Saturday, August 29, 2020

Elon Musk brings brain-computer interface to test pigs, chip reads brain

Elon Musk brings a brain-computer interface to test pigs, chip reads brain

Elon Musk's Neurolink, a company working to develop a new kind of interface between the human brain and computing devices, demonstrated a demo of the technology on Friday.

Neurolink says the technology is useful for people with memory loss, anxiety, brain damage, depression, and other neurological disorders.

Elon Musk said the demonstration aims to make the technology accessible and accessible to all. But the same technology can't cure all of the above-mentioned neurological diseases, Elon said, adding that the company's ultimate goal is even greater.

Elon was seen with three pigs in the exhibition. One of the three pigs he had had not been treated. Another device was installed inside a pig's skull or brain called Neuralink's 'Link'. The device was previously installed in the brain of a third pig and was removed.

Elon Musk giving his presentation on the brain-computer interface

At the exhibition, the third pig, whose link equipment had been removed, appeared to be in good health.

Musk came to the second pig and showed a display. In which a sound was coming and a scene was also shown. According to the scene, when the link device was detected, the pig would keep in touch with something and search for food.

According to Elon Musk, the device connects to applications inside the phone. From there the link device communicates.

Neurolink shut down the device in July after receiving a breakthrough device design from the US Food and Drug Administration. The company is preparing for its implantation in the human brain soon.

However, it has not been approved by the concerned authorities and further security tests are pending. The device on display was a reading device, which receives signals from pigs' brains via signal. Its ultimate goal is to provide the ability to read and write to address neurological problems such as those mentioned above.

Elon also explained the reason behind removing the device from the brain of the third pig. According to him, it was removed to use the new update on the hardware.

At the end of the question-and-answer session, Musk said he wanted to reduce the cost of the technology to 1,000, bringing it with modern equipment.

Elon believes that the BMI (Brain Machine Interface) device can power the human brain and accelerate it to the speed of artificial intelligence.

Many scientists have welcomed Elon Musk's involvement in the medical field. Because this technology of BMI will help people with neurological disorders and paralysis.

Know useful settings, forgetting Gmail-Facebook password works

Know useful settings, forgetting Gmail-Facebook password works

Nowadays people are working on an official laptop or desktop from work from home. If you are using an office laptop or PC, you must delete your data and password before returning it.

If you go to browser settings, you will see that many of your passwords have been saved. Which needs to be deleted.

If you work in Google Chrome, Mozilla Firefox,, or any other browser, they ask you to save the password of every website you need to log in. So if you have saved all those passwords, there is a risk of theft.

How many passwords are saved?

When you log in to Google Chrome or Mozilla Firefox with Gmail or any other email ID, you will be asked to save the password. Similarly, other types of websites or platforms, in which you log in with a password, are also asked.

In this way, your e-commerce, Facebook, Twitter, etc., many passwords are saved. If you use the Google Chrome browser, you can see the saved passwords by going to the Passwords section within its settings. You can also delete the password saved in this way.

Follow these steps to see the password

First,,, go to Google Chrome Set.

Now go to the password section or go to the search settings above and search by typing the password.

Click on the arrow next to the password.

Now scroll down, there you will see a list of all saved passwords.

All passwords will appear as dots. You can see your password by clicking on the eye button in front of it.

After clicking on the I button you have to enter the system password Otherwise anyone can see the password from here.

If you have forgotten a password, it may be useful for you.
At the same time, it has its downsides. If anyone knows the computer's system password, your passwords may be stolen from here.

How to secure a password in the browser

When you're working on Google Chrome, Mozilla Firefox,, or any other browser, there are a few things to keep in mind. From which you can keep your password secure.

Always keep your laptop, PC password strong. Use numbers, alphabets,, and special characters for that.

Even so, the browser will ask you to save the password. Only save items that are not in danger of being stolen.

Turn Off Offer to Save Password or Auto Sign In by going to Password from Google Chrome settings. You can also use the Master Password for Chrome extension for Chrome's safety.

Thursday, August 27, 2020

Biggest record ever on YouTube

Became the biggest record ever on YouTube, when the whole world became a fan of the video

Such a record is rare, the first time a song or video is uploaded to YouTube, the whole world becomes a fan of it. But now this has been proven true.

This is a new record in the history of YouTube, which no one has been able to set yet. Yes, a new video has been uploaded to YouTube.

Which received so many views in the first 24 hours of uploading that it became a huge new world record. Of course, when you read this news, its views will be added even more.

Video record 100 million views in 24 hours

According to the information received, Korean pop band BTS has uploaded the music video of this latest track Dynamite on YouTube. The video of K-Pop, which is becoming very popular among the youth of the world, has set a unique record of collecting 100 million views in just 20 hours.

As of this writing on Wednesday, the song has been viewed more than 208.1 million times. What is memorable here is that before this, the record of the most viewed video on YouTube in 24 hours was in the name of Black Pink. The How You Like That video received 86.3 million views in 24 hours.

Korean pop singers are very popular among young people

Korean pop bands are very popular among young people all over the world. The songs of these Korean brands are very popular among the youth. According to sources, the Korean pop band BTS's new song Dynamite was showing this possibility even before it became a hit. However, only a few days ago, a teaser video of this song was shared.

