Posts

Photos of 'Couple Challenge' started appearing on porn sites!

Image
Photos of 'Couple Challenge' started appearing on porn sites! In the last few days, many trends have been running on social media in the name of the challenge. In which, as a couple challenges, users are posting photos with their partners on social media. In the name of Couple Challenge, users are disclosing their personal information. Based on this, there is a lot of risks that a hacker can target. Be careful if you are also posting a photo with your smiling partner on Facebook, Instagram, and Twitter including the hashtag Couple Challenge. This is not just a hashtag, but a web of cybersecurity experts hacking hackers to gather personal information. It's okay to take selfies. Posting it on social media can also be considered natural. But if you are posting your picture and personal information on a hashtag trend on social media, it may not be a challenge for others but a challenge to your own life. This trend is not only in Nepal but also in neighboring countries like Indi

The number of free Linux learners has exceeded one million, will you take it too?

Image
The number of free Linux learners has exceeded one million, will you take it too?  Most of us know that Linux is an operating system like Microsoft Windows. As an alternative to Windows, most individuals and organizations are using Linux on computers and laptops. Its use is also increasing as Linux is more trusted than Windows in terms of security. Based on this system, the company has been providing various courses for free worldwide for a long time. It is mentioned that the number of trainees through the 'Introduction to Linux' training course conducted by the Linux Foundation has exceeded one million. The foundation has just launched a new course in the form of the sixth series. At the beginning of the sixth series of the course, the number of participants has been mentioned to have exceeded one million. The course helps the students to work in various distributions of Linux using graphical interface and commands. This course has been helping those who want to work in the IT

Misuse of social media, falling into the trap of the law

Image
Misuse of social media, falling into the trap of the law Have you ever teased or humiliated someone using social media or electronic media? Or have you insulted someone electronically by saying yes? If you do, you may be subject to severe penalties. For the sake of fun, yes, he is my man. The 'Information Technology Bill 2075', which was introduced by the government in the federal parliament and has been under discussion since Wednesday, has defined such acts as a punishable offense. The government has presented the bill in the federal parliament to make electronic media decent, dignified, and systematic. The bill clearly defines the use of social media or electronic systems as a punishable offense to constantly harass or tease another person. Some are even prohibited from humiliating, discouraging, insulting, or reprimanding others. If such an act is committed, the offender will be fined up to Rs. 1 million or five years imprisonment or both depending on the amount of the offe

Transfer Hotmail and Yahoo Emails to Gmail

Image
Transfer Hotmail and Yahoo Emails to Gmail  People used Yahoo and Hotmail a lot in the early days. But with the advent of Gmail, the use of these email services has been declining. If you've switched from Yahoo or Hotmail to Gmail, you probably have old data in those emails. If you want to transfer data from those emails to Gmail, here's an easy way to do that. Gmail is the most used email service in the world. Today, more than 1.8 billion people are using Gmail. It has features like Google Drive Integration, Email Schedule Feature, Advanced Search, Spam Block, Confidential Mode, etc. Let's get started with how to transfer data from any other email service to Gmail. From Yahoo to Gmail It's very easy to transfer data from Yahoo Mail to Gmail. To do this, you first need to login to your Gmail account on the desktop. If you're doing it over the phone, log in to Gmail in a web browser. After logging in, you need to go to Gmail settings. Click on the Account & Impor

Photos can be a malware attack!

Image
Photos can be a malware attack!  How sensitive are you to the security of your device? If you are very sensitive, you will not open a file or attachment from anywhere so easily. You are always aware of the dangers of various types of cyberattacks such as phishing attacks or scams. Therefore, before opening or downloading a file, you need to make sure at the outset about the person and purpose of sending it. But even if someone sends you a picture, you pay the same attention to Rs Of course, when it comes to photos, you're not so focused on security. Just take the photo lightly and open it. Save to your album. But in reality, it is an unhealthy practice. If those images are also melancholy, the result is just as deadly. It damages your device and steals data. The latest example of this is the Instagram vulnerability revealed by the cybersecurity company Checkpoint this week. In which it was revealed that any crafted picture can hijack the entire Instagram account. However, Facebook

Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong?

