HWP

LightBlog

Saturday, June 23, 2018

GPA Grade Sheet Details OF SEE 2075/2076

June 23, 2018 0
SEE Result 2075/2076 has been published. To know your results with GPA Grade, type SEE<space>Symbol-no. and SMS to 35001.
CLICK HERE OR CLICK HERE to check your result with marksheet.

(The Office of Controller of Examinations (OCE) have published the result of SEE 2074 in Grade System from last year. If you are confused about your GPA grade then have a look at the reference below:

NEW SYSTEM OF SEE
New System of SEE is based on GPA. The range of GPA is between 0-4.

Divisions of GPA
The students who have got GPA 4.0 have scored A+ which is Outstanding, likewise student scored 3.6 is A which is Excellent. In the same way score 3.2 is B+ and its Very Good, students scoring 2.8  is B which is Good. The students scoring 2.4 is C+ which is Satisfactory, and the students scoring 2.0 is C which is Acceptable. In the same way, the students scoring 1.6 is D+ which is remarked as Partially Acceptable and scoring GPA 1.2 is D which is above Insufficient. At last the students scoring 0.8 is E which is Very Insufficient.

Thank you

Friday, May 18, 2018

SEE Result 2075/2076 With Mark Sheet.

May 18, 2018 0

 see result 2075

Click Over above picture to check your SEE result with ful mark sheet.

How To check SEE result:-
Step 1: Click Here to open SEE official website.
Step 2: Enter your symbol number(1234567U) and click on submit.
Step 3: Enter your Date Of Birth(yyyy/mm/dd) according to your SEE entry card and click submit.
Then you are able to see  your whole result with ful mark sheet. 
You Can Check Another Website With Same Process. Click Here

For Mobile SMS Type 
SEE<>Your Symbol Number   And Send to 35001

Friday, May 11, 2018

YouTube new tools. Help you stop watching videos.

May 11, 2018 0

Google's YouTube is the first streaming app that will actually tell users to stop watching. At its Google I/O conference this week, the company introduced a series of new controls for YouTube that will allow users to set limits on their viewing, and then receive reminders telling them to “take a break.” The feature is rolling out now in the latest version of YouTube’s app, along with others that limit YouTube’s ability to send notifications, and soon, one that gives users an overview of their binge behavior so they can make better-informed decisions about their viewing habits.
With “Take a Break,” available from YouTube’s mobile app Settings screen, users can set a reminder to appear every 15, 30, 60, 90 or 180 minutes, at which point the video will pause. You can then choose to dismiss the reminder and keep watching, or close the app.
The setting is optional, and is turned off by default, so it’s not likely to have a large impact on YouTube viewing time at this point.


Also new is a feature that lets you disable notification sounds during a specified time period each day _say, for example, from bedtime until the next morning. When users turn on the setting to disable notifications, it will, by default, disable them from 10 PM to 8 AM local time, but this can be changed.

Combined with this is an option to get a scheduled digest of notifications as an alternative. This setting combines all the daily push notifications into a single combined notification that is sent out only once per day. This is also off by default, but can be turned on in the app’s settings.
And YouTube is preparing to roll out a “time watched profile” that will appear in the Account menu and display your daily average watch time, and how long you’ve watched YouTube videos today, yesterday and over the past week, along with a set of tools to help you manage your viewing habits.
While these changes to YouTube are opt-in, it’s an interesting — and arguably responsible — position to take in terms of helping people manage their sometimes addictive behaviors around technology.
And it’s not the only major change Google is rolling out on the digital well-being front — the company also announced a series of Android features that will help you get a better handle on how often you’re using your phone and apps, and give you tools to limit distractions — like a Do Not Disturb setting, alerts that are silenced when the phone is flipped over and a “Wind Down” mode for nighttime usage that switches on the Do Not Disturb mode and turns the screen to gray-scale
The digital well-being movement at Google got its start with a 144-page Google Slides presentation from product manager Tristan Harris, who was working on Google’s Inbox app at the time. After a trip to Burning Man, he came back convinced that technology products weren’t always designed with users’ best interests in mind. The memo went viral and found its way to then-CEO Larry Page, who promoted Harris to “design ethicist” and made digital well-being a company focus.
There’s now a Digital Wellbeing website, too, that talks about Google’s broader efforts on this front. On the site, the company touts features in other products that save people time, like Gmail’s high-priority notifications that only alert you to important emails; Google Photos’ automated editing tools; Android Auto’s distracted driving reduction tools; Google Assistant’s ability to turn on your phone’s DND mode or start a “bedtime routine” to dim your lights and quiet your music; Family Link’s tools for reducing kids’ screen time; Google WiFi’s support for “internet breaks;” and more.
Google is not the only company rethinking its role with regard to how much its technology should infiltrate our lives. Facebook, too, recently re-prioritized well-being over time spent on the site reading news, and saw its daily active users decline as a result.

