namja4

Newbie
Joined
02.09.22
Messages
6
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
thanks for the tip
 

Piffcat

Newbie
Joined
18.01.22
Messages
34
Reaction score
1
Points
8
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
thnkz
 
Joined
25.10.22
Messages
3
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Thanks
 

sheepsdm

Regular
Joined
03.02.21
Messages
37
Reaction score
3
Points
8
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
thankkks
 

EffinSavage1

Regular
Joined
31.10.22
Messages
1
Reaction score
0
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
Thanks
 

Hrdri

Newbie
Joined
11.11.22
Messages
2
Reaction score
0
Points
1
Hola a todos,
Sé que la mayoría de la gente trabaja en RDP, algunos sitios web o software notan rápidamente cuando está en RDP, la mayoría usa telnet IPADDRESS 3389, para detectar rápidamente. Con este método, su dispositivo no se detectará como RDP y tampoco será fácil de piratear porque todos el pirata informático sabe que el puerto predeterminado de rdp siempre se ejecuta en 3389:)

Comencemos:


1.png



Cuando se conecta a una computadora (ya sea un cliente de Windows o Windows Server) a través del cliente de Escritorio remoto, la función de Escritorio remoto en su computadora "escucha" la solicitud de conexión a través de un puerto de escucha definido (3389 de forma predeterminada). Puede cambiar ese puerto de escucha en las computadoras con Windows modificando el registro.
* Texto oculto: no se puede citar. *
Gracias
 

blueyedbandit

Newbie
Joined
03.11.22
Messages
32
Reaction score
5
Points
8
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
 

Jerrijc

Premium
Joined
21.05.22
Messages
20
Reaction score
3
Points
3
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
 

letgo23341

Newbie
Joined
06.12.22
Messages
17
Reaction score
2
Points
3
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
 

abcdefu147282

Newbie
Joined
22.12.22
Messages
2
Reaction score
1
Points
1
Hello all,
I know most people work on RDP, some websites or software quickly notice when you are on RDP, most uses telnet IPADDRESS 3389, to quickly detect, With this method your device will not be detected as RDP and also will not be easily hacked because all hacker knows that rdp default port always runs on 3389 :)

Let get started:


1.png



When you connect to a computer (either a Windows client or Windows Server) through the Remote Desktop client, the Remote Desktop feature on your computer "hears" the connection request through a defined listening port (3389 by default). You can change that listening port on Windows computers by modifying the registry.
* Hidden text: cannot be quoted. *
THXXXXXXX
 
Top Bottom