GeekCode
796 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
Forwarded from GeekCode
After completing this terminologies we will share Cisco & other Networking paid courses for free to you guys.
#staytunned

It includes video content
By which you can get better knowledge about the networking

#WeNeedYourSupport
#share us

~
@geekcode
HERE IS A BRIEF KNOWLEDGE ABOUT ALL LINUX NETWORKING TOOLS ❤️

Join us for getting more knowledge about technology

~
@geekcode ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
WHAT IS PROTOCOL ?

Define the rules that govern the communications between two
computers connected to the network.
-Roles: addressing and routing of messages, error detection and
recovery, sequence and flow controls etc.
-A protocol specification consists of the syntax, which defines the kinds
and formats of the messages exchanged, and the semantic, which
specifies the action taken by each entity when specific events occur.

Ex: HTTP protocol for communication between web browsers
and servers.

~ @geekcode❤️
WHAT IS PROTOCOL LAYER?

The OSI (Open Systems Interconnection) Data Model
-ISO standard for computer networks design and functioning.
-Involves at least 7 layers, each playing a specific role when
applications are communicating over the net.
-During the sending process, each layer (from top to down) will add
a specific header to the raw data.
-At the reception, headers are eliminated conversely until the data
arrived to the receiving application.

~ @geekcode ❤️
THE TCP/IP MODEL !

Consists of only 4 layers: application, transport, internet and network.

Network layer
-Provides the same functionality as the physical, the data link and
network layers in the OSI model.
-Mapping between IP addresses and network physical addresses.
-Encapsulation of IP datagrams, e.g packets, in format understandable
by the network.
Internet layer
-Lies at the heart of TCP/IP.
-Based on the Internet Protocol (IP), which provides the frame for
transmitting data from place A to place B.
Transport layer
-Based on two main protocols: TCP (Transmission Control Protocol)
and UDP (User Datagram protocol)
Application layer
-Combines the functions of the OSI application, presentation, and
session layers.
-Protocols involved in this layer: HTTP, FTP, SMTP etc.

~ @geekcode
CONCEPT OF NETWORK INTERCONNECTION

First implemented in the Defense Advanced Research Project Agency
Network (Arpanet), in 1966 in USA.
-Consists of connecting several computer networks based on different
protocols
-Requires the definition of a common interconnection protocol on top
the local protocols.
-The Internet Protocol (IP) plays this role, by defining unique addresses
for a network and a host machine.

~ @geekcode
@chitchatsec for discussion

#cybersecurity ❤️ @geekcode
Unknown post @chitchatsec
Forwarded from GeekCode
Networking for newbies
This media is not supported in your browser
VIEW IN TELEGRAM
How To Surf Safely On Public WiFi ?

A free Wi-Fi connection can seem like a lifesaver when you’re on the go. Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels — and it allows you to access the Internet for free. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. These “hotspots” are so widespread and common that people frequently connect to them without thinking twice. However, the security risks should not be forgotten.

If you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers — and putting your information and more at risk. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.

The average free public Wi-Fi isn’t secure and just because you may need a password to log in, it doesn’t mean your online activities are encrypted. Various reasons make public Wi-Fi susceptible to attack. One issue has to do with the encryption protocol used by some wireless networks. Another reason has to do with the possibility of joining a rogue Wi-Fi hotspot.

While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be aware of. These articles can help you learn more about the risks and what else you can do to be safe when surfing on Wi-Fi anywhere.


~ @geekcode ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
Why to Hide Your IP Address?

Here are the important reasons to hide your IP address:

• Prevent disclosing private information: You can hide your IP address to keep your personal or business information private. It is good that you surf the internet anonymously.

• Avoid tracked by advertisers or companies: Hiding IP address is a good option to prevent tracked by online advertisers or companies.

• Surf internet at restricted areas: IP hiding enables you to surf the internet at restricted areas where content is highly filtered. If your country has restrictions to view the content, you can simply hide your IP and guess access to online stuff.

• Connecting to public places: You need to hide your IP address when connecting to public places like libraries, restaurants, or internet cafes.

#supportus ❤️ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM