – Please do not use in military or secret service organizations, or for illegal purposes. After I executed the command this is what came out Hydra (https://github.com/vanhauser-thc/thc-hydra) starting at 2020-09-11 15:58:42 [WARNING] You must supply the web page as an additional option or via -m, default path set to / [ERROR] the variables argument needs at least the strings ^USER^, ^PASS^, ^USER64^ or ^PASS64^: (null) I start at hydra and try to learn

Do I need port forwarding for msfconsole remote target exploitation

I was running a series of test attacks on my virtual test machine. Here i had to set the RHOST option to the Ip-address of the target and LHOST to the Ip-address of my local machine. I am certain that this works well locally because both machines would be on the same private network, with private ip addresse. But what if i had my linux machine(not vm) connected to my phone which is serving as a router. If i ran such an attack on a machine on the internet, RHOST would be the public Ip-address of the target machine; i am skeptical as to what ip address i would put for my LHOST option; can i just use my private ip address(given to my linux from my phone hotspot) as this option or do i have to type in the public ip-address for my phone. And if i do have to put in my phone’s public IP is port forwarding needed in such a case or it would work just fine?

Why do we need a separate notation for П-types?


Main

I am confused about the motivation behind the need for a separate notation for П-types, that you can find in type systems from λ2 on. The answer usually goes like so – think about how one can represent a signature of identity function – it can be λa:type.λx:a.x or λb:type.λx:b.x. The subtle part, they say, is that these two signatures not only not equal, they are not alpha-equivalent as type variables a and b are free variables inside their correspondent abstractions. So to overcome this pesky syntactic issue, we present П binder that plays nicely with alpha-conversion.

So the question: why is that? Why not just fix the notion of alpha-equivalence?

UPDATE z:

Oh, silly of me, λa:type.λx:a.x and λb:type.λx:b.x are alpha equivalent. But why a:type -> a -> a and b:type -> b -> b arent then.

UPDATE suc z:

Aha, interesting, I guess this is a perfect example of selective blindness =D

I am reading the book Type Theory and Formal Proof, and in the chapter about lambda2 author motivates the existence of П using exactly that kind of argumentation – one cant say that \t:*.\v:t.v : * -> t -> t because this makes two alpha-equivalent terms\t:*.\v:t.v and \g:*.\v:g.v have different types, as corresponding types are not alpha-equivalent, where types like t:* -> t -> t are in fact alpha-invariant. Mind the difference between t:* -> t -> t and * -> t -> t. But, doesn’t it make this argument a bit trivial, and is it even something meaningful to talk about type a -> b where a and b are unbound by any quantifiers variables. Andrej Bauer pointed out in the comments that П is indeed resembles a lambda abstraction with a few additional bells and whistles.

All in all, I am done with that one, thank you guys.

Need some advices in beginning in white-hat [closed]

I’ve just started learning white-hat hacking and need some advices. Firstly, where I can get tasks from Linux and bash to practice, because I cannot find them in the Net? Secondly, where I can get tasks from python to practice, because there aren’t a wide range of sites with this topic? Also, if it is possible, can you write some advices to me how to learn and practice in white-hat hacking better, because it’s my dream.

10 Reasons Why You Need to Use Phone Number Locator Service!

In this universe of science and innovation, the men of science invest their energy in research facilities looking for something new. We additionally witness their push to manage natural products. Presently this time, it is an iPhone from the place of Apple that has been pulling in all the considerations worldwide in the course of recent months. 
  Buy Mobile Database 
The device irregularities of US can purchase this iPhone right now. Yet, the individuals of Asian nations like India need to hold up to mid 2008 to lay their hands on such an enchantment development. The telephone has joined screen and consolidates the highlights of a cell phone, ipod, advanced coordinator and remote web gadgets. It is a progressive telephone. It does things that no telephone has ever done previously yet it has likewise been said that it needs includes found even on the most essential telephones. So it has welcomed both praise just as analysis. 
 
iPhone is a small, thin, exquisite hand-held PC whose screen is a piece of touch touchy glass. The $500 and $600 models have 4 and 8 GB stockpiling and can store 825 and 1825 tunes individually. The iphone is assemblage of cellphone, video ipod, email terminal, internet browser, camera, morning timer, palm type coordinator and one hell of superficial point of interest. The telephone is so smooth and slender that makes Treos and Blackberrys look large. At the point when the glass of the telephone get smudgy, a sleeve cleans it off yet it doesn’t scratch without any problem. However, the greatest accomplishment in this telephone is the product accessible. It is quick, excellent, menu free and extremely easy to work. The main physical catch underneath the screen consistently opens the landing page showing the symbols for the iphone’s 16 capacities. Records look with a flick of finger; CD fronts flip over as it is flicked. The clients don’t need to check the phone message yet it itself checks the client. The just one catch press uncovers the holding up messages, recorded like email. There is no dialing in, no secret word. To answer a call, the client can tap answer on the screen, or squeeze the minuscule amplifier. iPhone has a speaker telephone and vibration mode however both are powerless. The music or video playback delays until you hang up. In any case, while making a call, be that as it may, the clients need to follow a protracted procedure containing 6 stages: wake the telephone, open its catches, gather the home screen, open the telephone program, see the ongoing calls or speed dial list and select a name. The call quality is simply normal yet email is fabulous. Approaching messages are completely designed, total with illustrations. The clients even can open Word, Excel and PDF reports however can’t alter. The internet browser is extremely commendable. It has different open pages, textual styles, designs, spring up menus, check boxes, interactive connections and dial-capable telephone number. Everything is finished with the tap of a finger.