Posts

Here's how to set a strong password for each account

Image
Here's how to set a strong password for each account If you want to keep your social network account secure, you need to have a strong password. But no matter how strong the password, it is not impossible to crack it all. Passwords can be cracked by various methods such as Rainbow Table Attack, Brute Force Attack, Social Engineering, Phishing, Malware, and Plain Old Guessing. However, the more complex your password, the more difficult it is for a cybercriminal to crack it. But the old way of selecting passwords is still relevant. 1. Match upper and lower case letters (English lowercase and uppercase letters). 2. Do not use less than eight characters in the password. 3. Include at least one number and one special character. The more character numbers, the better. 4. Easy to remember, but awkward to guess. For example, do not enter passwords from website names, common keyboard patterns, etc. 5. A strong password is essential. The more awkward the password in cybercrime, the longer it

Is there any spyware on your mobile? Be careful.

Image
Is there any spyware on your mobile? Be careful. As people's online activity grows, so does the risk of hacking. It is not known when spyware or malware is installed on the user's device. The important thing to know here is that spyware is also a type of malware. Which leaks important information on the user's device to hackers. This is the kind of thing that keeps spying on your mobile. Not only that, spyware can even install Killer on your device. Which can even steal the username and password of your particular site and app. It also steals login details through keystrokes. It's not easy to find out if your phone has spyware. Spyware is generally classified as adware, tracking cookies, system monitors, and trojans. How to get to the device? Spyware or malware or spy software and apps are usually installed on any device through a single link. Many times such apps are infiltrating the device through a third-party app. When you install an app on a phone, it prompts you t

Here's how to easily understand 'Git' open source and its function

Image
Here's how to easily understand 'Git' open source and its function Today, every company uses git. Git is open-source software. It's available for free. But many may not know what a git is. Today we are going to give you simple information about Git. To understand Git first, you need to understand a common problem that appears in software companies. If five developers work in a software company, they may face various problems. After all the developers have done their work, the first problem is how to merge the code of all of them. Besides, if a developer's code is lost or one person mistakenly deletes the code, there is a problem of losing the code. In that case, there is a problem of how to recover the lost or deleted code. Sometimes using the old code, a new developer can come and work on the new code. But if the code is bad and the old code is needed, how to bring the code in all those cases? Git has arisen because a solution is necessary for this. What is git Any

TikTok: From social media 'Darling' to America's Most Wanted

Image
TikTok: From social media 'Darling' to America's Most Wanted There is little chance of not hearing about Tiktak in the future. A series of responses from US President Donald Trump, the announcement has brought the future of popular video sharing platforms to an interesting turn. Today we are going to tell you about the origin of Tiktak, the countries that could pose a threat to it, and the impact it has on the multi-billion dollar BitDance company. Where did the TikTok originate? Tiktak originated from the Chinese startup company ByteDance, which introduced itself as an artificial intelligence company. The company was founded by 37-year-old CEO Zhang Yiming. Zhang initially entered the Chinese market through an algorithm-driven content sharing platform. Zhang's company's first major breakthrough was Toutio, a curated news-sharing app that managed to reach 55 million daily active users in just four years of launch. But Tautio was soon replaced by Tencent. Tencent is

The study says the coronavirus can live on mobile screens for up to four weeks

Image
The study says the coronavirus can live on mobile screens for up to four weeks  Research has shown that the coronavirus can live on mobile screens for up to 28 days. The Commonwealth Scientific and Industrial Research Organization (CSIRO), Australia's national science agency, has discovered this fact. According to the study, the Covid 19 virus can survive for up to 28 days on normal surfaces, including banknotes, mobile screen glass, and stainless steel. The research was conducted at the Center for Disease Preparedness (ACDP) in Geelong, Australia. Glass, which has a lower temperature and a flat surface than complex surfaces such as SARS-COVE-2 cotton, has been shown to survive longer in stainless steel. The study, published in the journal Virology, found that the virus was more likely to be present on paper banknotes than on plastic banknotes. However, the study was conducted at 20 C (usually room temperature) and in a dark place. The flu virus, on the other hand, can survive for

