Tech_Companies

Sri Lanka’s Top Tech Companies and Their Impact on the Global Market 5 (1)

Lately, Sri Lanka’s tech trade has witnessed vital development, fueled by a dynamic ecosystem and the emergence of progressive startups and tech corporations. This text explores a few of Sri…
The Evolution of Sri Lanka's Tech Industry: A Comprehensive Overview

The Evolution of Sri Lanka’s Tech Industry: A Comprehensive Overview 5 (3)

In recent times, Sri Lanka has witnessed a exceptional transformation in its tech business, positioning itself as a rising star within the world technological panorama. With a mix of favorable…
Virtual Machines that can run several OS on one computer.

Virtual Machines that can run several OS on one computer. 5 (2)

  Immediately’s discuss is about Digital Machines that create the background to run one other OS like one other program on the prevailing working system.  Once you see a brand…
How to measure battery life before buying a laptop

How to measure battery life before buying a laptop 5 (7)

Laptop computer producers brag about their battery life by saying that it really works for greater than 12 hours on a single cost, however after bringing the laptop computer dwelling,…
How to make a normal TV smart instead of SmartTV with less money

How to make a normal TV smart instead of SmartTV with less money 4 (4)

Sensible TV has change into the newest wave of tv fashions to hit the market.  It has extra options than a standard TV, however the costs are shut to 1…
How to choose a good desktop computer?

How to choose a good desktop computer? 4.7 (9)

 After the arrival of smartphones and tabs, the laptop computer misplaced its place, however whenever you nonetheless need to watch a film, the small display of the cellphone will not…
Google Against Phishing and Spam Today, accessing the Internet has become an integral part of a person's daily activities. Today, the Internet is not very safe due to the hackers who are trying to catch the large number of users who surf the Internet daily to fulfill their daily activities and other needs. Especially things like spams/phishing sites created to prey on users surfing the internet are becoming common these days. Hackers take steps to create these very carefully and realistically to the extent that it is very difficult for us to recognize and escape. We've talked about steps you can take to protect yourself while surfing the Internet in a few previous articles. This article is going to tell about the latest steps taken by Google against spams/phishing sites. What is Phishing? Phishing attacks are actually a very basic hacking/attacking method. Through this, your account data and user data are stolen through a fake website created with a website address (URL) and appearance similar to a website you use frequently. For example, the very popular "Are you in this video?" You may remember the facebook spam message with a question like Clicking this will send you to another fake "Facebook" website that looks very similar to the Facebook website. It asks for your Facebook account password and username to log in. Your passwords will be available to the hacker as soon as you provide them. The world's most talked about iCloud hack in 2014 was also done using this method. *The term phishing is used to lure people to fake websites using an attractive tactic (similar to fishing using bait). Because "ph" is used instead of "f" among hackers, it was used as phishing instead of fishing. Hackers who use this trick often use social media to distribute those messages and links. These phishing tactics are used with an attractive message. Google has started a new project to educate the community about such tactics. Together with their special team called jigsaw. This is a quiz. This will educate you on how much you are aware of phishing, and how to avoid modern phishing tactics. You can test your knowledge by taking this quiz at phishingquiz.withgoogle.com. What are Lookalike URLs? Lookalike URLs is a feature added to the Google Chrome web browser. Through this feature, which is still in the testing stage under the Chrome Canary program, phishing links that come to you are easily identified and you are informed. As mentioned at the beginning of the article, hackers who use phishing attacking strategy often create a web address similar to the URL of the original website. Google's aim is to prevent phishing tactics by adding the Lookalike URLs feature to Chrome in the future. Apart from this, some new facilities are going to be introduced to make the chrome web browser faster. Among them are "Never Slow Mode", "Best Effort Tasks", and "Password Checkup" facilities. I will bring details about it in another article. Gmail that fights spam Another major facility that we use on the Internet is email (electronic address) services. Among them, most people use the service called Gmail provided by Google. In a previous article we talked about Data Breach related to email addresses. This is about a trick used by Google to save you from the annoying spam messages we receive while using email. They have created an Artificial Intelligence system using the tensorflow machine learning platform. Through that, this program is able to stop more than 100 million spam emails that spread all over the world every day and send them directly to the spam folder. According to Google, this program is capable of identifying 99.99% of spam messages received daily. Since spammers change their methods every day, Google believes that an AI program is best suited to do this. Due to the modern Algorithm used for this, it is possible to identify the characteristics of spam emails and study their patterns and block them. This will undoubtedly become a powerful weapon in the fight against spam.

Google Against Phishing and Spam 5 (8)

As we speak, accessing the Web has turn out to be an integral a part of an individual’s day by day actions.  As we speak, the Web isn’t very secure…
What is the difference between Proxy and VPN?

What is the difference between a Proxy and VPN? 3.4 (5)

Proxy and VPN can be utilized to cover our id on the Web.  Each have the identical primary operate.  Hiding our IP tackle from the web site we go to…
What is this Chromebook?

What is this Chromebook? 4.2 (15)

  If you’re pondering of shopping for a laptop computer, you might have seen Chromebooks among the many generally identified notebooks.  What are the variations between these pocket book computer…
7 hidden computer games in Google Search

7 Hidden Computer Games In Google Search 3.7 (6)

After we need to discover one thing, we seek for it on Google.  As an alternative of “looking” “Google” has now change into a verb.  Nevertheless, going past a conventional…