<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Modern Day Technology</title>
    <description>The latest articles on DEV Community by Modern Day Technology (@moderndaytech).</description>
    <link>https://dev.to/moderndaytech</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F122314%2Ff66c9aae-af49-4c84-b2de-f655984ab419.png</url>
      <title>DEV Community: Modern Day Technology</title>
      <link>https://dev.to/moderndaytech</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/moderndaytech"/>
    <language>en</language>
    <item>
      <title>What exactly is dropshipping and how does it work?</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Fri, 21 Dec 2018 13:30:56 +0000</pubDate>
      <link>https://dev.to/moderndaytech/what-exactly-is-dropshipping-and-how-does-it-work-3p71</link>
      <guid>https://dev.to/moderndaytech/what-exactly-is-dropshipping-and-how-does-it-work-3p71</guid>
      <description>&lt;p&gt;Dropshipping is a retail fulfillment method where a store doesn't keep the products it sells in stock. Instead, when a store sells a product, it purchases the item from a third party and has it shipped directly to the customer. As a result, the merchant never sees or handles the product.&lt;/p&gt;

&lt;p&gt;The biggest difference between dropshipping and the standard retail model is that the selling merchant doesn't stock or own inventory. Instead, the merchant purchases inventory as needed from a third party – usually a wholesaler or manufacturer – to fulfill orders.&lt;/p&gt;

&lt;p&gt;Benefits&lt;/p&gt;

&lt;h1&gt;
  
  
  Less Capital Is Required
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Easy to Get Started
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Low Overhead
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Flexible Location
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Wide Selection of Products
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Easy to Scale
&lt;/h1&gt;

&lt;p&gt;AliExpress is an extremely popular retail platform, whose order volume exceeds that of Amazon and eBay combined. And AliExpress' prices are so low that you can multiply them by 10 and still have the best offers in your market.no wonder that so many online entrepreneurs are keen to start a drop shipping business with AliExpress.And today starting this kind of business is easier than ever. Because there is AliDropship Plugin! It's the unique WordPress based solution to assist with the creation of AliExpress drop shipping stores and easy importing of Ali products. You can have your own webstore built in minutes. This tool is so easy to manage, that even a kid can launch a drop shipping store with its help!Key benefits of AliDropship plugin:- Affordable price with no limitations&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Fully compatible with WooCommerce&lt;/li&gt;
&lt;li&gt;Simple and user-friendly interface&lt;/li&gt;
&lt;li&gt;Easy product search and instant upload&lt;/li&gt;
&lt;li&gt;Live stats and auto updating&lt;/li&gt;
&lt;li&gt;Built-in themes optimized for high conversions&lt;/li&gt;
&lt;li&gt;Free lifelong support and updatesYou can have your AliDropship plugin forever now.And in case you want a 100% hassle-free start, you can order a turnkey custom drop shipping store from AliDropship professional team, and begin getting revenues right away.&lt;/li&gt;
&lt;/ul&gt;

&lt;h1&gt;
  
  
  Dropshipping: $10,000 per Month
&lt;/h1&gt;

&lt;h1&gt;
  
  
  Read more:) &lt;a href="https://www.oxipress.com/dropshipping/"&gt;https://www.oxipress.com/dropshipping/&lt;/a&gt;
&lt;/h1&gt;

</description>
      <category>dropshipping</category>
    </item>
    <item>
      <title>What is Hacking?</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Mon, 17 Dec 2018 15:48:26 +0000</pubDate>
      <link>https://dev.to/moderndaytech/what-is-hacking-2kpc</link>
      <guid>https://dev.to/moderndaytech/what-is-hacking-2kpc</guid>
      <description>

&lt;p&gt;Hacking is a term that is mostly associated with malicious and Illegal activities. It may be that you have heard a lot about it in the news and social media that someone’s e-mail account has been hacked, or the bank’s website has been stolen and many information stolen.&lt;/p&gt;

&lt;p&gt;All this is entirely possible because we are in a world where everyone uses the Internet, no information is private.&lt;/p&gt;

&lt;p&gt;Hacking is not illegal in itself if it is done with good intentions. For example, to help a company, its system or network can check the security, hacking is not illegal.&lt;/p&gt;

&lt;p&gt;Neatness in hacking matters a lot. If there is no reason to harm anyone or anyone’s property, hacking is not illegal.&lt;/p&gt;

&lt;p&gt;A person who hacks with bad intentions and causes serious harm, he is known as a cracker and he is not a hacker, therefore, hacking and cracking are very different.&lt;/p&gt;

&lt;p&gt;In simple language, if someone hacks into the network to point out the flaws in the system, then it is called hacking.&lt;/p&gt;

