Skip to main content

Featured

Redmi note 9 pro vs Redmi note 9 pro Max

The Redmi Note line has always been a pretty successful one and is largely responsible for Xiaomi’s success in markets like India. Value-for-money, good specs, and impressive imaging capabilities have long remained the trademarks of the series. This year too, the Redmi Note 9 Pro and Redmi Note 9 Pro Max stick to the same winning formula. Both phones are very similar in terms of specs, though there are some notable exceptions. How do the two siblings compare and which one is the best option for you? Let’s find out in this quick look at the Xiaomi Redmi Note 9 Pro vs Redmi Note 9 Pro Max spec comparison. asian: normal; font-variant-numeric: normal; font-weight: 700; text-decoration-line: none; vertical-align: baseline; white-space: pre-wrap;"> M odel Redmi Note 9 Pro Redmi Note 9 Pro Max BODY Dimensions 165.8 x 76.7 x 8.8 mm (6.53 x 3.02 x 0.35 in) 165.5 x 76.7 x 8.8 mm (6.52 x 3.02 x 0.35 in) Weight 209 g (7.37 oz) 209 g (7.37 oz) Build Glass front (Gorilla Glass 5), glass ba...

cyber crime

Today cyber problems cause huge problems for society, personally, financially and even in the matters of national security. just in the last few years hundreds and thousands of credit card numbers have been stolen, tonnes and hundreds of social security numbers and thousands of health care records were compromised, even nuclear science society was hacked and thousands of Ariel drones have been hijacked, this is all done by EXPLOITING VULNERABILITIES IN HARDWARE AND SOFTWARE, and more often the advantage is taken from Unintentional Decision Taken By People Using Software. People committing cybercrime don’t fit a single profile of motivation, it could be anyone from an international terrorist to a teenager, who was put in some bragging rights. Today's world not only have a mobile army but a well-armed Cyber Army. In fact the World War4, war shall not be fought with arms but with computers used to shut down national water supply, energy grids and transportation systems.

In biology and life, a virus is an organism that is spread by coughing sneezing or physical contact, viruses work by infecting cells, injecting their genetic materials and using those cells to make people sick and spread to other people. A computer virus works in some of the same processes, a virus software gets installed usually unintentionally, harms the computer and the user. It is also possible for the virus to spread into other computers.now how does a virus get on your computer in the first place, there are a couple of ways:
1) They might lure a victim to install a program of deception about the purpose of the program, for example, a lot of viruses are disguised in security updates.
2) It is also possible that your software in your computer has a venerability, so after installing it gets all the permission to import virus.
Once the virus is in your computer the virus can steal or delete files or control program and also someone can remotely control your device using computer viruses the hackers can take over millions of computer worldwide, otherwise, there is BotNet to attack and take down websites. This type of attack is called a Distributed denial Service. A denial service is when a hacker overwhelms a website with too many requests, we call it Distributed Denial when the attack comes from many computers all at once. The websites are programmed to process millions of requests but when it hits billions or say trillions of request, the servers get stuffed and stopped responding.

Another trick to hackers is to send spam E-mails to trick people to share personal information. This is called Phishing Scam. The Phishing Scam is when It seems to be a trustworthy email ask you to login into your personal account and takes you to a fake website, and when you log in any way and hacker can use those credentials to log into your own account and even steal your money. however a few companies, Government, Laws working to make the internet safer, which are not enough. many times when the computer gets hacked, it is due to the security design in the software. 90% of the time the hacking is done not due to a security bug but due to a simple mistake made by a human while designing the software.
It seems that there are steps that we can always take:
1) Use strong password.
2) Check for authentic web address.
3) Install system security updates often.
4) don’t install software you don’t trust.
Often the action level describes the security of not only your own data and computer but also the security of everyone, your school, workplace and home. With billions or trillions of dollars of stakes, cybercriminals could smirk in cheer and we all need to keep up.
                                                                                     Raktim Maitra

Comments

Popular Posts