Monday, March 19, 2018

MacBook use without a password from a distance!

Tech Blog: It is possible to use another MacBook without the password due to technical error. But not all MacBooks, this is done with Mac OS X, which is Chrome's remote desktop software. A group of cyber security checkpoint check points said that the Mac version of Chrome Remote Desktop software has technical difficulties, which can be used to create 'Guest Accounts' from a distance. As a result, the hackers may unknowingly access all MacBook data without the password. Even the password-protected files can be changed as well as the device's administrator account can be changed. Using Chromebook's remote desktop software, Google has a chance to use multiple laptops and smartphones from a distance.

5G is coming, target 2020!

Tech Blog: Three -G network coverage has not been received yet, the Four -Gee has just been launched. But it's already heard about five-g. The fifth generation of this network could be launched in 2020. BTRC sources said the matter will be discussed soon with the consultants.

Asked about the call and telecommunications and information technology minister Mustafa Jabbar told the Bangla Tribune, "In 2020, the world will enter the fifth generation of the network. As a result, we also have to adopt new technology. I have to go to five-g. There is no chance to delay. '

However, in the 2020, the minister also called as an ambitious desire to enter the Five-G. "It will be a challenge for us," he said, adding that all three technologies, products and services will be based on five-g technology when they are introduced in the technology and will be more concerned with these products and services.

The minister said, "We will take technology, we will not delay. But it will have to do with our socioeconomic status. It means that we will use the five technologies in the country. "He believes that technology is constantly changing. Technology has to be accepted, but before that the technology will be useful to us, whether it is to adapt to a new technology with socioeconomic conditions - we have to prepare for that too. Time required for this also, said Mustafa Jabbar.

The minister said, "Get a driverless vehicle at five-gile." But drivers have to think of alternatives to reducing unemployment. Remote robots can be controlled in five-gile. But a man should not be left unnecessarily due to the robot, and it must be kept in mind. If unemployment increases, using technology, it will not bring any good results. That is why he mentions preparation and time.

Bangladesh Telecommunication Regulatory Agency BTRC chairman Shahjahan Mahmud said Bangladesh will enter the Five-G. For this, the International Telecommunication Union (ITU) consultant will be contacted.

Earlier, the BTRC chairman told the license transfer program of the Four -Gu organized at the Dhaka Club, that the Four -Gi was being introduced in the country. We'll go to the five-g. It has to be accepted if new technology is available. If not, then we will fall back. He further said, 'Many are criticizing - the 3G still does not get the whole country, why is it being launched now? I will tell them - only four-why, we'll go to five-g. There is no scope for avoiding technology.

In fact, Five-G is the fifth-generation wireless network. According to the US mobile operator AT & T, the definition of five-giggles can be made by 2018. It will be known that the ITU will determine the value of Five-G in 2015. Any technology can be called FiveGee or if there is any feature, it can be called FifiG or it will be the speed. However, it can be assumed that the five-g network is smart, fast and more smart. Before launching the fifth-generation mobile network, new wireless technologies will be available in the market. It is known that the speed can be used on smartphones, smart homes, cars and devices.

Sunday, March 18, 2018

New computer, what to do after buying a laptop

Tech Blog: After purchasing a computer, there are some things to keep in mind at the beginning. The topics discussed for the newcomers have been highlighted in this tutorial.
Install antivirus
After purchasing a new computer, the first thing to do after installing the operating system is to install the antivirus. Because new computer songs, movies, videos, music etc. are downloaded or shared with pen drive. In that case the virus can enter. So good quality of the virus will be installed
After starting your PC, the first step will be to update Windows. For this, Internet connection will be needed. After connecting to the Internet, from the start menu to the All Program, go to the Windows Update option and click on the check for updates. The machine can restart several times while updating. After the restart check whether all the updates are correct? If not, then you will have to update again. Currently most of the users of Windows operating system fake. If there is an update then the problem may be. So it should not be updated and auto updates should be stopped
Good performance of the computer depends on the driver. So drivers have to be updated all the time. Driver updates are available free from various bugs (crude).
According to the motherboard model number, the driver will get the latest updates. In addition, the motherboard organization website should keep regular eye viewing to see if the new update has arrived. Software install
The life of the computer is software. All the work is done using the software. Music player needs to listen to music. Video Players will need to see the video, image etc. will need software. So, you need to install the necessary software. However, installing one of the new software may seem a lot of trouble. Solution can be solved in a software called Nineite. Its biggest advantage is that it can install many free softwares with one click. It includes all software from the browser to the antivirus utility, the media playback program. Neine 32 and 64 bit are available for both versions only. Software must be selected by software on the software. After downloading it can be installed. Also find it a nice site for software. You can find the necessary software from here. Please select the software that you want to use regularly from this list. Then enjoy sitting on the hassle-free installation process. You do not have to install one by one and install it. Uninstall Unnecessary Software
Computers or laptops manufacturers preinstall many such software, they do not actually work. This software reduces the speed of the computer in particular cases. So in the control panel to start unnecessary unnecessary software.

Facebook stops profile picture stolen in Bangladesh

Facebook Blog:  Facebook is launching a feature of Facebook users' profile pictures so that no one can steal it. This information was released on a Facebook notification on Thursday. This information was published in the Facebook Newsroom on 14 March in Bengal.

Facebook wrote, "Last year we introduced some new Facebook tools in India, which further enhanced their control over the profile pictures used by Facebook users. Using this new tool, you can control whether a Facebook user can download and share his profile picture to any other Facebook user. We are going to launch these Facebook tools in Bangladesh.

Facebook post says that profile pictures play an important role in creating community in Facebook. Because, through this, a Facebook user can easily find out their friends. But many Facebook users do not feel safe to add their profile pictures to Facebook. Through a research, it has been learned from various security agencies and common people, that some women have decided not to attach any of their faces to the Internet. Because, they are always worried about the security of their attached pictures on the Internet.

It is also said, "These tools of Facebook are being used very large in India. In other countries like India, we also want to expand these tools, where Facebook users want more control over their profile pictures. At the same time, we are trying to add more features, through which Facebook users can design their profile pictures according to their preferences.
It has been found in the study that its designs play an important role in preventing misuse of profile pictures.

Users with new features will receive the controls
Facebook users will see instructions on how to turn on Special Profile Picture Guard Option. Other users will not be able to download or share your profile picture if you use this guard picture. Anyone outside your Facebook Friendlist can not tag themselves or anyone else in your profile picture. This security situation has been created in such a way that your Facebook profile picture screenshot can not be taken from Android smartphones. A blue border and shield will be shown in your profile picture as a security signal.