<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Access &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/access/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 24 Jun 2021 14:10:09 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>How to access Windows shared folders from iPhoneiPad?</title>
		<link>https://en.spress.net/how-to-access-windows-shared-folders-from-iphoneipad/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 24 Jun 2021 14:10:09 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[folders]]></category>
		<category><![CDATA[iPhoneiPad]]></category>
		<category><![CDATA[shared]]></category>
		<category><![CDATA[Windows]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-access-windows-shared-folders-from-iphoneipad/</guid>

					<description><![CDATA[Can we access shared files on Windows PC from Apple devices? of course can. The SMB protocol makes this server connection function possible, and the SMB protocol represents the server message block. It allows your computer to share files and printers with other devices on the network. If there are no shared folders on the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong> Can we access shared files on Windows PC from Apple devices? of course can. The SMB protocol makes this server connection function possible, and the SMB protocol represents the server message block. It allows your computer to share files and printers with other devices on the network.</strong></p>
<p><span id="more-27252"></span></p>
<p>If there are no shared folders on the Windows PC, you need to pass<strong> Right click on the folder</strong> -&gt; <strong> Attributes</strong> -&gt; <strong> shared</strong> To open the sharing of the selected folder. In addition, you also need to obtain the computer&#8217;s local server IP address, user name and password. If you are not sure about the server address, open a command prompt on your computer and type &#8220;<strong> ipconfig</strong> &#8220;And write down and read&#8221; <strong> IPv4 address</strong> &#8220;Line.</p>
<ol>
<li> Open the built-in &#8220;<strong> file</strong> &#8220;Applications. 2. In the browse menu, click &#8220;in the upper right corner of the screen<strong> Three o&#8217;clock</strong> &#8220;Icon. 3. Now, click&#8221;<strong> Connect to server</strong> &#8220;. 4. Next, type in the local server address obtained from the command prompt. Click &#8220;<strong> connection</strong> &#8220;. 5. Here, select &#8220;<strong> registered user</strong> &#8220;And enter the computer&#8217;s local user name and password. When finished, click&#8221;<strong> Next step</strong> 6. This will establish a connection and you will be able to view all shared folders on your computer. Click on any folder to view its files and other contents. 7. If you have the necessary permissions for the folder, you can move and rename it And delete files in the shared folder. To do this, just press and hold any file, as shown below. 8. If you want to disconnect from the computer at any time, please click<strong> &#8220;Browse</strong> &#8220;In the menu, click &#8220;next to the computer&#8217;s local server address&#8221;<strong> pop up</strong> ”Icon. Now you know how to access shared folders on Windows PC directly from your iPhone or iPad. If you can’t connect to the computer, make sure to connect your iOS or iPadOS device to the same local Wi-Fi network as your PC.
</p>
</li>
</ol>
<p>       The above is how to access Windows shared folders from iPhoneiPad. I hope it will help you. If you want to learn more about Mac, please follow MacZ.com</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">27252</post-id>	</item>
		<item>
		<title>Building a trusted foundation for product traceability</title>
		<link>https://en.spress.net/building-a-trusted-foundation-for-product-traceability/</link>
		
		<dc:creator><![CDATA[MĐ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 21:42:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Bring]]></category>
		<category><![CDATA[Building]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Consumers]]></category>
		<category><![CDATA[Draft]]></category>
		<category><![CDATA[Foundation]]></category>
		<category><![CDATA[Goods]]></category>
		<category><![CDATA[GS1]]></category>
		<category><![CDATA[Input]]></category>
		<category><![CDATA[Labels]]></category>
		<category><![CDATA[Portal]]></category>
		<category><![CDATA[Product]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[Science and technology]]></category>
		<category><![CDATA[Semi automatic]]></category>
		<category><![CDATA[source]]></category>
		<category><![CDATA[Standardized]]></category>
		<category><![CDATA[traceability]]></category>
		<category><![CDATA[Trust]]></category>
		<category><![CDATA[trusted]]></category>
		<category><![CDATA[TXNG]]></category>
		<guid isPermaLink="false">https://en.spress.net/building-a-trusted-foundation-for-product-traceability/</guid>

					<description><![CDATA[Currently, the traceability (TXNG) of products and goods is done through barcodes, or QR codes. However, the TXNG in these forms has not brought confidence to consumers because the information about TXNG in it is incomplete, especially there is no information about the &#8216;input&#8217; stages of the production process &#8211; determining product quality. Standardizing product [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Currently, the traceability (TXNG) of products and goods is done through barcodes, or QR codes. However, the TXNG in these forms has not brought confidence to consumers because the information about TXNG in it is incomplete, especially there is no information about the &#8216;input&#8217; stages of the production process &#8211; determining product quality. Standardizing product TXNG codes and putting into operation the National Product and Goods TXNG Gateway will contribute to solving this situation.</strong><br />
<span id="more-25652"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_146_39200675/5ce14e8f46cdaf93f6dc.jpg" width="625" height="424"> </p>
<p> <em> Illustration</em> In Decision 100/QD-TTg dated January 19, 2019 of the Prime Minister approving the &#8220;Project on implementation, application and management of the traceability system&#8221;, the Ministry of Science and Technology is responsible for building Build and put into operation the National Product and Goods Export Portal. At present, the Ministry of Science and Technology has developed and published 20 national standards in the field of NR. It is expected that in the fourth quarter of 2021, the National Product and Goods Trade Portal will come into operation. National standards are the basis for businesses to standardize TXNG activities, in which information about products and goods is fully collected in all stages of the supply chain, instead of only information. of farming and production as it is today. The TXNG portal will store this information to serve the advertising needs of businesses and to manage and supervise the implementation of TXNG by the State. A product is considered traceable through an electronic label using barcodes or QR codes according to the standards of the GS1 global bar code organization, when using scanning software or applications. The QR code must display all information about the product chain, from purchasing supplies, monitoring the care process, spraying, fertilizing, harvesting, preliminary processing, and transportation. This information is collected automatically or semi-automatically and is exploited and shared. The National Center for Codes and Barcodes (Ministry of Science and Technology) &#8211; the unit authorized to assume the prime responsibility for implementing Decision No. 100/QD-TTg &#8211; is coordinating in developing a draft Circular on electrical labels. to issue a uniform regulation on stamps and labels using barcodes and QR codes to meet the above requirements. According to the National Center for Codes and Barcodes, the comprehensive implementation of such stages brings benefits to businesses and people. Enterprises have tools to manage and publicize product quality, increase competitive value in the market. Consumers know product quality through information about the entire process of formation and path of a product before it goes on sale. Management agencies will accurately and promptly determine the cause of product quality problems as well as the roles and responsibilities of the parties involved. When the information about TXNG products and goods is uploaded by businesses to the TXNG Portal, it will create a data warehouse to serve the needs of transparent export product information and e-commerce of enterprises.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25652</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on Voice of Vietnam Online Newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</link>
		
		<dc:creator><![CDATA[Ninh Cơ]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 12:27:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[A05]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[Negativity]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Paralyze]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Voice]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[VOV VN]]></category>
		<category><![CDATA[VOV VN Electronic Newspaper]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-voice-of-vietnam-online-newspaper/</guid>

					<description><![CDATA[To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. . On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief Online newspaper Voice of Vietnam [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To clarify the reason why the website of Voice of Vietnam Radio and its social media platform cannot be accessed, the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) has investigated. .</strong><br />
<span id="more-25501"></span> On the morning of June 14, discussing with the press, Mr. Ngo Thieu Phong, Editor-in-Chief <strong> Online newspaper Voice of Vietnam</strong> (<strong> Vov</strong> .vn), said it had sent an official letter requesting the Ministry of Public Security to investigate and clarify cyber attacks against the Vov.vn website and its social networking platform.</p>
<p> At noon on the same day, discuss with Newspaper <em> Workers,</em> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (A05 &#8211; Ministry of Public Security) said that the unit has received an official dispatch from the Voice of Vietnam Electronic Newspaper. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_15_39179349/2c801c011343fa1da352.jpg" width="625" height="416"> <em> Website VOV Newspaper is not accessible at the time &#8211; Photo: Screenshot</em> Like Newspaper <em> Laborer </em> It was reported that from the evening of June 12, the access to Vov.vn electronic newspaper had difficulties, the transmission line was slow. By 12 o&#8217;clock on June 13, readers could not access the Vov.vn link at all. According to the technical department of the Voice of Vietnam Electronic Newspaper, this is the result of a denial of service (DDoS) attack that overflows the bandwidth, making access to the newspaper crippled. At the same time, the fanpage of this newspaper also received tens of thousands of negative and offensive comments. The agency has been in contact with Google and Facebook to handle the related issues. A representative of the Voice of Vietnam Electronic Newspaper also said that the attack on the newspaper affected the operation of the editorial office, affecting readers&#8217; access to information. The Voice of Vietnam has sent a dispatch to the relevant authorities to request a settlement, in which it is requested that the Ministry of Public Security search for the perpetrators of the online newspaper attack. Online newspaper Voice of Vietnam (Vov.vn) has had many technical solutions to fix the problem and access normally from the evening of June 13.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25501</post-id>	</item>
		<item>
		<title>Ministry of Public Security investigates cyber attack on VOV online newspaper</title>
		<link>https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</link>
		
		<dc:creator><![CDATA[Hoàng Lam]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 03:49:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aim at]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bandwidth]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Ddos]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[E News]]></category>
		<category><![CDATA[Editor]]></category>
		<category><![CDATA[Electronic media]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Investigate]]></category>
		<category><![CDATA[investigates]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Ministry]]></category>
		<category><![CDATA[newspaper]]></category>
		<category><![CDATA[Ngo Thieu Phong]]></category>
		<category><![CDATA[Online]]></category>
		<category><![CDATA[Overload]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[Rescue]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Take part]]></category>
		<category><![CDATA[VNCERT]]></category>
		<category><![CDATA[VOV]]></category>
		<category><![CDATA[VOV Electronic Newspaper]]></category>
		<category><![CDATA[VOV Newspaper]]></category>
		<category><![CDATA[Zing]]></category>
		<guid isPermaLink="false">https://en.spress.net/ministry-of-public-security-investigates-cyber-attack-on-vov-online-newspaper/</guid>

					<description><![CDATA[Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate. On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Website and fanpage of VOV electronic newspaper were attacked by denial of service (DDoS), causing overloaded access bandwidth. This agency has requested the Ministry of Public Security to investigate.</strong><br />
<span id="more-25338"></span> On the morning of June 14, Ngo Thieu Phong, Editor-in-Chief of the VOV electronic newspaper, said that the agency had sent a dispatch requesting the Ministry of Public Security to investigate and clarify cyber attacks targeting the VOV website and the platform. the agency&#8217;s social media platform.</p>
<p> A leader of the Department of Cybersecurity and High-Tech Crime Prevention (Ministry of Public Security) also confirmed that he had received an official letter from VOV. Currently, the Department of Cybersecurity and High-Tech Crime Prevention and a number of professional units of the Ministry of Public Security have investigated and clarified. In addition, the Cyber ​​Emergency Response Center (VNCERT) and network operators also participate in supporting and solving problems. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_119_39178611/9961ece8e3aa0af453bb.jpg" width="625" height="416"> <em> At the time of the cyber attack, readers could not access the website of VOV newspaper. Photo: VOV.</em> Exchange with <em> Zing</em> , a representative of VOV&#8217;s technical department said that cyberattacks on the agency&#8217;s resource system began on June 12. At about 13:00 on June 13, the bandwidth system was overloaded, suspected of being attacked by a denial of service (DDoS). On the morning of June 14, the administrator continued to record a new attack that caused the bandwidth of the system and the website to be overloaded. This is the first time this newspaper has been attacked by DDoS. In addition to the above attacks, the VOV side also believes that the person behind the attacks also discredits the stars of the VOV electronic newspaper on Google or repeatedly makes offensive and threatening comments on the newspaper&#8217;s fanpage. The VOV side is reviewing and detecting malicious code in the system, and at the same time limiting the consequences of cyberattacks, calculating damage to coordinate with authorities to solve.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25338</post-id>	</item>
		<item>
		<title>Beware of the trend of cartoon photos that are &#8220;storming&#8221; on Facebook</title>
		<link>https://en.spress.net/beware-of-the-trend-of-cartoon-photos-that-are-storming-on-facebook/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Sat, 19 Jun 2021 02:01:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Caricatures]]></category>
		<category><![CDATA[Cartoon]]></category>
		<category><![CDATA[Collect]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Edit]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Filter]]></category>
		<category><![CDATA[MAD]]></category>
		<category><![CDATA[Make it rain]]></category>
		<category><![CDATA[Movement]]></category>
		<category><![CDATA[On face]]></category>
		<category><![CDATA[photos]]></category>
		<category><![CDATA[Pixar]]></category>
		<category><![CDATA[Processing speed]]></category>
		<category><![CDATA[Purpose]]></category>
		<category><![CDATA[Renaissance]]></category>
		<category><![CDATA[storming]]></category>
		<category><![CDATA[Trend]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Voilà AI Artist]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-the-trend-of-cartoon-photos-that-are-storming-on-facebook/</guid>

					<description><![CDATA[Facebook users are caught up in the trend of cartoon images without knowing that their images can be collected and used for other purposes. A few days back, when accessing Facebook, many people will notice a dense appearance of posts related to cartoon images. Pay closer attention, those are the same Facebook users&#8217; images posted [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Facebook users are caught up in the trend of cartoon images without knowing that their images can be collected and used for other purposes.</strong><br />
<span id="more-25303"></span> A few days back, when accessing Facebook, many people will notice a dense appearance of posts related to cartoon images. Pay closer attention, those are the same Facebook users&#8217; images posted under cartoon images.</p>
<p> These images are transformed from ordinary photos to drawings in a very soulful way. Just a few simple steps, anyone will turn themselves into a cartoon character. As a result, many Facebook users have been fascinated by this trend. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/88c7a44aab0842561b19.jpg" width="625" height="625"> <em> Due to Voila AI Artist&#8217;s impressive photo editing capabilities, internet users are going crazy with the cartoon photo trend. </em> According to the research of <em> VietNamNet</em> , to create such animated images, users have to download a photo editing app called Voilà AI Artist. According to the introduction of the development team, Voilà AI Artist is an application that combines human creativity and artificial intelligence. The aim is to turn photos into fun cartoons and create stunning masterpieces. Using Voilà AI Artist is quite simple, this application provides 4 different filter groups. Users can download and use it for free without creating an account. If you want to use the paid version with more advanced features, users will have to pay 48,000 VND/week, 87,000 VND/month or 476,000 VND/year of use. Paying will help the image processing speed faster, in addition, the returned image is not watermarked. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/c302e98fe6cd0f9356dc.jpg" width="625" height="416"> <em> Filters of Voila AI Artist photo editing application. Photo: Trong Dat</em> To create animated images, users only need to upload photos to the application for the AI ​​system to automatically process. In addition to creating images in the style of Pixar cartoon characters, the application also helps turn ordinary photos into renaissance paintings or caricatures. With such attractive features, even though it has only appeared since May 31, 2021 on A, Voilà AI Artist has stormed and created a fever with more than 10 million downloads globally. . And Vietnamese users are also very quickly caught up in that new trend. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/2004088907cbee95b7da.jpg" width="625" height="625"> <em> In addition to creating cartoon images, Voila AI Artis can also create renaissance-style drawings. </em> However, users should note because in addition to the rights required in normal photo editing applications such as accessing the camera, taking photos, reading content, modifying or deleting content in memory, Voilà AI Artist also requires quite a few sensitive permissions. Accordingly, one of the requirements when using Voilà AI Artist is location access, permission to run at startup, read notifications and prevent the phone from going to sleep. Voilà AI Artist is a product of Wemagine.AI. This is a company registered in the state of British Colombia (Canada). According to the developer, by downloading and installing the application, the user agrees to be bound by Voilà AI Artist&#8217;s terms and privacy policy. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_23_39178230/b64c91c19e8377dd2e92.jpg" width="625" height="416"> <em> Users need to be careful because the policy of the Voila AI Artis developer has many absurd points. Photo: Trong Dat</em> By accessing the application, from the first access, the user has unconditionally agreed to the terms of Voilà AI Artist and irrevocably these constraints. The application developer also reserves the right to change the terms and conditions and these changes are effective immediately without the consent of the user. In general, with photo editing applications like Voilà AI Artist, users need to be extremely vigilant about issues related to data and privacy. This is because, through the development of Voilà AI Artist, the developer can collect users&#8217; personal images for other purposes.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25303</post-id>	</item>
		<item>
		<title>Smartphone abuse during the COVID-19 pandemic increases teen obesity</title>
		<link>https://en.spress.net/smartphone-abuse-during-the-covid-19-pandemic-increases-teen-obesity/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 18:10:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Abuse]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[ASN]]></category>
		<category><![CDATA[Computer]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Eat]]></category>
		<category><![CDATA[Fat]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[healthy]]></category>
		<category><![CDATA[Heartless]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[increases]]></category>
		<category><![CDATA[Korea University]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Obesity]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Teen]]></category>
		<category><![CDATA[Teenager]]></category>
		<category><![CDATA[Used Time]]></category>
		<category><![CDATA[Youth]]></category>
		<guid isPermaLink="false">https://en.spress.net/smartphone-abuse-during-the-covid-19-pandemic-increases-teen-obesity/</guid>

					<description><![CDATA[Abuse of digital devices such as computers and smartphones, especially during the COVID-19 pandemic, increases overweight and obesity in young people. In a recent study, Korean University scientists have shown that time spent using digital devices and content used affects obesity in adolescents. The results showed that teenagers who used smartphones more than 2 hours [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Abuse of digital devices such as computers and smartphones, especially during the COVID-19 pandemic, increases overweight and obesity in young people.</strong><br />
<span id="more-25146"></span> In a recent study, Korean University scientists have shown that time spent using digital devices and content used affects obesity in adolescents.</p>
<p> The results showed that teenagers who used smartphones more than 2 hours a day tended to eat unhealthy compared to those who spent less time using their phones. In addition, the number of teenagers who spend more than 3 hours a day using smartphones are significantly more likely to be overweight or obese. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_14_94_39177459/9d0c61b66ef487aadee5.jpg" width="625" height="416"> <em> Smartphone use may cause obesity in adolescents.</em> Teens who use their phones to search and retrieve overall information have healthier eating behaviors than those who use phones for chatting/texting, gaming, video/music, and social networking. festival. Causes can come from exposure to unhealthy food marketing online, a tendency to mindless eating while using a smartphone, not getting enough sleep, or a change in the time spent on physical activity. … Therefore, there is a need for strict regulation of the marketing of food aimed at teenagers in digital media, and measures to prevent youth from being exposed to marketing activities. or false messages about food. In addition, smartphone features can be leveraged to improve public health through nutrition tracking apps or digital platforms to provide complete and timely information. about healthy eating. <strong> Phung Dan</strong> (<em> ASN June 2021</em> )</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">25146</post-id>	</item>
		<item>
		<title>China wants access to Cambodia&#8217;s COVID-19 tracing data</title>
		<link>https://en.spress.net/china-wants-access-to-cambodias-covid-19-tracing-data/</link>
		
		<dc:creator><![CDATA[Bình Giang]]></dc:creator>
		<pubDate>Fri, 18 Jun 2021 05:56:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Ambassador]]></category>
		<category><![CDATA[Angkor Wat Temple]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[Asia Times]]></category>
		<category><![CDATA[Cambodia]]></category>
		<category><![CDATA[Cambodias]]></category>
		<category><![CDATA[China]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[grasp]]></category>
		<category><![CDATA[MOR]]></category>
		<category><![CDATA[Muay Thai]]></category>
		<category><![CDATA[Officials]]></category>
		<category><![CDATA[Remind again and again]]></category>
		<category><![CDATA[stop]]></category>
		<category><![CDATA[Thai Chana]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[track]]></category>
		<category><![CDATA[WANG]]></category>
		<category><![CDATA[Wang Wentian]]></category>
		<guid isPermaLink="false">https://en.spress.net/china-wants-access-to-cambodias-covid-19-tracing-data/</guid>

					<description><![CDATA[Chinese Ambassador Wang Wentian recently met with Cambodian officials and expressed his request to access a tracing application called &#8216;Stop COVID-19&#8217; that Cambodia has just launched, Asia Times cited sources familiar with the matter. know. Cambodia&#8217;s Angkor Wat temple complex was bustling with tourists. (Photo: Asia Times) The Chinese ambassador is said to have repeatedly [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Chinese Ambassador Wang Wentian recently met with Cambodian officials and expressed his request to access a tracing application called &#8216;Stop COVID-19&#8217; that Cambodia has just launched, Asia Times cited sources familiar with the matter. know.</strong><br />
<span id="more-24865"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_20_39169467/8d139c1692547b0a2245.jpg" width="625" height="418"> </p>
<p> Cambodia&#8217;s Angkor Wat temple complex was bustling with tourists. (Photo: Asia Times) The Chinese ambassador is said to have repeatedly said that this data is needed to help Beijing monitor the movement of people between the two countries, but the reality is that China is now imposing strict quarantine measures. strict for visitors and the two countries do not share borders According to reports, people who install the Stop COVID-19 app when entering a specific location will receive a message of a 6-digit sequence via phone. They need to enter this code to be granted entry. In this way, a digital log is created to record and track the user&#8217;s location based on the phone where the app is installed, as well as their behavior and relationships. Sources said that Ambassador Wang and other Chinese officials offered to assist the Cambodian Ministry of Post and Telecommunications in upgrading the current QR system with Huawei&#8217;s modern digital technology. Last year, China also made a similar offer to Thailand to access two movement tracking apps &#8220;Thai Chana&#8221; and &#8220;Mor Chana&#8221;. Chinese agencies are said to have requested access to information about foreigners in Thailand. The Chinese official told Thai authorities that any decision on allowing Chinese tourists to return to Thailand would also depend on sharing information on the Thai Chana and Mor Chana apps. Beijing has a bargaining chip when it comes to this proposal. In 2019, when the pandemic had not yet begun, Thailand welcomed 11 million Chinese tourists, more than any other country. Tourism accounts for nearly 20% of Thailand&#8217;s GDP and is currently suffering extremely serious damage because of restrictive measures to deal with the epidemic. However, Thailand has dodged this sensitive offer from China thanks to skillful diplomacy, the sources said. Thai people say that it is difficult to gather all the information in one application because the information is stored in many different databases. Cambodia is even more dependent on Chinese tourists. Out of a total of 5.29 million visitors to Cambodia in 2019, 2 million were from China. Tourism accounted for 32.7% of Cambodia&#8217;s GDP that year, but has been virtually crippled by the pandemic so far. Experts say Cambodia&#8217;s vulnerability and strategic location make it one of the focus of China&#8217;s influence efforts, as well as a target China wants to monitor, especially is with sensitive people in government and armed forces.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24865</post-id>	</item>
		<item>
		<title>Unpatched vulnerability in Samsung phones allows hackers to read messages</title>
		<link>https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 23:51:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Galaxy]]></category>
		<category><![CDATA[Galaxy S10]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[KNOX]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[messages]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[phones]]></category>
		<category><![CDATA[Read]]></category>
		<category><![CDATA[Samsung]]></category>
		<category><![CDATA[Secure Folder]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[TECHCRUNCH ONLY]]></category>
		<category><![CDATA[The attacker]]></category>
		<category><![CDATA[Unpatched]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://en.spress.net/unpatched-vulnerability-in-samsung-phones-allows-hackers-to-read-messages/</guid>

					<description><![CDATA[Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages. Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages. Not stopping there, things are even more dangerous when two other vulnerabilities [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Unpatched vulnerabilities could give hackers a significant amount of control over Samsung devices, including reading messages.</strong><br />
<span id="more-24695"></span> Discovered by Sergey Toshin, founder of security company Oversecure, one of these unresolved security flaws could help attackers trick you into granting access to your SMS messages.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/8314b223bc61553f0c70.jpg" width="625" height="417"> Not stopping there, things are even more dangerous when two other vulnerabilities can be exploited by hackers to manipulate arbitrary files with higher permissions. What makes these even scarier is that they can be exploited without any user interaction. Samsung is aware of these security flaws and it may take the company about 2 months to fix. For now, the best defense is to make sure your Samsung phone is up to date with the latest firmware. Toshin said he has found more than a dozen vulnerabilities in Samsung devices since the start of the year, with many of these vulnerabilities already fixed. One of the bugs lies in apps and components like the Secure Folder app and the Knox security software that come pre-installed on Samsung devices. Tohsin told TechCrunch that these may have given attackers access to sensitive user data. Among +Samsung devices, the Galaxy S10+ is verified as affected. Another vulnerability resulted in the deletion of all previously downloaded apps once device admin rights were granted to a newly installed app. Additionally, a vulnerability in the Settings app could grant read/write access to files with system user-level privileges. A security flaw that was resolved in February could have given hackers access to users&#8217; SMS/MMS messages and call details. Toshin also warned Samsung about issues that may have helped bad guys get the SD card content. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_13_107_39168534/bf9499a397e17ebf27f0.jpg" width="625" height="416"> While Samsung says the vulnerability affects &#8220;certain&#8221; Galaxy devices, the company appears to be downplaying the scope of the incident. “No issues have been reported globally and users should rest assured that their sensitive information is not at risk. We have addressed the potential vulnerability by developing and releasing security patches through a software update in April and May 2021 as soon as we identify the issue.” Korean company stated. (According to VOV, PhoneArena)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24695</post-id>	</item>
		<item>
		<title>Vina CHG launches anti-counterfeiting digital stamps</title>
		<link>https://en.spress.net/vina-chg-launches-anti-counterfeiting-digital-stamps/</link>
		
