LIS Links

First and Largest Academic Social Network of LIS Professionals in India

Latest Activity

Profile IconRAMAKANTA SAHU, Rajendra Dhiman, Dr H Nayana and 6 more joined LIS Links
7 hours ago
Nagappa Veerappa Bakkannanavar posted a blog post
7 hours ago
Pradeep Kumar Singh posted a discussion
7 hours ago
Rathod Pradip J. joined Dr. Badan Barman's group
9 hours ago
Rathod Pradip J. joined Dr. Badan Barman's group
9 hours ago
Dr. Anil Kumar Jharotia left a comment for Bibhuti Nath Jha
11 hours ago
Dr. Anil Kumar Jharotia left a comment for ANEETA SAXENA
11 hours ago
Dr. Anil Kumar Jharotia updated their profile
11 hours ago
Dr. Anil Kumar Jharotia is now friends with T VINAY GOUTHAM, santosh kumar srivastava, kashif and 7
12 hours ago
Dr. Anil Kumar Jharotia replied to Dr. Anil Kumar Jharotia's discussion BEST PRACTICING LIBRARIAN AWARD
12 hours ago
Sanjay Kumar Gola and M.MANI are now friends
Saturday
Misal Pravin Raya updated their profile
Saturday
Pravin Misal updated their profile
Saturday
ALOK KUMAR is attending Sourav Debnath's event
Thumbnail

Online National workshop on Library Management using Open Source Software at Dhanbad

June 16, 2025 at 10am to June 20, 2025 at 5pm
Thursday
RAMESH replied to Dr. Anil Kumar Jharotia's discussion BEST PRACTICING LIBRARIAN AWARD
Thursday
samidha vaidya is attending Dr. U. PRAMANATHAN's event
Thursday
Vikram Jain posted a discussion
Thursday
Dr. Anil Kumar Jharotia posted a discussion
Thursday
MANDIRA BAIRAGI posted a discussion
Thursday
Aswathy. S updated their profile
Wednesday
What is phishing and Hacking

Views: 152

Reply to This

Replies to This Forum

Madam

Format your PC is very hard decision for cleaning of  virus, trojans, etc .  for  computer and this act will create some technical problem of our customized setting and also delete some database  connected files because format  will delete our all customized  setting instead why not we scan your PC  with good anti-virus that removes our all unwanted files. 

“Phishing” is a general term for criminals’ creation and use of e-mails and websites – designed to look like e-mails and websites of wellknown legitimate businesses, financial institutions, and government agencies – in order to deceive Internet users into disclosing their bank and financial account information or other personal data such as usernames and passwords. The “phishers” then take that information and use it for criminal purposes, such as identity theft and fraud

 

A growing number of phishing schemes are using for illegal purposes the names and logos of legitimate financial institutions, businesses, and government agencies in North America, Europe, and the Asia-Pacific region.

 

The most prominent definition of hacking is the act of gaining access without legal authorization to a computer or computer network. A hacker first attacks an easy target, and then uses it to hide his or her traces for launching attacks at more secure sites. The goal of an attack is to gain complete control of the system (so you can edit, delete, install, or execute any file in any user’s directory), often by gaining access to a "super-user" account. This will allow both maximum access and the ability to hide your presence.

RSS

© 2025   Created by Dr. Badan Barman.   Powered by

Badges  |  Report an Issue  |  Terms of Service

Koha Workshop