&lt;p&gt;Even if a person breaks the system without permission, even then it is not considered invalid, because the main purpose behind this hacking is to point out security flaws so that they can be fixed.&lt;/p&gt;

&lt;p&gt;A cracker is a person who enters the system to steal or cause a loss. This is done with bad intentions, and in most cases, crackers leave malware in the system and create problems and steal information.&lt;/p&gt;

&lt;p&gt;Read more :) &lt;a href="https://www.oxipress.com/everything-about-hacking/"&gt;https://www.oxipress.com/everything-about-hacking/&lt;/a&gt;&lt;/p&gt;


</description>
      <category>whatishacking</category>
    </item>
    <item>
      <title>Everything about Hacking</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Mon, 17 Dec 2018 15:46:04 +0000</pubDate>
      <link>https://dev.to/moderndaytech/everything-about-hacking-1lj2</link>
      <guid>https://dev.to/moderndaytech/everything-about-hacking-1lj2</guid>
      <description>&lt;p&gt;Basic information has been given about hacking in this article. Regarding the world of hacking, people have many misconceptions and ideas, and now you are going to learn something about them.&lt;/p&gt;

&lt;p&gt;Hacking is a very complex activity, for which many skills and knowledge are required. This guide will give you a basic idea about what is hacking and how it can be done.&lt;/p&gt;

&lt;p&gt;There is no such information in this age of the internet that is now private, hanking can be useful. It is illegal in some cases but it depends on the way it is used.&lt;/p&gt;

&lt;p&gt;Hacking can only be beneficial when you can use it to make the world better. Whatever you do with the information provided in this guide, its final choice is completely up to you.&lt;/p&gt;

&lt;p&gt;Different types of hacking are possible. If someone has the required knowledge, he can easily hack someone’s laptop or mobile phone.&lt;/p&gt;

&lt;p&gt;If you want to satisfy your thirst for knowledge in connection with hacking, then this is the right song for you.&lt;/p&gt;

&lt;p&gt;Read more :)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;What is Hacking?&lt;/li&gt;
&lt;li&gt;Types of Hacking&lt;/li&gt;
&lt;li&gt;Types of Hackers&lt;/li&gt;
&lt;li&gt;Tools Required For Hacking
All above topics are here :) &lt;a href="https://www.oxipress.com/everything-about-hacking/"&gt;https://www.oxipress.com/everything-about-hacking/&lt;/a&gt;
&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>hacking</category>
      <category>hacker</category>
    </item>
    <item>
      <title>Types Of CyberCrime</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Mon, 17 Dec 2018 15:41:44 +0000</pubDate>
      <link>https://dev.to/moderndaytech/types-of-cybercrime-4fdk</link>
      <guid>https://dev.to/moderndaytech/types-of-cybercrime-4fdk</guid>
      <description>

&lt;p&gt;1) Hacking&lt;br&gt;
In simple words, hacking is a task in which hackers access your computer or server without your permission.&lt;/p&gt;

&lt;p&gt;Hackers (people who ‘hacking‘) are basically computer programmers who understand the computer’s advance and generally abuse this knowledge for a variety of reasons.&lt;/p&gt;

&lt;p&gt;They typically have expert-level skills in special software programs or languages. There may be many previous intentions of hacking, but the most common are – greed, fame, power etc.&lt;/p&gt;

&lt;p&gt;2) Theft of FTP Passwords&lt;br&gt;
This is another common way to tamper with websites. FTP password hackers took advantage of the fact that many webmasters store their login information on a well-protected PC.&lt;/p&gt;

&lt;p&gt;Hackers search Victim’s system for FTP login details, and then sends them to their remote computer. He then logs on to his website through his remote PC and modifies the web pages as they like.&lt;/p&gt;

&lt;p&gt;3) Virus dissemination&lt;br&gt;
Computer viruses are a program that infects a system or file. These tend to be broadcast by other networks on the network.&lt;/p&gt;

&lt;p&gt;They disrupt computer operations and affect store data – either modify it or delete it altogether.&lt;/p&gt;

&lt;p&gt;Unlike the virus, “Worms” does not need a host. They are still replicated when they do not eat all the available memory in the system.&lt;/p&gt;

&lt;p&gt;Computer viruses are typically spread through removable media or the Internet. A flash drive, CD-ROM, magnetic tape or other storage devices that are already infected with the virus. Along with this, email attachments, websites or infected software are also vulnerable to viruses.&lt;/p&gt;

&lt;p&gt;When a virus arrives on a PC, then it spreads on all PCs by the network. All computer viruses are due to direct or indirect economic damage.&lt;/p&gt;

