tag:blogger.com,1999:blog-75581505767672096232024-03-09T18:48:27.921-08:00Artificial Intelligence Future"Books don’t need batteries." - Ranjit ShresthaRANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.comBlogger712125tag:blogger.com,1999:blog-7558150576767209623.post-65716047533551415432024-03-04T23:08:00.000-08:002024-03-04T23:08:24.009-08:00 Isn't someone spying on you by hacking your mobile phone? Check it out like this<h2 style="text-align: justify;"> Isn't someone spying on you by hacking your mobile phone? Check it out like this</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In the current era of internet, the incidents of mobile phone hacking are increasing day by day. In addition, technology has started to be used in every field, due to which the risk of being targeted by hackers has also increased due to the fact that mobile phones are used for various purposes.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://vpnoverview.com/wp-content/uploads/how-to-check-if-your-phone-is-being-spied-on-featured.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="800" data-original-width="1600" height="320" src="https://vpnoverview.com/wp-content/uploads/how-to-check-if-your-phone-is-being-spied-on-featured.png" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this case, your mobile is a hacker and no one is monitoring it? Today we are telling you about some of the signs that appear when a mobile is hacked, based on which you will be able to know to some extent whether your phone has been hacked or not.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1. Battery discharging abnormally</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If your phone's battery drains or runs out quickly, it can also be a sign that the phone has been hacked. Because the phone's battery may have been consumed more due to the spying app running in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So it is important to pay attention to the battery of the phone. You need to keep the details of the apps on your phone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2. Unwanted app appearing on mobile</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You should also pay attention to the apps on your mobile. So that you can make sure that there is no app downloaded on your phone without your permission.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you find a new app on the phone that you haven't downloaded, it can also be a reason for hacking. Spyware software may be hidden in such unknown apps.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3. Mobile overheating unnecessarily</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Spy apps usually track the location of the mobile in real time. GPS system is used for this.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this case, your phone's hardware is unnecessarily stressed. Due to this, the problem of overheating of the mobile phone occurs.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4. Increase data consumption</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If someone is tracking your phone then your mobile may consume more data than usual. So, if the data consumption on your mobile has suddenly increased in an unnatural way, be careful.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">5. Malfunction in mobile</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When the phone is hacked, it may show problems like screen flashing, automatic phone setting changes or the phone not working.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">6. Hearing noises in the background while talking</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some spy apps even record phone calls. So, be careful when you hear some kind of noise in the background while you are calling. Because this is also a sign of hacking.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">7. Unnatural browsing behavior</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You should also check your browsing and social media activity logs from time to time. From this, it can be identified if a website has been used to download a tracking or spying app on the mobile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Also, if you see unnecessary messages on social media, or messages that you have not liked, commented, shared, or sent, it can become a clear basis for hacking.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">8. Phone slowing down abnormally</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The entire processing power of the hacked phone may be being consumed by the applications kept by the hacker. Because of which your phone may be slow.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If the phone freezes or freezes unnecessarily, caches and restarts unexpectedly, it can also be a sign of hacking.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">9. Logging of unknown calls or messages</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The hacker may have tapped your phone with the help of SMS Trojan. Be alert if you see any unusual or unknown call or SMS logs on your phone.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-77100510651978661902024-03-04T22:53:00.000-08:002024-03-04T22:53:14.530-08:00 Are you worried about apps running in the background of your phone? Do this<h2 style="text-align: justify;"> Are you worried about apps running in the background of your phone? Do this</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some apps are running in the background of your Android phone. Not all apps should run in the background. Due to such apps, the phone's battery drains quickly, data is consumed more, and the phone runs slowly.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://signal.avg.com/hs-fs/hubfs/Blog_Content/Avg/Signal/AVG%20Signal%20Images/What%20is%20background%20data%20and%20how%20to%20restrict%20it%20(Signal)/img_09.png?width=750&name=img_09.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="666" data-original-width="750" height="568" src="https://signal.avg.com/hs-fs/hubfs/Blog_Content/Avg/Signal/AVG%20Signal%20Images/What%20is%20background%20data%20and%20how%20to%20restrict%20it%20(Signal)/img_09.png?width=750&name=img_09.png" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to know which apps are running in the background?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The developer options of the phone contain most of the hidden features of the device. In the same developer option, there is a menu named 'Running Services'. From that option, you can see how much RAM is being used by which apps in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Follow the below procedure for that:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First of all go to the settings app of the device.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then scroll and tap on the 'About Phone' option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then go to the option called Software Information.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- After that, tap seven times on the build number. After this enable developer option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- And put the pin or pattern of the device. Then there is a message saying 'You're now a developer'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then again go to Settings app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First, there is a 'Developer Option' below the 'About Phone' option. Tap on that option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- And go to the option of 'Running Services' by scrolling. After going to that option, you can see how much memory has been used by which app or service.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There you can see how much memory is being used by which apps. Also, you can see which app has consumed how much battery by going to the battery usage option in the settings. Follow the below procedure for that:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First go to Settings option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- And go to battery options.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then you can see what percentage or how much battery has been consumed by which app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What to do to prevent the Android app from running in the background?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There are many ways to prevent apps from running in the background. You can automatically prevent apps from running in the background or stop them from running in the background immediately or make them run only when needed. Various methods to be adopted for that are discussed below.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Force stop</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you don't want any app to run in the background, you have to force stop it. Follow the below procedure for that:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1) Go to Settings.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2) Then tap on the Apps option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3) Select the app you want to stop running in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4) Then tap on Force Stop option and press OK button.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After doing this, the app will immediately stop running in the background. The next time you open the app, it will start running again in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to stop the app from consuming unnecessary battery!</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If an app is consuming unnecessary battery in the background on your Android phone, you can reduce it. For that, Android has a 'Restrict Battery Usage' option. Follow the below procedure to enable that option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First go to Settings app and select Apps option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- And choose the app you want to stop running in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then tap on Battery option. And, select the Restricted option. After doing this, the app will not consume battery in the background.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Enable the Adaptive Battery feature</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The adaptive battery feature in Android uses Google's DeepMind AI. Due to this, data is collected about how you use which app at what time. When this happens, the system deactivates the app when you are not using it. After enabling this option, you don't need to force stop the app repeatedly. Follow the below procedure for that.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First go to the Settings app and select the battery option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- And tap on the option of 'Battery Usage limits'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then tap on the three dots on the top right. And, go to the Adaptive Battery option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Turn it on.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this way, you can reduce the battery and memory consumed by apps on your Android phone. It is best to remove apps that are inactive for a long time. However, sometimes apps that are inactive for a long time can be important for you. So these things should be taken care of.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-79209984039561062362024-01-20T23:41:00.000-08:002024-01-20T23:41:03.849-08:00 Open AI brings Zipty Store, millions of chatbots will be available in one store<h2 style="text-align: justify;"> Open AI brings Zipty Store, millions of chatbots will be available in one store</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Open AI, the maker of Chat Gpity, has launched its first online store.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In the online store, users will also be able to share their customized version of Chat Gpity.</p><p style="text-align: justify;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://techstrong.ai/wp-content/uploads/2023/05/OpenAI.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="330" data-original-width="770" height="274" src="https://techstrong.ai/wp-content/uploads/2023/05/OpenAI.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Open AI's online store was supposed to be launched last year. However, due to the commotion at the level of the CEO of the company, the launch date of the online store was pushed.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, Open AI's online store can only be used by users of the paid version of Chat GPT. The paid version of Chat Zipty has various advanced features which are not available in the free version. In the paid version of Chat Zipty, users can also solve math questions. In addition, this version can also tell colorful cocktail recipes.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Open AI's online store is named Zipty Store. In this store, users can share any of their chatbots publicly. This means that Open AI has created a store where you can earn money by publishing your chatbots. It is very similar to Apple's App Store and Google's Play Store.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apart from this, users can see different types of chatbots in the Zipty Store and can also download them from there. According to Open AI, around 3 billion customized chatbots have been prepared so far. However, no information has been given about how many chatbots there are currently in the Zipty store.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Where is your Gmail login? Find out this way</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Do you want to know your Gmail login history? If you suspect that someone else has logged into your Gmail account or if you forgot to log out by using Gmail on another device, then you need to know where your Gmail account is logged in to eliminate that suspicion. There are 5 ways to do this:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1. Using Google Account Settings</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Google has given the user the facility to easily see which device their account is logged into.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">By looking at the list of devices with your Gmail login, you can find out if there are any unknown or suspicious devices. It helps you to know the login history of Gmail. For this:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Go to any browser on your computer or phone, open myaccount.google.com and login to your account</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">– Click on the Security option at the top if on the phone and on the left side if on the computer</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then scroll down and click on the Manage all devices option on the Your device tab</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then you will be able to see the list of all types of devices with your Google account login.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- If any of the devices you think is suspicious or not yours, click on it and see its details.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- If you are sure that the device is not yours, click on the Sign Out option. Then don't forget to change your Google account password.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">(Note: You can also directly log in to the https://myaccount.google.com/device-activity?pli=1 website to view your Gmail login device information instantly.)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2. Using Gmail's Activity Information feature</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature of Gmail allows the user to view the login history of the Gmail account. But this feature is not available on smartphones and can only be used on computers. For this:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Login to your Gmail account in any browser on your computer</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then scroll down the screen where the email list of Gmail inbox appears and go to the bottom and click on the Details option at the bottom right side.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then a new window will open where there will be a detailed description of recent Gmail activity. You can see the details like IP address, the details of how you have logged in to Gmail, the time you have logged in.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3. See which websites and apps are using your Gmail account</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Many times we have signed into websites and apps using our Gmail account. But after using that app or site, we forget that we have our Gmail login in it. To find out about third-party apps signed in using your Google Account, complete these steps:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Go to your computer or mobile phone browser and open myaccount.google.com/ and login to your Google Account</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then click on the Security option that appears on the left side of the computer screen and at the top of the mobile screen</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then scroll down and click on Signing in with Google</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- There you can see the details of the apps and services that have access to your Google account. You can also see the details of the apps and sites that can be signed in from the Google account.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4. See Gmail Activity</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Google tracks all activities on the user's account through the web and app activity feature. By activating this feature, you can know all the recent activities of your Gmail account. For this:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Open myaccount.google.com/ in your computer's browser</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Click on the Data and Privacy option on the left sidebar</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then scroll down and go to the History Setting section and click on My Activity there.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Search Your Activity Search Gmail using the search bar</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then see Gmail in the search results. Click on Details button in Gmail service and get detailed details about Gmail activity</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- You can see the activity time, operating system and details of the device being used.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">5. View Gmail Activity on Android and iPhone</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In addition to the above methods to view Gmail activity on a smartphone, you can also follow the following methods:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Open the Gmail app on your Android phone or iPhone</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Tap on the icon of the profile picture and switch to the account you want to see the activity and tap on Manage your Google account.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then tap on Data & privacy at the top and tap on the My Activity option in the History section</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Then search Gmail in the search bar named Search Your Activity and tap on Gmail activity to know its details</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">6. View Recent Security Activity</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If someone signs into your Gmail account from an unknown device, you will receive an alert.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you do not receive or miss such an alert, you can view the notification alert by visiting myaccount.google.com/notifications. From that you can know the device and location of your Gmail account login.</p><h2 style="text-align: justify;">What is an AI therapist? How is it becoming popular among the youth?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Harry Porter, Elon Musk, Beyoncé, Super Mario and Vladimir Putin.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">These are just a few of the millions of artificial intelligence people you can interact with on Character.AI. This is a popular platform where chatbots can be created with the names of any fictional or real people.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Character dot AI also uses artificial intelligence technology like chat zipty. But it is more popular as a pastime. Compared to the above mentioned chatbot, a chatbot named Psychologist is the most popular.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Who created 'Psychologist'?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">An AI chatbot named Psychologist was created by a user named Blazeman98 about a year ago. So far 78 million messages have been shared on this chatbot. Out of that, 1.8 million have come only after November.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Character.AI has not revealed how many users of this chatbot there are. But he said that 3.5 million users visit his site daily.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This chatbot is introduced as a person who helps in the problems that arise in life.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The San Francisco Bay-based company downplayed its popularity, saying that its users are more interested in role-playing for entertainment. Most popular chatbots like Raiden Shogun are either cartoon or computer game characters. He has been sent 282 million messages.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Among its millions of characters, few are as popular as the psychologist. It has a total of 475 chatbots whose names include therapy, therapist, psychiatrist or psychologist. They can communicate in different languages.