Pride of India- Neta ji

Netaji Subhash Chandra Bose

The person, who gathered an army being a normal person, and defeated the most powerful of that time ‘British Empire’. He was the only who breaked the borders of British India and freed many parts and established “Azad Hind Government”.

He was about to reach the capital, but unfortunately, American army bombed Netaji’s supporter, japan with atomic weapons, and Japan surrendered. Netaji still continued to get deep inside British Indian territory, but on 18 August 1945 he gone missing, it is believed that his plane was crashed and his army was unable to continue without their commander, and the war ended.

And today, on his jubilee 23 January 2022, government of India is going to sculpt his holographic sculpture near India gate, it is a temporary sculpture, until his 28 feet tall granite sculpture will be ready.

The Day 17 Jan 2022

Today I woke up at 11 am…..:-0…..ya it is very late…it was my carelessness….. Yesterday, I went to bed at 11, I started Watching YouTube Videos,One after One, 2 hours Later, Finally I slept x+o

Then, I followed my daily morning routine, and get some heat by lighting up fireplace, It took much efforts. My mother has already went to her school, government had closed schools for students but teachers should go, and my father and young elder sis(ananya di) were went to doctor and elder sis(kavya di) was checking her social media, after some time papa n ananya di returned……then mummy called and said that we must go to roof and get some sunlight……but we looked outside……there was very cold outside, we refused to go…….then I went to market and there was nothing to describe,,,,,then it was time to study….so I took maths…..then mummy arrived at 3pm , she baked chapati and we ate it with sabji…..and suddenly my head started pain……I laid on sofa, mummy said kavya di to prepare tea, they argued that I m tea addicted, but….. I m 🀭………then papa suggested to take painkiller….I did…..then I feel gas….so I took medicine to cure that also…..then I drunk tea….then I went into bedroom to take a nap it was 4:30, …..when I woke, it was 7pm….then after half hour…I started to study again…..then at about 9:30, mummy called me to take dinner……. thereafter at 10pm I finished my dinner and come to ananya didi with my phone bec network connectivity of bsnl is excellent in her room and I opened whatsapp…..there was nothing…only 3 status…..I checked and returned to home screen….and said to ananya di that I don’t have anything to do on phone…I don’t use any social media other than whatsapp……she suggested to follow some interesting blogs on any app….then I remembered that I have a blog site on WP then I opened it and started following some interests….then I thought that I should start blogging again…..and that’s what I m doing…….and it is completing…..so after this I will simply go to sleep as it is 10:54….and papa had ordered us to sleep before 11πŸ˜‘……so, that’s all…..and my final remark for 17 Jan 2022 is that this day was ruined, as I woke late…..then and evening ruined in headache…….but this day gave me idea of new bloging content……and I will give this day 2 from 5 stars ⭐ ⭐

How to check if your Mobile is Hacked!



By monitoring the IPs which your mobile phone is connected to, you know if your mobile is hacked or not

β–Ά you can use an application below to check all IPs connected to your mobile :

βž– Network Monitor Mini
βž– Network Monitor

β–ΆDon’t download programs from unknown sources, to avoid the impact of penetration in your mobile These sites to check applications Android
βž– https://apkscan.nviso.be
βž– http://apk-sec.com

β–Ά You can check and scan Mobile Apps and see each App with detail, what permits information to use and violate some or all of your privacy
βž– Androlyzer
βž– Exodus Privacy
βž– Permission Friendly Apps

By Aviral Srivastava
sriaviralnarain@gmail.com

Kingdom of Avid

Aviral Srivastava

Declare Forrester Island Antarctica Which Is Not Owned By Any country even after Antarctica Treaty 1 Dec, 1959

It Is Independent From Any Other owner or administration.

74Β°11’10.9’S 132Β°25’48.5″W
As Our Own Kingdom And The Name Is Kingdom of Avid!

Here Is The Satellite Image

Here’s The Flag Of Our Kingdom

Will be Upgraded

If Anyone has any objection

Plz Contact UsπŸ™πŸ»

sriaviralnarain@gmail.com

Virus vs Antivirus

When most people think of the word “antivirus”, they think about that software you download on your computer to keep you from being hacked. While this is true, it is a simplistic definition. Keep reading to find out what antivirus is, how it works, and more

What is AntiVirus?