This teaser has already crossed 62.6 million views on YouTube. The video of the song has received more than 208.1 million views. Which is still running in number one trend in many countries of the world.

While preparing this news, the view of this song which is number one trending even in Nepal will definitely be added as soon as you read it.

At the 2020 MTV Video Music Awards, BTS was seen presenting dance numbers on TV for the first time. Which will be on air on August 30.

Jeff Bezos became the first rich man in world history with a fortune of 200 billion

Jeff Bezos became the first rich man in world history with a fortune of  200 billion

Jeff Bezos, the richest man in the world, has amassed more wealth than ever before. In nearly four decades of Forbes calculations, Bezos has crossed a milestone that has never been seen before.

Bezos' net worth rose to  4.9 billion as Amazon's stock fell 2 percent on Wednesday afternoon. The 56-year-old is the richest man in the world with more than 200 billion in assets.

As of 1:50 a.m. Wednesday, the assets of Amazon's founder and CEO had reached 204.6 billion (Rs. 241.90 billion). That's  90 billion more than Bill Gates, the world's second-richest man. Bill Gates currently has a net worth of  116.1 billion.

According to Forbes, Bezos has managed to make a new fortune even when it comes to matching inflation. Bill Gates became the first person with a fortune of one hundred billion dollars.

By the time Microsoft reached its peak, Gates had amassed a fortune of 100 billion. At present, it is worth about  158 billion. Due to the epidemic of coronavirus, consumer habits have changed a lot.

The direct benefit of which has been collected by Amazon. Its stock has risen 80 percent since the beginning of the year. As a result, Bezos's net worth, which was  115 billion a year as of last January, has skyrocketed.

The 11 percent stake in Amazon has played a 90 percent role in increasing his wealth. Bezos also owns Washington Post, aerospace company Blue Origin and other private investments. Bezos had the world's most expensive divorce last year alone.

He agreed to give his ex-wife a 25 percent stake in Amazon. The stock is currently valued at  63 billion. Bezos' ex-wife Mackenzie Scott, who donated  1.7 billion to charity, is now the 14th richest person in the world and the second richest woman.

In the first place is Francisco is Bettencourt Meyers. Bezos is not the only player to leap into the ocean of wealth in the boat of technology. Facebook's Mark Zuckerberg set a record of 100 billion on Tuesday alone.

He amassed  3.4 billion in a single day from his stock on Facebook, bringing his net worth to ३ 103.1 billion. The wealth of his property was not limited to that. On Wednesday afternoon alone, his net worth rose to  109.1 billion.

At the same time, the number of rich people with assets of one hundred billion dollars has reached a lot so far. Bezos, Gates, Bernard Arnaut, and the newly crowned Mark Zuckerberg have also been added. Arnaut now has 115 billion in assets.

Bezos has donated, 2.6 million worth of 7,548 shares of his stock to a non-profit organization, setting a new record of  200 billion. Bezos's net worth now stands at  205 billion (Rs 243.89 billion), including inflation.

Tuesday, August 25, 2020

Five ways to extinguish a gas fire

Five ways to extinguish a gas fire

Earlier it was customary to cook with firewood. Nowadays, cooking is done using gas not only in cities but also in villages. However, there is a risk of fire from a gas cylinder and loss of life and property due to fire or other negligence.

Kishor Kumar Bhattarai, former chief of Juddha Varun Yantra, had demonstrated what to do in case of fire in a gas cylinder with the objective of empowering the community in the capital on Saturday. Bhattarai has been conducting such model exercises across the country for a long time under the slogans of 'Fire Safety for All' and 'Fire Disaster Management Preparedness, You are the Responsibility of All of Us'.

Here's how to put out a cylinder fire:

1. Turn off the regulator with your finger

In case of fire due to leakage of pipe from the regulator of the cylinder, extinguish the fire by closing the hole of the regulator with your index finger. When the cold gas of the regulator comes out, there is a gap of about one inch between the fire and the regulator. Block that gap with your finger. By doing this, the fire does not burn.

2. Beat it with a cloth

If a pipe is blown out of the regulator, extinguish it with a large curtain, sheet, carpet, or blanket.

Control the fire by breaking the pipe with the help of three fingers if there is a fire by releasing the pipe from the stove.

3. Close the mouth of the gas pipe with your finger

If the pipe from the cylinder escapes from the stove and catches fire, control the pipe and extinguish the fire by pressing it with your finger.

4. Cover the fire with a bucket

If a pipe leaks from the regulator, cover it with a bucket, and extinguish the fire.

5. Cover the fire with a cloth

In case of fire in the cylinder, control the fire by covering it with curtain, carpet, sheet, or cloth.

Remember, the fire in the gas cylinder is not extinguished by water. It is commonly believed that fire is extinguished by water, but remember that not all fires are extinguished by water. Water should not be used to extinguish fires of electricity, petroleum products, gas, and oil.

If you are trained in this method, extinguish the fire only in the early stages.

Otherwise, get out of the house safely.

Sunday, August 23, 2020

The brain-computer interface

The brain-computer interface, through which the brain will now directly control the electronic device

It may seem strange to you that in the future you will be able to control any device including mobile, computer, laptop directly from your mind without touching it. Of course, you may have seen Dr. Octopus in the movie. In the film, there are many hands of Dr. Octos's machine.

