Posts

Explosion soon after the landing of Space X's starship rocket

Image
Explosion soon after the landing of Space X's starship rocket The prototype rocket Starship SN10, launched by Alan Musk's company SpaceX for testing, exploded shortly after landing. The rocket landed and exploded three minutes after takeoff in the skies of South Texas in the United States on Wednesday. SpaceX's SN10 rocket is the company's initial prototype of the StarShip Mars rocket. The rocket flew up to 6 miles. Speaking at an event, SpaceX engineer John Insprucker said he was happy that the SN10 had successfully landed on a landing pad for the first time, though he did not know what caused the explosion. SpaceX has built many such prototypes. The company says it will soon send the SN11 for another test. Alan Musk's Space X is part of an ambitious plan to establish a human settlement on Mars. The company is working on a variety of prototypes to find the right design for sending people to Mars. Recently, 143 satellites were launched simultaneously by SpaceX's

Another major cyberattack on America, tens of thousands of email server hacks

Image
Another major cyberattack on America, tens of thousands of email server hacks According to Krebs on Security, emails from 30,000 US government and business organizations have been hacked due to four vulnerabilities in Microsoft Exchange software. Wired has even published the news that tens of thousands of email servers have been hacked. Although Microsoft has patched the vulnerability, security experts told Krebson that much work is needed to identify and clean up the process. Thousands of organizations, including state and city governments, fire and police departments, school districts, financial institutions, and others, have been affected. According to Microsoft, the vulnerability (security vulnerability) allowed hackers to access email accounts and install malware that could later be accessed on those servers. According to Krebs and Wired, the attack was carried out by the Chinese hacking group Hafnium. Although Microsoft has not commented on the size of the cyber-attack, it has in

Now Brave Browser's own search engine to beat Google

Image
Now Brave Browser's own search engine to beat Google Google's grip has probably never been so strong. About 70 percent of the Chrome browser and 92 percent of the search engine market share show where Google is now. Google, one of the world's most powerful companies, has so much data and advertising revenue. It has become a big challenge for any company to enter the market to beat Google. But Google's monopoly and non-competitive practices seem to be undermining Google's dominance today. Google's new competitors want to take advantage of this bad side. Two years after the privacy-focused browser Brave went public, former Mozilla CEO Brendan Eich's eyes are now on Google's search business. Recently, he has challenged the dominance of Google search by announcing Brave search, another search engine of Brave browser. The waitlist, which has already opened a weight list, will be made public by mid-2021, Ich said. Brave Search says it will not track the people

Delivering goods from door to door using Google Plus code

Image
Delivering goods from door to door using Google Plus code The Google Plus code will be used in the postal service under the Ministry of Information and Communication Technology. For that, the Ministry has passed the Working Procedure, 2077 Procedure on the use of Google Plus Code for the distribution of postal goods. Pradyum Upadhyaya, head of Goshwara Post Office, says that the procedure related to Google Plus Card has been brought to provide quality service in line with information technology. Upadhyaya was transferred from the printing department to the Goshwara post office only two months ago. Under his leadership, plans have been put forward to make the postal service technology-friendly. According to Upadhyay, the use of Google Plus code has been started accordingly. He says, "Unorganized urbanization makes it impossible to deliver letters easily to the homes and offices of large settlements, so arrangements are being made to deliver them to the recipient's home or offic

20 Wrong Passwords Found on the Dark Web, Didn't You Have Somewhere?

Image
20 Wrong Passwords Found on the Dark Web, Didn't You Have Somewhere? With the widespread development and expansion of information technology, people have opened many kinds of online accounts. But people are still using old-fashioned passwords. Many people use their name, location, mobile number, and other passwords. They also ignore the tips given by experts. According to Verizon's 2017 data breach research, 81 percent of hacking incidents are caused by bad or weak passwords. Recently, a dark web monitoring company called ID Agent has studied 3 million passwords stored on the Dark Web by 2020. From this, he has given information about the common (shared) password used by many. 20 simple passwords found on the Dark Web Among the top 250 passwords found on the Dark Web, common passwords include serial numbers, names, games, and related words, celebrities, or characters. Here are the top 20 most used passwords: 123456 password 12345678 12341234 1asdasdasdasd Qwerty123 Password1 12

