Posts

BFF

Image
  BESTIES_FOREVER #DARSHAN #NANDAN #DRACULA #prathek #sankth #rangaa #arun kumar F ~ Fight for you R ~ Respect you I ~ Inspire you E ~ Encourage you N ~ Never forget you D ~ Deserve you S ~ Stand by you                   “ Friends are those rare people who ask how we are and then wait to hear the answer.” — ... “A friend knows the song in my heart and sings it to me when my memory fails.” — ... “It's the friends you can call up at 4 a.m. that matter.” — ... “Truly great friends are hard to find, difficult to leave, and impossible to forget.” —  

BESTIES

Image
  BESTIES_FOREVER #DARSHAN #NANDAN #DRACULA #prathek #sankth #rangaa #arun kumar F ~ Fight for you R ~ Respect you I ~ Inspire you E ~ Encourage you N ~ Never forget you D ~ Deserve you S ~ Stand by you                   “ Friends are those rare people who ask how we are and then wait to hear the answer.” — ... “A friend knows the song in my heart and sings it to me when my memory fails.” — ... “It's the friends you can call up at 4 a.m. that matter.” — ... “Truly great friends are hard to find, difficult to leave, and impossible to forget.” —  

Hacker

                                                                        Hacke r A  hacker  is a person skilled in  information technology  who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term  hacker  has become associated in  popular culture  with a  security hacker  – someone who utilizes their technical know-how of  bugs  or  exploits  to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example,  law enforcement agencies  sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors .  This could include using anonymity tools (such as a  VPN , or the  dark web ) to mask their identities online, posing as criminals themselves. [1] [2]  Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. On t