The Human nature

There is no perfect person in the world, but the most holy and supreme person has his shortcomings, but I believe that everyone is born innocent, because of course you can’t make mistakes in your childhood. But I think people are not really good or bad or both.

  • Not all people are good people. No matter how hard you try, everyone has their own shortcomings. I also feel bad about people.
  • The mistakes they make will anger God; therefore human beings are both. People are bad because someone has to do some naughty or bad things in their lives. No one can be so good, because I believe that if you think you are a good person, you should not do anything at all. Lock yourself in the room. people are bad mainly because of temptation. We have all done some non-model things, sometimes without even realizing it.At some point we are all bad people, but most people are not bad, just like everyone goes to jail, so we keep our balance. So we have good and bad. We have holy days and bad days.
  • We are not perfect people. When we start to think for ourselves and know what is happening, we will do this to ourselves. Our environment, except when we were young, they told us what to do, and now we can control our lives. Our daily decisions make us who we are today.
  • Sometimes we can be good, sometimes we can be bad. He mentioned in his sermon that God loves everyone, no matter what. Whether you are good or bad, as long as you are willing to give, God will always find in his heart to forgive your sins.

Data Breach – An Overview

A data breach occurs when sensitive, confidential, or otherwise protected data is accessed and/or disclosed without authorization. Personal information, such as credit card numbers, Social Security numbers, driver’s licence numbers, and healthcare records, as well as company information, customer lists, and source code, are all common data breach targets. A data breach occurs when someone who is not authorised to see or steals personal data from the entity in responsibility of securing it.

Causes of a data breach

While data breaches can take many forms, they are virtually usually the result of a weakness or flaw exploited by hackers to obtain access to an organization’s systems or processes. A data breach could be caused by a variety of factors, including:

  • weak login credentials
  • social engineering scams
  • malware or ransomware
  • phishing
  • lost or stolen hardware (laptops, hard drives, mobile devices)
  • lack of access controls
  • back doors
  • insider threats
  • user errors

Regulations on data breaches

To avoid data breaches, a number of business guidelines and government compliance rules need stringent controls over sensitive information and personal data. There are no particular laws that govern intellectual property protection. However, a breach of that type of data might result in serious legal conflicts as well as regulatory compliance concerns.

The Payment Card Industry Data Security Standard (PCI DSS) governs who can receive and use personal information (PII) in financial institutions and other businesses that handle financial data. Financial information such as bank account numbers and credit card numbers, as well as contact information such as names, addresses, and phone numbers, are examples of PII.

What can be done to avoid data breaches?

There is no single security technology or control that will completely eliminate data breaches. Commonsense security policies are the most reasonable means of preventing data leaks. These include well-known security fundamentals like:

  • conducting ongoing vulnerability assessments
  • penetration testing
  • implementing proven malware protection
  • using strong passwords/passphrases
  • consistently applying the necessary software patches on all systems

While these measures will help to prevent intrusions into an environment, experts recommend encrypting sensitive data, whether on-premises or in the cloud. Encryption will prevent threat actors from accessing the actual data in the event of a successful breach into the environment.

Well-written security rules for employees, as well as continuing security awareness training to promote those policies and educate staff, are further strategies for preventing breaches and minimising their impact.

Employees may be given the minimal minimum of permits and administrative rights to accomplish their jobs under such rules, such as the principle of least privilege (POLP).

In addition, firms should have an incident response plan in place in the case of a security breach or intrusion. A rigorous method for identifying, containing, and quantifying a security event is usually included in this strategy.

A list of notable data breaches

According to the 2020 Verizon Data Breach Investigations Report, the banking business has the most verified data breaches, followed by information services and the public sector. In recent years, there have been numerous massive data breaches at both huge corporations and government institutions.

Target:
Target Corporation revealed in 2013 that it had experienced a large data breach that exposed customer names and credit card information. People, state governments, and credit card companies have all filed lawsuits as a result of the Target data breach, which affected 110 million customers. Legal settlements totaled tens of millions of dollars for the company.

Sony Pictures:
When threat actors launched malware that disabled workstations and servers in late 2014, Sony Pictures Entertainment’s corporate network was shut down. The data theft was blamed on a hacking group known as Guardians of Peace, which exposed unreleased films taken from Sony’s network as well as private communications from corporate leaders.

Source:
What is a data breach? (techtarget.com)

What is a Bug Bounty Hunter? An Overview

A bug bounty hunter is someone who understands the ins and outs of cybersecurity and is skilled at detecting bugs and weaknesses. Simply defined, a bug bounty hunter examines apps and platforms for bugs that even the in-house development team may overlook. When these professionals find a bug, they report it to the company (or the responsible authority behind the application or platform) and get compensated for their efforts. The advantages aren’t usually monetary in nature.