Image
Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong? Indian media has published the news that hackers from China and North Korea have made a strong presence in Nepal and are spying on India. According to a recent report by Zee News India, Nepal's KP Oli government is becoming a hub for China's State Security Bureau, Beijing's Intelligence Army, and North Korean cyber and money laundering stage operations. In the news, it has been mentioned that the clear source of Nepal Hub has not been revealed by the 'official source'. Citing sources, North Korean hackers have been working with Chinese intelligence agencies to target the Indian system, disrupting the banking system, and stealing sensitive technology. According to the news, the hackers are trying to hack into the Indian system by injecting special computer programs like Icebug, Hidden Linux, and APT 12. It has also been mentioned that Chinese and North Korean hackers have be

Easy to bring money for software export to Nepal

Image
Easy to bring money for software export to Nepal Nepal Rastra Bank has made it easier for companies and institutions in Nepal to bring home foreign currency due to their efficiency and expertise. The central bank has made arrangements for the remittance of foreign currency to Nepal from abroad by making it easy to repatriate online and e-commerce transactions. With this arrangement, it will be easier for those who bring money from abroad to stay in Nepal and make software. Earlier, when there was no such arrangement, companies working on software in Nepal used to bring money by showing various purposes and resources. Since most of the companies in Nepal have foreign partner organizations, they used to bring only the required amount here knowing that the work done here would be paid by the company abroad. Despite the recent increase in activities in the field of information technology in Nepal, businessmen have been saying that they have been hit hard by treating goods like exports to b

Mobile device management system ready, delay in connection due to corona

Image
Mobile device management system ready, delay in connection due to corona In order to make the import, sale, distribution, and use of mobile sets systematic and effective, the software of the mobile device management system to be brought into operation by the Nepal Telecommunication Authority has been prepared. Although the software was ready for the system, which is being constructed at a cost of Rs. NEA spokesperson Min Prasad Aryal said that technicians had to come from Malaysia for additional equipment and its connection but could not come due to the coronavirus. The contract was awarded to a Malaysian company. After the operation of this system, which is accessible to the Customs Department, Nepal Police, and NEA, those who import mobile sets into Nepal should register at the beginning. After putting the IME number there, it is found out whether it is genuine or not according to the database taken by NEA from GSMA. NEA will allow import only after the genuine is set. The NEA is con

Here are 10 things not to do when entering a password

Image
Here are 10 things not to do when entering a password Many apps and devices require passwords for security. Remembering passwords is not an easy task. It is not possible to keep so many passwords in a copy. We use words that make it easier for us to remember passwords. However, technology experts say that such a simple password is not good or secure for apps and devices. So how to keep your password secure? According to the tech-savvy Indian newspaper Tech-Hindustan Times, the following should be kept in mind when entering a password: 1. Never use the same password on multiple apps or devices. Because if someone hacked one of your apps or devices, they would try to use the same password on others. And, with the same password, everyone has access to it. 2. You should not enter your first name password. The names of parents, siblings, or relatives should not be used. These passwords are easy for others to find. 3. Never use your credit or debit card PIN number or your phone number. 4. Do

Run WhatsApp? Learn the safe way.

Image
Run WhatsApp? Learn the safe way. WhatsApp is an easy messaging app. Messages are considered quick and easy to make calls. Its use in Nepal has been increasing lately. Lately, insecurity has been increasing in online messaging platforms. Such platforms are as safe as they are handled with care. It is also very safe to take a little precaution easily. 1 Make your profile visible only to those in your contacts WhatsApp allows only those on your contact list to view your profile. To do this, go to Settings and click on Account. Then go to privacy. Once there, there is an option called profile photo. There are three options to see who can see your profile photo. From there, choose 'My Contacts'. This will prevent users who are not on your list from viewing your profile. 2 Block people who don't want to chat We have saved many people's numbers on mobile. But with all of them, we may not want to chat and call on WhatsApp. The number given or taken for personal and temporary w