Learn Programming At Your Own!

It’s my guarantee!!!!!!

Can you really learn how to develop apps and websites?

Many would say NO! It’s not a cakewalk….

But let me know you that it’s really a cakewalk!!!! If you try to learn it without any coach…..

Ya, I m not joking….. It’s comparative hard to learn under a coach online, than learning online at your own, just needed your consistency, dedication and know what to learn exactly.

I don’t know whether you are dedicated and will follow it constantly, but I can tell what to learn exactly…..

So, Let’start

How to start?

The first question arise before starting something that how to start?

So, just take your PC (I will try to write a separate blog for android users) and open browser, now search “what is coding” go to any website whose title seems to be relevant and exact…… Now you have idea about coding, now search “streams in programing” choose one which you think you want….

Now search about that particular, gather information about it from different sites, try to get all about it, just by searching it on Google, see what are popular searches about it in Google…… Really, you need dedication here, without that you can’t do it!

See what are required skills and language for that…..

Now…..

How to learn?


Prerequisites: to continue reading, first complete all the tasks written above.

I hope you completed all tasks above, Now I can confidently say that You have started, you know what you are going to learn, but now, how to learn?

So, just simply search it on Google, how to learn app development (for example)

Just choose any website relevant to search…

Read thoroughly, understand what it’s saying, make a path map in your mind….to learn it….

Now, download required softwares….

See the syntax of programming language, copy paste codes from different sites and see their output, try to understand significance of every particular line of code….. Search about that language and codes, see what are the codes are used in that……

Start whatever you can program and keep practicing!

What Next????

Prerequisites: to continue reading, first complete all the tasks written above.

Continue reading “Learn Programming At Your Own!”

Social Trap!

This image is beautiful!

Isn’t it?

Live in the moment, not in the cloud!

Someone

Ya, it’s very true that we are in a trap of Web!

A web which is created with some protocols!

Here, web isn’t WWWeb, it’s web of some traps created by entrepreneurs, who are very successful!

They trap us by showing the importance of trap, and even when we are in trap, they continue to tell us that ” this trap is a place where everyone is trapped, so anyone can meet anyone else here!

Those traps are, SOCIAL MEDIA!!!

Finally, can you tell me need of personalized content on Facebook? Or any other Social Media…they are just to make data with use of our activities,

When you use Social Media, you are making data, which they can sell, use and make billions!

But at the end, what did you got?

Personalized advertisement!

Which just manipulate you, force to buy their products!

This means, you wasted your time, then your money followed your time!

But you will say, “I like it, I want it, what’s your problem Aviral?”

So just go, and follow me on Twitter πŸ˜…

Subscribe my Youtube Channel

And like my post!

Social Trap!

This image is beautiful!

Isn’t it?

Live in the moment, not in the cloud!

Someone

Ya, it’s very true that we are in a trap of Web!

A web which is created with some protocols!

Here, web isn’t WWWeb, it’s web of some traps created by entrepreneurs, who are very successful!

They trap us by showing the importance of trap, and even when we are in trap, they continue to tell us that ” this trap is a place where everyone is trapped, so anyone can meet anyone else here!

Those traps are, SOCIAL MEDIA!!!

Finally, can you tell me need of personalized content on Facebook? Or any other Social Media…they are just to make data with use of our activities,

When you use Social Media, you are making data, which they can sell, use and make billions!

But at the end, what did you got?

Personalized advertisement!

Which just manipulate you, force to buy their products!

This means, you wasted your time, then your money followed your time!

But you will say, “I like it, I want it, what’s your problem Aviral?”

So just go, and follow me on Twitter πŸ˜…

Subscribe my Youtube Channel

And like my post!