Tuesday, April 3, 2018

PUBG is now available for iOS and Android

April 03, 2018 0
PUBG or PlayerUnknown's Battlegrounds is finally on mobile. After releasing on Windows in March of 2017 in early access beta form, with the 1.0 release along with the Xbox One release coming out in December, the game has now been released on iOS and Android worldwide after a brief period of China exclusivity. I tried it on six different devices to see what the mobile experience of the game is like.
Here is a brief primer on the game. PUBG is what is now known as the battle royale style of game. While not the first game of this type, it's the one that made it popular and is the most played game in this genre. PlayerUnknown, or Brenden Greene in real life, is the lead designer of the game, who had worked on a mod for ARMA 2 with a similar gameplay style.

Overall, PUBG Mobile is an unexpectedly great port. Most of what makes the game so damn popular is still there and because it's on mobile, the shortcomings related to controls, visuals and network performance aren't even remotely as aggravating as they are on other platforms. The game is also free, which sounds like a bargain until you play it for a few minutes and suddenly feel like purchasing the Windows or Xbox version. This is absolutely a way to get you to buy the full-fat version of the game, a gateway drug of sorts. Which is fine, just be aware that those versions have their own problems, which are a lot less forgiving when you've paid actual money for it.

Wednesday, March 28, 2018

प्रधानमन्त्री केपी शर्मा ओलीले वैशाख १ गते रारातालबाट देशबासीलाई सम्बोधन गर्ने

March 28, 2018 0


प्रधानमन्त्री केपी शर्मा ओलीले मुगुको रारा तालबाट वैशाख १ गते देशबासीका नाममा सम्बोधन गर्ने भएका छन्।

कर्णाली प्रदेशले आयोजना गरेको पर्यटन वर्ष २०७५ को उद्घाटन गर्न रारा ताल जाने कार्यक्रम रहेकोले सोही स्थानबाट देशबासीलाई सम्बोधन गर्ने भएका हुन्।
नेपाल ट्रेड युनियन महासंघ (जिफन्ट) को महाअधिवेशनको बुधबार राजधानीमा उद्घाटन गर्दै प्रधानमन्त्री ओलीले यो जानकारी दिएका हुन्।
‘कर्णाली प्रदेशले आयोजना गरेको पयर्टन वर्ष २०७५ को पहिलो पर्यटक म नै हुन्छु,’ प्रधानमन्त्री ओलीले भने, ‘राराबाट यसपालि पर्यटनको बिगुल बजाइनेछ।’
समृद्ध नेपालको मुख्यआधार पर्यटन भएकाले त्यसको प्रवर्द्धनमा सबै क्षेत्र लाग्नु पर्नेमा प्रधानमन्त्रीको जोड छ।

Tuesday, March 27, 2018

त्रिभुवन विमानस्थलबाट ४७ तोला सुनसहित चार पक्राउ

March 27, 2018 0
त्रिभुवन अन्तरास्ट्रिय विमानस्थलबाट महानगरीय प्रहरी परिसरले ४७ तोला सुनसहित चार जनालाई पक्राउ गरेको छ। 