The concept of a bug bounty is not new, but it has gained hold in India during the previous decade. A bug bounty hunter is not restricted to working for a particular client or firm; instead, all they have to do is find defects and submit them to the appropriate authorities. But why don’t businesses create an in-house bug-hunting team? The rationale behind this is that when a large number of hackers (white hats) are trying to uncover a defect, the chances of the problem being solved fast and easily are substantially higher.

And, if you think about it, firms don’t have to pay their in-house staff on a monthly basis; instead, they can hire people to help them find all the problems and reward them with benefits.

How To Become A Bug Bounty Hunter

Before we get started on how to become a bug bounty hunter, having a cybersecurity expertise or a good understanding of vulnerability assessment will be beneficial.

This is the first and most important item to perform before diving into the getting started process, regardless of the domain. Look for trends in the bug bounty sector, such as what platforms are used, what hacking methods are used, and what tools are used, and so on. This will give you an idea of how to go about getting started as a bug bounty hunter. Cross-site scripting (XSS), SQL Injection, Business Logic, and Information Gathering are some of the major areas to concentrate on.

Training And Education

Cybersecurity is a broad subject that cannot be grasped in a few days. When it comes to studying the ins and outs of vulnerability assessment, people either take a quick course or enroll in a full-fledged course. However, it is entirely up to you and how quickly you want to learn.

You can always enrol in full-time cybersecurity training, such as CEH, if you want to take things a step further. And just because you’re enrolled in a full-time programme doesn’t mean you can’t employ the practical approach. When you first begin to gather expertise, you should start with various online bug bounty programmes.

Another way to learn the game is to read POCs written by other hackers or to watch YouTube lessons. It’s also regarded as one of the most effective strategies to broaden your horizons. When it comes to practising vulnerability assessment or penetration testing, this is one of the most important things to remember. While training colleges give you with a practise platform, self-taught professionals may find it difficult. It is not legal to hack into random websites or platforms on the internet. As a result, setting up a virtual system to practise your talents is always a good idea. You can also try practising on bug bounty programmes on your own. You examine all of the previous year’s bugs, as well as the tactics employed.

Online Risks and Threats

The internet is a fantastic tool for communicating, sharing information, and collaborating, but users of all ages must adhere to specific guidelines in order to stay safe online. Every Internet user leaves a digital trail of data, which includes websites viewed, emails sent, and information provided to online services. Consider the data trail you’re leaving in your wake. Before writing a nasty email, keep in mind that you are leaving your digital footprint, as the message may live online indefinitely. Be more selective about what you post on social networking platforms. While you can usually delete content from social media sites, there’s no guarantee you’ll ever be able to delete digital data once it’s been shared online.

Grooming on the internet

Strangers, or even known people, form an emotional bond with a child or young person online or in person in order to gain their trust for sexual abuse or exploitation. Many youngsters and teenagers begin to acquire feelings of a particular connection or relationship and are unaware that they are being groomed.

To seduce the youngster, the perpetrators are known to utilise a variety of ways, including:

Bribing: This can include giving the child money or presents. In an online game, the gifts could be in the form of even points, lives, and in-game goodies.
Flattery: They strive to earn the child’s affection by showering them with praise and attention.Intimacy building and sexualized games: They put the child’s fragility to the test by adding slightly sexual overtones in conversation or during play. If the child responds positively to his overtures, he will try to develop a deeper relationship with him.
Desensitization: They show the child pornography and child sexual abuse material in an attempt to desensitise the child to sexual behaviours.
Threats and extortion: To acquire access to the youngster, they use forceful coercion.
When parents are unsure what the youngster will respond to, they may try all of the above in an attempt to pique the child’s interest and attention.

Sexual exploitation on the internet

The internet has also become a tool for sexually exploiting children, resulting in practises known as “online,” “ICT-facilitated,” or “cyber-enabled” child sexual exploitation, which encompasses all acts of sexual exploitation committed against a child that have, at some point, a connection to the online environment. It includes any use of ICT that leads to sexual exploitation or causes a child to be sexually exploited, or that leads to or causes the production, purchase, sale, possession, distribution, or transmission of photographs or other material documenting such exploitation.

Theft of one’s identity

Personal information such as address, email address, prior addresses, mother’s maiden name, place of birth, pin number, bank account details, Aadhaar number, and passwords is obtained by fraudsters and used in an unlawful manner for personal advantage. Companies or service providers frequently demand this information as part of their verification procedure. They can access other information about the potential victim and make unauthorised financial transactions using the victim’s credit card or bank account, as well as commit other crimes such as illegally entering (or exiting) a country, trafficking drugs, smuggling other substances, committing cyber-crimes, laundering money, and much more, by obtaining some information. They can even exploit the victim’s identity to commit nearly any crime in his or her name.

