Latest Activity

Dhruven Ponkiya updated their profile
Tuesday
sangeeta sharma is attending Dr. Shamim Aktar Munshi's event
Mar 28
Kanika sharma and Ankit Jaiswal are now friends
Mar 27
Nagendra N updated their profile
Mar 25
Pallavi Sushant Sapkal and S. Jaffer Basha are now friends
Mar 22
Dr. Divyanshu Gupta updated their profile
Mar 20
Nilesh and Dr. Badan Barman are now friends
Mar 19
Dr. Gulshan Kumar Sachdeva updated their profile
Mar 17
Dr. Gulshan Kumar Sachdeva and sandeep shukla are now friends
Mar 17
Devendra Parker joined Dr. Badan Barman's group
Mar 17
Manoj Kumar updated their profile
Mar 15
Ranjansen Shende updated their profile
Mar 15
Ku. Dipti Lodwal joined Dr. Badan Barman's group
Mar 13
Ku. Dipti Lodwal joined Dr. Badan Barman's group
Mar 13
Ku. Dipti Lodwal left a comment for Arun kumar Sirla
Mar 13
Ku. Dipti Lodwal left a comment for Vikrant Dubey
Mar 13
Ku. Dipti Lodwal posted a status
Mar 13
Ku. Dipti Lodwal commented on Ku. Dipti Lodwal's event 'Two Days International Seminar'
Mar 12
sangeeta sharma is attending Dr. Ashis Biswas's event
Mar 11
sangeeta sharma commented on Ku. Dipti Lodwal's event 'Two Days International Seminar'
Mar 11
What is phishing and Hacking

Views: 172

Reply to This

Replies to This Forum

Madam

Format your PC is very hard decision forย cleaning of ย virus, trojans, etc . ย for ย computer and this act will create some technical problem of ourย customized setting and also delete some database ย connected files because formatย ย will delete our all customized ย setting instead why not we scan your PC ย with good anti-virus that removes our all unwanted files.ย 

โ€œPhishingโ€ is a general term for criminalsโ€™ creation and use of e-mails and websites โ€“ designed to look like e-mails and websites of wellknown legitimate businesses, financial institutions, and government agencies โ€“ in order to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The โ€œphishersโ€ then take that information and use it for criminal purposes, such as identity theft and fraud

ย 

A growing number of phishing schemes are using for illegal purposes the names and logos of legitimate financial institutions, businesses, and government agencies in North America, Europe, and the Asia-Pacific region.

ย 

The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any userโ€™s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

RSS

ยฉ 2026   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

LIS Links whatsApp