CODING HACKING DEVELOPERS COLLEGE
6.14K subscribers
151 photos
8 videos
33 files
78 links
Disclaimer: This Channel is for educational purpose only , no one takes responsibility if you do anything wrong
𝙃𝙖𝙘𝙠 𝙏𝙝𝙚 𝙍𝙞𝙘𝙝💲= 𝙁𝙚𝙚𝙙 𝙏𝙝𝙚 𝙋𝙤𝙤𝙧🙌


FOUNDER:- @TeamVoiceContactBot
Download Telegram
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 16 = PUA PUP VIRUS

Potentially Unwanted Applications (PUAs) are unwanted software programs that come bundled in legitimate free software programs as a package. These may also be called Potentially Unwanted Programs, or PUPs.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 17 = RFI ATTACK

Remote file inclusion (RFI) is an attack targeting vulnerabilities in web applications that dynamically reference external scripts. The perpetrator's goal is to exploit the referencing function in an application to upload malware (e.g., backdoor shells) from a remote URL located within a different domain.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 18 = TERMUX HACKING

Termux is a terminal emulator and Linux environment app for Android. It also doesn't require you to root your device.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 19 = NGROK INSTALLATION

Ngrok provides a real-time web UI where you can introspect all HTTP traffic running over your tunnels. Replay any request against your tunnel with one click.
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 20 = PAYLOAD CREATION

Payload is malware that the threat actor intends to deliver to the victim. For example, if a cybercriminal sent out an email with a malicious Macro as the attachment and the victim gets infected with ransomware, then the ransomware is the payload (and not the email or document).
👍1
🔘🔘 HACKING/COMPUTER COURSES 🔘🔘


⛳️ FREE COURSES | π𝐭𝐡𝐨𝐧 CLICK HERE

⛳️ HACKING COURSES FREE CLICK HERE

⛳️ CODING COURSE FREE CLICK HERE

⛳️ BOOKS HACKING COURSES CLICK HERE
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 21 = PORT FORWARDING

Port forwarding allows remote computers (for example, computers on the Internet) to connect to a specific computer or service within a private local-area network (LAN).
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 22 = GOOGLE HACKING

Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 23 = ABOUT TORRENTS

Torrent files are the files that are shared using the BitTorrent Protocol. This protocol is a technique for peer-to-peer sharing of files over the Internet. Usually, the files are scattered over a decentralized user network and are downloaded from there.
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 24 = ABOUT SDN

Software-Defined Networking (SDN) is a network architecture approach that enables the network to be intelligently and centrally controlled, or 'programmed,' using software applications.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 25 = WAF BYPASS

Web application firewall (WAF) is a set of monitors and filters designed to detect and block network attacks on a web application. WAFs refer to the application layer of the OSI model. The web application firewall is used as a security tool. In real-time, it decides whether to grant or deny access.

❤️‍🔥
👍3
Many students confused how to open short links so watch this video carefully to know how to open links😉

https://youtube.com/shorts/HE38v2aEmjU?feature=share
https://youtube.com/shorts/HE38v2aEmjU?feature=share
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 26 = OS DESIGNING

Every OS can be made to perform well by using advanced compiler techniques, and if that fails then systematically breaking down component boundaries. Make it work, make it right, make it fast. Fast is last, always.
👍2
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 27 = Phishing

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details or other sensitive details, by impersonating oneself as a trustworthy entity in a digital communication. 
👍1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 28 = DEEPFAKE

The term deepfake is typically used to refer to a video that has been edited using an algorithm to replace the person in the original video with someone else (especially a public figure) in a way that makes the video look authentic. The 'deep' in 'deepfake' is likely related to a process called 'deep learning.
👍2
SUBSCRIBE IT For NEW LECTURES 👇 NEW LECTURES WILL BE UPLOADED NOW ON Yt 👇

https://youtube.com/channel/UCAtqNZPadl3cBItfPA4GbDA

JOiN
🌟 @TeamVoiceDiscussionGroup

🌟 @PW_LECTURE_01

🌟 @UPSC_DISCUSSION_01
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 29 = MIND HEALING

We want to reach the subconscious to clear out all the limiting and detrimental beliefs we've been clinging to that are impeding our healing progress. Try meditating on feelings of wellness and wholeness.
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 30 = Cat-Phishing

Catphishing is a form of online deception that involves using a fake identity to lure unknowing victims into a relationship with the intent of exploiting them for money or access to private data.
1
🟢𝐀𝐫𝐭𝐢𝐜𝐥𝐞 31 = CCTV HACKING

CCTV cameras are a great tool for protecting you and your property, but they are also vulnerable to hacking and used for spying on you through the internet.
👍21