&lt;p&gt;Based on this, two categories of viruses have been created:&lt;br&gt;
Which are only spreads and do not cause intentional damage.&lt;br&gt;
Those who are programmed to cause the loss.su_spacer]&lt;br&gt;
4) Logic bombs&lt;br&gt;
A logic bomb also called “slag code”, is a malicious code, which is deliberately inserted in software to excel the Málcio Task when triggered by a special event.&lt;/p&gt;

&lt;p&gt;It is not a virus, yet it usually behaves like a virus. It is secretly inserted into a program and it remains inactive until it has a specific condition. They become active in a specific condition.&lt;/p&gt;

&lt;p&gt;For example, the infamous “Friday the 13th” virus only attacked specific dates; It used to attack the day on which the 13th of the day came on Friday and slow the system down.&lt;/p&gt;

&lt;p&gt;5) Phishing&lt;br&gt;
Phishing is usually done by email spoofing. It looks like this email has come from your back but in fact, they are fake. Clicking the link contained in the user is taken to the fake website. Here, whatever information they fill, they go to hackers.&lt;/p&gt;

&lt;p&gt;Make sure to check whether it is safe before clicking any link included in the e-mail.&lt;/p&gt;

&lt;p&gt;Read more :) &lt;a href="https://www.oxipress.com/cyber-crime"&gt;https://www.oxipress.com/cyber-crime&lt;/a&gt;&lt;br&gt;
For Interesting Education Click Here :) &lt;a href="https://www.oxipress.com"&gt;https://www.oxipress.com&lt;/a&gt;&lt;br&gt;
Source :) &lt;a href="http://www.oxipress.com"&gt;www.oxipress.com&lt;/a&gt;&lt;/p&gt;


</description>
      <category>cybercrime</category>
    </item>
    <item>
      <title>Cyber Crime</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Mon, 17 Dec 2018 15:25:20 +0000</pubDate>
      <link>https://dev.to/moderndaytech/cyber-crime-1k4b</link>
      <guid>https://dev.to/moderndaytech/cyber-crime-1k4b</guid>
      <description>

&lt;p&gt;It includes everything from stealing millions of dollars from online bank accounts for downloading illegal music files.&lt;/p&gt;

&lt;p&gt;Cybercrime also involves transactions involving non-money transactions, such as spreading viruses on other computers or posting a private information of any business on the Internet.&lt;/p&gt;

&lt;p&gt;Cyber Criminals can use computer technology to access your personal information, to know the secret of the Bungee Trade or use the Internet for other malicious purposes.&lt;/p&gt;

&lt;p&gt;Criminals who do such illegal acts are often called hackers.&lt;/p&gt;

&lt;p&gt;Read more :) &lt;a href="https://www.oxipress.com/cyber-crime"&gt;https://www.oxipress.com/cyber-crime&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source :) &lt;a href="https://www.oxipress.com"&gt;https://www.oxipress.com&lt;/a&gt;&lt;/p&gt;


</description>
      <category>cybercrime</category>
      <category>hacking</category>
      <category>hacker</category>
    </item>
    <item>
      <title>How to Get a job at Google?</title>
      <dc:creator>Modern Day Technology</dc:creator>
      <pubDate>Mon, 17 Dec 2018 15:16:42 +0000</pubDate>
      <link>https://dev.to/moderndaytech/how-to-get-a-job-at-google-1528</link>
      <guid>https://dev.to/moderndaytech/how-to-get-a-job-at-google-1528</guid>
      <description>&lt;p&gt;Qualifications for Google Job&lt;/p&gt;

&lt;p&gt;You must have some special qualifications for a job at Google. Next, we are telling you the qualifications to work in Google:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The applicant should have full knowledge of the computer.&lt;/li&gt;
&lt;li&gt;It is important to have full knowledge of the English language.&lt;/li&gt;
&lt;li&gt;Mathematics should be practiced thoroughly.&lt;/li&gt;
&lt;li&gt;Applicant should be intelligent.&lt;/li&gt;
&lt;li&gt;The applicant’s reasoning should also be strong.&lt;/li&gt;
&lt;li&gt;IQ should be better.&lt;/li&gt;
&lt;li&gt;Educational qualification will be according to the job.&lt;/li&gt;
&lt;li&gt;Applicants should be mentally sound.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Read more with Google job Hack at home&lt;br&gt;
Click Here :) &lt;a href="https://www.oxipress.com/how-to-get-a-job-at-google/"&gt;https://www.oxipress.com/how-to-get-a-job-at-google/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Source :)&lt;a href="https://www.oxipress.com"&gt;https://www.oxipress.com&lt;/a&gt;&lt;/p&gt;

</description>
      <category>google</category>
    </item>
  </channel>
</rss>