If a criminal uses another person’s identity to commit a crime, the victim may be suspected by the authorities. The victim may find themselves the subject of a criminal inquiry, and they may find it difficult to prove their innocence in such situations. Victims of financial fraud may face a slew of problems. You might be stuck with debts if your information was utilised in any type of monetary transaction. Most of the time, if you can show that the debts are not your fault, you will not be held guilty. Proving that you are not at blame, on the other hand, can be difficult and time-consuming.

Cyberbullying

When someone utilises technology (such as the internet or a mobile phone) to bully others, this is known as cyberbullying. Being a victim of cyberbullying can be extremely upsetting for a young child, especially when they often have no idea who is tormenting them. Sending threatening text messages or emails, or creating a hate group on a social networking site, are examples of cyberbullying. Bullying can occur at any time of day or night, and the victim is frequently targeted even when they are at home. On the internet, images and text messages may spread quickly and widely, making it difficult to counteract cyberbullying.

Source:
Online risks and threats — Vikaspedia

Nehru On Secularism

JAWAHAR LAL NEHRU AND SECULARISM

PANDIT JAWAHARLAL NEHRU (1889-1964) was a freedom fighter and seasoned statesman of modern India. He was the architect of modern India, always yearned to build a secular nation.

Nehru regarded secularism as the basic law of Indian nationhood.

Nehru was an ardent champion of the Indian view of Secularism. In a multi-religious societylike India, Nehru defined a secular state that protects all religions but does not favour anyone at the expense of the other.

It does not adopt any religion as the state religion.

During the Independence movement of India, Nehru drafted the congress Resolution on fundamental Rights stated that the state should observe neutrality regarding all religions.

After the Independence of India when the Indian Constitution(1950) had been in force for over a decade, Nehru observed (1961) in an important speech:-

“ We have laid down in our Constitution that India is a secular state. That does not mean or irreligion. It means equal respect for all faiths and equal opportunities for those who profess any faith”.

Nehru did not conceive secularism as indifference to religion.

Nehru strongly condemned those forms of religion which sow the seeds of hatred between different religious communities.

Nehru used every single opportunity to express the danger of mixing religion and politics.

He visualized a secular state as one in which every individual had the full freedom to function according to his way either culturally or in matters of religion. It was Nehru’ a vision that shaped the Constitution of India in such a manner that it should provide for a secular state.

Nehru emphasized four different aspects of secularism :-

  • In the first place, he insisted that secularism meant grant of equal status to all religions in India and opposed grant of special privileges to any religion.
  • Second, Nehru’s Secularism implied the neutrality of the state in religious matters.
  • Third, Nehru viewed secularism as a mental attitude on the part of various communities which could bring about harmony and feeling of fraternity towards one another.
  • Concluding, Nehru’s concept of secularism implied the existence of a uniform civil code for the people of India.

Nehru was a secularist.  He disapproved both the Hindu communism as well as the Muslim communism.

Today’s the secular ethos for which Nehru strived hard through his life is facing a multi-prolonged challenge from the hydra headed communalism.

E-COMMERCE

What is e-commerce?

“E-commerce” and “online shopping” are often used interchangeably, but the scope of e-commerce is much broader: it embodies the concept of doing business on the Internet, for example, it includes many different services. Make online payments, book flights, etc. Buying and selling goods or services electronically via the Internet is called e-commerce.

Why buy online?

  • Lower prices
  • Affordability and convenience
  • More options

Higher profits
Scalability
Consumer knowledge/technology

E-commerce fulfillment model overview

Courier delivery model
Traditional order fulfillment model

Ecommerce

Including network marketing, also known as online marketing. Internet marketing is the process of using tools that help generate potential customers and sales to promote a company or brand and its products or services on the Internet.

Content marketing
Content marketing aims at
Your personal brand and your target audience
Keywords and research.
Focus and content commitment. What will you create? How often do you post? Where will you post? You need to define these basics to create consistent and quality content.
Content Creation
Content Promotion

SEO (Search Engine Optimization)

The process of maximizing the number of visitors to a given website by placing the websiteat the top of the search engine results list. SEO
stands
for search engine optimization, which means increasing the quantity and quality of website traffic through regular search results.

SEM (Search Engine Marketing)

Search Engine Marketing(SEM) is one of the most effective ways to develop business in an increasingly competitive market.
Online advertising is important to millions of businesses, and search marketing is the most effective way to promote your products and grow your business.

Email marketing

Email marketing is an efficient digital marketing strategy for sending emails to potential customers and customers. Effective marketing emails turn potential customers into customers and long-term customers into loyal and enthusiastic followers.