		<dc:creator><![CDATA[Thiên Ngọc]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 06:12:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[anticounterfeiting]]></category>
		<category><![CDATA[Characteristic]]></category>
		<category><![CDATA[CHG]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Counterfeiting]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Digitizing]]></category>
		<category><![CDATA[HOLOGRAM]]></category>
		<category><![CDATA[Hologram 3D]]></category>
		<category><![CDATA[Laser]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[Multidimensional]]></category>
		<category><![CDATA[Nguyen Viet Hong]]></category>
		<category><![CDATA[Physical effects]]></category>
		<category><![CDATA[Sms]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[specializes]]></category>
		<category><![CDATA[Stamp]]></category>
		<category><![CDATA[stamps]]></category>
		<category><![CDATA[System management]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[The work]]></category>
		<category><![CDATA[Vina]]></category>
		<guid isPermaLink="false">https://en.spress.net/vina-chg-launches-anti-counterfeiting-digital-stamps/</guid>

					<description><![CDATA[Recently, Vina CHG &#8211; a unit specializing in manufacturing and providing modern smart anti-counterfeiting solutions, has introduced the Hologram 3D+ anti-counterfeiting stamp product with differences and high applicability, helping businesses to be more convenient. in the fight against counterfeiting. The launch of Hologram 3D+ anti-counterfeiting stamp product with a combination of high-tech anti-counterfeiting features and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, Vina CHG &#8211; a unit specializing in manufacturing and providing modern smart anti-counterfeiting solutions, has introduced the Hologram 3D+ anti-counterfeiting stamp product with differences and high applicability, helping businesses to be more convenient. in the fight against counterfeiting.</strong><br />
<span id="more-24243"></span> The launch of Hologram 3D+ anti-counterfeiting stamp product with a combination of high-tech anti-counterfeiting features and a software system operating on a digitized platform.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_11_62_39160166/5015d499dadb33856aca.jpg" width="625" height="205"> According to Nguyen Viet Hong, General Director of Vina CHG, said: “The Hologram 3D+ anti-counterfeiting stamp is developed on a digital platform, printed with multi-dimensional laser engraving technology, creating floating and sinking effects, helping consumers easily recognize it. presented through 3D effects, different from the usual hologram stamps on the market”. This type of stamp is combined with traceability software and SMS, so it is not only difficult to counterfeit but also supports businesses in managing business systems on digital platforms, helping consumers to retrieve information, authenticate products accurate, fast products, suitable for most industries on the market today. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_11_62_39160166/13be91329f70762e2f61.jpg" width="625" height="312"> <em> Stamps are integrated with SMS technology and QR Code traceability on 3D Hologram background</em> Not only has good anti-counterfeiting ability, high aesthetics, 3D + hologram stamps will also bring more advanced utilities to businesses, helping businesses save costs and operate professionally by integrating capabilities. customer care software, warranty activation&#8230;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24243</post-id>	</item>
		<item>
		<title>Hanoi launches Covid-19 epidemiological information map</title>
		<link>https://en.spress.net/hanoi-launches-covid-19-epidemiological-information-map/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 02:38:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Around]]></category>
		<category><![CDATA[Blockage]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Department of Information]]></category>
		<category><![CDATA[Epidemiological]]></category>
		<category><![CDATA[Epidemiology]]></category>
		<category><![CDATA[Hanoi]]></category>
		<category><![CDATA[Hanoi Health Department]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Isolation]]></category>
		<category><![CDATA[Isolation zone]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[Map]]></category>
		<category><![CDATA[Medical Center]]></category>
		<category><![CDATA[Nguyen Thanh Liem]]></category>
		<category><![CDATA[Official announcement]]></category>
		<category><![CDATA[Positive]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[To serve]]></category>
		<category><![CDATA[Translate]]></category>
		<guid isPermaLink="false">https://en.spress.net/hanoi-launches-covid-19-epidemiological-information-map/</guid>

					<description><![CDATA[Hanoians can access this map to get information about testing points, blockade and the future, the number of positive Covid-19 cases around them. The Department of Information and Communications and the Hanoi Department of Health have officially launched the &#8220;Hanoi COVID-19 Epidemiological Information Map&#8221; to serve the prevention of epidemics in the city. Accordingly, with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hanoians can access this map to get information about testing points, blockade and the future, the number of positive Covid-19 cases around them.</strong><br />
<span id="more-24164"></span> The Department of Information and Communications and the Hanoi Department of Health have officially launched the &#8220;Hanoi COVID-19 Epidemiological Information Map&#8221; to serve the prevention of epidemics in the city.</p>
<p> Accordingly, with just a smartphone or computer connected to the Internet, people can search and detect problems related to the Covid-19 epidemic around them or at any location in Hanoi city. People can directly access the Hanoi Covid-19 Epidemiological Information Map at https://covidmaps.hanoi.gov.vn/ <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_11_23_39151882/8671cd70c032296c7023.jpg" width="625" height="416"> <em> Map of Covid-19 epidemiological information of Hanoi city. </em> The Covid-19 epidemiological information map will display testing points, concentrated isolation areas, blockade areas, medical isolation, hospitals, medical centers&#8230; The system also provides mapping tools for density analysis and statistics to serve the people as well as for disease management, monitoring and prevention. According to Nguyen Thanh Liem, Director of the Hanoi Department of Information and Communications, the source of data and expert data on the Covid-19 epidemiology is provided by the City Center for Disease Control (CDC) and the Department of Health. Hanoi and is continuously updated immediately after the official announcement of CDC. With the operation of this map system, the Hanoi Department of Information and Communications hopes that this will be one of the effective tools to support the prevention of the Covid-19 epidemic for people and management agencies in the world. city ​​area. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_11_23_39151882/d57691779c35756b2c24.jpg" width="625" height="416"> <em> Information about &#8220;red addresses&#8221; is provided on the map for people to proactively avoid. </em> In phase 2, the Hanoi Department of Information and Communications will coordinate with the Department of Health and CDC to continue to upgrade and add some new functions such as information on epidemiological points, blockade points, and positive cases. announced within a user defined radius on the map. In addition, in the future, this map system will help people update information about districts (districts), wards (communes) that have taken samples for Covid-19 testing. Another important feature is to help people locate, find the way to build a suitable travel route, limit contact with points at risk of infection. Before Hanoi, some other localities such as Bac Ninh, Vinh Phuc, etc. have also built a real-time epidemiological information map system to update people on the situation of the Covid-19 epidemic. 19.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24164</post-id>	</item>
		<item>
		<title>iPhone, iCloud of the dead will be like?</title>
		<link>https://en.spress.net/iphone-icloud-of-the-dead-will-be-like/</link>
		
		<dc:creator><![CDATA[Hải Triều]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 03:43:09 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Account holder]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Certified copy]]></category>
		<category><![CDATA[Copy]]></category>
		<category><![CDATA[Dead]]></category>
		<category><![CDATA[DEADMAN]]></category>
		<category><![CDATA[Depending]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Find a way]]></category>
		<category><![CDATA[Hide]]></category>
		<category><![CDATA[iCloud]]></category>
		<category><![CDATA[Intervention]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[Relatives]]></category>
		<category><![CDATA[Rules]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/iphone-icloud-of-the-dead-will-be-like/</guid>

					<description><![CDATA[Access to the deceased&#8217;s iCloud and iPhone accounts depends on whether the loved ones seek legal intervention. Have you ever wondered what happens after your death? Will your family be able to open your iPhone if you never tell them the password? What happens to the iCloud account and the secrets kept there? According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Access to the deceased&#8217;s iCloud and iPhone accounts depends on whether the loved ones seek legal intervention.</strong><br />
<span id="more-23361"></span> Have you ever wondered what happens after your death? Will your family be able to open your iPhone if you never tell them the password? What happens to the iCloud account and the secrets kept there?</p>
<p> According to editor Doroteya Borisova of biên <em> PhoneArena</em> , how Apple handles the account depends on whether relatives seek legal intervention or not. In iCloud&#8217;s terms and conditions, Apple says that it can proactively delete iCloud accounts that have been inactive for a year or more, or have been discontinued by users. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/a6f63c7a3138d8668129.jpg" width="625" height="468"> <em> The data stored in the iPhone, iCloud of the deceased is a difficult problem to handle if the loved one does not have their password. Photo: iMore. </em> This provision indicates that Apple may, in its sole discretion, check whether an account has been discontinued before proceeding with the deletion of the account. However, this will be notified 30 days in advance via the user&#8217;s email. <strong> Who can access the iCloud of the deceased?</strong> iCloud is inherently where all of your iPhone&#8217;s information is stored, including backups, photos, videos, iMessages and texts, and purchase history for Apple services (including music and movies). You can assume that a deceased person&#8217;s Apple ID will be assigned to the closest family members, to recover the last stored memories. However, according to the legal terms that the user agreed to from the beginning, the loved one does not automatically access the account of the deceased. The clause also stipulates that if there is an intervention from the law, relatives can access the data of the deceased. The procedure to prove to Apple includes providing the name and Apple ID of the deceased person who is requesting access, proof of ownership of the Apple ID, and a court order. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/c5c1564d5b0fb251eb1e.jpg" width="625" height="345"> <em> Forgot password feature when logging into iCloud. Photo: lifewire.com </em> Plus, if you can access the deceased person&#8217;s iCloud-linked email account, legal troubles won&#8217;t be an issue. By using the &#8220;Forgot Password&#8221; feature when signing in to iCloud, you can easily change your account&#8217;s password with the account&#8217;s associated email. However, Borisova also noted that this practice may violate Apple&#8217;s terms of use, leading to the suspension or termination of the account if detected. Here&#8217;s what happened to user Jeff Fischer in 2020. Fischer said he was a relative of a deceased person. This person&#8217;s account still has 100 USD payable in iTunes. Fischer said he wants to recover the money and send it back to the account holder&#8217;s sister. “It took me a lot of phone calls and emails to Apple support to find an employee who knew these issues. I provide the death certificate and notarized copy of my legal status as the decedent&#8217;s representative. However, instead of transferring the money from one Apple ID to another, they insist on closing the account and then issuing a check for the remaining credit,&#8221; Fischer said. <strong> So what about the iPhone?</strong> If the deceased is the only individual with the iPhone&#8217;s password, access to the phone is not possible even though you are authorized to access their iCloud. Even the FBI does not have a special way to get the password on the iPhone. The only way is to have to set up iCloud on a separate phone or completely factory reset the iPhone of the deceased. However, this means that any information that has not been backed up on iCloud will be lost. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_119_39141095/9ea70c2b0169e837b178.jpg" width="625" height="411"> <em> Apple&#8217;s Legacy Contact feature in iOS 15 update later this year. Photo: PhoneArena. </em> From iOS 15, iCloud account holders can set up trusted contacts, allowing information to be passed on to these people if the account holder dies. Those on the trusted list can then request access to the deceased person&#8217;s account. They just need to provide a copy of the death certificate.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23361</post-id>	</item>
		<item>
		<title>Means of transporting Bac Giang lychee are given priority in circulation</title>
		<link>https://en.spress.net/means-of-transporting-bac-giang-lychee-are-given-priority-in-circulation/</link>
		
		<dc:creator><![CDATA[Ngô Minh]]></dc:creator>
		<pubDate>Wed, 16 Jun 2021 03:41:07 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Bac]]></category>
		<category><![CDATA[Bac Giang]]></category>
		<category><![CDATA[Bac Giang People s Committee]]></category>
		<category><![CDATA[Block transport and ban trade]]></category>
		<category><![CDATA[Circulate]]></category>
		<category><![CDATA[circulation]]></category>
		<category><![CDATA[Consume]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[disease]]></category>
		<category><![CDATA[Documentary]]></category>
		<category><![CDATA[EVFTA]]></category>
		<category><![CDATA[Finished Product]]></category>
		<category><![CDATA[Giang]]></category>
		<category><![CDATA[Goverment office]]></category>
		<category><![CDATA[Le Van Thanh]]></category>
		<category><![CDATA[Lychee]]></category>
		<category><![CDATA[means]]></category>
		<category><![CDATA[Prioritize]]></category>
		<category><![CDATA[priority]]></category>
		<category><![CDATA[Stamp]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[Trade Promotion Bureau xúc]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[transporting]]></category>
		<category><![CDATA[Vehicle]]></category>
		<guid isPermaLink="false">https://en.spress.net/means-of-transporting-bac-giang-lychee-are-given-priority-in-circulation/</guid>

					<description><![CDATA[The Government Office has just sent an official dispatch to relevant agencies regarding the priority of circulation for means of transporting lychee from Bac Giang. Accordingly, in response to the proposal to give priority to traffic for lychee transportation vehicles of Bac Giang People&#8217;s Committee, Deputy Prime Minister Le Van Thanh gave directions. The Deputy [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The Government Office has just sent an official dispatch to relevant agencies regarding the priority of circulation for means of transporting lychee from Bac Giang.</strong><br />
<span id="more-23357"></span> Accordingly, in response to the proposal to give priority to traffic for lychee transportation vehicles of Bac Giang People&#8217;s Committee, Deputy Prime Minister Le Van Thanh gave directions.</p>
<p> The Deputy Prime Minister asked the People&#8217;s Committees of provinces and cities to follow the direction of the government&#8217;s &#8220;dual goals&#8221;, both disease prevention and economic development. The People&#8217;s Committees are required not to &#8220;stop the river from banning the market&#8221;, have a plan to prioritize quick circulation at Covid-19 epidemic control points with means of transporting lychee from Bac Giang province to promptly consume finished product. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_119_39197169/30e0da71c3332a6d7322.jpg" width="625" height="416"> <em> Means of transporting Bac Giang lychee are officially opened &#8220;green lane&#8221; to quickly consume finished products. Photo: Hoang Dong. </em> Relevant units include the Ministry of Transport, Industry and Trade, Public Security, Agriculture and Rural Development according to their functions and tasks to guide ensuring favorable conditions for trade, consumption and supply activities. goods between epidemic localities and other localities, in which priority is given to means of transporting lychee from Bac Giang province. The Ministry of Health was assigned to continue to inspect, urge and correct localities in the application of Covid-19 prevention and control measures to freight transport. This ministry is also responsible for guiding the Bac Giang People&#8217;s Committee on the issuance of certificates of safety to prevent and control the Covid-19 epidemic for means of transporting lychee through quarantine checkpoints. Previously, according to the Trade Promotion Department (Ministry of Industry and Trade), on June 12, the first batch of lychee with a traceability stamp entered the French market via air. This batch of nearly 1 ton lychee is stamped with the traceability stamp itrace247 developed by the unit. The shipment also took advantage of tariff preferences from the Vietnam &#8211; European Union Free Trade Agreement (EVFTA).</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23357</post-id>	</item>
		<item>
		<title>Ryanair calls for restoration of access to Belarusian airspace</title>
		<link>https://en.spress.net/ryanair-calls-for-restoration-of-access-to-belarusian-airspace/</link>
		
		<dc:creator><![CDATA[Lê Ánh (TTXVN/Vietnam+)]]></dc:creator>
		<pubDate>Tue, 15 Jun 2021 22:36:08 +0000</pubDate>
				<category><![CDATA[World]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[air]]></category>
		<category><![CDATA[Airlines]]></category>
		<category><![CDATA[Airspace]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[Belarus]]></category>
		<category><![CDATA[Belarusian]]></category>
		<category><![CDATA[Calling]]></category>
		<category><![CDATA[calls]]></category>
		<category><![CDATA[Do harm]]></category>
		<category><![CDATA[Emergency landing]]></category>
		<category><![CDATA[Fly through]]></category>
		<category><![CDATA[In particular]]></category>
		<category><![CDATA[Lithuania]]></category>
		<category><![CDATA[Minsk]]></category>
		<category><![CDATA[North East London]]></category>
		<category><![CDATA[Ransack]]></category>
		<category><![CDATA[Remove]]></category>
		<category><![CDATA[Restoration]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Roman Protasevich]]></category>
		<category><![CDATA[Ryanair]]></category>
		<category><![CDATA[Ryanair Airlines]]></category>
		<category><![CDATA[Stansted Airport]]></category>
		<category><![CDATA[UK Parliament]]></category>
		<guid isPermaLink="false">https://en.spress.net/ryanair-calls-for-restoration-of-access-to-belarusian-airspace/</guid>

					<description><![CDATA[According to CEO Ryanair, the politicization of airspace zones is not the way to solve the problem because it will harm the aviation industry in particular and international connectivity in general. Ryanair aircraft at Stansted Airport, North East London, England. (Photo: AFP/VNA) On June 15, Ryanair (Republic of Ireland) confirmed that it did not support [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to CEO Ryanair, the politicization of airspace zones is not the way to solve the problem because it will harm the aviation industry in particular and international connectivity in general.</strong><br />
<span id="more-23076"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_15_293_39196517/dd74a8dea09c49c2108d.jpg" width="625" height="360"> </p>
<p> <em> Ryanair aircraft at Stansted Airport, North East London, England. (Photo: AFP/VNA)</em> On June 15, Ryanair (Republic of Ireland) confirmed that it did not support the application <strong> flight ban</strong> instead of entering Belarusian airspace for the long term, instead, the authorities of countries need to talk to Belarus to avoid a repeat of the emergency landing situation as happened last month with this airline. Earlier, on May 23, the Belarusian authorities requested a Ryanair airliner <strong> emergency landing</strong> at the airport in Minsk after receiving a bomb threat. After searching and making sure there were no security threats, the plane continued on its way to Lithuania. Belarus insists its actions were legal and will open an investigation into the false alarm. It also accused Western countries of politicizing the matter, claiming that Belarus had requested a Ryanair plane to land to arrest opposition figure Roman Protasevich and insisted it was just a coincidence. Following the allegation, the European Union (EU) and the UK banned Belarusian airlines from flying over their airspace and issued safety guidelines advising European airlines to avoid <strong> Belarusian airspace</strong> and only fly over in an emergency. Speaking to a UK Parliament committee, Ryanair chief executive Michael O&#8217;Leary said the air transport industry depends heavily on long-term &#8220;unlimited&#8221; access to all international airspace. Therefore, this CEO called for an early restoration of unlimited access to Belarusian airspace and said that EU and UK officials, in coordination with international partners, should work with the Belarusian side to ensure no repeat the problem that happened with this company. According to CEO <strong> Ryanair</strong> , the politicization of airspace zones is not the way to solve the problem because it will harm the aviation industry in particular and international connectivity in general.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">23076</post-id>	</item>
		<item>
		<title>Diplomacy and the &#8216;battle&#8217; to access vaccine supplies</title>
		<link>https://en.spress.net/diplomacy-and-the-battle-to-access-vaccine-supplies/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 10 Jun 2021 03:27:13 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Battle]]></category>
		<category><![CDATA[commitment]]></category>
		<category><![CDATA[Contribute]]></category>
		<category><![CDATA[COVAX]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Diplomacy]]></category>
		<category><![CDATA[Diplomatic]]></category>
		<category><![CDATA[Distribution]]></category>
		<category><![CDATA[Do Hung Viet]]></category>
		<category><![CDATA[Foreign Office]]></category>
		<category><![CDATA[GAVI]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[Mechanism]]></category>
		<category><![CDATA[Pandemic]]></category>
		<category><![CDATA[Population]]></category>
		<category><![CDATA[Supplies]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[UNICEF]]></category>
		<category><![CDATA[vaccination]]></category>
		<category><![CDATA[vaccine]]></category>
		<category><![CDATA[Vaccines]]></category>
		<category><![CDATA[Vaccines against Covid 19]]></category>
		<category><![CDATA[WHO]]></category>
		<category><![CDATA[World Health Organization]]></category>
		<guid isPermaLink="false">https://en.spress.net/diplomacy-and-the-battle-to-access-vaccine-supplies/</guid>

					<description><![CDATA[Joining hands to repel the epidemic, the Ministry of Foreign Affairs and Vietnamese representative agencies abroad have been making efforts to find, approach, and &#8220;fight&#8221; to collect Covid-19 vaccine sources for the people. In the context of a resurgence of the Covid-19 pandemic, countries and territories around the world speed up vaccination against Covid-19. In [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Joining hands to repel the epidemic, the Ministry of Foreign Affairs and Vietnamese representative agencies abroad have been making efforts to find, approach, and &#8220;fight&#8221; to collect Covid-19 vaccine sources for the people.</strong><br />
<span id="more-22128"></span> In the context of a resurgence of the Covid-19 pandemic, countries and territories around the world speed up vaccination against Covid-19.</p>
<p> In Vietnam, Prime Minister Pham Minh Chinh requested to resolutely and effectively implement the vaccine strategy, which accelerates access to purchase and import of Covid-19 vaccine sources for Vietnam, including through COVID-19 Vaccine Global Access Program (COVAX). <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_194_39132387/3e1b7b0377419e1fc750.jpg" width="625" height="416"> <em> UNICEF and WHO representatives in Vietnam welcomed the first batch of Covid-19 vaccine including 811,200 doses in COVAX&#8217;s commitment to support Vietnam. (Source: UNICEF)</em> <strong> From defense to attack</strong> According to the Spokesperson of the Ministry of Foreign Affairs Le Thi Thu Hang, following the Prime Minister&#8217;s direction with the spirit of &#8220;fighting the epidemic like fighting the enemy&#8221;, right from the time the Covid-19 epidemic broke out and countries conducted research and production, Successfully testing a vaccine against the disease, the Ministry of Foreign Affairs and Vietnamese representative agencies abroad have made efforts to find, approach and negotiate with partners to provide vaccines against Covid-19 to soon import vaccines using vaccines. used in the country. In the fight against the Covid-19 pandemic, the COVAX mechanism is one of the best solutions to ensure the rapid and equitable deployment of safe and effective vaccines to all countries around the world. COVAX is coordinated by three organizations including the World Health Organization (WHO), the Global Alliance for Vaccines and Immunizations (GAVI) and the Coalition for Epidemic Response Innovations (CEPI), with distribution partners being United Nations Children&#8217;s Fund (UNICEF). With the policy of joining COVAX early, in December 2020, Vietnam submitted a dossier to this mechanism to propose vaccine support. On that basis, COVAX has allocated vaccines and committed to provide Vietnam with a vaccine quantity guaranteed to immunize 20% of the population, equivalent to nearly 39 million doses of Covid-19 vaccine. Up to now, Vietnam has received more than 2.5 million doses of the Covid-19 vaccine under the COVAX mechanism. This is part of a total of 4.1 million doses of vaccine, worth up to $17 million, committed to Vietnam by COVAX in the first six months of 2021. The remaining batches will arrive in Vietnam by the end of this year and early 2022. All vaccines are provided free of charge by COVAX through UNICEF. Thus, up to now, this is the largest amount of vaccines Vietnam has received. According to Mr. Do Hung Viet, Director of the Department of International Organizations (Ministry of Foreign Affairs), participating in Vietnam&#8217;s COVAX program is about finding &#8220;the right person at the right time&#8221;. COVAX has promptly provided the first two batches of vaccines so that Vietnam can deploy its vaccination strategy, especially for the frontline forces against the epidemic, contributing to helping us begin to change the state of epidemic prevention from defense to prevention. translation attack. <em> In ASEAN, before Vietnam, two countries have committed to contribute to COVAX: Singapore ($5 million) and the Philippines ($100,000).</em> <strong> Spread the spirit of solidarity</strong> Up to now, COVAX has received funding from more than 40 countries and partners, mainly from the US, European Union (EU), Japan, Australia, UK&#8230; <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_10_194_39132387/a3852c621620ff7ea631.jpg" width="625" height="416"> <em> AstraZeneca&#8217;s Covid-19 vaccine, distributed under the COVAX mechanism, has been vaccinated in Vietnam since early March.</em> For COVAX&#8217;s goal of providing 2 billion doses of vaccine to developing countries, middle and low-income countries, the amount of money that COVAX needs to continue to mobilize is still very large. In addition, the global Covid-19 vaccine supply chain is being disrupted and disrupted by the resurgence of the pandemic in many places, especially in India &#8211; a large vaccine production &#8220;factory&#8221;. best of the world. In that context, the COVAX mechanism must be flexible and adjusted to meet more urgent needs in places where the epidemic situation is severe. The supply is low, many places have severe outbreaks of the disease, greatly affecting the vaccine supply schedule of COVAX. As a major beneficiary of the COVAX program, Vietnam is determined to join hands with the international community to respond to the pandemic. This is also the policy that Vietnam is strongly promoting in recent years. Since the outbreak of the epidemic, Vietnam has stepped up to strengthen international cooperation and solidarity to cope with the epidemic, because Vietnam understands that no country will be safe when the world is still not safe. With that policy and spirit, Vietnam has decided to contribute $500,000 to the COVAX initiative. Thus, Vietnam is classified as one of the few developing countries contributing to COVAX. Mr. Do Hung Viet emphasized that the contribution to COVAX demonstrates Vietnam&#8217;s sense of responsibility in global efforts, strengthens multilateral cooperation, thereby enhancing Vietnam&#8217;s image and position in the eyes of foreign partners. international organizations as well as international friends. As soon as Vietnam announced its contribution to COVAX, many international organizations, including GAVI, UNICEF, WHO&#8230; gave thanks and appreciated this decision. “Through this contribution, Vietnam hopes to have a synergistic effect, spreading the spirit of international solidarity so that governments of other countries and other partners can take necessary actions to increase support for the country. COVAX”, shared Mr. Do Hung Viet. <strong> The frontline against epidemics abroad</strong> The Ministry of Foreign Affairs is tasked by the Government with the Ministry of Health as the main agency in finding and accessing vaccine sources. With a network of more than 90 Vietnamese representative offices abroad, the Ministry of Foreign Affairs has coordinated to drastically implement this task. Thereby, Vietnam has access to a number of vaccine sources of countries and international organizations to contribute to Vietnam&#8217;s vaccination strategy. Currently, on a global scale, vaccines are not only a medical issue but also contain many political factors. The decision of countries to support each other with vaccines depends a lot on bilateral relations in many fields. Therefore, the Vietnamese representative missions abroad and the Ministry of Foreign Affairs have conducted hundreds of contacts and mobilized access to vaccine sources in countries and international organizations. This tireless effort has yielded practical results such as the recent commitments to provide Covid-19 vaccines from COVAX and the US, Russia, Japan, China&#8230; to Vietnam. UNICEF has also expressed its willingness to support our country in accessing and purchasing a vaccine against Covid-19. As the world&#8217;s largest vaccine &#8220;buyer&#8221; with longstanding relationships with leading pharmaceutical companies, UNICEF has the ability to assist Vietnam in connecting and negotiating contract terms, prices and timeframes. vaccine supply time. Mr. Do Hung Viet said that this is an effective channel to access and buy vaccines that Vietnam needs to take advantage of. In addition to accessing vaccine sources of countries, international organizations, and Vietnamese representative missions abroad, they also make efforts to connect with state and provincial governments in some countries, taking advantage of the relationship. Twinning relationship with localities to mobilize vaccine support. Obviously, dealing with the epidemic requires the cooperation of the whole community. While doctors and medical staff are on the frontline against the epidemic at home, diplomats are also soldiers on the front lines abroad to &#8220;fight&#8221; to collect vaccine sources to increase vaccination coverage. vaccination for Vietnamese people, contributing to early fight against the pandemic. <em> COVAX&#8217;s initial goal is to purchase and mobilize 2 billion doses of vaccine by the end of 2021, enough to protect high-risk, vulnerable people and frontline healthcare workers worldwide, half of which were shipped to 92 low- and middle-income countries to vaccinate about 20% of the population of these countries. However, because the amount of COVAX vaccine received was much short of the set target, by May 24, 2021, COVAX had only distributed 72 million doses of the vaccine to 125 countries and economies. </em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">22128</post-id>	</item>
		<item>
		<title>Thousands more surveillance cameras installed in centralized isolation facilities</title>
		<link>https://en.spress.net/thousands-more-surveillance-cameras-installed-in-centralized-isolation-facilities/</link>
		
