-
Notifications
You must be signed in to change notification settings - Fork 0
/
sixth.html
198 lines (179 loc) · 9.6 KB
/
sixth.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
<!DOCTYPE html>
<html style="color: forestgreen;">
<!-- hello vistor this is build by a begginer you may have difficulty to understand couple of thing -->
<title>
SECURITY IN NEW TECHNOLOGY ERA
</title>
<head>
This is <b>actual</b> head of this <strong>webpage</strong> i dont know how to use it
</head>
<body style="font-size: larger;">
Welcome to my webpage
<blockquote border="10" cite="https://www.google.com"> If you reveal your secrets to the wind, you should not blame the wind for revealing them to the trees. ...</blockquote>
<marquee> The times when the magic of animating text was only available to professional video editors and designers have passed. With the emergence of animated text generators, making text move, sparkle, and change colors has become easy for anyone with a computer or a smartphone.</marquee>
<br>
<h1>
Hey there today blog is about how to stay <mark>secure</mark> in new <mark>technology</mark> era
</h1>
In this blog we discuss some new point mention below <br>
<ul style="list-style-type:square;">
<li>Dont share your personal information to unknown people <a href="#local1">click here</a></li>
<li>Use two factor authentication to add more security layer to you accounts<a href="#local2">click here</a></li>
<li> Never use this type of password mention below<a href="#local3">click here</a></li>
<ol>
<li>Your pet name</li>
<li>Your family members name</li>
<li>Your vehicle no </li>
<li>Your mobile no </li>
<li>Your relatives no </li>
<li>Your public related information </li>
<br>
<dl>
<dt> school roll no</dt>
<dd>--these type of thing is easily guessed by your friend circle</dd>
<dt> your nickname or name</dt>
<dd>--this type of passwords is easily guessed by anyone and hackers</d>
</dl>
<marquee>TO SAFE IN THIS ERA USE PASSWORDS THAT IS NOT EASILY CRACKED BY HACKERS USE SENTANCES INSTEAD OF WORDS</marquee>
</ol>
<li>Never post you personal info on your social media <del><small><small>handle</small></small></del><ins>account</ins></li>
<li>Never click on unknown link</li>
<li>Never allow a website to acces your personal information</li>
</ul>
so lets gets started ....
<br>
<h2>Dont share your personal information to unknown people </h2>
<img src="F:\work image\woman-shh-half-face-978x413.jpg" width="1000" height="600">
<pre id="local1" style="font: x-large;">
If you think your personal <i>information</i> is secure, think again. Keeping your information safe is now the exception,
not the rule. According to a recent Pew Research Center study, an <em>astounding</em> 64% of Americans have had their personal
information exposed by a data breach of some kind.
Of this group:
41% experienced fraudulent credit card charges.
35% had important information (such as an account number) compromised.
16% had their email accounts hacked.
13% had someone else take control of their social media account.
15% had their Social Security number revealed.
14% had someone try to take out lines of credit or loans in their name.
6% had an impostor file fraudulent tax returns under their name.
Unfortunately, there are unscrupulous people on the Internet who are looking to take advantage of you.
As such, it’s important to learn what kinds of information these individuals are looking for and how they can use your data to harm you.
More importantly, you need to know how to protect yourself by guarding your information online.
</pre>
<br>
<h2> Use two factor authentication to add more <abbr title=" guide to stay secure in new era"><mark>security</mark></abbr> layer to you accounts</h2>
<img src="F:\work image\acastro_200214_3900_browser_package_0001.0.webp" width="1000" height="600">
<pre style="font-size: x-large;" id="local2"> Just about any account you own on the internet is prone to being hacked. After numerous widespread breaches
through the past few years, tech companies have been working together to develop a standard that would make
passwords a thing of the past, replacing them with more secure methods like biometric or PIN-based logins that
do not require transferring data over the internet.