All you should Know about political theory.

Know about Political Theory

As Human beings, we live in a society and society includes groups and institutions. Every institution serves a specific purpose. For specific purposes, we need some rules and regulations. That called politics.

For understanding Political Theory, we divide it into two terms and understand one by one.

Political and Theory.

First, we discuss what is political.

What is political

The Term ‘political ‘ refers to something applicable to a polity, that is ‘ public’, as distinguished from private or something applicable to a limited numbers of persons.

The terms ‘ polity’, ‘ politics’, and ‘ political’ are derived from the Greek word ‘ polis’ which stood for ancient Greek city-state.

In the present- day society the scope of politics is not regarded to be so comprehensive. Today we draw a distinction between public and private spheres of human life, and confine the usage of the term ‘ politics’ to the institutions and activities falling I the public domain.

 The term ‘theory’ stands for systematic knowledge.

This, ‘political theory’ refers to a systematic knowledge of political phenomena.

 Political theory is concerned with three types of statements –

  • Empirical statement – which is based on observation, through sense- experience alone, that is the experience gained through sight, sound, smell, taste and touch of the concrete phenomena.
  • Logical statement –  which is based on reasoning
  • Evaluation – which is based on value judgment.

The political theory includes both political science and political philosophy.

 Political science , relies only on empirical and logical statements.

NATURE OF POLITICAL THEORY

George Catlin observed : “The theory itself is divided into political science and political philosophy.”

 In short, Catlin proceeds to identify the nature of political theory by pointing to its two important components- political science and political philosophy.

Andrew Hacker – “ Every political scientist plays a double role. He is part scientist and part philosopher.

SCOPE OF POLITICAL THEORY

  1. One point of its focus is the study of political concepts and it’s method of study. For this purpose, the normative -philosophical method is regarded to be suitable .
  2. Another point of it’s the focus is the study of political institutions and behaviour. For this purpose, the descriptive-scientific method is regarded to be suitable.

DEBATES ON THE DECLINE OF POLITICAL THEORY

The political theory seems to decline in the mid-twentieth due to questions started to raised by the exponents of new political science.

There were two major causes of the decline of political theory :

  1.  The rise of positivism led to the craze for science.
  2. The prevalence of political ideologies culminating in Marxism.

It is now widely held that political science, like other social and natural sciences, enables us to strengthen our means but we will have to resort to political philosophy to determine our ends.

Means and ends are interdependent. Hence , political science and political philosophy play complementary roles in our social life.

The Dark Side of Social Media

The internet has been taken over by Facebook and other forms of social media. People use social media because they believe it improves their life. Is it, however, true? Is it true that people go on Facebook to socialise or to study other people’s posts to see what’s going on? Are they expressing their dissatisfaction with politics or government entities in general? (Venting has been demonstrated to increase rather than decrease anger.) Are individuals battling on Facebook or other social media platforms, ruining relationships rather than strengthening them or people’s lives? Instead, it was shown that the majority of people use it to consume knowledge, which experts discovered leaves them feeling empty and unfulfilled. Another study published in the journal “Current Opinion in Psychology” in 2016 found that envying other individuals on social media leads to depression. When you’re sick, sad, or alone, browsing through vacation images from someone’s recent trip to Hawaii, positive relationship statuses, parties, or people having a good time in general makes you feel even more alone and melancholy.

What Motivates People to Use Social Media?

People use social media for a variety of reasons, including keeping in touch with others and monitoring them. Surveillance has been utilised throughout history to protect people from danger and to keep them safe. However, the majority of social media monitoring of partners or ex-partners does not fulfil that criterion. “Interpersonal electronic surveillance monitoring” is the phrase for this. Low-quality relationships, low happiness, and terrible connections in general are all indicators of online surveillance.

What Happens When People Spend Too Much Time on Social Media?

Researchers at the University of Michigan found that the more time people spend on Facebook, the more miserable they get. When browsing through the wonderful aspects of other people’s lives, it can also cause sentiments of jealously, resentment, and inadequacy. “Results showed that Facebook usage had a strong negative link with self-esteem,” according to a study conducted at the University of Gothenburg in Sweden. In other words, those who spent more time on Facebook had poorer self-esteem, according to the findings.”

For some people, Facebook might be a trigger for P.T.S.D. For many African Americans and others, the footage of Philandro Castro and Sterling being streamed live on Facebook sparked their P.T.S.D. There were many expressions of mental and psychological concerns on Facebook in the week following Sterling’s and Castro’s deaths. The African-American community was one of the hardest hit. They are not, however, the only ones who have been touched by such horrific recordings of individuals dying at the hands of police officers.