		<dc:creator><![CDATA[Phan Anh -]]></dc:creator>
		<pubDate>Tue, 08 Jun 2021 09:23:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Back]]></category>
		<category><![CDATA[cameras]]></category>
		<category><![CDATA[centralized]]></category>
		<category><![CDATA[Concentrate]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Decentralization]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[Fitting]]></category>
		<category><![CDATA[Installation]]></category>
		<category><![CDATA[installed]]></category>
		<category><![CDATA[Isolation]]></category>
		<category><![CDATA[Isolation zone]]></category>
		<category><![CDATA[Live]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[National Steering Committee]]></category>
		<category><![CDATA[play]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[thousands]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Viettel Group]]></category>
		<category><![CDATA[Vnpt]]></category>
		<category><![CDATA[VNPT Corporation]]></category>
		<guid isPermaLink="false">https://en.spress.net/thousands-more-surveillance-cameras-installed-in-centralized-isolation-facilities/</guid>

					<description><![CDATA[To date, 5,400 cameras have been deployed and installed in isolation areas in provinces across the country, serving 24/7 remote monitoring&#8230; Development when installing and connecting surveillance cameras in isolated areas The Posts and Telecommunications Group (VNPT) has just announced that it has completed the installation of more than 2,400 surveillance cameras in 150 concentrated [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To date, 5,400 cameras have been deployed and installed in isolation areas in provinces across the country, serving 24/7 remote monitoring&#8230;</strong><br />
<span id="more-21501"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_04_3_39072951/887e00a112e3fbbda2f2.jpg" width="625" height="351"> </p>
<p> Development when installing and connecting surveillance cameras in isolated areas The Posts and Telecommunications Group (VNPT) has just announced that it has completed the installation of more than 2,400 surveillance cameras in 150 concentrated isolation facilities in 32 provinces/cities from Da Nang onward. The main features of the camera system are live monitoring (live view), playback (play back), user authorization (user groups), user data protection, access logging, and tracking. regulations to meet the requirements of the National Steering Committee for Covid-19 prevention and control. Advanced features will continue to be updated according to actual requests from the Steering Committee and the Ministry of Information and Communications. The system is designed according to edge computing model, helping to connect, process and store with low latency and unlimitedly expand processing capacity when needed. In particular, ensuring the security and safety of images and data is a top priority, when the entire system is protected at data centers that meet international standards. The decentralization and decentralization of system access are strictly followed and comply with the requirements of the National Steering Committee, the Steering Committees in the provinces/cities and the Management Division in the isolation area for image monitoring. 24/7 by hierarchy. In order to support the system to operate stably 24/7, VNPT has arranged a team of monitoring, operation and support in each locality, according to strict service standards. In addition, to meet the new requirements of the prevention and control of the Covid-19 epidemic, VNPT Group is investing in an infrastructure system to meet the connection of 10,000 surveillance cameras in isolation areas&#8230; Previously, in order to strictly comply with regulations on concentrated isolation and management after the end of centralized isolation, the Ministry of Information and Communications asked the People&#8217;s Committees of provinces and cities to review the facilities. substances in concentrated isolation areas, ensuring close monitoring of quarantined people; The concentrated isolation areas must have enough cameras to monitor the quarantined people to take measures to prevent and control the Covid-19 epidemic as prescribed. In addition, the Ministry of Information and Communications has directed Viettel Group and VNPT Group to build a monitoring system and coordinate with the Departments of Information and Communications of provinces and cities to conduct surveys and connect surveillance cameras. in the isolation area to the centralized monitoring system designated by the Ministry of Information and Communications. Up to now, Viettel Group has also completed the installation and integrated connection of 3,000 surveillance cameras in isolated areas in the northern provinces. Particularly for 130 isolation facilities in 125 communes of Bac Giang province, Viettel has mobilized resources to install 1,000 more cameras. All image data from the camera is integrated into a centralized management system at the Control Center. The system applies cloud computing technology, allowing the National Steering Committee, Steering Committees in provinces and management departments in isolated areas to monitor images 24/7 according to decentralization.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21501</post-id>	</item>
		<item>
		<title>Reduce inadequacies and cumbersome when making medical declarations, tracing by app</title>
		<link>https://en.spress.net/reduce-inadequacies-and-cumbersome-when-making-medical-declarations-tracing-by-app/</link>
		
		<dc:creator><![CDATA[Anh Lê]]></dc:creator>
		<pubDate>Sun, 06 Jun 2021 17:01:16 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Connected]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Cumbersome]]></category>
		<category><![CDATA[declarations]]></category>
		<category><![CDATA[Declare]]></category>
		<category><![CDATA[decrease]]></category>
		<category><![CDATA[Department of Informatization]]></category>
		<category><![CDATA[Do Lap Hien]]></category>
		<category><![CDATA[Government Center]]></category>
		<category><![CDATA[Inadequacies]]></category>
		<category><![CDATA[Making]]></category>
		<category><![CDATA[medical]]></category>
		<category><![CDATA[NCOVI]]></category>
		<category><![CDATA[Prolix]]></category>
		<category><![CDATA[reduce]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Show]]></category>
		<category><![CDATA[Tracing]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[TTTT]]></category>
		<category><![CDATA[VHD]]></category>
		<guid isPermaLink="false">https://en.spress.net/reduce-inadequacies-and-cumbersome-when-making-medical-declarations-tracing-by-app/</guid>

					<description><![CDATA[Over the past time, Vietnam has deployed many applications and technology solutions to support the fight against Covid-19. The data connection of these applications will help fight the epidemic more effectively. Currently, the Ministry of Information and Communications (TT&#38;TT) is deploying 3 applications at the same time to support medical declaration (VHD, website tokhaiyte.vn), tracing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Over the past time, Vietnam has deployed many applications and technology solutions to support the fight against Covid-19. The data connection of these applications will help fight the epidemic more effectively.</strong><br />
<span id="more-21097"></span> Currently, the Ministry of Information and Communications (TT&amp;TT) is deploying 3 applications at the same time to support medical declaration (VHD, website tokhaiyte.vn), tracing (Bluezone) and information about the Covid-19 epidemic (NCOVI). ). In particular, the medical declaration feature is available on all 3, but previously the database of the applications was not connected, causing inconvenience to users.</p>
<p> &#8220;Last March, I flew to Hanoi for work. Before that, I made a medical declaration on the web, but forgot to take a photo. I thought the data would be on the Bluezone app because this app also has a declaration section. , when I went to the airport to open the app, I knew I had to make a medical declaration from the beginning, which took time,&#8221; shared Ngoc Mai, an office worker living in Ho Chi Minh City. &#8220;On the last election day, I still had to make a medical declaration when I went to the place. I don&#8217;t understand why they didn&#8217;t let me scan the QR code that I just declared a few days ago,&#8221; said Ngoc Phuong, living in Ba Dinh district, Hanoi. said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_119_39056314/3cd19d438c01655f3c10.jpg" width="625" height="415"> <em> Minister of Information and Communications Nguyen Manh Hung said that anti-epidemic applications currently use a unified data store. Photo: VGP. </em> Share with <em> Zing</em> , a representative of the Department of Informatization, under the Ministry of Information and Communications affirmed that the database of applications is now interconnected, helping to increase the efficiency of the applications and reduce the cumbersome for people. <strong> Why does the application need data communication?</strong> Mr. Do Lap Hien, Deputy Director of the Center for E-Government, under the Department of Informatization, explained the inconvenience when applications use independent and unconnected data. “In the past, there were cases where people declared their health on the NCOVI app, then downloaded more Bluezone to protect themselves. When going to a quarantine point, opening the health declaration function on Bluezone, there is no previously declared data. This is really inconvenient. In the opposite direction, the trace group when accessing the information of the Bluezone app, the data in the app is just the phone&#8217;s code. They have to find the corresponding information in the NCOVI or VHD database to know who and where the close contact is. This process will reduce the tracking speed,” said Mr. Hien. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_119_39056314/55b4f526e4640d3a5475.jpg" width="625" height="416"> <em> Anti-epidemic applications all have medical declaration functions. Data warehouse interoperability ensures this functionality works across applications. Photo: Tuan Anh.</em> During the National Online Conference on the situation and urgent solutions to prevent and control the Covid-19 epidemic on the morning of May 29, Minister of Information and Communications Nguyen Manh Hung said that the current anti-epidemic applications have used a unified data warehouse. . &#8220;Once synchronized, only one operation can access all information on the applications, more effective in fighting the epidemic,&#8221; Mr. Hien shared. Centrally connected IT applications, linked data. This is an important development step in the application of technology and data. <strong> Minister of Information and Communications Nguyen Manh Hung</strong> According to the representative of the Center, when updating to the latest version, the applications will use the linked data. This is to ensure that the people&#8217;s experience is seamless and unaffected. The latest version of Bluezone will be updated on the iOS and Android app stores this week. “For citizens and users, all changes must be &#8216;transparent&#8217; to them. The application must not change anything about the user experience, only more convenient, &#8220;said Mr. Hien. <strong> App data will delete itself after a month</strong> Despite being propagated about anti-epidemic applications, many users said they encountered difficulties and inconveniences when using. For example, with the Bluezone application, having to constantly turn on the Bluetooth connection makes users worry about consuming the smartphone&#8217;s battery. &#8220;I installed Bluezone since last year, but sometimes it bothers me because there are too many notifications. Also, I don&#8217;t know if the app is effective because now I don&#8217;t see the number of people exposed to almost the same amount of time,&#8221; Anh Hoang said. , working in Hanoi shared. In addition, the information that people who do not install Bluezone may be fined is also confusing. Reply <em> Zing</em> , a representative of the Information Technology Department, Ministry of Health said that the fine or not will depend on local regulations. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_03_119_39056314/b6121d9166d28f8cd6c3.jpg" width="625" height="438"> <em> Bluezone application supports the process of tracing, close contact. Photo: VH. </em> “The regulation clearly states that when going to a public place, it is mandatory to install the Bluezone application and turn on Bluetooth. If it is in a personal space, at home or in a place where there are not many people, it is not necessary. The sanction will depend on the risk or development of the epidemic in the locality. Thus, depending on the local situation, the sanction will be assigned to the People&#8217;s Committees of the provinces and cities for their own consideration and decision&#8221;, said Mr. Nguyen Truong Nam, Deputy Director of the Information Technology Department, Ministry of Industry and Trade. Health said. Personal data will be deleted after one month of storage so that people can rest assured to comply. <strong> Minister of Information and Communications Nguyen Manh Hung</strong> In addition, there are also concerns about the security of people&#8217;s personal information. Sharing about this issue, a representative of the Center for E-Government said that current data according to regulations will be deleted after 30 days. This number may change depending on the development of the disease and the requirements of the Ministry of Health. “Currently reserved data will be deleted after one month. When deleted, it will be completely deleted and cannot be retrieved, in order to ensure the privacy of users, &#8220;said Mr. Hien. Due to anti-epidemic requirements, many units and objects can access anti-epidemic data. However, depending on the scope and needs, these objects will have limited access. Not everyone can access the user&#8217;s data and information. In addition, according to the Minister of Information and Communications, wearable isolation monitoring devices will be deployed from June 1, immediately for workers in industrial parks. This bracelet is part of a seamless system, data will also be shared with other applications to ensure isolation. &#8220;Currently, the new bracelet solution is being tested at the request of the Ministry of Health. Regardless of the technology application, we will ensure that the data is attached to the application, which is part of the system.&#8221; representative of the Center for E-Government said.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">21097</post-id>	</item>
		<item>
		<title>Fintech &#8216;encroached&#8217; into the mobile segment, app installs skyrocketed</title>
		<link>https://en.spress.net/fintech-encroached-into-the-mobile-segment-app-installs-skyrocketed-2/</link>
		
		<dc:creator><![CDATA[Nhĩ Anh -]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 15:25:15 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Bank]]></category>
		<category><![CDATA[Developers]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Economy]]></category>
		<category><![CDATA[encroached]]></category>
		<category><![CDATA[Encroachment]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Games]]></category>
		<category><![CDATA[Gaming]]></category>
		<category><![CDATA[global]]></category>
		<category><![CDATA[Growth]]></category>
		<category><![CDATA[Increase]]></category>
		<category><![CDATA[installs]]></category>
		<category><![CDATA[Marketing]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[pay]]></category>
		<category><![CDATA[popularity]]></category>
		<category><![CDATA[Segment]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[skyrocketed]]></category>
		<category><![CDATA[Soaring]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/fintech-encroached-into-the-mobile-segment-app-installs-skyrocketed-2/</guid>

					<description><![CDATA[With installs growing by more than 50% and global fintech app visits increasing by 85% in the past year, it is proof that users are increasingly preferring digital banking and payment apps. Users are increasingly preferring digital banking and payment applications… Based on data from 2,000 top apps and datasets from Fintech, Game and E-Commerce [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With installs growing by more than 50% and global fintech app visits increasing by 85% in the past year, it is proof that users are increasingly preferring digital banking and payment apps.</strong><br />
<span id="more-20859"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_3_39044827/d0d5153f047ded23b46c.jpg" width="625" height="416"> </p>
<p> Users are increasingly preferring digital banking and payment applications… Based on data from 2,000 top apps and datasets from Fintech, Game and E-Commerce applications, Adjust, a global app marketing analytics platform, has just released its annual report on app trends. mobile apps in 2021. In the context of complicated epidemic developments worldwide, the rate of users downloading and opening applications increased sharply compared to previous years and was higher than expected. The report highlights that mobile apps will continue to grow strongly in 2021. Installs are up 50% across all industries in 2020 and up 31% in the first quarter of 2021. Meanwhile, number Visits increased by 30% in 2020 and now have increased by 4.5%. <strong> USERS FAVOR TO FINTECH APP</strong> Analytics reports from trends in installs and sessions to time spent on apps and app re-installs… The numbers recorded in the past year show that fintech continues to &#8220;encroach&#8221; into the mobile segment. Many traditional banks have cooperated with fintechs and neobanks (new-style digital banks, no transaction offices, no branches, all operations take place in cyberspace) are increasingly widely accepted. cobble. The banking app recorded $3.6 billion in revenue. By mid-2020, digital banking accounted for 25% of all banking apps downloaded, up from just 1% in 2017. The data shows that each user on average installs about 2.5 financial apps. The level of global payments last year reached 1.390 billion USD and is expected to increase to 1.680 billion USD this year. The adoption rate of mobile payments has increased sharply globally, with the highest rate in China with more than 81%, followed by India (37.6%), Japan (25.3%) and Italy (21.1%)… From the fintech growth numbers, users are increasingly preferring payment applications and digital banking. Taken as a whole, fintech has the strongest increase in installs of all industries, growing 51% in 2020 compared to the previous year. In the first months of 2021 alone, the number of installs increased by 12% compared to the average of 2020. The number of sessions of fintech applications also skyrocketed in 2020, with 85% year-over-year. The number of sessions increased steadily throughout 2020, with the strongest increase in early October (22% higher than average) and late November (24% higher than average). The data also recorded a peak in mid-July, when 15% higher than the annual average. In 2021, up to the present time, the number of fintech application sessions is increasing by 35%. These growth numbers show that users are increasingly preferring payment applications and digital banking. <strong> SPEND A LOT OF TIME GAME AND UP ONLINE SHOPPING</strong> Along with fintech, the complicated development of the Covid-19 epidemic has partly reflected in the growth figures of the e-commerce and gaming industries. Games hit new milestones in 2020, especially in the hypercasual (lightweight, instant play and unlimited replay) segment, with installs up 43% versus 26% for games. other games (non-hypercasual games). The number of sessions for hypercasual games increased by 36%, while the number of sessions for non-hypercasual games increased by 27% in 2020. The mobile game market is valued at $165 billion by 2020. Asia remains a large market, accounting for $41 billion of the total market value. The number of mobile game players increased by 46% during the year, from 1.2 billion to 1.75 billion. Statistics show that mobile games are the main source of 51% of revenue and hypercasual games are predicted to reach $ 2.5 billion by 2021. The overall market is forecasted to reach nearly $220 billion by 2023, of which revenue from Google Play accounts for 19.6%, continuing to be higher than the App Store (13.2%). Although the number of installs of e-commerce applications increased slightly, only 6%, the number of sessions increased by 44%. This clearly reflects the fact that users interact and shop high with e-commerce applications. Last year was also considered a successful year for e-commerce with the number of transactions on the application increasing by 58%, in which the strongest increase was at the beginning of the year when the epidemic broke out. The survey showed that the number of goods purchased online has increased by 24%, while the quantity in stores has decreased by 7%. Research predicts that by the end of 2021, 17% of global transactions will be done online. The number of installs and sessions in early 2021 is also positive, up 11% and 14% respectively compared to the average of 2020. The number of visits increased the most in late February and early. March 2021, an increase of 23% over the same period last year and 76% compared to 2019. With the above information and analysis data from gaming, e-commerce and fintech applications, experts say that developers and marketers can better understand the audience and the reality of the economy. based on the app (app economy) to have a suitable investment, development and market domination strategy. Based on information about users&#8217; in-app behavior, when and why they return to the app, marketers can create a comprehensive strategy that incorporates a personalized campaign and communication activities, thereby building brand trust… Users are increasingly preferring apps and this is the time to attract new users, experts emphasized. Mr. Paul H. Müller, co-founder and CEO at Adjust, said that for marketers, the potential to reach new users is unprecedentedly high, but competitive pressure is also &#8220;hottest&#8221; than ever, so it is necessary Boost your marketing strategy through automation and understand user in-app behavior.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20859</post-id>	</item>
		<item>
		<title>2G network will be &#8216;wiped out&#8217; by South Korea</title>
		<link>https://en.spress.net/2g-network-will-be-wiped-out-by-south-korea/</link>
		
		<dc:creator><![CDATA[B.C (t/h)]]></dc:creator>
		<pubDate>Wed, 02 Jun 2021 02:41:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[2G]]></category>
		<category><![CDATA[3G]]></category>
		<category><![CDATA[4G]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Broadcasting]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Commercialization]]></category>
		<category><![CDATA[Delete]]></category>
		<category><![CDATA[June]]></category>
		<category><![CDATA[Korea]]></category>
		<category><![CDATA[KT Telecom]]></category>
		<category><![CDATA[LG Uplus]]></category>
		<category><![CDATA[Ministry of Technology]]></category>
		<category><![CDATA[Mobile network]]></category>
		<category><![CDATA[Mobile subscription]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[SHARE]]></category>
		<category><![CDATA[SK Telecom]]></category>
		<category><![CDATA[South]]></category>
		<category><![CDATA[subscribers]]></category>
		<category><![CDATA[Telecommunication]]></category>
		<category><![CDATA[wiped]]></category>
		<guid isPermaLink="false">https://en.spress.net/2g-network-will-be-wiped-out-by-south-korea/</guid>

					<description><![CDATA[After 25 years of operation, the 2G mobile network will officially be stopped by Korea at the end of June 2021. On May 29, information released by the Korean Ministry of Information Technology said that LG Uplus &#8211; the last telecommunications company in the country still using 2G networks will proceed to disconnect 2G network [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>After 25 years of operation, the 2G mobile network will officially be stopped by Korea at the end of June 2021.</strong><br />
<span id="more-19927"></span> On May 29, information released by the Korean Ministry of Information Technology said that LG Uplus &#8211; the last telecommunications company in the country still using 2G networks will proceed to disconnect 2G network services on May 29. At the end of June this year, this will mark the end of the 2G network in the country.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_29_5_39010181/54285da14ae3a3bdfaf2.jpg" width="625" height="351"> <em> 2G network will be &#8220;wiped out&#8221; by Korea</em> Previously, in July last year, SK Telecom officially stopped providing 2G network service, while another Korean mobile operator, KT Telecom, stopped providing 2G network service since 2012. due to the rapid development of advanced mobile network generations and the significant decrease in the number of 2G network users. 2G mobile service started operating in Korea in 1996 based on the world&#8217;s first commercial code-shared multiple access network built by SK Telecom. The number of 2G subscribers nationwide surpassed 20 million in 2006 but began to decline after the country commercialized 3G and 4G networks in 2003 and 2011, respectively. It is known that by the end of March 2021, the number of 5G mobile network subscribers in Korea has reached 14.48 million, accounting for 20% of the total 71.1 million mobile subscribers, according to data from the Ministry of Information Technology. trust this country.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19927</post-id>	</item>
		<item>
		<title>Gate 1022 in Ho Chi Minh City receives feedback about Covid-19 at any time</title>
		<link>https://en.spress.net/gate-1022-in-ho-chi-minh-city-receives-feedback-about-covid-19-at-any-time/</link>
		
		<dc:creator><![CDATA[Phan Anh]]></dc:creator>
		<pubDate>Sat, 29 May 2021 08:40:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Answers]]></category>
		<category><![CDATA[app]]></category>
		<category><![CDATA[call]]></category>
		<category><![CDATA[Call center]]></category>
		<category><![CDATA[Chi]]></category>
		<category><![CDATA[City]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[disease]]></category>
		<category><![CDATA[FANPAGE]]></category>
		<category><![CDATA[Feedback]]></category>
		<category><![CDATA[gate]]></category>
		<category><![CDATA[Ho Chi Minh]]></category>
		<category><![CDATA[hours]]></category>
		<category><![CDATA[Install]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[Mailbox]]></category>
		<category><![CDATA[Method]]></category>
		<category><![CDATA[Minh]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Outbreak]]></category>
		<category><![CDATA[Portal]]></category>
		<category><![CDATA[Receive]]></category>
		<category><![CDATA[receives]]></category>
		<category><![CDATA[Reflect]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[time]]></category>
		<guid isPermaLink="false">https://en.spress.net/gate-1022-in-ho-chi-minh-city-receives-feedback-about-covid-19-at-any-time/</guid>

