Tibs Sew Podcast🎙️


Channel's geo and language: Ethiopia, English
Category: Technologies


Amin, Biruk and Temesgen discuss college life, football and lifestyle, with out order. Join us on the drive, doing laundry, washing dishes and on basic chores to get the time going because we gotchu.☕

Related channels

Channel's geo and language
Ethiopia, English
Statistics
Posts filter


ለመጀመሪያ 3 ተመዝጋቢዎች በነፃ ትምህርቱን እንሰጣለን🥳

ስልጠናው የሚሰጠው በቴሌግራም ቻናል ሲሆን ማንኛውንም እርዳታ ሲፈልጉ እኔን በግል ማናገር ይችላሉ።

ይህ እድል እንዳያመልጣችሁ

ለመመዝገብ ይህን ፎርም ይሙሉ
🔗https://forms.gle/nja9iQmngrt2eyKQ8

ለማንኛውም አይነት ጥያቄ በ @Cachilupi ያነግሩኝ










What's Good Tibs People👋
⭐️Till We Post New #Ep3 Here Are Our Previous Eps In Audio To Listen To:




Happy 2023 My Tibs People🔥
New Ep Coming Soon🎉


❄️☃️🎄Merry Christmas 🎄☃️❄️




Video is unavailable for watching
Show in Telegram
🔥Tibs Sew Podcast *Intro1
#Season1 #Ep1
Stay Tuned On Youtube
When? Sooner Than You Expect 😎


🎙Tibs Sew Podcast🔥
Hosted By:
✓ Bk Ela 🕴
✓ Amin Ahmed 😎
✓ Teme Panda 🐼
𝙻𝚎𝚝'𝚜 𝚃𝚊𝚕𝚔 𝙰𝚋𝚘𝚞𝚝 𝙰𝚗𝚢𝚝𝚑𝚒𝚗𝚐
Follow us on Spotify, Rss Feed, @TibsSewPodcast' rel='nofollow'>Youtube, Telegram




🌟ሰላም, ይህ ሀሁሎጂ ቱቶሪያል ቻናል ነው በዚህ ቻናል

- Uኪንግ 😈
- ኮዲንግ 🧑‍💻
- ፖስወርድ ክራኪንግ 🕵️
- ጌሚንግ 🎮
- ፕሮግራሚንግ 👨‍🏫
- የተለያዩ የስልክ እና የፒሲ ጌሞች እና አፖች 💿
- እናም የቴክኖሎጂ መረጃዎች ያገኛሉ📃
አሁኑኑ ይቀላቀሉና የቴክኖሎጂ እውቀቶን ያዳብሩ...


Top 5 Games In 2021.

1. Call Of Duty Warzone
* PC, Xbox One, PS4

2. Minecraft
* Mobile, Xbox One, PS4, Windows, PS3, Xbox 360, macOS, Linux

3. Animal Crossing: New Horizon
* Nintendo Switch

4. Grand Theft Auto 5
* PC, PS4, Xbox One, PS3, Xbox 360

5. League Of Legends
* Windows, macOS

🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰
📌Unmute Our Channel And Be Updated On Daily Technology Posts.

Share To Everyone So That Technology And This Channel Will Reach To Everyone.

🌐 Bot:- @HapiTubeBot
🌐 Channel:- @Hahu_Logy
🌐 Youtube:-
Hahulogy - ሀሁሎጂ

Hahulogy©


These Are The Music's I Used In Each Of My Tutorials. Check Out Now...

https://youtube.com/playlist?list=PLM8hUa_ybAOp3Xq5Ofe4wRQYBoXSSl3F9


Which One Would You Prefer? Explain In The Comment Section(Optional)?
Poll
  •   PlayStation 5(With 10 Games)
  •   Latest Gaming PC(High Performance)
49 votes


Researchers From Japan Have Successfully Developed A Device That Will Be Able To Literally Playback Your Dreams In Video Sequence.🤯

🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰
📌Unmute Our Channel And Be Updated On Daily Technology Posts.

Share To Everyone So That Technology And This Channel Will Reach To Everyone.

🌐 Bot:- @HapiTubeBot
🌐 Channel:- @Hahu_Logy
🌐 Youtube:- Hahulogy - ሀሁሎጂ

Hahulogy©


🔰Top 10 Common Hacking Techniques🔰

10. Keylogger
Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.

9. Denial of Service (DoS\DDoS)
A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.

8. Waterhole Attacks
If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.

Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.


7. Fake WAP
Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

6. Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified.


5. Phishing
Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.


4. Virus, Trojan...
Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

3. ClickJacking Attacks
ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.

In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.


2. Cookie theft
The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

1. Bait and switch
Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.

Credit: cmd_programming©

🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰🔅🔰🔆🔰
📌Unmute Our Channel And Be Updated On Daily Technology Posts.

Share To Everyone So That Technology And This Channel Will Reach To Everyone.

🌐 Bot:- @HapiTubeBot
🌐 Channel:- @Hahu_Logy
🌐 Youtube:- Hahulogy - ሀሁሎጂ

Hahulogy©


Your Favourite Mobile Phone Brand?
Poll
  •   Samsung
  •   Tecno
  •   Huawei
  •   Xiaomi
  •   Infinix
  •   One Plus
  •   Nokia
  •   ZTE
  •   HTC
  •   Other...
66 votes

20 last posts shown.

171

subscribers
Channel statistics