परिसर अन्तर्गतको महानगरीय प्रहरी वृत्त गौशालाले आइतबार र सोमबार त्रिभुवन अन्तर्राष्ट्रिय विमानस्थलबाट भन्सार छली तस्करी गरेको आरोपमा धनुषाका महमद सेफुल्ला, सर्लाहीका रवि महतो, सिरहाका रामपुकार महतो र धनुषाका आशिष महतोलाई पक्राउ गरेको छ।

जसमध्ये सेफुल्लालाई आइतबार र महतोत्रयलाई सोमबार गौशालाबाट पक्राउ गरेको हो। उनीहरुले कतारबाट अवैध रुपमा तस्करी गरेर सुन नेपाल ल्याएको अनुसन्धानमा खुल्न आएको प्रहरीले जनाएको छ। 


उक्त सुनको मूल्य २७ लाख ४८ हजार ६ सय ७५ रुपैयाँ रहेको छ। पक्राउ परेका चारै जनालाई कारबाहीका लागि राजश्व अनुसन्धान विभाग पुल्चोक पठाएको परिसरले जनाएको छ।

Thursday, March 22, 2018

प्रधानमन्त्री केपी शर्मा ओली भारत जाने तयारीमा

March 22, 2018 0
प्रधानमन्त्री केपी शर्मा ओलीले यही महिना भारत भ्रमण गर्ने तयारी भइरहेको छ ।

चैतको चौथो साता भ्रमण हुनसक्ने परराष्ट्र मन्त्रालयका अधिकारीहरु बताउँछन् । भारत भ्रमणको तयारी भइरहेको पुष्टि गर्दै प्रधानमन्त्री निकट स्रोतले, "भन्यो अहिले मिति तय भइसकेको छैन । दुई देशको सहमतिमा छिट्टै घोषणा हुन्छ"।

एमाले अध्यक्ष ओली प्रधानमन्त्री भए लगतै भारतीय प्रधानमन्त्री नरेन्द्र मोदीले विदेशमन्त्री सुष्मा स्वराजलाई विशेष दूतका रुपमा नेपाल पठाएका थिए । त्यसअघि ओली र मोदीबीच दुई पटक टेलिफोन वार्ता समेत भएको थियो।

तपाईलाई के लाग्छ, कृपया प्रतिकृया दिनुहोला‍‍‌।

२०७४ चैत ८,

Tuesday, March 20, 2018

What Is SSID? Basic Concept Of SSID.

March 20, 2018 1

What Is SSID?
SSID stand for service set identifier or SSID is simply called the name for a Wi-Fi network.  It is used to uniquely identify any given wireless network. we can think of it as the IP address for a wireless network. SSID is simply the technical term for a network name. When we set up a wireless home network, we give it a name to distinguish it from other networks in our neighborhood. we will see this name when we connect our computer to your wireless network. The SSID itself is a 32-character string (the characters can be anything a computer can type, such as a letter, number, symbol, punctuation mark, and even a blank space). A wireless network can be either hidden or broadcast. If the SSID is broadcast, then anyone can find that network and hop on. However, if the SSID is hidden, a user must know the exact SSID to jump on that wireless network. WPA2 is a standard for wireless security.
How To Find SSID?
Look for a sticker on your router. Many routers provided by Internet Service Providers have a sticker on the bottom or side, listing the default SSID. This is usually labeled as the SSID or "Network Name" and may be located next to a barcode. Use another device connected to your network to find the SSID.

Sunday, February 25, 2018

Hackers infect thousand of Android phones and smart TVs to mine cryptocurrency.

February 25, 2018 0
Chinese researchers found hackers turning internet-connected devices into tools for creating caches of the digital currency Monero.
Researchers at Chinese cybersecurity firm Netlab360 found that Hackers turning internet-connected devices into tools for creating caches of the digital currency Monero and have infected thousands of Android phones and smart TVs, turning the devices into miners for a popular cryptocurrency.

