GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
πŸ”° [Udemy] Real world Hacking & Penetration testing: Version-1 πŸ”°

♻️Size:- 772 MB

⭕️Source link:-
https://www.udemy.com/course/real-world-hacking-penetration-testing/

⭕️Download link:-
https://drive.google.com/drive/folders/1-4dHS4gav7btrkyE8TQymfnhCyCjenN3

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
The best courses on coding, data science, and cybersecurity on sale this week  XDA Developers
https://www.xda-developers.com/the-best-courses-on-coding-data-science-and-cybersecurity-on-sale-this-week/

#share & #supportus

---------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
♨️How To Change IMEI Number

βœ… Root Required

πŸŒ€Steps

1. Download Xposed Installer
2. Install it
3. Download IMEI pro apk
4. Install it
5. Open Xposed Installer
6. Go to sidebar (menu)
7. Click on Modules
8. Check IMEI apk Module
9. Reboot Your device
10. Open IMEI apk
11. Change IMEI
12. Reboot Your Device

#share & #supportus

----------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
♨️How To View Saved Wifi Passwords In Android πŸ“Ά

βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–βž–
πŸ“‚ Using File Managers:

πŸ”Ž First of all, you need a file explorer that gives you the read access to the root folder. If your default File manager doesn’t give you the read access to the root folder, then you can install Root Explorer or Super Manager which will grant superuser permission to you to access the system folder

1️⃣ Go to data/misc/wifi folder, and you will find a file named wpa_supplicant.conf.

️2️⃣ Open the file and make sure to open the file in built-in text/HTMLviewer for the task. Now in this file, you will be able to see the network SSID and their passwords next to it.

πŸ“ Now note down the network name and its password. In this way, you will be able to view all saved WiFi password on the Android device.

⚠️ Note: Please do not edit anything in wpa_supplicant.conf as it can alter your device working or it will have the effect on your WiFi connectivity.

πŸ—‚ ES File Explorer:

1️⃣ Download and Install ES File Explorer App on your Android device and open the app.

2️⃣ Now you need to enable the β€œRoot Explorer” option in ES File Explorer.

3️⃣ Now you need to move to the Root folder in ES File Explorer, and you need to find a directory called β€œData.”

4️⃣ Now under the β€œData” you need to locate the folder β€œMisc”

5️⃣ Now under the WiFi folder, you need to locate the file with name wpa_supplicant.conf. Simply open the file with ES File Explorer’s built-in text/HTML viewer.

6️⃣ Now you can see all your SSID (network name) along with PSK (Password) next to it and close the file.

βœ… That’s it! You are done, this is how you can find saved WiFi password using ES file explorer.

#share & #supportus

---------------->
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
#Enroll
Build Application for Google Assistant
Development of application for Google Assistant

Enroll Here-:
https://www.udemy.com/course/build-action-on-google/?couponCode=FREEDIWALI

#share & #supportus

------------------>
@geekcode πŸ“

Share as more as 😍
Potential Security Threats To Your Computer Systems?
A computer system threat is anything that leads to loss or corruption of data or physical damage to the hardware and/or infrastructure. Knowing how to identify computer security threats is the first step in protecting computer systems. The threats could be intentional, accidental or caused by natural disasters.
In this article, we will introduce you to the common computer system threats and how you can protect systems against them.

#share & #supportus

------------------> @geekcode πŸ“

Share as more as 😍
What is a Security Threat?
Security Threat is defined as a risk that which can potentially harm computer systems and organization. The cause could be physical such as someone stealing a computer that contains vital data. The cause could also be non-physical such as a virus attack. In these tutorial series, we will define a threat as a potential attack from a hacker that can allow them to gain unauthorized access to a computer system.

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍
What are Physical Threats?

A physical threat is a potential cause of an incident that may result in loss or physical damage to the computer systems.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the rooms housing the hardware, etc.
External: These threats include Lightning, floods, earthquakes, etc.
Human: These threats include theft, vandalism of the infrastructure and/or hardware, disruption, accidental or intentional errors.
To protect computer systems from the above mentioned physical threats, an organization must have physical security control measures.
The following list shows some of the possible measures that can be taken:
Internal: Fire threats could be prevented by the use of automatic fire detectors and extinguishers that do not use water to put out a fire. The unstable power supply can be prevented by the use of voltage controllers. An air conditioner can be used to control the humidity in the computer room.
External: Lightning protection systems can be used to protect computer systems against such attacks. Lightning protection systems are not 100% perfect, but to a certain extent, they reduce the chances of Lightning causing damage. Housing computer systems in high lands are one of the possible ways of protecting systems against floods.
Humans: Threats such as theft can be prevented by use of locked doors and restricted access to computer rooms.

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
What are Non-physical threats?

A non-physical threat is a potential cause of an incident that may result in;
Loss or corruption of system data
Disrupt business operations that rely on computer systems
Loss of sensitive information
Illegal monitoring of activities on computer systems
Cyber Security Breaches
Others
The non-physical threats are also known as logical threats. The following list is the common types of non-physical threats;
Virus
Trojans
Worms
Spyware
Key loggers
Adware
Distributed Denial of Service Attacks
Unauthorized access to computer systems resources such as data
Phishing
Other Computer Security Risks
To protect computer systems from the above-mentioned threats, an organization must have logical security measures in place. The following list shows some of the possible measures that can be taken to protect cyber security threats
To protect against viruses, Trojans, worms, etc. an organization can use anti-virus software. In additional to the anti-virus software, an organization can also have control measures on the usage of external storage devices and visiting the website that is most likely to download unauthorized programs onto the user’s computer.
Unauthorized access to computer system resources can be prevented by the use of authentication methods. The authentication methods can be, in the form of user ids and strong passwords, smart cards or biometric, etc.
Intrusion-detection/prevention systems can be used to protect against denial of service attacks.There are other measures too that can be put in place to avoid.

#share & #supportus

------------------>
@geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
Cybersecurity steps businesses must urgently adopt  TechRadar
https://www.techradar.com/news/cybersecurity-steps-businesses-must-urgently-adopt

#share & #supportus

----------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
#COURSE
How to Make a WordPress Website – Step by Step!!

A complete step by step wordpress tutorial! Learn how to use WordPress to develop and build a website from scratch.…

π—˜π—»π—Ώπ—Όπ—Ήπ—Ή 𝗛𝗲𝗿𝗲:-

https://geekcode.com/website

#share & #supportus

-------------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
Hey guys ☺️
geekcode is here β™₯️

Announcement-:

Geekcode will conduct online giveaways related to programming ebooks & books,
Online coding platform memberships.

If you wants to participate in this kind of giveaways so read rules from here πŸ‘‡

https://t.me/joinchat/AAAAAFUsOkh6mIhB1giwDQ


#shareπŸ‘‰us #supportus

@geekcode πŸ“

Share as more as 😍