But while those standards are still being adopted, the next best way to secure your accounts is two-factor
authentication, or 2FA. This a process that gives web services secondary access to the account owner (you) in
order to verify a login attempt. Typically, this involves a phone number and / or email address. This is how it
you log in to a service, you use your mobile phone to verify your identity by either clicking on a texted / emailed link
a number sent by an authenticator app.</pre>
<h3>Never use this type of password mention below</h3>
<img src="F:\work image\download.jpg" width="1000" height="600">
<pre id="local3" style="font: x-large;">
a minimum of 1 lower case letter [a-z] and
a minimum of 1 upper case letter [A-Z] and
a minimum of 1 numeric character [0-9] and
a minimum of 1 special character: ~`!@#$%^&*()-_+={}[]|\;:"<>,./?
at least 1 upper case, numeric, and special character must be EMBEDDED somewhere in the middle of the password, and not just be the first or the last character of the password string.
Passwords must be at least 10 characters in length, but can be much longer.
Passphrases are longer versions of passwords that may be easier to remember and harder to guess. If you opt to use a passphrase, some of the complexity requirements are relaxed:
a minimum of 20 characters in length
a minimum of 2 character sets from these classes: [letters], [numbers], [special characters (as above)]
Some other considerations:
Please do not use the same password in the CS Department that you use anywhere else -- either in the rest of the University, at other jobs, other research institutions, etc.
Never tell *anyone* else your password.
Don't write your password down, and especially don't post in your work area, or online in a file.
Passwords must not be based on a dictionary word or have been previously cracked.
Passwords should not contain any personal information. <a href="https://www.business2community.com/cybersecurity/10-ways-to-keep-your-information-safe-in-the-digital-age-02130163" target="_blank" title="bussiness.com"> read more</a>
</pre>
This webpage is written by <cite> jatin kartik </cite>
<br>
<sup>j</sup>k<sub>t</sub>
<br>
<table border="5">
<caption> IMAGE TABLE</caption>
<th><small>data table</small></th>
<th> DATA pdf</th>
<th> DATA doc</th>
<tr> <th rowspan="3"> DATA </th>
<td><a href="https://www.google.com" target="_blank"><img src="F:\work image\download.jpg" width="100" height="60"></a></td>
<td><img src="F:\work image\Annotation 2020-11-20 010651.png" width="100" height="60"></td>
</tr>
<tr>
<td><img src="F:\work image\Amazing Robo.png" width="100" height="60"></td>
<td><img src="F:\work image\ascii.png" width="100" height="60"></td>
</tr>
<tr>
<td><img src="F:\work image\unit 2 math.png" width="100" height="60"></td>
<td><img src="F:\work image\string predefined function.png" width="100" height="60"></td>
</tr>
<tr>
<th rowspan="2"> DATA </th>
<td><img src="F:\work image\uska hi bhai comp.png" width="100" height="60"></td>
<td><img src="F:\work image\vsss.png" width="100" height="60"></td>
</tr>
<tr>
<th> data</th>
<td rowspan="2"> <table border="10" width="20%">
<caption>Nested table</caption>
<th colspan="5"> <small>data table</small></th>
<tr>
<th rowspan="3">list 1</th>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
<tr>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
<tr>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
</table></td>
<!--<td colspan="2"><img src="F:\work image\woman-shh-half-face-978x413.jpg" width="200" height="60" alt="broken image"></td>
<td><img src="D:\learning data\Mere Samne Wali Khidki Mein _ Ashish Patil _ Padosan _ Kishore Kumar _ Cover _ 2018 HD ( 1080 X 1920 ).mp4" width="100" height="60" title="broken image"></td> -->
</tr>
</table>
<br><br><br><br>
<table border="10" width="80%">
<caption>Nested table</caption>
<th colspan="5"> <small>data table</small></th>
<tr>
<th rowspan="3">list 1</th>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
<tr>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
<tr>
<td>data </td>
<td>data </td>
<td>data </td>
<td>data </td>
</tr>
</table>
<address> Name : - jatin kartik <br>
Village : - Ismailpur <br>
Post : - shivala kalan <br>
District : - Bijnor <br>
</address>
</body>
</html>