Web Analytics ITInfoWorld.org
Latest Post

photo allline
There is no chance of web browsing in the violence of cyber criminals. If you do not have any kind of protection, then your information can be handled by online hackers. Not only that, online marketers will also bring you in a tight online life, the trouble of online advertising. You have to take help of some tools to stay safe online. We have organized this year with some of the tools.

Tor Web Browser

Your webpage visits information is stored when browsing through a common web browser. As well as your IP address is also submitted. If you want to keep your activities out of sight during web browsing, Tor Web browser may be helpful. Tor network can drive traffic in such a way that it is impossible to tell the browsing activities of this browser. Almost all websites from this browser have the opportunity to travel to Anonymous. If you want to use this browser, please visit www.torproject.org/download/download.html.

Metro password manager

There are no alternatives to using strong passwords in online account management. But remembering that creating thousands of online accounts for a different password is extremely difficult. The METRO password manager can make that work easier. This browser-based password manager can save all your online account passwords. And then after setting a master password for this service, remember that password is your job. The open-source password manager can be used in all the top browsers. To use it, visit www.mitro.co.

GPG (encrypted mail)

Without email delivery, there is no day in modern life. In order to protect this email exchange, PGP came to market in 1991. But it was not use-friendly. For this purpose you can use the GPG or Zenewife Privacy Guard. For Windows, Mac and Linux, this service can be used to secure email. This works for any of your current email addresses. Until now, technology analysts have recognized GPG as the best in email security. As a result, protect your important and sensitive email communications using GPG. To use it, visit www.gnupg.org/download/index.html.

Ghostari (anti-tracking tool)

There is no shortage of service to track your activities while traveling online. But who are the people who are tracking you all the time, it is not easy to know. An anti-tracking tool named Ghostari will help you to do this. As long as you are online, you will be informed about how tracked you are and who is tracking them. As a result, some companies are getting your information and preparing the ads for you, you can learn from Ghostari. Not only this, it can also block these tracking. Almost all desktop and mobile browsers have a different version of Ghostar. To use it, visit www.ghostery.com.

Postal post (search engine)

Google has become synonymous with search engines this time. However, the interesting thing is that using Google account is as long as you're searching for something online, all of your searches are saved on Google's servers. On the other hand Google merchants are getting ready for you based on your search information. Google has to rely on these online marketers to survive. As a result, Google may keep others' access to your information. A search engine that does not store any information on your search as a search engine is a postal mail. Even though this browser does not have much contact yet, technology experts advise you to use it for the safety of your online habits. There are also different mobile apps for any browser. To use it, please visit https://duckduckgo.com.


More:Walton launches three four-G smartphones

Recently, Walton has announced to bring three new smartphones to the market, the country's leading technology company Walton has announced. Primo Ascend Duel, Primo Hsevens and Primo GMTHR Plus plus three smartphones will support the FourG network.

According to Walton's notification, three smartphones have been added to Walton's own factory at Chandra in Gazipur. The Android Oro (8.1) powered Dual SIM has a full-view IPS display on three phones.

Primo Ascill Dual Phone has 13 and 2 megapixel dual cameras. The 5.7-inch HD display features a 1.5 GHz quad-core processor, 3GB RAM, 32GB storage. The 3500 ml ampere phone has a Face unlock and fingerprint sensor. Its price is 14 thousand 999 taka.

Primo HSVENS and Primo GM 3 plus are used in both handsets. 1.3 GHz quad-core processor, 2 GB RAM, 16GB internal storage. The 5 and 13 megapixel camera in front and behind both phones respectively. HSVEN S Model Battery 3000mg Ampere The price is 9 thousand 199 taka. GM000 Plus model battery will be 4000 ml, it will cost 8 thousand 499 rupees.


More:Facebook is introducing new rules to run

Facebook has announced new features for creating more transparency and credibility in running Facebook pages. On Friday, Facebook announced the new feature. The new feature is significant in terms of approval of page publishing authorization or page publication. For the time being, there are a lot of followers of the United States-pages that need approval.

Apart from this, the page must be specified from any country, its location or location. There should be convenience to see if any pages are merged or linked to each other.

Facebook authorities say Facebook users who run or run Facebook pages, are going to be somewhat harsh on Facebook authorities. In order to post on the page, they must be in certain rules. They will now have to go through a two-factor authentication process and before posting them, their location (primary home location) will be confirmed by Facebook.

