GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
GeekCode pinned «🍁Types of Network Security Attacks🍁 Some of the most prevalent types of network security attacks that you should have to pay attention. Data Theft: This is also called data exfiltration, data theft occurs when an attacker uses their unauthorized access to…»
What Is RPM?

The RPM Package Manager (RPM) is a powerful package management system used by Red Hat Linux and its derivatives such as CentOS and Fedora. RPM also refers to the rpm command and .rpm file format. An RPM Package consists of an archive of files and metadata including information such as dependencies and install location.

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
MOBILE DEVICE SECURITY
//Cloud and Hybrid Builds

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is Vishing?

Vishing is a type of attack used by hackers to trick potential victims into divulging their sensitive, personal and confidential information over the phone.Although a voice phishing attack may look like an old-fashioned scam, it can also involve automated voice simulation technology.

Some common Examples of Vishing:

🔸 Tech support fraud
🔸 Telemarketing fraud
🔸 Bank or credit card fraud
🔸 Government impersonations

For query : @geekserverbot

~ @geekcode
How to Prevent Vishing Attacks?

Voice phishing attack take place when a person or an AI place a phone call to a potential victim using the guise of an emergency or sense of urgency to confirm your details or identity. During the attack, the attacker can also ask for more information from you. Voice phishing attacks may not always be a negative situation. It can also be news that you potentially won gifts, money, trips, etc.

The major reason for a vishing simulation is to get information like personally identifiable information (PII), medical information, or other sensitive data that can be used to commit identity theft and fraud. The scammer will want you to give the information to them over the phone quickly before you even realize that you are being scammed, hence the reason for urgency
.

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Wifi-Hacking 101
A step by step look-:

How to hack Wifi-Network


~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
#CyberTalk #HackingTip

Why networking is important?

Networking is really important to understand in cyber security. From scanning and identifying who and what is on a network, to reviewing network logs to monitor and track what users have been up to will require you to have an understanding of how networks work.

~ @geekcode