The hacker affected 7,000 devices in China, which were hacked into a network that harnessed the processing power of the connected devices to mine, or digitally create, the Monero cryptocurrency, according to ZDNet. Though not as big as some recent botnets, security experts say this approach will increasingly be used by hackers looking to make money off of other people's computers, IoT devices, phones and tablets.
Attack took advantage of an open port, a part of the operating system that allows a device to communicate with the internet. They infected them with malicious software, known as a worm, that looked for more devices to infect. Hackers searched for devices connected through port 5555, which helped them find unsecured Android phones and TVs.
Google, which owns the Android mobile software, didn't immediately respond to a request for comment.
According to researchers told ZDNet the hackers weren't opening the port themselves, which would have been a much more worrying attack. "The 5555 ADB interfaces of those devices have already been opened before infected," the researchers said. "We have no idea about how and when this port was opened yet."
The hackers used the network of infected devices to run a program and botnet gives hackers the computing power of thousands of devices without the costs associated with buying hardware, power or internet access. 

Windows 10 Mobile Insider program quietly comes to an end.

February 25, 2018 0
Windows 10 Mobile Insider program quietly comes to an end
Today, we have some bad news to pass along to those few remaining Windows 10 Mobile users who have been receiving updates via the Windows 10 Mobile Insider program. A tweet from Microsoft's Brandon LeBlanc indicates that no more insider builds of Windows 10 Mobile are coming. Windows 10 Mobile phones will still receive monthly security updates from Microsoft, but nothing else is expected to be pushed out.
Microsoft has already said that it won't be adding new features to Windows 10 Mobile which means that there will be no reason to send out any updates (again, other than security updates) to either the Fast or Slow ring. If you collect trivia, you might want to know that Windows 10 Mobile ends at Redstone 2 with the feature 2 branch. Keep that in mind, and perhaps you might win some money playing HQ.
For now, updates to Universal Windows apps will still revise the same apps on a Windows 10 Mobile handset. However, there will be a time when Microsoft drops the platform completely, and you might want to get prepared mentally for that eventuality. 

What is computer Processor/CPU? How it works?

February 25, 2018 0
The complex procedure that transfer raw data into useful information is called processing. To perform this transformation, the computer uses two components the processor and memory. 
A processor is the logic circuitry that responds to and processes the basic instructions that drive a computer. The processor is like the brain of the computer, the part that organizes and carries out instruction that come from either the user or the software. 

In a personal computer, the processor consists of one or more microprocessor, which are silver of silicon or other material etched with many tiny electronic circuits. A microprocessor is plugged into circuit board (a rigid rectangular card containing the circuitry that connects the processor to other hardware.

The circuit board to which the microprocessor is connected is called the motherboard. In some powerful computers, the processors consist of many chips and the circuit boards on which they are mounted. The term center processing unit (CPU) refers to a computer’s processing hardware, whether it consists of single chip or several circuit boards. This circuital part of the computer occupies amazingly small space in the computer.

Monday, February 19, 2018

Basic Tips And Knowledge before Learning Ethical Hacking For Beginners.

February 19, 2018 0
Ethical Hacking
Ethical hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the organization to improve the system security, in an effort to minimize or eliminate any potential attacks.


What constitutes ethical hacking?

For hacking to be deemed ethical, the hacker must obey the following rules:

  1. Expressed (often written) permission to probe the network and attempt to identify potential security risks.
  2. You respect the individual's or company's privacy.
  3. You close out your work, not leaving anything open for you or someone else to exploit at a later time.
  4. You let the software developer or hardware manufacturer know of any security vulnerabilities you locate in their software or hardware, if not already known by the company.

The term "ethical hacker" has received criticism at times from people who say that there is no such thing as an "ethical" hacker. Hacking is hacking, no matter how you look at it and those who do the hacking are commonly referred to as computer criminals or cyber criminals. However, the work that ethical hackers do for organizations has helped improve system security and can be said to be quite effective and successful. Individuals interested in becoming an ethical hacker can work towards a certification to become a Certified Ethical Hacker, or CEH. This certification is provided by the International Council of E-Commerce Consultants (EC-Council).

How to Learn Ethical Hacking? -Beginner Tips Only..
Start from Basics
Instead of searching for “How to Hack a Facebook or a Gmail account” you should start searching for the basic terms like “https” , ”What is DNS”, or “What is a Mac address” or something like “How do I crack password encrypted using Md5” you should have knowledge about these computer & network related topics.Most importantly if you are passionate about these topics and you enjoy learning them then very soon you will be a ethical hacker.