Facebook authorities say they are launching this process with the aim of preventing the publication of false news. It will also take action against hacked accounts. The process of forcibly approval will begin this month.

When a page has been merged with any page in the page history page, it will be displayed. In this, there will be transparency in the pages of followers of those pages. Apart from this the followers will be aware. A section called "People Who Manage This Page" will be added to the page, which will contain information about page managers.

Facebook can launch this feature in Instagram as well. Facebook is currently testing this feature in large-scale pages in the United States.

In 2016, after the announcement of the fraud in the US presidential election, the false news and data privacy scandal came out of Facebook. A slight change in the Facebook page is being considered as one of the major advances in preventing false news.


More:Sleep is less when fast internet

it info world
Fast Internet connectivity means a lot of benefits. But there is a reverse side of it. Sleep disturbances are due to this. Good sleep time limit decreases. According to a recent report, the information was released in the latest PTI report.

The research paper has been published in the Journal of Economic Behavior and Organization. Researchers at the University of Bocconi, Italy and the University of Petersburg of the United States of America studied the effect of fast internet.

Researchers say that people under the Digital Subscriber Line (DSL) connection are sleeping at least 25 minutes less than those outside. DSL is a technology that provides high bandwidth internet access to home and small businesses.

Researchers say that due to the fast internet, sleepiness is not asleep or less during sleep. Due to job chances for work or family needs in the morning, it is time to suffer from shortage of time.

Boccuni University researcher Francesco Bellary said, "Usually, the scientists advised to sleep for seven to nine hours, but people with high speed Internet access were less sleeping than them and they were dissatisfied with their sleep. They use electronic devices more in the evening, in the morning it is very rare.

Researcher Billi said that many people went to sleep late in the trap of digital temptation. But in the morning it can not be able to recover more than sleeping. Many of these sleeping time are decreasing. Playing games on the computer, watching TV or watching a video, many people sleep twelve. Among the victims, there are more than 13 to 30 years of age.


More:YouTube is becoming more popular than Facebook

itinfo world
People are now watching videos more. So the popularity of the video platform YouTube is increasing. Facebook's top platform is the top web site in the US, Google's YouTube video platform YouTube can be topped. The market research firm Similar Web claims to have received this information in a study.

Researchers of the company say Facebook users are falling in the United States for two years. On the other hand, YouTube users are growing. The information was provided by a CNBC report.

Market researchers say Facebook is fighting to keep the second position as the most popular and popular website in the US. Currently, Google's top five websites include Google, Facebook, YouTube, Yahoo and Amazon. In the past two years, Facebook pageviews have come down from 850 crores to 470 counts, according to monthly publication. Though Facebook's app user is growing, it is slightly smaller than the monthly pageview rate.

During the announcement of second quarter earnings last month, Facebook said that the number of active users in the North American market did not increase. Users in Europe have also dropped. Facebook's share price drops to a great extent when it comes to information.

Similarweb's researcher Stephen Crouse said that Facebook is in the hands of Facebook users, but WhatsApp or Instagram has resources like Facebook. Now they see themselves not only as a Facebook but also as portfolio portfolios.

YouTube is now operated under Google's parent company Alfabet. Researchers say YouTube users have increased web apps as well as increased app users.

Yahoo's location in the top five list has become shaky. Amazon may soon take Yahoo from the fourth position and occupy that position. The e-commerce company has topped Yahoo during the annual Prime Day program in December and in July of this year. In the next two or three months Amazon can be fully topped by Amazon.

As a user, YouTube, Facebook, Yahoo or Amazon have not been around Google. In July, Google's pageviews exceeded 1,500 crores. Due to Google Apps and Voice Search, its pageviews have been reduced slightly. Where Google has a pageview of 500 million, there are less than 500 crores of pages.


More:TSMC victims of computer virus attack

it info news
Taiwan Semiconductor manufacturer Taiwan Semiconductor Manufacturing Company (TSMMC) has been attacked by virus attacks. Its effect is going to come in their third quarter earnings. TSMC is known as the world's largest contract-based chip maker. The Taipei-based chip maker is providing the iPhone's processor.