					<description><![CDATA[People in Ho Chi Minh City can report information on the situation of the Covid-19 epidemic in the area through Portal 1022 by 5 methods: calling, installing software, accessing the news site, sending via mailbox and reporting online. society Following the direction of the People&#8217;s Committee of Ho Chi Minh City, in addition to the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>People in Ho Chi Minh City can report information on the situation of the Covid-19 epidemic in the area through Portal 1022 by 5 methods: calling, installing software, accessing the news site, sending via mailbox and reporting online. society</strong><br />
<span id="more-18981"></span> Following the direction of the People&#8217;s Committee of Ho Chi Minh City, in addition to the 12 assigned areas, the Portal to receive and answer information for people, businesses and organizations in Ho Chi Minh City (Gate 1022) is ready to receive Information reflected from people about the Covid-19 epidemic situation related to Ho Chi Minh City.</p>
<p> Gate 1022 serves to receive information 24/7; allowing people to monitor the treatment process; receive notification of handling results after completing troubleshooting; People compare the actual handling and continue to reflect back to the system in case the actual incident has not been handled or the quality has not been handled. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_15_38983866/6a4212fd04bfede1b4ae.jpg" width="625" height="350"> <em> Portal 1022 will receive information about the situation of the Covid-19 epidemic</em> To send feedback to Portal 1022, people can do it through the following 5 methods: &#8211; Provide information in the form of a phone call to the switchboard number 1022 &#8211; press 3. &#8211; Install the Mobile App software &#8220;Switchboard 1022&#8221; (Android and iOS versions), allowing to take pictures and select the incident location on the map to reflect. &#8211; Access the portal at https://1022.tphcm.gov.vn to reflect information. &#8211; Send feedback to email address: 1022@tphcm.gov.vn &#8211; Reflect on the social network Fanpage: at https://www.facebook.com/1022.tphcm.gov.vn Currently, the epidemic situation in Ho Chi Minh City is very complicated. In addition to the previous outbreaks, Ho Chi Minh City has 2 new outbreaks involving 17 crew members on a ship carrying rice from India to Vietnam and an outbreak at the Renaissance Mission Church in Go Vap district. Up to now, related to the Renaissance Mission Church, there are a total of 25 suspected cases of Covid-19 in the community in 6 districts.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18981</post-id>	</item>
		<item>
		<title>Facebook and Instagram have a super cool new update: You can now hide the number of likes if you like</title>
		<link>https://en.spress.net/facebook-and-instagram-have-a-super-cool-new-update-you-can-now-hide-the-number-of-likes-if-you-like/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sat, 29 May 2021 00:28:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Cool]]></category>
		<category><![CDATA[Counter]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Experience]]></category>
		<category><![CDATA[Experiment]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Hide]]></category>
		<category><![CDATA[Hide numbers]]></category>
		<category><![CDATA[INSTAGRAM]]></category>
		<category><![CDATA[Jealous]]></category>
		<category><![CDATA[LIKE]]></category>
		<category><![CDATA[likes]]></category>
		<category><![CDATA[mind]]></category>
		<category><![CDATA[number]]></category>
		<category><![CDATA[Option]]></category>
		<category><![CDATA[Post it]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Social Network]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<guid isPermaLink="false">https://en.spress.net/facebook-and-instagram-have-a-super-cool-new-update-you-can-now-hide-the-number-of-likes-if-you-like/</guid>

					<description><![CDATA[Facebook has just launched a feature that allows users to hide the number of likes on posts on two platforms Facebook and Instagram. Recently, Facebook has officially launched the feature to hide the number of likes on Facebook and Instagram. Specifically, Facebook said this feature has been tested recently, to find out if hiding likes [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Facebook has just launched a feature that allows users to hide the number of likes on posts on two platforms Facebook and Instagram.</strong><br />
<span id="more-18908"></span> Recently, Facebook has officially launched the feature to hide the number of likes on Facebook and Instagram.</p>
<p> Specifically, Facebook said this feature has been tested recently, to find out if hiding likes reduces the user experience. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38983137/b3bdff1ae95800065949.jpg" width="625" height="350"> <em> (Artwork: LN24)</em> The results showed that not seeing the number of likes benefits some users, but at the same time annoys others. Therefore, this new feature will be offered as an option so that users can decide which option is right for them. This means that users can optionally hide the public like count on posts. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38983137/29f3625474169d48c407.jpg" width="625" height="416"> <em> (Photo: Facebook)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38983137/e2e0aa47bc05555b0c14.jpg" width="625" height="396"> <em> (Photo: Facebook)</em> Facebook claims to be looking for more ways for people to deliver a better user experience. Starting today, Facebook will offer an option to hide the like count on all News Feed posts. You can also choose to hide the number of likes on your own posts, so that others can&#8217;t see how many likes that post has. This way, people can focus on the image or video being shared instead of the number of likes, according to a Facebook representative. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38983137/736025c73385dadb8394.jpg" width="625" height="350"> <em> (Photo: Facebook)</em> Users can hide the number of likes on other people&#8217;s posts, by accessing the new &#8220;Posts&#8221; section under &#8220;Settings&#8221;. This control applies to all News Feed posts. In addition, users can also choose to hide the number of likes before sharing a content. This feature can be optionally enabled/disabled, even after the content has been posted. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_27_329_38983137/2ff97d5e6b1c8242db0d.jpg" width="625" height="312"> <em> (Photo: Tech)</em> Some experts say that hiding likes is the right thing to do. &#8220;Removing the counter helps reduce stress, anxiety and many negative emotions when using social networks, because many people often envy each other through post likes. Hiding likes also helps users focus. into the content of the article more.&#8221;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18908</post-id>	</item>
		<item>
		<title>There are 9 localities that have used the Covid-19 map to update the epidemic in real time</title>
		<link>https://en.spress.net/there-are-9-localities-that-have-used-the-covid-19-map-to-update-the-epidemic-in-real-time/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Wed, 26 May 2021 19:58:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Abbreviation]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[App Store or CH Play]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Department of Information Security]]></category>
		<category><![CDATA[epidemic]]></category>
		<category><![CDATA[Epidemiology]]></category>
		<category><![CDATA[Lang Son]]></category>
		<category><![CDATA[Lang Son Department of Health]]></category>
		<category><![CDATA[localities]]></category>
		<category><![CDATA[Map]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Phu Yen]]></category>
		<category><![CDATA[real]]></category>
		<category><![CDATA[Real time]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[time]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[Vinh Phuc]]></category>
		<guid isPermaLink="false">https://en.spress.net/there-are-9-localities-that-have-used-the-covid-19-map-to-update-the-epidemic-in-real-time/</guid>

					<description><![CDATA[Information from the Department of Information Security (Ministry of Information and Communications) on May 25 said that there are 9 localities deploying Covid-19 epidemiological information mapping software (CovidMaps), including: Da Nang, Bac Ninh Giang, Vinh Phuc, Bac Ninh, Quang Ninh, Quang Nam, Gia Lai, Phu Yen and Lang Son. Covid-19 epidemiological information mapping software Lang [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Information from the Department of Information Security (Ministry of Information and Communications) on May 25 said that there are 9 localities deploying Covid-19 epidemiological information mapping software (CovidMaps), including: Da Nang, Bac Ninh Giang, Vinh Phuc, Bac Ninh, Quang Ninh, Quang Nam, Gia Lai, Phu Yen and Lang Son.</strong><br />
<span id="more-18391"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_25_8_38961840/894722c13783dedd8792.jpg" width="625" height="302"> </p>
<p> Covid-19 epidemiological information mapping software Lang Son. Regarding the Covid-19 prevention support effect of the CovidMaps map, the map provides Covid-19 epidemiological information to help people not to move to hot spots, avoid infection. People can see centralized isolation points, medical isolation areas and local disease control checkpoints displayed on the map in real time. The CovidMaps map also informs the living area and contact location of Covid-19 patients within 14 days. This helps people easily identify the route of people infected with Covid-19 and concentrated isolation points to not move to. According to reviews, the information displayed on the map is quite intuitive and detailed. With concentrated isolation points, the warning section will show the time of application, the maximum number of receptions, the number of people in quarantine and the number that can be received more. When people have a need to find the places where the Covid-19 patient has been with the exact time, the system will look up the patient&#8217;s epidemiological information by number. In addition, the digital map also displays a list of patients by number or initials along with basic personal information such as year of birth, gender, health status and where they are being treated. The digital map is displayed very specifically, on the screen there are annotations for each icon such as the isolation area, the patient&#8217;s home area, the epidemic control checkpoint&#8230; for people to easily grasp, do not move to. Yesterday (May 24), the People&#8217;s Committee of Lang Son province launched the Covid-19 epidemiological information mapping software (CovidMaps) in Lang Son province. To use this digital map, users need to access the address https://covidmaps.langson.gov.vn. Lang Son is the 9th province in the country to provide the Covid-19 epidemiological map tool. Epidemiological information on the CovidMaps map provided by the Lang Son Health Department in real time, the Lang Son Department of Information and Communications is constantly updated, ensuring information is provided to the community and people quickly and timely. time; In addition, people can send feedback and suggestions through the application, the system&#8230; <em> Step 1:</em> Visit https://www.bluezone.gov.vn or download directly at App Store or CH Play. <em> Step 2:</em> Once downloaded, the application will ask for permission to use Bluetooth to record contact with other users who have installed Bluezone. If Bluetooth is not already on, drag the status bar and turn on Bluetooth; or go to Settings, select Bluetooth and turn it on. <em> Step 3:</em> Once the installation is done, click Scan Around. If someone near you less than 2m has used Bluezone, the application will automatically identify these users and put them in the contact list.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18391</post-id>	</item>
		<item>
		<title>People who test for Covid-19 services for exiting can get results within the same day</title>
		<link>https://en.spress.net/people-who-test-for-covid-19-services-for-exiting-can-get-results-within-the-same-day/</link>
		
		<dc:creator><![CDATA[Thu Hoài]]></dc:creator>
		<pubDate>Wed, 26 May 2021 17:05:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Airline]]></category>
		<category><![CDATA[App Store or CH Play]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Au Duong Lan]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Day]]></category>
		<category><![CDATA[departure]]></category>
		<category><![CDATA[District 8]]></category>
		<category><![CDATA[exiting]]></category>
		<category><![CDATA[Face mask]]></category>
		<category><![CDATA[Introducing letter]]></category>
		<category><![CDATA[Invitation]]></category>
		<category><![CDATA[N95]]></category>
		<category><![CDATA[Obligatory]]></category>
		<category><![CDATA[Passport]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[results]]></category>
		<category><![CDATA[services]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[test]]></category>
		<category><![CDATA[The same]]></category>
		<guid isPermaLink="false">https://en.spress.net/people-who-test-for-covid-19-services-for-exiting-can-get-results-within-the-same-day/</guid>

					<description><![CDATA[People who come to be tested for Covid-19 at the Center for Disease Control in Ho Chi Minh City to exit must register online on the Covid-19 service testing software and have full documents to prove their exit. On May 25, the Center for Disease Control of Ho Chi Minh City informed about current regulations [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>People who come to be tested for Covid-19 at the Center for Disease Control in Ho Chi Minh City to exit must register online on the Covid-19 service testing software and have full documents to prove their exit.</strong><br />
<span id="more-18373"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_25_8_38961530/ab2ea3a4b6e65fb806f7.jpg" width="625" height="1007"> </p>
<p> On May 25, the Center for Disease Control of Ho Chi Minh City informed about current regulations for people leaving the country who want to be tested for Covid-19 services. Accordingly, testers must register in advance on the Covid-19 service testing software on the website hcdc.vn or contact the hotline: 0869.559.453 – 0908.355.357 for instructions. Regarding the dossier, the person testing the Covid-19 service to exit needs to bring his passport and air ticket (for exiting by air); Passport, letter of guarantee or invitation from the guest to enter and the company&#8217;s letter of introduction (if any) when exiting by land. For exiting by water, an additional crew book is required. When going to a medical facility, the person testing must make a medical declaration and wear an N95 mask (bring it by yourself). Sampling time: Between 8am &#8211; 11am from Monday to Friday at 957 3/2 Street, Ward 7, District 11. Results will be returned between 8:00am &#8211; 10:00am the next day from Monday to Saturday at campus 125/61 Au Duong Lan, Ward 3, District 8. Regarding testing costs, testers pay (directly or by bank transfer) an amount of VND 734,000/test. If you want to get test results on the same day of sampling, pay an additional fee of 116,000 VND for quick test, get results from 5 pm to 6 pm on the same day at 125/61 Au Duong Lan facility, Ward 3, District 8. <em> Step 1:</em> Visit https://www.bluezone.gov.vn or download directly at App Store or CH Play. <em> Step 2:</em> Once downloaded, the application will ask for permission to use Bluetooth to record contact with other users who have installed Bluezone. If Bluetooth is not already on, drag the status bar and turn on Bluetooth; or go to Settings, select Bluetooth and turn it on. <em> Step 3:</em> Once the installation is done, click Scan Around. If someone near you less than 2m has used Bluezone, the application will automatically identify these users and put them in the contact list.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18373</post-id>	</item>
		<item>
		<title>How to limit the leak of activity history on Google</title>
		<link>https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</link>
		
		<dc:creator><![CDATA[MINH HOÀNG]]></dc:creator>
		<pubDate>Tue, 25 May 2021 02:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[activity]]></category>
		<category><![CDATA[Any]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Erase]]></category>
		<category><![CDATA[Extra]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[leak]]></category>
		<category><![CDATA[Leakage]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[My Activity]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Press]]></category>
		<category><![CDATA[Query]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Song]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Verification]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-limit-the-leak-of-activity-history-on-google/</guid>

					<description><![CDATA[When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers. Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data. According to Google, if users [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>When you use a Google product, your search queries, the songs you&#8217;ve heard, the places you&#8217;ve visited, etc. will be saved on Google&#8217;s servers.</strong><br />
<span id="more-18010"></span> Since all of this data is private and sensitive, Google just added an extra layer of security to make sure only you can access the data.</p>
<p> According to Google, if users turn on the Extra verification feature (additional verification), their personal data will be safer, especially on shared devices (work computers, tablets &#8230;). Note, this feature only applies to My Activity item. First, open a browser on your phone or computer and go to https://myactivity.google.com/myactivity, then log in with the corresponding Google account. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/8bdb46bf52fdbba3e2ec.jpg" width="625" height="477"> <em> The section that manages personal activities on Google. Photo: MINH HOANG</em> Next, click on the Manage My Activity Verifications link, and select Request Additional Verification &#8211; Save to finish. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/a8cf7cab68e981b7d8f8.jpg" width="625" height="475"> <em> Enable additional verification for better data protection. Photo: MINH HOANG</em> Once enabled, this feature will ask you to verify your identity before showing activity history. This essentially takes you to Google&#8217;s sign-in page, which then asks the user to enter the account password or connect using an Android device (if you&#8217;ve set it up before). Overall, this extra feature is quite useful on shared devices. However, if you feel uncomfortable with saving activity history, you can turn off unnecessary items or delete everything in the settings. To do this, go to https://myactivity.google.com/myactivity, log in with the respective account. There will be three sections here: Web &#038; App Activity, Location History, and YouTube Activity History. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_331_38941779/9549452d516fb831e17e.jpg" width="625" height="487"> <em> Delete all previously saved activity history. Photo: MINH HOANG</em> When you click on any item, you can temporarily disable that feature or delete all previously saved data through Activity Management. If you want Google to automatically delete data for each time period, users just need to select Delete automatically, then select the corresponding time period (more than 3 months, more than 18 months or more than 36 months) and follow the steps instructions until complete.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">18010</post-id>	</item>
		<item>
		<title>The reason why Microsoft &#8216;deathed&#8217; Internet Explorer browser</title>
		<link>https://en.spress.net/the-reason-why-microsoft-deathed-internet-explorer-browser/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Mon, 24 May 2021 11:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[ActiveX]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Cease]]></category>
		<category><![CDATA[Compatible]]></category>
		<category><![CDATA[deathed]]></category>
		<category><![CDATA[Declare death]]></category>
		<category><![CDATA[Explorer]]></category>
		<category><![CDATA[Explorer 11]]></category>
		<category><![CDATA[Faster]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet explorer]]></category>
		<category><![CDATA[Internet Explorer 11]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Official]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[reason]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[Sean Lyndersay]]></category>
		<category><![CDATA[To replace]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-reason-why-microsoft-deathed-internet-explorer-browser/</guid>

					<description><![CDATA[Recently, the US technology company Microsoft officially announced that it will permanently stop Internet Explorer (IE), the web browser created 25 years ago. Internet Explorer (IE), the Internet access browser that was popular for a long time, is now &#8216;deathed&#8217; by Microsoft after about 25 years. Microsoft will focus on Microsoft Edge to compete with [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Recently, the US technology company Microsoft officially announced that it will permanently stop Internet Explorer (IE), the web browser created 25 years ago.</strong><br />
<span id="more-17829"></span> Internet Explorer (IE), the Internet access browser that was popular for a long time, is now &#8216;deathed&#8217; by Microsoft after about 25 years. Microsoft will focus on Microsoft Edge to compete with rivals.</p>
<p> According to AFP news agency, Microsoft said that from June 15, 2022, IE will stop working. Users can switch to using Microsoft Edge &#8211; another browser of the company &#8211; instead. The announcement comes in the context of IE increasingly losing ground to web browsers of rival companies such as Google&#8217;s Chrome or Apple&#8217;s Safari. Microsoft says that Microsoft Edge will replace IE on Windows 10. Websites and applications developed based on the IE browser will continue to run on Microsoft Edge until at least 2029. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_23_252_38937154/d7b7776063228a7cd333.jpg" width="625" height="399"> <em> Microsoft of the US officially announced that it will permanently stop Internet Explorer (IE). Illustration</em> &#8220;Microsoft Edge delivers a browsing experience that&#8217;s not only faster, more secure, and more modern than IE, but it can also address an important concern: compatibility with older websites and apps. &#8221; &#8211; Microsoft pointed out. Emphasizing further, Microsoft Edge program manager Sean Lyndersay said, “We are announcing that the future of Internet Explorer on Windows 10 is Microsoft Edge. The Internet Explorer 11 desktop app will be discontinued and end of support on June 15, 2022 for certain versions of Windows 10.” While Windows 10&#8217;s Long Term Service Channel (LTSC) will still include Internet Explorer next year, all consumer versions of the operating system will stop supporting the browser. Microsoft did not specify, but it is likely that Internet Explorer will no longer be bundled with Windows by June of next year or shortly thereafter. For business customers who operate websites and applications that rely on Internet Explorer, Microsoft Edge is bringing a feature called IE Mode. Microsoft created IE Mode for Microsoft Edge a few years ago to help businesses using the Chromium-based Microsoft Edge browser to be able to run older websites. IE Mode supports older ActiveX controls and legacy web pages. What is surprising is that it is still used by many businesses. Microsoft promises to support IE Mode in Microsoft Edge until at least 2029. Microsoft also ended Internet Explorer 11 support for the Microsoft Teams web app last year, and they are planning to cut it off from accessing Microsoft 365 services later this year. Internet Explorer 11 will no longer be supported for Microsoft online services such as Office 365, OneDrive, Outlook,&#8230; on August 17. <strong> An Duong</strong> (Th)</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17829</post-id>	</item>
		<item>
		<title>Binh Duong: Inauguration of Centralized Storage Center</title>
		<link>https://en.spress.net/binh-duong-inauguration-of-centralized-storage-center/</link>
		
		<dc:creator><![CDATA[Thanh Thảo]]></dc:creator>
		<pubDate>Sun, 23 May 2021 02:35:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Archives]]></category>
		<category><![CDATA[Binh]]></category>
		<category><![CDATA[Binh Duong]]></category>
		<category><![CDATA[Center]]></category>
		<category><![CDATA[centralized]]></category>
		<category><![CDATA[Civil]]></category>
		<category><![CDATA[Congressman]]></category>
		<category><![CDATA[construction]]></category>
		<category><![CDATA[Duong]]></category>
		<category><![CDATA[Floor area]]></category>
		<category><![CDATA[Ice cutting]]></category>
		<category><![CDATA[inaugurate]]></category>
		<category><![CDATA[Inauguration]]></category>
		<category><![CDATA[Mai Hung Dung]]></category>
		<category><![CDATA[People s Committee of Binh Duong province]]></category>
		<category><![CDATA[Power system]]></category>
		<category><![CDATA[Rooftop]]></category>
		<category><![CDATA[Storage]]></category>
		<category><![CDATA[Term]]></category>
		<category><![CDATA[Thu Dau Mot City]]></category>
		<category><![CDATA[Vote]]></category>
		<category><![CDATA[Welcome]]></category>
		<guid isPermaLink="false">https://en.spress.net/binh-duong-inauguration-of-centralized-storage-center/</guid>

					<description><![CDATA[To welcome the election of deputies to the 15th National Assembly and People&#8217;s Councils at all levels for the 2021-2026 term, on the morning of May 21, in Thu Dau Mot City, Binh Duong Provincial People&#8217;s Committee held a ceremony to inaugurate the Archive Center project. province concentration. Leaders of Binh Duong province cut the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>To welcome the election of deputies to the 15th National Assembly and People&#8217;s Councils at all levels for the 2021-2026 term, on the morning of May 21, in Thu Dau Mot City, Binh Duong Provincial People&#8217;s Committee held a ceremony to inaugurate the Archive Center project. province concentration.</strong><br />
<span id="more-17504"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_355_38930162/f15de86cf32e1a70433f.jpg" width="625" height="259"> </p>
<p> <em> Leaders of Binh Duong province cut the ribbon to inaugurate</em> The Provincial Centralized Storage Center is a civil construction, grade II consisting of 9 floors and 1 rooftop, invested by the Provincial Construction Investment Project Management Board. The building has a total floor area of ​​12,311m2 and is equipped with technical systems including: Electrical and lighting systems; water supply and drainage system; security camera system, communication; automatic fire protection. In addition, the project is also invested with specialized equipment and synchronous office equipment, ensuring the preservation and storage of scientific and long-term documents, meeting the requirements of archival work. Quick and scientific document retrieval. The project has a total investment of 371 billion VND, started on December 30, 2019. After 16 months of construction, the project has completed the construction and installation in accordance with the design, ensuring quality, safety and progress. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_355_38930162/26bf358e2eccc7929edd.jpg" width="625" height="468"> <em> Binh Duong province storage center project</em> Speaking at the ceremony, Mr. Mai Hung Dung said that the putting into use of this work has an important meaning, marking the progress in the province&#8217;s archival work which is increasingly safe, efficient, scientific and effective. shows the provincial leaders&#8217; interest in the archival industry.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17504</post-id>	</item>
		<item>
		<title>Microsoft officially &#8216;deathed&#8217; Internet Explorer browser</title>
		<link>https://en.spress.net/microsoft-officially-deathed-internet-explorer-browser/</link>
		
		<dc:creator><![CDATA[Linh San]]></dc:creator>
		<pubDate>Sat, 22 May 2021 10:47:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[deathed]]></category>
		<category><![CDATA[Declare death]]></category>
		<category><![CDATA[Edge]]></category>
		<category><![CDATA[Explorer]]></category>
		<category><![CDATA[Explorer 11]]></category>
		<category><![CDATA[Firefox]]></category>
		<category><![CDATA[forever]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet explorer]]></category>
		<category><![CDATA[Market share]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[Microsoft Edge]]></category>
		<category><![CDATA[Office 365]]></category>
		<category><![CDATA[Official]]></category>
		<category><![CDATA[officially]]></category>
		<category><![CDATA[Rival company]]></category>
		<category><![CDATA[Safari]]></category>
		<category><![CDATA[To replace]]></category>
		<category><![CDATA[Web browser]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<guid isPermaLink="false">https://en.spress.net/microsoft-officially-deathed-internet-explorer-browser/</guid>

					<description><![CDATA[Technology giant Microsoft has made the decision to permanently stop Internet Explorer (IE), the web browser created 25 years ago. Illustration. Accordingly, a Microsoft spokesperson shared that software supplier Microsoft will end support for the Internet Explorer (IE) web browser next year, so it will stop providing it to individual users. The announcement comes in [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Technology giant Microsoft has made the decision to permanently stop Internet Explorer (IE), the web browser created 25 years ago.</strong><br />
<span id="more-17330"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_22_204_38927807/b0d6f884e3c60a9853d7.jpg" width="625" height="416"> </p>
<p> <em> Illustration.</em> Accordingly, a Microsoft spokesperson shared that software supplier Microsoft will end support for the Internet Explorer (IE) web browser next year, so it will stop providing it to individual users. The announcement comes in the context of IE increasingly losing ground to web browsers of rival companies such as Google&#8217;s Chrome or Apple&#8217;s Safari. According to analytics company Statscounter, as of April 2021, Google&#8217;s Chrome browser accounted for 65% of the market share, while Apple&#8217;s Safari ranked second with nearly 19% market share. Third and fourth are Firefox (3.59% market share) and Edge (3.39% market share), respectively. In the future, Microsoft wants to focus entirely on the Microsoft Edge browser. Microsoft said that from June 15, 2022, IE will stop working. Users can switch to using Microsoft Edge &#8211; another browser of the company &#8211; instead. Internet Explorer 11 will no longer be supported for Microsoft online services such as Office 365, OneDrive, Outlook,&#8230; on August 17th. Earlier, on March 17, 2015, Microsoft announced that Microsoft Edge would replace Internet Explorer as the default browser on their Windows 10 devices. Internet Explorer is an iconic product in the field of technology. Born on August 16, 1995 on Windows operating system, Internet Explorer was once the world&#8217;s most popular browser in the 2000s.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17330</post-id>	</item>
		<item>
		<title>The largest oil pipeline network in the US was hacked</title>
		<link>https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</link>
		
