Kanyadaan, meaning giving away a daughter. For most of you who don’t know what Kanyadaan is, here it is, in simple words. Kanya means Woman and Daan means Donation.

A ritual of stupidity!?

Kanyadaan is a ritual, a tradition that is being followed since ages. I ask why does this ritual even exist?
Sometimes, I feel like, in the name of marriage, a daughter is sold forever. But a father doesn’t want to donate his daughter. He ties her into the relationship of love & respect with her better half. It shouldn’t be about bidding goodbye to the daughters, instead, it should be a happy moment, as it is said: “shaadi do logo ki nahi, do parivaar ko hoti hai.”

That means everything gets double now, it’s a double offer – two families, two addresses and lots of happiness. Then why the ritual of “Kanyadaan”? I don’t believe in such ritual because women are not objects & marriage is not a charity. Objectifying women has not been rare, and making her a gift is nothing to be surprised of as well. But what surprises me is the fact that this ritual is still in practice, unquestioned.

The world has evolved!

Times have changed, women are getting educated, achieving their dreams, contributing to family finances, taking care of their parents and fulfilling many other responsibilities. Then what is the logic behind still continuing with the rituals like Kanyadaan? I believe, a ritual is just a matter of time and with time rituals should change as well. The ideology of carrying them through generations makes no sense because when we evolve through generations, it means our ideologies should evolve too.

I understand that there is respect towards traditions, no matter how much we grow in life. But if the tradition lacks the logic then why should we follow it. There were also rituals like Sati Sahagamanam which asked women to burn in the fire of her man’s pyre in the death funeral. Out of people’s stupidity, for many eras, it was considered a tradition. But with time, people like Raja Ram Mohan Roy fought against such foolish rituals. I guess, he was that age’s feminist! And eventually, in British rule, they banned this ritual. In the same way, we should be able to understand the traditions that involve stupidity and fight against them.

Fight for yourselves!

Questioning and shunning these rituals will serve a very strong purpose of taking away the religious and moral sanctions that come in the way of providing ourselves with the social settings that we know are logical and justified.

I strongly believe, and urge every girl who finds herself out of her traditional roles, who sees herself at par with males, that she must question these kinds of rituals, “Kanyadaan” in particular. Because no one will come and fight for such things, you should do it for yourself. There are more pressing matters to address and fight for one. With evolving generations, we should understand that it is high time to stand up for ourselves rather than expecting someone else to do so.

We have seen in many movies, or web-series a hacker is wearing hoodies, typing fast on a computer with random codes appearing in different colours, and a lot of enthusiasm and can-do attitude on actors faces. But in real life do they look in the same way? Do they keep typing that fast to hack anything? Let us find out.

Starting with the appearance, a hacker need not wear a hoodie, have a dark make up etc. They look like normal people with normal clothes and stuff. They don’t live dark rooms or remain isolated and move freely in society and have regular interactions with people.

Coming to the actual hacking, you need not type lines and lines of codes to hack anything. The process is not that complicated, and there are pre-built software’s that do most of the job. To understand more on this we need to know how is hacking done actually.

Before that, we need to know what are the types of hackers. Not all hackers are bad guys; some hackers protect many businesses from hacking and malware attacks. Primarily there are three types of hackers.

  1. Black Hat Hackers.
  2. White Hat Hackers.
  3. Grey Hat hackers.
  1. Black Hat Hackers: These are bad guys in the hacking world, they enter the systems without authorization. They introduce malicious files and destroy the system files. They are criminals, they steal the data, lock your systems, infect it and demand money to release it. The money is generally digital currency like bitcoin. They do this for financial gains or fun. The black hat hackers are a threat to data security in the world.
  2. White Hat Hackers: These are certified hackers, who work for the government and other business organisations. They do testing of the data and find loopholes and act as defenders to protect the data from black hat hackers. Therefore, they can be considered as the opposite of black hat hackers. They are also known as “Ethical hackers” or “Cybersecurity experts.”
  3. Grey Hat Hackers: These fall between black hat and white hat hackers. Generally, grey hat hackers find the system vulnerabilities and report it to the system administrator. Usually, they ask a small fee to fix it. The system administrator might accept or report it. If reported, they come under the black hat because they entered the system without the permission of the administrator.