Dr. Octopus controls the hands of these machines with his brain. You may not believe that all this is possible even in real life.

But it is really possible. Brain-computer interface technology now makes it possible to control electronic devices.

After all, what is this brain-computer interface?

Today we are going to tell you what is this brain-computer interface and how it works. You will also find information on its usefulness.

The brain-computer interface is easy to understand if it is a kind of machine or a kind of system. Which connects our brain to the computer and sends the brain's instructions to the computer.

We can even recognize it by another name NCI. Whose full name is Neural Control Interface? To make it easier to understand, such a machine or system, through which the information of our brain can be displayed on the screen of a computer or electronic device. In fact, the system allows you to communicate or give instructions directly to the commuter.

Knowing this, you must have found it interesting and unique. Now let's talk about how it works. To understand the brain interface commuter interface, let's take an example from real life.

Most people know how our brains work. If you know that, you can easily understand this brain-computer. In particular, our brain uses electric pulses to exchange information and instructions with different parts of the body.

This is what we can think with the help of electric pulse and signal. Can work We can dream In this way our brain can do different kinds of things.

Similarly, if you have a general knowledge of computers, the computer also works on the basis of electric signals. From which the computer works based on the instructions we give you.

The electrical signals that work on a computer are zero and one digit in binary form. Now the thing to understand here is that the commuter also works from the electric signal and the brain also uses a kind of electric signal.

Now, in this case, we can make a connection between the two. This means that if we can transmit the kind of electrical signal emanating from our brain to a computer through a system or machine, then the computer can understand the language of our brain.

How much fun would it be to have this very interesting topic in real life? Scientists have completed various tests. The first test was performed on a monkey.

In which some pins were attached to the monkey's head and it was connected with a wire. In this test, the monkey was found to be able to control the robotic arm.

This is exactly what you are looking for in a Doctor Octopus movie. He can move the hands as he pleases without speaking the hands of the machine attached to it.

Now the brain-computer interface technology has become not just a fictional story of the film, but a real-life experiment. In the days to come, this technology will definitely be developed to a more advanced level.

Friday, August 21, 2020

What to do when water enters the mobile?

What to do when water enters the mobile? You know, it's awkward

The rainy season is now underway. It is raining continuously in different parts of the country. But even during the rainy season, people have to go out of the house. In this way, some of us get soaked with water.

At the same time, the smartphone we have with us also gets wet. Sometimes our phone falls into the water by a small mistake. So today we are giving you some tips on what to do and what not to do if your smartphone gets wet in the rainy season.

The first thing you do when your phone is wet or in the water is to turn it off if your smartphone is on. Do not try to press or turn on any button after closing. Doing so will reduce the risk of short circuit in the phone.

If you have an old phone and it has the facility to remove the battery, easily remove the battery, memory card and SIM card. If the phone has a non-removable battery, there is a risk of a shirt. Now dry the phone under a fan or through a hair dryer (blower). Wipe the water on the phone with a cloth or paper napkin.

If you do not have a hair dryer, place the phone in the middle of dry rice. But keep in mind that rice nuts can go in through the headphone jack. Leave the phone to dry for at least 24 hours. This is the most useful and easy way to dry a wet phone.

Now take the phone out of the rice and turn it on. If the phone is not turned on, charge it. If the phone still does not open, go to the nearest mobile phone manufacturing center or related service center.

Have you filled out an online form? If you are insecure, Chrome will now issue a warning

Have you filled out an online form? If you are insecure, Chrome will now issue a warning

We often fill out a variety of forms on online platforms. Some of them are necessary and some are filled due to temptation. Hackers may be collecting personal information through the form we fill out.

We have never been aware of such a thing. Now Google Chrome is warning users to fill out the form.

If you're filling out a form and submitting it online, Chrome will let users know how secure such forms are.

If the form to be filled out is unsafe, you are warned that this platform is unsafe, do not submit the form.

Google says its purpose is to prevent users from sharing important information arbitrarily. It is mentioned that this feature will be available to the users through Chrome M86 version.

Wednesday, August 19, 2020

The 25-year journey of Internet Explorer is coming to an end

 The 25-year journey of Internet Explorer is coming to an end

We should all be using Internet Explorer, a product of Microsoft. The 25-year journey of Internet Explorer, the most used search browser in the early stages of the Internet, is now coming to a complete halt.

Everyone has their own experience in using it. However, the company has made an unpleasant decision to shut it down due to the recent loss of users due to the popularity of other browsers.

Microsoft will stop supporting it from August 17, 2021. According to Microsoft, Microsoft 365 App & Services will no longer provide services to Internet Explorer from next year.

As an alternative, the company has been promoting Microsoft Edge for the past few years. Which is now established as the world's second-largest web browser.

In 2015, the company created Microsoft Edge through the open-source Chromium for Google Chrome. Which has many features compared to Internet Explorer. It is also user friendly.

Google prepares for 6 GHz WiFi test

Google has asked the US government for permission to test the GHz spectrum for high-speed Wi-Fi. The company has sought permission from various state governments to test the technology, which is seen as a new generation of WiFi technology.