		<dc:creator><![CDATA[Theo Reuters]]></dc:creator>
		<pubDate>Fri, 21 May 2021 16:25:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[largest]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[network]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Oil]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-largest-oil-pipeline-network-in-the-us-was-hacked/</guid>

					<description><![CDATA[Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware. &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement. The [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Colonial Pipeline, America&#8217;s leading fuel pipeline operator, has had to shut down its entire network after a cyber attack by ransomware.</strong><br />
<span id="more-17026"></span> &#8220;Colonial Pipeline is working on verification and resolution of the cyber attack. At this point, our main focus is on safely and efficiently restoring service to normal operations.&#8221; Colonial Pipeline released a statement.</p>
<p> The US has opened an investigation into this cyber attack. Ransomware is a type of malware designed to lock down a system by encrypting data and demanding a ransom from the victim to regain access. Colonial Pipeline asked a cybersecurity company to coordinate with federal law enforcement agencies to investigate this cyberattack. President Joe Biden was briefed on the incident. The White House said Washington will work to help the Colonial Pipeline resume the interrupted fuel supply. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_106_38780041/7c9da632bb70522e0b61.jpg" width="625" height="410"> <em> This is considered the largest cyber attack on the US energy system</em> Colonial Pipeline is providing nearly half of the fuel for the US east coast. This is considered one of the largest ransomware attacks ever recorded against US energy infrastructure. The shutdown of the largest fuel pipeline network in the United States will cause the price of this item and related products to spike. Colonial Pipeline transports 2.5 million barrels of gasoline and other fuels per day through 8,850 kilometers of pipeline connecting Gulf Coast refineries to the eastern and southern United States. The company also supplies fuel to several major US airports, including Hartsfield Jackson Airport in Atlanta, which has the world&#8217;s largest passenger traffic.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">17026</post-id>	</item>
		<item>
		<title>US declares state of emergency after cyberattack on pipeline system</title>
		<link>https://en.spress.net/us-declares-state-of-emergency-after-cyberattack-on-pipeline-system/</link>
		
		<dc:creator><![CDATA[Hoài Thanh/Báo Tin tức (WaPo)]]></dc:creator>
		<pubDate>Fri, 21 May 2021 07:40:05 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[declares]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Emergency]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Planes]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Refined]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[State]]></category>
		<category><![CDATA[State of emergency]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Texas Bay]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-declares-state-of-emergency-after-cyberattack-on-pipeline-system/</guid>

					<description><![CDATA[The administration of US President Joe Biden on May 9 declared a state of emergency to maintain a stable fuel supply, following a cyber attack on Colonial Pipeline &#8211; the company that operates the fuel pipeline. America&#8217;s largest. A Colonia Pipeline fuel station. Photo: Getty Images The US Department of Transportation&#8217;s guidance notice emphasizes that [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The administration of US President Joe Biden on May 9 declared a state of emergency to maintain a stable fuel supply, following a cyber attack on Colonial Pipeline &#8211; the company that operates the fuel pipeline. America&#8217;s largest.</strong><br />
<span id="more-16851"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38787590/938702f21fb0f6eeafa1.jpg" width="625" height="351"> </p>
<p> <em> A Colonia Pipeline fuel station. Photo: Getty Images</em> The US Department of Transportation&#8217;s guidance notice emphasizes that this decision is in response to emergency conditions, stemming from the need for immediate transportation of fuel items, to relieve problems related to supply scarcity. Colonial Pipeline on May 9 also said that many of the company&#8217;s main operating pipelines are still closed, but some small lines connecting the supply station and distribution point have returned to normal operation. On May 7, Colonial Pipeline was hacked with ransomware, a type of code that locks systems by encrypting data and demands a ransom to restore access. The attack caused Colonia Pipeline to shut down the entire pipeline network. Colonial Pipeline transports gasoline, diesel, jet fuel and other refined products from the Gulf of Texas to the densely populated East Coast of the United States through an 8,850-kilometer pipeline, serving 50 million customers. In areas affected by supply disruptions, fuel demand increased by 4% on May 8, prices also increased by more than 4.2%. The attack caused concern among US consumers about the scarcity of gasoline supplies if the problem is not fixed in time.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16851</post-id>	</item>
		<item>
		<title>Ransomware Attack Targets US Fuel Pipelines</title>
		<link>https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</link>
		
		<dc:creator><![CDATA[Anh Duy]]></dc:creator>
		<pubDate>Fri, 21 May 2021 01:15:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[Atlanta]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Georgia]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Pipelines]]></category>
		<category><![CDATA[populous]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Targets]]></category>
		<category><![CDATA[Transport]]></category>
		<guid isPermaLink="false">https://en.spress.net/ransomware-attack-targets-us-fuel-pipelines/</guid>

					<description><![CDATA[On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security. Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On May 10, Reuters reported that the US administration was working to support the country&#8217;s top fuel pipeline operator after a large-scale cyberattack threatened national security.</strong><br />
<span id="more-16746"></span> Accordingly, the White House is working closely with the leading US fuel pipeline operator Colonial Pipeline to help them recover from a ransomware attack that forced the company to close a network. an important fuel supply to the populous states in the East.</p>
<p> The attack was one of the most disruptive digital ransom schemes reported, prompting US lawmakers to call for increased protection of America&#8217;s critical energy infrastructure from hackers. Commerce Secretary Gina Raimondo said pipeline repairs were a priority for the Biden administration and Washington was working to avoid more severe fuel supply disruptions by helping Colonial restart the road network. The tube is more than 5,500 miles (8,850 km) long. &#8220;Right now it&#8217;s an all-in-one effort,&#8221; Raimondo said on CBS&#8217;s &#8220;Face the Nation.&#8221; &#8220;We are working closely with company, state and local officials to ensure they return to normal operations as quickly as possible and without disruption to supplies,&#8221; Colonial said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/fbf5adbdb0ff59a100ee.jpg" width="625" height="473"> <em> The pipeline network was attacked &#8211; Photo: Reuters</em> Their main fuel lines are still offline, but some of the smaller routes between the terminals and delivery points are now up and running. Neither Raimondo nor the company has given an estimate of a full reboot date. U.S. gasoline futures rose more than 3% to $2,217 a gallon, the highest since May 2018 as trading opened for the week and market participants reacted to pipeline closures. Colonial ships about 2.5 million barrels per day of gasoline and other fuels from refineries on the Gulf Coast to consumers. Its extensive pipeline network serves major US airports including Atlanta&#8217;s Hartsfield Jackson Airport, the world&#8217;s busiest airport by passenger traffic. A spokeswoman for Charlotte Douglas International Airport said the airport had supplies on hand and was &#8220;monitoring the situation closely&#8221;. Retail fuel experts including the American Automobile Association say outages lasting several days could have a significant impact on fuel supplies in the region, particularly in the southeastern US. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_62_38788853/427e10360d74e42abd65.jpg" width="625" height="326"> <em> Colonial Pipeline&#8217;s fuel tanks &#8211; Photo: Reuters</em> While the US government investigation is in its early stages, a former official and three industry sources said the suspected hackers were a professional cybercrime group called DarkSide. DarkSide is one of many gangs that often use malware to extort victims. These groups gain access to private networks, encrypt files with software, and often steal data. They ask for money to decrypt the files and ask for more money to not publish the stolen content. During the Colonial attack, the hackers stole more than 100 gigabytes of data.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16746</post-id>	</item>
		<item>
		<title>5 simple ways to help you choose to buy &#8216;genuine&#8217; Dalat strawberries</title>
		<link>https://en.spress.net/5-simple-ways-to-help-you-choose-to-buy-genuine-dalat-strawberries/</link>
		
		<dc:creator><![CDATA[Hồng Nhung]]></dc:creator>
		<pubDate>Thu, 20 May 2021 20:14:07 +0000</pubDate>
				<category><![CDATA[Cuisine]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Aroma]]></category>
		<category><![CDATA[buy]]></category>
		<category><![CDATA[By]]></category>
		<category><![CDATA[choose]]></category>
		<category><![CDATA[color]]></category>
		<category><![CDATA[Da Lat]]></category>
		<category><![CDATA[Dalat]]></category>
		<category><![CDATA[Dark]]></category>
		<category><![CDATA[Dark color]]></category>
		<category><![CDATA[Distinguish]]></category>
		<category><![CDATA[Even]]></category>
		<category><![CDATA[Genuine]]></category>
		<category><![CDATA[interleaving]]></category>
		<category><![CDATA[Know]]></category>
		<category><![CDATA[Masquerading]]></category>
		<category><![CDATA[nice]]></category>
		<category><![CDATA[Pale]]></category>
		<category><![CDATA[Preservation]]></category>
		<category><![CDATA[shape]]></category>
		<category><![CDATA[Simple]]></category>
		<category><![CDATA[Sour]]></category>
		<category><![CDATA[Standard]]></category>
		<category><![CDATA[strawberries]]></category>
		<category><![CDATA[Strawberry]]></category>
		<category><![CDATA[ways]]></category>
		<guid isPermaLink="false">https://en.spress.net/5-simple-ways-to-help-you-choose-to-buy-genuine-dalat-strawberries/</guid>

					<description><![CDATA[Just based on factors such as color, shape, preservation time of strawberries, users can easily identify which are Da Lat strawberries. The mixing of Chinese strawberries and then advertising and selling them into Dalat strawberries is no longer a new story. However, many consumers are still worried because they do not know how to distinguish [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Just based on factors such as color, shape, preservation time of strawberries, users can easily identify which are Da Lat strawberries.</strong><br />
<span id="more-16680"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/e1dfcd0cd74e3e10675f.jpg" width="625" height="391"> </p>
<p> The mixing of Chinese strawberries and then advertising and selling them into Dalat strawberries is no longer a new story. However, many consumers are still worried because they do not know how to distinguish these two types of strawberries, if they buy poor quality Chinese strawberries, their health will be affected. To distinguish Chinese strawberries in the guise of Da Lat strawberries, you just need to observe the following characteristics. <strong> 1. Shape</strong> Da Lat strawberries have uneven fruit shape, moderate fruit size, not too big, not smooth. Meanwhile, Chinese strawberries have high uniformity, large fruits, hard and smooth to the touch. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/ba7783a499e670b829f7.jpg" width="625" height="409"> <em> Dalat strawberries have an uneven fruit shape.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/23b014630e21e77fbe30.jpg" width="625" height="416"> <em> Chinese berries from size to shape are very uniform.</em> <strong> 2. Color</strong> In terms of color, Dalat strawberries have an uneven red color, dark on the stem, the stem is slightly white. Chinese strawberries give a dark red color from head to stem, which looks very beautiful. The calyx part, Da Lat strawberry has a short thin calyx, partially covered on the strawberry, with light green color. These features, consumers will not notice when buying Chinese strawberries, because the calyx of Chinese strawberries is thick, very smooth, covers more than a third of the strawberry and has a dark green color like the leaves. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/239c2d4f370dde53871c.jpg" width="625" height="422"> <em> The color of Da Lat strawberry has a small white part covered in the calyx. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/bc8fb05caa1e43401a0f.jpg" width="625" height="390"> <em> Chinese strawberries are uniformly red from head to stem, looking very beautiful.</em> <strong> 3. The meat inside</strong> With the flesh inside, Dalat strawberries will be light red, with white interlaced. The Chinese strawberry has a darker red flesh, no white interlacing. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/cf1fc2ccd88e31d0689f.jpg" width="625" height="416"> <em> The flesh inside Da Lat strawberries will be light red, with white interlaced.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/247b26a83cead5b48cfb.jpg" width="625" height="414"> <em> The Chinese berries are absent or very pale.</em> <strong> 4. Taste</strong> In terms of taste, Chinese strawberries have no aroma, when eaten, they have a greasy feeling, no sour taste, while strawberries of Da Lat have a characteristic aroma, when eaten soft and chewy, have a sour taste. . <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/34bc356f2f2dc6739f3c.jpg" width="625" height="468"> <em> Dalat strawberry flavor has a characteristic aroma, when eaten, it is soft and chewy, with a sour taste.</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/d73fcdecd7ae3ef067bf.jpg" width="625" height="468"> <em> The taste of Chinese strawberry is light and not fragrant. When chewed very friable.</em> <strong> 5. Storage time</strong> In addition, consumers also have another way of knowing that Chinese strawberries can be left for 7 to 10 days in a temperature environment of 25-32 degrees Celsius and still fresh, while Da Lat strawberries only keep up to 2 hours. day is wilted or bruised all stem. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/d00ccbdfd19d38c3618c.jpg" width="625" height="394"> <em> Da Lat strawberries can only be preserved for up to 2 days before they wilt or darken. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_19_338_38892384/1f8007531d11f44fad00.jpg" width="625" height="390"> <em> Chinese strawberries can be stored for 7 to 10 days in a temperature environment of 25-32 degrees Celsius</em> <strong> Buy traced strawberries </strong> If you want to buy Da Lat strawberries with the right standards, you should not be subjective when choosing a unit or seller. If buying at a reputable dealer or supermarket, you should choose strawberry boxes with a QR code traceability stamp. Then, you can easily trace the origin of the product to be more assured of your choice. When tracing product origin, you will know information about product origin such as product name, manufacturer, supplier, growing and processing process.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16680</post-id>	</item>
		<item>
		<title>US &#8216;red alert&#8217; after malicious code attack on fuel system</title>
		<link>https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</link>
		
		<dc:creator><![CDATA[Ngọc Hà (TTXVN)]]></dc:creator>
		<pubDate>Thu, 20 May 2021 12:44:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Joe Biden]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Operating]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[red]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[System]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-red-alert-after-malicious-code-attack-on-fuel-system/</guid>

					<description><![CDATA[America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack. Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>America&#8217;s largest fuel pipeline system, operated by Colonial Pipeline, was forced to shut down its entire network after a cyber attack.</strong><br />
<span id="more-16577"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_294_38793245/cd9b8e6093227a7c2333.jpg" width="625" height="416"> </p>
<p> <em> Colonial Pipeline had to shut down the entire network after a cyber attack. Photo: wsj.com</em> The administration of President Joe Biden said it was making every effort to restore the company&#8217;s operations and avoid disruption to supply. Experts say gas prices will not be affected if the company resumes normal operations in the next few days. However, this cyberattack, rated as the worst ever for the US infrastructure system, should be a warning bell for other companies about the risk they will become the next target of similar attacks. According to Colonial Pipeline, the company&#8217;s pipeline carries gasoline and other fuels from Texas to the Northeast, providing nearly 45 percent of the fuel for the East Coast of the United States. Although Colonial Pipeline has not revealed who is responsible for the cyber attack, an unnamed person on the team investigating the incident confirmed that the culprit was a hacker group nicknamed Darkside. This group has been spreading ransomware since August 2020 and is classified as one of the most attackable groups. Over the past 3 years, Darkside has become more and more professional and has caused Western countries tens of billions of dollars in losses. Ransomware attacks are malicious code designed to lock down computer systems using encrypted data and demand a ransom to restore access. US Commerce Secretary Gina Raimondo on May 9 warned US businesses to be wary of ransomware attacks. The female minister affirmed that she would work closely with the Department of Homeland Security to handle the issue, considering this a top priority of the government. Reuters news agency, citing a notice from the White House, said the administration was working to help Colonial Pipeline company resume operations to avoid supply disruptions. According to sources, before activating ransomware, hackers often steal data, which is used to blackmail businesses or distort the truth. Sometimes stolen data is more valuable to hackers than the benefit they get by disrupting business operations. Security experts say the attack is a warning to operators and managers of essential infrastructure in the US such as electricity, water, energy and transportation facilities that have long been built. do not update the method to ensure security against the risk of being attacked. Mr. David Kennedy, a senior security consultant and founder of the security consulting firm TrustedSec, admitted that ransomware attacks have spiraled out of control in the US and are currently under development. is one of the greatest threats facing the United States. However, most American companies lack the ability to prepare for such threats.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16577</post-id>	</item>
		<item>
		<title>Quickly connect camera systems at centralized isolation facilities</title>
		<link>https://en.spress.net/quickly-connect-camera-systems-at-centralized-isolation-facilities/</link>
		
		<dc:creator><![CDATA[An Nhi]]></dc:creator>
		<pubDate>Thu, 20 May 2021 09:05:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[App Store or CH Play]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Basis]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[Camera]]></category>
		<category><![CDATA[centralized]]></category>
		<category><![CDATA[Connect]]></category>
		<category><![CDATA[Contact]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Department of Information and Communication]]></category>
		<category><![CDATA[Dispatch No 597 CD BCD]]></category>
		<category><![CDATA[facilities]]></category>
		<category><![CDATA[Fight against Covid 19 dịch]]></category>
		<category><![CDATA[Health service Dept]]></category>
		<category><![CDATA[Isolation]]></category>
		<category><![CDATA[Ministry of Information and Communication]]></category>
		<category><![CDATA[Quickly]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Steering committee]]></category>
		<category><![CDATA[Survey]]></category>
		<category><![CDATA[systems]]></category>
		<category><![CDATA[Translate]]></category>
		<guid isPermaLink="false">https://en.spress.net/quickly-connect-camera-systems-at-centralized-isolation-facilities/</guid>

					<description><![CDATA[On the afternoon of May 10, the National Steering Committee for Covid-19 Prevention and Control issued Official Letter No. 3846/CV-BCD to the Steering Committees for Covid-19 Prevention and Control in provinces and cities on directing surveys and results. connect camera systems at concentrated isolation facilities managed by the People&#8217;s Committees of provinces and cities. It [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On the afternoon of May 10, the National Steering Committee for Covid-19 Prevention and Control issued Official Letter No. 3846/CV-BCD to the Steering Committees for Covid-19 Prevention and Control in provinces and cities on directing surveys and results. connect camera systems at concentrated isolation facilities managed by the People&#8217;s Committees of provinces and cities.</strong><br />
<span id="more-16522"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_8_38795206/857c986085226c7c3533.jpg" width="625" height="399"> </p>
<p> It is necessary to quickly complete the connection of surveillance cameras at concentrated isolation facilities. <em> Illustration</em> Following the direction of the Head of the National Steering Committee for Covid-19 Prevention and Control on the monitoring of concentrated isolation facilities with a camera system, on May 6, 2021, the Ministry of Information and Communications has issued Official Letter No. 1407/BTTTT-CVT to the People&#8217;s Committees of the provinces and centrally-run cities on coordinating and directing the implementation of Official Dispatch No. 597/CD-BCD related to the surveillance camera system at isolation facilities. centrally managed by the People&#8217;s Committee of the province. At the same time, the Ministry of Information and Communications issued Official Letter No. 1410/BTTTT-CVT dated May 6, 2021, directing the Departments of Information and Communications of the provinces and cities to coordinate with the Departments of Health and businesses approved appointed to survey and assess the current status of the camera system at concentrated isolation facilities, agree on the connection options with the centralized surveillance camera system. However, during the implementation process, the Department of Information and Communications and the units encountered difficulties in surveying because the isolation facility did not cooperate, affecting the work progress. In order to quickly complete the connection of the surveillance camera system at concentrated isolation facilities, the National Steering Committee for Covid-19 Prevention and Control proposed that the Steering Committees for Covid-19 Prevention and Control in provinces and cities The city directs the concentrated isolation facilities managed by the provincial People&#8217;s Committees in the area to coordinate and create conditions for the Department of Information and Communications and related units to conduct surveys and assess the current status of the surveillance camera system. monitoring in isolation facilities and connecting to a centralized monitoring system. The Department of Health guides and ensures measures to prevent and control the Covid-19 epidemic for units that come to survey and work at concentrated isolation facilities. The concentrated isolation facility ensures the conditions for the units to come to survey and implement epidemic prevention and control measures for the survey units according to the regulations on epidemic prevention and control and the guidance of the Department of Health. <em> Step 1:</em> Visit https://www.bluezone.gov.vn or download directly at App Store or CH Play. <em> Step 2:</em> Once downloaded, the application will ask for permission to use Bluetooth to record contact with other Bluezone installed users. If Bluetooth is not open, drag the status bar and turn on Bluetooth; or go to Settings, select Bluetooth and turn it on. <em> Step 3:</em> Once the installation is done, click Scan Around. If someone near you less than 2m has used Bluezone, the application will automatically identify these users and put them in the contact list.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16522</post-id>	</item>
		<item>
		<title>Accommodation facilities must publish QR Codes for visitors to check safety</title>
		<link>https://en.spress.net/accommodation-facilities-must-publish-qr-codes-for-visitors-to-check-safety/</link>
		
		<dc:creator><![CDATA[Hoàng Lân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 16:07:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Basis]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[Ministry of Culture]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Official Letter No 4159 BVHTTDL TCDL]]></category>
		<category><![CDATA[Promulgate]]></category>
		<category><![CDATA[QR code]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Self assessment]]></category>
		<category><![CDATA[Sports and Tourism]]></category>
		<category><![CDATA[stay]]></category>
		<category><![CDATA[Strictly deal]]></category>
		<category><![CDATA[To scan]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Travel]]></category>
		<category><![CDATA[Traveler]]></category>
		<category><![CDATA[update]]></category>
		<guid isPermaLink="false">https://en.spress.net/accommodation-facilities-must-publish-qr-codes-for-visitors-to-check-safety/</guid>

					<description><![CDATA[On May 11, the Ministry of Culture, Sports and Tourism issued Official Letter No. 1518/BVHTTDL-TCDL to the People&#8217;s Committees of the provinces and centrally-run cities on urging the implementation of Covid-19 safety assessment of the localities. Accommodation establishments nationwide, which require units to publish QR Code scanning codes for visitors to check the safety of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On May 11, the Ministry of Culture, Sports and Tourism issued Official Letter No. 1518/BVHTTDL-TCDL to the People&#8217;s Committees of the provinces and centrally-run cities on urging the implementation of Covid-19 safety assessment of the localities. Accommodation establishments nationwide, which require units to publish QR Code scanning codes for visitors to check the safety of the facility.</strong><br />
<span id="more-15874"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38807204/ef2590b88efa67a43eeb.jpg" width="625" height="415"> </p>
<p> The Ministry of Culture, Sports and Tourism requires accommodation facilities to publish QR Codes for visitors to check safety in the prevention and control of Covid-19 epidemic. <em> (illustration).</em> Accordingly, the Ministry of Culture, Sports and Tourism requires all registered tourist accommodation establishments to regularly self-assess and update to the national Covid-19 safety system in accordance with the guidance of the Ministry at the National Park Service. Document No. 4159/BVHTTDL-TCDL dated 9-11-2020. In case the tourist accommodation establishment is temporarily closed, it is still required to register and tick the box &#8220;Business establishment temporarily closed&#8221; on the system. In addition, the Ministry also requires all tourist accommodation establishments to publish a QR Code (this code is generated in each unit&#8217;s account after successful registration in the Covid-19 safety system) at the lobby. reception or an easily observed area so that tourists can check the safety level before using the service. This also helps visitors monitor the prevention and control of the Covid-19 epidemic through the &#8220;Safe Vietnam tourism&#8221; application. In addition, the Ministry of Culture, Sports and Tourism proposed the management agencies of provinces and cities to strengthen inspection, supervision, and promptly handle tourist accommodation establishments that do not comply with preventive measures. , anti-epidemic by competent authorities; Only tourist accommodation establishments that ensure Covid-19 safety are allowed to welcome and serve guests. <em> Step 1:</em> Visit https://www.bluezone.gov.vn or download directly at App Store or CH Play. <em> Step 2:</em> Once downloaded, the application will ask for permission to use Bluetooth to record contact with other Bluezone installed users. If Bluetooth is not open, drag the status bar and turn on Bluetooth; or go to Settings, select Bluetooth and turn it on. <em> Step 3:</em> Once the installation is done, click Scan Around. If someone near you less than 2m has used Bluezone, the application will automatically identify these users and put them in the contact list.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15874</post-id>	</item>
		<item>
		<title>About 9,000 accommodations nationwide have conducted a Covid-19 safety assessment</title>
		<link>https://en.spress.net/about-9000-accommodations-nationwide-have-conducted-a-covid-19-safety-assessment/</link>
		
		<dc:creator><![CDATA[Hoàng Lân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 15:39:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[accommodations]]></category>
		<category><![CDATA[App Store or CH Play]]></category>
		<category><![CDATA[assessment]]></category>
		<category><![CDATA[Basis]]></category>
		<category><![CDATA[BLUEZONE]]></category>
		<category><![CDATA[conducted]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[Ministry of Culture]]></category>
		<category><![CDATA[Monitoring]]></category>
		<category><![CDATA[Nationwide]]></category>
		<category><![CDATA[Official Letter No 4159 BVHTTDL TCDL]]></category>
		<category><![CDATA[People s Committee]]></category>
		<category><![CDATA[safe]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[Self assessment]]></category>
		<category><![CDATA[Sports and Tourism]]></category>
		<category><![CDATA[stay]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[tourism]]></category>
		<category><![CDATA[Translate]]></category>
		<category><![CDATA[Travel]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Urge]]></category>
		<guid isPermaLink="false">https://en.spress.net/about-9000-accommodations-nationwide-have-conducted-a-covid-19-safety-assessment/</guid>