Last Saturday, TSMC said that a computer was infected with a computer system and some devices. But the problem has been detected. This information was given in a report by Reuters news agency.

TSMC says the chip supply will be delayed due to virus attack and additional costs will be incurred. Third-quarter earnings will have an impact of up to 3 percent. In the fourth quarter, you will be able to recover this loss. They will now work to solve problems with customers. Within a few days, each customer will be informed about this separately.

TSMC says that installing new software is a virus infection. When that tool opens in a computer computer network it spreads. However, there was no sensitive information about the incident. The measures have been taken to strengthen the security and security of the TSMMC.


More:The new strategy of digital extortion

itinfo world
The e-mailer's title is weird Seeing sure you will be surprised. Because, the e-mail header contains a password you use and your username. Do not open where! 'You know later about the house' - thinking that e-mail will open up.

Because nothing else, this e-mail is a new horror strategy for cyber extortionists.

Do research and teaching about computer security. For this, cybercrime or cyber-crime is to be done regularly, it is to teach the students various techniques of cybercrime. But I am also surprised to see this new study. It is bound to be successful. Because, extortionists here have blackmailed the man's psychology through an alarming e-mail. Let's see, what's the matter!

What's in the e-mail
E-mail started in this way (written in English from simple Bangla) - 'Your password is such and such. You do not know me, but I know everything about you, it is unfortunate that I have received secret information about you. '

Then it goes to the threat category-

'You have visited such a video / photo site (can understand what kind of "video" site it may be) where we put malware. It has been installed on your computer at the site and control of your computer has come in my hands. We have been able to record all the activities of your computer by utilizing it. We've recorded your video by launching your webcam immediately. We have now created a video with the left side of which you are sitting secretly watching the naughty video that is on the right, and the video that you were doing was doing naughty by watching the video on the right. All your friends and contact lists have come to our hands.

Now you can have two options without having to do everything. In that case, the copy of this video will be reached by your friends, wife-family, boss-all in one day. And the other option is to send you $ 2700 to save your reputation, through Bitcoin, at the same address. This e-mail contains a secret pixel placement. So, we know that you read the e-mail. If you can not pay the money in one day, then you will break your pats in the market. I have spent a lot of time in this work, so I will not give money! And do not tell anyone, but I will leave the video.

And if you want to make sure that this email is real, yes answer. Your naughty video will send you to five friends as a sample.

There is no profit going to the police. Because, I'm out of control. Therefore, if you do not want to send these proofs of Akam-Kamaam to everyone, send money quickly. We will delete the video if we get the money. '

This is the criminal threat given to the bat.

What are you afraid of
Now the question is, what should you fear? If you do not go to a naughty site, is someone really holding your pictures of your webcam with your webcam? What is the credibility of this threat? The extortionist is a criminal but has done a great job at the beginning, showed your user name and password, so that you believe in him. If your friend knows the secret password, the rest is true! What to do now? Bitcoin to buy to buy? Or will you go to the forest?

No, no! Sleep with the nose oil completely. Why? Tell me now

It's true that the hacker is convincing you by showing your user name and password. But after the house, you know?

The incident happened in the past few years in some very big password leaks. Linked-In, Bitli-these organizations have stolen millions of usernames and passwords. And the list of these passwords on the Dark Web is spread. As a result, criminals have a password or links to your site (old). These companies warned everyone about the matter a year ago, so most people changed their passwords. (If you do not change then change it quickly). But extortion took advantage of it, initially confused you by talking about your old password. You may not believe in other words, but you have easily misled your hidden information by showing Chandbad. Maybe you believe, you've actually made your own video like hackers, and now you'll be able to reveal to everyone right now.

The real incident is that such a video is not in their hands, only the people of Kanpathola are made to roam the money from them and this extortion work is done. I am sure many people will believe in such e-mails and will send thousands of bits of this Bitcoin address. This fraud has been going on for a few months- one of my fellow researchers has been monitoring this extortion group for months. Since July, fraudsters have released millions of e-mails for such fraud.

How to be safe online?

