GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
πŸ—ƒ Types Of Digital Footprints πŸ—³
━━━━━━━━━━━━━
Digital footprints can be classified into two broad categories β€” active and passive footprints β€” which depends on how your information is acquired.

πŸ‘£ Active Digital Footprints πŸ‘£
━━━━━━━━━━━━━
Active digital footprints consist of the data you leave when you make deliberate choices on the internet. For instance, posts you make to your social media channels are a form of active footprint. When you are logged into a project management or similar site, changes you make that are connected to your login name are also part of your active footprint.

Here are a few examples of active digital footprints.

πŸ”΅Posting on Facebook, Instagram, Snapchat, Twitter, and other social media platforms.

πŸ”΅Filling out online forms, such as when signing up to receive emails or texts.

πŸ”΅Agreeing to install cookies on your devices when prompted by the browser.

πŸ‘£ Passive Digital Footprints πŸ‘£
━━━━━━━━━━━━━
Passive digital footprints are those you leave behind without intending to or, in some cases, without knowing it.

For instance, websites that collect information about how many times you’ve visited recently are adding to your digital footprint in a passive fashion. That’s because you don’t choose to give them this data. They collect it when a device at your IP address connects with their website. This is a hidden process, and you may not realize it is happening at all.

Here are three examples of passive digital footprints.

πŸ”΅Websites that install cookies in your device without disclosing it to you.

πŸ”΅Apps and websites that use geolocation to pinpoint your location.

πŸ”΅Social media news channels and advertisers that use your likes, shares, and comments to profile you and to serve up advertisements based on your interests.

Both active and passive footprints can be tracked and observed in multiple ways and by multiple sources.
━━━━━━━━━━━━━
-------------------->
@geekcode πŸ“
GeekCode pinned Β«πŸ—ƒ Types Of Digital Footprints πŸ—³ ━━━━━━━━━━━━━ Digital footprints can be classified into two broad categories β€” active and passive footprints β€” which depends on how your information is acquired. πŸ‘£ Active Digital Footprints πŸ‘£ ━━━━━━━━━━━━━ Active digital footprints…»
#COURSE
Introduction to Python: Python for Beginners
This course is a great introduction to both fundamental python programming concepts and the Python programming language.

Getting Started,Values and Data Types, Operators and Operands, Function Calls
Write scripts for general productivity tasks Read and comprehend Python code Gain knowledge in regard to general programming concepts

Enroll now -:
https://www.udemy.com/course/python-crash-course-for-beginners-l/?couponCode=7869C46CCA67F5D0A55D

Dont forget to share our channel
-------------------->
@geekcodeπŸ“

Share as more as 😍
Hacking Android Apps with Frida
https://youtu.be/iMNs8YAy6pk

-------------------->
@geekcode πŸ“

Share as more as 😍
⚑[Udemy] Hacking in Practice Certified Ethical Hacking Course ⚑

⭕️Download:
https://drive.google.com/drive/folders/1-kWcfPYzxzGFc4eLSfms_4dORl7sqh-t?usp=sharing

♻️Size:- 2 GB

#share & #supportus

-------------->
@geekcode πŸ“

Share as more as 😍
GeekCode pinned «⚑[Udemy] Hacking in Practice Certified Ethical Hacking Course ⚑ ⭕️Download: https://drive.google.com/drive/folders/1-kWcfPYzxzGFc4eLSfms_4dORl7sqh-t?usp=sharing ♻️Size:- 2 GB #share & #supportus --------------> @geekcode πŸ“ Share as more as 😍»
⚑ How Hackers Create Undetectable Malware and Viruses ⚠️
⚑

πŸ’Ž Author :- Nikhil Parekh

Requirements :-
πŸ”Έ Open Mind and Willingness to Implement
πŸ”Ή Notebook or Journal to Take Lots of Notes

Course Content :-
πŸ”Ή Understand What Undetectable Malware is
πŸ”Έ Learn How to Install Python and Pip
πŸ”Ή Install the Veil Framework
πŸ”Έ Understand the Gnome Desktop
πŸ”Ή Install Wine Mono
πŸ”Έ Learn How to Install Metasploit
πŸ”Ή Test the MSF Console
πŸ”Έ Create an Exploit with Veil
πŸ”Ή Test the Exploit on a Windows 10 Machine
πŸ”Έ How to Encrypt the Payload to Avoid Detection
πŸ”Ή Discover How Hackers Take Control of Webcams, Modify Documents and Much More


Source Link :-
https://www.udemy.com/course/undetectable-malware/

Download Link :-
https://mega.nz/folder/Ug9RFK5Z#nrZTlXMaJippG34v3g-fqA

Share and Pin our Channel at top πŸ‘β€οΈ
POPULAR MOBILE BROWSERS FOUND VULNERABLE AT BAR SPOOOFING VULNERABILITY


https://thehackernews.com/2020/10/browser-address-spoofing-vulnerability.html

------------->
@geekcode πŸ“

Share as more as 😍
GeekCode pinned Β«POPULAR MOBILE BROWSERS FOUND VULNERABLE AT BAR SPOOOFING VULNERABILITY https://thehackernews.com/2020/10/browser-address-spoofing-vulnerability.html -------------> @geekcode πŸ“ Share as more as 😍»
πŸ”° Practical Ethical Hacking - The Complete Course πŸ”°

https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course

Use Coupon: FREELEARN

#share & #supportus

-------------->
@geekcode πŸ“

Share as more as 😍
Hey guys don't leave us πŸ™

Keep supporting us 😊
I need your support 😊

@geekcode ❀️
GeekCode pinned Β«Hey guys don't leave us πŸ™ Keep supporting us 😊 I need your support 😊 @geekcode ❀️»
Business Analytics Course 2020

Learn the Core of Data Science, Analytical Skill and Business Knowledge to make confident decisions.


Enroll Now - > https://geekcode.com/love-u-guys

#share & #supportus

----------------> @geekcode πŸ“

Share as more as 😍
GeekCode pinned «HawkScan Security Tool for Reconnaissance and Information Gathering on a website. https://github.com/c0dejump/HawkScan #share & #supportus ---------------> @geekcode Share as more as 😍»
Multiple Address Bar Spoofing Vulnerabilities In Mobile Browsers (Safari, Yandex for Android, Opera Touch for iOS, UC Browser for Android, Opera Mini Android, RITS Browser and Bolt Browser iOS)
https://www.rafaybaloch.com/2020/10/multiple-address-bar-spoofing-vulnerabilities.html

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
#Enroll
Bug Bounty - Web Application Penetration Testing Bootcamp

Free For Limited Time

Enroll Now :
https://www.udemy.com/course/complete-bug-bounty-masterclass-course/?couponCode=0052197D6FDD253AB87A

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