Posts

Showing posts from 2021

Explosion soon after the landing of Space X's starship rocket

Image
Explosion soon after the landing of Space X's starship rocket The prototype rocket Starship SN10, launched by Alan Musk's company SpaceX for testing, exploded shortly after landing. The rocket landed and exploded three minutes after takeoff in the skies of South Texas in the United States on Wednesday. SpaceX's SN10 rocket is the company's initial prototype of the StarShip Mars rocket. The rocket flew up to 6 miles. Speaking at an event, SpaceX engineer John Insprucker said he was happy that the SN10 had successfully landed on a landing pad for the first time, though he did not know what caused the explosion. SpaceX has built many such prototypes. The company says it will soon send the SN11 for another test. Alan Musk's Space X is part of an ambitious plan to establish a human settlement on Mars. The company is working on a variety of prototypes to find the right design for sending people to Mars. Recently, 143 satellites were launched simultaneously by SpaceX's

Another major cyberattack on America, tens of thousands of email server hacks

Image
Another major cyberattack on America, tens of thousands of email server hacks According to Krebs on Security, emails from 30,000 US government and business organizations have been hacked due to four vulnerabilities in Microsoft Exchange software. Wired has even published the news that tens of thousands of email servers have been hacked. Although Microsoft has patched the vulnerability, security experts told Krebson that much work is needed to identify and clean up the process. Thousands of organizations, including state and city governments, fire and police departments, school districts, financial institutions, and others, have been affected. According to Microsoft, the vulnerability (security vulnerability) allowed hackers to access email accounts and install malware that could later be accessed on those servers. According to Krebs and Wired, the attack was carried out by the Chinese hacking group Hafnium. Although Microsoft has not commented on the size of the cyber-attack, it has in

Now Brave Browser's own search engine to beat Google

Image
Now Brave Browser's own search engine to beat Google Google's grip has probably never been so strong. About 70 percent of the Chrome browser and 92 percent of the search engine market share show where Google is now. Google, one of the world's most powerful companies, has so much data and advertising revenue. It has become a big challenge for any company to enter the market to beat Google. But Google's monopoly and non-competitive practices seem to be undermining Google's dominance today. Google's new competitors want to take advantage of this bad side. Two years after the privacy-focused browser Brave went public, former Mozilla CEO Brendan Eich's eyes are now on Google's search business. Recently, he has challenged the dominance of Google search by announcing Brave search, another search engine of Brave browser. The waitlist, which has already opened a weight list, will be made public by mid-2021, Ich said. Brave Search says it will not track the people

Delivering goods from door to door using Google Plus code

Image
Delivering goods from door to door using Google Plus code The Google Plus code will be used in the postal service under the Ministry of Information and Communication Technology. For that, the Ministry has passed the Working Procedure, 2077 Procedure on the use of Google Plus Code for the distribution of postal goods. Pradyum Upadhyaya, head of Goshwara Post Office, says that the procedure related to Google Plus Card has been brought to provide quality service in line with information technology. Upadhyaya was transferred from the printing department to the Goshwara post office only two months ago. Under his leadership, plans have been put forward to make the postal service technology-friendly. According to Upadhyay, the use of Google Plus code has been started accordingly. He says, "Unorganized urbanization makes it impossible to deliver letters easily to the homes and offices of large settlements, so arrangements are being made to deliver them to the recipient's home or offic

20 Wrong Passwords Found on the Dark Web, Didn't You Have Somewhere?

Image
20 Wrong Passwords Found on the Dark Web, Didn't You Have Somewhere? With the widespread development and expansion of information technology, people have opened many kinds of online accounts. But people are still using old-fashioned passwords. Many people use their name, location, mobile number, and other passwords. They also ignore the tips given by experts. According to Verizon's 2017 data breach research, 81 percent of hacking incidents are caused by bad or weak passwords. Recently, a dark web monitoring company called ID Agent has studied 3 million passwords stored on the Dark Web by 2020. From this, he has given information about the common (shared) password used by many. 20 simple passwords found on the Dark Web Among the top 250 passwords found on the Dark Web, common passwords include serial numbers, names, games, and related words, celebrities, or characters. Here are the top 20 most used passwords: 123456 password 12345678 12341234 1asdasdasdasd Qwerty123 Password1 12

