Back

Xinetee

Decentralised , Secu... • 7m

In this day and age , hacks , breaches and leak are occurring more than ever , But if your data is impossible to touch , modify or hack?

1 Reply
Replies (1)

More like this

Recommendations from Medial

Image Description
Image Description

Saket Sambhav

 • 

ADJUVA LEGAL® • 18d

Massive Email Password Leak Alert! 🚨 Over 183 MILLION email passwords - including MILLIONS of Gmail accounts - have been exposed in a huge data leak! 😱 This isn’t a Gmail hack but malware stealing credentials from infected devices. Your email,

See More
2 Replies
1
8
Image Description
Image Description

Comet

#freelancer • 1y

Uncover Hidden Netflix Series Worth Watching Moneyball Watch as the Oakland A's general manager rebuilds his small-market team on a limited budget, challenging the system and defying the odds. The Great Hack Explore the dark side of data exploita

See More
2 Replies
8
9

Mohammad Ali Shah

Co Founder & CEO at ... • 4m

🚨 Alert: 16 Billion Credentials Leaked-Is Your Account at Risk? A massive leak has exposed 16 billion credentials from past data breaches – including accounts from Gmail, Facebook, Instagram, Apple & more. 📰 Source: https://timesofindia.indiatime

See More
Reply
3

Vivek Joshi

Director & CEO @ Exc... • 1m

Steal These 6 Corporate Growth Hacks for Your Startup! Learn 6 easy, high-impact hacks big corporations use to build capacity and maximize revenue — all condensed into a 45‑second YouTube Short. Practical examples: automate invoicing to reduce churn,

See More
Reply

Comet

#freelancer • 11m

Day 3: Filtering Data with WHERE Guys, ready to take your SQL game up a notch? Today, let’s talk about the WHERE clause—it’s your tool to filter data like a pro! Here’s how it works: SELECT name, age FROM Students WHERE age > 18; 🎯 This gi

See More
1 Reply
3

Comet

#freelancer • 11m

Day 4: Sorting Data with ORDER BY Hey guys, let’s make your SQL queries even more powerful with ORDER BY! This command helps you sort your results—either ascending (default) or descending. Example: SELECT name, age FROM Students ORDER BY age D

See More
Reply
1

Vasvi Seth

Cyber Security Stude... • 1y

🚨 Urgent Cybersecurity Alert: Log4Shell Vulnerability 🚨 Attention Medial community, Have you heard about Log4Shell? It's not just another tech jargon. This critical vulnerability is shaking up the cybersecurity landscape, and here's why: Log4Sh

See More
Reply
6

Inactive

AprameyaAI • 1y

Ever tried productivity hacks and still felt unproductive? 🤡 Here’s the brutal truth: Most productivity hacks are just distractions in disguise (experience bolta hai) Why? Because working more—without overthinking it—is the real hack no one talks

See More
Reply
4

Devak K

Hey I am on Medial • 2m

Cyber threats are evolving every day — from phishing attacks to ransomware. Is your business fully protected? At DigitDefence, we provide end-to-end cybersecurity solutions to safeguard your data, prevent breaches, and ensure uninterrupted business

See More
Reply
1
Image Description
Image Description

PRATHAM

 • 

Medial • 1y

Observation: Based on recent analysis of data , I observed that mostly startup founders who have made something big are of 29-35 Age , ( not early 20s ) Although they had previous startups/business experience in early age which made them experienc

See More
4 Replies
6

Download the medial app to read full posts, comements and news.