Basic Computer:
π΅ father of computer : Charles babbage
π΅Father of modern computer:Alan Turin
π΅father of super computer
:Seymour Cray
π΅ invention
π·First mechanical calculator -
β Blaise Pascal
π·punch card
β Herman hollerith
π΅Basic architecture of computer developed by
β Charles babbage
π·Analytical engine
β Charles babbage
πΉ1976 Cray 1: first super computer
π·1991 Param: India's first super computer
π΅ computer for personal use is called?
β micro computer
π΅ multiprogramming in 3rd generation
π·Remote processing and time Sharing 3rd generation
π·Discovery of IC - 3rd generation
π΅Microprocessor In 4th generation
@geekcode β‘
π΅ father of computer : Charles babbage
π΅Father of modern computer:Alan Turin
π΅father of super computer
:Seymour Cray
π΅ invention
π·First mechanical calculator -
β Blaise Pascal
π·punch card
β Herman hollerith
π΅Basic architecture of computer developed by
β Charles babbage
π·Analytical engine
β Charles babbage
πΉ1976 Cray 1: first super computer
π·1991 Param: India's first super computer
π΅ computer for personal use is called?
β micro computer
π΅ multiprogramming in 3rd generation
π·Remote processing and time Sharing 3rd generation
π·Discovery of IC - 3rd generation
π΅Microprocessor In 4th generation
@geekcode β‘
Sub-Drill
A very (very) simple subdomain finder based on online, free and API-less services.
https://github.com/Fadavvi/Sub-Drill
#share & #supportus
----------> @geekcode π
Share as more as π
A very (very) simple subdomain finder based on online, free and API-less services.
https://github.com/Fadavvi/Sub-Drill
#share & #supportus
----------> @geekcode π
Share as more as π
GitHub
GitHub - Fadavvi/Sub-Drill: A very (very) FAST and simple subdomain finder based on online & free services. Without any configurationβ¦
A very (very) FAST and simple subdomain finder based on online & free services. Without any configuration requirements. - GitHub - Fadavvi/Sub-Drill: A very (very) FAST and simple subdomai...
HACKERS TYPES
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.
*White Hat hackers* are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
*Black Hat hackers*, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
*Grey Hat hackers* are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the ownerβs permission or knowledge.
*Miscellaneous Hackers*
Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it β
*Red Hat Hackers*
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.
*Blue Hat Hackers*
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Β»Elite Hackers
This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
Β»Script Kiddie
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.
Β»Green Hat Hacker
A neophyte, n00b, or newbie or Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and a Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
Β»Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.
@geekcode π
Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.
*White Hat hackers* are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.
*Black Hat hackers*, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.
*Grey Hat hackers* are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the ownerβs permission or knowledge.
*Miscellaneous Hackers*
Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it β
*Red Hat Hackers*
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.
*Blue Hat Hackers*
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Β»Elite Hackers
This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.
Β»Script Kiddie
A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.
Β»Green Hat Hacker
A neophyte, n00b, or newbie or Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and a Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.
Β»Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.
@geekcode π
π° DEDSEC All Courses and Tool Free Download!! π°
Course List:
π³ Advance Course of Android Hacking
π³ Advance Of Black Hat Hacking
π³ Antivirus Evasion Course
π³ Complete Basic Course Of Android Hacking
π³ Complete Basic Course Of Kali Linux
π³ Complete Course Of Wifi Hacking
π³ Complete Course Of Carding
π³ ERC Course By DedSec
π³ Facebook & Instagram Hacking
π³ Manually Binding And Making FUD Payloads For Android
π³ Online Accounts Cracking Course
π³ Reverse Engineering Course β The Hacks Behind Cracking
π³ Spamming Practical Course β First Time In Internet History
π³ DedSec Latest FUD Ransomware
βDownload link:
https://mega.nz/folder/6WZ3kQRT#-_98YfFlIrVGkFbpKkQ34A
#share & #supportus
-------------> @geekcode π