Google is preparing to test it in major US cities in the first phase. The company has also sought permission from the government to test the six GHz WiFi, which is expected to affect other WiFi signals.

This technology will run at twice the speed of WiFi currently available. Similarly, the coverage area of ​​WiFi will also be more.

Currently, 2.4 GHz and 5 GHz band WiFi is in vogue in the global environment. Five GHz WiFi has just come into use in Nepal. After some time, a big change is appearing in WiFi.

With two decades of major upgrades to WiFi, this will change

After some time, a big change is appearing in WiFi. The US Federal Communications Commission has announced that it will open a plot of 6 GHz spectrum for use without a license.

Such a change would allow the user to broadcast the router above the 2.4 GHz and 5 GHz bands. So your router will have more open-air routes to broadcast WiFi signals.

Next year when this new spectrum will be officially opened for business, users' devices will run faster, connections will be more reliable than the previous generation.

Since the Federal Communications Commission made provision for Wi-Fi in 1989, the decision will add a wide spectrum. This new spectrum has further increased the amount of space available for routers and other devices. As a result, any device will have more bandwidth and less interferer.

"This is the biggest decision in the history of WiFi spectrum in twenty years," said Kevin Robinson, marketing leader of the WiFi Alliance, an industry group that oversees the implementation of WiFi.

By the end of 2020, the devices are expected to support 6 GHz WiFi. Therefore, its implementation is not far away. When it arrives, it will be branded as WiFi Six E.

How can this help our weak WiFi?

If your device has trouble connecting to the WiFi network, it may be due to spectrum congestion. When you connect multiple devices with the same band frequency, the network drops on some devices.

If you see many WiFi networks in your area, now consider for yourself why your connection is slowing down. The reason is simple, your computer is competing with many signals.

6 GHz can solve this problem for you. This allows your router to accommodate so many new airwaves that the signals of the WiFi channels never overlap like they do now.

This new spectrum has enough rooms for a maximum of seven WiFi streams. All streams can be broadcast at GHz without interruption without using the previous spectrum.

FCC is opening a 1200 MHz spectrum in the 6 GHz band. For the past two decades, WiFi has been operating in 400 spectra. Within that limited space, all available channels were being split.

Within the 6 GHz band, each channel is expected to be 160 MHz in size. But currently available space can only accommodate two channels of this size.

6 GHz WiFi

Not everyone knows how WiFi works. WiFi works by transmitting airwaves. The airwaves are open to everyone's use.

Today, it operates in two bands, 2.4 GHz and 5 GHz. Now the third band 6 GHz has been added.

Depending on the band's number, their features also vary. 2.4 GHz flows very fast and 6 GHz provides fast data.

It does not matter what specific frequency is used. The important thing is the space of the available airwave.

It has a lot of 6 GHz space. The space of the new band is more than the overall WiFi space available before.

Saturday, August 15, 2020

Nepali youth discovered Instagram's 'bug'

A 21-year-old Nepali youth discovered Instagram's 'bug' and won a $ 6,000 prize

Cyber ​​security researcher Saugat Pokharel has discovered a bug (security vulnerability) on Instagram. The 21-year-old discovered on Instagram that the user's deleted photo and direct message had long been on the company's server.

According to Europe's new data policy, in 2018, Instagram provided users with the facility to download their data. Taking advantage of the facility, Saugat downloaded his data. The downloaded data also included a photo he had deleted a year earlier and a direct message.

According to Instagram's policy, if a user deletes a photo or direct message, the deleted message and photo must be removed within 90 days. This means that the company's servers do not have such data.

However, in the data downloaded by Saugat, a photo older than 90 days is still on the server and that photo was also downloaded.

"The data that I deleted a long time ago has not been deleted by Instagram from its servers," he told TechCrunch. The bug was fixed last month. '

"Investigators have long reported that even deleted data stays on the server and that the information is downloaded when the data is downloaded," an Instagram spokesperson said. "The problem has now been resolved." There is no misuse of such data. '

Following the discovery of the bug, Instagram offered a reward of 6,000 US dollars, or 720,000 Nepali rupees.

child addicted to the Internet

Is your child addicted to the Internet? Do this to get rid of it.

All schools and colleges are closed due to Kovid-19. As a result, many children and adolescents have become lazy, spending hours every day on mobile phones, tablets, laptops, and TVs. If your children have such a diary every day, it will definitely bring sad consequences to the family.

Of course, in the modern age, giving children access to technology cannot be considered otherwise. But with the extreme misuse of technology, young children are beginning to have a detrimental effect on the brain. So don't leave the internet open to make children happy. Remember how long your kids have been online?

Which sites do they open the most? How much time are you spending chatting on social networks including Facebook? What kind of people is coming in contact with them? Now is the time to be alert to these things.

On the other hand, are you sure that your children are looking for study materials on the Internet? Do you know if their eyes are on pornography? If we are not aware of this in time, children can get into trouble and even become addicted.

On the other hand, parents are relieved when children forget about gadgets. But such online games are becoming a kind of addiction in children. They keep thinking about the game at other times.

If they do not interact with family and society and do not get to play, they show unnatural activities that make them angry and irritable. It has been found to have a negative effect on reading and other personality development as watching the game makes one feel sad and frustrated that there has been a great loss. In such cases, parents can do the following to protect their children from Internet addiction.

