Posts

Round smartphone in 2020

Image
Round smartphone in 2020 The circular (circular phone) smartphone in CES 2020 has attracted a lot of attention. The US startup unveiled the smartphone at CES this week. The other product in the exhibition held in Las Vegas is a very diverse variety of products. It costs  $700. The 2G mobile phone with this type of design came earlier in 2016. The 3.5-inch round-shaped mobile has a nine-operating system with a touch screen. The mobile has a 13-megapixel camera on the front and back. Especially this mobile is made for people with small hands. This dual SIM mobile has the feature of 2 headphone jacks. It uses 2GB of RAM, 16GB of storage, and a 2,000mAh battery. According to Christina Sawyer, CEO of Circle Company, some work is being done to fit various other gaming apps into this circle. The Circle phone has a different system than the Apple iPhone and Samsung brands.

Facebook has introduced a feature to chat between Instagram and Messenger

Image
Facebook has introduced a feature to chat between Instagram and Messenger Facebook on Wednesday announced plans to allow Instagram and Messenger users to chat with each other. Instagram users will now be able to experience different types of messaging as soon as the new option is updated. Like Messenger, you can change the chat color, react through emoji, watch videos together, delete messages, and other features. At the same time, such users will have the option to chat with friends who use Facebook. Apple will provide the information. These features will be available in Instagram's inbox as soon as the user agrees to update. With Crush Platform Messaging Interoperability, users will be able to chat with their friends and family on the world's two largest social networks through the same messaging app and use other chat apps. According to Facebook, the new interoperability will work whether Instagram users have a Facebook account or not. Facebook plans to add its WhatsApp to t

Photos of 'Couple Challenge' started appearing on porn sites!

Image
Photos of 'Couple Challenge' started appearing on porn sites! In the last few days, many trends have been running on social media in the name of the challenge. In which, as a couple challenges, users are posting photos with their partners on social media. In the name of Couple Challenge, users are disclosing their personal information. Based on this, there is a lot of risks that a hacker can target. Be careful if you are also posting a photo with your smiling partner on Facebook, Instagram, and Twitter including the hashtag Couple Challenge. This is not just a hashtag, but a web of cybersecurity experts hacking hackers to gather personal information. It's okay to take selfies. Posting it on social media can also be considered natural. But if you are posting your picture and personal information on a hashtag trend on social media, it may not be a challenge for others but a challenge to your own life. This trend is not only in Nepal but also in neighboring countries like Indi

The number of free Linux learners has exceeded one million, will you take it too?

Image
The number of free Linux learners has exceeded one million, will you take it too?  Most of us know that Linux is an operating system like Microsoft Windows. As an alternative to Windows, most individuals and organizations are using Linux on computers and laptops. Its use is also increasing as Linux is more trusted than Windows in terms of security. Based on this system, the company has been providing various courses for free worldwide for a long time. It is mentioned that the number of trainees through the 'Introduction to Linux' training course conducted by the Linux Foundation has exceeded one million. The foundation has just launched a new course in the form of the sixth series. At the beginning of the sixth series of the course, the number of participants has been mentioned to have exceeded one million. The course helps the students to work in various distributions of Linux using graphical interface and commands. This course has been helping those who want to work in the IT

Misuse of social media, falling into the trap of the law

Image
Misuse of social media, falling into the trap of the law Have you ever teased or humiliated someone using social media or electronic media? Or have you insulted someone electronically by saying yes? If you do, you may be subject to severe penalties. For the sake of fun, yes, he is my man. The 'Information Technology Bill 2075', which was introduced by the government in the federal parliament and has been under discussion since Wednesday, has defined such acts as a punishable offense. The government has presented the bill in the federal parliament to make electronic media decent, dignified, and systematic. The bill clearly defines the use of social media or electronic systems as a punishable offense to constantly harass or tease another person. Some are even prohibited from humiliating, discouraging, insulting, or reprimanding others. If such an act is committed, the offender will be fined up to Rs. 1 million or five years imprisonment or both depending on the amount of the offe