Antivirus software searches for, detects, and removes viruses, and other malicious software like worms, trojans, adware, and more. This software is meant to be used as a preventative approach to cyber security to stop threats before they get into your computer and cause problems.

While you may think that your computer is safe as long as you don’t visit sketchy websites, hackers have much more nuanced ways of getting their viruses on your computers, which is why you need a robust antivirus to stay one step ahead of them.

If a virus were to get onto your computer, the consequences could be deadly. Viruses can lead to a host of malicious activity. They can crash your device, spy on you through your webcam or by monitoring your personal accounts.

Hackers can use viruses to steal your personal information, ranging from account logins to financial information. This can then be used to carry out identity theft, phishing scams, and more. These potential consequences are why network protection is more important now than ever before.

How Does Antivirus Work?Β 

An antivirus software works by scanning incoming files or code that’s being passed through your network traffic. Companies who build this software compile an extensive database of already known viruses and malware and teach the software how to detect, flag, and remove them.

When files, programs, and applications are flowing in and out of your computer, the antivirus compares them to its database to find matches. Matches that are similar or identical to the database are isolated, scanned, and removed.

While you can adjust settings so that your antivirus runs automatic scans of your computer for malicious files, you can also opt-in to manual scans, which let you sit and see in real-time which malicious files were found and neutralized.

Some antivirus software will ask for your permission before “cleaning” a file to remove malicious code. If you prefer a hands-off approach, you can adjust the settings so the software automatically removes malicious files.

Most antivirus software performs the same functions, so choosing between one brand and another shouldn’t be that complex of a decision.

Are Antivirus and Anti-Malware the Same?

The short answer is both yes and no.

Before we get into their similarities and differences, let’s first define what malware exactly is.

What is Malware?

MalwareΒ is any type of software written with malicious intent, which can range from data theft, computer damage, or general privacy invasion.

Malware tends to be spread when a suspicious link or download is opened by a victim. Ranging anywhere from viruses to ransomware, malware is an umbrella term that encompasses many types.

For a more in-depth look at the different types of malware and some tips on how to prevent malware attacks, keep reading.

How are They Similar and Different?

Antivirus software and anti-malware are both similar in that they’re designed to protect your computer from malicious software.

However, antivirus is a slightly more generic and catch-all software than anti-malware. Most of us know that when we get a new computer, one of the first software we should install is a good antivirus software.

However, not as many people think to install an anti-malware software. While antivirus software offers general-purpose protection against a wide array of pre-known viruses, anti-malware is more specialized in that it is built to fight off ransomware and Trojans.

Antivirus tends to focus on prevention by stopping malicious files from being downloaded or wreaking havoc on your computer. Anti-malware is more so reactive in that it seeks out and neutralizes malicious files that have already been downloaded and have started causing issues.

Other Ways to Protect Your Network

Install a Firewall

Firewalls keep would-be intruders where they should be – outside your network. By putting up a virtual β€œwall” against inbound and outbound traffic, firewalls choose whether to allow or block certain traffic through.

Firewalls and anti-virus software serve as a good basis for building your network security.

While installing a firewall is a great method for securing your network, they can quickly become outdated and less protective over time.

Cyber threats evolve so often that cyber security software creators must create and release updates to keep your network one step ahead of hackers.

While the process of updating your firewall can be a nuisance, every day that you wait to update your cyber security infrastructure after new versions emerge leaves you more vulnerable to ransomware attacks.

If you are able to, enable auto-updates on your firewall and other security software and schedule any updates for late at night when you’re not using your computer.

Avoid Suspicious Links and Websites

The temptation to visit websites that might contain suspicious links, such as ones that offer free movie and music downloads, can be hard to resist. However, knowing some basic rules about what to stay away from can prevent you from accidentally downloading malware or ransomware.

To start, if a website sounds too good to be true, then you probably shouldn’t trust it. For instance, websites offering free tools or software that are usually expensive are likely to contain malware links.

Another way that hackers easily spread malware attacks is through a term called phishing. In a phishing attack, a hacker will email a victim a malware-infected link. These phishing emails will look and feel genuine, tricking many into clicking on the link.

For instance, a hacker trying to access a company’s HR portal might email them posing as Microsoft, telling them to click the link to verify their credentials.