					<description><![CDATA[According to the General Department of Tourism (Ministry of Culture, Sports and Tourism), currently, 63/63 provinces and cities have joined the Covid-19 safety assessment system on the website http://safe.tourism.com .VN. In total, about 9,000 out of 30,000 tourist accommodation establishments nationwide have conducted a Covid-19 safety self-assessment on this website. Currently, there are about 9,000 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>According to the General Department of Tourism (Ministry of Culture, Sports and Tourism), currently, 63/63 provinces and cities have joined the Covid-19 safety assessment system on the website http://safe.tourism.com .VN. In total, about 9,000 out of 30,000 tourist accommodation establishments nationwide have conducted a Covid-19 safety self-assessment on this website.</strong><br />
<span id="more-15868"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38807166/b42870b56ef787a9dee6.jpg" width="625" height="364"> </p>
<p> Currently, there are about 9,000 accommodation establishments that have registered for Covid-19 safety criteria. Previously, in November 2020, the Ministry of Culture, Sports and Tourism issued Official Letter No. 4159/BVHTTDL-TCDL to the People&#8217;s Committees of provinces and centrally-run cities, which contained mandatory requirements for establishments. Tourist accommodation in the area registered and self-assessed for Covid-19 safety to ensure safety for epidemic prevention and control. The Vietnam National Administration of Tourism also said that, together with accommodation units, local travel agencies strictly implement the request not to organize tours to and receive guests from epidemic areas as recommended by the agency. authorities and ensure the prevention and control of epidemics for employees. In order to strengthen the inspection, ensure safety for epidemic prevention and control in tourism activities, recently, the Ministry of Culture, Sports and Tourism had a working session with units on guiding and supervising the practice of tourism. Now register and self-assess Covid-19 safety. Facing the complicated development of the Covid-19 epidemic when there were consecutive occurrences of community infections in a number of provinces and cities, the Ministry asked the National Administration of Tourism to continue to urge, guide and supervise localities. , tourist accommodation establishments carry out registration and self-assessment of Covid-19 safety. At the same time, make statistics on the system of establishments that are operating and temporarily suspending operations for appropriate instructions and reminders. According to Deputy Minister of Culture, Sports and Tourism Trinh Thi Thuy, the implementation of registration and self-assessment of Covid-19 safety will have to be carried out for a long time, even after the epidemic has been controlled to serve work. manage and develop tourism in the near future. Therefore, VNAT continues to upgrade the assessment system to perform regularly and continuously, ensuring to understand tourism activities in localities, connecting with the national Covid-19 safety system and promote propaganda to people and tourists to use the application &#8220;Safe Vietnam tourism&#8221; to participate in monitoring and evaluating Covid-19 safety at tourist accommodation establishments. <em> Step 1:</em> Visit https://www.bluezone.gov.vn or download directly at App Store or CH Play. <em> Step 2:</em> Once downloaded, the application will ask for permission to use Bluetooth to record contact with other Bluezone installed users. If Bluetooth is not open, drag the status bar and turn on Bluetooth; or go to Settings, select Bluetooth and turn it on. <em> Step 3:</em> Once the installation is done, click Scan Around. If someone near you less than 2m has used Bluezone, the application will automatically identify these users and put them in the contact list.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15868</post-id>	</item>
		<item>
		<title>US fuel supply crisis after cyber attack on Colonial Pipeline</title>
		<link>https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</link>
		
		<dc:creator><![CDATA[Lê Quân]]></dc:creator>
		<pubDate>Tue, 18 May 2021 12:18:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[Colonial Pipeline Company]]></category>
		<category><![CDATA[crisis]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas price]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malicious software]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Restore]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[Supply]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[The gas station]]></category>
		<guid isPermaLink="false">https://en.spress.net/us-fuel-supply-crisis-after-cyber-attack-on-colonial-pipeline/</guid>

					<description><![CDATA[Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago. Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Gasoline supplies in the US have become increasingly tight after a cyber attack on the fuel pipeline system of Colonial Pipeline company 5 days ago.</strong><br />
<span id="more-15836"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_72_38808364/c96b64f97abb93e5caaa.jpg" width="625" height="416"> </p>
<p> Colonial Pipeline&#8217;s Dorsey hub in Maryland, USA. Photo: Reuters The difficulty in fuel supply has raised concerns that gasoline prices at pumping stations will escalate during the peak summer travel season. Colonial Pipeline said the company is trying to resume operations this weekend after its fuel pipeline system was paralyzed since May 7 after being hit by a cyber attack. The shutdown of the Colonial Pipeline&#8217;s fuel pipeline system shut down nearly half of the US East Coast&#8217;s fuel supply. The US Energy Administration on May 10 called for mandatory cybersecurity standards for fuel pipeline operators and operators. &#8220;Incentivizing the voluntary application of standards to pipelines is inadequate,&#8221; said US Federal Energy Regulatory Commission Chairman Richard Glick. The US Federal Bureau of Investigation (FBI) has accused a cybercriminal group called &#8220;DarkSide&#8221; of causing a ransomware attack on Colonial Pipeline. Reuters news agency quoted cybersecurity experts as saying that DarkSide is based in Russia or Eastern Europe, so the gang usually avoids targeting computers that use the languages ​​of the former Soviet republics. However, US President Joe Biden on May 10 expressed he did not believe that the Russian government was behind the cyber attack on the Colonial Pipeline. &#8220;So far there is no evidence based on our intelligence that Russia is involved,&#8221; Biden said. A statement titled DarkSide group on May 10 stated: &#8220;Our goal is to make money and not create problems for society.&#8221; Ransomware attack is a type of malware designed to disable computers by encrypting data and blackmailing victims if they want to regain system access. It is not clear what price the hackers offered for Colonial Pipeline, and the company has not commented on the matter. Fuel demand in the southeastern United States has increased sharply in recent days as consumers fear fuel shortages. The Southeastern region of the United States has long depended mainly on the supply of fuel flowing through the Colonial Pipeline&#8217;s pipeline system. The average national gasoline price rose 6 cents to $2.96 a gallon last week, the highest since May 2018 and close to a peak set in 2014, the American Automobile Association said. also warned of speculation about fuel hoarding as the supply continued to decrease. Katina Willey, a resident of Florida on May 10, said she had to go to 5 gas stations to buy gas. &#8220;Consumers have to wait in long lines at three of the five gas stations I go to,&#8221; added Katina Willey. Many other car owners said they were also looking to refill their gas tanks out of fear that the fuel situation could worsen. If the Colonial Pipeline&#8217;s pipeline disruptions continue, fuel suppliers may be able to force fuel transportation by trucks and trains to partially ease the fuel shortage. The US Department of Transportation on May 9 lifted travel restrictions for fuel truck drivers in 17 states affected by supply disruptions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15836</post-id>	</item>
		<item>
		<title>Things to know about the US Colonial Pipeline attackline</title>
		<link>https://en.spress.net/things-to-know-about-the-us-colonial-pipeline-attackline/</link>
		
		<dc:creator><![CDATA[Nhã Trúc]]></dc:creator>
		<pubDate>Tue, 18 May 2021 04:02:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[Ask for money]]></category>
		<category><![CDATA[attackline]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Colonial]]></category>
		<category><![CDATA[Colonial Pipeline]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Fuel tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[Ransom]]></category>
		<category><![CDATA[Redeem]]></category>
		<category><![CDATA[Stop working]]></category>
		<category><![CDATA[The infrastructure]]></category>
		<category><![CDATA[Things to know]]></category>
		<guid isPermaLink="false">https://en.spress.net/things-to-know-about-the-us-colonial-pipeline-attackline/</guid>

					<description><![CDATA[The cyberattack that forced the closure of the largest fuel pipeline on the East Coast of the United States has raised new questions about the vulnerability of the country&#8217;s critical infrastructure to cyberattacks. Illustration. The breach at Alpharetta, Georgia-based Colonial Pipeline is the latest in a series of cybersecurity incidents confronting the administration of President [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The cyberattack that forced the closure of the largest fuel pipeline on the East Coast of the United States has raised new questions about the vulnerability of the country&#8217;s critical infrastructure to cyberattacks.</strong><br />
<span id="more-15729"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_318_38811244/db8d4bc05582bcdce593.jpg" width="625" height="416"> </p>
<p> <em> Illustration.</em> The breach at Alpharetta, Georgia-based Colonial Pipeline is the latest in a series of cybersecurity incidents confronting the administration of President Joe Biden &#8211; as well as a striking reminder that many companies Operators of the nation&#8217;s most basic infrastructure, from dams to power plants, are still unprepared to deal with the threats posed by toxic numbers. Here&#8217;s a summary of how a criminal gang managed to get into Colonial&#8217;s systems and why the tool they use &#8211; ransomware &#8211; is such a persistent threat. <strong> How can a hacker shut down a pipeline?</strong> On May 7, Colonial Pipeline said it learned that hackers had infected their computer networks with ransomware, malicious code used to take control of computers and extract payments from victims. The breach affected Colonial&#8217;s business network, which it uses for tasks like payroll management and data reporting to regulators. Colonial disabled those systems, but it also turned off the much more sensitive technology running its pipeline operations — a precaution meant to prevent hackers from accessing it if they hadn&#8217;t already. These systems monitor air flow for impurities and leaks, control power levels, and perform other automated tasks to keep pipelines running smoothly. <strong> What exactly was closed?</strong> Colonial shut down its entire main pipeline, more than 5,500 miles long from Houston, Texas, to Linden, New Jersey. The pipeline transports 45% of gasoline, jet fuel and diesel to the US East Coast, according to the company. The short-lived outage sent wholesale gas prices up on financial markets in the affected region, but that rally cooled slightly during trading on May 10. And while some gasoline retailers may try to add a few cents a gallon to the price at the pump, there have been no reports of shortages at suppliers serving those retail points. Market analysts say the pipeline shutdown will need to last through at least the middle of the week to start affecting supply in some parts of the Southeast, and Houston&#8217;s refineries won&#8217;t start. reduce production unless Colonial shuts down until next week. Overall, the US is stockpiling 235 million barrels of gasoline, enough to supply the whole country for nearly a month. However, retail gasoline prices have risen steadily in recent weeks and any anxiety could accelerate gains as the country approaches Memorial Day weekend, which the industry considers is the beginning of the “summer driving season” in high demand. <strong> How bad could this be?</strong> It depends on whether the outage turns into a protracted crisis for Colonial&#8217;s customers, which include busy airports and US military bases. Some customers can buy fuel from foreign suppliers, but they will face more financial pressure as Colonial&#8217;s pipeline network remains offline. Colonial said on May 10 that it has begun reactivating segments of the pipeline and anticipates &#8220;significantly restoring operational service by the end of the week&#8221;. However, they did not explain what &#8220;basically&#8221; means and did provide some other details about the attack investigation. <strong> What is Ransomware?</strong> Ransomware is software that hackers deploy to lock down victims&#8217; data so they can&#8217;t access or use it &#8211; in the worst case scenario, essentially shutting down an entire company or government office. The hacker then demands a ransom in exchange for providing a digital key to unlock the files. Over the past few years, ransomware has grown from an occasional nuisance to a ubiquitous threat. Victims include the hospital system, the school district and the DC police department, as well as many small businesses. According to the FBI report, ransomware attacks increased by 37% from 2018-2019 and 20% from 2019-2020. According to one report, the pandemic has led to a significant increase in ransomware, with the number of attacks Attacks more than doubled year-on-year, with a particularly large increase in the healthcare sector. The Department of Justice recently launched a task force to explore new solutions to the problem. But in the meantime, the problem continues to get worse as criminal motives grow. <strong> Why aren&#8217;t pipelines and power plants better protected against ransomware?</strong> The private companies that operate much of America&#8217;s critical infrastructure — power plants, dams, natural gas pipelines, and other critical facilities — often neglect to implement safety protocols. government-recommended cybersecurity. While protecting against foreign government hackers sometimes requires complex technology that small critical infrastructure operators cannot afford, protecting against ransomware is are not. Use strong passwords, train employees not to click on suspicious links, and require employees to use multi-factor authentication &#8211; which involves entering a randomly generated number after entering one&#8217;s password &#8211; can prevent all but the most advanced types of hacks, including ransomware. Despite years of warnings from government officials and cybersecurity experts, most companies outside of the highly regulated financial sector have not taken many of these steps. And even organizations that try to take cybersecurity seriously can be covered by small holes. A long-neglected office worker or old computer in a closet is often the weak link that opens an organization&#8217;s doors to hackers. With so many companies leaving themselves with easy targets, many cybercriminals have started using ransomware to make money. By choosing victims they know there can be no downtime, these criminals virtually guarantee themselves an easy profit. Additionally, many ransomware operators have begun exploiting a secondary source of profit: reselling stolen data on the dark web, where sensitive personal information can fetch huge sums. Between victims and hackers is a burgeoning crypto ecosystem, consisting of unscrupulous payment facilitators ready to handle ransom transactions and rock wall law enforcement. <strong> How often do victims pay the ransom?</strong> The US government discourages ransomware victims from paying attackers to regain access to their data. While some ransomware operators honor their agreements and unlock victims&#8217; files to foster trust and increase their chances of receiving a future ransom, many of these criminals simply take the money and disappear. Paying the ransom also encourages cybercriminals to continue their attacks. Anne Neuberger, deputy national security adviser for cyber and emerging technologies, said: “We recognize that victims of cyberattacks often face very difficult situations and they must balance the cost-benefit when there is no other option about paying the ransom,&#8221; &#8211; told reporters on May 10 In the US, it is not illegal to pay a ransom to regain access to locked data. However, it is illegal to pay ransoms to entities on the Treasury&#8217;s sanctions list, and the Treasury Department has warned companies that assist ransomware victims to conduct due diligence on hackers. before making payment arrangements. <strong> DarkSide, what is the group behind the attack?</strong> The FBI has confirmed that the Colonial Pipeline hack was the work of the DarkSide ransomware gang. This group is a relatively newcomer to the ransomware ecosystem, but they are already well known for their professionalism, patience, and large ransom demand. Security firm Cybereason wrote in a report last month: “The team has a phone number and even a help desk to facilitate negotiations with the victim, and they are putting a lot of effort into gathering information. about their victims – not just technical information about their environment, but more general information about the company itself, like the size of the organization and estimated revenue.” DarkSide is based in Russia, but so far the US has said it does not believe the hackers acted on behalf of the government of Russian President Vladimir Putin. Mr. Biden said on the afternoon of May 10: &#8220;To date, there is no evidence &#8230; from our intelligence people that Russia is involved. However, he added: “There is evidence that the actor&#8217;s ransomware is in Russia. They have some responsibility to deal with this.” Like other ransomware gangs, DarkSide operates on a so-called &#8220;ransomware-as-a-service&#8221; model, in which it provides code to less sophisticated hackers and helps them carry out attacks enter in exchange for their share of the profits. After being closely watched by the Colonial Pipeline attack, DarkSide seems to be rethinking this model. On May 10, a purported statement from the DarkSide hackers announced the group&#8217;s intention to scrutinize the partners&#8217; planned attacks in the future to &#8220;avoid social consequences.&#8221; festival&#8221;. “Our goal is to make money, and not create problems for society.” <strong> What is the US government doing with this attack?</strong> The White House has established a working group that includes the Department of Homeland Security&#8217;s Cybersecurity and Infrastructure Agency; The Department of Transport&#8217;s Pipeline and Hazardous Materials Safety Administration; FBI; and the Departments of Energy, Treasury and Defense. These agencies are working together to prepare for various scenarios should the pipeline remain shut, including planning for shortages and higher gas prices. In addition, the Department of Transportation waives regulations that limit the driving time without rest of fuel trucks in 17 states and Washington DC. That could make it easier to deliver to customers due to Colonial&#8217;s closure.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15729</post-id>	</item>
		<item>
		<title>Again the trick of tagging Facebook account robbers</title>
		<link>https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Mon, 17 May 2021 01:45:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[Alert]]></category>
		<category><![CDATA[Bandit]]></category>
		<category><![CDATA[Cheat]]></category>
		<category><![CDATA[Facebook]]></category>
		<category><![CDATA[Impersonation]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Log in]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Phan Vinh]]></category>
		<category><![CDATA[Post it]]></category>
		<category><![CDATA[Robbers]]></category>
		<category><![CDATA[Scammers]]></category>
		<category><![CDATA[Stranger]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[TAG]]></category>
		<category><![CDATA[tagging]]></category>
		<category><![CDATA[trick]]></category>
		<category><![CDATA[Tricks]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[You underlined in the questionnaire]]></category>
		<guid isPermaLink="false">https://en.spress.net/again-the-trick-of-tagging-facebook-account-robbers/</guid>

					<description><![CDATA[If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object. After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam. According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>If being tagged by a stranger on Facebook, users need to be very careful, absolutely do not access the link posted by the suspicious object.</strong><br />
<span id="more-15208"></span> After a while of silence, the name tag trick on Facebook seems to be showing signs of returning. Any social media user can fall victim to this scam.</p>
<p> According to Mr. Phan Vinh (Linh Nam, Hanoi), about a week ago, he was constantly tagged (marked) on posts on the social network Facebook. All of these posts have the same content related to an accident. In addition to information about the victim&#8217;s name, the article also includes a link for users to verify for themselves. “I know many people with the same name as the victim, the post is not full, so I can&#8217;t be sure who it is. Moreover, I didn&#8217;t know who the person tagged me, so I ignored those posts,&#8221; Vinh said. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/0a1f661e785c9102c84d.jpg" width="625" height="416"> <em> Users need to be wary of being tagged in Facebook posts by strangers. Photo: Trong Dat</em> Vinh made a correct decision because if he clicked on the link, he would most likely be turned into a victim of scammers. This is not a new trick when many crooks intentionally create a fake website and trick users into accessing it. Once you click on the link attached to the article, you will be asked to log in (usually with a Facebook or Google account) to continue viewing the content. At this time, the bad guys will have their account passwords in hand to use them for impure purposes. In addition to the risk of losing the account, the victim also has the risk of revealing personal information, sensitive images, &#8230; Not only that, the bad guy can also cheat through the victim&#8217;s account Island borrow money from their friends. Usually, phishing posts have a familiar motif, with content that piqued the user&#8217;s curiosity. These posts are often accompanied by a link to another website. This is the first feature that users need to pay attention to. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_23_38818201/1e1573146d568408dd47.jpg" width="625" height="416"> <em> Bad guys often use links impersonating news agencies to trick users into accessing fake websites. Photo: Trong Dat</em> Users also need to be wary of being tagged by strange accounts. If you see a post tagged with a large number of users (usually 99 people), absolutely do not click on the link because it is definitely a scam content. In addition, if you accidentally visit a strange link, users should not log in to their Facebook, Google, bank accounts, etc. when they receive a request, no matter what website. In fact, bad guys often use a fake website with a realistic interface to steal information, especially passwords for Facebook accounts, banks, &#8230; Therefore, users should only log in. sensitive accounts when actively accessing the websites of those services themselves. To be more careful, with websites related to financial and banking services, users should star (bookmark) these websites on the bookmarks bar of the browser. When someone asks you to borrow money on Facebook, don&#8217;t trust it, call that person directly (or through another app) to verify this information. Only with such vigilance, can users escape the &#8220;claw&#8221; of online scammers.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">15208</post-id>	</item>
		<item>
		<title>Italy asks TikTok to strictly control user age</title>
		<link>https://en.spress.net/italy-asks-tiktok-to-strictly-control-user-age/</link>
		
		<dc:creator><![CDATA[Anh Hiển (TTXVN)]]></dc:creator>
		<pubDate>Sat, 15 May 2021 21:25:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[age]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[asks]]></category>
		<category><![CDATA[Campaign]]></category>
		<category><![CDATA[Communication]]></category>
		<category><![CDATA[Control]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Discuss]]></category>
		<category><![CDATA[Italia]]></category>
		<category><![CDATA[Italy]]></category>
		<category><![CDATA[Management agency]]></category>
		<category><![CDATA[Notification]]></category>
		<category><![CDATA[Pitiful]]></category>
		<category><![CDATA[Rigid]]></category>
		<category><![CDATA[Share videos]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[Strictly]]></category>
		<category><![CDATA[Suggestions]]></category>
		<category><![CDATA[Teenager]]></category>
		<category><![CDATA[The media]]></category>
		<category><![CDATA[TIKTOK]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Young]]></category>
		<guid isPermaLink="false">https://en.spress.net/italy-asks-tiktok-to-strictly-control-user-age/</guid>

					<description><![CDATA[Italy&#8217;s data protection agency on May 12 asked the video-sharing app TikTok to strengthen further measures to prevent young users from being able to access the platform. TikTok icon on a phone screen. Photo: THX/VNA The offer comes after TikTok deleted more than 500,000 accounts under the age of 13 in less than three months [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Italy&#8217;s data protection agency on May 12 asked the video-sharing app TikTok to strengthen further measures to prevent young users from being able to access the platform.</strong><br />
<span id="more-14746"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_294_38821686/c42a5d39d67a3f24666b.jpg" width="625" height="416"> </p>
<p> <em> TikTok icon on a phone screen. Photo: THX/VNA</em> The offer comes after TikTok deleted more than 500,000 accounts under the age of 13 in less than three months in the European country. In early February, TikTok &#8211; owned by China&#8217;s ByteDance group &#8211; agreed with Italian authorities to block all accounts under the age of 13. This is one of the measures taken after the tragic incident of a 10-year-old girl in Italy when performing a challenge on TikTok. In the latest announcement, Italy&#8217;s data regulator said: &#8220;The measures applied have made a lot of sense, but the results are not enough.&#8221; Therefore, the agency recommends that TikTok cancel any accounts connected to users under the age of 13 within 48 hours, making this access more difficult for young users, and launch media campaigns to solve the problem Love that this platform is not built for use by people under the age of 13. In addition, the Italian agency also suggested that TikTok have solutions, including the use of artificial intelligence, to reduce the risks of having teenagers under the age of 13 accessing and using the TikTok platform. Over the past months, TikTok has asked more than 12.5 million users in Italy to verify their age. In the announcement, Ms. Alexandra Evans &#8211; head of child protection at TikTok &#8211; said: &#8220;Following discussions with regulators earlier this year, we have piloted additional measures to ensure that only users 13 years of age or older can use it&#8221;.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14746</post-id>	</item>
		<item>
		<title>Beware of technology trends</title>
		<link>https://en.spress.net/beware-of-technology-trends/</link>
		
		<dc:creator><![CDATA[TẤN BA]]></dc:creator>
		<pubDate>Fri, 14 May 2021 18:05:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Beware]]></category>
		<category><![CDATA[Careful]]></category>
		<category><![CDATA[Clever]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[FIRMWARE]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Remote Control]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Security hole]]></category>
		<category><![CDATA[Server]]></category>
		<category><![CDATA[Smarthome]]></category>
		<category><![CDATA[Spyware]]></category>
		<category><![CDATA[Super]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[trends]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Webcam]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/beware-of-technology-trends/</guid>

					<description><![CDATA[Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys. Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Devices as well as the entire smart home system (smarthome) with Internet-connected features for users to remotely control… are in need of security to avoid being attacked by bad guys.</strong><br />
<span id="more-14322"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_13_17_38824516/32fb83389c7a75242c6b.jpg" width="625" height="408"> </p>
<p> Securing the wifi router is the first step homeowners need to take to protect their smart home. During use, it is recommended to update the router&#8217;s firmware and always use a complex password for the wifi router. If the router manufacturer does not provide new firmware, users should consider replacing it. Just like not checking your bank account from public wifi, homeowners should avoid accessing smarthome from an open wifi network, but if you need to remotely access your home, use a private network. Using a separate wifi for smart home systems is necessary because sharing a wifi system has many potential safety risks. Smarthome prioritizes the system to be able to self-alert to abnormal intrusion to ensure safety, so users should use devices with automatic alarm setting feature. When there is an unusual intrusion, a notification will be sent to the homeowner&#8217;s phone immediately. In smarthome, not only home lock, smart home control applications need abnormal login warning feature, this helps homeowners recognize the risk of network attack to implement instant protection options. then. In a smart home, if there is a smart speaker with a screen or camera, users should consider turning off or covering the camera when there is no need to use it. This is similar to the fact that many people have a habit of covering the webcam on their laptop to avoid unfortunate images being recorded. Smart devices of unknown origin are at risk of being installed with spyware, which is easy to lose control and have data stolen. To be safe, it is recommended to use equipment from reputable companies, need to check the company history, product support period. From this information, a decision can be made whether to buy the product or not. And more specifically, it is very important to check the owner of the servers that will contain his home&#8217;s information because most smarthome devices used in the home communicate with servers in the cloud. In the process of studying the operation of the smart home control system, security experts have discovered serious security holes. Security flaws in the cloud infrastructure and remote code execution, causing a third party to acquire the &#8220;super user&#8221; right to access and control the smart home system. Immediately, the above findings were shared with smart home providers to immediately address these dangerous security holes. With a smart home, each device inserted into the smarthome can also be a point for network attackers to take advantage of, intrude on the home system &#8230;, so smart home security is very necessary for those who want Design your own smart home.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">14322</post-id>	</item>
		<item>
		<title>Hacked AirTags can lead users to malicious websites</title>
		<link>https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</link>
		