Transfer Hotmail and Yahoo Emails to Gmail

Image
Transfer Hotmail and Yahoo Emails to Gmail  People used Yahoo and Hotmail a lot in the early days. But with the advent of Gmail, the use of these email services has been declining. If you've switched from Yahoo or Hotmail to Gmail, you probably have old data in those emails. If you want to transfer data from those emails to Gmail, here's an easy way to do that. Gmail is the most used email service in the world. Today, more than 1.8 billion people are using Gmail. It has features like Google Drive Integration, Email Schedule Feature, Advanced Search, Spam Block, Confidential Mode, etc. Let's get started with how to transfer data from any other email service to Gmail. From Yahoo to Gmail It's very easy to transfer data from Yahoo Mail to Gmail. To do this, you first need to login to your Gmail account on the desktop. If you're doing it over the phone, log in to Gmail in a web browser. After logging in, you need to go to Gmail settings. Click on the Account & Impor

Photos can be a malware attack!

Image
Photos can be a malware attack!  How sensitive are you to the security of your device? If you are very sensitive, you will not open a file or attachment from anywhere so easily. You are always aware of the dangers of various types of cyberattacks such as phishing attacks or scams. Therefore, before opening or downloading a file, you need to make sure at the outset about the person and purpose of sending it. But even if someone sends you a picture, you pay the same attention to Rs Of course, when it comes to photos, you're not so focused on security. Just take the photo lightly and open it. Save to your album. But in reality, it is an unhealthy practice. If those images are also melancholy, the result is just as deadly. It damages your device and steals data. The latest example of this is the Instagram vulnerability revealed by the cybersecurity company Checkpoint this week. In which it was revealed that any crafted picture can hijack the entire Instagram account. However, Facebook

Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong?

Image
Chinese and North Korean hacker's 'transit' Nepal! Indian concern right or wrong? Indian media has published the news that hackers from China and North Korea have made a strong presence in Nepal and are spying on India. According to a recent report by Zee News India, Nepal's KP Oli government is becoming a hub for China's State Security Bureau, Beijing's Intelligence Army, and North Korean cyber and money laundering stage operations. In the news, it has been mentioned that the clear source of Nepal Hub has not been revealed by the 'official source'. Citing sources, North Korean hackers have been working with Chinese intelligence agencies to target the Indian system, disrupting the banking system, and stealing sensitive technology. According to the news, the hackers are trying to hack into the Indian system by injecting special computer programs like Icebug, Hidden Linux, and APT 12. It has also been mentioned that Chinese and North Korean hackers have be

Easy to bring money for software export to Nepal

Image
Easy to bring money for software export to Nepal Nepal Rastra Bank has made it easier for companies and institutions in Nepal to bring home foreign currency due to their efficiency and expertise. The central bank has made arrangements for the remittance of foreign currency to Nepal from abroad by making it easy to repatriate online and e-commerce transactions. With this arrangement, it will be easier for those who bring money from abroad to stay in Nepal and make software. Earlier, when there was no such arrangement, companies working on software in Nepal used to bring money by showing various purposes and resources. Since most of the companies in Nepal have foreign partner organizations, they used to bring only the required amount here knowing that the work done here would be paid by the company abroad. Despite the recent increase in activities in the field of information technology in Nepal, businessmen have been saying that they have been hit hard by treating goods like exports to b

Mobile device management system ready, delay in connection due to corona

Image
Mobile device management system ready, delay in connection due to corona In order to make the import, sale, distribution, and use of mobile sets systematic and effective, the software of the mobile device management system to be brought into operation by the Nepal Telecommunication Authority has been prepared. Although the software was ready for the system, which is being constructed at a cost of Rs. NEA spokesperson Min Prasad Aryal said that technicians had to come from Malaysia for additional equipment and its connection but could not come due to the coronavirus. The contract was awarded to a Malaysian company. After the operation of this system, which is accessible to the Customs Department, Nepal Police, and NEA, those who import mobile sets into Nepal should register at the beginning. After putting the IME number there, it is found out whether it is genuine or not according to the database taken by NEA from GSMA. NEA will allow import only after the genuine is set. The NEA is con