Here's how to make a smartphone into a computer mouse

Image
Here's how to make a smartphone into a computer mouse  You are doing some important work on the computer, but the mouse is not working well. Or you have a problem with the laptop's trackpad being damaged. If you are struggling with this kind of problem, don't worry. If you have a smartphone you can find an easy solution to this problem. You can use it as a mouse by connecting the smartphone wirelessly to a computer or laptop. For this, you need to download an app called Monet PC Remote on your smartphone. By downloading this app to your phone, you can easily control your laptop via Bluetooth or WiFi or USB. If you use a laptop for gaming, you can also use it to use sensors like gyro, an accelerometer on the phone. After connecting to the PC from this app, it can be easily controlled and data can be transferred between the two devices. How to use it? To use it, you first need to install the Monet Desktop Server client on your PC or laptop. Click here for that. Then download

Why is Microsoft trying to build an underwater data center?

Image
Why is Microsoft trying to build an underwater data center? Microsoft has completed a year-long study of operating an underwater data center in Orkney, Scotland. The company started the study earlier this year intending to build an underwater warehouse under the name 'Project Natick'. The study, which took a year, tested the amount of air needed for an underwater data center. From the study, a report has been prepared to bring the underwater data center into operation. The report states that more air will be available for such data cents than required. The study even found that underwater data centers were eight times more reliable than those on dry land. Since cooling is required for the data center, it is estimated that the environment may be more effective underwater than on the ground. However, researchers say they will re-study how underwater data centers can be more reliable than on dry land.

Employees of Microsoft will be able to work from home permanently

Image
Employees of Microsoft will be able to work from home permanently Due to the coronavirus epidemic, many of the world's largest companies are giving their employees the facility to work from home without coming to the office. In the world of the internet, you don't have to go to the office to do a lot of technology work and you can do it virtually from home. Companies such as Google, Facebook, and Microsoft are still offering their employees the opportunity to work from home so that employees are not at risk of infection and even performance is not affected. This work-from-home policy is likely to continue until the epidemic returns to normal. But Microsoft has said that even after the situation returns to normal, its employees will be able to work permanently from wherever they want or from home. According to Microsoft, after the manager's approval, employees will have the option to work from home permanently. Earlier, Facebook and Twitter had indicated that the facility to

Google bans two and a half hundred Android apps

Image
Google bans two and a half hundred Android apps Google has banned about 250 mobile apps from its Play Store. The app in the Android app was blocked by Google after it was found to have made unauthorized actions against the user. The 240 apps have been banned for Android users for violating Google's rules by displaying a variety of unnecessary ads. The apps were blocked after Google's security team decided to take action against those applications. Most of the blocked apps belong to the RAINBOWMIX group. Including old games. Remember that the group's apps are being used by about 15 million people every day. These apps are used to show various types of advertisements to 15 million users every day through Packer software. Google has blocked the apps that hurt users by showing them unnecessary and misleading ads, prompting Google to immediately delete RAINBOWMIX Group apps on its Android phones. Researchers with the help of White Ops have revealed the facts about the group, whi

Ransomware virus spreads on Android phones, Microsoft warns

Image
Ransomware virus spreads on Android phones, Microsoft warns  Microsoft has issued a stern warning to Android smartphone users. Revealing the fact that a ransomware virus is spreading on Android phones, Microsoft has alerted the phone users. The ransomware is called MaiLocker.B. The virus is spreading through online forums and websites and is targeting Android users, according to Microsoft. The virus is hidden in various types of unauthorized apps, so experts should be careful when downloading apps from any site and do not download apps from outside the official App Store. As soon as the ransomware attacks the smartphone, it prevents the user from using the phone's screen and freezes the screen. In that process, a message is also displayed on the screen. The message from the law enforcement agency states that you have to pay to unlock the screen. This ransomware virus takes advantage of call notifications. The virus is activated when the call comes to the smartphone. Also, when the