My 10th StoryπŸ“šπŸ‘¨β€πŸ’»πŸ₯πŸ‘¨β€πŸ«πŸ‘©β€πŸ«β£οΈ

Hey, today was my last exam of class 10thπŸŽ‰

That was Computer Applications, one of the my favourite Subject, in Term 1st, it was 25/25, but in term 2 I can’t expect that much in it, because some keywords were slipped from my mind…. But ya it was all ok!πŸ˜‰

So coming to the some last months,πŸ˜ͺ

It was starting of class 10th, I started it with a boost, I have completed 1 maths chapters, whole biology and 2 chapters in Physics, I started loving one of the most hated subject maths, it was April,😎

But as April was near to its end, the most bad time started, Covid-19!πŸ₯Ί

I can’t even convey what happened in May & June, just skip that.πŸ˜”

So in July, life became quit normal but not completely, it was ending of August when we were feeling normal, but the boost which was in March-April, just lost! I aslo increased my interest in Hacking πŸ‘¨β€πŸ’»which taught me a new skill! But I stopped because my interest in study was declining.😏

But I completed my syllabus of term 1st in a slow process till end of October.😌

Ya, here Term1&2 was a experimental exam system which was implemented on us by CBSE, but it was good. In this system, Whole syllabus was divided into 2 parts one for T-1 & Another for T-2. We gave board exams in two parts!πŸ˜‘

So back to the topic,

Starting of November, I was busy in deepotsav volg, date of board examination for term 1st announced, it was 30th Nov.πŸ˜›

So, after that I started solving sample papers, and done my best.πŸ˜…

I missed my cousin brother’s Engagement because of examπŸ™„ but on just last day of term 1, I enjoyed my cousin sister’s Engagement πŸ˜‹

And now it’s time for term 2 prepration and term 1 results, after a long wait I got my results…..90% exactly….🀠

Now I joined a coaching “Algorithm”

Algorithm Coaching Institute

It really helped me, increased my confidence in Maths and Physics specially.😎

Then term 2, then today!πŸ€“

All went bestπŸ˜‰…..I thank to all my teachers,

Specially Sanjay Sir, Rupali Mam and Sharmishtha Mam ASVM, Ashutosh sir and Nayanshi Mam Algorithm….And some Youtubers, Sanjeev Pandey Sir Eduhap, Pooja Mam PW, Digraj Sir Social School….. I can’t take all names….. It will make a very long list and Kushal Tripathi Sir Mentored me…….πŸ™πŸ»πŸ˜

So, just….and finally thanks to my parents, who never forced me for percentage……☺️

And last thing, I will opt for PCM in 11th,πŸ˜…

Wait for final results πŸ˜‡

-Aviral Srivastava
sriaviralnarain@gmail.com

Pride of India- Neta ji

Netaji Subhash Chandra Bose

The person, who gathered an army being a normal person, and defeated the most powerful of that time ‘British Empire’. He was the only who breaked the borders of British India and freed many parts and established “Azad Hind Government”.

He was about to reach the capital, but unfortunately, American army bombed Netaji’s supporter, japan with atomic weapons, and Japan surrendered. Netaji still continued to get deep inside British Indian territory, but on 18 August 1945 he gone missing, it is believed that his plane was crashed and his army was unable to continue without their commander, and the war ended.

And today, on his jubilee 23 January 2022, government of India is going to sculpt his holographic sculpture near India gate, it is a temporary sculpture, until his 28 feet tall granite sculpture will be ready.

The Day 17 Jan 2022

Today I woke up at 11 am…..:-0…..ya it is very late…it was my carelessness….. Yesterday, I went to bed at 11, I started Watching YouTube Videos,One after One, 2 hours Later, Finally I slept x+o

Then, I followed my daily morning routine, and get some heat by lighting up fireplace, It took much efforts. My mother has already went to her school, government had closed schools for students but teachers should go, and my father and young elder sis(ananya di) were went to doctor and elder sis(kavya di) was checking her social media, after some time papa n ananya di returned……then mummy called and said that we must go to roof and get some sunlight……but we looked outside……there was very cold outside, we refused to go…….then I went to market and there was nothing to describe,,,,,then it was time to study….so I took maths…..then mummy arrived at 3pm , she baked chapati and we ate it with sabji…..and suddenly my head started pain……I laid on sofa, mummy said kavya di to prepare tea, they argued that I m tea addicted, but….. I m 🀭………then papa suggested to take painkiller….I did…..then I feel gas….so I took medicine to cure that also…..then I drunk tea….then I went into bedroom to take a nap it was 4:30, …..when I woke, it was 7pm….then after half hour…I started to study again…..then at about 9:30, mummy called me to take dinner……. thereafter at 10pm I finished my dinner and come to ananya didi with my phone bec network connectivity of bsnl is excellent in her room and I opened whatsapp…..there was nothing…only 3 status…..I checked and returned to home screen….and said to ananya di that I don’t have anything to do on phone…I don’t use any social media other than whatsapp……she suggested to follow some interesting blogs on any app….then I remembered that I have a blog site on WP then I opened it and started following some interests….then I thought that I should start blogging again…..and that’s what I m doing…….and it is completing…..so after this I will simply go to sleep as it is 10:54….and papa had ordered us to sleep before 11πŸ˜‘……so, that’s all…..and my final remark for 17 Jan 2022 is that this day was ruined, as I woke late…..then and evening ruined in headache…….but this day gave me idea of new bloging content……and I will give this day 2 from 5 stars ⭐ ⭐

How to check if your Mobile is Hacked!



By monitoring the IPs which your mobile phone is connected to, you know if your mobile is hacked or not

β–Ά you can use an application below to check all IPs connected to your mobile :

βž– Network Monitor Mini
βž– Network Monitor

β–ΆDon’t download programs from unknown sources, to avoid the impact of penetration in your mobile These sites to check applications Android
βž– https://apkscan.nviso.be
βž– http://apk-sec.com

β–Ά You can check and scan Mobile Apps and see each App with detail, what permits information to use and violate some or all of your privacy
βž– Androlyzer
βž– Exodus Privacy
βž– Permission Friendly Apps

By Aviral Srivastava
sriaviralnarain@gmail.com

Virus vs Antivirus

When most people think of the word “antivirus”, they think about that software you download on your computer to keep you from being hacked. While this is true, it is a simplistic definition. Keep reading to find out what antivirus is, how it works, and more

What is AntiVirus?

Antivirus software searches for, detects, and removes viruses, and other malicious software like worms, trojans, adware, and more. This software is meant to be used as a preventative approach to cyber security to stop threats before they get into your computer and cause problems.

While you may think that your computer is safe as long as you don’t visit sketchy websites, hackers have much more nuanced ways of getting their viruses on your computers, which is why you need a robust antivirus to stay one step ahead of them.

If a virus were to get onto your computer, the consequences could be deadly. Viruses can lead to a host of malicious activity. They can crash your device, spy on you through your webcam or by monitoring your personal accounts.

Hackers can use viruses to steal your personal information, ranging from account logins to financial information. This can then be used to carry out identity theft, phishing scams, and more. These potential consequences are why network protection is more important now than ever before.

How Does Antivirus Work?Β 

An antivirus software works by scanning incoming files or code that’s being passed through your network traffic. Companies who build this software compile an extensive database of already known viruses and malware and teach the software how to detect, flag, and remove them.

When files, programs, and applications are flowing in and out of your computer, the antivirus compares them to its database to find matches. Matches that are similar or identical to the database are isolated, scanned, and removed.

While you can adjust settings so that your antivirus runs automatic scans of your computer for malicious files, you can also opt-in to manual scans, which let you sit and see in real-time which malicious files were found and neutralized.

Some antivirus software will ask for your permission before “cleaning” a file to remove malicious code. If you prefer a hands-off approach, you can adjust the settings so the software automatically removes malicious files.

