There are three components of teaching
Teachers are selected through a process of selection in both government and private schools. Of course, these selection processes are changed and updated from time to time. There is a mention of the updated selection procedure in the new education policy. Typically the selection procedure parameters could be a qualification, personality, delivery mechanism,…Continue
Added by Swaran Singh Jaggi on August 7, 2020 at 5:19pm — No Comments
Added by Sudhanshu Ojha on July 4, 2017 at 11:24am — No Comments
PARIS — A new and highly virulent outbreak of malicious data-scrambling software appears to be causing mass disruption across Europe, hitting Ukraine especially hard.
Company and government officials reported serious intrusions at the Ukrainian power grid, banks and government offices, where one senior official posted a photo of a darkened computer screen and the words, "the whole network is down." Russia's Rosneft oil company also reported falling victim to hacking, as did Danish…Continue
2017 is the year when Global IT Forums are putting efforts to drive awareness of cyber security risks which in fact a high risk but very low focus Let's have a look on some of the some of the leading causes of data leakage & cyber threats. Key points as follows:…Continue
In this Mobility World, where we talk about Internet of Things (IOT). Our Life starts with "WhatsApp" & ends with "FB"; shopping, traveling, communication, Searching, Tracking, ..... Internet Is Everywhere.
More than 24% of mobile users are using Mobile for "Computing" even thou we do financial transaction, Net Banking, Online Shopping…Continue
Government of india prevent computer from wanna crypt ransomware i know our browser is not out of date
On May 5, the company received an anonymous email threatening a massive attack with the poison Ricin on all its offices in Bangalore if it didn't pay Rs 500 crore ($85 million)
in ransom in bitcoins, according to news media reports.
The firm has refrained from sharing details of the incident with the media. In a statement, it confirms that it has filed a complaint with local law enforcement authorities. "We have augmented security measures at all our office locations. There is no…Continue
Massive Hit - "RANSOMWARE". ATM is "DOWN" suggested Not to do Any "Online" Transaction", PC's were Locked" Systems were "Shutdown"; Bitcoin Wallet's filling-up with Cash.
It's a major Cyber Attack at a scale never seen before impacting Organization's across UK, Spain, Russia, Italy, Vietnam, Taiwan & China. Such Attack's are Victimizing…Continue
Added by AHMED SHAKIL on May 17, 2017 at 12:31pm — No Comments
Today many of us are going into engineering colleges. Since engineering remains one of the greatest trends till date and many more to come. For better development and research purposes many a colleges are providing WiFi connections to their students. But the only problem here is that it is limited. One cannot access various blogs and software websites. I am at NITR myself and since we have to sign in to a portal to get internet. There is even nonrouter allowed in the campus. Not…Continue
Added by Nitish Kumar Nayak on September 16, 2016 at 4:36pm — No Comments
Had a Great experience with D-link Certified Specialist training and Certification program.Learnt a lot of new things and got a unique chance of hands on experience with the switches.
Now i am certified in Switching Technology!…Continue
Jawahar Education Society's
A. C. Patil College of Engineering,Kharghar, Navi Mumbai.
Department of Electronics & Telecommunication Engineering
TO WHOMSOEVER IT MAY CONCERN
We are grateful to D-link India Limited for starting the Industrial interaction program…Continue
Added by Dr Vijaykumar N Pawar on November 27, 2014 at 9:30pm — No Comments
El Router 3G Wireless N300 DIR-514 de D-Link permite a los usuarios acceder a la banda ancha móvil en todo el mundo. Basta con insertar un adaptador USB 3G/4G o Smartphone compatible con LTE y comparta su conexión a Internet 3G/4G (LTE) a través de una red inalámbrica segura y de alta velocidad.
Este Router 3G Wireless…Continue
Added by Xavier Mármol on October 22, 2013 at 7:18pm — No Comments
IP Masquerade is a networking function in Linux similar to the one-to-many (1:Many) NAT (Network Address Translation) servers found in many commercial firewalls and network routers. For example, if a Linux host is connected to the Internet via PPP, Ethernet, etc., the IP Masquerade feature allows other "internal" computers connected to this Linux box (via PPP, Ethernet, etc.) to also reach the Internet as well. Linux IP Masquerading allows for this functionality even though these internal…Continue
For people that manage hardware devices such as storage, routers and many more using Microsoft Windows, the term hyper terminal is a familiar thing. They use hyper terminal to connect to all the devices mentioned above using serial cable. But what if you have to manage all those devices using linux?
The answer is, linux has 2 alternatives to hyper terminal; one is command line based and the other is…