Posts

Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars

Image
Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars The value of Bitcoin has reached close to 50,000 dollars. On Monday, Bitcoin's price rise came to a halt as it approached its all-time high. On Sunday, Bitcoin hit an all-time high of $49,717.66. But in Asian trading hours, Bitcoin fell 5.6 percent to $45,914. Bitcoin rival cryptocurrency Etherium, meanwhile, was up 8 percent. Electric car maker Tesla Corporation has decided to invest $1.5 billion in Bitcoin and accept it as payment. At the same time, Bitcoin is gaining widespread legitimacy. Bitcoin has gained 20 percent this week. In one year, it has increased by 60 percent. Its price fell sharply last March. Chris Weston, the chief researcher at Melbourne Brokerage Paperstone, says its value continues to rise as big players in the financial sector make net investments. In addition to Tesla, Bank of NY Mellon announced last week that it would build new units to help its clients buy and trade

Here's how to protect your pen drive without a password

Image
Here's how to protect your pen drive without a password  Pen drives are very useful and necessary for storing all types of digital data. We usually keep all kinds of information in it, whether it is our personal or official content. We are saving it by putting it in a pen drive. But when we use such a Pendrive on a computer or laptop or hard disk, its security is compromised. Of course, you can lock your pen drive to prevent your personal or official data from being seen by others. This will keep the data on your pen drive safe and no one else will be able to open the data on your pen drive without your permission. No software or application is required to set the password on the pen drive. Today we are going to tell you how to put passwords on a USB drive or pen drive. It is very easy to put the password in the pen drive. For that, first of all, you have to put your pen drive on your computer. Then go to your drive on the computer and right-click and select Turn on BitLocker. Now

'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal

Image
'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal An ethical hacker (researcher) has recently demonstrated a novel supply chain attack. Accordingly, the systems of more than 35 big technology companies like Microsoft, Apple, PayPal, Sophie, Netflix, Tesla, Uber have been breached. Novell Supply Chain Attack exploits public and open-source developer tools. The system, developed by ethical hacker and cybersecurity researcher Alex Birsan, injects malicious code into an open-source developer tool to exploit the dependencies of those organizations' internal applications. It could target developers' projects using public depositories such as GitHub. According to Birsan, the success rate of such attacks is high after the companies have been targeted. The vulnerabilities he has exploited so far, which he calls 'Dependency Confusion', have been found in more than 35 organizations. These were in Python, Ruby, and Java programming languages.

Online data of all Brazilian citizens leaked

Image
Online data of all Brazilian citizens leaked Data on all Brazilian citizens have been leaked online. The Brazilian Consumer Protection Agency has instructed the government to immediately protect citizens' data. The institute has also directed to take necessary steps for data security immediately. The data leak occurred last week, with data on 223 million Brazilians leaked. In a country with a total population of 221 million, the question of how 223 million data can be leaked may arise in your mind. It is also mentioned that there is information about the person who died earlier in the incident. Besides, data of 104 million vehicles in the incident has also been made public. The data thus made public includes the name of the person, identity card number, marital status, name of the father, mother, and son, and daughter, complete information of the house, credit score, voter registration number, profession, and other details. The person's LinkedIn profile has also been leaked. It

Starting coding? Find out about Python

Image
Starting coding? Find out about Python Python is now a popular programming language, used across a wide range of artificial intelligence. In this age of digital transformation, the demand for manpower capable of designing applications is high. So today we are going to tell you about the important information needed for those who want to make a career from Python language such as salary, programming application, courses to be studied, developer's feelings. Python: Always popular TIOBE publishes its top popular programming languages ​​each month. It updates the ranking of long-trending languages ​​in the evolving landscape of programming languages. According to TIOBE's January rankings, Python was the top popular programming language of the year. This is the fourth time Python has received such an honor. In 2020, Python achieved a rate of 2.01 percent, compared to 1.99 percent and 1.66 percent of the other popular programming languages ​​C ++ and C, respectively. In TIOBE's F

Here's how to put one together for use with a quantum computer

Image
Here's how to put one together for use with a quantum computer Many of you may have heard of supercomputers. But have you ever heard of a quantum computer? If some have heard this word somewhere then you are lucky. Because you have the good fortune to listen to the modern technology of the modern age. Today we will tell you what a quantum computer is and how it works. To understand a quantum computer, first remove all the elements inside the computer such as a keyboard, mouse, motherboard, hard drive, RAM, graphics card. And look at the things that have helped make your computer a computer. Whether it's a computer or a mobile phone, the processor is what makes your device so smart today. The smallest element in that processor is the transistor, whose particles combine to form a single processor. The transistor acts as a switch to turn the current on and off. There are billions upon billions of such switches inside a computer. Once you get all those switches, you can perform all

What is quantum internet and how is data transferred from it?

Image
What is quantum internet and how is data transferred from it? Quantum Internet begins where the capacity of our normal computer or Internet is limited. For example, today's computers have a processor based on seven-nanometer lithography. After a while, it decreases to five, three to two. Then it is difficult to reduce the size. Because the size of the transistor inside the processor is about the size of an atom. Then our internet is transferred to the quantum world. Where our normal physics don't work. Quantum computers are born to meet the limitations of ordinary computers. It has high cybersecurity. Because it is transferred to the superposition. With the advent of a quantum internet, you don't have to use encryption like you do now. The speed of quantum internet is much faster than the normal internet we use. According to scientists, its data transfer rate is one GB per second. Quantum Internet was discovered by Chinese scientists. When two places with a distance of 40 k