Back

Xinetee

Decentralised , Secu... • 10m

In this day and age , hacks , breaches and leak are occurring more than ever , But if your data is impossible to touch , modify or hack?

1 Reply
Replies (1)

More like this

Recommendations from Medial

Varun Bhambhani

 • 

Medial • 11d

A data leak affecting 149 million accounts is a reminder of how fragile digital trust can be. When information of this scale is exposed, the impact goes beyond passwords and emails. It creates long term risk for identity misuse, targeted fraud, and

See More
Reply
1
Image Description
Image Description

Saket Sambhav

 • 

ADJUVA LEGAL® • 3m

Massive Email Password Leak Alert! 🚨 Over 183 MILLION email passwords - including MILLIONS of Gmail accounts - have been exposed in a huge data leak! 😱 This isn’t a Gmail hack but malware stealing credentials from infected devices. Your email,

See More
2 Replies
1
8
Image Description
Image Description

Comet

#freelancer • 1y

Uncover Hidden Netflix Series Worth Watching Moneyball Watch as the Oakland A's general manager rebuilds his small-market team on a limited budget, challenging the system and defying the odds. The Great Hack Explore the dark side of data exploita

See More
2 Replies
8
9

Mohammad Ali Shah

Co Founder & CEO at ... • 7m

🚨 Alert: 16 Billion Credentials Leaked-Is Your Account at Risk? A massive leak has exposed 16 billion credentials from past data breaches – including accounts from Gmail, Facebook, Instagram, Apple & more. 📰 Source: https://timesofindia.indiatime

See More
Reply
3

Comet

#freelancer • 1y

Day 3: Filtering Data with WHERE Guys, ready to take your SQL game up a notch? Today, let’s talk about the WHERE clause—it’s your tool to filter data like a pro! Here’s how it works: SELECT name, age FROM Students WHERE age > 18; 🎯 This gi

See More
1 Reply
3

Vivek Joshi

Director & CEO @ Exc... • 4m

Steal These 6 Corporate Growth Hacks for Your Startup! Learn 6 easy, high-impact hacks big corporations use to build capacity and maximize revenue — all condensed into a 45‑second YouTube Short. Practical examples: automate invoicing to reduce churn,

See More
Reply

Comet

#freelancer • 1y

Day 4: Sorting Data with ORDER BY Hey guys, let’s make your SQL queries even more powerful with ORDER BY! This command helps you sort your results—either ascending (default) or descending. Example: SELECT name, age FROM Students ORDER BY age D

See More
Reply
1

Vasvi Seth

Cyber Security Stude... • 1y

🚨 Urgent Cybersecurity Alert: Log4Shell Vulnerability 🚨 Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
Reply
6

Inactive

AprameyaAI • 1y

Ever tried productivity hacks and still felt unproductive? 🤡 Here’s the brutal truth: Most productivity hacks are just distractions in disguise (experience bolta hai) Why? Because working more—without overthinking it—is the real hack no one talks

See More
Reply
4

Devak K

Hey I am on Medial • 5m

Cyber threats are evolving every day — from phishing attacks to ransomware. Is your business fully protected? At DigitDefence, we provide end-to-end cybersecurity solutions to safeguard your data, prevent breaches, and ensure uninterrupted business

See More
Reply
1

Download the medial app to read full posts, comements and news.