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some of these are what you might describe as romantic or fictional characters, such as erotic therapists. But the most popular of these are therapists such as mental health aides. He has 12 million messages. Apart from this, there are also chatbots like R U Feeling OK, which has sent 16.5 million messages.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The user is happy with the psychologist</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Psychologist is the most popular mental health chatbot to date. Many of its users have written rave reviews on social media site Reddit.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">One user says – it's a lifesaver.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, another user shared her experience that it helped both her and her boyfriend to talk about their feelings and understand them.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Blazeman 98 was built by 30-year-old Sam Jia, who lives in New Zealand. He says, "I never imagined that it would be so popular." I never thought that other people would use it as a tool.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sam Jia</p><p style="text-align: justify;">Sam Jia</p><p style="text-align: justify;">"Again, I've had a lot of people message me and say they've been positively impacted by it and are using it as a source of solutions," Zia says.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to Zia, a psychology student, he used the knowledge gained during his studies to create answers for mental health problems such as depression and anxiety. He created it when his busy friends needed him.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sam, who was surprised by the success of psychologists, is the growing popularity of AI therapists and why is it attracting young people? He is working on a research project at the postgraduate level.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Character.AI has the highest number of users in the age group of 16 to 30 years.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sam says - Most of the people who message me say that they use this chatbot when their thoughts get really hard, like at 2am when they can't talk to a friend or doctor.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sam's guess is that because of the format of his chatbot's reply, young people have been able to be more comfortable with it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to N, it is probably less difficult to talk via text than to talk on the phone or face to face.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What do psychologists say?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Theresa Plavman is a psychiatrist by profession. She says that she is not surprised by the popularity that AI chatbots are gaining among the younger generation. But he has a question about how successful it will be.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">She says, “Chatbots have a lot to say. He immediately forms an opinion. Like when I tell him that I'm feeling depressed, he immediately gives me depression advice. Therefore, it is not as sensible as the response of a real person.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to Therese, chatbots fail to collect all the information that people want. He is not a competent doctor. However, for people who need help, its immediate and easy nature can be useful.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">She says that the number of people using chatbots is alarming. According to Theresa, this indicates a lack of high-quality mental health and public resources.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Character.AI spokesperson says - We are happy to see that people are getting good support and engagement through the characters created by the common people and the community. But users should take the help of authentic professionals in that field for valid advice and guidance.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to the company, the chatlog is a private matter of the user. But for security reasons, if Chabot employees If they want to read it, they can read it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Every conversation in it starts with a warning in red letters. In which it is said - All the characters who are careful are imaginary.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What this reminds us is that the technology used in it, which is called the Large Language Model, does not think like a human being.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What are the other services based on AI?</p><p style="text-align: justify;">There are also sites like Replika based on the Large Language Model. It also provides the same services as Character.AI. But looking at its nature, it seems that it is only for adults.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to analytics company SimilarWeb, based on the number of users and usage, Replica Character is not as popular as AI.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Earkick / Woebot is also an AI chatbot that was originally designed to act as a mental health companion. According to the claims of both these companies, studies have shown that these apps are helping people a lot.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to some psychologists, AI chatbots can also give wrong advice to patients. Also, there is a risk of such plants being biased towards a particular breed or gender. However, the medical world has slowly started accepting these chatbots as tools.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">An AI service called Limbic Access was awarded a medical device certification by the UK government last year. Along with this, Limbic Access has become the first mental health chatbot to receive medical device certification.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Now it is being used to classify and rank patients in various funds of the National Health Service of the UK.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-19782161197216020222024-01-20T23:31:00.000-08:002024-01-20T23:31:37.284-08:00 An American company made a machine that extracts water from moving air<h2 style="text-align: justify;"> An American company made a machine that extracts water from moving air</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The Consumer Electronics Show, one of the world's largest technology fairs held in Las Vegas, USA, in 2024, more than 4,000 companies from around the world are presenting new technologies, products and prototypes.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The first two days of this exhibition, which ran from January 9 to 12, were dominated by television and electric vehicles. From transparent television to electric vehicle models with new technology were announced at the exhibition. Apart from that, various other interesting technologies have been presented in the show, of which three technologies are:</p><div class="separator" style="clear: both; text-align: center;"><a href="https://media.cnn.com/api/v1/images/stellar/prod/140423151101-water-gen-atmospheric-generator.jpg?q=w_1989,h_2233,x_0,y_0,c_fill/h_618" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="618" data-original-width="550" height="640" src="https://media.cnn.com/api/v1/images/stellar/prod/140423151101-water-gen-atmospheric-generator.jpg?q=w_1989,h_2233,x_0,y_0,c_fill/h_618" width="570" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A device for making water from air</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The American company Genesis System presented the Water Cube at the exhibition on Tuesday. This device, which looks like a large microwave oven, makes water from air.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to the company's claim, this device will prove to be very important in solving the water crisis in remote areas of the earth. This machine is claimed to produce 450 liters of water in 24 hours. However, it is said that this machine will work well only in humidity more than 40 percent and temperature above 15 degrees Celsius.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Throat screeching fan</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Torus, a well-known company that makes mobile covers, has launched a personal neck fan called Coolify.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It can be very useful for music connoisseurs and wanderers. This device, which fits around the neck like a neckphone, can play songs and also receive cool air from the fan. According to the torus, air is released at high speed from many small blowers in it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">X Peng's Flying Car</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Chinese car manufacturer Xpeng has introduced a flying car named AeroHT.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The commercial production of this car will start from 2025. For this, the company will start ordering from the third quarter.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Bill Gates Projection: This is how AI will change our lives in the next 5 years</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is well known that the billionaire Bill Gates, the founder of Microsoft, has a positive opinion about artificial intelligence technology. But he went one step further and predicted the transformative effects this technology will have on our lives in the next 5 years.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to him, AI will be transformative for everyone in the next 5 years. The emergence of artificial intelligence technology has increased the fear of losing tens of millions of jobs worldwide. According to the International Monetary Fund, AI could affect 40% of the world's jobs.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Perhaps Gates also does not disagree with this belief. But what he believes is that history has shown that every new technology brings new opportunities along with fear.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In an interview with CNN's Farid Zakaria on Tuesday, Gates predicted that AI will make life easier for all people. It will help the doctors to edit their paper work (which they don't like to do) and the work will be done in a very efficient manner.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Bill Gates says, 'Since there is no need for new hardware, people will be able to access AI from their existing phones or computers already connected to the Internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">He said that the improvement of the chat GPT-4 developed by Open AI is also dramatic: it can write and read. So it's like having a self-employed worker who can do everything, who can teach, give health advice, write code and even call for technical support.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to him, if this technology can be adjusted in the education and health sector, it will bring amazing results. Microsoft has invested billions of dollars in Open AI, the maker of the AI chatbot, ChatGipity. And, Gates is one of the largest shareholders of Microsoft.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Talking to CNN's Zakaria during the ongoing World Economic Forum in Davos, Gates said: The purpose of the Gates Foundation is to greatly reduce the gap between the time it takes people in poor countries to receive benefits and the time it takes to reach rich countries.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Speaking about the impact of AI, he says, "In 1900, when we had agricultural production as the main sector, what else would people do?" said. But after that many new things and many types of new jobs were created. And, now we have reached a much better situation than that time when all of us were engaged in agriculture. The changes brought by AI in the future will also be similar.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Now even Android users can make audio-video calls from X</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A much awaited feature has been launched on social media platform X.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The audio and video calling feature, which has been being tested on X for a few months, has finally been officially released for all Android users.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Along with this, Android users of X have already started receiving the update of this new feature. It is said that this feature will be available to other users within a few days. But for the time being it will be available only for the subscribers of X Blue i.e. paid X users.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to Enrique Barragan, the developer of X, all ordinary X users will be able to receive calls made by other people on their X platform. But to call yourself, you have to be a premium user.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you are also a premium user of X and want to make audio and video calls from that platform, update the X app on your mobile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If this feature becomes available, then go to Settings > Privacy and Safety > Direct Messages and activate this feature.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Remember X released this feature for iOS users last October.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature added to X may not be very new when the audio and video call facility is available in all social media apps including WhatsApp and Messenger. However, according to analysts, this work of Elon Musk, who is moving towards the goal of making X an entire app, is an important step in that direction.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-45625761361889692852024-01-09T01:22:00.000-08:002024-01-09T01:22:54.552-08:00 Want to free up iPhone storage without deleting photos and videos? Do this<h2 style="text-align: justify;"> Want to free up iPhone storage without deleting photos and videos? Do this</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you have too many photos, videos and apps on your iPhone, the storage is limited and you are unable to install the latest iOS software update?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you are facing a similar problem, today we are telling you a solution that can be adopted without deleting anything and without spending money.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.cnet.com/a/img/resize/bc1017f876be9cab8ec84bf6deae050b7bb23ddc/hub/2022/04/19/01bef208-a82b-4199-8b7e-1700766fe4ab/gettyimages-1090899154.jpg?auto=webp&fit=crop&height=675&width=1200" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://www.cnet.com/a/img/resize/bc1017f876be9cab8ec84bf6deae050b7bb23ddc/hub/2022/04/19/01bef208-a82b-4199-8b7e-1700766fe4ab/gettyimages-1090899154.jpg?auto=webp&fit=crop&height=675&width=1200" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apart from this, you can also free up the storage of your iPhone with the help of some other features in iOS. You can find two built-in iOS settings that help you free up significant amounts of iPhone storage: one permanent and one temporary.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">By doing this, you can install the latest software updates, take more photos and videos, and download many apps.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Optimize photos and videos</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you want to keep your precious memories, but also free up some storage, the easiest way is to optimize the photos and videos on your iPhone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">By default, every time you take a photo or video, they are saved on the device with full resolution. If you are taking photos and videos in high resolution, they take up a lot of space.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A minute-long 4K video shot at 60 fps takes up about 400 MB of space, which is roughly half a GB. To optimize your photos and videos, go to Photos via iPhone Settings and toggle Optimize iPhone Storage (you must go to iCloud Photos Settings and enable it).</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This may take a little longer depending on how many photos and videos you have on your iPhone, but once it's done you'll have significantly more space on your device.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After doing this, all your full-resolution photos and videos are transferred to your iCloud, while the smaller and lower-resolution ones stay on your device, taking up very little space.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you want to access your high-resolution photos and videos, you can go to the Photos app and download any files that need to be optimized. But for this you need a good internet connection.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Photos and videos you've just taken can be in full resolution, so you don't have to download each photo or video. If you don't have enough iCloud storage, you can upgrade your cloud instead of getting a new phone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For this, to upgrade iCloud on your iPhone, go to your name > iCloud > Manage Account Storage > Buy More Storage via Settings. From there, you can choose the plan that suits you and proceed according to the instructions given.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Offload large apps</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Of course, you don't use all the applications on your iPhone. Most of them are sitting on mobile, which may include apps like airlines, third-party cameras and music production.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Even if you use these apps occasionally, most probably don't go to them daily. So if you need more storage immediately, consider offloading the app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Suppose you are trying to download and install the latest iOS update. If it's a major update like iOS 16, you may need up to five GB of storage to install the software.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If it's a point update like iOS 16.1, it will need about 1 GB. And if you don't have enough storage for such updates, you can immediately offload the app, which is the middle ground between keeping the app and deleting it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For this, go to Settings, General, iPhone Storage and see which app is taking up the most storage. Certain built-in apps like Photos, Messages cannot be offloaded, so keep this in mind.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you find any other app for offload apart from that then tap on it and tap on offload app. Wait a few moments and the app will be removed for offline use, keeping your documents and data saved on your iPhone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you need temporary storage to download software, go through the list and offload as many apps as you can. The amount of storage freed up by offloading each app may vary, so refer to the number next to the app's size.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You can offload as many apps as you want until you have enough storage free. You can't run the offloaded app, but if you need to bring the app back, you have to go to the app library and tap on the iCloud button to re-download it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If the downloaded app is on your home screen, tap on it to download. You don't need to sign in again or do anything else; You have the same access as an app that has never been deleted.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-85634199789899632112024-01-09T01:19:00.000-08:002024-01-09T01:19:17.127-08:00 Do you turn on the heater in the room? Note these things<h2 style="text-align: justify;"> Do you turn on the heater in the room? Note these things</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In winter, the use of heaters in homes and offices has become common. Even though heaters are useful for keeping warm in cold weather, if you don't know how to use them, accidents happen.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to doctors, using a heater or lighting a fire with the windows and doors closed is dangerous from a health point of view. Due to this, the carbon monoxide in the room will increase, at the beginning there will be headaches, nausea, shivering, suffocation and fainting and later death without knowing.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.wikihow.com/images/thumb/0/06/Use-a-Portable-Heater-Safely-Step-11.jpg/aid1303462-v4-1200px-Use-a-Portable-Heater-Safely-Step-11.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="600" data-original-width="800" height="480" src="https://www.wikihow.com/images/thumb/0/06/Use-a-Portable-Heater-Safely-Step-11.jpg/aid1303462-v4-1200px-Use-a-Portable-Heater-Safely-Step-11.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This can cause health problems especially for children and the elderly. So, in cold weather, you should use any other natural alternative instead of electric heater.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1. Absorbs moisture from the air</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When you turn on the heater, it absorbs the moist air in your environment. Excessive use of heaters can cause skin dryness and itching. Heaters are very bad for children's soft and sensitive skin.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2. causes suffocation</p><p style="text-align: justify;">For those with respiratory problems, the heater can make it difficult to breathe. If you are going to use a heater, always keep a bucket of water and keep the windows open.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3. Lowers body temperature</p><p style="text-align: justify;">If your body is used to living in the artificial temperature of the heater, when you go outside, your body temperature may suddenly change. At this time you may also get sick.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4. Fire and injury may occur</p><p style="text-align: justify;"> When you stay in the heater for too long, you can burn and injure your body parts.