digisaksham-blog
digisaksham-blog
DIGISAKSHAM
7 posts
Don't wanna be here? Send us removal request.
digisaksham-blog Β· 5 years ago
Photo
Tumblr media
πŸ—ƒ How Do Trojans Work? πŸ—³ ━━━━━━━━━━━━━ Here’s a Trojan malware example to show how it works. You might think you’ve received an email from someone you know and click on what looks like a legitimate attachment. But you’ve been fooled. The email is from a cybercriminal, and the file you clicked on β€” and downloaded and opened β€” has gone on to install malware on your device. When you execute the program, the malware can spread to other files and damage your computer. How? It varies. Trojans are designed to do different things. But you’ll probably wish they weren’t doing any of them on your device. ━━━━━━━━━━━━━ πŸ“² @digisaksham πŸ’» @semswebz #hackerinstagram #trojanfamily #trojan #trojanstrong #trojan https://www.instagram.com/p/CA43qR4p4XS/?igshid=as0h6qsgak49
0 notes
digisaksham-blog Β· 5 years ago
Photo
Tumblr media
5 posts!
0 notes
digisaksham-blog Β· 5 years ago
Text
Webinar on β€œHow Yoga can Boost Immunity & Manage Stress".
Speaker : Acharya Kauushal Kumar
Date: May 31, 2020
Time: 5 PM IST
You can Join the Session by clickingπŸ‘‡
0 notes
digisaksham-blog Β· 5 years ago
Photo
Tumblr media
πŸ—ƒ What Is A Trojan? πŸ—³ ━━━━━━━━━━━━━ A Trojan horse, or Trojan, is a type of malicious code or software that looks legitimate but can take control of your computer. A Trojan is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network. A Trojan acts like a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for. A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably. Whether you prefer calling it Trojan malware or a Trojan virus, it’s smart to know how this infiltrator works and what you can do to keep your devices safe. ━━━━━━━━━━━━━ πŸ“² @digisaksham πŸ’» @semswebz #hackers #digisaksham #hacking #hackerrank #trojanfamily #virus #learning https://www.instagram.com/p/CAzZIQHJdrb/?igshid=1digdldl2mpdp
0 notes
digisaksham-blog Β· 5 years ago
Photo
Tumblr media
πŸ—ƒ Different Type Of Hackers πŸ—³ ━━━━━━━━━━━━━ 1⃣ White Hat Hacker ━━━━━━━━━━━━━ First up, we have the perfect type of hacker to break the stereotype. The white hat hacker is a good guy, as ironic as it may sound. White Hackers, white hat hackers or ethical hackers are the people who test existing internet infrastructures to research loopholes in the system. They create algorithms and perform multiple methodologies to break into systems, only to strengthen them. Think of this as a lockpick, who would work his way around locks, only to inform the owners of how to make the locks work better. Famous white hat hackers have historically been pivotal in ensuring that large corporations maintain a strong network framework so that it is unbreakable against all other types of hacking. From being employees of the Government to being private consultants, white hackers help internet be a better and safer place. 2⃣ Black Hat Hacker ━━━━━━━━━━━━━ Simply put, these are the bad guys. Black hat hackers are responsible for all that is wrong with hacking. These guys break into systems purely with negative intentions. From stealing credit card information, to altering public databases, a black hat hacker looks to gain fame or monetary benefits from exploiting the loopholes in internet frameworks. Famous black hat hackers have notoriously robbed banks and financial institutions of millions of dollars, and invaluable private data. 3⃣ Grey Hat Hacker ━━━━━━━━━━━━━ A grey hat hacker usually has mixed intentions. As the color code implies, this hacker type does not have the good intentions of a white hat hacker, nor does he have the ill intentions of a black hacker. A grey hat would break into systems but never for his own benefit. Famous grey hat hackers have exploited systems only to make the information public, and to bring to limelight vast datasets of information that contains wrongdoings. ━━━━━━━━━━━━━ πŸ“² @digisaksham πŸ’» @semswebz https://www.instagram.com/p/CAyGB8ipD91/?igshid=1gd4c70hx6en7
0 notes
digisaksham-blog Β· 5 years ago
Quote
A man's mind, stretched by new ideas, may never return to its original dimensions.
Oliver Wendell Holmes Jr.
1 note Β· View note
digisaksham-blog Β· 5 years ago
Photo
Tumblr media
During the Lockdown Phase-IV, in order to Boost Immunity & Manage Stress; we should enhance the knowledge of Yoga, so we are organizing a β€œWebinar on β€œHow Yoga can Boost Immunity & Manage Stress" on May 31, 2020. Learn simple yet effective yogic techniques from the comfort of your home. Includes physical postures, pranayama and meditation.
Speaker Profile Acharya Kaushal Kumar is a renowned yogacharya working in the field of yoga from the last thirty three years. He was persuing his MPhil in Economics from Delhi school of Economics. Met his guru swami Satyananda and leftt his studies in between and joined yoga in 1987. He was with the Guru for three years and after it opened his own school of yoga. He had been continuously serving humanity through yoga since then. He has conducted and organised thousands of yoga camps, seminars. His yoga programs has been telecasted daily regularly on Doordarshan and various other news channels. His regular weekly coloums are published in almost all Hindi national newspapers and monthly magzines. He has written about ten books on yoga. He has given yoga teachings to the various prime ministers and central ministers of India and many big business houses. He has visited many foreign countries to propogate yoga. He is specialised in yoga therapy. He has worked with the health, ayush and HRD ministry to popularise yoga not only in India but abroad too. His yoga techniques is helpful in curing depression, stress, anxiety. His yoga is helpful in improving focussedness, concentration and control on mind which results in increased will power, confidence, creativity, determination, tolerance, positivity and to channelise our energy to higher goals.
The participants should participate by clicking on following Link for registration: bit.ly/digisakshamwebinars
Each participant who attended will receive a certificate of participation through E-mail.
1 note Β· View note