Hacking is finding loop holes (vulnerabilities) and use them to exploit the device. A programmer writes algorithm and programs to protect a page using a member login system. A hacker should be able to bypass the login system for this he may use a technique already in practice or he may write a code that may help him to gain access to page either by a backdoor or collapsing the system. So, it is more helpful if you can learn a programming language and have knowledge about alternate operating systems.

Final Words:
Learn the basics by exploring various computer topics and also try reading various computer, network and operating system related tricks and learn why and how they work.

Friday, February 16, 2018

Youtube Live Chat Background Removing CSS Code

February 16, 2018 0
Copy This Code


@import url("https://fonts.googleapis.com/css?fami...");
@import url("https://fonts.googleapis.com/css?fami... One");
@import url("https://fonts.googleapis.com/css?fami...");
@import url("https://fonts.googleapis.com/css?fami...");

body {
background-color: transparent !important;
}

/* Transparent background. */
yt-live-chat-renderer {
background-color: transparent !important;
}

/* Outlines */
yt-live-chat-renderer * {
text-shadow: -2px -2px #000000,-2px -1px #000000,-2px 0px #000000,-2px 1px #000000,-2px 2px #000000,-1px -2px #000000,-1px -1px #000000,-1px 0px #000000,-1px 1px #000000,-1px 2px #000000,0px -2px #000000,0px -1px #000000,0px 0px #000000,0px 1px #000000,0px 2px #000000,1px -2px #000000,1px -1px #000000,1px 0px #000000,1px 1px #000000,1px 2px #000000,2px -2px #000000,2px -1px #000000,2px 0px #000000,2px 1px #000000,2px 2px #000000;
font-family: "Laila";
font-size: 10px !important;
line-height: 1px !important;
}

yt-live-chat-text-message-renderer #content,
yt-live-chat-legacy-paid-message-renderer #content {
overflow: initial; !important
}

/* Hide scrollbar. */
yt-live-chat-item-list-renderer #items{
overflow:hidden !important;
}

/* Hide header and input. */
yt-live-chat-header-renderer,
yt-live-chat-message-input-renderer {
display: none !important;
}

/* Reduce side padding. */
yt-live-chat-text-message-renderer,
yt-live-chat-legacy-paid-message-renderer {
padding-left: 2px !important;
padding-right: 4px !important;
}

/* Avatars. */
yt-live-chat-text-message-renderer #author-photo,
yt-live-chat-legacy-paid-message-renderer #author-photo { width: 25px !important;
height: 25px !important;
border-radius: 25px !important;
margin-right: 6.25px !important;
}

/* Hide badges. */
yt-live-chat-text-message-renderer #author-badges {
display: none !important;
vertical-align: text-top !important;
}

/* Timestamps. */
yt-live-chat-text-message-renderer #timestamp { color: #999999 !important;
font-family: "Imprima";
font-size: 10px !important;
line-height: 16px !important;
}

/* Badges. */
yt-live-chat-text-message-renderer #author-name[type="owner"],
yt-live-chat-text-message-renderer yt-live-chat-author-badge-renderer[type="owner"] {
color: #ff0000 !important;
}

yt-live-chat-text-message-renderer #author-name[type="moderator"],
yt-live-chat-text-message-renderer yt-live-chat-author-badge-renderer[type="moderator"] {
color: #0000a0 !important;
}

yt-live-chat-text-message-renderer #author-name[type="member"],
yt-live-chat-text-message-renderer yt-live-chat-author-badge-renderer[type="member"] {
color: #00ffff !important;
}

/* Channel names. */
yt-live-chat-text-message-renderer #author-name {
color: #00ff40 !important;
font-family: "Abel";
font-size: 35px !important;
line-height: 35px !important;
}

yt-live-chat-text-message-renderer #author-name::after {
content: ":";
margin-left: 2px;
}