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">5. Bottom line</p><p style="text-align: justify;">Remember to turn off the heater after using it. Do not place anything on top of it. Keep a bucket full of water to balance the humidity in the air. Do not use a power cord extension ie multiplug to use the heater.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Something to note</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Do not use the heater overnight or for a long time in a closed room.</p><p style="text-align: justify;">People with heart and respiratory problems should avoid using heaters as much as possible. If necessary, always keep a bucket of water and keep the window open.</p><p style="text-align: justify;">Staying in the heater for a long time may cause burns and injuries to body parts, please be careful.</p><p style="text-align: justify;">As much as possible, do not use a power cord extension ie multiplug to use the heater.</p><p style="text-align: justify;">There are special types of heaters available in the market for patients with asthma, allergies, asthma, bronchitis, buy the heater only after getting information about this.</p><p style="text-align: justify;">Never cover the heater. This increases the possibility of fire.</p><p style="text-align: justify;">If the heater is running in the room, drink water from time to time. It is also good to have tea, coffee or soup. It can reduce the dryness of the skin.</p><p style="text-align: justify;">Do not place the heater in a place where there is frequent movement. Keep it out of the reach of children in particular. It is better to keep the heater on a flat surface.</p><p style="text-align: justify;">Do not keep flammable materials like paper, blankets near the heater.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-5617487077706068822024-01-09T01:16:00.000-08:002024-01-09T01:16:03.537-08:00 Where did you go during your trip? Save as Google Maps location to find out<h2 style="text-align: justify;"> Where did you go during your trip? Save as Google Maps location to find out</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Google Maps has provided various features to enhance the user experience. One of those features is 'Save Location'. This feature can be useful for you to remember places you visit frequently and new places you visited for the first time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature is considered suitable not only to remember the new place you have traveled to, but also to keep detailed information about where you traveled from and how you traveled.</p><p style="text-align: justify;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.lifewire.com/thmb/uIXOHKS5ooM_yt5OzB8BFoROEBM=/1500x0/filters:no_upscale():max_bytes(150000):strip_icc()/Mobilepin-e57291eba98e4214836cbeb119fad9bf.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="571" data-original-width="800" height="457" src="https://www.lifewire.com/thmb/uIXOHKS5ooM_yt5OzB8BFoROEBM=/1500x0/filters:no_upscale():max_bytes(150000):strip_icc()/Mobilepin-e57291eba98e4214836cbeb119fad9bf.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Today we are discussing how to use location save feature in Google Maps:</p><p style="text-align: justify;">Save any place on Google Maps on mobile</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">First, open the Maps app on your mobile and search for the place you want to save. (If the search location is not visible, tap the location you want to save on Maps)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And options like 'Direction', 'Start', 'Call', and 'Save' appear below. Tap on the 'Save' option out of it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After doing this, choose the option of how you want to save the place or create a new list and save it. When creating a new list, detailed information about that place can be kept.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And, tap on the 'Done' option at the top right.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Save location on desktop as</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">First of all, select the place you want to save on the maps, the coordinates or your location.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And tap on the button that says 'Save'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There is an option of how you want to save in the list. And in the option you want or if there is no option you are looking for, click on 'New List' at the end and set the name and save.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to find the saved place?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To find the saved location, first open the Maps app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Tap the profile icon at the top right.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And, 'Saved' (Saved) option appears. If you tap on it, you will see all the places you have saved in Google Maps.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Other ways to save location</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Any location you choose on Maps can be 'saved' for later reference. If you are looking for an easier way, just 'label' the place. Especially, you can 'label' your home, office or other place.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As mentioned above, going to the 'Saved' option will also show the labeled locations. The advantage of this is that when you open Maps, the labeled area is visible on your device. Similarly, by saving the maps offline or by sharing the location, you can also save the place of the maps.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-82837643614195896482024-01-09T01:11:00.000-08:002024-01-09T01:11:22.032-08:00 These are 15 tips suggested by Nepal Police to prevent Facebook ID hacking<h2 style="text-align: left;"> These are 15 tips suggested by Nepal Police to prevent Facebook ID hacking</h2><p><br /></p><p>Recently, in the context of the increasing incidence of Facebook account hacking, Nepal Police has given various suggestions to avoid this problem. By releasing a video on Wednesday, the police has suggested ways to avoid account hacking.</p><p><br /></p><p>According to the statistics of Nepal Police Headquarters Cyber Bureau, out of 9013 complaints filed in the previous financial year (2079/80), 6782 complaints were related to cyber crimes committed through Facebook. Similarly, 140 complaints were received from the marketplace, 220 regarding gift fraud, 1230 regarding hack and fraud, and 27 regarding beneficiary.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.cnet.com/a/img/resize/49c53934346dfe5b3e77ecd0bbf1f36eea466918/hub/2017/10/11/28905c08-193a-4619-98fc-efa96fc9d867/secure-your-account-on-facebook.jpg?auto=webp&width=1200" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="465" data-original-width="800" height="372" src="https://www.cnet.com/a/img/resize/49c53934346dfe5b3e77ecd0bbf1f36eea466918/hub/2017/10/11/28905c08-193a-4619-98fc-efa96fc9d867/secure-your-account-on-facebook.jpg?auto=webp&width=1200" width="640" /></a></div><br /><p><br /></p><p>Till this period of this financial year (2080/81), 8628 complaints have been lodged with the Cyber Bureau, out of which 6915 are related to cyber crimes committed by Facebook. Similarly, 340 complaints have been received from market placement, 225 from gift fraud, 378 from hack and fraud and eight from beneficiary.</p><p><br /></p><p><br /></p><p>In recent times, the Facebook accounts of prominent people, women and children have been hacked and videos and photos that look like obscenity have been added to their stories and posts. Keeping this in mind, the police has brought an awareness video.</p><p><br /></p><p>In the video, Cyber Bureau spokesperson Superintendent of Police Pashupati Kumar Rai recalled an incident and said, "Someone found the citizenship of a woman and put it online. Someone else removed the SIM from that online citizenship. That SIM was misused in a drug case." Rai says that even our common weaknesses can lead to huge legal trouble with the content we put on the Internet.</p><p><br /></p><p>Spokesperson Roy has suggested that any service provider or bank will never ask for a customer's username, password and OTP over the phone and refuse to ask for such information.</p><p><br /></p><p>Tips given by the police to avoid Facebook account hacking:</p><p><br /></p><p>- Keep separate and strong passwords for separate social media accounts (eg Facebook, X).</p><p><br /></p><p>- Use multifactor authentication (Two Factor Authentication, Mobile Number, OTR, Fingerprint etc.) to keep your social network account safe.</p><p><br /></p><p>- Use the recovery email and mobile number to 'recover' your social media account.</p><p><br /></p><p>-Use only your personal device (mobile, laptop, computer, tablet) when using social media.</p><p><br /></p><p>-Lock your personal devices (laptop, mobile etc.) with PIN, password, pattern or biometric.</p><p><br /></p><p>- Change the password of the social network account immediately when the mobile phone or tablet is lost.</p><p><br /></p><p>- As much as possible, do not put your personal details (eg; home address, phone number, personal documents, sensitive information, etc.) on social networks.</p><p><br /></p><p>- Do not share your personal sensitive photos, username, password, bank credit card number, pin code, citizenship number etc. on social media.</p><p><br /></p><p>-Be careful when posting any messages, photos and details such as where you are going, what you are doing, who you are with.</p><p><br /></p><p>- Reject if someone pressures you to post a photo.</p><p><br /></p><p>- If necessary, block or unfriend bad friends who show uncomfortable activities on social networks.</p><p><br /></p><p>- Do not accept friend requests from strangers as much as possible.</p><p><br /></p><p>- Only click or open links and attachments shared by friends on social networks by correctly identifying them. Do not open the link and attachment if you feel suspicious.</p><p><br /></p><p>- Don't reply or respond to messages, phone calls, etc. sent by showing various temptations or threats sent through social networks, including prizes and gift lottery tickets.</p><p><br /></p><p>- If you feel or experience sexual abuse or any uncomfortable activity while using social media, collect evidence and file a complaint with the nearest police office or cyber bureau.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-70524242662470868952023-12-22T01:09:00.000-08:002023-12-22T01:09:01.845-08:00 Deep Fake Video App, Technology: AI Tool, What is Deep Fake Technology?<h2 style="text-align: justify;"> Deep Fake Video App, Technology: AI Tool, What is Deep Fake Technology?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Technology like artificial intelligence was invented to help people, but now it has started to be misused, which used to affect ordinary people, but now the big leaders and actors of the world are also affected by it. have been Let's know on this page how deepfake technology works and what is deepfake technology.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.shutterstock.com/blog/wp-content/uploads/sites/5/2021/07/Deepfake-Feature1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="500" data-original-width="800" height="400" src="https://www.shutterstock.com/blog/wp-content/uploads/sites/5/2021/07/Deepfake-Feature1.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What is Deep Fake Technology?</p><p style="text-align: justify;">This is a technology that is used to set the face of any other person or celebrity on a person's photo or video, and when such a photo or video is released, it is It seems like the person appearing in the photo/video is a famous celebrity, but in reality he is not, only his face is used on someone else's body/face.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Deep Fake Video Maker</p><p style="text-align: justify;">For information, we want to tell you that by DeepFake TechnoLogy such algorithms and patterns are studied, which are used to make changes in the existing photo or video to make it even more real. In this way, people easily trust the videos that are made by this type of technology and cannot differentiate between real and fake videos or photos.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Deep Fake Video Latest News</p><p style="text-align: justify;">Recently, through this technology, a DeepFake Video of Bollywood and South's beautiful actress Rashmika Mandana is being shared a lot on the net, on which Rashmika Mandana herself had to come forward and give a clarification. Want to tell that, DeepFake TechnoLogy uses Generative Adversarial Networks.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Rashmika Mandana Deep Fake Video</p><p style="text-align: justify;">The deep fake video of Rashmika Mandana, who is included in the list of the most beautiful actresses, is going viral on social media in the country. The link to which is here, although Rashmika Mandana is not in the video, but there is another girl in her place, whose face has been removed and Rashmika Mandana's face has been replaced and people are thinking that this type of video is Rashmika Mandana's video. are This video is a bit vulgar. That's why people are directly commenting on Rashmika's ID.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How and when did deepfake technology start?</p><p style="text-align: justify;">The term deepfake was coined in the last month of 2017 by a Reddit user. Deep learning technology was used by this user to superimpose the faces of some popular people, so that he could make dirty videos of them, which are called porn videos. When this phenomenon came to light, other people also became aware of this technology and around 2018, the technology became easy to use due to open source libraries and tutorials shared online, and around 2020 around the world. Most people became familiar with this technology and started using it in their own way.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to identify deepfake videos</p><p style="text-align: justify;">If you also want to identify a deepfake video or photo at your level, then you have to notice whether there is any significant change in the video or photo. Especially you have to pay attention to the movement of hands and feet in the video. If you find anything strange in it, then maybe that video was created by deepfake technology. There are also some platforms that include a watermark for artificial intelligence generated content, which indicates that the content was created using artificial intelligence. So you should check such symbol or disclaimer carefully.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Deep Fake Video AI Tool</p><p style="text-align: justify;">There are many artificial intelligence tools available on the internet these days. Like AI or Not and Hive Moderation etc. Content created by artificial intelligence can be identified through this type of tool. Apart from this, there is a tool called Deepware Scanner, which you can use to detect Deepfack of any photo or video. Apart from this, you will find many tools on the internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Tech companies are working to reduce deepfakes</p><p style="text-align: justify;">Continuous experiments are being done to identify deep fake photos and videos, because this technology has now started to be misused by some drivers, of which actress Rashmika Mandana has also become a victim in India. Policy makers and large technology companies are working to raise awareness about this technology and are actively working to find ways to address its potential misuse.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">FAQ</h2><p style="text-align: justify;">Q: When was deep fake technology developed?</p><p style="text-align: justify;">Ans: 1990</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Q: What is the deepfake video detection tool?</p><p style="text-align: justify;">Ans : Deepware Scanner</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Q: Can deep fake videos be made with artificial intelligence?</p><p style="text-align: justify;">Ans: Absolutely</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Q: Can deepfake technology be misused?</p><p style="text-align: justify;">Ans: Yes!</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-2843608359346894112023-12-18T23:21:00.000-08:002023-12-18T23:21:29.093-08:00 Hacker hacking Facebook account by tagging in obscene posts, what to do to avoid?<h2 style="text-align: justify;"> Hacker hacking Facebook account by tagging in obscene posts, what to do to avoid?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Lately, Facebook account hacking and spreading malware in the form of obscene content has increased.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://i.ytimg.com/vi/tiHMBWWNeGQ/maxresdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://i.ytimg.com/vi/tiHMBWWNeGQ/maxresdefault.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this case, first of all, the hacker sends a phishing link to the Facebook user. After clicking on such links, they (the link clickers) account is taken over by the hacker. And from the said account, links to obscene posts are also shared.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In such a post, obscene captions or photos are placed outside. However, there is malware inside. After the hacker takes over the account of other people, he posts such content by tagging more and more friends.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Everyone who is friends with the people tagged in the shared post will see the content. If your friend is tagged in such a post and opens the link to see what's inside, their account will also be taken over by the hacker.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">We tested one of the links (shown in the image below) spread by the hacker. After clicking on the link, the access to the account was lost. After that, the account was immediately brought back by changing the password using the 'Forget Password' option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Thus, as soon as the link is clicked, the lost account can be restored at the initial stage. If the password is not recovered immediately, there is a risk that the access to the account may be lost forever.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After the excessive reports on the tested link, the link is currently down. However, Harak is spreading malware by creating many other such links.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to avoid such an event?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The most important thing is that even if it is a link sent by your friend, you should not click on the link unless you are confident about it. If you have received a link on messenger, call and understand about the link.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If we look at this current event, the Facebook tag is seen as a major challenge. If you have turned on the feature that automatically accepts Facebook tags, you may not know that you have been tagged in such posts.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So adjust the settings so that you know before the post tag. You can follow the below procedure for that.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- First open the Facebook app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then go to the profile icon on the top right.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then, click on the settings icon below it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- After doing this, go to Profile and Tagging (Profile and Tagging) option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- If you want no one to tag you on your timeline, go to the Who can post on your profile option and select the Only me option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Similarly, go to the option of who can see the posts that you're tagged in (i.e. who can see posts that you're tagged in your profile?) and choose the option that suits you. In this case, you can choose the friend option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- After doing this, go to the section of Reviewing and turn on the option of Review posts that you're tagged in before the post appears in your profile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you do this, you will get a notification about who tagged you. If you want to show that post on your Facebook profile, then tap on the 'Add to Profile' button. But if you want to remove the tag request, you can press the 'Hide' button. If you don't want to remove it or show it on your profile, you can just leave the post.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What to do when the tag is done?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Suppose, the tagging feature in your Facebook account is not turned on and somehow the post appeared on your profile. Even in such a case, you can disassociate yourself from the tagged post. For that you can follow the below procedure.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-First go to your profile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- After going to the profile, open the post you are tagged in.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Then, tap on the button with three dots on the right side.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Tap on the remove tag option above the last one.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This way you can remove yourself from the post you are tagged in.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Pay attention to account security</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The Facebook account you are using can be taken over by others at any time because of you. If you click on a malware link in your inbox or click on a link tagged to others, a hacker will gain access to your account.