We have learnt the primary type of hackers and their roles, now let us try to learn the type of hacking techniques generally used. There are 9 of them.

  1. Bait & Switch: As the name suggests, hackers use some deal price or a widget of a browser widget to hack. When you click on these links, it will redirect to another website which has a booby trap. When you enter that website and download anything or enter your details, they will be hacked.
  2.  Cookie Theft: Cookies theft mainly happens when we use unverified browser widgets. Cookies have a lot of information about internet footprint and usage. Cookies are plain or encrypted based on the website; secure websites use encrypted cookies for data privacy. When the widget is the booby trap, it scans cookies and sends it to the attacker.
  3.  Denial of Service/Distributed Denial of Service (DoS/DDoS): This is a very classic technique to bring down systems or websites. The hackers use bots as traffic and hit a website with that; the traffic is overwhelming that it makes the website inoperable. Therefore, this exposes a vulnerability on the website, and the hackers can infect it with malicious files.
  4. Eavesdropping: This is a technique used by hackers to hack a conversation between two parties and get as much information as possible. Hackers use tools to hack messages, calls or any digital conversation and get as much information as possible to hack.
  5.  Keylogging: The hackers install a software or a tool on the system, the tool records everything you type using your keyboard, and the information is sent to the hacker. Therefore, the hacker gets all information you type this can include passwords and other important stuff. Thus, they have all the information they need to hack.
  6. Malware: The hackers use some sort of software to introduce malware into your system. For example, you might have seen many a download links on a few websites. If you accidentally click on the wrong link, a software which is infected will be downloaded and the hackers get access to your system.
  7. Phishing: This attack uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need. For example, you might receive an email notification that it is your bank and they want you to log in. As soon as you open the link it looks that the website is of your bank. Once you enter your login information, it directly goes to the hacker and your bank account is hacked.
  8. Watering Hole and WAP Attacks: In this, the hacker uses an open WIFI connection to lure in the users, as soon as you connect and start using it, the entire internet session you have used will be with the hacker.
  9. “Man in the Middle” (or “MITM”) Attack: It is a bit similar to eavesdropping, but in this technique the hackers have an option to be the middle man between the sender and receiver. Therefore the hacker can modify or even the destroy the data, this attack happens when we use a unauthenticated website for communications.

We have learnt the types of hackers and methods they use to hack. Now let us learn on how to save ourselves from cyberattacks.You can follow these steps to save yourselves from cyberattacks.

  • Never use or give your information on an unsecured website.
  • Never open malicious emails.
  • Don’t download malicious software’s.
  • Never share your passwords via digital medium unless it is an emergency.
  • Never connect to public open WI-FI.
  • Don’t log in on an unsecured website.
  • Never use non-secure widgets.
  • Update your system and servers regularly as the developers release patches to defend against attacks.

If we follow the above steps we are very safe from being attacked or infected from any malware.

What has happened to our eye?
Are we actually even seeing?;
When we can’t really see what’s going on in our country?

Our rights, our power, our money
But looks like we too are politician’s bunnies;
Our wrong electoral choices;
Rapes, murders are the consequences.

What has happened to our voice?
Has money blinded our morals & principles?
That being ignorant has become so integral.

‘India is my country,
All Indians are my brothers & sisters’
Every person once in their lifetime has pledged this.
So why do our words & actions not coexist?

What has happened to our ear?
For we can’t even listen to;
The shrieks & cry of India’s daughters.

How many times will we keep proving;
That humanity means nothing;
For money has now become everything.

What has happened to the sense of our senses?
For not only girls, even animals fear any touch;
Is this the future India had promised us?
Is this why the legends fought for years for our freedom?
Was this all?

Wake up, Indians!
And for once wake your senses!
See & listen clearly;
For our voices are our weapons towards what wrong;
If everyone’s going wait to wake up till it’s all over;
Any good excepted will be long gone;
Even before you wake up to yawn!

Skip to toolbar