		<dc:creator><![CDATA[Thục Anh (TH)]]></dc:creator>
		<pubDate>Thu, 13 May 2021 13:19:06 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Accessories]]></category>
		<category><![CDATA[AirTags]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Flash]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[Intrusion]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[Jailbreak]]></category>
		<category><![CDATA[Lead]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[Lost Mode]]></category>
		<category><![CDATA[malicious]]></category>
		<category><![CDATA[Microcontrollers]]></category>
		<category><![CDATA[Researchers]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Thomas Roth]]></category>
		<category><![CDATA[Toxic]]></category>
		<category><![CDATA[Unlocking]]></category>
		<category><![CDATA[Use]]></category>
		<category><![CDATA[users]]></category>
		<category><![CDATA[Video sharing]]></category>
		<category><![CDATA[Wallet]]></category>
		<category><![CDATA[websites]]></category>
		<guid isPermaLink="false">https://en.spress.net/hacked-airtags-can-lead-users-to-malicious-websites/</guid>

					<description><![CDATA[A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device. Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230; With Lost Mode enabled, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>A security researcher has successfully hacked into the AirTag microcontroller and changed the behavior of this tracking device.</strong><br />
<span id="more-13793"></span> Introduced at the end of April 2021 and only sold to the market from April 30, AirTag is an accessory that allows users to attach easily lost items such as keys, wallets &#8230;</p>
<p> With Lost Mode enabled, AirTag will send out a signal to one of the billions of Apple devices around the globe, then send a notification about the user&#8217;s iPhone to they visit Apple&#8217;s location site (found.apple.com) so that users know the AirTag&#8217;s location. Researcher Thomas Roth recently shared a video of his work on AirTag&#8217;s performance and progress. Specifically, when the owner of AirTag turns on the loss of device notification, if an iPhone is near, the iPhone will be prompted to visit the page &#8220;found.apple.com&#8221;. However, with the affected AirTag, the iPhone displayed the researcher&#8217;s website. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_236_38813981/c3d01e8300c1e99fb0d0.jpg" width="625" height="351"> <em> AirTag is a newly launched accessory from Apple</em> Thomas Roth said he hacked into AirTag&#8217;s microcontroller, then &#8220;flashed&#8221; the component again to modify the device&#8217;s performance. It took hours to run and caused two AirTags to fail, before succeeding. However, to perform the hack shown by Thomas Roth is not easy, as hackers need to intervene directly in the AirTag without the user&#8217;s discovery. But this is proof that AirTag has been hacked and can intervene, similar to the form of &#8220;jailbreak&#8221; on the iPhone, which means that a device as compact as AirTag also poses a potential security risk. security, requires Apple to have solutions to enhance security on its device.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13793</post-id>	</item>
		<item>
		<title>The cyber attack stagnates the leading fuel pipeline in the United States</title>
		<link>https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</link>
		
		<dc:creator><![CDATA[PHẠM TRUNG (Theo Reuters, AP)]]></dc:creator>
		<pubDate>Mon, 10 May 2021 05:31:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[America]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Blackmail]]></category>
		<category><![CDATA[Company]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[Diesel oil]]></category>
		<category><![CDATA[East Coast]]></category>
		<category><![CDATA[Encode]]></category>
		<category><![CDATA[Enforcement agency]]></category>
		<category><![CDATA[Fuel]]></category>
		<category><![CDATA[Gas tank]]></category>
		<category><![CDATA[Gasoline]]></category>
		<category><![CDATA[Information resource]]></category>
		<category><![CDATA[leading]]></category>
		<category><![CDATA[Malicious code]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Net]]></category>
		<category><![CDATA[Network security]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[stagnates]]></category>
		<category><![CDATA[States]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[United]]></category>
		<category><![CDATA[United States]]></category>
		<guid isPermaLink="false">https://en.spress.net/the-cyber-attack-stagnates-the-leading-fuel-pipeline-in-the-united-states/</guid>

					<description><![CDATA[Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP. Leading American fuel pipeline company Colonial shut down its [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack.</strong><br />
<span id="more-12826"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_09_14_38780441/8745c7efdaad33f36abc.jpg" width="625" height="416"> </p>
<p> <em> The Colonia company had to shut down the fuel pipeline after a cyber attack. Photo: AP.</em> Leading American fuel pipeline company Colonial shut down its entire network that supplies nearly half of the fuel to the US East Coast, following a May 8 ransomware ransomware attack. Every day, the Colonial company ships 2.5 million barrels of gasoline, diesel, jet fuel and other products through a 850-kilometer pipeline connecting the eastern and southern coasts of the United States. The company has shut down systems to stop the threat after learning about the attack. According to sources, hackers are most likely a highly professional cybercrime group. And the malware used in the attack is ransomware. Ransomware is a type of malware designed to lock systems by encrypting data and taps money to regain access. This malware has become popular in the past 5 years. The Colonial Company has invited a third-party cybersecurity company to conduct an investigation and contacted law enforcement and other federal agencies to initiate an investigation. Colonial provided no further details or said how long their fuel lines would be closed. “Cyber ​​vulnerabilities have become a systemic issue,” said Ms. Algirde Pipikaite, Head of Network Strategies at the World Economic Forum&#8217;s Cyber ​​Security Center. Without measures to protect cybersecurity, attacks are occurring more often on industrial systems such as oil and gas pipelines or water treatment plants. In 2017, Colonial shut down its gas distillation and production lines during Hurricane Harvey that hit the Gulf Coast. That contributes to tight supply and price increases in gasoline in the US.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12826</post-id>	</item>
		<item>
		<title>Without a man, Vietnamese women tend to buy electronic appliances by themselves</title>
		<link>https://en.spress.net/without-a-man-vietnamese-women-tend-to-buy-electronic-appliances-by-themselves/</link>
		
		<dc:creator><![CDATA[Trọng Đạt]]></dc:creator>
		<pubDate>Thu, 06 May 2021 00:51:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[age]]></category>
		<category><![CDATA[Appliances]]></category>
		<category><![CDATA[buy]]></category>
		<category><![CDATA[Demographic]]></category>
		<category><![CDATA[Ecommerce]]></category>
		<category><![CDATA[Electric]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Electronic device]]></category>
		<category><![CDATA[female]]></category>
		<category><![CDATA[Horizontal]]></category>
		<category><![CDATA[IPrice Group]]></category>
		<category><![CDATA[male]]></category>
		<category><![CDATA[man]]></category>
		<category><![CDATA[Mobile]]></category>
		<category><![CDATA[Purchase]]></category>
		<category><![CDATA[Sauce]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[Shopping]]></category>
		<category><![CDATA[Sisters]]></category>
		<category><![CDATA[tend]]></category>
		<category><![CDATA[Tendency]]></category>
		<category><![CDATA[Vietnamese]]></category>
		<category><![CDATA[Vietnamese women]]></category>
		<category><![CDATA[Women]]></category>
		<guid isPermaLink="false">https://en.spress.net/without-a-man-vietnamese-women-tend-to-buy-electronic-appliances-by-themselves/</guid>

					<description><![CDATA[Vietnamese women over the age of 35 have increased demand for electronics and electronics. The percentage of women buying electronics and electronics online is even equal to that of men. This is the comment made by iPrice &#8211; a product search and price comparison tool currently available in Vietnam and six countries including Malaysia, Singapore, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Vietnamese women over the age of 35 have increased demand for electronics and electronics. The percentage of women buying electronics and electronics online is even equal to that of men.</strong><br />
<span id="more-11836"></span> This is the comment made by iPrice &#8211; a product search and price comparison tool currently available in Vietnam and six countries including Malaysia, Singapore, Indonesia, Thailand, Philippines, and Hong Kong.</p>
<p> According to iPrice Group, in the e-commerce report of this group in 2020, Vietnam has 2 names, including The World of Mobile and Green Electronics, in the top 10 of e-commerce websites with high traffic volume in the East region. South Asia. The fact above shows that the trend of online shopping for electronics and electronics is becoming more and more popular among Vietnamese users. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_23_38623957/737d3cd367908eced781.jpg" width="625" height="416"> <em> Without a man, Vietnamese women tend to buy electronic appliances by themselves. Photo: Trong Dat</em> By analyzing more than 1 million page views on iPrice in the first three months of 2020 and 2021, this report has shown that, in Vietnam, the proportion of female users buying electronics and electronics on the trading floor. electronics as high as men. The report shows that in the first quarter of 2021, the percentage of women shopping on e-commerce sites in the industry was 43%, an increase of 5% over the same period last year. Although men are still the main shoppers in the portfolio when accounting for 57%, this figure has declined. Notably, among female users, the group of women aged 35-44 and 45-54 who are interested in the online electronics market in Quarter I / 2021 increased by 4% compared to Q1. / 2020. In the older age group (from 55-64), this proportion also has a slight increase (2%). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_23_38623957/b579b8369e74772a2e65.jpg" width="625" height="528"> <em> Statistics in the form of demographics of users buying electronics, electronics on e-commerce floors. Data: iPrice</em> In contrast to middle-aged women, in the group of young women (from 25-34 years old), the percentage of electronic and electronic goods purchased in the first 3 months of this year decreased sharply (10%). According to experts, the cause of this situation may be because this is a group of office workers. These people have a high demand for electronic equipment such as computers, headsets, cameras, &#8230; in early 2020, when the trend of working remotely is rising at the time of the Covid-19 outbreak. Because the life cycle of electronic and electronic products is quite high, the demand for purchasing new equipment of this target group will decrease when entering 2021. The above data have shown that not only men and women today are showing their initiative in buying electronic and electronic equipment. This is especially true on e-commerce platforms, where they can easily compare prices and are provided with all the necessary information about the item to choose from.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11836</post-id>	</item>
		<item>
		<title>Intelligence records of the headquarters of the US Central Command</title>
		<link>https://en.spress.net/intelligence-records-of-the-headquarters-of-the-us-central-command/</link>
		
		<dc:creator><![CDATA[Nguyễn Thanh Hải (tổng hợp)]]></dc:creator>
		<pubDate>Tue, 04 May 2021 18:33:12 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[American intelligence community]]></category>
		<category><![CDATA[Central]]></category>
		<category><![CDATA[Command]]></category>
		<category><![CDATA[CRA]]></category>
		<category><![CDATA[Dia]]></category>
		<category><![CDATA[DTE]]></category>
		<category><![CDATA[General McKenzie]]></category>
		<category><![CDATA[Headquarters]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Intelligence records]]></category>
		<category><![CDATA[JWICS]]></category>
		<category><![CDATA[MacDill Air Base]]></category>
		<category><![CDATA[NRT]]></category>
		<category><![CDATA[OEF]]></category>
		<category><![CDATA[Operation room]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[SCIF]]></category>
		<category><![CDATA[SIPRNET]]></category>
		<category><![CDATA[Smart card]]></category>
		<category><![CDATA[State of Florida]]></category>
		<category><![CDATA[USCENTCOM]]></category>
		<category><![CDATA[Use for]]></category>
		<guid isPermaLink="false">https://en.spress.net/intelligence-records-of-the-headquarters-of-the-us-central-command/</guid>

					<description><![CDATA[The files published in the television program &#8217;60 Minutes&#8217; (60 Minutes) revealed the secrets of the headquarters of the US Central Command (USCentcom) located in Tampa (state of Florida &#8211; USA), where there are very special types of military equipment used by the commander when he has access to the virtual reality computing environment used [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The files published in the television program &#8217;60 Minutes&#8217; (60 Minutes) revealed the secrets of the headquarters of the US Central Command (USCentcom) located in Tampa (state of Florida &#8211; USA), where there are very special types of military equipment used by the commander when he has access to the virtual reality computing environment used by US intelligence services.</strong><br />
<span id="more-11538"></span> <strong> Preliminary equipment at USCentcom</strong> </p>
<p> USCentcom was established in 1983 and is one of the 11 armed forces&#8217; command posts. USCentcom&#8217;s Area of ​​Responsibility (AOR) includes the Middle East, Egypt, Central Asia, and parts of South Asia. The USCentcom headquarters is not in its operational area, but within the MacDill Air Force Base in Tampa (Florida), a new and 26,217 square meter building completed in the year. 2012. The new building will include key spaces for specialized tasks such as the Joint Command Operations Center, the General Planning and Operations Division, the Network Operations Center, and the Operations Center. operation safety information command. The new headquarters building also includes a 10,126 square meter (SCIF) Sensitive Zone Information Facility (SCIF), as well as sound transmission layered (STC) 45 and 50 spaces to support safe operations. . Relevant anti-terrorism standards include advanced collapse mitigation by force-bound means, which are also integrated into the new headquarters. Military communications equipment currently in use at USCentcom headquarters can also be seen in the 60 Minutes program, which shows footage taken in two large-scale operations rooms. small and large. In the large operation room there are sizable TV screens hung on the walls and several rows of work stations, each with 2 sets of communication devices, 1 for access to classified telephones, and computer networks, and other sets of equipment for networks that have not been classified. According to the US grading system color codes, the phone and smart card reader will have a green label for the unsorted Systems, and a red label for the Crypto Systems. <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/f7f985aaa3e84ab613f9.jpg" width="625" height="327"> <em> Major operations / operations center at USCentcom headquarters. photo taken January 2021. Photo source: 60 Minutes. </em> Some computers display a bright red lock screen with the words &#8220;Confidential&#8221; meaning only applicable for authorized purposes, and that means they are part of SIPRNet: the primary classified secure network of The US military is used for tactical and operational information. The US military&#8217;s unsecured unsecured computer network is also known as NIPRNet. Identification of users authorized to mine NIPRNet will be done through a Common Access Card (CAC), which is the standard of identification for active US defense personnel. Accessing the SIPRNET requires a SIPRNet token, which is also a smart tag but does not have a clear identification information. In addition to the NIPRNet and SIPRNet networks, USCentcom also has other separate computer networks for coordination with overseas partners. For members of bilateral and multinational alliances, the US has provided a network architecture called Integrated Enterprise Area Information Interchange Systems (Centrixs), which operates at a decentralized level. Type Confidential / Notified for (national identifier). The first Centrixs networks were established in late 2001 by USCentcom to support coalition activities within the framework of the Campaign for Sustainable Freedom (OEF). This has resulted in a new alliance called Centrixs-Isaf for operations in Afghanistan, and Centrixs-Gctf (Global Counterterrorism Forces). Meanwhile, both systems are integrated in the USCentcom Partner Network (CPN). <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/1d936ec04882a1dcf893.jpg" width="625" height="351"> <em> General McKenzie&#8217;s communication device in his command room. Photo source: 60 Minutes. </em> The Centrixs network consists of servers and provides users with at least the applications that will give them the same basic capabilities as US systems users, such as: Microsoft Office; Command and control personal computer (C2PC); Integrated imaging and intelligence (I3). These applications allow access to real-time warfare (NRT) commands from MIDB databases and image databases to display data on a map basis. They can also access other browser-based products, or send emails with attachments and conduct collaborative sessions. For US military users, the system is part of the Global Command and Control System (GCCS), which includes more than 200 tools and applications to combine data from multiple sensors. and intelligence sources intended to create a kind of graphic representation of battle spaces. There is also mention of the telephone systems used at USCentcom. The major operations / operations center at USCentcom headquarters also has a range of Cisco IP phones, the 7975, or more recently, 8841. The Cisco 8841 IP phone generation looks like a commercial phone, but in fact it is a modified version of the small-scale telecom security firm CIS Secure Computing Inc. These modified phones are authorized for use in SCIF (Sensitive Subdivision Information Base) and SAPF (Special Access Program Facilities) environments, and provide security features. plugin that can perform &#8220;hold&#8221; and &#8220;mute&#8221; operations while on a phone call. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/faf18aa2ace045be1cf1.jpg" width="625" height="432"> <em> Personal control and command computer interface (C2PC). </em> <strong> Communication equipment of the USCentcom commander</strong> The reporter met with General Frank McKenzie in a small room outside his main operations center at USCentcom headquarters. In this small room, Commander McKenzie had additional communications equipment that did not appear to be available to personnel at the large operations center. For example, the Cisco DX 70 video monitor with video camera is probably the Secure Video Remote Conferencing System (SVTS) which is part of the Crisis Management System (CMS) to enable the high level video meeting. There is also a Cisco IP 8841 phone with a special yellow border for highly secure operating networks through a secure IP, which is also part of the Crisis Management System (CMS) and connection to General system, National Security Council, Cabinet members, Joint Chiefs of Staff, various intelligence agency surveillance centers, headquarters, and Continuity of Operations (COOPs). ); Touch screen operator phone (TXP) with 2 units of Touch Screen Line Extension consisting of 50 buttons (TLE), this device is manufactured by small-scale telecom security firm Telecore, Inc. It also invented Integrated Service Phone (IST-2), which used to be on the Oval Office desk during the two generations of President Bush and Obama. These devices are specifically designed for the Defense Red Switch Network (DRSN), as well as provide conference, command, and control capabilities for top-secret / SCI military commanders. It was revealed in the 60 Minute Program that in that small room during the attack on the Al Asad base, Commander McKenzie spoke directly to the Secretary of Defense and the President. There are also two computer screens in General McKenzie&#8217;s small room. Right at the top of the desktop background is a yellow bar signifying JWICS. Unlike NIPRNet and SIPRNet networks, access to JWICS does not require a smart card, but a software certificate is required: military users must confirm themselves with the Department of Defense PKI certificate, but Others require IC PKI certificate. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_24_99_38626211/668917da3198d8c68189.jpg" width="625" height="351"> <em> General McKenzie&#8217;s touchscreen phone. Photo source: 60 Minutes. </em> A very interesting device in the USCentcom command room is the IC Desktop Environment. The phrase &#8220;Community Intelligence Community Desktop Environment&#8221; (IC DTE) was founded in 2012 as a single and identical platform for the US Intelligence Community. In fact, this is the focus of a giant modernization project called the Information Community Intelligence Technology Enterprise (IC ITE), whereby the data will be stored in a Commercial Cloud Service ( C2S) is managed by the CIA, and handled at IC GovCloud managed by the NSA. DTE deployments are managed by the Office of Joint Program Management (JPMO) led by DIA and NGA, while the software system is built by BAE Systems under a five-year contract worth $ 300 million. . With DTE, analysts at DIA, NGA, and other US intelligence agencies can go anywhere within these organizations, sit at any top secret workstation, log in, authenticate, and track. access to e-mail, work folders, shared files &#8230; In addition to virtual desktops, DTE has desktop applications and access to popular services including Unified Service Communication. The NSA is responsible for the so-called App Marketplaces, which are the app stores of various intelligence agencies. As early as 2014, there were 4,000 DTE users at DIA and NGA. By 2018, Mr. John Sherman, Chief Information Officer of the US Intelligence Community wants to take the DTE even further by creating the Collaborative Reference Architecture (CRA). Now US intelligence agencies can create applications that match their needs as long as they comply with the standards set by the CRA to ensure compatibility across different systems.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">11538</post-id>	</item>
		<item>
		<title>Phimmoizz.net, phimoiizz.net turn &#8216;flying colors&#8217;: Ending the biggest pirated movie website in Vietnam?</title>
		<link>https://en.spress.net/phimmoizz-net-phimoiizz-net-turn-flying-colors-ending-the-biggest-pirated-movie-website-in-vietnam/</link>
		
		<dc:creator><![CDATA[Duy Huỳnh]]></dc:creator>
		<pubDate>Sun, 02 May 2021 06:59:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[biggest]]></category>
		<category><![CDATA[Bleach]]></category>
		<category><![CDATA[Block out]]></category>
		<category><![CDATA[Branch tops]]></category>
		<category><![CDATA[Cloud]]></category>
		<category><![CDATA[colors]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[Ending]]></category>
		<category><![CDATA[error]]></category>
		<category><![CDATA[flying]]></category>
		<category><![CDATA[FSHARE]]></category>
		<category><![CDATA[Gonorrhea]]></category>
		<category><![CDATA[Hosting]]></category>
		<category><![CDATA[License]]></category>
		<category><![CDATA[Movie]]></category>
		<category><![CDATA[netizens]]></category>
		<category><![CDATA[Out of the way]]></category>
		<category><![CDATA[Phimmoizznet]]></category>
		<category><![CDATA[phimoiizznet]]></category>
		<category><![CDATA[pirated]]></category>
		<category><![CDATA[Sequence]]></category>
		<category><![CDATA[turn]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Vaporize]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Watch movie]]></category>
		<category><![CDATA[website]]></category>
		<guid isPermaLink="false">https://en.spress.net/phimmoizz-net-phimoiizz-net-turn-flying-colors-ending-the-biggest-pirated-movie-website-in-vietnam/</guid>

					<description><![CDATA[With phimmoizz.net and phimoiizz.net taking turns &#8216;flying color&#8217;, many netizens believe that the future of Vietnam&#8217;s biggest pirated movie website may be coming to an end. On the morning of April 24, many Vietnamese film nerds said they could not continue to access phimmoizz.net &#8211; one of the largest pirated movie websites in Vietnam. Accordingly, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With phimmoizz.net and phimoiizz.net taking turns &#8216;flying color&#8217;, many netizens believe that the future of Vietnam&#8217;s biggest pirated movie website may be coming to an end.</strong><br />
<span id="more-10961"></span> On the morning of April 24, many Vietnamese film nerds said they could not continue to access phimmoizz.net &#8211; one of the largest pirated movie websites in Vietnam.</p>
<p> Accordingly, when accessing the domain name phimmoizz.net, users only receive a message in English with the content &#8220;Error 522&#8221;. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/121a4e476805815bd814.jpg" width="625" height="296"> <em> Starting from the morning of April 24, when accessing the domain name phimmoizz.net, users only receive a message in English with the content &#8220;Error 522.&#8221; (Screenshots)</em> Thought the pirated movie websitemoizz.net was officially gone, in the afternoon of the same day, some netizens discovered a pirated movie website with the domain name phimmoiizz.net. However, in the afternoon of April 25, the Vietnamese online community continued to &#8220;get up&#8221; when the domain name phimmoiizz.net once again &#8220;evaporated&#8221; from the Internet. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/11734a2e6c6c8532dc7d.jpg" width="625" height="366"> <em> On the same afternoon on April 24, some netizens discovered a pirated movie website with the domain name phimmoiizz.net. (Screenshots)</em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/2a85411366518f0fd640.jpg" width="625" height="430"> <em> However, up to the present time, the domain name phimmoiizz.net has &#8220;evaporated&#8221; from the Internet. (Screenshots)</em> With phimmoizz.net and phimoiizz.net taking turns &#8220;flying color&#8221;, many netizens believe that the future of Vietnam&#8217;s biggest pirated film website may be coming to an end. However, this pirated movie website has continuously changed its domain name to bypass the authorities, from phimmoi.net to phimmoiz.net and to phimmoizz.net. Therefore, it is still not possible to confirm that phimmoi.net will not continue to &#8220;proliferate&#8221; domain names to operate again in the near future. On June 18, 2020, the website phimmoi.net was blocked by network operators in Vietnam. However, many people believe that the above jobs only solve the tip of the problem. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/deea98b7bef557ab0ee4.jpg" width="625" height="391"> <em> On June 18, 2020, the website phimmoi.net was blocked by network operators in Vietnam. (Photo: SAOstar)</em> Accordingly, in recent years, creating a pirated movie website is said to be quite easy and does not cost too much. Owners of these pirated movie websites will buy unlimited cloud storage accounts at very cheap prices from cloud storage services such as Facebook, Google, Fshare, Openload &#8230; to store and project. movies that are not copyrighted. Along with that, buying domain names or international hosting is currently very easy and the cost is extremely cheap. So, in case a domain name is blocked, the website owner only needs to activate the new domain name and link it to his own movie store. Therefore, blocking the IP of a pirated movie website only solves the tip of the problem because immediately another website &#8220;pops up&#8221;. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/c89f3bc9918a78d4219b.jpg" width="625" height="468"> <em> In the last few years, creating a pirated movie website has been said to be quite easy and does not cost too much. (Photo: Internet)</em> The obvious proof is that after being blocked for a day, phimmoi.net resumes operation with a new domain name &#8211; phimmoiz.net. After that, phimmoiz.net continued to be blocked but also quickly returned to the domain name phimmoizz.net. According to many experts, if you want to solve the problem of pirated movies, you must first solve the tip of the problem &#8211; the consciousness of Internet users. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_329_38642382/bbe32d720a30e36eba21.jpg" width="625" height="416"> <em> If you want to solve the problem of pirated movies, you must first solve the tip of the problem &#8211; the awareness of Internet users. (Artwork: ICT.News)</em> Currently, a large part of Vietnamese people still do not have the habit of paying money to watch movies and listen to music on the Internet, so &#8220;invisible&#8221; is helping to support pirated movie websites to have more &#8220;land to live.&#8221;</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10961</post-id>	</item>
		<item>
		<title>Microsoft is about to release news and interests section on Windows 10 taskbar</title>
		<link>https://en.spress.net/microsoft-is-about-to-release-news-and-interests-section-on-windows-10-taskbar/</link>
		