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sometimes it may happen without you knowing. In that case, the hacker is looking for an opportune time to abuse your account.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is best to recover your account before the hacker abuses it. But it is not always possible to recover like this. Therefore, it is wise to take measures to keep your account safe beforehand.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The most important thing for this is to make a habit of changing your Facebook password frequently. Also check who has the recovery email or phone number in your account from time to time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sometimes someone else may have access to your account and put a different phone number and email on it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Thus, if you follow the security methods mentioned above, you can stay safe on the social network Facebook.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">What is the end-to-end encryption you see in Messenger?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Recently, the end-to-end encryption feature has started as a default feature in the Messenger app of social network Facebook. Previously, the company has made the feature that the user has to manually update according to the need, saying that it is suitable for the user's privacy. So what is the end-to-end encryption feature and why is it useful for users? Today we are discussing this topic in detail.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">do you know From the moment you open your smartphone or other smart device and access the online world, your data is being tracked by many parties. The data you provide to various platforms is sold by those companies or platforms to various parties seeking to serve you advertising.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In some cases such data falls into the hands of hackers and they try to gain access to every system of yours. Some reliable smartphones are providing protection by setting up a strict security system in view of this security weakness. However, even such phones cannot provide any kind of security to the data you provide on the Internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, it is impossible to prevent anyone from accessing the data you have stored online. However, to keep your data safe, you can turn it into a code that no one but you can understand. Yes, this is why 'encryption' has proved to be the backbone of online communication.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Your communications with different people or companies online should be based on end-to-end encryption to ensure that they are not accessed or read by hackers, government agencies or dangerous parties.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So what is end-to-end encryption? Why should we care about this while talking online or transferring some data? Today we are giving detailed information about end-to-end encryption.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What is encryption?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Before understanding what end-to-end encryption is, we must understand its basic aspects. Encryption is a system that transforms any data in such a way that the unwanted party cannot easily understand that data. And, the said data can only be understood by the official party.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For example, suppose you try to send a message to one of your friends. The message you send does not reach your friend's device directly. After you send a message, the message is shared with various online infrastructure such as; The message finally reaches your friend's device through the internet service provider, the messaging app's server, and various parties connected between you and your friend.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The messaging service provider uses a mathematical cipher algorithm to encrypt the data to ensure that no matter who is in between, they have not read your message.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Where the said algorithm converts the simple message text sent by the user into cipher text. Cipher text refers to a structure of letters, which has no specific meaning. The meaning of saying turns into some kind of code.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this way, the message converted into ciphertext is converted into a real message by means of the decryption key. This means that even if a hacker gets access to the message transmission system, they cannot understand the meaning of the message. Since they do not have the decryption key, they cannot understand such messages.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sipper text is also known as Caesar's Sipper. Because first of all, the Cipper text was prepared by Julius Caesar. This is a process where the message is placed in different letters using a substitution algorithm.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Each letter of the message is substituted and connected to another letter of the alphabet. For example, if one uses shift three of the substitution algorithm, then A is denoted by D, B is denoted by E in that letter. And other letters are also encoded in the same way.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Now in the age of computers, it has converted billions of bits of data per second into crisp text. The simple Sipper algorithm that was used earlier has now been replaced by complex mathematical algorithms.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Even though the system has changed, the basic working principle remains the same. There are many types of encryption algorithms in use today. Which has its own advantages and challenges.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Public Key or Private Key of End-to-End Encryption End-to-end encryption is a type of encryption where the message is encrypted as soon as the sender (sender) sends it and decrypted before it is received by the receiver (receiver). .</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After the message is sent by the sender, it is encrypted until it is sent by another person. That is, the message is encoded as soon as you send it and is only decrypted when it reaches the other person.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Even if anyone can see the message during this transmission, no one can understand what is written in the message. This is the true meaning of end-to-end encryption.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Messenger encryption and decryption work is done only at the end of sending and receiving messages. When the message is in transit (broadcast), the message is neither encrypted nor decrypted.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It means that as soon as the message is sent, it is encrypted and converted into a code and the same code is transmitted in between. Then finally the other person gets the message At the last time, the encrypted code is decrypted. And the recipient gets to read the actual message.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">End-to-end encryption uses 'asymmetric public key' (Asymmetric public key) encryption. Where both parties have two keys. A key here means a key, which is used by a mathematical algorithm to encrypt or decrypt a message. There is a public key. Anyone can access it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, private or private keys are those that are not shared with anyone. The public key is used to encode the message while the private key is used to decode the encrypted message.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When someone wants to send you an encrypted message, the application they use uses the public key to encrypt the message. The encrypted message is transmitted through the Internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A message cannot be decrypted or translated into intelligible words by means of a public key, even if anyone can find it. This means that the real message cannot be known through public encryption.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In order to view the message, the private key is required. Here public key and private key are connected like this. So it is not possible to see or read the actual message with the help of public key only.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Advantages and disadvantages of end-to-end encryption</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As mentioned above, each type of encryption has its own advantages and challenges. End-to-end encryption has many advantages and challenges.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This means that there can certainly be some challenges when you use end-to-end encryption.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">advantage</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In end-to-end encryption, data is encrypted or decrypted only at the end point, making it almost impossible for hackers or government agencies to view your data.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It can be especially useful for journalists, activists and ordinary people who want their conversations to remain private.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Previously, when you sent a pirated link without turning on encryption in Messenger, Metaco's system knew that you had sent a risky pirated link.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And, it was stopped before it reached the person you sent it to. However, now such a message reaches the user directly. Of course, Facebook does not know what kind of link or message you sent. However, if you report the message, Meta will look at the message and if it finds it wrong, it will ban the account you reported. Its more advantages and disadvantages are discussed below.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Privacy</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Your privacy is protected when messaging or storing data on a platform with end-to-end encryption.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Security</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">No government agency can force the service provider to show your private messages. Because no one has access to the decrypted chat. So your message is safe.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Reliability</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">End-to-end encryption ensures that no one but the sender knows that you have received a message.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Secure remote work</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After the Covid-19 epidemic, the trend of working mostly at home increased. For companies, end-to-end encryption helps ensure that data exchanged by employees is secure.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Disadvantage</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Use more resources</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The platform uses multiple resources to implement end-to-end encryption to keep user data safe. Because to encrypt data and decrypt it again, a large amount of data needs to be transferred, so a lot of resources are needed.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Monitoring is reduced</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If different users have sent messages using the end-to-end encryption feature, it is not possible to regulate such messages. Therefore, groups or individuals with wrong intentions use these features more.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Lost data is not recoverable</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If data is stored on platforms with end-to-end encryption or if messages are sent from such platforms, lost data cannot be recovered. Since the data is encrypted in the middle, it is almost impossible to decrypt such data.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-You know who you're talking to</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Even if you don't know what you're talking about, the various parties in between may know who you're talking to.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apart from Messenger, which app has end-to-end encryption?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Recently, most of the messaging apps and data storage apps in the market have encryption service.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you also want to send an encrypted message or want to receive an encrypted message, you can use platforms like Signal, Threema, WhatsApp, Telegram, Wire, Google Message. </p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Live video chat can now be done on X too</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The video feature will be added to the space of social network X. The owner of the company, Elon Musk, has informed that the feature will come soon on the platform.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Xma Space is a live chat feature that any user of the platform can join. Earlier, the platform had the facility to communicate through audio. With the inclusion of the video feature, users can now join the space through video.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"We're working on adding a video feature to the space right now," Musk said, "it's a simple thing where you can turn video on and off."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Although Musk is preparing to release this feature at the end of 2023, it is expected to be available at the beginning of 2024.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In a space session, the video feed switches to the person who is speaking. For example, like the user who is speaking in Google Meet, his video is shown on the big screen. The feature is also expected to work in the same way in X.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">“This feature is useful to see the body movements of people while they are speaking. If they want to, facial expressions and body language convey more information than voice," Musk said.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The company believes that this feature will help more to interact with the audience. Twitter launched the space feature to compete with Clubhouse, an audio streaming platform that emerged during the Covid-19 pandemic.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Musk hasn't changed much in the space since taking ownership of Twitter. Now it is said that he is going to release a video feature to bring the same feature into the limelight.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-41858141613693229322023-12-16T22:41:00.000-08:002023-12-16T22:41:55.198-08:00 What exactly is time?<h2 style="text-align: justify;"> What exactly is time?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> If there is one thing in the universe that is constantly increasing, it is time. That is why it is said that time does not stop for anyone. And no one can stop time. A person can stop himself, he can stop his watch. But you can never stop time even if you want to. That is why it is said that time is precious.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you study time carefully, you will see a mystery in it. It looks different from all the objects in the universe. It has no physical form like matter, energy and space. But time is more real than anything else. Even if you are the only one in the universe, you will be with time. But time has become so normal that we never think about it.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://assets-global.website-files.com/5e6aa7798a5728055c457ebb/64e3aebc30bd1ceeafd09d38_20230821T0631-339e3c21-2950-4523-847d-528ed223c74f.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="363" data-original-width="800" height="290" src="https://assets-global.website-files.com/5e6aa7798a5728055c457ebb/64e3aebc30bd1ceeafd09d38_20230821T0631-339e3c21-2950-4523-847d-528ed223c74f.jpeg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Today, in this article, we are going to discuss time from the point of view of science. When someone asks you what time it is, you immediately look at the clock and say that it has been so many minutes. Someone asked how long the movie was and he said it was so long. The ticking sound of the clock makes us feel the time. That's why we consider those hours as time. But these watches did not exist before. It was definitely time. The rising/setting sun, the changing shape of the moon, the changing seasons.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Our ancient ancestors used these things to measure time. Nowadays, due to technology, the way of measuring time has changed. Now, electric clocks to automatic clocks are being used to measure time. But all of these are time scales. Not time. If we look a little deeper into the universe, we see something moving. We see the change. Change never stops. Change is irreversible. That is, the events that have happened cannot be changed.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If I hadn't made that decision, we would have been able to correct the decision by going back to the past. But everyone knows, we cannot do that. That is not possible. From this point of view, time is a continuous stream. This makes clear to us the characteristic that time always moves forward. Which we all believe to be true. It is called "arrow of time" in the language of physics. Because time increases from the past to the future. Therefore something becomes new first and then old.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It never happens that first the old and now the new. An egg that is cracked before is never whole again. Milk, sugar and tea leaves never return to their former state after coming out of tea. Because the fundamental property of the universe cannot be like that. "Disorder" is always increasing in the universe.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Because the characteristic of the universe is to go from 'order' to 'disorder'. If we draw an arrow between 'order' and 'disorder', it always returns from 'order' to 'disorder'. That is, first there is 'order' and then only 'disorder'. In the language of science, it is known as entropy. This characteristic of the universe defines time and the direction of time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">That is why some people think of time as a feeling that entropy gives us. But is it just an experience or perception? Does it exist? Is time real or an illusion? It raises questions like</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Humans tend to consider only what their senses can assess as real. But in science there is a different way of considering something as real. Only scientific theories that correctly explain a natural phenomenon are considered real in science. Like: Subatomic particles like quarks that cannot be seen with the naked eye, we consider real.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Because quarks have been confirmed by physics. That's why it is real even if you don't see it with open eyes. Albert Einstein explained time in his theory of relativity (General relativity). Time is an important element for that theory. But his theory does not explain any phenomenon in the universe correctly. Like; What happens at the singularity of a black hole (singularity - a point in space that contains mass with infinite density)? His theory does not say that.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Also, his theory is not compatible with quantum theory. In quantum theory, the direction of the arrow of time is not fixed. According to this theory, it can be assumed that the arrow of time can go forward or backward. But it doesn't make a big difference. Perhaps this is the biggest obstacle in the disagreement between relativity and quantum theory. Because according to the theory of relativity, time is a dimension. But quantum theory does not say anything about the arrow of time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The block universe, based on the four-dimensional universe, explains that space is three-dimensional and time is one-dimensional. A block universe is a theory of time that states that all moments in time occur simultaneously. That is, it explains that the past, present and future all exist in the same way. Time is a subjective concept. The experience varies from person to person. So is time an illusion? The answer is definitely no.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some scientists also believe that time can be an emergent property. Let's understand it with an example: From the atomic theory, we can know about the characteristics of water molecules in the sea. What element is that water molecule made up of? What kind of chemical bond is there between them? Their chemical characteristics What are they?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">All these things are explained by the atomic theory. But the atomic theory does not tell about the waves coming in the sea. Waves in the ocean are the 'emergent property' of water molecules. That wave comes after trillions of molecules come together. In the same way, time is also an emergent property of this universe. Which is produced due to the activities in the universe. Just as the waves of the sea are real, time is also real. So real that without the idea of time the scientific theory that explains nature, the mathematical equations based on it, do not work.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In Einstein's famous theory 'Theory of General and Spatial Relativity', time is shown as four dimensions in three dimensional space. This theory answers some of the questions raised by recent research. Like: How is the speed of light the same in all conditions? How is the speed of light coming from the same source the same for a dynamic or stationary observer?