Finally, social media can have a detrimental impact on people. It’s a public bulletin board where anyone can publish anything. However, there is research underway that suggests that this type of “socialising” is actually harmful to humans. It can stymie the healing process that people go through after rejection, heighten feelings of inadequacy and jealously, and cause P.T.S.D., as well as make people feel worse.

Sources

Science Explains How Facebook Makes You Sad | Psychology Today
The most popular social media platform could be wreaking havoc on your emotional health.

How To Keep Social Media From Complicating Your Relationship | Psychology Today
It’s usual for love partners to use social media and social networking sites to keep tabs on each other. So, how can you avoid your love connections becoming more complicated as a result of social media? What are some of the thorny topics you should be aware of?

Does Social Media Help or Hurt Relationships? | Psychology Today
Do you argue with your partner as a result of Facebook use?

http://journals.sagepub.com/doi/abs/10.1177/0265407514568749?cited-by=yesl33%2F2%2F171r33%2F2%2F171p

When black death goes viral, it can trigger PTSD-like trauma | PBS NewsHour
“We’re witnessing mentally and emotionally traumatizing videos and pictures. It’s enough, it’s just enough. It’s just so overwhelming all the time.” – April Reign

E–Waste : the Digital Dark Side

We live in a technologically advanced society where technology is always evolving. Smart phones have supplanted cell phones, LEDs and LCDs have supplanted televisions, and laptops and tablets have supplanted desktop PCs. When a new model of a product is released, the prior one rapidly becomes obsolete, and obsolete things are frequently dumped as waste. These electrical items have reached the end of their useful life and are unwanted, broken, or obsolete. Those who have reached the end of this are referred to as e-waste, which includes electrical devices such as computers, cellphones, televisions, washing machines, refrigerators, and so on.

Millions of tonnes of e-waste are produced each year in developed countries; worse, e-waste from illicit countries like Japan, Malaysia, Ghana, Nigeria, Pakistan, and India, as well as developed countries like the US and Japan, should be dumped in underdeveloped countries. That was how it used to be. The cost of processing e-waste in wealthy countries is high. This is owing to the low cost of shipbuilding, which stimulates the export of rubbish to developing countries.

In undeveloped countries, where waste is buried, consuming and ill-equipped recycling facilities, local residents, industrial owners, and labourers are allowed to harvest valuable commodities from this garbage according to their needs. To leave the others behind, the majority of them acquire vital knowledge. To recover important components, acid baths and electrical burns are used. These practices, in turn, produce serious health problems and may injure those who engage in them. Circuit boards, electric parts, mono boards, and cables are likely to include hazardous metals such as lead, mercury, arsenic, copper, cadmium, nickel, zinc, gold, silver, and beryllium.

These metals have been linked to the release of hazardous chemicals into the environment via soil, causing health issues in both animals and humans. Chemicals can most likely be produced on land, resulting in both land and water pollution.

Polychlorinated biphenyl and polybrominated defanel ether, two important components of e-waste, have a dangerous side effect.
They are the leading causes of ozone depletion. These poisons are also stored in food chains and food traps, posing a serious threat to all species on the planet.

Indeed, e-expanding waste’s environmental imprint is a matter of concern. The growing amount of e-waste must be managed by both consumers and producers. Reusable components are found in the majority of electronic materials.

This reusable component contains metals such as copper, aluminium, lead, and iron. A unique eco-friendly procedure should be developed to properly extract this chemical from garbage items.
Both manufacturers and licenced recyclers must promote recycling models. Producers can enter the recycling chain by providing a collecting service and, compared to the unorganised sector, can raise their buyback offer. Consumers have a natural predisposition to see trash as having economic worth, which is where financial incentives to engage in the formal recycling system can be supplied. They should be persuaded to get rid of all of their technological equipment. Many businesses, including as Dell, Apple, and HP, have started recycling programmes. When it comes to trash disposal, the 3R approach, which includes reuse and recycling, can be extremely beneficial.

E-Parisissa is a remarkable initiative for e-waste treatment in India. Every year, Bangalore generates 8000 tonnes of computer waste, which is then sold to scrap merchants. E-Parisia, India’s first e-waste recycling facility, is located on the outskirts of the city and is environmentally friendly. Its mission is to reduce pollution and landfill trash via environmentally friendly recycling of valuable metals, plastic, and glass.

Computers in detail

Definition

A computer is a machine that performs tasks and calculations according to a series of instructions or program operations (circuits, etc.) and software (OS, the underlying software that controls the hardware when the user issues instructions).

Programming

You don’t need a car, its function is the same as a jukebox that keeps playing tracks. For example, they want to tell the music box to play different music every time. They want to program the music box so that it can play different music. This part of the history of computers is called “the history of programmable machines.” “This is a concise sentence in the history of machines. When I speak their language, I can order to do different things.”