What is spectrum or frequency? This is easy to understand

Image
What is spectrum or frequency? This is easy to understand Although the term spectrum sounds unfamiliar to many and is very technical, most people are exposed to it every day. It has become a very important part of our daily lives. Of course, the question arises, what is the frequency? And how does it affect the lives of ordinary people? Frequency is something that cannot be seen with the naked eye. It is also called an electro magnetizing field. Whether it is remote, micro web, mobile, or radio, we are coming in contact with it every day through some means. Frequency or spectrum is the amount of radiation energy that surrounds the earth. The sun is the main source of electromagnetic radiation. It also receives energy from stars and galaxies. Apart from this, such energy is also generated from the radioactive elements that are buried under the ground. Some of the frequencies we call spectrum or radiation are very useful. Which does us no harm. Through which we can listen to the radio. W

India creating its own map as an alternative to Google Maps

Image
India creating its own map as an alternative to Google Maps India is planning to create a separate map as an alternative to Google Maps. For that, India's space agency has collaborated with 'Mapmai India'. The map may India is a tech company working on digital map data of India. India has launched another app as an alternative to Twitter and WhatsApp and is also preparing to build an alternative to Google Maps. India Space Researcher and Mapmai India informed about this project on Friday. He did not say when the service would be made public. However, the collaboration of the India Space Research Organization and Mapmai India on the project will make a significant contribution to India's mapping system. It is said to be much better and more informative than the currently available map. "It will always protect user privacy and provide the country's own mapping solution," said Rohan Burma, CEO of India Space Research Institute.

Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars

Image
Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars The value of Bitcoin has reached close to 50,000 dollars. On Monday, Bitcoin's price rise came to a halt as it approached its all-time high. On Sunday, Bitcoin hit an all-time high of $49,717.66. But in Asian trading hours, Bitcoin fell 5.6 percent to $45,914. Bitcoin rival cryptocurrency Etherium, meanwhile, was up 8 percent. Electric car maker Tesla Corporation has decided to invest $1.5 billion in Bitcoin and accept it as payment. At the same time, Bitcoin is gaining widespread legitimacy. Bitcoin has gained 20 percent this week. In one year, it has increased by 60 percent. Its price fell sharply last March. Chris Weston, the chief researcher at Melbourne Brokerage Paperstone, says its value continues to rise as big players in the financial sector make net investments. In addition to Tesla, Bank of NY Mellon announced last week that it would build new units to help its clients buy and trade

Here's how to protect your pen drive without a password

Image
Here's how to protect your pen drive without a password  Pen drives are very useful and necessary for storing all types of digital data. We usually keep all kinds of information in it, whether it is our personal or official content. We are saving it by putting it in a pen drive. But when we use such a Pendrive on a computer or laptop or hard disk, its security is compromised. Of course, you can lock your pen drive to prevent your personal or official data from being seen by others. This will keep the data on your pen drive safe and no one else will be able to open the data on your pen drive without your permission. No software or application is required to set the password on the pen drive. Today we are going to tell you how to put passwords on a USB drive or pen drive. It is very easy to put the password in the pen drive. For that, first of all, you have to put your pen drive on your computer. Then go to your drive on the computer and right-click and select Turn on BitLocker. Now

'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal

Image
'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal An ethical hacker (researcher) has recently demonstrated a novel supply chain attack. Accordingly, the systems of more than 35 big technology companies like Microsoft, Apple, PayPal, Sophie, Netflix, Tesla, Uber have been breached. Novell Supply Chain Attack exploits public and open-source developer tools. The system, developed by ethical hacker and cybersecurity researcher Alex Birsan, injects malicious code into an open-source developer tool to exploit the dependencies of those organizations' internal applications. It could target developers' projects using public depositories such as GitHub. According to Birsan, the success rate of such attacks is high after the companies have been targeted. The vulnerabilities he has exploited so far, which he calls 'Dependency Confusion', have been found in more than 35 organizations. These were in Python, Ruby, and Java programming languages.

Online data of all Brazilian citizens leaked

Image
Online data of all Brazilian citizens leaked Data on all Brazilian citizens have been leaked online. The Brazilian Consumer Protection Agency has instructed the government to immediately protect citizens' data. The institute has also directed to take necessary steps for data security immediately. The data leak occurred last week, with data on 223 million Brazilians leaked. In a country with a total population of 221 million, the question of how 223 million data can be leaked may arise in your mind. It is also mentioned that there is information about the person who died earlier in the incident. Besides, data of 104 million vehicles in the incident has also been made public. The data thus made public includes the name of the person, identity card number, marital status, name of the father, mother, and son, and daughter, complete information of the house, credit score, voter registration number, profession, and other details. The person's LinkedIn profile has also been leaked. It

