enchanada

Newbie
Joined
25.11.21
Messages
20
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Thank you!
 

Teegee

Newbie
Joined
20.01.24
Messages
3
Reaction score
0
Points
3
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Nice
 
Joined
20.01.24
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
thanks
 

jonypony

Newbie
Joined
16.03.24
Messages
1
Reaction score
0
Points
0
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Ty
 

allday

Newbie
Joined
17.03.24
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
thank you
 

cgray

Newbie
Joined
22.03.24
Messages
3
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
tysm
 

ironman

Essential
Joined
03.02.21
Messages
13
Reaction score
0
Points
3
Chào mọi người,
Tôi biết hầu hết mọi người làm việc trên RDP, một số trang web hoặc phần mềm nhanh chóng thông báo khi bạn sử dụng RDP, hầu hết đều sử dụng telnet IPADDRESS 3389, để phát nhanh, Với phương pháp này, thiết bị của bạn sẽ không được phát hiện là RDP và sẽ không dễ bị hack vì tất cả hacker đều biết rằng cổng mặc định của rdp luôn chạy trên 3389:)

Please start:


1.png



Khi bạn kết nối với máy tính (máy khách Windows hoặc Windows Server) thông qua máy khách Remote Desktop, tính năng Remote Desktop trên máy tính của bạn sẽ "nghe" yêu cầu kết nối thông qua cổng nghe được xác định rõ (3389 theo mặc định định nghĩa). Bạn có thể thay đổi cổng nghe trên máy tính Windows bằng cách sửa đổi đăng ký.
* Văn bản ẩn: không thể trích dẫn. *
thanks
 

andrushka666

Newbie
Joined
15.04.24
Messages
9
Reaction score
0
Points
1
you are the best
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
 

Alexx

Newbie
Joined
22.04.24
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Ok
 

Peten

Newbie
Joined
24.04.24
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Let me see the hidden
 

ladysman997

Newbie
Joined
02.05.24
Messages
2
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Thanks Man
 

aatrox dude

Newbie
Joined
06.05.24
Messages
10
Reaction score
0
Points
1
awesome
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
 

Loki999999

Newbie
Joined
25.05.24
Messages
12
Reaction score
0
Points
1
Hola a todos,
Sé que la mayoría de las personas trabajan en RDP, algunos sitios web o software notan rápidamente cuando estás en RDP, la mayoría usa telnet IPADDRESS 3389, para detectar rápidamente. Con este método, tu dispositivo no será detectado como RDP y tampoco será fácilmente pirateado porque todos El hacker sabe que el puerto predeterminado rdp siempre se ejecuta en 3389:)

Comencemos:


1.png



Cuando se conecta a una computadora (ya sea un cliente de Windows o un servidor de Windows) a través del cliente de Escritorio remoto, la función de Escritorio remoto de su computadora "escucha" la solicitud de conexión a través de un puerto de escucha definido (3389 de forma predeterminada). Puede cambiar ese puerto de escucha en computadoras con Windows modificando el registro.
* Texto oculto: no se puede citar. *
Thx
 

Mr Hamster

Newbie
Joined
27.06.24
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
How can i see the hidden text.. Replying not working.
 
Top Bottom