Virtual Machines that can run several OS on one computer.

Virtual Machines that can run several OS on one computer. 5 (2)

  Today’s talk is about Virtual Machines that create the background to run another OS like another program on the existing operating system.  When you see a new Linux distro,…
How to measure battery life before buying a laptop

How to measure battery life before buying a laptop 5 (5)

Laptop manufacturers brag about their battery life by saying that it works for more than 12 hours on a single charge, but after bringing the laptop home, it is very…
How to make a normal TV smart instead of SmartTV with less money

How to make a normal TV smart instead of SmartTV with less money 5 (2)

Smart TV has become the latest wave of television models to hit the market.  It has more features than a normal TV, but the prices are close to one lakh…
How to choose a good desktop computer?

How to choose a good desktop computer? 4.8 (4)

 After the advent of smartphones and tabs, the laptop lost its place, but when you still want to watch a movie, the small screen of the phone is not enough,…
Google Against Phishing and Spam Today, accessing the Internet has become an integral part of a person's daily activities. Today, the Internet is not very safe due to the hackers who are trying to catch the large number of users who surf the Internet daily to fulfill their daily activities and other needs. Especially things like spams/phishing sites created to prey on users surfing the internet are becoming common these days. Hackers take steps to create these very carefully and realistically to the extent that it is very difficult for us to recognize and escape. We've talked about steps you can take to protect yourself while surfing the Internet in a few previous articles. This article is going to tell about the latest steps taken by Google against spams/phishing sites. What is Phishing? Phishing attacks are actually a very basic hacking/attacking method. Through this, your account data and user data are stolen through a fake website created with a website address (URL) and appearance similar to a website you use frequently. For example, the very popular "Are you in this video?" You may remember the facebook spam message with a question like Clicking this will send you to another fake "Facebook" website that looks very similar to the Facebook website. It asks for your Facebook account password and username to log in. Your passwords will be available to the hacker as soon as you provide them. The world's most talked about iCloud hack in 2014 was also done using this method. *The term phishing is used to lure people to fake websites using an attractive tactic (similar to fishing using bait). Because "ph" is used instead of "f" among hackers, it was used as phishing instead of fishing. Hackers who use this trick often use social media to distribute those messages and links. These phishing tactics are used with an attractive message. Google has started a new project to educate the community about such tactics. Together with their special team called jigsaw. This is a quiz. This will educate you on how much you are aware of phishing, and how to avoid modern phishing tactics. You can test your knowledge by taking this quiz at phishingquiz.withgoogle.com. What are Lookalike URLs? Lookalike URLs is a feature added to the Google Chrome web browser. Through this feature, which is still in the testing stage under the Chrome Canary program, phishing links that come to you are easily identified and you are informed. As mentioned at the beginning of the article, hackers who use phishing attacking strategy often create a web address similar to the URL of the original website. Google's aim is to prevent phishing tactics by adding the Lookalike URLs feature to Chrome in the future. Apart from this, some new facilities are going to be introduced to make the chrome web browser faster. Among them are "Never Slow Mode", "Best Effort Tasks", and "Password Checkup" facilities. I will bring details about it in another article. Gmail that fights spam Another major facility that we use on the Internet is email (electronic address) services. Among them, most people use the service called Gmail provided by Google. In a previous article we talked about Data Breach related to email addresses. This is about a trick used by Google to save you from the annoying spam messages we receive while using email. They have created an Artificial Intelligence system using the tensorflow machine learning platform. Through that, this program is able to stop more than 100 million spam emails that spread all over the world every day and send them directly to the spam folder. According to Google, this program is capable of identifying 99.99% of spam messages received daily. Since spammers change their methods every day, Google believes that an AI program is best suited to do this. Due to the modern Algorithm used for this, it is possible to identify the characteristics of spam emails and study their patterns and block them. This will undoubtedly become a powerful weapon in the fight against spam.

Google Against Phishing and Spam 5 (6)

Today, accessing the Internet has become an integral part of a person’s daily activities.  Today, the Internet is not very safe due to the hackers who are trying to catch…
What is the difference between Proxy and VPN?

What is the difference between a Proxy and VPN? 3.7 (3)

Proxy and VPN can be used to hide our identity on the Internet.  Both have the same basic function.  Hiding our IP address from the website we visit hides our…
What is this Chromebook?

What is this Chromebook? 4.6 (9)

  If you are thinking of buying a laptop, you may have seen Chromebooks among the commonly known notebooks.  What are the differences between these notebook computers that are often…
7 hidden computer games in Google Search

7 Hidden Computer Games In Google Search 3.4 (5)

When we want to find something, we search for it on Google.  Instead of “searching” “Google” has now become a verb.  However, going beyond a traditional search engine, Google has…
What is an M.2 SSD? Pros, cons, and buying tips

What is an M.2 SSD?  Pros, cons, and buying tips 4.3 (6)

If you are assembling a new computer or if you wanted to increase the speed of the laptop, you may have started thinking about SSD.  But since there are several…
Solutions to common problems faced by 4G LTE

Solutions to common problems faced by 4G LTE 5 (4)

  As 4G connections are spreading across the country, the rumor of high-speed internet facilities is also spreading rapidly.  Because of this, if you try to experience the same service…