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Now let's look at this matter with an example. Imagine, a car is moving at a speed of 100 km per hour on the highway. A police car is on the side of the road. They also have speedguns there. From that they measure the speed of the car. Speedgun shows the speed of the car at 100 km per hour. Now imagine that the police car is moving in the direction of the car at a speed of 40 km per hour.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">At that time, looking at the speed of the car with a speed gun shows a different result. Because the police car is moving in the direction of that car at a certain speed. In this case, the speed of the police car decreases with the speed of that car. That is, now the speedgun shows the speed of the car at 60 km per hour. Which is the 'relative speed' of both vehicles. But if the police car is coming from the opposite direction, the speed of both will be added.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">At that time, the speedometer shows the speed of the car at 140 kilometers per hour. Now let's put the light in place of the car. What happens when we measure the speed of light in both the above cases? In general, the result should be similar to the above event. That is, the speed should be lower when going in the direction of the light and the speed should be higher when going in the opposite direction of the light. But otherwise the speed of light is the same in both cases. This is not a theoretical matter. This has been proven by testing. But how is this possible? The answer was given by Albert Einstein. According to him, to keep the speed of light the same, time slows down and space is also narrow.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Let's understand this also in a simple way. According to Einstein, time is not the same everywhere. Time moves slower for a moving observer than for a stationary observer. So there is no difference in the speed of light. Let's understand it like this. To measure the speed of any object, distance must be divided by time. In the scientific world, it is said that light travels a distance of 300,000 kilometers in one second. Now imagine two observers, one in motion and one not, trying to measure the speed of light.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this case, the time of the observer who is not in motion is slower than that of the observer who is in motion. That is, 1 second of the first observer is slightly more than 1 second of the second observer. Due to the long duration of seconds, light easily travels a distance of 300,000 km without any obstacles. The greater the speed of any object, the slower its time will be in proportion. Therefore, the speed of light is the same in every situation. This means that according to the location of the universe, time also varies. Einstein said that not only the movement of objects but also the force of gravity affects it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This means that the time of a large object like a star or a black hole is slower than that of a small object like the Earth. For the same reason, large objects shrink space time. That's why time moves slowly there. Einstein named this phenomenon 'time dilation'. This idea given by him was so strange and amazing that many people found it difficult to believe.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">We used to think that time is the same for everyone till then. But that's not the case anymore. According to this theory, a person on earth ages faster than a person traveling at high speed in space. Because his time runs relatively fast. In theory it is also said that if someone travels at the speed of light, time stops for him. That is, for a person sitting in a spaceship with the speed of light, not even a second has passed after thousands of years have passed on earth.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, this is practically impossible. Because the laws of the universe prevent us from doing so. If we try to move a spacecraft to the speed of light, its mass will increase rapidly. Which is infinite at the speed of light. And infinite mass requires infinite power to fly. Therefore, it is impossible for a massive object to attain the speed of light.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Only weightless objects like photons and gravitons can travel at the speed of light. This is a matter of principle. But in 1971, a time dilation test called the Hafele-Keating Experiment was conducted in America. Three synchronized atomic clocks were used in that test. One of them was flown to the east and the other to the west by placing it in an airplane to make two circles around the earth. One was placed on the ground.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Later on comparing them, there was a difference in the time of all the three clocks. Which was consistent with Einstein's theory. Then the proof that 'time dilation' really happened.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-32984911006021575432023-12-16T22:38:00.000-08:002023-12-16T22:38:15.957-08:00 Don't get bogged down in machine learning and natural language processing, that's the difference<h2 style="text-align: justify;"> Don't get bogged down in machine learning and natural language processing, that's the difference</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Machine Learning (ML) is a phrase that is being heard frequently in recent times due to AI tools. Because using machine learning models, AI writes like a human. With the rise of AI, Natural Language Processing (NLP) is another buzzword.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://iodinesoftware.com/wp-content/uploads/2020/07/blogpost-ai.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="337" data-original-width="650" height="332" src="https://iodinesoftware.com/wp-content/uploads/2020/07/blogpost-ai.png" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, it is common to say that machine learning and natural language processing are synonymous. But although they are related to each other, there are definitely differences. Today in this article we will discuss those differences and how they work together in an AI tool:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What is machine learning?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">One area of AI is machine learning. It is especially used in developing algorithms and mathematical models. Such models can develop themselves by analyzing data. Without the developer's instructions, those models can use data streams (transferring data at high speed) to learn patterns, make inferences, or make decisions.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, they enable machines to solve problems without any human assistance. Examples of machine learning are computer vision and defect detection systems used in self-driving vehicles.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What is Natural Language Processing?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This is an AI topic. It is used especially when analyzing and synthesizing 'text' and 'speech'. For this, NLP uses various methods to make computers understand human language. For this reason, NLP is used in places such as voice assistant, machine translation, text summarization, sentiment analysis, etc.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">NLP has a great role in making AI and computer systems as user-friendly as they are today. Examples of this are Alexa, Siri, Google Assistant.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">ML vs. NLP</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So far we have come to know that Machine Learning (ML) and Natural Language Processing (NLP) are related topics to AI. Both help machines make decisions using models and algorithms. But the type of data they analyze is different.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Machine learning uses various methods to learn from data without programming the computer. Machine learning algorithms are used to analyze different types of data and learn from them.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">On the other hand, natural language processing is considered a field within machine learning. It is a bit more focused on making computers understand human language.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">NLP algorithm is used to analyze text only and learn from it. NLP, like ordinary chatbots, use general rules to work. But most NLP uses machine learning to understand language.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, many methods such as deep learning, neural network, transformers, word embedding, decision trees, etc. come under machine learning.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, the Large Language Model (LLM) is a more advanced version of machine learning in non-natural language processing. A good example of this is ChatGPT 3. Models of natural language processing, machine learning.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Machine learning uses different types of natural language processing methods to understand text patterns. LLM is trained on large datasets of text and code. Therefore, it can do things like translating languages, preparing different types of writing such as poems/codes/songs/emails, and giving information.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Applicability of Machine Learning</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">We have already discussed the usefulness of machine learning above. But its usefulness is given in a little detail:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Computer vision</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Image recognition</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Bioinformatics</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Medical diagnosis</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Product Recommendation</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Predictive analysis</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Market segmentation, clusterin and analysis etc.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Applications of Natural Language Processing</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Comparatively, the utility of natural language processing is special and few. But many NLP uses machines to understand the language. When that happens, its field of application also increases. which are as follows:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Text summarization</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Language translation</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Text Comparison</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Sentence Completion</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Smart Assistant</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Email filtering and spam detection</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Sentence analysis and text classification etc.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Overall, there are many similarities between machine learning and natural language processing. Both use algorithms to learn from data. The main difference between them is the type of data being processed.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Most of the current machine learning tools use generative models. Those tools can work without human input. So it may seem that these two are the same, but they are different.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-48356403184945428142023-12-16T22:33:00.000-08:002023-12-16T22:34:12.584-08:00 What is a digital footprint, and why is it important to you?<h2 style="text-align: justify;"> What is a digital footprint, and why is it important to you?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Think of the internet as a library full of millions of books and other information. When you enter a library to check out a book or find other information, you leave a lot of information about yourself. For example, when you first go to the library, you fill in your name, phone number, email and other details to inform that you have entered the library. Then you start looking for the book you like and take out the required book from the rack. Then read those books in turn.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">While reading the book, you may have noted important things in the diary. Then you leave the library. By now you've left most of your data inside the library.</p><p style="text-align: justify;">With the name, email and phone number you give, what kind of book do you like to read, how do you read the page of the book, what important things do you write down in your diary, what kind of information is on your face when you get it, what kind of expression you had on your face before reading the book and on your face after reading the book. You leave it in the library without knowing how it felt.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://geekflare.com/wp-content/uploads/2020/01/20200115_205754_0001-1200x385.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="257" data-original-width="800" height="206" src="https://geekflare.com/wp-content/uploads/2020/01/20200115_205754_0001-1200x385.png" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The library can use this data to advertise the books you need. Or, it can increase the price of the book you need. For this, the library must be very sophisticated. Today's Internet has become such a sophisticated library. What kind of books you like, what your habits are, what you need, everything is stored in the data library. Yes, this data is called digital footprints in the language of the Internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When we search for something like a photo or other information online, we leave "digital footprints". This digital footprint is a way that traces everything you have done on the Internet. These footprints are now widely dispersed as the amount of information we seek increases. And most of us don't even care how much information is stored in that digital footprint.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Such a digital footprint is very useful for various groups such as the police, companies that sell various content, and people who tend to harass other users on the Internet. They use that digital footprint to learn about us, where we've shopped online, and what personal activities we've done. But don't be afraid.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You can keep such personal information private if you wish. You should try to minimize your digital footprint on the Internet as much as possible. By doing this, your activities on the Internet are kept private. So what are digital footprints? How can we protect our privacy on the Internet? Today we are discussing this topic.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">What is digital footprint?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The trail or path of data created when using the Internet is generally called a digital footprint. Every social media post, message sent, and website visited leaves a digital record of us. These records, which are lost in various mediums, are contributing to the digital footprint. According to Make Use Of, a person creates about 1.7 megabytes of data every second just by doing regular tasks online.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Digital footprints generally come in two forms, active footprints and passive footprints. Active Footprints (Active Footprints) are data stored when people fill out online forms, information that is there when posting on social networks. On the other hand, passive or passive footprints are data that are stored without a person's knowledge, such as information about visited websites, how the website is being used, etc.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Since there are digital footprints in different places, it stores various information. From the location of the user, his shopping habits, information about the videos he watches, at what time, what video he watched and for how long, all the information comes in digital footprints.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How are digital footprints being used?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It doesn't matter that digital footprints are a very valuable asset these days. Various brands and ecommerce stores also collect digital footprints to prepare in-depth profiles of their customers. Then they use the same footprints to promote their products or services to the target audience for marketing campaigns. Due to this, the advertisement of the company has a good effect.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Digital footprint is also considered very important for law enforcement agencies and other legal entities. Records of how people use the Internet can help prove whether they are innocent or guilty.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Employers are also using digital footprints. A study conducted by a company called Career Arc has shown that 92 percent of employers or companies recruit employees on the basis of social media. A person's online activity shows whether they are a good fit for that company or not. Therefore, digital footprint is an important tool for recruiting employees.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">These companies, brands and various Although legal entities use digital footprints for good work, cybercriminals are misusing these data. Cybercriminals can pretend to be you on the Internet and misuse your identity.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Cybercriminals are using digital footprints especially to harm others or to gain financial benefits. Some may use such data to launch phishing attacks by pretending anything is official.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Digital Footprints: How Can Privacy Be Improved?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As much as we can explain about ourselves to others, the digital footprint tells about us many times more effectively than that. Therefore, due to cyber security and general privacy, such data should be minimized as much as possible.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So what can you do to keep your digital footprints private? The first thing to do is find out how much of your information is being leaked. For that, even if you search your name on Google, it is clear how much of your information has come out. You can also set yourself to receive an alert if someone searches for your name on Google.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Another thing is to adjust the privacy settings on the social network account. In particular, set the option of who will see the posts, information or other updates you put on those mediums. The thing to be careful about here is that you should not share too much personal information on social media accounts.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For example, suppose you get a driver's license. And happily shared the photo of the letter on Facebook. You have made the privacy setting Only Friend. However, the hacker may be connected to you as someone else. Or he may be hacking your friend's account and tracking your activities. In that case, he takes all the information of the driver's license that you keep and can use it as he wants.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Therefore, use a strong password to avoid theft of digital footprints while using the web. Delete posts from Facebook or other social networks that you rarely use or that you don't find useful.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Minimize footprints</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Digital footprints are very useful both professionally and legally. However, its risks are also the same. How much a stranger can learn about you from your digital footprints matters. The more you know, the more you gain.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You can reduce your digital footprint by being careful when using the Internet, by visiting useful and reliable webpages, and by keeping as few information or posts related to your personal life as possible.</p><p style="text-align: justify;"><br /></p><div class="separator" style="clear: both; text-align: center;"><br /></div>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-9618698222381646862023-12-16T22:27:00.000-08:002023-12-16T22:27:17.296-08:00 What do Nepali users think about locked Facebook accounts?<h2 style="text-align: justify;"> What do Nepali users think about locked Facebook accounts?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The covid epidemic of 2020 was raging all over the world. Due to the fear of infection with the corona virus, most of the countries had imposed a ban. As a result, people were afraid to go openly to their neighbor's house. Internet has become a great option to spend such time. Before that, people who rarely used the internet began to consider social media platforms as the main source of information during the Covid-19 pandemic.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As the number of users increased on the social media platform, the incidents of misleading information, troll content and abuse started to increase. Especially in the Asian region, where the concept of digital literacy is low, incidents of online abuse started to increase. Also, in India, where there are 336 million users of the social network Facebook, the incidents of online abuse have increased significantly.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://1.bp.blogspot.com/RBMIq16PIe_v4qJp71OmYnCrPhFIzXr8YU6UWeWsoEnADkikA59vmNBpeHHttNw36Mu9uNEpxxGQ0w_2fAG0EQfRcZPlA5tJL1mTTFRO-d_987tw-PJibLchUyrdtQhHKp5QY5Uy=s1211" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="744" data-original-width="1211" height="394" src="https://1.bp.blogspot.com/RBMIq16PIe_v4qJp71OmYnCrPhFIzXr8YU6UWeWsoEnADkikA59vmNBpeHHttNw36Mu9uNEpxxGQ0w_2fAG0EQfRcZPlA5tJL1mTTFRO-d_987tw-PJibLchUyrdtQhHKp5QY5Uy=w640-h394" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Incidents of targeting married women and teenagers and vandalizing their photos on Facebook started to appear. To control this, Facebook's parent company Meta introduced the profile lock feature in India for the first time in May 2020.