Bir kun keladiki, o'shanda hamma ismingni ijtimoiy tarmoqdan qidiradi, ammo buni o'rniga "tarmoqda emas" yoki "bog'lanib bo'lmayapti" yozuvlar chiqadi. Do'stlaring kelishingni kutadi, sen esa ularning oldiga kira olmaysan. Telefoningga maktublar (smslar) jo'natadilar, sen esa ularga javob qaytara olmaysan. Tarmoqga ulanishingni kutadilar, sen kira olmaysan. Qaysi aloqa vositasidan qidirishmasin sen bilan bog'lana olishmaydi. "Tarmoqda emas", "bog'lanib bo'lmayapti"... U kunda ular bilan aloqaga kirishishing yakuniga yetgan bo'ladi.. Chunki sen dunyodan o'tgan bo'lasan...
Bir kun keladiki, o'shanda hamma ismingni ijtimoiy tarmoqdan qidiradi, ammo buni o'rniga "tarmoqda emas" yoki "bog'lanib bo'lmayapti" yozuvlar chiqadi. Do'stlaring kelishingni kutadi, sen esa ularning oldiga kira olmaysan. Telefoningga maktublar (smslar) jo'natadilar, sen esa ularga javob qaytara olmaysan. Tarmoqga ulanishingni kutadilar, sen kira olmaysan. Qaysi aloqa vositasidan qidirishmasin sen bilan bog'lana olishmaydi. "Tarmoqda emas", "bog'lanib bo'lmayapti"... U kunda ular bilan aloqaga kirishishing yakuniga yetgan bo'ladi.. Chunki sen dunyodan o'tgan bo'lasan...
BY notes
Warning: Undefined variable $i in /var/www/tg-me/post.php on line 283
However, analysts are positive on the stock now. “We have seen a huge downside movement in the stock due to the central electricity regulatory commission’s (CERC) order that seems to be negative from 2014-15 onwards but we cannot take a linear negative view on the stock and further downside movement on the stock is unlikely. Currently stock is underpriced. Investors can bet on it for a longer horizon," said Vivek Gupta, director research at CapitalVia Global Research.
Why Telegram?
Telegram has no known backdoors and, even though it is come in for criticism for using proprietary encryption methods instead of open-source ones, those have yet to be compromised. While no messaging app can guarantee a 100% impermeable defense against determined attackers, Telegram is vulnerabilities are few and either theoretical or based on spoof files fooling users into actively enabling an attack.