Geeks Tech computers
984 subscribers
433 photos
10 videos
37 files
356 links
Computer repair,laptop sales & accessories available
Download Telegram
Microsoft Releases Patch Updates for 53 Vulnerabilities In Its Software
https://thehackernews.com/2018/07/microsoft-security-patch-update.html
How to safely browse
deep web? : Security Tips
You must have heard of dark web or deep web and as you
know its a scary place and its full of skilled cyber
criminals. So it becomes necessary to secure yourself
while visiting this wild part of internet. Today I am going
to tell you about some precautions that you should must
use while surfing dark web.
Secure Your Browser
Securing your browser must be your top priority as hackers
can exploit it to gain access to your machine. So lets talk
about some ways by which you can make your browser
more hardened.
1. If a website doesn’t use HTTPS, don’t use it.
2. Disable JavaScript using NoScript plugin
3. Disable all the plug ins as they can be used to track/
exploit your system
4. Don’t use search Engines like Google which track you.
Instead, go for DuckDuckGo which doesn’t keep the
records or inject tracking cookies into your browser
5. If you download something from the dark web its ok
but consider opening it in a sandbox or a virtual
machine.
6. Don’t use torrent because torrent uses a peer to peer
connection instead of using TOR network.
7. Don’t maximize TOR browser’s windows as it can be
used to determine screen size of your device.
Secure your browser even more
Enter about:config in your browser tab and press enter.
Then make the following changes:
javascript.enabled false
network.http.sendRefererHeader 0
network.http.sendSecureXSiteReferrer false
extensions.torbutton.saved.sendSecureXSiteReferrer
false
network.cookie.cookieBehavior 2
browser.cache.memory.enable false
Secure Your Operating System
If your operating systems is easy to hack then it could be a
problem…a really really bad problem.
1. Don’t use windows because windows is really very
easy to exploit, prefer Linux .
2. Its good to use tor in a virtual machine so you can
minimize the damage in case you get infected by
some malware.
3. Use a firewall .
4. Keep your system up to date.
Secure Your Identity
And the most important thing is to hide your identity.
1. If you have to sign up for something, use a
disposable email service such as throwawaymail
2. Choose usernames and passwords carefully. They
should not have any kind of link to your real identity.
3. Send messages in chat rooms only when its
necessary and do not reveal any kind of information.
4. You will eventually find scam sites and phishing sites,
so use your mind and stay away from them.
5. Don’t do something which might grab attentions of
legal authorities like watching child porn. Do not
watch child porn at all, even for the sake of curiosty.
Stay away from it.
6. If you have to upload an image somewhere, wipe its
exif data first. And don’t upload any photos which
reveal anything about your personal life. Like the color
of your cat.
Still not secure? Here you go!
1. Get a new laptop
2. Get a new USB and install Tails in it. Tails is an Linux
distro dedicated to security and privacy.
3. Now install tor and set TOR browser’s security setting
to high.
4. Follow all the security measures we have discussed
above.
5. Thats all.
That’s all for now. I hope you enjoyed this article.
Keep learning! Stay safe!

@ smart tech computers
Channel name was changed to «Geeks computers»
21-Year-Old Creator of LuminosityLink Hacking Tool Pleads Guilty https://thehackernews.com/2018/07/luminositylink-hacking-tool.html
Forwarded from The Hacker News
12 Russian Intelligence Agents Indicted For Hacking DNC Emails https://thehackernews.com/2018/07/russian-dnc-hack-trump.html
Channel photo updated
Hp 15 core i3 4gb ram 500hdd 2.4ghz processor Dvdwr webcam 15.6 screen display @24k
Types of Hacking
Website hacking
Network hacking
Ethical hacking
Email Hacking
Online banking hacking
Computer hacking

♐️Website hacking
Hacking a website means taking control from the website owner to a person who hacks the website.

♐️Network Hacking
Network Hacking is generally means gathering information about domain by using tools like Telnet, Ns look UP, Ping, Tracert, Netstat, etc… over the network.

♐️Ethical Hacking
Ethical hacking is where a person hacks to find weaknesses in a system and then usually patches them..

♐️Email Hacking
Email hacking is illicit access to an email account or email correspondence.

✳️Password Hacking
Password Hacking Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

✳️Online Banking Hacking
Online banking Hacking Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as Online banking hacking.
✳️Computer Hacking
Computer Hacking is when files on your computer are viewed, created, or edited without your authorization
@Geeks computers
Microsoft launches a new Bug Bounty program—offering up to $100,000 in reward for finding bugs in its Identity Services


https://thehackernews.com/2018/07/microsoft-bug-bounty.html 👍👍👍
Apple transferred #iCloud data of its 130 million Chinese users to the Cloud Data Centers managed by a state-controlled Telecom provider.

https://t.co/uIurIPATMJ

The storage deal eventually could make it easier for the Chinese government to snoop on users' iCloud data.
Geeks Tech computers
Photo
Model available safaricom 800 only, brand new universal at ksh. 1500 only inbox me