View and monitor what children do online and what sites they use.

Make rules for using the Internet.

Use only when there are parents or set certain criteria.

Teach to maintain your privacy.

Make a place for children to use the internet around their eyes.

Child lock so that pornographic sites and any sites that affect children are not opened in search engines.

Provide training on the disadvantages of social media.

Prohibit posting and commenting on bad pictures.

Sitting together reading various messages etc.

Closer observation.

safe banking system

How to keep the banking system safe?

 The security of the banking and financial system has been debated from time to time. But the truth is that there is still a tendency to be sensitive to security only when big banking frauds occur and to ignore small incidents.

More cyber attacks or attempts are being made in the financial sector. But such incidents are rarely public. Banks do not disclose such incidents on the grounds that their reputation, prestige and distrust in the service recipients will decrease.

In some cases, even looting crores of rupees, banks consider 'hiding privacy' as a solution. Hackers have started targeting ATM switches or servers. Although they have come to the realm of investing in security in recent times, they do not seem to be ready to avoid the danger in time.

It is a fact that some banks and financial institutions are not even following the instructions given by the National Bank to adopt the security system. The concerned institutions need to be serious to keep the banking system safe.

How to keep the banking system safe?

The network and system related to the card should be supervised regularly.

Arrangements should be made to audit the information system related to the card annually.

Arrangements should be made to conduct Vulnerability Assessment and Penetration Testing (VAPT) of the card related system on a semi-annual basis.

Arrangements should be made to conduct quarterly risk assessment of the card related system and discuss it in the risk management committee of the concerned bank.

Arrangements should be made for regular centralized monitoring of ATMs connected to ATM amnesty. In addition, arrangements should be made to conduct such monitoring regularly even on Saturdays and other holidays.

Licensed financial service providers should arrange for cyber security insurance to minimize potential losses from cyber security risks.

In order to control the transaction limit through card, all banks and financial institutions should take the service of determining the transaction limit from Visa, MasterCard and other payment system operators.

Banks and financial institutions and PSO-PSPs should make arrangements to secure important infrastructure of information technology system using privilege access management.

Banks operating in compliance with Payment Card Industry and Data Security Standards (PCI-DSS) and operating ATM switches should make arrangements to audit PCI DSS annually.

Friday, August 14, 2020

'Master Mind' - hacking Twitter!

 17-year-old 'Master Mind' shocks the world by hacking Twitter!

U.S. prosecutors on Saturday charged three people with involvement in a recent Twitter hacking case. The timetable of the hack has also been made public in a court document issued by the Ministry of Justice.

The document also details how US investigators tracked down the suspected hackers. According to court documents, the entire hacking activity started on May 3.

A teenage clerk from Tampa, Florida (who had been living in California) gained access to a portion of Twitter's network on May 3.

But what happened between May 3 and July 15 is still unclear. However, Clark initially failed to gain access to the Twitter admin tool used to kill the account.

But on the second day of the Twitter hack, according to the New York Times, Clerk initially had access to Twitter's internal slack workspace, not Twitter.

New York Times reporters quoted a hacker community source as saying that the hacker had found the login details of a Twitter tech support tool. From there, he broke into a slack channel of the company.

On the day of the hack, a picture of the tool, which controls all Twitter accounts, was leaked online by Twitter employees. However, the login details of the tool were not enough to access the back end of Twitter.

According to Twitter's blog post, Twitter's administrative back-end is protected by two-factor authentication. How long it took the clerk to do all this work is still unclear.

But according to Twitter researchers, the hacker used a "phone spare phishing attack" to trick Twitter employees into accessing their accounts and break two-factor authentication.

All of this happened on July 15. It was the same day that the company that hacked Twitter made it public.

Shortly afterwards, the clerk, who reached out to OG Users' Discard Channel from Kirk # 5270 ID, talked to two people and asked for help in monetizing Twitter's access, according to an FBI chat.

OG Users Discard Channel is a special forum where hackers buy and sell social media accounts. Through the channel, the clerk claimed that Fazeli (22 years old) who used Rolex # 037 ID and Separd (19 years old) who used Angius # 0001 ID were Twitter employees.

He asserted that his confession had been obtained through torture, and that his confession had been obtained through torture.

The clerk also sold access to various short-form Twitter accounts to Separd. 

The clerk thus reassured both of them about their access level. The trio then agreed to post an ad to promote the clerk's ability to hack Twitter accounts on the OGUser Forum.

Many people are believed to have bought access to their Twitter accounts after the ads were posted. A record message posted on YouTube by a U.S. Attorney's Office official states that investigators are monitoring several users involved in the hack.

 One of the three parties had posted a cryptocurrency scam message on July 15 by purchasing access to the celebrity's authentic Twitter account.

Such messages were seen on the accounts of celebrities including Barack Obama, Joy Biden, Bill Gates, Elon Musk, Jeff Bezos, Apple, Uber, Kanye West, Kim Kardashian, Michael Bloomberg, Floyd Mayweather.

In which users were requested to send Bitcoin to different addresses. According to court documents, 12.83 bitcoins, or about १७ 117,000, were found in the hacker's operating wallet in the scam.

In the course of the investigation, the cryptocurrency exchange company Coinbase intervened in the matter and stopped trading at the scam address on the day of the hack. In the end, the मर 280,000 that went into the scammers' accounts was saved.

By then, the subject was known to be hacked. Twitter staff blocked the clerk from tweeting on his official Twitter account.

According to the investigation, the clerk had access to Twitter's admin tool and communicated with 130 accounts. In 45 of them he had reset the password and in 36 he had access to secret messages.

On the second day of the hack, Twitter went to the administration and filed a criminal complaint against the hack. The FBI and the Secret Service then launched an investigation.

According to court documents, the FBI obtained users' details and chat logs from Discord using data and news shared on social media.

The FBI used a copy of the OG user's forum database, which was leaked last April, as some hacker ads were also posted on OG users. The database contained details of users registered in the forum, including email and IP addresses, as well as personal messages.

The FBI was collecting data from Coinbase with the help of the Internal Revenue Service and the address of Bitcoin where the hackers were involved. After studying the data from these sources, the FBI was able to track the identities of the hackers in all three directions. It was linked to email and IP address.

For example, the FBI tracked down Fazelli after he linked his discarded username to an OGUser. This was an operational security upset mistake of Fazeli.

Similarly, Fazeli also made many mistakes in hiding his identity. Initially, he used the address [email protected] to register on the OG Users Forum, but later he used the address [email protected] to hack a Twitter account called Foreign.

He used the same two email addresses in his Coinbase account. Which was later certified by his driver's license.

In addition, Fazeli used a home connection to access all three sites. The three services Discard, Coinbase and OG user's connection log showed his home IP address.

Another person, Separd, had a similar weakness. He had infiltrated the OG user with an ID named Cheiwan. According to investigators, on the day of the hack, Separd was able to access his discarded account with the help of an advertisement posted on the OG user's site.

After that, the researchers got the confirmation from the leaked database of OG user. There, Cheyenne was buying video games from a Bitcoin username, and fortunately on the day Twitter was hacked, Separd was connected to the same address.

Like Faizelli, Separd also uses the actual driver's license to manage the accounts at Coinbase to authenticate his various accounts. However, the FBI has not linked the clerk to the Kirk hashtag 5270 Discarded User.

But according to details released by various US government sources on Saturday, Clark appears to be the man. Hillsburg State Attorney Andrew Warren claimed that the 17-year-old Tampa teen clerk who was arrested on Saturday was the mastermind of the hack.

In a press release issued from the northern district of California, the administration told the state attorney that the clerk was a juvenile. The hacker, who was arrested by Florida, revealed his name was Graham Evan Clerk.

Thursday, August 13, 2020

Binod - Twitter

After all, who is 'Binod', how did he come to be trending on social media?

'Binod' has been trending on social media including Twitter for the last few days. Now you may be wondering, is humor also a trending topic?

But for a while now the word has been on the list of top trending on Twitter. #Binod (hashtag in humor) There have been tens of thousands of tweets so far. Now it is being talked about everywhere.

Famous companies are now sharing their posts using the same trending. There are many mimes coming on Twitter and Facebook linking to humor.

The word is now appearing everywhere in social media posts, mimes, and in the comment section of any post. But some of us don't know who this trending 'joke' is and how it suddenly became trending.

Vinod's full name is Vinod Tharu. It has a YouTube channel, but no videos. Her YouTube activity is also limited. He goes to other people's videos and writes his name 'Binod'.

Recently, a YouTube channel called Slay Point made a video. In which the comments coming on the YouTube channels were roasted about how meaningless they can be. The faces of Abhuday Mohan and Gautami Kawale seen in the video go to comment on the YouTube channel.

That comment was nothing but the name 'Binod'. Suddenly, the video they made went viral. And it was the users of social media who made it trending by writing 'Vinod' in social media posts and comments.

Thus, a flood of posts and comments with hashtag jokes started coming and this name became trending. It didn't take long for the joke to go viral.

The word became so viral that even brands like Swiggy, Tinder, Netflix, Paytm started posting it with the same viral name.

Similarly, a Twitter user by the name of Gabbar Singh asks Fintech startup company Paytm that he can keep humor by changing the username of Twitter. Paytm immediately accepts the request and immediately jokes about its username.

Famous streaming platforms Disney Plus Hotstar also started mimes with this name.

Swiggy, a food ordering app, was celebrating its anniversary. And he tweeted, "We think the first person to call us tonight at 12 o'clock will be Vinod."

Similarly, Netflix India has written a tweet in praise of Arman saying that he has been commenting on every one of his tweets for the last one year. Airtel India tweeted to its followers asking them to start talking and comment on the response they receive every time they receive a call.

Amazon Prime Video India also joined the trending. Not only that, but the Mumbai Police also got involved in it. Linking to Binod, spreading online security awareness, he tweeted, "Dear Vinod, we hope your name is not your online password."

It's going viral right now, change the password right away! '

Similarly, many brands, celebrities, police were all posting on the hashtag Vinod. This trend of India gradually spread to Nepal as well.

Even Nepali brands and users are having fun using this word to the fullest.

Corona's epidemic thus made a meaningful comment to a user who was under a kind of stress, a fast way of conveying meaningful messages and entertainment.

Wednesday, August 12, 2020

Want to extend battery life!

Do this! Tired of running out of battery quickly or want to extend battery life?

If the laptop is new then there is no problem of battery backup. But gradually the problem of battery backup on the laptop begins to come. This does not mean that the quality of the laptop is not good.

But the thing to keep in mind here is that even the way you use a laptop determines the battery life to a great extent. Here are some tips to help you get started if you have problems with battery backup every day. From which you can greatly improve the battery life of your laptop.

Don't make the brightness of the display too much

Most of the time when working on a laptop, the brightness of the display does not need to be kept at the maximum level. If the brightness level is at its maximum, it can affect the battery as well as your eyes.

Most laptops have two keys on the keyboard, which can be used to raise or lower the bristles level. If your laptop doesn't have such buttons, go to Settings, System Display, and Adjust Brightness.

Use the Microsoft Edge browser

The browser you are using on the laptop is also affecting the battery. Many mimes have been created in Microsoft's Internal Explorer.

But Microsoft claims that its Edge browser saves more battery life than browsers like Google Chrome, Firefox and Opera Mini. This means that Edge Browser may be a solution for you in terms of saving laptop battery.

Don't wait for the battery to run out

The habit of most people is to keep the charging cable connected to the laptop at all times or to connect only when the battery is very low. But for longevity of the battery, you must improve this kind of habit. Keep the laptop battery between 40 and 80 percent as much as possible.

Turn off keyboard backlight

Even if your laptop has a backlight, you don't really need it. If so, it is better to close it.

Where lighting conditions are good, there is no need for a backlight on the keyboard. You can turn it off by simply pressing a function key on your keyboard. Or you can turn it off from Windows Mobility Center.

Long battery life

If you are doing office work regularly, you are not using heavy software on your laptop. If so, you need to switch to Best Battery Life or Best Performance Mode.

All you have to do is go to the taskbar and click on the battery icon there. Choose the right balance between best performance and battery saving.

Battery saver mode

On Android and iOS devices, when the battery charge drops below 20 percent, the battery saver mode is automatically activated. Laptops also have similar features.

For this you can go to settings, system and battery. When battery saver mode is activated, email and calendar syncing, push notifications, and apps running in the background are all disabled.

Unplug unnecessary device

If you are not using a device such as a webcam or external hard drive, it is advisable to unplug such devices. You can also disconnect the mouse while the laptop is in sleep mode. Because it also consumes battery.

Turn off Bluetooth, WiFi

If you are not using it, you can also turn off Bluetooth and WiFi. In this case, you have the option to turn it on when you need it. In this way you can save and extend the battery life of the laptop.

Sunday, August 9, 2020

Symptoms of iron deficiency

 Symptoms of iron deficiency

Iron is an essential mineral for the body, which is essential for our health. All the cells in our body contain some amount of iron. But most of the iron is found in the red blood cells in the body. Red blood cells carry oxygen from our lungs to the rest of the body.

Iron plays an important role in the body to produce energy from nutrients. The need for iron also depends on a person's health, age and gender. Women also need more iron for maternity and pregnant women, while men need less iron than others, according to Nutrition Nepal.

Even for an adult woman, one to three grams of iron needs to be stored in the body.

Similarly, iron contributes to the proliferation of the nervous system. If we have too much iron in our body, our body has the ability to store it for the future.

Risk of dehydration in diarrhea

It is raining. There is a risk of food spoiling, melting, and infection. Even flies and chains contaminate food. The source of drinking water can also be dirty. This can cause damage to the tree or diarrhea.

Diarrhea does not have to be scary. It is easily cured by rest, sanitation, nutritious food, adequate water intake etc. However, if you have persistent diarrhea for more than a week, you should be careful.

If you have persistent diarrhea, further treatment is needed. Negligence in such cases can lead to complications due to dehydration. It carries the risk of death.

When there is diarrhea, the amount of water in the body decreases. If this sequence continues, dehydration occurs. In case of dehydration, some symptoms start appearing. As the thirst persists, the lips and mouth appear dry. There are no tears when you cry. It is buried inside the eye. Symptoms include convulsions, restlessness, and lethargy.

The average person gets the amount of iron they need from food. But there are some situations where the amount of iron supplement in our diet is required.

Is there anemia due to iron deficiency?

When there is not enough iron in the red blood cells in our body, such a condition is considered as anemia. If there is not enough and healthy amount of iron in the body, the red blood cells in the body cannot send oxygen effectively.

Symptoms of low iron in the blood:

-Feeling tired

-Feeling weak

- Dizziness

- Difficulty concentrating on any work, etc.

Boys and girls need the same amount of iron in their body until the last stage of childhood or adolescence. This is because a woman's menstrual cycle usually does not begin before puberty begins.

Newborns need a small amount of iron. They receive iron based on the amount of iron in the mother's body while in the womb.

Babies need 0.27 mg daily for the first 6 months after birth. Normally healthy, breastfed babies get that amount from their mother.

Babies born prematurely need more iron than others. Even low birth weight babies need a lot of iron, according to Nutrition Nepal.

Therefore, in case of diarrhea, adequate clean water or liquid should be consumed. Eat digestible and nutritious food. In case of dehydration, treatment should be sought immediately. However, it is not easy to stay in the hospital in the current adverse conditions. So it is better to be careful than to face any problem. The main cause of diarrhea is negligence in food and hygiene. Therefore, the following measures should be taken to avoid diarrhea.

How to avoid

- It is important to pay attention to food. Only fresh, digestible food should be eaten. Stale or overcooked food can upset the stomach.

- You should also pay attention to cleanliness. After defecation, you should get in the habit of washing your hands thoroughly with soap and water. Similarly, hands should be washed thoroughly before and after eating.

- Fruits and green vegetables should be eaten only after washing thoroughly. And, food should always be covered.

- Water should be drunk only after boiling well.

What are the risks?

- If there is a thin direction again and again

- In case of not being able to drink and eat well

- In case of persistent vomiting

- In case of fever

- If you have a problem with excessive thirst,

- In case of blood in the stool

Treatment method

- To prevent dehydration, fluids should be consumed regularly. It is important to keep feeding until the diarrhea subsides.

- Every time after the thin direction, life water should be given. We have to pay attention to this as well. For two to 10 years (100 to 200 ml, patients over 10 years of age should be given life water as needed).

- Treatment of diarrhea patients is to prevent dehydration. Dehydration is a life-threatening problem.

- Rehydration treatment is the most important for diarrhea patients. How and to what extent rehydration treatment is given to the patient depends on the physical condition of the patient and the condition of dehydration.

Tuesday, August 4, 2020

This way you can easily understand the CPU and GPU in computers and smartphones

This way you can easily understand the CPU and GPU in computers and smartphones

The CPU, or central processing unit, is considered the brain of the computer. The graphics processing unit (GPU) can be considered as the soul of the computer. Over the past decade, GPUs have broken with the limitations of computers.

GPUs have helped AI flourish globally. GPUs have become an important part of today's modern supercomputing. It is connecting to a new hyperscale data center. GPU, popular among gamers, has become an accelerator to speed up everything from networking to AI.

GPU has brought an advancement in gaming. It is also bringing pro graphics advancement to desktops, PCs and new generation laptops.

GPUs are no longer limited to PCs. It is based on the old idea of ​​parallel computing. This is what makes the GPU even more powerful.

The question of what exactly is a GPU may come to the minds of many. Imagine you have the latest computer with a Core i7 processor and you do not have a separate graphics card.

But your friend has an old useless Core i3 laptop and your friend has used a new graphics card with high end. When you two play GTA Five games together on your computer, you see the performance of the game is weak on your own and good on your friend's computer.

The brain of a computer is the CPU, to run it you have to use the latest processor. But you can't play the game well. Your friend is able to play this game with fun even on a useless old processor. Seeing this will surely make your mind wander.

Now you understand the importance of GPU by coming here. GPU is a full word graphics processing unit. The CPU is the central processing unit. When you look at these two things superficially, you may feel that these two things are the same.

So these are both small chips. But the way these two are designed, the way they work and what they do, that's what makes them different and special.

The processor on your phone or laptop is a general purpose processor. That does everything. You can do whatever you want to do any calculations, watch movies, listen to songs, browse the internet, etc.

Because it is a general purpose processor. But when it comes to GPU, it is a special purpose processor. Who only looks at graphics with the help of parallel computing.

There are two types of GPUs. One is an integrated GPU and the other is a dedicated GPU. An integrated GPU is a separate component within a single processor. Which handles graphics separately.

A dedicated GPU is something you can keep separate for laptops and computers. For example, GTX 1080, RX 460 are dedicated GPUs. But for integrated Intel's SD graphics, Intel.

Iris Graphics, Intel Iris Pro Graphics. If you use a Qualcomm processor on your smartphone or tablet, you can get an Adreno GPU on it. If you are using Exynos processor, you can get Mali GPU.

If you use an iPhone, there is a Power VR GPU. Integrated GPU is a part of the chip, which works on graphics.

Now the question may arise in you that what is really in the graphics? For which we have to install a separate system. The reason behind this is that we use parallel computing for graphics.

For example, if you are playing GTA Five, the road, car, house, tree, cloud, people are all graphics characters in your game. As you play the game, the computer should process all these things as soon as possible and bring them in front of you.

Since all these objects seen in the scene are not dependent on each other, it uses parallel computing. One part of your GPU handles vehicles, another handles people, another handles roads and another handles other things. All of these things are processed together to create a single scene in your game.

But one CPU can't do all this work. So if you have a dedicated GPU, your gaming performance is very good. In addition, if you are working on video rendering, video processing and image processing, rendering is done in blocks.

There you can split the video into smaller pieces and compute them all in parallel. This way you can improve your work performance if you have a dedicated GPU.

 When it comes to integrated GPU, you can't compare Snapdragon 430 with Snapdragon 615. Snapdragon 615 is an octacore processor based on Cortex A53. Its maximum frequency is 1.7 GHz.

The Snapdragon 430 is also an octacore processor based on the Cortex A53. Its maximum frequency is 1.4 GHz. At such times you think 615 is strong. But remove this illusion. 430 is very powerful for gaming.

Because it has 505 GPU of Adreno and in 615 you get only 405 GPU of Adreno. When it comes to performance based on normal CPU, 615 works well in CPU.