GeekCode
793 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Basic Computer:

πŸ”΅ father of computer : Charles babbage


πŸ”΅Father of modern computer:Alan Turin


πŸ”΅father of super computer

:Seymour Cray

πŸ”΅ invention


πŸ”·First mechanical calculator -



βœ…Blaise Pascal


πŸ”·punch card




βœ…Herman hollerith


πŸ”΅Basic architecture of computer developed by

βœ…Charles babbage


πŸ”·Analytical engine


βœ… Charles babbage

πŸ”Ή1976 Cray 1: first super computer


πŸ”·1991 Param: India's first super computer

πŸ”΅ computer for personal use is called?





βœ…micro computer

πŸ”΅ multiprogramming in 3rd generation


πŸ”·Remote processing and time Sharing 3rd generation

πŸ”·Discovery of IC - 3rd generation

πŸ”΅Microprocessor In 4th generation

@geekcode ⚑
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Don't left us πŸ’™

Please join @geekcode πŸ“
HACKERS TYPES

Hackers can be classified into different categories such as white hat, black hat, and grey hat, based on their intent of hacking a system. These different terms come from old Spaghetti Westerns, where the bad guy wears a black cowboy hat and the good guy wears a white hat.

*White Hat hackers* are also known as Ethical Hackers. They never intent to harm a system, rather they try to find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments.

*Black Hat hackers*, also known as crackers, are those who hack in order to gain unauthorized access to a system and harm its operations or steal sensitive information.

*Grey Hat hackers* are a blend of both black hat and white hat hackers. They act without malicious intent but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.

*Miscellaneous Hackers*
Apart from the above well-known classes of hackers, we have the following categories of hackers based on what they hack and how they do it βˆ’

*Red Hat Hackers*
Red hat hackers are again a blend of both black hat and white hat hackers. They are usually on the level of hacking government agencies, top-secret information hubs, and generally anything that falls under the category of sensitive information.

*Blue Hat Hackers*
A blue hat hacker is someone outside computer security consulting firms who is used to bug-test a system prior to its launch. They look for loopholes that can be exploited and try to close these gaps. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Β»Elite Hackers

This is a social status among hackers, which is used to describe the most skilled. Newly discovered exploits will circulate among these hackers.

Β»Script Kiddie

A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept, hence the term Kiddie.

Β»Green Hat Hacker

A neophyte, n00b, or newbie or Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and a Green Hat Hacker is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology and hacking.

Β»Hacktivist
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof-service attacks.

@geekcode πŸ“
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° DEDSEC All Courses and Tool Free Download!! πŸ”°

Course List:
πŸ”³ Advance Course of Android Hacking

πŸ”³ Advance Of Black Hat Hacking

πŸ”³ Antivirus Evasion Course

πŸ”³ Complete Basic Course Of Android Hacking

πŸ”³ Complete Basic Course Of Kali Linux

πŸ”³ Complete Course Of Wifi Hacking

πŸ”³ Complete Course Of Carding

πŸ”³ ERC Course By DedSec

πŸ”³ Facebook & Instagram Hacking

πŸ”³ Manually Binding And Making FUD Payloads For Android

πŸ”³ Online Accounts Cracking Course

πŸ”³ Reverse Engineering Course – The Hacks Behind Cracking

πŸ”³ Spamming Practical Course – First Time In Internet History

πŸ”³ DedSec Latest FUD Ransomware

β­•Download link:

https://mega.nz/folder/6WZ3kQRT#-_98YfFlIrVGkFbpKkQ34A




#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩
This media is not supported in your browser
VIEW IN TELEGRAM
Cisco CCNA 200-301 Exam: Complete Course with practical labs [79 Hrs]

FREE For 48 Hrs

The complete course to help you prepare and pass Cisco's newest CCNA 200-301 exam. Everything you need: Theory and labs

ENROLL HERE πŸ‘€ ->
https://geekcode.com/CCNA-COURSE-CISCO-EXAM-TRAINING

#share & #supportus

------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
#Enroll
Cyber Security and Ethical Hacking introduction course

https://www.udemy.com/course/best-cyber-security-and-ethical-hacking-introduction-course/?couponCode=CHRISTMAS-SPECIAL100

#share & #supportus

--------------> @geekcode πŸ“

Share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ”° Ethical Hacking - Hands-On Training Part 2 πŸ”°

Ethical Hacking - Hands-on Training Part II is an intermediate level hands-on course for ethical hacking.

https://www.udemy.com/course/ethical-hacking-hands-on-training-part-ii/?ranMID=39197&ranEAID=NuZiHLoAApo&ranSiteID=NuZiHLoAApo-1zqbG0LfgHBI2nS2BEJFFQ&LSNPUBID=NuZiHLoAApo&utm_source=aff-campaign&utm_medium=udemyads&couponCode=74C9590127DE50FB9C2A

#share & #supportus

@geekcode πŸ“

share as more as 😍
This media is not supported in your browser
VIEW IN TELEGRAM
SUPPORT US πŸ’™ @geekcode πŸ™
πŸ“΅ ABOUT ROOT ❗️ Why Root ?

What can be achieved with root

1. Firmware or backup of a smartphone will not be lost
2. Loss of ads in programs, games
3. Change the CPU performance mode
4. Change the appearance of Android beyond recognition.  (backgrounds, icons, animation)
5. Software hacking games
and many useful features


πŸ“΅ Disadvantages:

1. Termination of the warranty
2. It will not be possible to update the official android versions
3. There may be problems working with official Android apps

⛔️Root We Need WhyπŸ€”

Root is primarily used to hack something or to break a site, system or program.
You can't do any hacking without root❗️

#share & #supportus

-------------> @geekcode πŸ“

Share as more as 🀩