/* Messages. */
yt-live-chat-text-message-renderer #message,
yt-live-chat-text-message-renderer #message *,
yt-live-chat-legacy-paid-message-renderer #detail-text,
yt-live-chat-legacy-paid-message-renderer #detail-text * {
color: #ff0c0c !important;
font-family: "Laila";
font-size: 30px !important;
line-height: 30px !important;
}


/* Fan Funding Messages. */
yt-live-chat-legacy-paid-message-renderer #event-text {
color: #ffffff !important;
font-family: "Changa One";
font-size: 20px !important;
line-height: 20px !important;
}

yt-live-chat-legacy-paid-message-renderer #detail-text,
yt-live-chat-legacy-paid-message-renderer #detail-text * {
color: #ffffff !important;
font-family: "Imprima";
font-size: 18px !important;
line-height: 18px !important;
}

yt-live-chat-legacy-paid-message-renderer {
background-color: #00ffff !important;
margin: 4px 0 !important;
padding: 4px !important;
}

yt-live-chat-text-message-renderer a,
yt-live-chat-legacy-paid-message-renderer a {
text-decoration: none !important;
}

yt-live-chat-text-message-renderer[is-deleted],
yt-live-chat-legacy-paid-message-renderer[is-deleted] {
display: none !important;
}

Tuesday, December 19, 2017

2018 Big Updates in Youtube And Google Adsense. No Earning Show In Adsense.

December 19, 2017 0

According to Google Adsense Message "Please note that early next year AdSense will no longer show YouTube metrics. The best place to see your estimated earnings and other monetization metrics is the YouTube Analytics Revenue report".

To see your estimated earnings, use the YouTube Analytics Revenue report. You won't see your YouTube revenue in AdSense Estimated Earnings.



The Revenue report is available for YouTube Partners who have associated an AdSense account. Earnings data typically displays 24-48 hours after the end of the day, Pacific Time, but may sometimes take longer to appear.
The general trends available in Estimated earnings graph should reflect the finalised data, but we cannot guarantee that the data will not change. The latency for the most recent Estimated earnings data is approximately two days. Because the data is shown before the end of the month, there may be slight adjustments made at the end of the month.
You can find finalised YouTube earnings within your AdSense account.
Finalised earnings are not transferred to AdSense until about halfway through the following month (i.e. earnings accrued in June will be transferred to AdSense in mid-July).
Finalised YouTube earnings for the previous month are added to your AdSense account balance between the 10th and 14th of the month and paid out that month if your total balance has reached the payment threshold and if you have no payment holds.

Sunday, December 17, 2017

NEB Result Grade 11 Of 2074 || NEB Science and Managenent Result With Mark-sheet 2074/2018.

December 17, 2017 0
2074 NEB(National Examination Board) Result Of Class 11 is going to be published on the 3rd week of this Poush. Still there is on any notice from NEB when the result is going to publish. As soon as we will be notify from NEB, we will update instantly. According to some medial, the result will published on Grading System same as the way of SEE. We are not sure yet that how grading system will be look like but as soon as the notice published we will update it in our blog instantly.

How to Check Result?
As we know that the result will going to publish on grading system. So to check our result we must have symbol number(example:- 02345678) and date of birth according to your registration. After that you just have to click above Click Here button or image above.

Step 1: For Result only,
Just enter your symbol number correctly into the white box and press submit. It only show you result whether your are pass or fail. 

Step 2: For Whole Mark-sheet,
You will get the option to enter your Date of Birth correctly according to registration. Just simply enter your date of birth and click submit.

If your symbol Number and Date of Birth are correct then you will able to see your full Mark-sheet.



Saturday, December 16, 2017

Protect Your Facebook Account Privacy.

December 16, 2017 0
Protect your Facebook account from hackers
Recently a friend-of-a-friend’s Facebook account was hacked.  She realized that spam e-mails were sent from her account.  Then a few days later I heard that another acquaintance experienced the same problem.