The role of computers in daily life

Today’s computers are fast, small and small. Powerful. Computers can save money, time and labor; otherwise it would take months or years to complete in a few seconds with computers. Launch satellites using a simple application on our desktop. According to the requirements, the storage capacity and speed of the computer will be different. For example, NASA and other companies that use high-speed supercomputers, because speed is an important part of your business. Computers are cheaper than smart phones. The essence is in hand. At home, computers provide opportunities to access social networks, read books, or work from home.In the office, they are the most important because they are the most important form of work. Although computers can help with almost everything from shopping to work to taking notes or playing games, people rely heavily on computers for almost everything. Computers make life easier and faster than ever. Large storage rooms are of great help to today’s business. The data received from different systems is stored on the computer for later use. In addition, previous shopping, reading, work, arithmetic, calling appointments and events or activating alarms all occurred in different places. Now everything can be done with our smart phone. If the book is bulky, it would be great to bring ten books. Now; millions of books are within reach. There is no need to check calendars anymore, because they have been replaced by reminders that automatically remind us of important events and clocks that only need to be activated once. These are some basic tasks that are performed daily, and it is difficult to work without a computer. Computers are no longer a luxury, they can be used in different forms on different platforms, for example as smart phones. Computers are also very helpful in medicine and have undergone extensive development in the past decade. Addictive.All in all, we can say that computers have profoundly affected our lives, and changes are no longer associated with ease, habit, and popularity.

The above is a small example of computers, but as far as modern technology is concerned, computers have changed our way of life. Computers are not only used for arithmetic but are now active in teaching, industrial purposes, automated processes, data management, analysis, personal and group entertainment, Music synthesis, professional photo and video editing, hardcore games, research goals, creating new software and applications to make life easier, shopping, banking, marketing, and even participating in the artificial creation of intelligent creatures with deep learning concepts and machine learning.

SOCIAL MEDIA

Needs and merits

The ability to build real relationships is one of the most important aspects of social media and a key factor in attracting people of all ages, genders and nationalities. It is an important part of developing healthy social networks and powerful social network tools. People can share their business, products and services with the world as long as they stay connected and use social media. Social networks allow people to communicate, and everyone can update and report at any time. Companies make full use of social media to improve your online reputation and greatly help increase sales and personal income.

  • You need to make sure to use all social media platforms to gain insight into the needs of your customers. To make the most of social media for your business, make sure you have a content marketing plan. If you need content on any social media platform, you can use social media asset management tools to create high-quality content.
  • You can also use social media to track what people say on social media. Although social media is mainly used by the public, the government also uses it to raise public awareness.
  • Although the use of social media for teaching can be distracting, educators can do everything they can to guide students to develop good habits and practices, Benefit. Regarding the advantages provided by social networks.
  • If you consistently and continuously invest time and effort, you will see the real benefits of social media marketing. Social media can give your business a huge advantage by helping you connect with your target audience. It can cover a large number of people, but for social media, it is also a media sharing network.
  • Social media advertising is one of the two components used together to attract potential customers and spread information and brand awareness. Different from classic ads. When you actively post on social media pages, social media marketing is easy.

SOCIAL MEDIA AS A BLESSING

There are some people who actually make a good or can say the best use of the social media. Like if we talk about the young entrepreneurs who have just begun with a start up but is lacking in public attraction and funding so they create a short 30seconds advertisement and attach it with the trending apps which work through network connection . Talking about the awareness ;both the social media and mass media have been playing their roles very well by keeping their viewers updated with the latest screamers , exposing the Scams ,scandals , and even the worse parts of humanity .

Condition of teachers in lockdown.

Teacher’s condition in lockdown in India

“In is the supreme art of the teacher to awaken joy in creative expression and knowledge”.

  • Albert Einstein

A Meerut-based English teacher had experience. “At least twice I was abused by parents who were angry at my incessant calling. I have been asked to call up 30 ‘defaulters’ every day. Fees collection is school management’s duty, not that of teachers, but everyone is afraid to say no since there is insecurity about jobs due to the pandemic”, she said.

In this outbreak of coronavirus, everyone’s life has been shaken. School, Student and Teacher have been affected very badly.

Teaching has taken to the online platform and the difficulty faced by teachers is ignored by everyone.

We have to through the light on these unresolved issues.

Some of the Complications faced by teachers :-

  • They were not given any specific training for online classes.
  • They were not given a proper set for WiFi even they are bearing the cost of internet by themselves.
  • Many of them do not have touch screen phones.
  • In many remote areas, the problem of the network is constant.
  • They, face bullying and misbehaviour from students.
  • They were forced to do the thing which they don’t want to do to save their only source of income and employment security in the pandemic.
  • They were not paid on time or even a full salary, although private schools and coalleges are getting full payment from students.

