Latest Activity

Vikash Kumar Dwivedi updated their profile
yesterday
NAVEEN KUMAR SRIVASTAVA posted a status
"Please share deputation jobs"
Monday
NAVEEN KUMAR SRIVASTAVA updated their profile
Monday
Rakesh Sehrawat posted a status
"Anyone, in the journey of JRF this session?"
May 5
AYYAPPAN .Z updated their profile
May 3
Sanjana saini and Pritam Kumar Gupta are now friends
May 3
AYYAPPAN .Z left a comment for Balesh Kumar
May 3
AYYAPPAN .Z replied to SUNNY JOSEPH's discussion Academic Status to Librarian: UGC Letter and Court Order
May 3
Rahul kumar updated their profile
May 2
Rafeeque Ansari updated their profile
May 1
AYYAPPAN .Z replied to SUNNY JOSEPH's discussion Academic Status to Librarian: UGC Letter and Court Order
Apr 30
Suresh Vyas shared a profile on Facebook
Apr 29
Suresh Vyas shared a profile on Facebook
Apr 29
NADIM AHAMAD KHAN posted an event

hort Term Course on Koha and DSpace at Central Library deen dayal upadhyaya Gorakhpur University

April 30, 2026 to May 6, 2026
Apr 28
Dr. Sandip Pathak posted an event
Thumbnail

13th Convention Planner 2026 at Gauhati University,  Guwahati, Assam.

September 18, 2026 at 9am to September 20, 2026 at 7pm
Apr 28
Profile IconKannan G, Otturu pedapapaiah, Ardas Singh and 6 more joined LIS Links
Apr 28
Sanjana saini and Akshay Subhash Gadade are now friends
Apr 24
Dr. U. PRAMANATHAN replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Apr 23
Dr.Rajeshwar kumar G replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Apr 23
Arunima Giri might attend Dr. U. PRAMANATHAN's event
Apr 23
What is phishing and Hacking

Views: 178

Reply to This

Replies to This Forum

Madam

Format your PC is very hard decision for cleaning of  virus, trojans, etc .  for  computer and this act will create some technical problem of our customized setting and also delete some database  connected files because format  will delete our all customized  setting instead why not we scan your PC  with good anti-virus that removes our all unwanted files. 

“Phishing” is a general term for criminals’ creation and use of e-mails and websites – designed to look like e-mails and websites of wellknown legitimate businesses, financial institutions, and government agencies – in order to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The “phishers” then take that information and use it for criminal purposes, such as identity theft and fraud

 

A growing number of phishing schemes are using for illegal purposes the names and logos of legitimate financial institutions, businesses, and government agencies in North America, Europe, and the Asia-Pacific region.

 

The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

RSS

© 2026   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

LIS Links whatsApp