SlideShare a Scribd company logo
No matter what happens, don't be ignorant.

More Related Content

More from Bharat Bhise HNA

Report in case of fraudulent acts by someone
Report in case of fraudulent acts by someoneReport in case of fraudulent acts by someone
Report in case of fraudulent acts by someone
Bharat Bhise HNA
 
Keep on protecting your account from hackers
Keep on protecting your account from hackersKeep on protecting your account from hackers
Keep on protecting your account from hackers
Bharat Bhise HNA
 
Be doubtful to people asking for personal information
Be doubtful to people asking for personal informationBe doubtful to people asking for personal information
Be doubtful to people asking for personal information
Bharat Bhise HNA
 
Cyber crime is very rampant, so be skeptical
Cyber crime is very rampant, so be skepticalCyber crime is very rampant, so be skeptical
Cyber crime is very rampant, so be skeptical
Bharat Bhise HNA
 
Be conscious in case of anomalies
Be conscious in case of anomaliesBe conscious in case of anomalies
Be conscious in case of anomalies
Bharat Bhise HNA
 
Protect your personal information
Protect your personal informationProtect your personal information
Protect your personal information
Bharat Bhise HNA
 
Always secure your account
Always secure your accountAlways secure your account
Always secure your account
Bharat Bhise HNA
 
Keep the attitude of skepticism
Keep the attitude of skepticism Keep the attitude of skepticism
Keep the attitude of skepticism
Bharat Bhise HNA
 
People tend to spread information.
People tend to spread information.People tend to spread information.
People tend to spread information.
Bharat Bhise HNA
 
Be wise and stay smart.
Be wise and stay smart.Be wise and stay smart.
Be wise and stay smart.
Bharat Bhise HNA
 
Not all people can be trusted.
Not all people can be trusted.Not all people can be trusted.
Not all people can be trusted.
Bharat Bhise HNA
 
Rumors have ears and wings.
Rumors have ears and wings.Rumors have ears and wings.
Rumors have ears and wings.
Bharat Bhise HNA
 
Be keen in keeping the information.
Be keen in keeping the information.Be keen in keeping the information.
Be keen in keeping the information.
Bharat Bhise HNA
 
Privacy matters most.
Privacy matters most.Privacy matters most.
Privacy matters most.
Bharat Bhise HNA
 
Choose whom you trust.
Choose whom you trust.Choose whom you trust.
Choose whom you trust.
Bharat Bhise HNA
 
Human beings tend to ruin a reputation.
Human beings tend to ruin a reputation.Human beings tend to ruin a reputation.
Human beings tend to ruin a reputation.
Bharat Bhise HNA
 
Even yourself can betray you.
Even yourself can betray you.Even yourself can betray you.
Even yourself can betray you.
Bharat Bhise HNA
 
Be the person who doesn’t trust easily.
Be the person who doesn’t trust easily.Be the person who doesn’t trust easily.
Be the person who doesn’t trust easily.
Bharat Bhise HNA
 
Being a human needs respect.
Being a human needs respect.Being a human needs respect.
Being a human needs respect.
Bharat Bhise HNA
 
Be careful what you post and share.
Be careful what you post and share.Be careful what you post and share.
Be careful what you post and share.
Bharat Bhise HNA
 

More from Bharat Bhise HNA (20)

Report in case of fraudulent acts by someone
Report in case of fraudulent acts by someoneReport in case of fraudulent acts by someone
Report in case of fraudulent acts by someone
 
Keep on protecting your account from hackers
Keep on protecting your account from hackersKeep on protecting your account from hackers
Keep on protecting your account from hackers
 
Be doubtful to people asking for personal information
Be doubtful to people asking for personal informationBe doubtful to people asking for personal information
Be doubtful to people asking for personal information
 
Cyber crime is very rampant, so be skeptical
Cyber crime is very rampant, so be skepticalCyber crime is very rampant, so be skeptical
Cyber crime is very rampant, so be skeptical
 
Be conscious in case of anomalies
Be conscious in case of anomaliesBe conscious in case of anomalies
Be conscious in case of anomalies
 
Protect your personal information
Protect your personal informationProtect your personal information
Protect your personal information
 
Always secure your account
Always secure your accountAlways secure your account
Always secure your account
 
Keep the attitude of skepticism
Keep the attitude of skepticism Keep the attitude of skepticism
Keep the attitude of skepticism
 
People tend to spread information.
People tend to spread information.People tend to spread information.
People tend to spread information.
 
Be wise and stay smart.
Be wise and stay smart.Be wise and stay smart.
Be wise and stay smart.
 
Not all people can be trusted.
Not all people can be trusted.Not all people can be trusted.
Not all people can be trusted.
 
Rumors have ears and wings.
Rumors have ears and wings.Rumors have ears and wings.
Rumors have ears and wings.
 
Be keen in keeping the information.
Be keen in keeping the information.Be keen in keeping the information.
Be keen in keeping the information.
 
Privacy matters most.
Privacy matters most.Privacy matters most.
Privacy matters most.
 
Choose whom you trust.
Choose whom you trust.Choose whom you trust.
Choose whom you trust.
 
Human beings tend to ruin a reputation.
Human beings tend to ruin a reputation.Human beings tend to ruin a reputation.
Human beings tend to ruin a reputation.
 
Even yourself can betray you.
Even yourself can betray you.Even yourself can betray you.
Even yourself can betray you.
 
Be the person who doesn’t trust easily.
Be the person who doesn’t trust easily.Be the person who doesn’t trust easily.
Be the person who doesn’t trust easily.
 
Being a human needs respect.
Being a human needs respect.Being a human needs respect.
Being a human needs respect.
 
Be careful what you post and share.
Be careful what you post and share.Be careful what you post and share.
Be careful what you post and share.
 

Recently uploaded

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales