Don't wanna be here? Send us removal request.
Photo

π How Do Trojans Work? π³ βββββββββββββ Hereβs a Trojan malware example to show how it works. You might think youβve received an email from someone you know and click on what looks like a legitimate attachment. But youβve been fooled. The email is from a cybercriminal, and the file you clicked on β and downloaded and opened β has gone on to install malware on your device. When you execute the program, the malware can spread to other files and damage your computer. How? It varies. Trojans are designed to do different things. But youβll probably wish they werenβt doing any of them on your device. βββββββββββββ π² @digisaksham π» @semswebz #hackerinstagram #trojanfamily #trojan #trojanstrong #trojan https://www.instagram.com/p/CA43qR4p4XS/?igshid=as0h6qsgak49
0 notes
Text
Webinar on βHow Yoga can Boost Immunity & Manage Stress".
Speaker : Acharya Kauushal Kumar
Date: May 31, 2020
Time: 5 PM IST
You can Join the Session by clickingπ
0 notes
Photo

π What Is A Trojan? π³ βββββββββββββ A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but thatβs a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably. Whether you prefer calling it Trojan malware or a Trojan virus, itβs smart to know how this infiltrator works and what you can do to keep your devices safe. βββββββββββββ π² @digisaksham π» @semswebz #hackers #digisaksham #hacking #hackerrank #trojanfamily #virus #learning https://www.instagram.com/p/CAzZIQHJdrb/?igshid=1digdldl2mpdp
0 notes
Photo

π Different Type Of Hackers π³ βββββββββββββ 1β£ White Hat Hacker βββββββββββββ First up, we have the perfect type of hacker to break the stereotype. The white hat hacker is a good guy, as ironic as it may sound. White Hackers, white hat hackers or ethical hackers are the people who test existing internet infrastructures to research loopholes in the system. They create algorithms and perform multiple methodologies to break into systems, only to strengthen them. Think of this as a lockpick, who would work his way around locks, only to inform the owners of how to make the locks work better. Famous white hat hackers have historically been pivotal in ensuring that large corporations maintain a strong network framework so that it is unbreakable against all other types of hacking. From being employees of the Government to being private consultants, white hackers help internet be a better and safer place. 2β£ Black Hat Hacker βββββββββββββ Simply put, these are the bad guys. Black hat hackers are responsible for all that is wrong with hacking. These guys break into systems purely with negative intentions. From stealing credit card information, to altering public databases, a black hat hacker looks to gain fame or monetary benefits from exploiting the loopholes in internet frameworks. Famous black hat hackers have notoriously robbed banks and financial institutions of millions of dollars, and invaluable private data. 3β£ Grey Hat Hacker βββββββββββββ A grey hat hacker usually has mixed intentions. As the color code implies, this hacker type does not have the good intentions of a white hat hacker, nor does he have the ill intentions of a black hacker. A grey hat would break into systems but never for his own benefit. Famous grey hat hackers have exploited systems only to make the information public, and to bring to limelight vast datasets of information that contains wrongdoings. βββββββββββββ π² @digisaksham π» @semswebz https://www.instagram.com/p/CAyGB8ipD91/?igshid=1gd4c70hx6en7
0 notes
Quote
A man's mind, stretched by new ideas, may never return to its original dimensions.
Oliver Wendell Holmes Jr.
1 note
Β·
View note
Photo

During the Lockdown Phase-IV, in order to Boost Immunity & Manage Stress; we should enhance the knowledge of Yoga, so we are organizing a βWebinar on βHow Yoga can Boost Immunity & Manage Stress" on May 31, 2020. Learn simple yet effective yogic techniques from the comfort of your home. Includes physical postures, pranayama and meditation.
Speaker Profile Acharya Kaushal Kumar is a renowned yogacharya working in the field of yoga from the last thirty three years. He was persuing his MPhil in Economics from Delhi school of Economics. Met his guru swami Satyananda and leftt his studies in between and joined yoga in 1987. He was with the Guru for three years and after it opened his own school of yoga. He had been continuously serving humanity through yoga since then. He has conducted and organised thousands of yoga camps, seminars. His yoga programs has been telecasted daily regularly on Doordarshan and various other news channels. His regular weekly coloums are published in almost all Hindi national newspapers and monthly magzines. He has written about ten books on yoga. He has given yoga teachings to the various prime ministers and central ministers of India and many big business houses. He has visited many foreign countries to propogate yoga. He is specialised in yoga therapy. He has worked with the health, ayush and HRD ministry to popularise yoga not only in India but abroad too. His yoga techniques is helpful in curing depression, stress, anxiety. His yoga is helpful in improving focussedness, concentration and control on mind which results in increased will power, confidence, creativity, determination, tolerance, positivity and to channelise our energy to higher goals.
The participants should participate by clicking on following Link for registration: bit.ly/digisakshamwebinars
Each participant who attended will receive a certificate of participation through E-mail.
1 note
Β·
View note