Latest Activity

NADIM AHAMAD KHAN posted an event

hort Term Course on Koha and DSpace at Central Library deen dayal upadhyaya Gorakhpur University

April 30, 2026 to May 6, 2026
yesterday
Dr. Sandip Pathak posted an event
Thumbnail

13th Convention Planner 2026 at Gauhati University,  Guwahati, Assam.

September 18, 2026 at 9am to September 20, 2026 at 7pm
yesterday
Profile IconKannan G, Otturu pedapapaiah, Ardas Singh and 6 more joined LIS Links
yesterday
Sanjana saini and Akshay Subhash Gadade are now friends
Saturday
Dr. U. PRAMANATHAN replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Friday
Dr.Rajeshwar kumar G replied to Dr. U. PRAMANATHAN's discussion Call for Book Chapters: Digital Leadership in Library & Information Centers (Innovative Strategies in Library Management) by Ess Ess Publications.
Friday
Arunima Giri might attend Dr. U. PRAMANATHAN's event
Friday
Shruthi updated their profile
Thursday
Mahesh B. updated their profile
Apr 21
Akshay Subhash Gadade joined Dr. Badan Barman's group
Apr 20
Dr. U. PRAMANATHAN posted blog posts
Apr 20
K Chiyuh commented on Hema Thakur's event 'One Day National Seminar on the Future of Libraries in the Era of Artificial Intelligence'
Apr 20
K Chiyuh might attend Hema Thakur's event
Apr 20
Mr.Vipul Kumar updated their profile
Apr 19
Mr.Vipul Kumar shared a profile on Facebook
Apr 19
Profile IconUmasankar mahata, Nikita Medhi, Prohlad Basumatary and 81 more joined LIS Links
Apr 19
Dr. SUDHI S VIJAYAN posted a discussion
Apr 19
Kanika sharma is now friends with Ramesh Kumar and Deepak Sharma
Apr 19
Oriental Library Association shared their discussion on Facebook
Apr 16
Sumit Sundar Ray updated their profile
Apr 15
What is phishing and Hacking

Views: 172

Reply to This

Replies to This Forum

Madam

Format your PC is very hard decision for cleaning of  virus, trojans, etc .  for  computer and this act will create some technical problem of our customized setting and also delete some database  connected files because format  will delete our all customized  setting instead why not we scan your PC  with good anti-virus that removes our all unwanted files. 

“Phishing” is a general term for criminals’ creation and use of e-mails and websites – designed to look like e-mails and websites of wellknown legitimate businesses, financial institutions, and government agencies – in order to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The “phishers” then take that information and use it for criminal purposes, such as identity theft and fraud

 

A growing number of phishing schemes are using for illegal purposes the names and logos of legitimate financial institutions, businesses, and government agencies in North America, Europe, and the Asia-Pacific region.

 

The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

RSS

© 2026   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

LIS Links whatsApp