What is spectrum or frequency? This is easy to understand

Image
What is spectrum or frequency? This is easy to understand Although the term spectrum sounds unfamiliar to many and is very technical, most people are exposed to it every day. It has become a very important part of our daily lives. Of course, the question arises, what is the frequency? And how does it affect the lives of ordinary people? Frequency is something that cannot be seen with the naked eye. It is also called an electro magnetizing field. Whether it is remote, micro web, mobile, or radio, we are coming in contact with it every day through some means. Frequency or spectrum is the amount of radiation energy that surrounds the earth. The sun is the main source of electromagnetic radiation. It also receives energy from stars and galaxies. Apart from this, such energy is also generated from the radioactive elements that are buried under the ground. Some of the frequencies we call spectrum or radiation are very useful. Which does us no harm. Through which we can listen to the radio. W

India creating its own map as an alternative to Google Maps

Image
India creating its own map as an alternative to Google Maps India is planning to create a separate map as an alternative to Google Maps. For that, India's space agency has collaborated with 'Mapmai India'. The map may India is a tech company working on digital map data of India. India has launched another app as an alternative to Twitter and WhatsApp and is also preparing to build an alternative to Google Maps. India Space Researcher and Mapmai India informed about this project on Friday. He did not say when the service would be made public. However, the collaboration of the India Space Research Organization and Mapmai India on the project will make a significant contribution to India's mapping system. It is said to be much better and more informative than the currently available map. "It will always protect user privacy and provide the country's own mapping solution," said Rohan Burma, CEO of India Space Research Institute.

Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars

Image
Bitcoin's new record with Tesla's investment, price close to 50 thousand dollars The value of Bitcoin has reached close to 50,000 dollars. On Monday, Bitcoin's price rise came to a halt as it approached its all-time high. On Sunday, Bitcoin hit an all-time high of $49,717.66. But in Asian trading hours, Bitcoin fell 5.6 percent to $45,914. Bitcoin rival cryptocurrency Etherium, meanwhile, was up 8 percent. Electric car maker Tesla Corporation has decided to invest $1.5 billion in Bitcoin and accept it as payment. At the same time, Bitcoin is gaining widespread legitimacy. Bitcoin has gained 20 percent this week. In one year, it has increased by 60 percent. Its price fell sharply last March. Chris Weston, the chief researcher at Melbourne Brokerage Paperstone, says its value continues to rise as big players in the financial sector make net investments. In addition to Tesla, Bank of NY Mellon announced last week that it would build new units to help its clients buy and trade

Here's how to protect your pen drive without a password

Image
Here's how to protect your pen drive without a password  Pen drives are very useful and necessary for storing all types of digital data. We usually keep all kinds of information in it, whether it is our personal or official content. We are saving it by putting it in a pen drive. But when we use such a Pendrive on a computer or laptop or hard disk, its security is compromised. Of course, you can lock your pen drive to prevent your personal or official data from being seen by others. This will keep the data on your pen drive safe and no one else will be able to open the data on your pen drive without your permission. No software or application is required to set the password on the pen drive. Today we are going to tell you how to put passwords on a USB drive or pen drive. It is very easy to put the password in the pen drive. For that, first of all, you have to put your pen drive on your computer. Then go to your drive on the computer and right-click and select Turn on BitLocker. Now

'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal

Image
'Supply Chain Attack' on 35 Big Companies including Microsoft, Apple, PayPal An ethical hacker (researcher) has recently demonstrated a novel supply chain attack. Accordingly, the systems of more than 35 big technology companies like Microsoft, Apple, PayPal, Sophie, Netflix, Tesla, Uber have been breached. Novell Supply Chain Attack exploits public and open-source developer tools. The system, developed by ethical hacker and cybersecurity researcher Alex Birsan, injects malicious code into an open-source developer tool to exploit the dependencies of those organizations' internal applications. It could target developers' projects using public depositories such as GitHub. According to Birsan, the success rate of such attacks is high after the companies have been targeted. The vulnerabilities he has exploited so far, which he calls 'Dependency Confusion', have been found in more than 35 organizations. These were in Python, Ruby, and Java programming languages.