Starting coding? Find out about Python

Image
Starting coding? Find out about Python Python is now a popular programming language, used across a wide range of artificial intelligence. In this age of digital transformation, the demand for manpower capable of designing applications is high. So today we are going to tell you about the important information needed for those who want to make a career from Python language such as salary, programming application, courses to be studied, developer's feelings. Python: Always popular TIOBE publishes its top popular programming languages ​​each month. It updates the ranking of long-trending languages ​​in the evolving landscape of programming languages. According to TIOBE's January rankings, Python was the top popular programming language of the year. This is the fourth time Python has received such an honor. In 2020, Python achieved a rate of 2.01 percent, compared to 1.99 percent and 1.66 percent of the other popular programming languages ​​C ++ and C, respectively. In TIOBE's F

Here's how to put one together for use with a quantum computer

Image
Here's how to put one together for use with a quantum computer Many of you may have heard of supercomputers. But have you ever heard of a quantum computer? If some have heard this word somewhere then you are lucky. Because you have the good fortune to listen to the modern technology of the modern age. Today we will tell you what a quantum computer is and how it works. To understand a quantum computer, first remove all the elements inside the computer such as a keyboard, mouse, motherboard, hard drive, RAM, graphics card. And look at the things that have helped make your computer a computer. Whether it's a computer or a mobile phone, the processor is what makes your device so smart today. The smallest element in that processor is the transistor, whose particles combine to form a single processor. The transistor acts as a switch to turn the current on and off. There are billions upon billions of such switches inside a computer. Once you get all those switches, you can perform all

What is quantum internet and how is data transferred from it?

Image
What is quantum internet and how is data transferred from it? Quantum Internet begins where the capacity of our normal computer or Internet is limited. For example, today's computers have a processor based on seven-nanometer lithography. After a while, it decreases to five, three to two. Then it is difficult to reduce the size. Because the size of the transistor inside the processor is about the size of an atom. Then our internet is transferred to the quantum world. Where our normal physics don't work. Quantum computers are born to meet the limitations of ordinary computers. It has high cybersecurity. Because it is transferred to the superposition. With the advent of a quantum internet, you don't have to use encryption like you do now. The speed of quantum internet is much faster than the normal internet we use. According to scientists, its data transfer rate is one GB per second. Quantum Internet was discovered by Chinese scientists. When two places with a distance of 40 k

Facebook is bringing a smartwatch under its own brand to challenge Apple

Image
Facebook is bringing a smartwatch under its own brand to challenge Apple Social media giant Facebook is going to bring a smartwatch. The information company has written the news saying that the company is going to bring a smartwatch with health and massage features. The company has not yet named the product. But it will support Google's Android operating system. As Facebook develops its own operating system, Google will no longer have to rely on second-generation smartwatches. Meanwhile, many may be interested in what the smartwatch that Facebook will bring. According to sources, the service of this smartwatch will be integrated with the apps of the company including Facebook, Facebook Messenger, Instagram, and WhatsApp. It is also said to support cellular connectivity, which allows you to send and read messages without a smartphone. In addition to the messaging feature, the smartwatch will also include a fitness feature. For this, smartwatches will be connected with the hardware a

When a bug is found, the hacker earns about Rs 175 million

Image
When a bug is found, the hacker earns about Rs 175 million A white-hat hacker (cybersecurity researcher) has received the biggest bug bounty award ever. On February 3, Armor Fi paid a white-hat hacker named Alexander Slindwine 1.5 million, or about  175 million, for finding a sensitive bug in his smart contract. Alexander discovered the bug before going to the insurance brokerage platform Armor Fi Live. If the bug had been left unchecked, it would have allowed a bad character with a dollar coverage to steal the entire Armor Fi underwriting contract. The company has since provided 1 million armor tokens to Alexander. At the time of the announcement of the Bounty Reward, one million tokens were worth 700,000. But as news of the new bug bounty and security patch spread, public confidence in the platform increased, pushing the price of the token by 1.58. At the same time, the total value of Alexander's token has reached 1.5 million dollars. Which has made this bounty the biggest bounty

WhatsApp's downward journey continues, Telegram became the number one app of January

Image
WhatsApp's downward journey continues, Telegram became the number one app of January With the issuance of new privacy terms and policies, the number of WhatsApp users has been declining. The company's new policy of sharing user data with Facebook has led users to look for alternatives to WhatsApp. Meanwhile, data analysis company Sensor Tower has released a new report. According to this, Telegram has risen to number one in the most downloaded app (non-gaming) in January. According to a report released by Censor Tower in December 2020, Telegram was ranked ninth on the list. However, in a period of one month, Telegram has become the first to surpass all. WhatsApp, which was previously in third place, has dropped two places to fifth. The ticket, which was number one till last month, is number two in January. Similarly, the signal is in third place. Instagram, which was previously in the fourth position, has reached the sixth position this time. According to the study report, Teleg