If you’re wary about trusting a link that seems to be from a company that you have an account with, such as Microsoft, try accessing the web page described in the email by going to the actual website itself without clicking the link.

Cyber attacks can cause network downtime, which costs your company money every minute. They can also cause a host of other problems, ranging from the risk of data breach lawsuits to loss of company reputation if sensitive information is published.

Consider Managed IT Services

Managed IT services can install firewalls, antivirus, and more while creating a comprehensive network protection plan. They layer your network with the latest hardware and software and then employ a team of IT experts to address any threats or issues that pop up.

To take the burden of updating software off of you, a managed services provider can update all cyber security software for you and install necessary security patches.

They can conduct phishing tests to find employees who fall for phishing traps, and then educate those employees on how to recognize and avoid phishing attacks.

In the event that a ransomware attack happens or your network goes down, they can reduce downtime by quickly recovering data due to their use of frequent and secure backups.

As a managed service provider, we have an in-depth knowledge of antivirus accumulated over years of installing antivirus and helping our customers build the perfect cyber security solution for them.

We hope this article answered your questions. For more cyber security content, follow our blog!

The Hacking Bible Book Download Free Of Cost Zerow to Expert!

☝️☝️☝️☝️Click To Download☝️☝️☝️☝️☝️

Free WiFi

First goal of Every Hacker:
Wifi Hacking!

A wifi can't be hacked easily!
It is not a cakewalk!
But connecting to a public wifi is much easier!
We all are aware about it,
But,
You can be hacked or any hacker can spy you!
How to get safe?
Read full article..

If you need an article on wifi Hacking comment in the comment box at the bottom of the pageπŸ™πŸ»πŸ™πŸ»



Let'start

What Is Public Wi-Fi?
━━━━━━━━━━━━━
Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels β€” and it allows you to access the Internet for free. These β€œhotspots” are so widespread and common that people frequently connect to them without thinking twice. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.
━━━━━━━━━━━━━

What Are The Risks Of Using A Public Wi-Fi?
━━━━━━━━━━━━━
The problem with public Wi-Fi is that there are a tremendous number of risks that go along with these networks. While business owners may believe they’re providing a valuable service to their customers, chances are the security on these networks is lax or nonexistent.

πŸ“±Man in the Middle Attacks

One of the most common threats on these networks is called a Man in the Middle (MitM) attack. Essentially, a MitM attack is a form of eavesdropping. When a computer makes a connection to the Internet, data is sent from point A (computer) to point B (service/website), and vulnerabilities can allow an attacker to get in between these transmissions and β€œread” them. So what you thought was private no longer is.

πŸ“±Unencrypted Networks

Encryption means that the messages that are sent between your computer and the wireless router are in the form of a β€œsecret code,” so that they cannot be read by anyone who doesn’t have the key to decipher the code. Most routers are shipped from the factory with encryption turned off by default, and it must be turned on when the network is set up. If an IT professional sets up the network, then chances are good that encryption has been enabled. However, there is no surefire way to tell if this has happened.

πŸ“±Malware Distribution

Thanks to software vulnerabilities, there are also ways that attackers can slip malware onto your computer without you even knowing. A software vulnerability is a security hole or weakness found in an operating system or software program. Hackers can exploit this weakness by writing code to target a specific vulnerability, and then inject the malware onto your device.

πŸ“±Snooping & Sniffing

Wi-Fi snooping and sniffing is what it sounds like. Cybercriminals can buy special software kits and even devices to help assist them with eavesdropping on Wi-Fi signals. This technique can allow the attackers to access everything that you are doing online β€” from viewing whole webpages you have visited (including any information you may have filled out while visiting that webpage) to being able to capture your login credentials, and even being able to hijack your accounts.

πŸ“±Malicious Hotspots

These β€œrogue access points” trick victims into connecting to what they think is a legitimate network because the name sounds reputable. Say you’re staying at the Goodnyght Inn and want to connect to the hotel’s Wi-Fi. You may think you’re selecting the correct one when you click on β€œGoodNyte Inn,” but you haven’t. Instead, you’ve just connected to a rogue hotspot set up by cybercriminals who can now view your sensitive information.
━━━━━━━━━━━━━

Two Types of Public Wi-Fi
━━━━━━━━━━━━━
There are basically two kinds of public Wi-Fi networks: secured and unsecured.