College from Delhi University reported abusive and misbehaviour from students from zoom call.

  Links have been shared with other student teachers.

A teacher from Utter Pradesh reported that class 9 students had been showing his private part to her.

It’s sad to see senior teachers struggling to get video or audio on for class and then the whole class disrespect them.

Some students find it amusing t9 tease teachers or see them struggling. Every teacher gives their 100% to teach us . They have been facing pressure from both the ends institute and students.

In this pandemic everyone going through hard time and it’s high time to support each other .

The Three Types of Hackers

The term “hacker” is commonly linked with hackers with bad intent, although it encompasses much more. A hacker is someone who uses their computer software and hardware skills to break down and circumvent security measures on a computer, device, or network. Hacking is commonly thought to be criminal on principle, although this isn’t the case if the system owner willingly and knowingly gives access. In reality, many private companies and government agencies engage hackers to assist them in maintaining the security of their systems.

The motivations of an individual and the legality of their acts are the two key criteria that determine what type of hacker they are. Hackers are classified as white, black, or grey hats, a naming scheme borrowed from classic western films in which protagonists wore white hats and villains wore black.

1. Black Hat

Malware, which is routinely used to enter computerized networks and systems, is usually created by black hat hackers. They’re usually driven by personal or financial gain, but they’ll also engage in espionage, protests, or just for the pleasure of it. Black hat hackers can range from inexperienced to highly skilled individuals with the goal of spreading malware and stealing private data such as login passwords, as well as financial and personal information. Black hat hackers can either steal, modify, or destroy system data after they gain access to their targets, depending on their motivations.

2. White Hat

They’re also known as “ethical hackers,” and they’re frequently hired or hired by businesses and government agencies to operate as security specialists looking for flaws. While they use the same techniques as black hat hackers, they always receive authorization from the system’s owner, ensuring that their actions are fully legal. Penetration tests, monitoring in-place security systems, and vulnerability assessments are all tactics used by white hat hackers. Independent sources, training, conferences, and certifications can all be utilized to understand ethical hacking, which is the word used to define the nature of a white hat hacker’s conduct.

3. Grey Hat

As the term implies, these individuals combine elements of both black and white hat hackers, although they will frequently look for weaknesses in a system without the consent or knowledge of the owner. They’ll notify the owner of any problems they see, but they’ll also ask for money or an incentive. If the owner does not reply or rejects their proposal, a grey hat hacker may take advantage of the newly discovered problems. Grey hat hackers aren’t evil by nature, but they do want to be compensated for their services. Because grey hat hackers do not have authority from the system’s owner to access the system, their acts are ultimately regarded illegal, regardless of whatever disturbing findings they may uncover.

What is an IP Address? An Overview

A device on the internet or a local network is identified by its IP address, which is a unique address. The Internet Protocol (IP) is a set of rules that govern how data is transmitted across the internet or a local network. IP addresses, in essence, are the identifiers that allow data to be transmitted between devices on a network: they contain location information and make devices reachable for communication. The internet requires a method of distinguishing between various computers, routers, and webpages. IP addresses are a crucial aspect of how the internet operates and provide a means of doing so.

What is an IP?

A string of integers separated by periods makes up an IP address. IP addresses are made up of four numbers; for example, 192.158.1.38 is an example address. The set’s numbers can vary from 0 to 255. As a result, the entire IP addressing range is 0.0.0.0 to 255.255.255.255.

IP addresses are not generated at random. The Internet Assigned Numbers Authority (IANA), a part of the Internet Corporation for Assigned Names and Numbers, creates and assigns them mathematically (ICANN). ICANN is a non-profit organisation based in the United States that was founded in 1998 to assist keep the internet secure and accessible to everyone. Every time someone registers a domain name on the internet, they do so through a domain name registrar, who pays ICANN a nominal fee to do so.

How do IP addresses work

It helps to understand how IP addresses function if you want to figure out why a device isn’t connecting the way you want it to or if you want to troubleshoot why your network isn’t working. Internet Protocol communicates in the same manner that any other language does, by following a set of rules to convey information. This protocol is used by all devices to find, send, and share information with other connected devices. Any computer in any area can communicate with one another if they speak the same language.