At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately

Image
At the risk of all Google Chrome users' data, Google's request to update to the latest version immediately Cybersecurity researchers have found a major flaw in Google Chrome. Researchers have been working to make the actual transcript of this statement available online. In this bug, hackers can easily access the device by placing a remote code on the user's device through Chrome. The process is also straightforward, and once a hacker gains access to a device, he or she can take full control of the device. Google has released a new version to address the problem of hackers accessing the device. On January 24, Google became aware of this vulnerability. The company unveiled a new version on February 4 with a solution to the problem. As soon as the new version is released, the company asks Google Chrome users to update immediately. Google did not say how many users were affected. However, the company said that this weakness is a big problem for users and requested to update the

To combat abuse, Wikipedia has released a new code of conduct

Image
To combat abuse, Wikipedia has released a new code of conduct Wikipedia, also known as an online vocabulary, has released a new code of conduct to combat abuse and harassment. The company has issued a code of conduct to combat abuse while maintaining diversity, inclusion, and accessibility for its volunteers. The new code is based on other Wikipedia projects like Crowdsource. In which 15 hundred volunteers have helped. Easy, short and clear to the user, the code of conduct is 1600 words. Which is divided into two parts. One of which is the positive behavior expected from users, editors, and Wikipedia staff. In which there is mutual respect, creative editing, the language used when calling other volunteers. They are also encouraged to help each other in the project. The second is unacceptable behavior, which the company discourages. In which the use of insulting, sexually abusive, threatening language has been discouraged. Wikipedia mainly prohibits content that intimidates, offends, in

A computer chip will be placed in the human brain this year

Image
A computer chip will be placed in the human brain this year Alan Musk, the owner of a company like SpaceX and Tesla, said that a computer chip would be made and implanted in the human brain within a year. This means that the person's brain will now be directly connected to the computer through the chip. Alan Musk founded Neurolink in 2016. Joe is working on creating an ultra-high brain-machine interface. In Joe Rogan's podcast show, Alan Musk chips a human brain into a robot. According to him, this technology will be ready in 25 years as a complete brain interface. Alan Musk believes that to prevent artificial intelligence from dominating people, it is necessary to connect people's minds to computers. The musk will extract a piece from the human brain. Electrodes will be placed inside the brain through the robot and the device will be placed in the hole. The mask will leave a small scar on the upper part of the brain. Neurolink is involved in creating a 'thread' tha

Don't make such mistakes when posting photos on social media

Image
Don't make such mistakes when posting photos on social media Nowadays, posting photos on social media is a hobby of almost all users. Some users find it more interesting to upload a photo than to write something. Another truth is that there are more likes and comments when you post a photo than when you write something on social media. But very few users know that many times when uploading a photo on a social network, they are unknowingly making a big mistake. Due to which you have to regret for some time. Today we are telling you about the mistake that can happen when uploading a photo on social media. Do's and don'ts of photo sharing? Every time you upload a photo, keep in mind who is with you in the photo. In the photos you post on social media, people are watching not only you but also the background of your photo and the people around you. Sometimes you even post photos of your food items on social media. So there is no danger from such photos. But such photos reveal t

Know these things before selling an old phone

Image
Know these things before selling an old phone Often users only take out their SIM and memory card before selling their old phone. But they are forgetting to logout of their important ID. Which poses a threat to their confidential data. If you are also thinking of selling your old mobile phone, today we are going to tell you some useful things. This will prevent your personal information from being leaked. Factory reset Don't forget to do a factory reset before selling your mobile. This will delete all the data on your mobile. Also, all the IDs from Google to Instagram will be logged out. Go to phone settings to perform a factory reset. There you will see the backup and reset option. Tap on it. After doing so, the phone will be factory reset. Don't miss out on backups Make a backup of your important data before making a mobile sale. Your data will not be deleted or leaked for any reason. To set up a backup, go to the settings of the most mobile and select the backup option. Your

Now you can watch movies with a timer on Netflix

Image
Now you can watch movies with a timer on Netflix  Video streaming platform Netflix is ​​testing a new feature. Which allows users to watch their favorite shows and movies with a timer. This feature is currently available for testing among some Android users. The company is testing a new feature with a plan to further refine the user's video viewing experience. According to the company, this feature is currently being tested only among adult profile users. However, based on the feedback from there, it will also be made available in the Kids profile. According to a company spokesperson, it will be used worldwide after testing. The company believes that it will give a new look to the user's video viewing experience. This will save the user from the hassle of watching Netflix at night, especially at night, or by not knowing how much time it is.

