Feed Post

Is GFG 90% Challenge a scam?? Previously Around 9th of Jan, I bought there Complete Prepration Course and completed It 2-3 days before but when I contacted for refund. They didn't received my call as well as doesn't even responded for the email ✉️ I

See More

Hemant Prajapati

Stealth • 6m

It is not about selfishness. We can only access the course on a single logged in as well as numerous security checks for anything I commit there.

1 replies1 like
Replies (1)

More like this

Recommendations from Medial

Image Description
Image Description

SHIV DAYAL

Stealth • 1m

Are you ready to share your personal car or bike as a rentel vechile with all security you can earn side income as well

6 replies4 likes

Aryan patil

Stealth • 7m

Q-Day, or Y2Q (Years to Quantum), is the date when quantum computers are expected to be able to break public-key cryptography. Cybersecurity and quantum security experts estimate that Q-Day will occur within the next decade. Some say it could happen

See More
0 replies5 likes

RISHABH JAIN

Stealth • 3m

What should be an ideal number of co-founders in a startup? It is generally said the more, the better and of course having a great team makes your work easy but do having 4-5 co founders hamper working as well as divide the equity too much considerin

See More
0 replies4 likes

Vasvi Seth

Stealth • 4m

Protecting organizational assets is paramount in today's digital landscape. To ensure comprehensive asset protection, organizations must address multiple potential threats: 1. External Risk: External threats, such as hackers and cybercriminals, pose

See More
0 replies4 likes
1
Anonymous
Image Description
Image Description

An online learning platform where 50% of course values goes as referral bonus. For eg: Digital marketing course - Rs 5,000 referral bonus - 2,500 Here each students or candidates can learn as well as earn. User will get his entire amount back when he

See More
2 replies1 like

Vasvi Seth

Stealth • 5m

🔒 As an entry-level security analyst, safeguarding organizational assets against threats is paramount. Understanding the various forms of threats is key to fortifying our defenses. Here are two common types every analyst should be vigilant about: •

See More
0 replies5 likes

Ishant Gupta

Stealth • 5m

Hi! We know that in 2024 , only skills are prior than degree or certificate. But we know due to High Cyber Security Risks, It's very dangerous about a single click. So How and Where to buy a course????? Choose One Standout Course: Start by one online

See More
0 replies6 likes
Anonymous
Image Description
Image Description

🚗 In Atlanta, a thief proved that the security of the Tesla Cybertruck is a myth. A Tesla Cybertruck owner fell victim to a bold robbery that has raised questions about the much-touted security of the electric pickup. The thief shattered the suppos

See More
3 replies6 likes
Image Description
Image Description

SHIV DIXIT

Stealth • 6m

An app where people can upload anything without any copyright . People can talk about anything and share thoughts on any topic. People can see anything . people can write anything. people can learn anything .people can join any illegal and legal comm

See More
10 replies7 likes
Image Description
Image Description

SamCtrlPlusAltMan

 • 

OpenAI • 5m

Paul Trillo, an early access user of OpenAI's unreleased Sora model, has created what is being hailed as the *first official music video generated using Sora*. The video was made for indie chillwave musician Washed Out and his new single “The Hardest

See More
8 replies9 likes

Download the medial app to read full posts, comements and news.