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After locking the profile, other than the people connected with you cannot see your statuses, photos, videos and other personal information, so this feature became the choice of many people. This feature was initially targeted at women and later became equally important for men and other categories. After this feature came, it became easy for people in high positions to keep their personal and family activities on Facebook.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature, which was first introduced by Facebook in India, gradually became available in other countries as well. In the last few months, this feature has started to be available in Nepal as well. There are more trolls on social media about this feature available among most of the users.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Tekpana raised a question on this matter through its Facebook page. "How do you feel when you receive a friend request from a locked Facebook account?" In the question, most of the users have expressed a negative opinion about 'Profile Lock'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"I don't accept it, I delete it, I want to hit the block, I feel like I don't need a pot, my cheek feels like a lamp, I don't think my face is worth showing, I feel like hitting Ram Dhu somewhere, I feel like a ghost in the dark, big It seems like a friend request has come from a person, it looks like they are calling in with a doorknok, it seems absurd, it seems like there is 33 kg of gold in the profile, it seems like it is a fake account,” most of the replies came in the post.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some have mentioned that they don't care if the profile is locked or not and if they know, they accept it, otherwise they delete the request or leave it at that. Some users have expressed their happiness when such a request comes, saying that the privacy will be protected by locking the profile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"Sounds like someone who uses social media and is aware of their personal safety," one user wrote. Another user wrote in response to the question, "I seem to be one of the people close to him, with whom he does not want to hide his pictures."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Although some limited users had a positive opinion about this feature, most of them had a negative opinion.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Why are users negative about the profile lock feature?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When someone's friend request comes on Facebook, the first thing that comes to mind is the name and profile. If you try to view such accounts by opening the friend request notification, you cannot zoom in on their profile photos.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">I don't think I know the name, but when I try to look at the profile page, it's natural to get bored if the photo doesn't open. Similarly, the locked account shows the added and mutual friends with that person. However, that person must have made it visible to anyone who is a friend. Other than that, no other details can be seen.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Usually, the person receiving the friend request takes a decision to accept or reject the request based on these various aspects. When no detail can be seen, it can be analyzed that there is a negative perception.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Why is it necessary to lock the profile?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The profile lock feature is a very useful feature from the point of view of privacy protection. The benefits of this feature to the user are discussed below.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1) Privacy is protected</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some posts on Facebook are uploaded to be seen only by people who have an add. You can also select the 'Only Friends' option in the privacy settings so that only friends can see such posts. However, it may not be considered that this option should be kept in all cases.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Locking a profile automatically sets the setting so that only people with added posts can see it. Apart from that, other than the person who has an add, others cannot see the information in the profile. In this case, unauthorized persons cannot know your personal information.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2) Avoid abuse by others</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In some cases, there are people who misbehave over the posts we put on a page or group or the comments made on those posts. Especially when arguing about politics, religion, language and culture, the other side can abuse you online.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In particular, they may make irrelevant comments and irrelevant comments on your posts, photos and videos. So come to lock profile to avoid such risks Of course.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3) To present only to a limited number of people</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If your profile is locked, your information will not be visible on other platforms. If your profile is public, your information will be found in the Google search engine.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In that case, your information may reach known or unknown people. So profile lock feature is suitable to present your details only to limited people.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4) Avoid association with unnecessary people</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Locking your profile can prevent unwanted people from seeing your information, which may deter them from sending friend requests. In this way, if you want to prevent unnecessary people from sending friend requests, you need to lock the profile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">5) Avoid misuse of photos</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Bad minded people can misuse your photos in various ways. There may also be people who misuse your photos especially to create fake accounts. Therefore, it is advisable to lock your profile to prevent your photos from being misused.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to lock profile?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The profile lock feature has been made available to most accounts by Meta. If you have kept your account in 'Professional Mode' then that feature may not be available in your account.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So first of all you have to remove the professional mode of your account. If your account is not in professional mode then you can lock profile by following below method.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">First, open the Facebook app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Then go to your timeline by tapping on your profile on the top right.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And tap on the three dots on the right.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">And tap on the 'Lock Profile' option.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After doing this, click on the 'Lock Your Profile' button at the end.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This way you can lock your profile.</p><p style="text-align: justify;"><br /></p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-17665578986979912042023-12-16T22:22:00.000-08:002023-12-16T22:22:38.494-08:00 Mobile microphone not working? Do this<h2 style="text-align: justify;"> Mobile microphone not working? Do this</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Be it for messaging or to record something or to use the assistant feature on the phone, microphone is the choice of many people. Microphone is a tool available built-in in mobile. It understands and records your voice.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But sometimes this tool may not work. This may change the way you use your phone. But you can solve this problem yourself by doing some simple work without calling the mobile repair center. That's what we're talking about today:</p><div class="separator" style="clear: both; text-align: center;"><a href="https://i.ytimg.com/vi/9Sx_kyHQOxw/maxresdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://i.ytimg.com/vi/9Sx_kyHQOxw/maxresdefault.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Check the system:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In some cases, this problem can also occur if the phone is not given the microphone permission. On most Android phones, you can give access to the microphone by going to 'Settings > Security & Privacy > Privacy > Privacy Control'. In addition, some voice-based apps have a mute button. If there are such apps then you need to check whether they are 'ON'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Clean the mic grill:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When the phone is used continuously, dirt may accumulate. This may cause dirt to accumulate on your mic grill. If there is anything visible, try to pull it off slowly. You can use toothpick, paper click or sim tool for this.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But do not blow on the microphone grill with an object like a hair dryer. Also, at the same time, see if the phone case has pierced/not pierced the mic grill. If the phone case covers the mic grill, you should use a phone case that does not cover it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Check mic permissions on an app-by-app basis:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If the mic is working in other apps, but only some apps are having problems, you can check the permissions of those apps. Sometimes certain apps may have this problem. For this, you go to the app through settings.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Go to the app where the mic is not working and tap on Permissions. If Mike is not given permission, you can fix it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Close the app that shared the mic input:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This is not such a big problem. But sometimes two different apps may be using the microphone at the same time. That may be causing the problem. In this case, you can close the other app.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Check for updates on the app or Android:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sometimes the mic may not work even if there is a problem with the software. In that case, you can check the update of the app you need to mic or the update of Android itself. In some cases, updating the software can solve this problem.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Restart:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If some bug has caused a problem with the phone software or app then you can restart your phone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If the mic doesn't work after any of the above methods, bring your phone to a repair center. If you see this type of problem in the new phone, you can inform the company.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-36345581567367419082023-12-16T22:18:00.000-08:002023-12-16T22:18:08.730-08:00 Do you have an electric foundation at home? Clean it like this<h2 style="text-align: justify;"> Do you have an electric foundation at home? Clean it like this</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> It's winter time. Drinking hot water is one of the ways to stay warm in this season. We have various options for heating water. But in the recent times, it should not be different that the things that have to be heated on the stove have been replaced by electric kettles.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Many home appliance brands are selling and distributing electric kettles in the Nepali market at cheap prices. Nowadays, apart from heating water with electric kettles, boiling noodles and hot drinks are also done.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://bgr.com/wp-content/uploads/2022/02/Sinceller-Electric-Jar-Opener.jpg?quality=82&strip=all" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="470" data-original-width="800" height="376" src="https://bgr.com/wp-content/uploads/2022/02/Sinceller-Electric-Jar-Opener.jpg?quality=82&strip=all" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But when it comes to cleaning electronics, it can become a problem for many. Cleaning the electrical equipment in the kitchen is easier than you think. Today we are going to tell you how to clean the same electric kettle used in the kitchen:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The interior of the electric kettle is in contact with water. But the electrical parts do not come into contact with water. But having said that, water should not be poured into the parts of the kettle that are in contact with electricity, such as ordinary utensils, which are directly cleaned with water. When this happens, there is a possibility of short circuit.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But we can clean the electric kettle in different ways. One of the simple and reliable methods is to use citric acid.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Before cleaning the electric kettle, check if there is something stuck inside or if there is any dirt. It knows where to clean. In some cases, there are rust stains on the inside of the kettle, and there are some things stuck in the filter. You can then do the following:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Fill the kettle half full with water.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Now add two spoons of citric acid powder. If you don't have citric acid, you can use distilled vinegar or lemon juice. But citric acid is the best option for removing rust stains.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After that, boil the water in the kettle.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-After boiling the water, let it cool for a while.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Remove the small filter inside the spout of the kettle (if you have one). It is easy to remove that filter.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Put that filter in freshly boiled water. And leave it for about 20-30 minutes. You do not need to boil the water at this time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-After 20/30 minutes, remove the filter from the kettle water. See if the rust color has gone/not gone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-If the rust does not come off, use a bottle brush or a cleaning product. Now after doing all this, wash the kettle with clean water.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-But if the kettle is still not clean, then sprinkle citric acid inside the kettle and make a paste and try to remove it with a clean cloth. And again repeat the above process.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- At that time, remove the small objects stuck in the filter using a toothpick.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- After heating the water in the kettle again, cool it down. Clean the inside of the kettle as before.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Now the outer part of the kettle should be cleaned. Since the outside of the kettle is usually made of stainless steel, you can dry it with a microfiber cloth. Then your job of cleaning the kettle is done.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Usually, it is not necessary to use the electric kettle for such a long time. It depends on how you use it. But cleaning the kettle regularly is good from the health point of view.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-66459716744044655312023-12-16T22:13:00.000-08:002023-12-16T22:13:48.146-08:00 Sitting near the phone or TV, the company can secretly listen to your gossip!<h2 style="text-align: left;"> Sitting near the phone or TV, the company can secretly listen to your gossip!</h2><p><br /></p><p>When is your own phone dangerous for you? Overuse or phone becomes a medium to listen to your conversation? Recently, a company called Cox Media Group (CMG) has claimed that it can listen to user conversations through smartphones, smart TVs or other devices.</p><p><br /></p><p>The company claims to have developed a technology capable of displaying advertisements based on user conversations. According to media organization 404 Media, CMG has named it as active listening technique.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://cdn.thewirecutter.com/wp-content/media/2021/02/20210208_wfh_tools_surv_1260.png?auto=webp&quality=75&crop=3:2&width=1024" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="534" data-original-width="800" height="427" src="https://cdn.thewirecutter.com/wp-content/media/2021/02/20210208_wfh_tools_surv_1260.png?auto=webp&quality=75&crop=3:2&width=1024" width="640" /></a></div><br /><p><br /></p><p>The company also posted a blog on its website and gave brief information about the capabilities and uses of this technology. Now the blog post has been deleted by the company. (Click here to read the blog archive written by the company.)</p><p><br /></p><p>The blog post mentions that this technology uses microphone data from smartphones and other devices for advertising. In other words, the company claims that it can listen to the pre-purchase conversation of the user through the microphone on the phone. According to the company, the data will be analyzed by AI and the user will be shown suitable advertisements.</p><p><br /></p><p>Similarly, CMG wrote in a blog post that active listening can be a suitable tool for advertisers. The company has claimed that the active listening law is also agreed to do such work.</p><p><br /></p><p>"When a new app is downloaded or updated, the terms and conditions appear before using the app. There is some context of active listening in it. Therefore, it is legal," the company's blog post states.</p><p><br /></p><p>CMG wrote that the advertiser can advertise only through this technology by targeting certain areas. For that, it is said that advertisements will be shown through streaming TV, streaming audio, display ads, YouTube, search engines, etc. based on the conversations of the users of that place.</p><p><br /></p><p>It has been mentioned that this technology, which has not been given much details, can understand customer behavior and show personalized ads based on personal interests. But digital security experts have said that the privacy and security of such a technology will be questioned in the market.</p><p><br /></p><p>However, whether this technology and marketing actually exists as claimed by CMG, is not yet certain. But from earlier, Facebook and other apps were claiming to listen to users for advertisements. Facebook has always denied this. Instead, Facebook says that the app uses the microphone only with the user's permission.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-76883583191899757102023-11-21T21:59:00.000-08:002023-11-21T21:59:31.423-08:00 Did Tiktok stop working on your phone? These apps may be an option for you<h2 style="text-align: justify;"> Did Tiktok stop working on your phone? These apps may be an option for you</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In Nepal, the government recently announced a ban on Tiktok. This decision has been implemented immediately. But Tiktok is not the only platform for sharing short videos.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There are many apps available in the market which are similar in nature to Tiktok. Some of them are similar to Tik Tok in some features from video editing.</p><p style="text-align: justify;"><br /></p><div class="separator" style="clear: both; text-align: center;"><a href="https://cdn.appuals.com/wp-content/uploads/2022/10/TikTok-App-Not-Working-in-Android-iOS.jpg.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://cdn.appuals.com/wp-content/uploads/2022/10/TikTok-App-Not-Working-in-Android-iOS.jpg.webp" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, Meta's reels and YouTube shorts can also be options. But those were the features that came within the existing app. But today we are going to discuss a separate platform, which is similar to Tiktok. Now such apps are available in abundance. Among them, we have selected seven platforms that are alternatives to Tiktok:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Funimate</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Funimate is a suitable choice as an app for making short videos and editing them. Its video editor has many filters and effects like transitions, overlays and key frames. It has built-in video templates and many music libraries.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Funimate can be used in both paid and free modes. Watermarks appear on videos when using the free version.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Likee</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Karib is a platform for creating and sharing Likei Short videos, similar to TikTok. It has its own tool for shooting and editing videos. Which includes visual effects, music, animations and filters.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Countdown timer before recording video, soft focus and beauty enhancement filter are some of its useful features. But users can also make longer videos using the live stream feature.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Lemon Eight (Lemon8)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This app was recently released by ByteDance, the parent company of Tiktok. However, it is discussed as an alternative to Instagram and Pinterest. However, since it is possible to create and share short videos, it has started to be said as an alternative to Tik Tok.