90 companies including Huawei and Xiaomi are building their own semiconductor in China

Image
90 companies including Huawei and Xiaomi are building their own semiconductor in China Ninety companies including Chinese companies Huawei, High Silicon, and Xiaomi are planning to build their own semiconductor in China. According to China's Ministry of Industry and Information Technology, 90 companies have applied for the National Integrated Circuit Standardization Technology Committee. The semiconductor industry is the most backward industry in China. Where small and technology lagging companies are now investing. Therefore, 90 companies including Huawei, Xiaomi, High Silicon, Datang Semiconductor, Unichip Micro Electronics, ZTE, China Unicom, China Mobile, and Tencent are ready to work together. The purpose of forming this committee is to uplift the backward semiconductor industry and promote the integrated recognition of circuits. It is said that the plan has been put forward with the plan to reduce the dilemma of the American company in the same conductor. The United States ha

Is Time Travel Possible?

Image
Is Time Travel Possible? You may think that time travel is an ancient concept. It may be mentioned in Greek myths and Shakespeare's plays. But nothing like that. In fact, it was first mentioned by H. G. Wells in 1895 in his novel The Time Machine. Science and technology researcher James Glick has written a book on time travel called Time Travel and History. H. G. Wells' book sold well. The discussion got the same. Images such as meeting historical figures from the time machine in the past, correcting mistakes were included in the book. Is time travel possible as it is described in books and movies? James Glick says, ‘If you look at all the books that have been written about this, the concept of time travel is mentioned in those books as fantasy. Maybe it's a psychological fact, if you ask the hundreds of people working on it about it, they won't rule it out. ' Speed ​​of time Curtin University astronomer. Natasha Hurley-Walker says, "According to any science fi

Data leaks of nearly 2.3 million users of dating apps

Image
Data leaks of nearly 2.3 million users of dating apps The data of millions of users of the popular dating site Mitmindful has been leaked on the internet. A notorious hacker has recently leaked sensitive data of 2.28 million users of the site's mobile app. The hackers have shared the data of the dating site for free download on the hacking forum so that the public can access it. The 1.2 GB size data was in the site's user database. The leaked data contains all the details that the user has to keep before signing up for the web and app version of the site. These include real name, email address, address and zip details, physical details, marital status, date of birth, IP address, cryptocurrency account password, Facebook user ID, Facebook authentication token, etc. But the leaked file does not contain the message exchanged between the users. However, security experts have been warned not to ignore the incident. The Mitmindful site has not yet commented. A well-known black hat ha

The reality of Bernie Sanders' viral picture

Image
The reality of Bernie Sanders' viral picture Biden was sworn in as the 46th president of the United States on Wednesday. Independent Senator Bernie Sanders of Vermont was also present at the ceremony. Sanders, wearing a face mask and gloves, was photographed by senior American photographer Brendan Smyaloski at the ceremony. The image has now gone viral, drawing the attention of Americans. This seemingly normal picture is creating a kind of wave in the world of the internet. Photographer Brendan didn't even bother to create creative mimes around the world. Brendan, who works for the global news agency AFP, is a photojournalist for the Political Bureau. Sanders' posture in the photo of Brendan makes him look happy during the event. "It's not a great picture, it's a beautiful moment," he said. Rob Lidon, a journalist at Square Media, says the picture is no more than an important document in American political history. Brendan captured the image on his camera

European Parliament interrogation of Facebook, Amazon, Apple and Google

Image
European Parliament interrogation of Facebook, Amazon, Apple, and Google The world's largest technology companies, including Amazon, Apple, Facebook, and Google, have come under scrutiny from European Union (EU) lawmakers. The hearing is set to take place on February 1 at the EU headquarters in Brussels. Where the CEOs of the mentioned technology companies have been invited. Currently, American companies dominate the technology world. The hearing is being held with a plan to break the dominance. Europe has put forward a new European Commission proposal to create an environment of healthy competition among technology companies and to control fake news and harmful content spread online. The European Parliament is due to give its opinion on the proposal by next month. The European Parliament is set to question the CEO of the technology giant for the same opinion. The letter sent by the parliament to the CEOs states that they understand the current business model of the company and its