Share as more as π€©
Course List:
π³ Advance Course of Android Hacking
π³ Advance Of Black Hat Hacking
π³ Antivirus Evasion Course
π³ Complete Basic Course Of Android Hacking
π³ Complete Basic Course Of Kali Linux
π³ Complete Course Of Wifi Hacking
π³ Complete Course Of Carding
π³ ERC Course By DedSec
π³ Facebook & Instagram Hacking
π³ Manually Binding And Making FUD Payloads For Android
π³ Online Accounts Cracking Course
π³ Reverse Engineering Course β The Hacks Behind Cracking
π³ Spamming Practical Course β First Time In Internet History
π³ DedSec Latest FUD Ransomware
βDownload link:
https://mega.nz/folder/6WZ3kQRT#-_98YfFlIrVGkFbpKkQ34A
#share & #supportus
-------------> @geekcode π
Share as more as π€©
mega.nz
File folder on MEGA
Cisco CCNA 200-301 Exam: Complete Course with practical labs [79 Hrs]
FREE For 48 Hrs
The complete course to help you prepare and pass Cisco's newest CCNA 200-301 exam. Everything you need: Theory and labs
ENROLL HERE π ->
https://geekcode.com/CCNA-COURSE-CISCO-EXAM-TRAINING
#share & #supportus
------------> @geekcode π
Share as more as π
FREE For 48 Hrs
The complete course to help you prepare and pass Cisco's newest CCNA 200-301 exam. Everything you need: Theory and labs
ENROLL HERE π ->
https://geekcode.com/CCNA-COURSE-CISCO-EXAM-TRAINING
#share & #supportus
------------> @geekcode π
Share as more as π
#Enroll
Cyber Security and Ethical Hacking introduction course
https://www.udemy.com/course/best-cyber-security-and-ethical-hacking-introduction-course/?couponCode=CHRISTMAS-SPECIAL100
#share & #supportus
--------------> @geekcode π
Share as more as π
Cyber Security and Ethical Hacking introduction course
https://www.udemy.com/course/best-cyber-security-and-ethical-hacking-introduction-course/?couponCode=CHRISTMAS-SPECIAL100
#share & #supportus
--------------> @geekcode π
Share as more as π
Topgrade - Command Line Tool to Upgrade All Packages on Linux
https://linoxide.com/tools/topgrade-upgrade-packages-linux/
#share & #supportus
-----------> @geekcode π
Share as more as π
https://linoxide.com/tools/topgrade-upgrade-packages-linux/
#share & #supportus
-----------> @geekcode π
Share as more as π
LinuxOPsys
LinuxOPsys: Linux How-to guide, Tutorials & Tips
LinuxOPsys is a Linux blog website that publishes how-to guide, tutorials & tips about server adminstration, installation, commands, and security.
π° Ethical Hacking - Hands-On Training Part 2 π°
Ethical Hacking - Hands-on Training Part II is an intermediate level hands-on course for ethical hacking.
https://www.udemy.com/course/ethical-hacking-hands-on-training-part-ii/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-1zqbG0LfgHBI2nS2BEJFFQ&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=74C9590127DE50FB9C2A
#share & #supportus
@geekcode π
share as more as π
Ethical Hacking - Hands-on Training Part II is an intermediate level hands-on course for ethical hacking.
https://www.udemy.com/course/ethical-hacking-hands-on-training-part-ii/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-1zqbG0LfgHBI2nS2BEJFFQ&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=74C9590127DE50FB9C2A
#share & #supportus
@geekcode π
share as more as π
π΅ ABOUT ROOT βοΈ Why Root ?
What can be achieved with root
1. Firmware or backup of a smartphone will not be lost
2. Loss of ads in programs, games
3. Change the CPU performance mode
4. Change the appearance of Android beyond recognition. (backgrounds, icons, animation)
5. Software hacking games
and many useful features
π΅ Disadvantages:
1. Termination of the warranty
2. It will not be possible to update the official android versions
3. There may be problems working with official Android apps
βοΈRoot We Need Whyπ€
Root is primarily used to hack something or to break a site, system or program.
You can't do any hacking without rootβοΈ
#share & #supportus
-------------> @geekcode π
Share as more as π€©
What can be achieved with root
1. Firmware or backup of a smartphone will not be lost
2. Loss of ads in programs, games
3. Change the CPU performance mode
4. Change the appearance of Android beyond recognition. (backgrounds, icons, animation)
5. Software hacking games
and many useful features
π΅ Disadvantages:
1. Termination of the warranty
2. It will not be possible to update the official android versions
3. There may be problems working with official Android apps
βοΈRoot We Need Whyπ€
Root is primarily used to hack something or to break a site, system or program.
You can't do any hacking without rootβοΈ
#share & #supportus
-------------> @geekcode π
Share as more as π€©