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Especially this app has many features for travel, beauty and health related video content. It includes templates, filters, fonts, stickers, etc.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Zoomerang</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is a video editing and sharing app. In this you can create your own video template and monetize it. It has features to remove video background and add AI effects.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, you can see various challenges in the 'Challenges Tab' in the app. Usually, the app only runs such challenges for a limited time, so you have to be careful.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">huddles</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Huddles, which has an interface similar to Tik Tok, allows you to create one by shooting many short videos. Once a clip is recorded, it can be re-edited or filtered. But users can add text and music to the video.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It was initially named Bite and later Clash. Now it is known by huddles. Short videos up to 21 seconds can be shared.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Click here to download this app on Android and here to go to the website.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Thriller</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It mostly features celebrity content. But that doesn't mean you can't make your own videos. You can also easily make your own videos with it. For that, it has a video editing tool.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">From that you can trim the video, apply filters, put music. You can also collaborate with friends to make videos. This app was available in 2015 even before TikTok.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Snapchat</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, there is a large group of people who do not consider Snapchat to be a good alternative to TikTok. However, many short video content can be found in it. However, Snapchat's interface may seem a bit confusing for TikTok users.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Photos and videos on it remain only for a momentary time. But due to the filters available in it, the videos look attractive and attractive.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to use VPN?*</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Are you concerned about online security or privacy? Or your private information does not reach the hands of hackers? Want to keep your online shopping, search results, bill payment information safe? If yes, then it is possible.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">VPN can solve your problems like this. Today we are telling you in detail what VPN is and how it can help you.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Visiting or transacting on unsecured websites means exposing your private information and browsing habits. But VPN i.e. Virtual Private Network keeps you safe while using public network.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It encrypts your internet traffic and hides your online identity. In this case, it becomes difficult for third parties to track your online activity and steal your data.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">VPN connects your computer or smartphone to a server computer and you can browse the internet using that computer's internet connection. VPN is not illegal.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is used worldwide both institutionally and individually. Companies and government agencies also use it. So that your data can be protected.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is also used in countries where there is a strict governance system. In short, VPN can be used for your online security on public networks.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How does VPN work?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When you are connected to a secure VPN server, your Internet traffic travels through an encrypted tunnel. Which no one can track or see. Whether it's a hacker or the government or your internet service provider.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Of course, your internet data cannot be read or read. To understand how VPN works, let's look at the difference between two scenarios, without VPN and with VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When we use a website without a VPN, we connect to the site through an Internet Service Provider (ISP). The ISP gives us a unique IP address. Because the ISP directs and manages our overall Internet traffic.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In this case, the website we visit, the ISP can keep information about it. How can you protect our privacy in such a situation? Now let's talk about another situation i.e. internet connection with VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When we connect to the Internet through VPN, the VPN app (also known as VPN client) on our mobile or computer creates a secure connection with the VPN server. Even in such a situation, the internet that reaches us is rerouted through the ISP itself.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But the ISP cannot see the final destination of such traffic. And the website we are visiting cannot identify our real IP address. Now let's discuss why VPN is needed from here.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Why is VPN necessary?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Software giant Microsoft developed VPN for the first time in 1996. So that employees working outside the office can access the company's secure network.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As the productivity of the company increased due to this, other companies also started adopting it. In this case, you may think that at what time should we use VPN?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you think your privacy is very important for you, you can always use VPN. But there are some situations in which you may have to use a VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For example, you can use VPN while streaming, traveling, using public WiFi, gaming, shopping, online transactions, etc. How many types of VPN?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Basically there are two types of VPN, remote access VPN and site to site VPN. Remote Access VPN allows users to connect to another network through a private encryption tunnel.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It can be connected through the company's internet server or public internet. Site to Site VPN is also called Router to Router VPN. It is mostly used in the corporate sector.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Especially, there are important offices of the company in different areas. In this case, Site to Site VPN creates such a closed internal network, so that all locations can be connected together. It is called intranet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Overall, the benefits of VPN are that your browsing history, IP address, location, streaming location, device and web activity are hidden. Along with the advantages, it also has some disadvantages.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For example, slow speed, no cookies protection and no overall privacy. Despite being so secure, VPN cannot be called a service that can provide complete security. Because it can hide data from hackers, government and ISP.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But when the VPN service company wants, they can access that kind of data. Therefore, in such a situation, it is considered appropriate to take VPN service from a reliable VPN provider.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to choose a good VPN?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A VPN can provide adequate internet speed S. So that your privacy is protected and the service provider uses the latest protocol. May his credibility and reputation be good. Match its data limit according to your needs.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">So that you can know the location of the server. You should be able to access the VPN from different devices. VPN charges should be relevant. The highest encryption available. Good customer support.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You can get a free trial and also have the facility to block ads. On which devices can VPN be used? VPN can be used on all types of devices that can use the Internet.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Most of the VPN service providers are providing this kind of service on different platforms. For example, laptops, tablets, smartphones, voice assistance, smart appliances, and smart TVs.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The world's best VPN service providers are also providing free VPN services. But there may be some limitations like data limit. We can use it for online security and privacy. But using it for any illegal or immoral work can be risky</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There are many paid and free VPNs available on Google Play Store and iOS App Store. You can download a suitable app and select a suitable location to connect to the VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Best VPN available for free</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">1. Windscribe (Windscribe)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">2. PrivadoVPN</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">3. Hide.me (hide.me)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">4. Proton VPN</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">5. ExpressVPN</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to use VPN?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">First, go to Google Play Store or iOS App Store and download a suitable VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Once the app is downloaded, open it and tap on connect option</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">On the home page of the app, you can see the name of a country as a location, click on it.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After the VPN connection is ready, you can also see the sign that the VPN connection has been established in the notification bar on top of the mobile.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But when running on VPN in this way, foreign server location is used, so it depends entirely on international bandwidth. As a result, using the Internet with VPN may feel a bit slow.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-36768417359452513492023-11-21T21:50:00.000-08:002023-11-21T21:50:56.725-08:00 To make the ban on Tiktok effective, the government is also shutting down free VPN and open DNS<h2 style="text-align: justify;"> To make the ban on Tiktok effective, the government is also shutting down free VPN and open DNS</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To make the ban on Tik Tok effective, the government is also going to ban free VPN and Open DNS. The regulatory Nepal Telecommunication Authority has started to take all possible measures to ban Tiktok within Nepal.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The cabinet meeting on October 27 decided to ban Tiktok, the most popular social network in Nepal. The government has taken such a decision saying that it has negatively affected the social harmony and social environment.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://www.aljazeera.com/wp-content/uploads/2023/02/2022-08-22T072530Z_1806654462_RC291W90XKYC_RTRMADP_3_TECH-TIKTOK.jpg?resize=770%2C513&quality=80" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="513" data-original-width="770" height="426" src="https://www.aljazeera.com/wp-content/uploads/2023/02/2022-08-22T072530Z_1806654462_RC291W90XKYC_RTRMADP_3_TECH-TIKTOK.jpg?resize=770%2C513&quality=80" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">With the ban on Tiktok, users have started using alternative methods like free VPN and Open DNS to use Tiktok. By saying that they have challenged the government's decision to ban Tiktok, the authority has moved forward in the direction of banning such alternative measures as well.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Authority sources said that homework is being done to ban free VPNs and open DNS like Google and Cloudflare. "We have received a clear mandate from the government to implement the ban on Tiktok effectively," said an authority official on condition of anonymity, "for that it is natural to think about all possible options."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Regarding the fact that Open DNS of Google and Cloudflare is popular and reliable all over the world, the officer of the authority argued that it cannot be said that the DNS of Nepal's internet service provider is insecure and unreliable. According to authority sources, the collection of such free VPNs and their IP addresses is currently underway.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Mobile and Internet service providers are said to block such VPNs on their servers. According to the analysis of the officials of the Authority, the use of free VPN and Open DNS will not only bypass the ban, but also put the users themselves at cyber security risk.</p><p style="text-align: justify;"><br /></p><h2 style="text-align: justify;">Authorities instruct service providers to block Free VPN and Open DNS to block Tik Tok</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The regulator Nepal Telecommunication Authority has instructed the mobile and internet service providers to block Free VPN and Open DNS as well. The authority sent a letter to the service provider on Sunday and instructed them to ban alternative measures to prevent the operation of Tiktok within Nepal.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to an internet service provider company, the free VPN will be blocked based on the IP address provided by the regulator Nepal Telecommunication Authority. Similarly, it is understood that the service provider is currently working in the direction of blocking access to Tiktok by implementing the regulator's instructions and blocking Open DNS as well.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Currently, some users in Nepal are using various free VPN and open DNS of Google and Cloudflare to access Tiktok. Based on the IP address provided by the regulator, the service provider has started preparing to block the free VPN.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, preparations are underway to ban Google and Cloud Flare, which are widely used in Nepal, and other open DNS. "We have been instructed by the regulator to create an environment where Tiktok does not operate in Nepal under any circumstances," said an internet service provider owner to Tekpana. After that, any access to restricted sites and apps using Open DNS will be blocked.”</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The government had decided to ban Tiktok on October 27 because it had a negative impact on social harmony and social environment. The regulatory authority has put pressure on the service providers to implement the same decision.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-14953354625237783442023-11-06T22:42:00.000-08:002023-11-06T22:42:01.812-08:00 Now Google search will help solve geometry, physics and calculus problems<h2 style="text-align: justify;"> Now Google search will help solve geometry, physics and calculus problems</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Now with the help of Google search and lens, problems of geometry, physics and calculus can be solved. Google has released an update for its search engine and lens tool for that.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The new update allows you to type an equation into the search bar or take a photo of it with Google Lens to get the correct answer with an explanation of each step. Not only this, it is said that this new feature will also provide a solution to textual problems.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://9to5google.com/wp-content/uploads/sites/4/2023/10/Google-Search-trigonometry.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="902" data-original-width="1600" height="361" src="https://9to5google.com/wp-content/uploads/sites/4/2023/10/Google-Search-trigonometry.webp" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For example under high school physics concepts "vf = vi + at." It can do things like finding average acceleration using equations. You can also directly type "[math solver]" in the search bar to access the math problem solving tool.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to TechCrunch, this function, which is currently available only in the desktop version, will also be released on mobile by the end of this year. Another useful new feature is the Geometry Solver, a tool that helps solve geometric problems.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When solving a geometric equation requires multiple visualizations, Lens can explain both the visual and the written part of the problem. "However, Lens can only interpret "certain trigonometric equations," the company wrote in its blog, citing Google product chief Robert Wong.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some equations that Google's Geometry Solver can solve instantly</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To find the area of a triangle, A = 1/2 x height x base or Heron's formula.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To find the perimeter of a triangle.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apply "Isosceles Triangle Theorem" to find the perpendicular or angle of an unknown edge.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apply "Pythagorean Theorem" to find the length of a right angle.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"For our geometry experience, we wanted to focus on a subset of problems that could ultimately have a larger impact covering more diverse areas of geometry," Wong said. Image Credits: Google</p><p style="text-align: justify;">Image Credits: Google</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For the physics and geometry solver, Google uses its Multitask Unified Model (MUM), which understands queries in different formats, including text, images, and video.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"Understanding language and curiosity is a complex challenge in itself, we need specialized systems to ensure the most helpful results," explains Wong.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"In this case, the feature needs to be able to correctly understand information in both textual and pictorial formats in order to provide an accurate explanation of a problem and a step-by-step truthful response with letters and diagrams."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Google has not revealed the percentage of accurate results this new feature can provide. However, Wong says, "Our tests show that the accuracy rate is very high."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In addition to problem solving, Google has also released a new 3D model for search. It allows you to explore interactive diagrams on about 1000 topics including biology, chemistry, physics and astronomy.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Also, Google introduced a 3D model in the year 2021 with more than 200 diagrams of chemistry, biology, physics and anatomy concepts. A few years later, the tech giant launched an interactive feature, "Practice Problems," for users to learn and test their knowledge.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It includes topics such as mathematics, chemistry and physics at the high school level. Recently, Google Search also rolled out an English tutorial tool that provides prompts and makes you pronounce the given vocabulary out loud.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-12192733773821592772023-11-06T22:37:00.001-08:002023-11-06T22:37:03.579-08:00 MDMS website down after increased traffic with news of unregistered phones being blocked<h2 style="text-align: justify;"> MDMS website down after increased traffic with news of unregistered phones being blocked</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> The website of Mobile Device Management System (MDMS) of Nepal Telecommunication Authority is down. After the publication of the news that the authority will shut down the phones that are not registered in MDMS after Monday, the website was down because it could not handle the traffic.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://aawaajnews.com/wp-content/uploads/2022/09/The-Best-Phones-in-2022-updated-August.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="675" data-original-width="1200" height="360" src="https://aawaajnews.com/wp-content/uploads/2022/09/The-Best-Phones-in-2022-updated-August.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The last date given by the authority to register phones in the system is ending today, Monday. Achutanand Mishra, co-spokesperson of the authority, said that the site was down when most of the users tried to register at the same time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"Many customers may have tried to register their phones. That's why the site is down due to high traffic," said Mishra, "We are understanding what the solution can be."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Currently, when searching for mdms.nta.gov.np in the browser, one can see the message 'This site cannot be reached'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> The regulator Nepal Telecommunication Authority has finally decided to implement the rule that mobile phones cannot be used in Nepal without registration.