#ProgrammingTip
Best trendy ways to improve your programming skills & knowledge ⚡
📌Taking a free or paid online programming course.
📌Reading a programming book
Picking a personal project and hacking away to learn as you code.
📌Following along with an online tutorial project.
📌Keeping up to date with relevant programming blogs.
For query : @geekserverbot
~ @geekcode
Best trendy ways to improve your programming skills & knowledge ⚡
📌Taking a free or paid online programming course.
📌Reading a programming book
Picking a personal project and hacking away to learn as you code.
📌Following along with an online tutorial project.
📌Keeping up to date with relevant programming blogs.
For query : @geekserverbot
~ @geekcode
Creating a powerful Android app context protector with Frida and r2
https://docs.google.com/presentation/d/1BktWJ91ill5iI_-ENzh2Uq14BGIHxxpONzNYybYJIC4/
~ @geekcode
https://docs.google.com/presentation/d/1BktWJ91ill5iI_-ENzh2Uq14BGIHxxpONzNYybYJIC4/
~ @geekcode
Google Docs
Creating a powerful protector with frida
Creating a powerful Android app context protector With frida and r2 Giovanni - iGio90 - Rocca @Ultrapowa | @Defunct | @Bha | @Pepper | @VeronicaPabloOsorio m0lecon 2020
2570+ book downloads by our bot @geekcodevipbot
Thanks to all of you guys ❤️
Such a great number for us ✨
Support our channel after 3k subscribers we will publish our 2nd part as physical/hard copy at your doorstep ❤️
~ @geekcode
Thanks to all of you guys ❤️
Such a great number for us ✨
Support our channel after 3k subscribers we will publish our 2nd part as physical/hard copy at your doorstep ❤️
~ @geekcode
Have You Guys Ever Heard About FAT32 & NTFS?
IF NOT SO CHECKOUT THIS 📌
https://telegra.ph/What-is-FAT32--NTFS-07-16
IF NOT SO CHECKOUT THIS 📌
https://telegra.ph/What-is-FAT32--NTFS-07-16
Telegraph
What is FAT32 & NTFS?
I think you guys never hear these two terms FAT32 and NTFS, or at least never cared enough to find out what they are, but they are file systems. When you format your hard drive, you can choose whether to format it using FAT32 or NTFS. They both have pros…
Do the difficult things while they are easy and do the great things while they are small. A journey of a thousand miles begins with a single step.
~ Lao Tzu
Next post on Ransomware!
It would be Great knowledgeable posts ❤️
#postalert #staytunned
~ @geekcode #share & #supportus
~ Lao Tzu
Next post on Ransomware!
It would be Great knowledgeable posts ❤️
#postalert #staytunned
~ @geekcode #share & #supportus
What is Ransomware ?
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. In recent years, ransomware incidents have become increasingly prevalent among the Nation’s state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations.
For query : @geekserverbot
@geekcode
Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid. In recent years, ransomware incidents have become increasingly prevalent among the Nation’s state, local, tribal, and territorial (SLTT) government entities and critical infrastructure organizations.
For query : @geekserverbot
@geekcode
How does ransomware work?
Ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files, such as .aaa, .micro, .encrypted, .ttt, .xyz, .zzz, .locky, .crypt, .cryptolocker, .vault, or .petya, to show that the files have been encrypted—the file extension used is unique to the ransomware type.
Once the ransomware has completed file encryption, it creates and displays a file or files containing instructions on how the victim can pay the ransom. If the victim pays the ransom, the threat actor may provide a cryptographic key that the victim can use to unlock the files, making them accessible.
For query : @geekserverbot
@geekcode
Ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files, such as .aaa, .micro, .encrypted, .ttt, .xyz, .zzz, .locky, .crypt, .cryptolocker, .vault, or .petya, to show that the files have been encrypted—the file extension used is unique to the ransomware type.
Once the ransomware has completed file encryption, it creates and displays a file or files containing instructions on how the victim can pay the ransom. If the victim pays the ransom, the threat actor may provide a cryptographic key that the victim can use to unlock the files, making them accessible.
For query : @geekserverbot
@geekcode
What can I do to protect my data and networks?
Back up your computer. Perform frequent backups of your system and other important files, and verify your backups regularly. If your computer becomes infected with ransomware, you can restore your system to its previous state using your backups.
Store your backups separately. Best practice is to store your backups on a separate device that cannot be accessed from a network, such as on an external hard drive. Once the backup is completed, make sure to disconnect the external hard drive, or separate device from the network or computer. (See the Software Engineering Institute’s page on Ransomware).
Train your organization. Organizations should ensure that they provide cybersecurity awareness training to their personnel. Ideally, organizations will have regular, mandatory cybersecurity awareness training sessions to ensure their personnel are informed about current cybersecurity threats and threat actor techniques. To improve workforce awareness, organizations can test their personnel with phishing assessments that simulate real-world phishing emails.
For query : @geekserverbot
~ @geekcode
Back up your computer. Perform frequent backups of your system and other important files, and verify your backups regularly. If your computer becomes infected with ransomware, you can restore your system to its previous state using your backups.
Store your backups separately. Best practice is to store your backups on a separate device that cannot be accessed from a network, such as on an external hard drive. Once the backup is completed, make sure to disconnect the external hard drive, or separate device from the network or computer. (See the Software Engineering Institute’s page on Ransomware).
Train your organization. Organizations should ensure that they provide cybersecurity awareness training to their personnel. Ideally, organizations will have regular, mandatory cybersecurity awareness training sessions to ensure their personnel are informed about current cybersecurity threats and threat actor techniques. To improve workforce awareness, organizations can test their personnel with phishing assessments that simulate real-world phishing emails.
For query : @geekserverbot
~ @geekcode
How does Pegasus inject malware into a user's mobile phone?
Prior to 2019, one of the methods used by Pegasus to penetrate mobile phones was through a WhatsApp video missed call. It seems WhatsApp fixed that vulnerability.
But now we have learnt that Pegasus is using Apple's messaging application, iMessage, available on iPhones, to inject malware in mobile phones. What Pegasus Spyware seems to be doing is that it's sending a properly drafted message on the phone embedded with a malware. The owner of the mobile phone doesn't even need to click on the message to activate the malware. Even if the victim deletes the message from iMessage, the malware would still penetrate the phone. It seems to me that iMessage has a similar bug that WhatsApp had earlier.
@geekcode
Prior to 2019, one of the methods used by Pegasus to penetrate mobile phones was through a WhatsApp video missed call. It seems WhatsApp fixed that vulnerability.
But now we have learnt that Pegasus is using Apple's messaging application, iMessage, available on iPhones, to inject malware in mobile phones. What Pegasus Spyware seems to be doing is that it's sending a properly drafted message on the phone embedded with a malware. The owner of the mobile phone doesn't even need to click on the message to activate the malware. Even if the victim deletes the message from iMessage, the malware would still penetrate the phone. It seems to me that iMessage has a similar bug that WhatsApp had earlier.
@geekcode