IP addresses are most commonly used behind the scenes. The procedure is as follows:

  1. Your device connects to the internet indirectly by first connecting to a network linked to the internet, which then allows your device internet access.
  2. That network will most likely be your Internet Service Provider when you are at home (ISP). It will be your workplace network at work.
  3. Your Internet service provider (ISP) assigns an IP address to your device.
  4. Your internet activity passes through your ISP, which uses your IP address to deliver it back to you. It is their responsibility to issue an IP address to your device because they are providing you with internet connection.
  5. Your IP address, on the other hand, may change. Turning your modem or router on or off, for example, can make a difference. You can also contact your ISP and get it changed for you.
  6. Your home IP address does not go with you while you are out and about – for example, when you travel – and you take your device with you. This is because you will be accessing the internet through a different network (Wi-Fi at a hotel, airport, or coffee shop, for example) and will be allocated a different (temporary) IP address by the hotel, airport, or coffee shop’s ISP.

What is Dark Web? An Overview

The dark web is a section of the internet that requires special software to access and can be difficult to navigate once you do. Multiple layers of encryption allow people to browse and post information on the dark web with near anonymity, making it a go-to platform for buying and selling illicit goods and services.

What Are the Three Levels of the Internet?

Learning about the three levels of the internet might help you better understand what the dark web is.

Surface Web

The surface web, often known as the clear web, is the part of the internet that anyone can access using a web browser and a search engine. Search engines “crawl” the internet looking for new websites and pages to index. When you search for a website or term, the search engine returns results from its index that it believes are the most relevant to your search. The surface web includes news and informational websites (such as this blog), e-commerce sites, video-hosting platforms, and many other sorts of websites. While you may spend a lot of time on the surface web, it only accounts for roughly 4% of all internet traffic.

Deep Web

The majority of the internet is made up of the deep web, often known as the invisible or hidden web. These pages aren’t found in search engine results, but you probably visit them on a daily basis. The Deep Web includes:

Pages that need to be logged in to: The surface web includes home pages for social media sites, streaming services, email, and banking. You do, however, enter the deep web after you log in to your account.

Unindexed content: A website, page, or piece of content may be excluded from the list that search engines crawl, and hence will not appear in the search results. If you know the URL or are linked to it from another page, you can still visit non-indexed pages.

Secure Storage: Photo, video, research papers, medical information, and other data that is stored online but only accessible with the correct credentials make up a large part of the deep web.

Intranets: Businesses, schools, and governments can have their own private networks that are created specifically for their needs but are also connected to the internet. Employees could use this intranet to communicate, save files, and access informational pages about corporate policies.

For how we utilize the internet, the distinction between the surface and deep web is critical. After all, you don’t want your bank statements to show up in a Google search. However, because the deep web is still connected to the internet, a hacker may compromise a company’s security mechanisms and gain access to your personal data through a data breach.

Dark Web

The dark web is a subset of the deep web that requires special tools, software, or authorization to access. Search engines, like the deep web, do not index data on the dark web. The black web, like the rest of the internet, does not refer to a specific site or page. Instead, it’s a darknet, a form of network. A darknet could be created by setting up a secret and secure network with a group of people.

What Is the Dark Web and How Does It Work?

When most people talk about the dark web, they’re referring to the Tor network, which is one of the largest and most well-known darknets.

Tor, which stands for “The Onion Router,” bounces data through a series of encrypted layers (like an onion) to provide greater anonymity to users. On the Tor network, there are onion sites and services, and page addresses end in. onion.

Download and instal the free Tor browser to gain access to the dark web. (You may use it to search the surface and deep webs as well.) It’s totally legal, and the Tor Project, which created the browser, receives a lot of funding from the US government.

However, having a browser is only the first step. The dark web, unlike the surface online, lacks good search engines. You might have to look up the address of an onion site on your own, and the names aren’t easy to remember. The onion address for the CIA, for example, is ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion, while for the nonprofit newsroom ProPublica, it’s propub3r6espa33w.onion.

These are two examples of legal businesses with dark web presences. The dark web, on the other hand, is primarily recognized for the unlawful activities that occurs there.

Why Are Criminals So Attracted to the Dark Web?

The Tor network helps you disguise your identity and allows you to construct and host onion services anonymously. As a result, criminals frequently buy and sell illicit goods and services on the dark web. Limited-time specials, user reviews, and adverts for organic items can all be found on darknet marketplaces, which are surprisingly similar to sites found on the surface web. Criminals, on the other hand, use these marketplaces to sell illegal goods and services such as drugs, firearms, and hacking software. On the dark web, many identity thieves and hacker groups make money by selling the information they stole. Depending on what’s being sold, the value of the information can vary dramatically. Full profiles, also known as fullz, might include a name, Social Security number, date of birth, and account numbers, and can cost anything from $8 to $30 per profile.

Medical records in their whole are extremely desirable to identity thieves, and can fetch up to $1,000. Cryptocurrencies, such as Bitcoin, are the preferred payment method because they allow buyers and sellers to remain anonymous.