fuf;la ìysjQ Nhdklu hackers ,d ljqo@
“hacker” flfkla iy “cyber criminal” flfkla w;r fjki okakjdo@ fndfyda fokd fï jpk fol jerÈhg Ndú;d lrkjd'fuf;la ìysjQ Nhdklu hackers ,d oelafjk úäfhdajls fï' fï hackers ,d Tjqkaf.a m%ùK;ajfhka iy yelshdjka j,ska kï f,dj m%isoaO keye' Tn fï úIh ms<sn|j Wkkaÿjla olajk wfhla kï fï ùäfhdaj wksjd¾hfhka n,kak'
hackers ,d lshkafka krl mqoa.,hska fkfuhs' Tjqka m%Yak .eg¿ úi|k wh" fodaY fidhk wh' Tjqka ;ukaf.a oekqu iudcfha ÈhqKqj fjkqfjka fhdojkjd' wks;a w;g cyber)criminals ,d wkjifrka moaO;s j,g we;=¿ ù ydkS isÿlrñka Tjqkaf.a ,dN m%fhdack i|yd lghq;= lrkjd'
0 comments:
Post a Comment