An unsecured network can be connected to within range and without any type of security feature like a password or login. Conversely, a secured network requires a user to agree to legal terms, register an account, or type in a password before connecting to the network. It may also require a fee or store purchase to gain access to the password or network.

Regardless of the connection type, you should always use public Wi-Fi with caution. 
━━━━━━━━━━━━━

How To Surf Safely On Public WiFi ?
━━━━━━━━━━━━━
πŸ”΄ A free Wi-Fi connection can seem like a lifesaver when you’re on the go. Public Wi-Fi can be found in popular public places like airports, coffee shops, malls, restaurants, and hotels β€” and it allows you to access the Internet for free. Of course, we all know jumping on a free Internet connection can be a convenient way to access online accounts, catch up on work, and check emails while on the go. These β€œhotspots” are so widespread and common that people frequently connect to them without thinking twice. However, the security risks should not be forgotten.

πŸ”΄ If you decide to use public Wi-Fi, just be aware that you could be making yourself an easy target for hackers β€” and putting your information and more at risk. Although it sounds harmless to log on and check your social media account or browse some news articles, reading e-mail, checking your bank account, or performing any activity that requires a login is risky business on public Wi-Fi.

πŸ”΄ The average free public Wi-Fi isn’t secure and just because you may need a password to log in, it doesn’t mean your online activities are encrypted. Various reasons make public Wi-Fi susceptible to attack. One issue has to do with the encryption protocol used by some wireless networks. Another reason has to do with the possibility of joining a rogue Wi-Fi hotspot.

πŸ”΄ While the best way to protect your information is to avoid accessing sensitive information or performing sensitive transactions when connected to public Wi-Fi, there are additional measures you should be aware of. These articles can help you learn more about the risks and what else you can do to be safe when surfing on Wi-Fi anywhere.
━━━━━━━━━━━━━

sriaviralnarain@gmail.com

Aviral Srivastava

Internet Scams!

Most Common typ Scam of 2day

Internet Scam

What Are Internet Scams?


━━━━━━━━━━━━━
Internet scams are different methodologies of Fraud, facilitated by cybercriminals on the Internet. Scams can happen in a myriad of ways- via phishing emails, social media, SMS messages on your mobile phone, fake tech support phone calls, scareware and more. The main purpose of these types of scams can range from credit card theft, capturing user login and password credentials and even identity theft.
━━━━━━━━━━━━━


Most Common Types of Online Scams


━━━━━━━━━━━━━
Phishing
━━━━━━━━━━━━━
The top online scam today is Phishing. Internet thieves prey on unsuspecting users by sending out phishing emails. In these emails, a cybercriminal tries to trick you into believing you are logging into a trusted website that you normally do business with. This could be a bank, your social media account, an online shopping website, shipping companies, cloud storage companies and more.

Another type of popular phishing scam is the Nigerian Prince, or 419 scam. These are phishing emails in which you’re asked to help bring large sums of money into the country, cash phony money orders or wire money to the thief. The trick is that the scammer first asks you for a small fee because the larger sum of money is β€œtied up” whether it be in wire transfer fees, processing fees or some other tall tale.

Fake AV
━━━━━━━━━━━━━
One close to our industry is fake security software, which is also known as scareware. These start with a pop up warning saying that you have a virus. Then the popup leads the user to believe that if they click on the link, the infection will get cleaned up.Cybercriminals use the promise of β€œFree Anti-Virus” to instead implant malware on a victim’s device.

Social Media Scams
━━━━━━━━━━━━━
Social media scams are a variety of posts you will see in your news feeds- all with the goal of getting you to click on a link that could potentially be hosting malware.

Mobile Scams
━━━━━━━━━━━━━
Mobile scams can come in many forms, but the most common are phishing apps. These apps are designed to look like the real thing, just like phishing emails. It is exactly the same premise, however, instead of emails, the malware is passed through a fake app.

Social Engineering Scams
━━━━━━━━━━━━━
Social engineering is a way that cybercriminals use human-to-human interaction in order to get the user to divulge sensitive information. Since social engineering is based on human nature and emotional reactions, there are many ways that attackers can try to trick you- online and offline.
━━━━━━━━━━━━━

Aviral Srivastava

sriaviralnarain@gmail.com
Create your website with WordPress.com
Get started