Here are some steps you can take if you believe your account has been compromised, along with some steps to prevent this from happening.  Please share this with your Facebooking teens.  A 2011 survey showed that 30% of teen’s accounts had been hacked – by a friend!  So help them check their privacy and security settings on a regular basis.
WHAT TO DO IF YOUR FACEBOOK ACCOUNT HAS BEEN HACKED

Go to https://www.facebook.com/hacked and follow the instructions on-screen. You’ll go through three steps:


  1. Verify your account and change password.  You’ll be asked to identify your account, change your password, and change the password associated with the e-mail account that you use for Facebook.
  2. Review and fix anything the cybercriminal changed.
  3. Unlock account.
HOW TO PREVENT YOUR FACEBOOK ACCOUNT FROM BEING HACKED

Security settings are the key.  So stop what you’re doing and print out this article.  Then log into Facebook and update these settings.

From Account settings, click on Security.  I recommend the following settings for the highest level of security.

1. Secure Browsing – enabled.
2. Login Notifications – enabled
3. Login Approvals – enabled.  This feature requires that you have a cell phone capable of receiving text messages.  When enabled, you will receive a code via text message if your account is accessed from an unrecognized location.
This is important for teens.  They may use computers at a friend’s house, the library, or other public locations.  As an example, if you are logging in to Facebook from a computer in the library, you’ll be asked to enter in a code.  You’ll receive the text message, know that it’s YOU using Facebook, and enter the code.  If you receive the text message and you WERE NOT trying to log into Facebook, you’ll know there is a problem.  And the hacker trying to get into your account will not have the code.
Dialog box shown after Login Approvals are set up
4. App Passwords If you don’t have many apps associated with your Facebook account, you can probably leave this off.  If you do enable login approvals as described above, and you do use apps such as Skype through Facebook, then you may want to set app passwords.  You can read about this feature on Facebook Help and Inside Facebook.

5. Recognized Devices – if there is anything listed here that doesn’t look familiar, or the date is not recent, remove it.

6. Active Sessions – remove all except Current session.

Your Security Settings page should now look something like this:

Summary of Facebook security settings
Facebook Security settings in the locked-down position

As a last step, go to General Account settings and change your Facebook password.  And finally, log out of Facebook when not in use.

Now with your Facebook account safe and secure, you can get back to important Facebook activities, such as post-election re-friending, without too much of a fear of hackers accessing your account. 

Wednesday, December 13, 2017

Learn Perfect English For Job Interview. "Interview Question and Answers"

December 13, 2017 0
Interview Question and Answers

Looking for Job Interview Questions with Answers App ? You're at the right place.
Interview Question And Answer is an android apps stand with 4.5 rating out of 5 and 1 million + download up to now

Placecom - "Interview Guide" provides you a wide range of Interview questions (with smart answers) that an organization demands from candidates.

★★★ Features ★★★
★ 40 Most Important Interview Questions covered for each Subject Areas ( Total 500+ Questions )

★ 14 Different Subjects covered

- General (HR)
- Java
- .NET
- PHP
- DBMS
- Data Structure
- Finance
- Marketing
- Electronics
- C/C++
- Networking
- Software Testing
- Android
- Unix

★ Useful for Freshers & Experienced Professionals
★ GD Tips & Topics
★ Free Resume Sample & Review
★ Best Interview Guide & Aptitude Preparation
★ Logical Reasoning, Verbal, Maths, Puzzles covered with a sample paper, easily downloadable.
★ Easy to use GUI and Navigation Controls
★ Simply Fast and Requires NO Internet Connection
★ Best for preparing your resume before Interview
★ Helps you rehearse/practice own answers & compare them
★ Answers important interview tips like 

- What to do when you don't know the Answer ?
- What to wear on the day of Interview ? 

★ Strong Services & We do really work on your feedback..!!

The app is an attempt to distribute the well-appraised Placecom Books, that will instill you with the confidence that you need to endure most difficult interviews. These most asked Job Interview Questions and Answers are the result of 2 years of research in recruitment field. App also includes Job Interview Tips on designing a resume and wearing clothes on the day of Interview. This Best "INTERVIEW GUIDE" is unique in that it helps you master the most commonly asked Technical Interview Questions and HR Interview Questions, instilling you with the confidence that you need to endure the most difficult of job interviews.

It's a FREE Interview App and will remain FREE forever. Use this "INTERVIEW GUIDE" as much as possible to excel at your Job Interviews.