GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
How do Hackers Hide Themselves?

1) Using a proper VPN or VPS.
2) Route the traffic through TOR network.
3) Use a proxy service.
4) Buy an 'RDP' session to attack.
5) Use infected machines of other victims to run attack.
6) Destroying and corrupting any logs.


For query/promotion : @geekcodevipbot

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Do you guys interested in CryptoCurrency?
Anonymous Poll
68%
Yes
32%
No
This media is not supported in your browser
VIEW IN TELEGRAM
Why Do You Need A VPN?

Think about all the times you’ve been on the go, reading emails while in line at the coffee shop, or checking your bank account while waiting at the doctor’s office. Unless you were logged into a private Wi-Fi network that required a password, any data transmitted during your online session was likely vulnerable to eavesdropping by strangers using the same network.

The encryption and anonymity that a VPN provides protects all of your online activities: sending emails, shopping online, or paying bills. VPNs also help keep your Web browsing anonymous.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
What is WEB 3.0?

The web 3.0 definition varies depending on who you ask, but in general, it’s considered the third generation of the internet. Web 3.0 is also called the semantic web or the spatial web. If you break the evolution of the internet into segments with the first being simple web pages and the second being apps, social media, and mass adoption, the emerging blockchain-based web would be internet 3.0. Essentially, it’s a user-friendly, more secure, more private and better connected internet.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Google started searching the Cloud for cryptocurrency mining malware

Google Cloud began using VMTD — Virtual Machine Threat Detection.
Users' cloud storage will now be scanned for malware, including cryptocurrency mining, Google said in a blog post.

The post notes that VMTD is "the first detection capability from a major cloud provider on the market," which agentless memory scans and helps detect threats running in the Cloud.

In November, Google discovered that 86% of compromised Cloud accounts were being used to mine cryptocurrencies, which motivated the company to beef up protection.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM