GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
An offline Windows app that helps developers in everyday tasks.

https://devtoys.app

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
#knowledge

What is wiretapping?

wiretapping is the monitoring of telephone and Internet-based conversations by a third party, often by covert means. The wire tap received its name because, historically, the monitoring connection was an actual electrical tap on the telephone line. Legal wiretapping by a government agency is also called lawful interception. Passive wiretapping monitors or records the traffic, while active wiretapping alters or otherwise affects it.


@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Types of malware 🔥

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
The cool service explainshell.com provides a convenient interface for finding help information for any command in Linux. It is enough just to drive the appropriate command with all the arguments into the search box -

https://explainshell.com


@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
SERIOUS CRYPTOGRAPHY : A Practical Introduction to Modern Encryption

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
How do Hackers Hide Themselves?

1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an 'RDP' session to attack.
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.


For query/promotion : @geekcodevipbot

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM