Posts

Showing posts from June, 2020

Must watch movie in this pendemic

Image
Contigion Everybody is afraid in this epidemic. Let's all be calm and stay safe at home. Don't Panic or take any chance to your health. Eat Good food(mainly rich in vitamins,minerals,etc.) Increase your immunity power more and more Exercise/Meditate Not only physically but also be healthy my mind. The new coronavirus is a respiratory virus which spreads primarily through droplets generated when an infected person coughs or sneezes, or through droplets of saliva or discharge from the nose. To protect yourself, clean your hands frequently with an alcohol-based hand rub or wash them with soap and water. They found that for people with mild disease, recovery time is about two weeks, while people with severe or critical disease recover within three to six weeks.   Source: WHO 9 years ago,  warnerbros  pictures, a merican  thriller film  directed by  Steven Soderbergh   Contagion_(2011_film ) movie was released. This movie is little...

Common Types Of Trojan Malware, From A to Z

Image
πŸ”° Common Types Of Trojan Malware, From A to Z πŸ”°πŸ”… πŸ”»━━━━━━━━━━━━━ Here’s a look at some of the most common types of Trojan malware, including their names and what they do on your computer: Backdoor Trojan πŸ”»━━━━━━━━━━━━━ This Trojan can create a “backdoor” on your computer. It lets an attacker access your computer and control it. Your data can be downloaded by a third party and stolen. Or more malware can be uploaded to your device. Distributed Denial of Service (DDoS) attack Trojan πŸ”»━━━━━━━━━━━━━ This Trojan performs DDoS attacks. The idea is to take down a network by flooding it with traffic. That traffic comes from your infected computer and others. Downloader Trojan πŸ”»━━━━━━━━━━━━━ This Trojan targets your already-infected computer. It downloads and installs new versions of malicious programs. These can include Trojans and adware. Fake AV Trojan πŸ”»━━━━━━━━━━━━━ This Trojan behaves like antivirus software, but demands money from you to detect and remove th...

Killing Your Phone wallpaper(Cursed)

Image
Killing Your Phone wallpaper(Cursed) There is on going news/information about the wallpaper that crashes your phone...  Let's Dive what is that? This is the photo which is spread around the world and many crashes have been reported too... Surfers have to either factory reset that phone in order to get access to that phone Source:-  cursed photo The image has an embedded color profile, Google/Skia/E3CADAB7BD3DE5E3436874D2A9DEE126, which I'm assuming was encoded incorrectly to crash systemui somehow since Android uses Skia in their frameworks. It's com.android.systemui.glwallpaper.ImageProcessHelper that is crashing from an ArrayIndexOutOfBoudsException. What you need to know 1) There's a photo of a sunset making the rounds because when set as a wallpaper, it will brick some Android phones. 2) The image has an improperly coded Google color profile, which causes the Android System UI to crash from an out of bounds error. 3) For some phon...

Programming Hub: Learn to code

Image
Programming Hub: Learn to code Coding and programming app to learn to code with HTML, Javascript, C, C++, C#, Swift, Python, R Programming, Java, Artificial Intelligence, CSS, etc. for free with a one-stop app - “Programming Hub: Learn to code” This coding and programming app is created using research and in collaboration with Google experts and offers a perfect path to learn programming. You will learn to code like an expert, and also enjoy it like a game. It's easy, it's fast and it's fun! ✅ Google Play's Editor's Choice

πŸ† ✅ Google Play's "Best of the Best" of 2017!

πŸ˜»πŸ‘― ✅ Recognized and backed by Google launchpad acceleratorπŸ’ͺ ✅ No Ads πŸ‘Ώ With a huge collection of  5000+ programs  (code examples),  20+ courses  and the  fastest compiler in the world , all your programming needs are bundled in a single app for your daily practice. What all programming languages you can learn with this coding tutor app?

...

Cyber Security And Ethical Hacking Free Webinar With Certification

Image
Cyber Security And Ethical Hacking Free Webinar With Certification A re you confused about how to start learning ethical hacking? And about the future as a hacker? Don’t worry, we are here to help you in figuring it all out. GEEKSGOD are organizing a webinar by Aditya Janu, a professional Ethical Hacker and Cyber Security expert. This webinar would be perfect for you if you ever wanted to learn ethical hacking or want to make a career in it. Price :  Rs. 149/ per ticket   FREE Coupon :  GEEKSGOD Date :  6th June 2020 Time :  7:00 PM Speaker:  Aditya Janu  ( Founde S unwebcare  ) Benefits Certificates to attendees Free of cost Complete roadmap to cyber security and ethical hacking Getting started and building your career in Cybersecurity and ethical hacking About the speaker : Aditya Janu did computer science engineering from Dayananda Sagar College Of Engineering Ban...

How to Keep Your Online Activity and Identity Private ?

Image
How to Keep Your Online Activity and Identity Private ? Today, your continuously connected lives are leaving behind a trail of data from your electronic devices. From the apps on your smartphones, your browser history on your computer, to the data on your fitness tracking device- anything that is connected to the Internet is storing information.  What Information is Okay to Share Online? While all this abundance of information sharing may seem alarming, there are good reasons for it. It’s very natural to hit the “accept” popup when your device asks for allowing Cookies, location services, or to access other features of your device to be used by certain Apps or programs. We often do this without thinking of the privacy ramifications. Companies actually need to track certain information in order for their products to work. Therefore, these technologies help facilitate GPS directions, localized search results to find a nearby restaurant, and help improve the...