GeekCode
793 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
😍Udemy 100% off Courses || Coupon Applied || limited time free😍

πŸŽ‰ Python Network Programming for Network Engineers (Python 3)

https://bit.ly/3mEM5ha

[ Expire in One Day ]

πŸŽ‰Setup a Virtual Web Server using Linode or Digital Ocean

https://bit.ly/3nJZZA1

[Expires In One Days]

πŸŽ‰Microsoft Word 2016 for Everyone

https://bit.ly/2KxVrhD

[Expires In One Days]

πŸŽ‰Introduction to Domain Names and Web Hosting - Quick Guide

https://bit.ly/3phpGrR

[Expires In One Days]

πŸŽ‰Create a Members Only Blog using PHP, MySQL, & AJAX

https://bit.ly/2WBkxP8

[Expires In One Days]

πŸŽ‰Machine Learning for Kids and Beginners

https://bit.ly/37FND6o

[Expires In One Days]

πŸŽ‰Step-by-Step SEO For Beginners: Boost Your Website

https://bit.ly/3nL8YRg

[Expires In One Days]

πŸŽ‰AI in Marketing: How to Leverage AI to Grow Your Business

https://bit.ly/2JeMvgH

[Expires In Two Days]

πŸŽ‰Draw Portraits from a Photograph

https://bit.ly/3rhAlVk

πŸŽ‰Learn Excel Pivot Tables with Dr. John Miko

https://bit.ly/2WCwVyx

πŸŽ‰Express Your-self, Art with Polymer Clay

https://bit.ly/37LvfJr

πŸŽ‰Photoshop In-Depth Compositing and Design 2021

https://bit.ly/2KuIK7m

[Expires In Two Days]

πŸŽ‰Instagram Marketing 2021: Growth and Promotion on Instagram

https://bit.ly/38wwvPK

[Expires In One Day]

πŸŽ‰IPhone Photography Taking Better Photo with Your Smartphone

https://bit.ly/3nXuPW5

[Expires In One Day]

πŸŽ‰Fundamental of Embedded Operating Systems

https://bit.ly/3mFrSrr

[Expires In Two Days]


#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
Basic Computer:

πŸ”΅ father of computer : Charles babbage


πŸ”΅Father of modern computer:Alan Turin


πŸ”΅father of super computer

:Seymour Cray

πŸ”΅ invention


πŸ”·First mechanical calculator -



βœ…Blaise Pascal


πŸ”·punch card




βœ…Herman hollerith


πŸ”΅Basic architecture of computer developed by

βœ…Charles babbage


πŸ”·Analytical engine


βœ… Charles babbage

πŸ”Ή1976 Cray 1: first super computer


πŸ”·1991 Param: India's first super computer

πŸ”΅ computer for personal use is called?





βœ…micro computer

πŸ”΅ multiprogramming in 3rd generation


πŸ”·Remote processing and time Sharing 3rd generation

πŸ”·Discovery of IC - 3rd generation

πŸ”΅Microprocessor In 4th generation

@geekcode ⚑
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Don't left us πŸ’™

Please join @geekcode πŸ“
HACKERS TYPES

Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.

*White Hat hackers* are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.

*Black Hat hackers*, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.

*Grey Hat hackers* are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.

*Miscellaneous Hackers*
Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it βˆ’

*Red Hat Hackers*
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.

*Blue Hat Hackers*
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Β»Elite Hackers

This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.

Β»Script Kiddie

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.

Β»Green Hat Hacker

A neophyte, n00b, or newbie or Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and a Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

Β»Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.

@geekcode πŸ“
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° DEDSEC All Courses and Tool Free Download!! πŸ”°

Course List:
πŸ”³ Advance Course of Android Hacking

πŸ”³ Advance Of Black Hat Hacking

πŸ”³ Antivirus Evasion Course

πŸ”³ Complete Basic Course Of Android Hacking

πŸ”³ Complete Basic Course Of Kali Linux

πŸ”³ Complete Course Of Wifi Hacking

πŸ”³ Complete Course Of Carding

πŸ”³ ERC Course By DedSec

πŸ”³ Facebook & Instagram Hacking

πŸ”³ Manually Binding And Making FUD Payloads For Android

πŸ”³ Online Accounts Cracking Course

πŸ”³ Reverse Engineering Course – The Hacks Behind Cracking

πŸ”³ Spamming Practical Course – First Time In Internet History

πŸ”³ DedSec Latest FUD Ransomware

β­•Download link:

https://mega.nz/folder/6WZ3kQRT#-_98YfFlIrVGkFbpKkQ34A




#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
Cisco CCNA 200-301 Exam: Complete Course with practical labs [79 Hrs]

FREE For 48 Hrs

The complete course to help you prepare and pass Cisco's newest CCNA 200-301 exam. Everything you need: Theory and labs

ENROLL HERE πŸ‘€ ->
https://geekcode.com/CCNA-COURSE-CISCO-EXAM-TRAINING

#share & #supportus

------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
#Enroll
Cyber Security and Ethical Hacking introduction course

https://www.udemy.com/course/best-cyber-security-and-ethical-hacking-introduction-course/?couponCode=CHRISTMAS-SPECIAL100

#share & #supportus

--------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Ethical Hacking - Hands-On Training Part 2 πŸ”°

Ethical Hacking - Hands-on Training Part II is an intermediate level hands-on course for ethical hacking.

https://www.udemy.com/course/ethical-hacking-hands-on-training-part-ii/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-1zqbG0LfgHBI2nS2BEJFFQ&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=74C9590127DE50FB9C2A

#share & #supportus

@geekcode πŸ“

share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
SUPPORT US πŸ’™ @geekcode πŸ™