Get Mystery Box with random crypto!

GeekCode

Logo of telegram channel geekcode — GeekCode G
Logo of telegram channel geekcode — GeekCode
Channel address: @geekcode
Categories: Technologies
Language: English
Subscribers: 1.09K
Description from channel

🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻
Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂
📰Promotion/Query - @geekcodevipbot

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

1

1 stars

0


The latest Messages 29

2021-08-14 13:27:32 What is Cookie theft?

Cookie theft also known as sidejacking or session
hacking, happens when cookies from the websites you
visit are stolen through an unsecure connection. The
cookie can then be used to allow the hacker to pretend
they are you. They can’t necessarily gain access to your
login credentials, but they can access the site as you
(using your session ID) and change your account settings
to hijack it.

How to avoid this technique:

• Make sure you’re always visiting a secure site https not http.
• Use a host VPN to encrypt your traffic.


@geekcode
872 viewsedited  10:27
Open / Comment
2021-08-12 21:02:39 How SSH Works?

If you’re Linux or Mac user, then using SSH is simple. If you use Windows, you will need to utilize an SSH client to open SSH connections. The most popular SSH client is PuTTY, which you can learn more about here.

For Mac and Linux users, head over to your terminal program and then follow the procedure below:

The SSH command consists of 3 distinct parts:

ssh {user}@{host}

The SSH key command instructs your system that you want to open an encrypted Secure Shell Connection. {user} represents the account you want to access. For example, you may want to access the root user, which is basically synonymous for system administrator with complete rights to modify anything on the system. {host} refers to the computer you want to access. This can be an IP Address (e.g. 244.235.23.19) or a domain name (e.g. www.xyzdomain.com).

When you hit enter, you will be prompted to enter the password for the requested account. When you type it in, nothing will appear on the screen, but your password is, in fact being transmitted. Once you’re done typing, hit enter once again. If your password is correct, you will be greeted with a remote terminal window.

@geekcode
322 viewsedited  18:02
Open / Comment
2021-08-11 21:30:09 Bahamut Threat Group Targeting Users Through Phishing Campaign
https://blog.cyble.com/2021/08/10/bahamut-threat-group-targeting-users-through-phishing-campaign/


@geekcode
275 views18:30
Open / Comment