🔥 Burn Fat Fast. Discover How! 💪

GeekCode

Logo of telegram channel geekcode — GeekCode G
Logo of telegram channel geekcode — GeekCode
Channel address: @geekcode
Categories: Technologies
Language: English
Subscribers: 1.09K
Description from channel

🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻
Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂
📰Promotion/Query - @geekcodevipbot

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

1

1 stars

0


The latest Messages 25

2021-09-30 13:42:21 The top 5 trending programming languages for mobile application development

https://telegra.ph/The-Top-5-trending-programming-languages-for-App-development-09-30

@geekcode
103 views10:42
Open / Comment
2021-09-29 09:41:14
Learn the fundamental of cloud computing in 6 months

https://learntocloud.guide/


@geekcode
76 views06:41
Open / Comment
2021-09-29 09:39:45
This document outlines best practices for writing high-performance Go code.

https://github.com/dgryski/go-perfbook


@geekcode
76 views06:39
Open / Comment
2021-09-27 20:30:03 Top 10 trending technologies in 2021

• 5G Technology
• Internet of Behaviours(IoB)
• DevSecOps
• Intelligent Process Automation(IPA)
• Tactile VR
• Big Data Analytics
• Everything-as-a-Service(XaaS)
• Human Augmentation
• Cybersecurity
• Artificial Intelligence(AI)

For query : @geekcodevipbot

@geekcode
93 views17:30
Open / Comment
2021-09-27 15:30:06 #CyberTalks #CyberAwareness

How to protect Systems from Ransomware?

• Audit events and take inventory. Audit both event and incident logs to spot suspicious behavior. Take note of all assets and data. Identify authorized and unauthorized devices and programs.

• Configure and monitor. Manage hardware and software configurations. Only grant administrative privileges when necessary.

• Patch and update. Conduct regular vulnerability assessments and patching or virtual patching for operating systems and programs. Update software and applications.

• Protect systems and recover data. Administer data protection, backup, and recovery measures. Implement multifactor authentication (MFA).

• Secure and defend layers: Perform sandbox analysis to filter malicious emails. Employ security solutions to all layers of the system such as email, endpoint, web, and network.

• Train and test. Conduct regular training and security skills assessment for employees. Perform red-team exercises and penetration tests.


@geekcode
93 views12:30
Open / Comment