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In a conversation with Tekpana, the chairman of the authority, Purushottam Khanal, informed that this system is going to be implemented with 'high-end' and expensive smartphones.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"We are starting the implementation of MDMS from the new iPhone 15 series," he said, "at the initial stage, we are shutting down the phones of that series that are operating in Nepal without registration."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to Chairman Khanal, about 2,500 smartphones of the iPhone 15 series, which were recently introduced in the market, were found to be operating without being registered in the MDMS. He said that after 9 pm tomorrow, those phones will stop working inside Nepal.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">"We are not shutting down all the phones, including the cheap ones, so that they do not work in Nepal at once, but we are starting with the expensive phones," President Khanal said further, "After the iPhone 15, we will include other flagship phones."</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The authority issued a notice on this 4th October and informed that the mobiles which are not registered in MDMS will not work after 15 days.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The authority has made it clear that telecommunications services will be interrupted on phones that are not registered in the system. Also, even before the authority extended the deadline for implementing MDMS many times, this system could not be fully implemented. Due to the same context, some people still do not take seriously the notification of the authority of non-operation of unregistered mobile phones.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-68460426374990598342023-10-16T23:10:00.001-07:002023-10-16T23:10:15.429-07:00 10 features of Google Docs that will make you want to use them again and again after using them once<h2 style="text-align: justify;"> 10 features of Google Docs that will make you want to use them again and again after using them once</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There are many lesser-known features in Google Docs that once you know them, you will always want to use them. From creating documents quickly to writing without distraction, Google Docs has it all.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://techpp.com/wp-content/uploads/2022/05/google-docs-features.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="400" data-original-width="700" height="366" src="https://techpp.com/wp-content/uploads/2022/05/google-docs-features.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Today we are telling you about those secret features.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Create new docs instantly</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You don't have to go to Google Drive or Docs every time to open a new blank document. Just type a few letters in the browser to save your time and get the job done.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For that, type DOC dot new (doc.new) in English in the search bar of any browser and press enter. Immediately, a new document opens in the Google account you are using. Where you can work.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Tool Finder</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Knowing which tools are where in Docs can be a daunting task for new users. But as a solution to this problem, Google has given 'Tool Finder' in Docs. It is much easier to use than to manually go through each menu and find out what tools are available.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">From this you can find all the tools in the menu bar. Click on the 'Help Menu' above to use the Tool Finder. Then click on 'Search the Menus' that appears. From there you can find the tool you need.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Or you can also press Alt+backslash (Alt+/) to access the Tool Finder. Now the tool finder will appear in the upper left part of the screen. There you can type the name of the tool you need.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Pageless format</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Pages open in Google Docs by default. The page can be used to see how the document will look when printed. However, not everyone prints documents in this digital age.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you just want a digital file, you don't need that many pages in Docs. This way you can work in a pageless format when creating a document.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For this, go to the File menu and go to Page Setup. Click the Pageless tab there and select 'OK'. But doing so only leaves the document you are working on in pageless format.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But if you want all the documents you work with to be in this format, you can select 'Set as default' here.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Translation</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">You have to read documents in other languages, but if you don't know that language, don't worry about Google Docs. To solve this problem, Google has provided an in-built translation feature in Docs.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For this you need to go to 'Translate Document' in the Tools menu. After that, in the dialog box that appears, you will be given the option to select different languages. Now after clicking on 'Translate', the translated document will open in a new tab.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Explore tool</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Whether you need content outside of the document you're working on, need to revisit what you've already written, need images, the Explore tool is useful for all of these. This tool helps to search outside (Internet and Google Drive) while working on the document.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To use it, you have to go to the Tools menu and go to Explore. Apart from this, you can also access the tool by clicking Control, Alt, Shift and I (Ctrl+Alt+Shift+I) together.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This tool comes on the left side of the screen. You can write what you need in it. Similarly, you can search by clicking on web, image and drive only in that place.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Automatic mark down</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">When you are working on a document, sometimes you need to make it bold, sometimes you need to underline it. You have to use the mouse every time for such common tasks. But that work can be done in a few moments with the automatic mark down tool.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">With this you can change the format of your letters based on the input. It may take some time to learn to use it. Once you get the hang of it, it will save you a lot of time.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">To access it, go to Preferences within the Tools menu. There are various options, now click on the one you need and press 'OK'.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Double full screen</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature is the best option if you want to be able to concentrate while working on a document without any interruptions. For this, go to the View menu and click on Full Screen.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Then click on the three dots on the top right. After this, the browser settings will open. Now click on Zoom from the various options there.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Or you can also click function key 11 (F11). After doing this you will not see some options in your document. But the screen is full of documents. Now to return to the previous state, after pressing Escape (Esc) key, press F11.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Google Photos</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Sometimes a photo while working is also required. In this case, you can directly use your photos in Google Photos. For this you must have downloaded the Google Photos app on your phone.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Also, it should have automatic photo sync. For this, go to the Insert menu and click Image. Now go to Photos from the various options that come there. Then you will be able to see the photos on the right side of the screen.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Glossary</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">While creating a document, sometimes such words come, the meaning of which is not known. When such a situation occurs, you either turn to the dictionary or search for its meaning online.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But the dictionary feature of Google Docs doesn't have to do any of that. To run the dictionary in Docs, go to the Tools menu. For this you can also press Control, Shift and Y (Ctrl+Shift+Y) together. Dox's dictionary provides pronunciation, meaning, and synonyms for words.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Automatic Substitution</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"> </p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you have sentences that you have to write over and over again, you can save time by using the automatic substitution feature. Using this feature you can create a short form of any sentence.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">As you type, Docs automatically creates complete sentences. To use this feature, go to Preferences within the Tools menu. Now click on the substitution tab there.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">There, write the short form of the sentence you want in the left part and the full form in the right part. After that, if you click on 'OK', this work will become automatic.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-88234268055542293072023-10-16T23:04:00.003-07:002023-10-16T23:04:47.697-07:00 Do you use a password manager? Know its benefits and risks<h2 style="text-align: justify;"> Do you use a password manager? Know its benefits and risks</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In the last few years, password managers are becoming very important for individuals or organizations. Password Manager provides users with password protection, auto login and strong passwords.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">However, it also has its weaknesses. For example: Google Advisory published a report last January and revealed that the password manager automatically entered login details even on unauthorized sites. Such incidents remind users that there are always risks in password managers.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://static.tildacdn.com/tild3336-3335-4561-a638-616631626431/Untitled_design_-_20.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="940" data-original-width="1680" height="358" src="https://static.tildacdn.com/tild3336-3335-4561-a638-616631626431/Untitled_design_-_20.png" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Therefore, it is very important for the user to understand such vulnerabilities and to exercise constant vigilance. More specifically, you should be more aware of the auto-fill feature on the website.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Two Edges of Password Manager</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Password managers are applications designed to store a database of user passwords. Their purpose is to solve the problem of having to remember difficult and complex passwords. It requires a master password to operate. Then the user can access other passwords stored there.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A password manager can generate complex passwords. Also, it can be auto-filled on various websites and apps. But the risk is also the same. Because hackers can hack the server where the passwords are saved.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Problems with auto-filling</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">A password manager has been developed to further strengthen security. But the password manager's auto-filling can auto-fill passwords on suspicious or unauthorized websites, which is a big problem.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">This feature becomes a problem when users start using this feature without studying the site. On the other hand, cybercriminals are trying to trick such password managers by creating phishing sites. Where careless users can easily get trapped.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Generally, different tools support different devices and software. Therefore, it is better to get a password manager that meets your needs and works well. There are many types of password managers available in the market now.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Some password managers don't work on all devices, and some only work on specific web browsers. But password protection is added to all of them. It is important in every way. The password manager's protective mechanism can prevent some user errors and prevent damage. But usually a weak password is caused by the person himself.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Strong password</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">The main problem is having a weak password. A password manager can solve this to some extent. Because the passwords generated by the password manager tend to be long and strong. You can also set a strong password yourself by following the method below.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Lowercase letters: Recent studies have concluded that lowercase letters (upper/lowercase) do not pass strongly. However, it is suggested to strengthen the security. You can use this method if you create a password with less letters.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Long Alphabets: Strong Passwords Another solution is to use long alphabet passwords. This is one of the most effective password protection strategies. It is also said to challenge the efforts of hackers.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Use of symbols: Recent studies have shown that passwords become stronger when symbols are used. It is said that the password is stronger than upper/lower case.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Unique words: Another way to protect your password is to create your own words. By doing this, hackers cannot easily guess the password. But by using words from the dictionary, the password can be easily known by the hacker.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">By following these steps, you can strengthen your passwords and stay safe in the digital world. Do not rely only on the password manager used for this. You yourself need to improve your online behavior.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-67016408155951443122023-09-26T21:21:00.002-07:002023-09-26T21:21:41.005-07:00 Now you can buy blue tick for Facebook and Instagram account from Nepal<h2 style="text-align: justify;"> Now you can buy blue tick for Facebook and Instagram account from Nepal</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Now Verification badge (blue tick behind the name) can be obtained for Facebook and Instagram accounts from Nepal. The company has provided this facility worldwide since Wednesday morning.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://encdn.ratopati.com/media/news/_128679005_ca1e7947300764d46b5d9171b083c42e96a7a1240_260_5480_30831000x563.jpg_GtXczpGIca.webp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://encdn.ratopati.com/media/news/_128679005_ca1e7947300764d46b5d9171b083c42e96a7a1240_260_5480_30831000x563.jpg_GtXczpGIca.webp" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Earlier, there was no facility to get verification interest by paying fee from Nepal. Under this feature, which is only available in certain areas, Blue Tick can be purchased by paying $7.99 (about one thousand rupees) per month.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to the company, Facebook will make the account of users who take such a feature more secure. Similarly, paying users will get the customer support they want.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Along with this, the company has also announced business verification facility. Under this, users who use Facebook for business purposes can pay $22 for Instagram or $35 for both Facebook and Instagram. According to The Verge, this facility will be available from next week. In this way, users who take business verification will get access to exclusive features as well as support.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In addition, Meta said that users who verify will increase their post reach and will be shown at the top of the search results. Similarly, on WhatsApp, such users can create a web-like landing page.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Elon Musk, the owner of X, known as Twitter, announced a short time ago that the platform will provide a feature where you can get a verification mark by paying a fee.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">After some time, the company started providing the verification mark to the users who paid the fee and later removed the legacy Blue Check. As a result, all users who needed Blue Verification later had to pay a fee to X and get that checkmark.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">It is said that users who take the Meta Verification facility for business must confirm that they are a business.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0tag:blogger.com,1999:blog-7558150576767209623.post-37658113422148154992023-09-26T21:18:00.002-07:002023-09-26T21:18:17.455-07:00 These iPhones are getting iOS 17 update, how to install?<h2 style="text-align: justify;"> These iPhones are getting iOS 17 update, how to install?</h2><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Apple will also release iOS 17 shortly after releasing the iPhone 15. In this latest operating system of Apple, standby, journal app etc. have been updated.</p><div class="separator" style="clear: both; text-align: center;"><a href="https://i.ytimg.com/vi/lFQUTboDqRU/maxresdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="450" data-original-width="800" height="360" src="https://i.ytimg.com/vi/lFQUTboDqRU/maxresdefault.jpg" width="640" /></a></div><br /><p style="text-align: justify;"><br /></p><p style="text-align: justify;">But older model iPhones will not get this update. In other words, if you have iPhones before 2017, you will not be able to get the iOS update.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you don't know which iPhone model you have, you can find out by following the steps below:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-Go to settings.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Go to About by tagging in General.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- Now go to model name. There you will see your model name.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">In which model is iOS 17 available?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">iOS 17 is not available on iPhone 6, iPhone 7, iPhone 8, iPhone 8 Plus and iPhone X. Since iOS 16, updates stopped coming to these phones.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">According to Apple, the following phones can get the iOS 17 update:</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone XS</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone XS Max</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone XR</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 11</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 11 Pro</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 11 Pro Max</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 12</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone 12 mini</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 12 Pro</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 12 Pro Max</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 13</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone 13 mini</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 13 Pro</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone Pro Max</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone SE (Second Generation and Later)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">-iPhone 14 (including Plus)</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">- iPhone 14 Pro</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">How to install iOS 17?</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If your device supports iOS 17, you have two options. First September 18 i.e. wait for Monday. After iOS 17 is publicly available, you'll need to go to Settings > Software Update (Settings > General > About > Software Update). From there you can install.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">If you have auto-update 'on', it will install automatically in a few days.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">On the other hand, you can install the beta version before the official release. For this you need to install Release Candidate Beta (RC) Beta. Which is almost identical to the last version.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">For this go to Settings>General>About Software Update. Click on the beta update there. Now click on Developer Beta option there. Now RC One (RC1) update is available. But what needs to be understood is that RC beta is in the software development phase. Therefore, it may contain various bugs. You should be aware of this.</p><p style="text-align: justify;"><br /></p><p style="text-align: justify;">Similarly, if you want to install the latest updated on your iPhone, please turn off the beta update.</p>RANJIT SHRESTHAhttp://www.blogger.com/profile/01191583662897875550noreply@blogger.com0