Most antivirus software performs the same functions, so choosing between one brand and another shouldn’t be that complex of a decision.

Are Antivirus and Anti-Malware the Same?

The short answer is both yes and no.

Before we get into their similarities and differences, let’s first define what malware exactly is.

What is Malware?

MalwareΒ is any type of software written with malicious intent, which can range from data theft, computer damage, or general privacy invasion.

Malware tends to be spread when a suspicious link or download is opened by a victim. Ranging anywhere from viruses to ransomware, malware is an umbrella term that encompasses many types.

For a more in-depth look at the different types of malware and some tips on how to prevent malware attacks, keep reading.

How are They Similar and Different?

Antivirus software and anti-malware are both similar in that they’re designed to protect your computer from malicious software.

However, antivirus is a slightly more generic and catch-all software than anti-malware. Most of us know that when we get a new computer, one of the first software we should install is a good antivirus software.

However, not as many people think to install an anti-malware software. While antivirus software offers general-purpose protection against a wide array of pre-known viruses, anti-malware is more specialized in that it is built to fight off ransomware and Trojans.

Antivirus tends to focus on prevention by stopping malicious files from being downloaded or wreaking havoc on your computer. Anti-malware is more so reactive in that it seeks out and neutralizes malicious files that have already been downloaded and have started causing issues.

Other Ways to Protect Your Network

Install a Firewall

Firewalls keep would-be intruders where they should be – outside your network. By putting up a virtual β€œwall” against inbound and outbound traffic, firewalls choose whether to allow or block certain traffic through.

Firewalls and anti-virus software serve as a good basis for building your network security.

While installing a firewall is a great method for securing your network, they can quickly become outdated and less protective over time.

Cyber threats evolve so often that cyber security software creators must create and release updates to keep your network one step ahead of hackers.

While the process of updating your firewall can be a nuisance, every day that you wait to update your cyber security infrastructure after new versions emerge leaves you more vulnerable to ransomware attacks.

If you are able to, enable auto-updates on your firewall and other security software and schedule any updates for late at night when you’re not using your computer.

Avoid Suspicious Links and Websites

The temptation to visit websites that might contain suspicious links, such as ones that offer free movie and music downloads, can be hard to resist. However, knowing some basic rules about what to stay away from can prevent you from accidentally downloading malware or ransomware.

To start, if a website sounds too good to be true, then you probably shouldn’t trust it. For instance, websites offering free tools or software that are usually expensive are likely to contain malware links.

Another way that hackers easily spread malware attacks is through a term called phishing. In a phishing attack, a hacker will email a victim a malware-infected link. These phishing emails will look and feel genuine, tricking many into clicking on the link.

For instance, a hacker trying to access a company’s HR portal might email them posing as Microsoft, telling them to click the link to verify their credentials.

If you’re wary about trusting a link that seems to be from a company that you have an account with, such as Microsoft, try accessing the web page described in the email by going to the actual website itself without clicking the link.

Cyber attacks can cause network downtime, which costs your company money every minute. They can also cause a host of other problems, ranging from the risk of data breach lawsuits to loss of company reputation if sensitive information is published.

Consider Managed IT Services

Managed IT services can install firewalls, antivirus, and more while creating a comprehensive network protection plan. They layer your network with the latest hardware and software and then employ a team of IT experts to address any threats or issues that pop up.

To take the burden of updating software off of you, a managed services provider can update all cyber security software for you and install necessary security patches.

They can conduct phishing tests to find employees who fall for phishing traps, and then educate those employees on how to recognize and avoid phishing attacks.

In the event that a ransomware attack happens or your network goes down, they can reduce downtime by quickly recovering data due to their use of frequent and secure backups.

As a managed service provider, we have an in-depth knowledge of antivirus accumulated over years of installing antivirus and helping our customers build the perfect cyber security solution for them.

We hope this article answered your questions. For more cyber security content, follow our blog!

Create your website with WordPress.com
Get started