Just as a caution for a lot of you. When opening a digital Demat account on any investing platform be very careful. Given the poor cyber security environment, the risk of your Kyc being leaked or sold is very much there.
Just pathetic and irrespons
See More
0 replies4 likes
Tanay Shrivastava
Stealth • 6m
Hi! I'm looking to #Connect with people who are interested in
🌐 Web Development
🎨 FrontEnd
🚨 Backend
💹Data Science
🕵️Cyber security
🎖️ Intership
🤖AI ML
🦏 Javascript
✅ Development
🏗️ Building online
🚀UI/UX
📂 Open Source
💻 Electronic
See More
4 replies2 likes
Surya
Stealth • 12d
🚨 Cyber Threats Are Evolving – Here’s What You Need to Know 🚨
Hackers are getting creative with new tactics and tools. Here are the latest threats and solutions to protect your business! 👇
🔹JPHP Malware (Pronsis Loader)
- Rare language: Bypa
See More
6 replies1 like
Vansh Khandelwal
Stealth • 1m
Databases are vital in web development, providing efficient data storage, management, and retrieval. They ensure data consistency, integrity, scalability, and security, making them essential for dynamic applications.
𝐓𝐲𝐩𝐞𝐬 𝐨𝐟 𝐃𝐚𝐭𝐚𝐛𝐚𝐬�
See More
0 replies7 likes
NANDHA
Stealth • 2m
why do you think that security in India always has a side eye?.
• Are founders not aware of the risk they get due to a security breach?.
• Government of India don't have right laws in terms of security?.
• The security is implemented correctly, you
See More
1 replies6 likes
Amanat Prakash
Stealth • 7d
Ishant initially joined Avriti as a Cyber & Data Security member, and we soon promoted him to HR to manage team coordination, hiring processes, and overseeing contract-based team members. Now, due to the value he's added and his strong management ski
See More
0 replies6 likes
Saksham
Stealth • 4m
Data Privacy: A Gamer's Concern, an Entrepreneur's Responsibility
The online gaming industry thrives on data, but with great power comes great responsibility. As an entrepreneur, you collect user data for running statistics, analytics & more.
The D
See More
2 replies8 likes
Ishant Gupta
Stealth • 6d
Thank you so much Amanat Prakash for the opportunity and trust! I’m excited to take on this new role as COO and contribute to the continued growth and success of Avriti. I’ve enjoyed every step of the journey so far, from Cyber & Data Security to HR,
See More
1 replies6 likes
Vasvi Seth
Stealth • 4m
Decoding Network Protocols: Communication, Management, and Security
Network protocols are the backbone of our digital world, enabling seamless communication between devices. These protocols can be broadly categorized into three main types: communica
Business idea:- Launch an RDP/VPS Cloud Service
Develop a service that offers secure remote access to virtual desktops via RDP. Key features should include customizable resources, scalability, robust security, and accessibility from any device. Targ