This deception is not necessarily a matter, but how to be safe online? Ensure the security of your computer, update the antivirus regularly. And do not go to unknown unknown websites; At the same time, if someone asks you to click on any link in the e-mail, do not click and click. Do not click on the same message in messenger or other way-even the familiar people send a link, but do not click here. Because, cyber criminals thus hacked the accounts of people who know many times, send messages from everyone to the Friendlist from there to grab their accounts. After going to any web site, it is very easy to solve video record problems with webcam. Put a paper or black tape on the webcam, only when it's really a video chat. It can not be recorded by webcam even if your computer enters malware, but no one will be able to record it. And to verify if your password or username has been spread on the Dark Web, please visit https://haveibeenpwned.com

Do not believe in cyber extortionists, resist them all the deception trap.

Writer: Associate Professor, Computer Science, University of Alabama at Birmingham, USA


More:Shawami started selling new smartphones in the country's market

itinfo world
Chinese technology company Shaoami has officially announced the sale of Redmi S-2 offline in the country's market. Prior to this, the company was selling it online only. Shawmoi authorities said that apart from Daraj Dotcom from Friday, new smartphones are being sold in hundreds of authenticated stores and more than 1 thousand retail stores. Its price is 14 thousand 999 taka.

Shawmy Vice President and Shomei India Manager Manu Jain said, "It is very good to be able to bring good cellphone smartphones in Bangladesh market. Along with online, Redmi is also expected to increase its share in the local market from Redmi.

It is to be noted that Shoomi started officially in the country's market through the new smartphone. The company is referring to the new smartphone as a cellphone phone. Redmi S-2 smartphone has a 16 megapixel camera. It uses pixel building technology and Shawmy's own artificial intelligence-based (AI) beautyful feature. On the back side there are 12 and 5 megapixel artificial two cameras. Redmi S-2 has a 5-dimensional 99-inch full screen display. It uses the Qualcomm Snapdragon 625 processor.

Two SIM cards can be used in Redmi S-2 and up to 266 Giga Micro SD card. It has IR Blaster and Artificial Intelligence-based Face Unlock Advantages.


More:Three-dimensional gun design is spreading

The gun prints made in 3D printers have spread online even in the face of objection to lawmakers. The US judicial order was scheduled to be released on Wednesday whether the designs could be published, on Wednesday. However, on Friday, the website named 'Defense Distributed' published the design of at least nine types of guns. Then on Monday, it was applied in different states to stop it.

The debate started in 2013. At that time, a US citizen named Cody Wilson made a gun in the first 3D printer. In his design how can guns be made, its instructions were published on the Defense Distributed Website. It is known that the file was transferred several hundred times. The US Interior Ministry issued the order to remove the design from the website. Meanwhile, the Defense Distributed Alliance has tied up with Second Amendment Foundation. The organization works on the right to keep guns in a personal collection. Legal battles last four years.

Surpriseing all parties last month, the US Justice Department said that US citizens can see and discuss and use the technical aspects of this gun. The lawmakers are angry at this. Washington State Attorney General Bob Ferguson announced that he will file a lawsuit against the home ministry for eight US states to stop the illegal production of a 3D printer. In a statement, Ferguson said that these offensive gadgets are unregistered and it is difficult to identify metal detectors. Without it, regardless of age, psychological condition or crime history, anyone can use it. 

Source: BBC

More:Bipa Twitter?

Twitter's share price decreased by 20 percent. This is the second biggest fall since the IPO in 2013. Recently, social media has scrapped more than 1 million accounts of fake and objectionable accounts. Since the release of this news, the fall of the share price starts.

According to a report last Friday, the active user on Twitter every month decreased from 3.36 million to 33 million and 50 million. If the news spreads, the company's losses to about $ 500 million are due to the collapse of the stock.

However, Twitter has requested investors not to be disturbed by this. Because, during the announcement of second quarter earnings, the investors were told that such decisions were taken by promising healthy environment in the social media. It was decided to delete the fake and objectionable accounts to provide long-term planning and a beautiful environment for active users.

According to the Washington Post, Twitter has deleted approximately 7 million accounts in May and June. Their campaign is still running. That's about 10 lakh accounts being deleted every day. Twitter has been under pressure from the US Congress since the incursion of the Russian presidential election results in 2016. As a result of this, the decision of making such a decision is taken by the social media.

Source: The Guardian

More:Huawei folded phone to tease Samsung


Contact Form


Email *

Message *

Theme images by konradlew. Powered by Blogger.
Javascript DisablePlease Enable Javascript To See All Widget