GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
#helpline #DemandYourCourse

Need any specific course realted to hacking & programming contact us here: @geekserverbot
#AI #facebook

Facebook is introducing Dynaboard, an evaluation-as-a-service platform for conducting comprehensive evaluations of NLP models.

Link:
https://ai.facebook.com/blog/dynaboard-moving-beyond-accuracy-to-holistic-model-evaluation-in-nlp

It enables dynamic, apples-to-apples comparisons dynamically, overcoming some of the key challenges in AI evaluation today!
😎

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Linux Cheat Sheet

For query:
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Google VS DuckDuckGo

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Collection of resources realted to ANDROID, SOFTWARE SECURITY & other professional guide's

https://github.com/ashishb/android-security-awesome

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Google hacking Cheat Sheet

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
Have I been Pwned goes open source

Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.

https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/

@cyberagents X @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How Scareware Comes in Used?

Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.

Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the user’s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.

Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.

For query : @geekcode

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Bug Hunting strategy 👀

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM