Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Tuesday, July 28, 2020

Changing iPhone? Before that, take care of these things.

Changing iPhone? Before that, take care of these things


Until a decade ago, losing data inside a phone was not a big deal. But now even the most sensitive information in daily life is in your phone.


So now that you lose any data inside your phone, personal information is also public. For the same reason, many people are afraid to change their phone. Is the data on the old phone lost when the phone is switched on? Will chats be deleted? Many are afraid of that.

If you want to upgrade to a new iPhone, you can do so without losing any data. There's a way you can safely move your photos, contact numbers, videos, message history, music, calendars, email accounts, and other apps from the old device to the new one.



1. Back up your old iPhone or iPad

First you need to back up your old phone. You can use your iCloud or computer as a medium for this.

To backup iPhone from iCloud, first connect your device to WiFi. Then go to your phone settings and click on your name at the top.

That takes you to the Apple ID page. Select iCloud there. Inside, go to iCloud Backup, then Backup Now.

Since this will depend on the phone you are using, you can take another step. For example, after clicking on your Apple ID page, you will see a list of devices where your Apple ID is signed in.

Select iPhone from the list of devices. From there, select iCloud Backup. Now turn on with the help of Toggle and click on Backup Now.

Then let your phone be backed up for a while with a WiFi connection. Making your iPhone automatically backed up on a daily basis is even more beneficial.

But remember, no more than five GB of data can be stored for free in the cloud. To backup iPhone from Mac computer, connect your phone to MacBook or iMac and open Finder.

You can then see your device after the location on the left. There you will see all your saved data including music, podcasts, photos and files. But if you have saved your photos from iCloud, it will not be visible until you turn off the feature.

Now go to General tab and select Backup Now. Select the Encrypt Your Backup option to save health and activity. Otherwise it will not be saved. Data encryption is the default privacy feature of iCloud.

Connect your iPhone to a desktop or laptop via USB to backup iPhone from a computer with Windows 10 operating system. Click on the iPhone button at the top right. From there, summarize and go to the backup boat.

Encrypt your backup by clicking Encrypt Local Backup and set the password. Encryption also allows you to back up your health and activity data.

Click Edit Now to find your backup. Then go through preferences and devices.


2. Turn off the old phone

Once the phone is fully backed up, turn off the old phone. If you want to use the old SIM card, put it in the new phone.

3. Turn on the new device

Turn on the new phone. Then follow the on-screen commands. Follow the instructions on the screen to connect to the WiFi network.

4. Restore backup

After switching to WiFi, you can back up data like this:

Continue through the setup process until you reach the app and data screen to back up your iPhone or iPad. Once there, tap Restore from the iCloud Backup option. Sign in with your Apple ID.

There select the data you want to backup. Time is also kept in the backup data. If you are constantly backing up your phone, you can select the correct data by looking at the time and size there.

If the computer has your data, connect the phone to the computer. If you are using a Mac running Catalyst 10.15, open Finder and select the device.

If your Mac is using an older operating system or you have a personal computer, open iTunes. In Windows, select where the iPhone appears. Click Restore Backup on the General tab and select the correct date.

5. WiFi connection should be kept stable

Do not disconnect the WiFi connection until the backup is complete. If it is disconnected, the backup process will stop.


Friday, July 24, 2020

Nepal's cyber security risk has not decreased

Nepal's cyber security risk has not decreased


Experts have said that the risk of cyber security is increasing in Nepal due to lack of adequate precautions. Speaking at a virtual panel discussion titled 'Belt Your Data' organized by Women in Big Data, Narayan Koirala, managing director of cyber security firm Eminence Wage, said that the risk of data breach could not be reduced due to lack of adequate vigilance.


Koirala, a cyber security expert, said, ‘Data security and data brewing are growing in Nepal. Although data security has improved compared to the past, cyber security risks have evolved to another level. '

Similarly, advocate Pravin Subedi, who has been advocating for information and communication technology law, said that the practice of implementing data law in Nepal is the best in Asia. According to him, Nepal is making good efforts in the implementation of such laws and praised the government. He noted the need to be aware of data protection laws and regulations at the grassroots level, as well as to be aware of the security and confidentiality of data.



Similarly, Dobhan Rai, a data scientist and education coordinator, said that data security was as important as a mask to prevent covid 19. "Everyone needs to keep their data safe and prevent potential theft," she said.

The virtual event held on Sunday was attended by 125 people. What is data in that program ?, How does data breach ?, How to prevent data breach? Experts also discussed the current state of data security in Nepal.

Women in Big Data was established in 2015 with the aim of attracting women in the field of big data and analytics. Meanwhile, the Nepal Chapter of Garsh Woman in Big Data has opened. This community organization has been inspiring women to develop their careers by involving them in the field of Big Data.

How strong or weak is your password? Check it out like this



Of course, you may have many accounts online. You may have different passwords for Facebook, Twitter, Instagram, Mobile Wallet, Internet Banking, Gmail and other accounts.


You may think that the password in those accounts is very strong, which no one can hack. But have you ever checked, how strong are the passwords you use in your online account?

If you haven't checked yet, today we are going to tell you about the tools that can help you know how secure and strong your password is.


Generally, a length of 10 characters is considered sufficient for a strong password. However, the important thing to remember here is that the longer the password, the harder it is for the hacker to crack it. So don't be shy about having a 20 to 30 character password.

Also, make it a habit to change your password every three to four months, no matter how strong your password is.

Nordpass


Nord provides users with a free online password testing tool. With it, you can check if the password you have or are about to keep in your online accounts is strong.

As far as you know, if your password is strong, hackers will not be able to easily access your important and confidential data. It also allows you to create strong passwords.

It checks how strong any password is based on its length, uppercase-lowercase (uppercase and lowercase letters), symbols, numbers, etc.

It can even estimate how long a password can be cracked by a hacker. You do not need to download any software or app to check the strength of the password here. You can check the password by going to Nordpass's website by clicking here. Click here if you want to create a strong password.


UIC Academy


You can also use the UIC Academic Computing and Communication Centre's website to check your password strength. Here you can find tips on how to keep a strong password for your account.

Click here to access UIC's password checker tool.

It also helps you to know the difference between strong and weak passwords. You don't even have to log in to check your password. Also, passwords are tested on your computer, so you don't even have to worry about sending your information online.

If you are still not convinced, you can test your password by changing it slightly or by keeping it as a sample. After opening the website, as soon as you put the password in the password checker, it indicates whether your password is weak or strong.

The feature of this website is that it explains the effects associated with every aspect of your password. This will help you to create a strong password.


Wednesday, July 22, 2020

Hamro keyboard is bringing a feature that is automatically written in Nepali letters

Hamro Keyboard is bringing a feature that is automatically written in Nepali letters


The popular Nepali app is going to bring a new feature to automatically write what is said in our calendar. Intending to make Nepali language writing more comfortable and effective, our calendar is going to bring such a feature in our keyboard app.

Managing Director of the company Santosh Devkota said that an internal test of the feature is underway. "We are working to make it public in the next decade," he said. Google's voice typing API is being customized on our keyboard. '



According to Devkota, it can work 60 to 80 percent purely. This feature is being added to our keyboards especially with the aim of not requiring additional keyboards for voice typing.

Devkota understands that Google's voice typing has not been as effective as other languages ​​due to the lack of community support for the Nepali language. "We've missed out on community support," he said. "It's not much different from Google's feature, but we're customizing it in our own way and bringing it to our keyboard."

Although Google's voice typing will support dozens of languages ​​including English, Nepali, Hindi, our keyboard will only focus on the Nepali language. "If there is no problem, we are thinking of keeping English as the default," said managing director Devkota.

Ncell's new easy SIM, data bonus on balance expenses


Private mobile service provider Ncell Private Limited has brought an attractive new starter pack 'New Easy SIM' under its new theme 'Plus'. Customers who get this SIM will get data on bonuses on the first recharge and every Rs 100 balance cost.

The company has stated that new customers can get this SIM for only Rs 99 including tax. Under this scheme, you will get bonus data for one year from the first recharge with the SIM.

With this new SIM, customers will initially get Rs 20 main balance, 200 MB data, and 20 minutes on-net talk time. Thus, the data and talk time received as a bundle with the SIM will be valid for seven days.

The main feature of this new SIM is the additional bundle of services and facilities available with the SIM. Customers will get 500 MB of data (250 MB All Time All Network and 250 MB Forge Data) as a bonus on the first recharge of Rs 100 or more by midnight the day after taking the SIM. The validity of this data is five days.

Also, customers will get a bonus of 200 MB of data (100 MB of all time all network and 100 MB of Forge data) bonus for the first year when they spend the main balance of Rs 100 each. For example, if customers who get this SIM spend Rs 100 on voice, data, or SMS services, they will get 200 MB of bonus data.



The bonus data will be valid for three days, Ncell said. Ncell's Chief Commercial Officer Pradip Srivastava said the new pack was launched for all mobile data users in line with the company's commitment to providing customers with an excellent data service experience and its benefits.

Under the new theme 'Plus', Ncell has started offering attractive 'Nonstop YouTube Plus' offers for its Forge customers, 'Endless Chat Plus' for those who need more voice services, as well as booking of 'Wire-Free Plus WiFi' service.

The company believes that the 'Plus' theme will ensure customers access the service at any moment, with innovative and specialized services.

Saturday, July 18, 2020

What will technology look like in 2020?

What will technology look like in 2020?


Techno Bahadur


With the end of a year, the field of technology is as eager as any other field. What new devices come on the market in the new year? Companies from large to small announce their new products at the beginning of the year. At CES, the consumer electronics company, these companies have been announcing their new products to the public.
Many such announcements are being made at the CES 2020 in Las Vegas, USA. The CES, which runs from January 7 to 10, covers aspects ranging from FiveG to streaming apps on mobile. The issue of smart fridges, new uses in smart televisions, new inventions of gaming hardware, electronic devices in transportation, etc. are being looked at with great importance at CES this time.

The beginning of FiveG


Now FiveG has been launched in different parts of the world and some mobile companies are using it differently. This year, it is estimated that there will be new uses in FiveG as well.

This year, it is estimated that the use of FiveG will range from running only within a certain area to running everywhere with a mobile network. Various mobile service providers are still offering FiveG services in various parts of the United States. This year, five is expected to expand to other countries in the world, including the United States. At the same time, various speculations are being made at CES as to whether Apple's new mobile phone will have a FiveG feature or not.

While there have been various questions about FiveG, CES has seen a positive response, according to the technology website The Verge.com. The Verge says, ‘Products ranging from folding phones to 3D screens are likely to hit the market this year. But more importantly, FiveG's features will reach the global level. '


Revolution on streaming platforms


In 2019, various platforms including Netflix, Flex, and Hulu took advantage of the video streaming facility, which is limited to YouTube. Last year, Netflix was established as the mainstream app used by American users, according to Business Today. This year, these streaming platforms are expected to become more complex at CES.

According to The Verge, the current streaming platforms in the market are in conflict with each other. It has been argued that rumors are more prevalent on these platforms even in CES. By 2020, CES is predicting that most streaming platforms will produce some new content or bring some new offers with their apps. But more than that is unlikely to happen this year. 'Also, CES estimates that some new work could be done on such streaming platforms in collaboration with expensive artists and expensive companies.

Netflix now produces its own content, while other platforms are also producing content. Also, popular television series like 'Friends' and 'Seinfield' have been made their own by such platforms. According to The Verge, some new content will be released on Netflix this year as well.

8K resolution in gaming


Graphics are very important in gaming. Keeping this fact in mind, various companies are expected to do new work in graphics by 2020. Sony or Microsoft is expected to bring 8K resolution to gamers at CES.

Nintendo, Sony, and Microsoft, which have made a name for themselves in the gaming sector, are also expected to clash, according to The Verge. "The three companies seem to be competing for gaming, including new devices," The Verge said. "Amazon is equally likely to bring its cloud gaming system to market." Apple can also attract gamers by offering a larger screen on its TV or iPad. '

Electric ride


There are various uses for electric vehicles in the world today. In some lands, electric vehicles are becoming more and more popular. The Verge estimates that electric vehicles will dominate the road in a few years. "However, this does not mean that the world will get rid of other fuels," said The Verge. "Every vehicle on the road now has an ICE engine." It may take a few more decades to completely remove it. '

In previous years, there were also automobile exhibitions at CES. However, there are no such exhibitions this year. Therefore, there will be no exhibition of new electric vehicles at CES this year. Except for Nissan's electric car and Hyundai's 'flying car', no vehicles are included in the CES. "This year, as in the past, absurd electric vehicles may be made public," the CES estimates. However, Tesla is likely to bring some new products.


Other technology


While there has been talking of replacing the traditional DSLR camera in electronic devices with a mirrorless camera, CES has argued that the DSLR will not die so quickly. Also, the development of new security technologies in smart homes is expected to be encouraging. Also, the development of 8K resolution from 4K resolution in television is estimated to take place in CES this year.

End of Windows 7


The Windows 7 operating system operated by Microsoft is no longer running. After 11 years, Microsoft has ended its operating system. In the coming days, there will be no software updates or security updates for Windows 7.

Among the operating systems brought by Microsoft, Windows 7 was considered to be the best. Windows 8, which came after that, did not get the same praise. However, many people like Windows Ten. The highly acclaimed Windows 7 has ended on January 14.


What operating system does Microsoft bring? There are various arguments in the world of technology. Some time ago, Microsoft had said that it would not bring Windows 11 right now. The upcoming Windows Ten-X is also an operating system designed with folding devices in mind rather than laptops and desktops.

After the end of Windows 7, it is estimated that Windows Ten will be used more than Windows 8. The use of Windows Ten is expected to increase as Microsoft has provided the facility to update Windows Ten directly from Windows Seven.

Choose - weird video or useful content?

Choose - weird video or useful content?


Social Media in Lockdown-

 

At the moment, there is a kind of competition among Nepali users of social media in producing weird videos and funny content. But, in this lockdown, social media can be made a learning bag.

Popular video streaming platform Netflix has dropped the technical level of all its videos by 25 percent. Low-quality videos consume the Internet. Netflix has taken this step to reduce the load on the internet network system due to the increasing pressure of the users.

From international tech giants to local service providers, they are under pressure to see a sudden increase in internet traffic. Studies have shown that worldwide Internet use has increased by about 50 percent. For those living in the woods at home to help control the Kovid-19 epidemic, there is no one as close as the Internet.

Researchers are taking a closer look at what kind of Internet platforms people are engaging in, what activities they are engaged in, and their psychological, social, and economic advantages and disadvantages. Some interesting facts have also come out.

At the time of the epidemic, the psychology of the average person is different than at other times. Their needs are different, their interests are different, their priorities are different. This has changed the trend of internet usage. A New York Times study has shown that the number of people using the Internet from a computer has increased more than from a mobile phone. The gist of the study is: People are expressing themselves more seriously, helpfully, and responsibly on social media than ever before.

Video streaming platforms such as Netflix, YouTube; Social networks such as Facebook, Twitter, and Ticket; online video games and news sites have become increasingly popular. The general public is less interested in politics, war, economics, and sports.


Why is usage increasing?


What are the reasons for the sudden increase in the use of the internet and especially social media? The main reason is leisure. People have more free time now than ever before. The second reason is restlessness. I have to stay in a small place due to the lockdown. People are worried about where things are going. At such times, we want to participate and give some feedback. So even those who have never had a status are posting a status on Facebook. Those who never made tickets are now making them. Those who have not heard of Instagram are currently learning by opening an account. Even though some of them are sharing file fungus video on messenger, they are still frozen in the media on social media.

Currently, the number of people working from the office is significant. Internet banking has become widespread. Internet platforms are being used to conduct television interviews, from doctors advising their patients to organize large conferences.

Among the Nepali users of social media, there is a kind of competition in the production of weird and fun content. Activities are ranging from doing old photo making to various challenges and having fun with friends. It's like a fashion and a trend. There is free time, as soon as someone does something, many people start following it and it gradually becomes a trend. And, not all people always come up with new ideas. When you follow an idea started by others, it becomes a trend and a fashion. Such trends come and go at the same time.

Despite the practical inconvenience caused by the lockdown in Nepal, the epidemic has not yet caused any human casualties in the country. That's why social media users are now spending so much time. However, users of countries plagued by epidemics are not in a position to enjoy such content.

Jokes and jokes on social media have a positive psychological effect. Psychologists have been suggesting that more negative information and news affect mental health while staying inactive and having fun. This does not mean that you spend as much time on the Internet and social sites. Excessive use can lead to social media addiction. It also affects the health of the eyes and muscles. Managing time with the kitchen, kitchen and other household chores is a good way to enjoy such items.

In fact, there is no exact answer to the question of how long to use social media. How much time do you have available? How much time do you spend on social media? Those who use it correctly benefit from it. However, it is definitely to the detriment of those who are unable to manage their time around the clock.


Contribution to epidemic management


Information reaches the world in a matter of seconds on social media. What kind of efforts of Kundesh have been successful, what efforts have failed, everyone has got a chance to be aware. A video of a teenager in Vietnam washing his hands with soap and water to prevent the spread of the virus has gone viral around the world. Information on how to make masks and sanitizers at home is trending. Such general information is of great importance. Because of this, people's lives have been saved.

The Internet has made a very positive contribution to epidemic management. Even though people live in small places, he does not have to stay away from his family, community, and the world. Even though there is no physical contact, their virtual relationship is being formed with relatives, friends, and acquaintances. Mutual trust has increased.

At this time, social media companies have made a lot of effort to make a positive contribution. Facebook has mobilized fact-checkers by investing hundreds of millions of dollars Is Due to which significant improvement has been seen in misinformation control. Google has been providing researchers with location data, surveys, and tracking tools. YouTube has been constantly putting warning messages in the middle of videos.

This is the first time in the history of virtual networking. Even when physically isolated, people's happiness, frustration, and anger are being exchanged on the Internet. This was unimaginable a few years ago. Without the Internet and social media, it is not difficult to predict the magnitude of the damage caused by the Kovid-19 epidemic.

Infodemic with Pandemic


The word infodemic is popular now. This means an epidemic of misinformation. Because of the open media, there is always the fear of spreading false information from the internet. Such information can lead to serious accidents, especially when death, deprivation, and fear are unsettling.

This can lead to rumors and misinformation. There is a danger that people will make hasty decisions. There is also a fear of cybercrime. Along with banking and government services, various services are requested online. People who trade physically have asked online. Not everyone is aware of cybersecurity. This can be very easy for hackers and other internet criminals. The number of users of internet banking and mobile banking has increased more than before. At the same time, security challenges increase.


Lockdown can be an opportunity


Leaving your regular routine and staying at home increases your worries about your studies, career, and business. The woodcut ends soon. We have to go back to the old way. At that time, it is natural to worry about how to fill the current gap. At this point, social media and other Internet platforms can make you feel great.

If you are a housewife, you can learn how to cook new food on a platform like YouTube. Farmers can learn about their crops, traders can learn about new business opportunities from the internet. You don't have to leave home to learn a new language, learn photography, and take an art course.

Now some teachers are teaching their students through social media. There are many platforms to develop your capabilities. You can share your skills, abilities, and positive experiences through social media. Many universities have online courses. From short courses to degrees that suit you, you can get them online. Not only sound education but his alertness and dedication too are most required.

Job seekers can learn how to create good bio-data on the internet. Learn how to prepare for an interview, how to write a good cover letter. Some people may fear that if they stay inactive for a long time at home, their ability to work will decrease. They can get updates on what is happening in their profession. Because this time is a good opportunity to learn.

The first 'bike' made in Nepal

The first 'bike' made in Nepal


The first motorbike made in Nepal has been made public. Founded in 2017, the electric bike manufacturer Yatri Motorcycles has brought this bike as its first product. The bike is named 'Yatri'.



This bike has been built under 'Project-Siro'. The electric-powered bike was built by a team of six Nepali youths, including four engineers. The company says that they have designed and manufactured all the parts of the bike in collaboration with the United States, China, India and other European countries.

The bike has 40 horsepower and the company says that it can run 230 kilometers once fully charged. The full speed of the bike is 120 kilometers per hour and the bike has a screen with a seven-inch display, which will show the speed. Called environmentally friendly, this bike has its own app 'Passenger Hub'. According to the company, the bike will be available for public sale from March 2020.

Wednesday, July 15, 2020

Troubled by the problem of full storage on the iPhone? Do it

Troubled by the problem of full storage on the iPhone? Do it


The problem of storing flowers in mobiles is a major problem for almost everyone. There are dozens of ways to free up storage on an iPhone.

So if you have enough budget, we advise you to buy an iPhone with enough storage. But if you don't have enough money and the problem of storage flowers keeps recurring, you can use a different solution to solve it.

First of all, you can take some basic steps. For example, delete duplicate photos and screenshots. Back up essential photos and videos to the cloud service. However, if your iPhone's space is not free, take the following steps.


1. Shoot at high efficiency


If you're using the iPhone 7 or the newer iOS 11, Apple has a new 'High Efficiency' compression format, which saves photos in HEIF, the high-efficiency image format, instead of JPEG. Similar videos are saved in HEVC, or High-Efficiency Video Coding, instead of H.264.

According to Apple, HEIF can store twice as many photos as JPEG. The file size is up to 80 percent smaller than JPEG.

A high-efficiency format is enabled by default in iOS XI. But sometimes this setting may be unknowingly turned off on your iPhone. In this case, follow the procedure below to enable it.

First, go to the iPhone's settings. From there, go to the camera format and select High Efficiency instead of Most Compatible.

But high-efficiency formatting has its own limitations. Not all devices support it. If you want to view or share such files on other devices, you need to convert them to JPEG and H.264 formats. There are some special apps and online conversion tools for this.

2. Delete photos and videos from messages


The photos and videos you send in the message also take up space in your storage. To empty storage, manually delete messages and photos in the chatbox. Delete the message in the same way.

If you are using iOS 11 you do not have to do this manually. Go to your settings. From there, log in to General and iPhone Storage and tap on 'Review Large Attachments' at the bottom.

After doing so, you will get a list of all the attachments sent in the message. Go to that list, tap Edit, and select and delete all the items you want to remove.

3. Set the message to be automatically deleted


One of the features of Snapchat is that every message sent to it is automatically deleted after a certain period. That way, your phone's storage is always secure. But the messaging app does not have such a feature.

You have to adjust the settings so that the message will be deleted manually. You can set the time for the message to be automatically deleted. You can adjust the settings to delete messages every year or every 30 days.

To do this, first, go to Settings and go to the message history within the message, tap on Keep Message and adjust the setting there as you see fit. Follow the same procedure for other audio messages.

4. Remove unused apps


IOS Eleven has another storage-saving feature called 'Offload Unused App'. To enable it, first go to Settings. From there go to General and iPhone storage and click on Isbell.

 After doing so, when your storage is low, the iPhone automatically deletes unused apps.

5. Delete cache app data


Apps like Twitter consume a lot of data to load faster. These caches occupy large storage space. Photos, GIFs, and vignettes sit in the media storage section of your Twitter. By deleting such files, you can increase the storage again.

To do this you need to have the latest version of Twitter. Go to your profile icon in the app. Tap Security & Privacy then tap Data Usage.

Then tap Clear Media Storage by pressing on Media Storage. You can use the same setting to free up web storage.

Samsung has been Asia's 'number one' brand for 9 consecutive years


South Korean company Samsung has managed to rule as the top brand in Asia for nine consecutive years. According to the recently released 'Asia Top 1000 Brands' report, Samsung has managed to be number one this year as well.

According to the report prepared by Champion Asia-Pacific in collaboration with Nelson, Samsung has been at the top of the list since 2012. Second, on the list is US tech giant Apple.

Japan's Panasonic, South Korea's LG Electronics and Switzerland's Nestle are ranked third, fourth and fifth respectively. Sony, which was at number four last year, has reached number six this year.


Oppo has made public the fastest charger so far, the mobile will be fully charged in 20 minutes


 Now smartphones can be charged even faster. Oppo has unveiled a 125-watt charger on Wednesday. When it comes to charging power, this capacity charger is the most powerful ever.

According to the company's engineer Jeff Zhang, it will be a game-changing wireless charger. Which will charge the mobile phone battery in the shortest time ever?

This charger can fully charge a 4000 mAh battery of a modern flagship phone in 20 minutes. A zero percent battery can charge up to 41 percent in five minutes. It maintains the temperature of the device at 40 degrees Celsius while charging.


Earlier, Oppo had unveiled a 65-watt charger, surpassing other smartphone brands. It delivers twice as fast results as the 65-watt charger used in phones like the X2 Pro. The 125-watt charger is similar in size to the 65-watt Super VOOC 2.0 Brick Charger. But it has a Type C USB port.

Oppo will also offer 65-watt USB PD and 125-watt PPS support to make its new charger compatible with other devices. Oppo has also unveiled another fast wireless charger at the same event.

The new 65-watt Air VOOC can fully charge a 4,000 mAh battery in 30 minutes. It can also fully charge the phone at a temperature of 40 degrees Celsius. It uses a parallel dual coil design and Oppo's isolated charge pump technology.

But it is not clear when Oppo will unveil the device that will support both of these chargers. However, the company said that such a device is commercially ready.

In fact, Oppo's philosophy is different from other competing technology brands. Instead of prioritizing voltage over other brands, Oppo has been prioritizing the current flowing through circuit points.

Sunday, July 12, 2020

15 billion usernames and passwords leaked, didn't you?

15 billion usernames and passwords leaked, didn't you?


Agency. More than 15 billion account usernames and passwords have been leaked online, according to security company researchers. The researchers said that passwords and usernames were leaked from network administrators 'accounts to bank accounts and streaming services' accounts.

Digital Shadow's cyber security researchers spent 18 months studying and analyzing how hackers gain access to accounts and steal account details.

All those usernames and passwords are for sale in the underground forum. A report released by the Digital Shadow Photon Research Team on Wednesday states that more than 100,000 data theft cases have been detected over a two-year period. Credential (username and password) theft has increased by 300 percent during the period.



Most of these credentials belong to consumers of various services. Those credentials are currently selling for an average of. 15.43 on the forum. Some are said to be being distributed free of charge by hackers.

Investigations have shown that the hackers got their hands through credential phishing, credential stealing malware and credit card scammers.

The report also states that users do not know when the credentials are stolen. Such hacked credentials were shared many times. Even though many credentials have been duplicated, there are still five billion real accounts for sale in the underground.

The most expensive of the credentials for sale are administrators. Such credentials can also give access to systems within the organization. The value of such credentials is one hundred and twenty thousand dollars. The average value of these credentials is, 3,139.

Bank login credential theft is now being sold at the most expensive price in the accounts of such service recipients. These credentials are currently on sale for 70.91. From such bank login credentials, hackers can also access the victim's bank account. Using it, hackers can also take credit cards, loans and other financial packages.

The value of hack accounts of similar antivirus programs is placed second. It is currently priced at २१ 21.67, which is less than the statutory annual subscription.

Media streaming services, VPNs, file sharing accounts and social media credentials are now selling for $10. Researchers have pointed out that the main reason behind the leak of credentials of all these accounts is the use of weak passwords.

One of the best ways to keep your online account secure is to have unique and unique passwords for all accounts. A password manager can help you with this.

Similarly, multi-factor authentication is another good solution. You may receive alerts while using it if someone tries to log in to your account using your password.

But with 15 billion account credentials out there, your chances of being hacked are high. If you have any doubts, it would be wise to change your password once.


Password Manager in Firefox Browser, thus protect your privacy


 Mozilla recently unveiled the Firefox lockbox. Which was accessed in Firefox's password manager.

However, due to the fact that saved passwords can be viewed, new passwords can be added or old passwords cannot be edited, it was not fully viewed as a password manager.

This effort laid the groundwork for Mozilla Firefox's full password manager. Firefox Lockwise Password Manager is now available.


In Firefox Lockwise, you can create a new password as well as edit and delete it. You will also be able to see your password. But to copy, you have to use manual method.

Firefox lockwise does not include password generators. Due to which, when you have a new password, you have to create a unique and strong password yourself.

Firefox Lockwise's mobile app is available on both Android and iOS. But those versions cannot have a new password. In which only the password can be seen.



How to use Firefox lockwise?


Firefox Lockwise has been made public with version 70 of the Firefox browser. If you are using version 70 before Firefox, upgrade your browser first.

After upgrading to the new version, you need to log in to your Firefox account. To do this, click on the menu button in the upper right corner and go to Sign in to Firefox.


Create access to Firefox lockwise from the Firefox menu


After logging in, Firefox synchronizes all data, including your password. It won't take that long. When this process is complete, click on the menu button again and click on Login and Password.

You can open a new tab and type in login in the address bar. This way you can access Firefox lockwise from anywhere.

Once Firefox Lockway opens, you can search for any password by typing the name or username of the site or service.


Searching for passwords in Firefox

How to make a new entry in Lockwise?


Click the Create New Login button to enter the new password in Firefox Lockwise. Then type the URL, username and password you want to put in the next window and save.


Make a new entry in Firefox Lockwise

After making a new entry, it will be synchronized with your Firefox account. It is readily available in Lockheed Firefox.

How to enter master password?


 No one lets your browser save passwords. Why Because doing so is unsafe. If you find it difficult to keep a password every time you visit the site, then Firefox browser can be a fast option.

Which includes a feature to secure such logins. The master password in it keeps your website locked. Which only opens after you enter the master password. Without such a master password, Firefox refuses to access the login saved in the browser.

This is the simplest and most effective way to keep your browser safe by logging in and saving credentials. But, how do you set the master password? In fact, it is very simple. Let's see for a moment!

The first thing you need to do is open Firefox. Now click on the menu button. Click on Preferences from the menu button. Click on Privacy and Security.

After doing so, a new window opens. Click the checkbox to use the master password. Prompt by verifying your new master password. Make this password very strong.

Even better if you create a master password using the password manager. Which you can't even remember. Now close and re-open Firefox.

If you open Firefox now, you will be asked for a master password to access any details used on any service or site. Sometimes a prompt to ask for a master password may not appear immediately.

In this case, you have to wait a while. Even if the pop-up does not appear immediately, none of your other passwords will be available until you enter the master password.

Now remember, how effective is the Firefox Master Password? If you are sensitive and concerned about your security but do not want to type your username and password every time, then you must use this master password feature.

If you do not have a master password, anyone with access to your Firefox web browser can view your password.


Here are 6 secure password management options


Sometimes passwords can be a real pain. Here are some tips and tricks to keep our account secure, including complex and unique passwords with numbers and characters. But our brains can't usually remember all such passwords. So what is the solution?


Here we are going to suggest you some secure and universally accepted password managers for solutions with options. Of course, there are other good password managers. However, here is a list of the best password managers available to stay safe in the Internet world.

LastPass (Windows, Mac, Linux, Chrome)
LastPass is a fun password manager. Which is available free of cost with premium features. Once the master password is set, LastPass allows you to import saved login credentials - usernames and passwords from Firefox to Chrome, Edge, Opera and Safari.


This can save you the hassle of having to remember your password by deleting the information on your computer. Other free features at LastPass include two-factor authentication, credit monitoring and auto-fill features to facilitate online shopping from multiple identities.

It also stores your encrypted information on your cloud server so that you can easily use LastPass on any computer other than your PC. LastPass also works as a password generator to create unique passwords.

While LastPass is a topic of choice for many because of its features and interface, we also need to remember that at some point in the past, it even faced security sensitivities.

Dasslin (Windows, Mac, iOS, Android)

Dassel is comfortable and simple. Empowered by two-factor authentication. With the help of this, many passwords can be organized in one place in just a few clicks. If there is a problem with your account, it will send an encrypted password to the emergency contact.

The software also lets you store passwords locally encrypted, meaning it automatically syncs passwords to your devices. Dassel is also a digital wallet. From which you can even buy online from various vendors.

However, that facility is not yet available in Nepal. You can also set the app to automatically reset your password if the site where your account is hacked. Although Dassel is free, there is a fixed annual fee for the commercial version.

1 password (Windows, Mac, iOS, Android)

Another very famous and reliable password manager is 1 password. The Watchtower is designed to provide users with a strong password generator feature as well as username and password storage (including secure sharing), as well as direct information on website thefts.

In this software's digital wallet you can securely login and save credit card information in the form of sticky notes and network passwords. Even the developers are convinced that it is safe. They even announced a 100,000 reward for information leading to the capture of Ekta.

With one purchase you will have the facility to sync locally. However, you can also use the software to sync your computer with your Dropbox, iCloud and other methods. But the biggest problem is that there is no free version.

If you want to use it, you must be willing to pay a fee of  3 per month. However, there is an option to use one password with limited syncing option as a one-time purchase.

Keeper Security Password Manager (Mac, Windows, Linux)

Keeper Security has been providing password solutions at the enterprise, business, family and personal levels. Which is establishing it as the largest password manager to date.

It uses two-factor authentication and allows you to securely store your information. Keeper has a number of practical features that have garnered rave reviews from individual users.

One is version history - it can restore even the initial version of your record if needed in case of any problems. In addition, you can access your password through five different contacts as emergency access.

Keeper has been offering data storage with more flexibility compared to some other password managers. Accordingly, in the app, you can store passport information, driving license number and other important records in the custom field.

Sticky password (Windows, Apple, Android, iOS)

Sticky Password is a free password manager developed by AVG Antivirus developers, the premium version of which includes additional cloud features. It generates strong passwords as well as easy-to-navigate AES-256 encryption, especially for mobile devices.

Sticky Desktop (limited to somewhat limited to mobile) to accommodate a wide variety of Pal Moon, Yandex and Sea Monkey browsers.

Is It also has the option of cloud encrypted syncing to protect sensitive data on wireless connections. Sticky supports both Face ID and Fingerprint for login passwords.

Intel's True Key
True Key focuses on biometrics as an alternative to master passwords. It emphasizes face and fingerprint instead of password for sign in. Like other great password managers, this app provides new passwords when logging in to a new account and protects your information.

This software automatically helps you by signing out and even resetting the old master password. Both of these features can be adjusted to suit your needs. It also has the option to store information including addresses, credit cards, membership, license numbers.


Problems with apps crashing on iPad and iPhone


Agency. Now there is a problem with the app crashing on Apple iOS devices. There have been widespread complaints from iPhone and iPad users.

Various popular apps and services like Spotify, Pinterest, Tinder, Wedge and Draft Kings are starting to crash. Similarly, the mobile game Marvel: Contest of Champion has also been affected by this kind of problem.

A similar problem has been seen in the Facebook login. The Facebook developer site said in a post that the company was aware of the problem of app crashes due to a growing error in iOS SDK and was also conducting research.

But this has not affected the Android version of the app. One of the best ways to avoid this is to use a VPN on your smartphone.

Sunday, July 5, 2020

Google collects more data than you think, how to view, delete and block

Google collects more data than you think, how to view, delete, and block?



You may not know that Google collects more of your personal data than you think. Google keeps a record of every video you watch and every video you watch on YouTube.

Whether you use the iPhone or Android. Even if you don't open Google Maps, it will follow you everywhere. You will be amazed if Google finds out about you.

But don't worry, there are some things you can do to help Google. The company said it would automatically delete the personal data of new Google Account users. But by default, it is only possible after 18 months.



If you are a new user of Google and are creating a Google account for the first time or have just purchased an Android phone, you can also take advantage of the latest announcement from Google.

But if you are using an old Google account or running an old Android phone, you should be deprived of this feature of Google.

Today we're going to teach you how to access and delete your data from Google. We'll also talk about some important settings on how to strike a balance between using Google's services and protecting your privacy.

What information does Google make public?


Google is likely to know your name, age, gender, your face, the email address used, password, and phone number. Some of these are public information, some are highly personal.

Now follow these steps to find out what Google shares about you with the rest of the world.

Click here to go to your Google Account.

If not logged in, type your Google username and password.

Select Personal Info from the menu bar and see the information there. Once there, you can even change your photo, name, birthday, gender, password, email, and phone numbers.

If you want to see what information has been made public about you, scroll down to the Go to About Me.

There are three types of people who can see your details on the page. One is visible to all, the other is visible to the organization you work for, and the other is visible to you. You can see how this information is kept public and confidential.

But you currently have no way to keep your account completely confidential. However, Google has said it will use a privacy control dashboard for mobile devices and desktop browsers.


Here's how Google has recorded your online activity


If you want to see what data Google has collected, follow the procedure below.

From there, you can get a record of your online activity, review it, delete it, or set it to automatically delete it within a certain period.

Sign in to your Google Account by clicking here and select Data & Personalization from the navigation bar there.

If you want to see your activity recorded by Google, scroll down to the place where Activity Control is written and select the Web and App Activity under it, and go to Manage Activity. There you can find all of your Google searches, YouTube View History, Google Assistant Command, and all the interactions recorded by Google Apps and Services.

To turn it off completely, go to the Knit Saving Activity at the beginning and put the Web and App Activity Toggle (button) in the off position. But beware, changing this setting can make the Google Assistant devices you are using, such as Google Home and Google Nest smart speakers and displays, virtually useless.

If you want Google to stop tracking sites signed in using your Chrome browser history and Google Accounts, uncheck the first box. If you do not want Google to record the audio of your conversation with Google Assistant, uncheck the second box or follow the fifth step.

If you want Google to delete such data manually or delete it every 18 days, select Auto Delete and select the time step you want. Google will then immediately delete data that is older than you set. For example, if you select three months, your data older than that will be automatically deleted.

Once you have selected the Auto-Delete setting a popup will appear on your screen and it will ask you to confirm. Then select Confirm.

Click Manage Activity. In it, you can find all your data and statistics collected by Google, including the date. All records from the first day you created your account are there.

To delete data on a specific day, select the trash can icon to the right of the corresponding day and then select Got It To get more specialized data or doing it one by one To delete, select the three dots next to that item and select Delete or Detail.

If you want to manually delete part or all of your history, select the three-dotted icon at the top right of the search bar at the top of the page. Then select Delete Activity according to the time option available there.

To see if your new settings work, go back to the Manage Activities Step 4 directory.

Access the Google records in your location history

The most frightening situation comes when Google keeps an eye on your every move. Once you sign in to Google Maps on your mobile device, you realize that you are being monitored by someone every day.

Now you have no choice but to throw the phone away. But if you follow certain procedures, you can access and manage or delete Google Maps data.

Sign in to your Google Account by clicking here and select Data & Personalization from the navigation bar.

To view your location data recorded by Google, scroll to Activity Control, and select Location History.
If you want Google to stop tracking your location, turn off the toggle on the page, scroll down, and click Pause.

If you want Google to delete such data or delete it every 18, select Auto Delete and select the time frame that suits you. Google will then immediately delete data that is older than you set. For example, if you select three months, data older than that will be automatically deleted.

Once you have selected the Auto-Delete setting a popup will appear on your screen and it will ask you to confirm. Then select Delete or Confirm.

To permanently delete all of your location histories, click the Trace Can icon in the lower right corner and then select Delete Location History that appears. To delete the location of each trip one by one, select the dot in the timeline map or bar, and on the next page click on the Trays Can icon next to the date of the trip you want to delete.

To make sure your location data is deleted or not, start with the second process of Activity Control and continue with the fourth step of Managing Activities. You can see it by opening the timeline in the upper left corner. Also, you will not see any dot on the map showing any of your previous locations.


Here's how to manage YouTube search and watch history


YouTube Search and Watch History is one of the records that Google tracks. Compared to other records, it is not so harmful. Instead, you can benefit from it.

With the help of YouTube's Watch History, Google knows your choice and sends you the video you want. However, if you want to delete such history, we are also teaching you that method.

First, sign in to your Google Account by clicking here and selecting the Data & Personalization navigation bar.

If you want to see all the YouTube data recorded by Google, scroll down to Activity Control, and select YouTube History.

If Google wants to completely remove your YouTube search and view history, turn off the toggle on that page. If you only want to delete the watched video or search, uncheck the Appropriation box.

If you want to automatically delete all of your YouTube data in Google in 18 months or less, select Auto Delete and choose the option you want. Doing so will erase all records older than the time you set. For example, if you select three months, all records older than three months will be deleted.
Once you have selected the Auto-Delete setting, a pop up will appear and prompt you to confirm. Select Confirm there.

Click Manage Activities. Here's a list of all the videos you've watched and searched for.

To delete a record for a specific day, select the Trace Can icon to the right of the date. Then select Gut It. Select the three-dotted icon to get more specific details or to delete individual items. Then select Delete or Detail.

If you want to delete all records or only certain parts of your history, select the three-dot icon at the top right of the search bar at the top of the page. Then select Delete Activity By and select the time you like.
You can start with Activity Control as taught in the second step to determine if YouTube's recorded data has been deleted. Then go to Manage Activities and see the topics you deleted.

Another important thing about privacy


Don't be under the illusion that Google's access to your data is completely blocked by setting up Google to prevent you from tracking your online or offline activity.

Google even when the user turns off their location service

China is thus becoming a world superpower of technology

China is thus becoming a world superpower of technology


What would it be like to add points to your account when you do good deeds and decrease points when you do bad deeds? Points are added when paying your taxes and arrears on time and the practice of decreasing points when entering a restricted area or crossing a lane on the road is being practiced in our neighboring country China.

This is called the social score there. In China, it is managed by machines. These machines are an interesting and controversial example of artificial intelligence.

In China, the machine is rating people's behavior. If the temperament is good, the government will provide facilities and if it is bad, it will punish. Looking at this practice of China, it is certain that China will soon become a superpower of artificial intelligence in the coming days.

However, the competition between the United States and China to become a superpower is an ongoing issue. But the main path taken by China in its journey to become a superpower is technology. For this, not only in the field of artificial intelligence, but also in the field of voice recognition, facial recognition, big data and robotics, China is at the forefront in the world.

For example, China has built its own indigenous aircraft. He has also built a bullet train running at a speed of 400 kilometers per hour. The model of which has already been prepared for export.


Companies like Apple, General Motors (GM), Toyota, Volkswagen are opening their industries in China. They are also operating a research center.

In China, all this is happening under Made in China 2025. In 2015, the Chinese government set a 10-year target. The aim is to make China a superpower in industry and technology within ten years.

China has made it clear that it wants to change its image by exporting cheap clothes, shoes and toys. For this, China is investing heavily and putting pressure on foreign companies to transfer technology directly or indirectly.

How is this possible? In fact, there is a binding rule that any foreign company entering into the Chinese market must form an alliance with a local company. In addition, China buys ownership of foreign companies as part of its strategy.

For example, you may have heard of the Mercedes Benz. The Chinese company Gili is the largest shareholder of the German car maker Dambler. In addition, there are many legal entities in China that force foreign technology companies to stay permanently in China.

For example, Apple is preparing to open the first data storage center in China in collaboration with a local company. For which he has to follow all the rules of the Chinese government. From this all the information of the company is obtained by the Chinese government.

China is placing special emphasis on artificial intelligence. He is also increasing his artificial intelligence in the army. Wars and weapons can be controlled from a distance with the help of artificial intelligence. China is also developing AI-based missiles. Which can automatically detect the target and work on its own without human assistance.


There are many such companies working in AI in Shenzhen, China. Some of them are also working to make the health sector more modern. According to the Chinese media Xinhua, China has been developing software based on the central algorithm since 2007, which will be able to make decisions with great speed and accuracy during wartime.

Look at the drone technician. The United States has refused to give its drone technology to any country. But China has announced the exact opposite, rushing to export its drone technology to other countries. China plans to supply military technology to countries not close to the United States.

China is now the world's largest drone exporter. According to the International Institute for Strategic Studies, China has sold its drones to Egypt, Pakistan, Nigeria, Saudi Arabia and Burma.

After all, how is all this possible for China? The answer is simple. Chinese startups get tax breaks, government contracts and office space. The Chinese government is working with big companies. Like Baidu, Alibaba, Tencent.

Similarly, China has become the largest market for artificial intelligence startups. China also has the advantage of data and cheaper labor.



Another thing is that China is an important supply chain in the world. All materials are made in Shenzhen and Guangzhou. The chip inside the mobile you have in your hand is made in China. Here the materials are assembled. China has access to technology around the world.

China does not consider exploration important to gain technological power. He focuses on the use and accessibility of technology wherever it may be. Recently, the Indian government banned 59 Chinese apps for data security reasons.

China has come a long way in the cyber challenge game. Even countries like the United States have accused China of plagiarism and taken action against such companies.