		<dc:creator><![CDATA[Lê Hoàng]]></dc:creator>
		<pubDate>Wed, 28 Apr 2021 15:04:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Action]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Each phase]]></category>
		<category><![CDATA[Information sources]]></category>
		<category><![CDATA[Interests]]></category>
		<category><![CDATA[media]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[release]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[section]]></category>
		<category><![CDATA[Special point]]></category>
		<category><![CDATA[taskbar]]></category>
		<category><![CDATA[Test version]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Utilities]]></category>
		<category><![CDATA[weather]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[Windows 10]]></category>
		<category><![CDATA[Windows 10 Insider]]></category>
		<guid isPermaLink="false">https://en.spress.net/microsoft-is-about-to-release-news-and-interests-section-on-windows-10-taskbar/</guid>

					<description><![CDATA[Windows 10 users now have quick access to follow news by interest or see the weather right on the taskbar without spending much time searching. An insider beta was released by Microsoft last month, providing users with online news content through social media and dedicated apps. Microsoft is about to release news and interests on [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Windows 10 users now have quick access to follow news by interest or see the weather right on the taskbar without spending much time searching.</strong><br />
<span id="more-9858"></span> An insider beta was released by Microsoft last month, providing users with online news content through social media and dedicated apps.</p>
<p> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_23_11_38612954/5afe8634a07649281067.gif" width="625" height="351"> <em> Microsoft is about to release news and interests on the Windows 10 taskbar. Photo: Microsoft</em> This new feature will be released to some users in the coming week, and the wider rollout to all users will also be rolled out by Microsoft next month. This feature allows Windows 10 users to quickly access news, sports, traffic and stocks from a variety of sources. The articles that the user has read will be saved and shared if desired. Users can quickly scroll through the weather icon, the latest weather information in their area will be displayed without having to open a browser or launch an application. In addition, the weather display style will be adjusted customized as icons or text icons. The widgets located in the taskbar will always be updated automatically, and you will not need to manually update these information from various sources. A special feature is that in this new utility of Mricrosoft, users can personally reconcile their content, such as choosing the topic to display or choosing reliable sources of information. These are some changes made by Microsoft with the desire to help Windows 10 users find high-quality news content as well as related content easier according to each user&#8217;s habits. News or weather always has to be updated quickly and seamlessly, through Windows, Microsoft will bring an experience that helps users spend less time searching. These new utilities will be part of Windows 10 Insider, which will be taking a phased and metered approach to widespread availability in the near future.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9858</post-id>	</item>
		<item>
		<title>Russian intelligence set up a system to receive confidential information on the darknet</title>
		<link>https://en.spress.net/russian-intelligence-set-up-a-system-to-receive-confidential-information-on-the-darknet/</link>
		
		<dc:creator><![CDATA[Xuân Chi/Báo Tin tức]]></dc:creator>
		<pubDate>Tue, 27 Apr 2021 01:58:08 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Browser]]></category>
		<category><![CDATA[Click]]></category>
		<category><![CDATA[confidential]]></category>
		<category><![CDATA[Confidential news]]></category>
		<category><![CDATA[darknet]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Incognito]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Main page]]></category>
		<category><![CDATA[News report]]></category>
		<category><![CDATA[Pretty Good Privacy]]></category>
		<category><![CDATA[Receive]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[Russia Beyond]]></category>
		<category><![CDATA[Russian]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[set]]></category>
		<category><![CDATA[SVR]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Tip water]]></category>
		<category><![CDATA[Tor]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[VRS]]></category>
		<guid isPermaLink="false">https://en.spress.net/russian-intelligence-set-up-a-system-to-receive-confidential-information-on-the-darknet/</guid>

					<description><![CDATA[The system allows users in restricted environments to report confidential information to Russian intelligence services. SVR&#8217;s secure messaging system interface on Tor. Photo: The Record Those with information about imminent threats to Russia can now &#8220;tease&#8221; Russian intelligence agencies using the Tor browser on the darknet (network of inaccessible websites. from search engine). According to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The system allows users in restricted environments to report confidential information to Russian intelligence services.</strong><br />
<span id="more-9227"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_294_38602782/ef8c8bd8ae9a47c41e8b.jpg" width="625" height="399"> </p>
<p> <em> SVR&#8217;s secure messaging system interface on Tor. Photo: The Record</em> Those with information about imminent threats to Russia can now &#8220;tease&#8221; Russian intelligence agencies using the Tor browser on the darknet (network of inaccessible websites. from search engine). According to Russia Beyond, the announcement of a new confidential information system and other information related to Russian national security has just been posted on the website of the General Department of Foreign Intelligence (SVR). By clicking on the button &#8220;Report information&#8221; in the bottom left corner of the main page, users receive specific instructions as follows: &#8220;If you are outside Russia and have important information related to An urgent threat to the security of the Russian Federation, you can securely and anonymously share it with us through SVR&#8217;s virtual reception system (VRS) over the TOR network ”. The SVR claims the new darknet system will allow notified individuals to securely and anonymously share data and details with local authorities. It also provides a public PGP key as an additional layer of security for encrypting messages sent over the new virtual receiving system (VRS). When a user first visits this website for the purpose of sending information related to Russian national security, they will receive a 5-word code needed to decode the intelligence messages if they wish. contact the recipient of the denunciation</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">9227</post-id>	</item>
		<item>
		<title>Warning: Don&#8217;t click the pink settings link for WhatsApp</title>
		<link>https://en.spress.net/warning-dont-click-the-pink-settings-link-for-whatsapp/</link>
		
		<dc:creator><![CDATA[Bảo Tuấn]]></dc:creator>
		<pubDate>Sun, 25 Apr 2021 09:20:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[account]]></category>
		<category><![CDATA[application]]></category>
		<category><![CDATA[Appropriating]]></category>
		<category><![CDATA[Click]]></category>
		<category><![CDATA[Click the mouse]]></category>
		<category><![CDATA[dont]]></category>
		<category><![CDATA[FAKE]]></category>
		<category><![CDATA[Green Blue]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Link]]></category>
		<category><![CDATA[Message]]></category>
		<category><![CDATA[phone]]></category>
		<category><![CDATA[pink]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Settings]]></category>
		<category><![CDATA[suspect]]></category>
		<category><![CDATA[update]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Warning]]></category>
		<category><![CDATA[Web service]]></category>
		<category><![CDATA[WHATSAPP]]></category>
		<guid isPermaLink="false">https://en.spress.net/warning-dont-click-the-pink-settings-link-for-whatsapp/</guid>

					<description><![CDATA[Some WhatsApp users recently received a link over the phone saying the app will change the theme from green to pink while promising more new features. However, once a user clicks on this fake link, their WhatsApp account will be hijacked by the hacker. Many security experts warned WhatsApp users not to click on the [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Some WhatsApp users recently received a link over the phone saying the app will change the theme from green to pink while promising more new features. However, once a user clicks on this fake link, their WhatsApp account will be hijacked by the hacker.</strong><br />
<span id="more-8335"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_20_38594733/33cd307c153efc60a52f.jpg" width="625" height="417"> </p>
<p> <em> Many security experts warned WhatsApp users not to click on the pink settings link for WhatsApp called WhatsappPink. </em> Many security experts including Mr. Rajesh Rajaharia have voiced a warning about a virus hidden in a fake pink update link for WhatsApp called WhatsappPink. Once a user clicks on the WhatsappPink link, the virus will help hackers break in, take all access to WhatsApp in particular as well as their phones in general. The ultimate goal of a hacker is to steal victims&#8217; personal information and bank passwords. According to Mr. Rajaharia, if a user has clicked on the fake pink update link for WhatsApp and lost access to their account or suspected something unusual happened to their account, they should immediately take action. like uninstall WhatsappPink immediately; uninstall all WhatsApp web services; clear browser cache from settings; double-check access to all applications on your phone; If you suspect losing access to any application try to get it back immediately. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_21_20_38594733/42d44f656a278379da36.jpg" width="625" height="493"> <em> Warning about WhatsappPink by security expert Rajesh Rajaharia</em> Experts also warn users to follow the basics and never install other mobile apps than those available on the official Google or Apple app store. For its part, WhatsApp has also warned users through media reports that: &#8220;Anyone can receive an unusual or suspicious message through any service, including email, private messages, and so on. text the phone and we strongly encourage everyone to be cautious before answering or participating. WhatsApp also suggests users send them a report about malicious links similar to WhatsappPink if they received it.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8335</post-id>	</item>
		<item>
		<title>Vietnam faces challenges from satellite Internet</title>
		<link>https://en.spress.net/vietnam-faces-challenges-from-satellite-internet/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 22 Apr 2021 15:50:10 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Associate Professor]]></category>
		<category><![CDATA[challenges]]></category>
		<category><![CDATA[Elon Musk]]></category>
		<category><![CDATA[faces]]></category>
		<category><![CDATA[Globe]]></category>
		<category><![CDATA[Institute of Electronics]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet service]]></category>
		<category><![CDATA[Islands]]></category>
		<category><![CDATA[line]]></category>
		<category><![CDATA[Low Earth Orbit]]></category>
		<category><![CDATA[Network coverage]]></category>
		<category><![CDATA[Nguyen Huu Thanh]]></category>
		<category><![CDATA[Optical fiber]]></category>
		<category><![CDATA[Pham Anh Tuan]]></category>
		<category><![CDATA[Router]]></category>
		<category><![CDATA[Satellite]]></category>
		<category><![CDATA[SPACEX]]></category>
		<category><![CDATA[Supplier]]></category>
		<category><![CDATA[Trajectory]]></category>
		<category><![CDATA[User]]></category>
		<category><![CDATA[Vietnam]]></category>
		<guid isPermaLink="false">https://en.spress.net/vietnam-faces-challenges-from-satellite-internet/</guid>

					<description><![CDATA[In 2022, billionaire Elon Musk&#8217;s Starlink satellite Internet service will be deployed in Vietnam. Meanwhile, users anywhere can access the network, no need to depend on fiber optic transmission lines. Break boundaries in Internet access Elon Musk&#8217;s project of covering the Internet around the Earth has begun for users to sign up for testing. You [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In 2022, billionaire Elon Musk&#8217;s Starlink satellite Internet service will be deployed in Vietnam. Meanwhile, users anywhere can access the network, no need to depend on fiber optic transmission lines.</strong><br />
<span id="more-5995"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_20_181_38578102/260128750c37e569bc26.jpg" width="625" height="416"> </p>
<p> <strong> Break boundaries in Internet access</strong> Elon Musk&#8217;s project of covering the Internet around the Earth has begun for users to sign up for testing. You can be one of the first to use this service even while living in Vietnam. Starlink&#8217;s ambition is to use 12,000 low-end satellites to cover the Internet to every corner of the globe. So far, this project has been successful in covering all over the Americas with a total of 1,261 satellites in orbit. The billionaire Elon Musk&#8217;s satellite Internet project also targets Vietnamese users. Currently, Starlink started allowing users to pre-order to use the service. Accordingly, when accessing the website of Starlink, users can easily choose familiar cities of Vietnam such as Hanoi, Ho Chi Minh City, Hue, Da Nang, Hai Phong, Can Tho &#8230; to register for history. use this service. Startlink will start providing satellite Internet services to users in Vietnam in 2022. However, to be one of the first users, users have to pay a fee of 99 USD (about 2.3 million VND) to &#8220;book&#8221;. Payment will be made via international cards such as VISA, Master Card. The kit offered will include a Starlink satellite pan, WiFi router, power supply, cable, and rack. In case of change of mind, Starlink will refund the deposit to the user. Assoc.Prof.Dr Pham Anh Tuan, Director of the Vietnam Space Center, said that Starlink is a satellite constellation project, in which thousands of small satellites are launched into low Earth orbit (abbreviated as LEO &#8211; Low Earth Orbit), located 550km from the ground. Internet signals will be shot from satellites straight down to receivers on the ground, then these devices will broadcast the signal through the local system or directly via wires connected to the customer&#8217;s Starlink router. The strength of satellite Internet is breaking down distance limits. Hilly areas, islands, complicated difficult terrain &#8230; still have simple internet access Satellite Internet works similarly to cable Internet, except that the system has more moving elements. When the customer accesses, the data request will be transferred from the computer to a satellite internet pan. This pan will broadcast a data request to a satellite orbiting the Earth. At this point, the satellite will send the received request to the ISP. The data is transmitted from the carrier to the satellite, then from the satellite to the satellite Internet pan, down to your router and into the computer. The more satellites, the more stable the signal. These satellites act like base stations, except that they are not obstructed by topographic space. <strong> Competition between suppliers</strong> According to Assoc.Prof. Dr. Pham Anh Tuan, the appearance of the SpaceX provider will create fierce competition from today&#8217;s telecom businesses. However, the bigger problem is that we do not have legal bases to manage cybersecurity for foreign suppliers. Therefore, in the coming time, there will be a need to consider legal frameworks to manage network information security, avoid bad and negative information, affecting socio-economic security. Assoc.Prof.Dr. Nguyen Huu Thanh, Director of the Institute of Electronics and Telecommunications, Hanoi University of Technology, this technology will create a big competition with network operators. Currently, Vietnam&#8217;s Internet is also relatively good, has coverage in remote areas, islands, but not as flexible as satellite Internet. Starlink is faster than optical fiber depending on the provider, but it is known that the bandwidth of the satellite Internet is very large, so it will compete greatly with current providers. The important point to compete here is the fee charged by the satellite internet provider, if it is too high, it will also be difficult to attract users. According to Assoc.Prof. Dr. Nguyen Huu Thanh, when the entire Starlink satellite system is put into orbit, this service will provide almost global coverage to populated areas. Users using the service only need to buy a pan to catch the waves, like a pan to watch TV. As for cybersecurity, if we talk about hacker intrusions and users, each person must be equipped with tools to protect themselves. Therefore, this problem is the same as with Vietnamese carriers only. The most important thing is to have fair competition policies, otherwise this market will be lost to foreign hands According to experts, Starlink can have coverage to the country or not depending on the country&#8217;s regulations. Currently, many countries have allowed Starlink to operate, but China and Russia will require the service to comply with special rules if they allow Starlink to broadcast on their own frequencies. Some countries prohibit the purchase, sale and use of ground-mounted Starlink receivers. In Vietnam, to manage satellite Internet, it is necessary to soon have appropriate regulations. In terms of feasibility, the cost of Internet services from the orbital satellite cluster is as low as that of Starlink is still 7-8 times higher than the price of fixed broadband Internet service in Vietnam. In the case of being deployed in Vietnam, satellite Internet service will be the solution to the problem of Internet coverage in areas with divided terrain such as hills, islands &#8230; In addition, the provision of satellite Internet services using low-orbit satellite beam technology promotes the development of the maritime and aviation industries.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5995</post-id>	</item>
		<item>
		<title>Where to renew the health insurance card?</title>
		<link>https://en.spress.net/where-to-renew-the-health-insurance-card/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Sun, 18 Apr 2021 17:19:29 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Address]]></category>
		<category><![CDATA[Bank for investment and development of Vietnam]]></category>
		<category><![CDATA[BIDV]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[Expired]]></category>
		<category><![CDATA[Family]]></category>
		<category><![CDATA[health]]></category>
		<category><![CDATA[Health Insurance]]></category>
		<category><![CDATA[Hoang Ngoc Linh]]></category>
		<category><![CDATA[insurance]]></category>
		<category><![CDATA[Old]]></category>
		<category><![CDATA[Organ]]></category>
		<category><![CDATA[Portal]]></category>
		<category><![CDATA[Renew]]></category>
		<category><![CDATA[Renewal]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[Social insurance]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Syntax]]></category>
		<category><![CDATA[Thuan An]]></category>
		<category><![CDATA[Tutorial]]></category>
		<category><![CDATA[Vietnam Social Insurance]]></category>
		<guid isPermaLink="false">https://en.spress.net/where-to-renew-the-health-insurance-card/</guid>

					<description><![CDATA[Hoang Ngoc Linh (Thuan An city, Binh Duong province) asked: My health insurance card has expired. Where can I change to a new one? Vietnam Social Security reply: He did not specify information about mandatory health insurance cards or household health insurance. When renewing the compulsory health insurance card, he can contact his employer for [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Hoang Ngoc Linh (Thuan An city, Binh Duong province) asked: My health insurance card has expired. Where can I change to a new one?</strong><br />
<span id="more-4379"></span> <strong> Vietnam Social Security</strong> <em> reply:</em> He did not specify information about mandatory health insurance cards or household health insurance. When renewing the compulsory health insurance card, he can contact his employer for assistance. If he renews the household health insurance card, he only needs to go to the collection agent of social insurance, health insurance or the nearest social insurance agency, notify the social insurance number (provide the old health insurance card code), and pay the health insurance premium. If he cannot directly go to the collection agent of social insurance, health insurance or the social insurance agency, he can pay for the renewal of the health insurance card online. Currently, Vietnam Social Security has cooperated with Bank for Investment and Development of Vietnam (BIDV) to deploy online payment services. The payment method for health insurance is implemented on the mobile device software and on the website of BIDV. Once the payment is completed, the health insurance card will be automatically renewed. Then, Vietnam Social Security will send a result message to the participant&#8217;s phone number.</p>
<p> After performing the above transactions, to check the results of the health insurance card renewal, the participants can search by themselves by the following methods: Access to the website of Vietnam Social Insurance at the address: https : //baohiemxahoi.gov.vn/tracuu/pages/tra-cuu-thoi-han-su-dung-the-bhyt.aspx; send SMS with the syntax: BH THE &#8220;ID card of health insurance card&#8221; to 8079; Call the customer care switchboard 1900.9068 of Vietnam Social Insurance for instructions.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4379</post-id>	</item>
		<item>
		<title>Access for people with disabilities needs to be paid more attention</title>
		<link>https://en.spress.net/access-for-people-with-disabilities-needs-to-be-paid-more-attention/</link>
					<comments>https://en.spress.net/access-for-people-with-disabilities-needs-to-be-paid-more-attention/#respond</comments>
		
		<dc:creator><![CDATA[Thanh Hoa]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 08:26:10 +0000</pubDate>
				<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Access]]></category>
		<category><![CDATA[Approach]]></category>
		<category><![CDATA[attention]]></category>
		<category><![CDATA[BXD]]></category>
		<category><![CDATA[categories]]></category>
		<category><![CDATA[commune]]></category>
		<category><![CDATA[construction]]></category>
		<category><![CDATA[disabilities]]></category>
		<category><![CDATA[District]]></category>
		<category><![CDATA[Education Center]]></category>
		<category><![CDATA[Go]]></category>
		<category><![CDATA[Help them]]></category>
		<category><![CDATA[NKT TMC]]></category>
		<category><![CDATA[paid]]></category>
		<category><![CDATA[Patronize]]></category>
		<category><![CDATA[people]]></category>
		<category><![CDATA[People with disabilities]]></category>
		<category><![CDATA[Public]]></category>
		<category><![CDATA[service center]]></category>
		<category><![CDATA[Sports Centre]]></category>
		<category><![CDATA[Standard]]></category>
		<category><![CDATA[Tall green]]></category>
		<category><![CDATA[Tran Manh Ha]]></category>
		<category><![CDATA[Wheelchair]]></category>
		<guid isPermaLink="false">https://en.spress.net/access-for-people-with-disabilities-needs-to-be-paid-more-attention/</guid>

					<description><![CDATA[Road for the disabled (PWDs) mobility system helps them to be more active in their travel and easier to access public services. However, the reality shows that this item has not been focused on when building projects in the area. Access road for people with disabilities at the Provincial Museum. Since 2002, the Ministry of [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Road for the disabled (PWDs) mobility system helps them to be more active in their travel and easier to access public services. However, the reality shows that this item has not been focused on when building projects in the area.</strong><br />
<span id="more-1046"></span> </p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_448_38534513/c7cb44b36ef187afdee0.jpg" width="625" height="352"></p>
<p><em>Access road for people with disabilities at the Provincial Museum.</em></p>
<p>Since 2002, the Ministry of Construction has issued a set of technical regulations and standards to ensure that people with disabilities can access and use them. In 2014, the Ministry of Construction issued Circular 21/2014 / TT-BXD, dated December 29, 2014, issued together with the national technical regulation on &#8220;Building construction to ensure access to use by people with disabilities&#8221; (QCVN 10 : 2014 / BXD). This regulation specifies technical requirements that must be complied with when building new or renovating constructions to ensure that people with disabilities have access to and use them.</p>
<p>In addition, Decision 1019 / QD-TTg dated August 5, 2012 of the Prime Minister on the project to support people with disabilities for the period 2012-2020 sets the target that by the end of 2020, 100% of the works will be the headquarters of the institution. government officials; station, bus station, pier; medical examination and treatment establishments; educational institutions, vocational training, cultural works, sport and physical training; The apartment building ensures accessibility for people with disabilities. Also according to the above decision, social service works will have to design additional items to ensure that people with disabilities can access and use.</p>
<p>However, according to the survey results, the survey of the Provincial Sponsoring Association for People with Disabilities and Orphans (PWD &#038; TMC), the number of public works in the area with items accessible to people with disabilities is still very limited.</p>
<p>In 2020, the Provincial Sponsoring Association for People with Disabilities and TMC will conduct a survey at 40/177 communal units; 6/13 units at district level and 21 projects at provincial level in Ha Long city. For the commune level, surveyed at 281 schemes, only 21 schemes have access roads for people with disabilities (accounting for 7.4%). Of the 53 projects built after 2012 (the year the Prime Minister issued Decision No. 1019 / QD-TTg approving the project to help people with disabilities access social welfare works), only 11 projects have access road for people with disabilities (accounting for 20.7%). In particular, of the 40 surveyed commune-level offices, only 7 offices have access roads for people with disabilities; 1/121 village cultural house has access roads for people with disabilities (accounting for 0.08%).</p>
<p>At district level, in the survey of 78 schemes in 6 districts, towns and cities, only 19 schemes have access roads for people with disabilities. Out of 22 projects built after 2012, only 13 have access roads for people with disabilities. Out of the 6 district level units surveyed, all 6 offices do not have access roads for people with disabilities. All offices of the Justice Department, the General Education Center, and the Sports Center of the 6 surveyed district-level units do not have access roads for people with disabilities.</p>
<p>At the provincial level, surveyed in 21 schemes, only 13 schemes had access roads for people with disabilities. Out of 11 projects built after 2012, 10 have access roads serving people with disabilities. Only one building is the headquarters of the Provincial Employment and Service Center (Cao Xanh ward) with no access roads for people with disabilities.</p>
<p>This shows that the units that design, inspect and approve the construction of the works do not pay attention to adding access roads for people with disabilities according to regulations.</p>
<p>Sharing with us, Mr. Tran Manh Ha, residing in group 8, Trao Ha area, Duc Chinh ward, Dong Trieu town, said: “For people with severe mobility impairment, they have to sit in a wheelchair like us, going very difficult again. Every time you go and do, you must ask a loved one or a healthy person to help you. I myself also want to have conditions to access public services and integrate with the community, but the difficulties in not having access make me feel inconvenient, even more shrinking because of fear of disturbing others. . I really hope that units and agencies are interested in building additional public works to ensure that people with disabilities can access and use them conveniently. Currently, the new construction of the Head Office of the Ward People&#8217;s Committee has access roads for people with disabilities, and some old public works do not have access roads for people with disabilities, and are expected to soon be supplemented by units and agencies ”.</p>
<p>According to Mr. Lanh The Vinh, Chairman of the Provincial Sponsoring Association for People with Disabilities and TMC, the access road for people with disabilities is one of the important approaches that people with disabilities are currently facing. Although there are clear regulations and regulations in legal documents, through investigation and surveys in many public works, this item seems to be &#8220;forgotten&#8221;. After the Investigation and Review Association has submitted a report to the Provincial People&#8217;s Committee to propose and propose solutions to help people with disabilities have conditions to access public works and integrate into the community.</p>
<p>According to statistics, the province currently has a total of 20,767 PWDs, of which more than 4,000 people with special severe disabilities have to travel by wheelchair.</p>
<p>In order to enhance the responsibilities of agencies and units in implementing access roads for people with disabilities at public works, on November 20, 2020, the Provincial People&#8217;s Committee issued a document 7948 / UBND-XD4 requesting departments, Departments, branches, units and local People&#8217;s Committees, based on their functions and tasks, actively guide, inspect and supervise the implementation of national technical regulations and regulations on construction to ensure that PWDs can receive access to Approach to use in new design or renovation of construction works according to prescribed regulations and standards.</p>
<p>For specialized construction works management departments, economic zones management boards, localities and district-level professional offices organize the appraisal, grant of construction permits, and take over the works to be put into use. Construction works must ensure access requirements for people with disabilities; strengthen inspection, control and handle violations, ensure full implementation of policies to help NKY access and use construction works.</p>
<p>The province also requires project investors to organize the implementation of the QCVN 10: 2014 / BXD regulations on construction works right from the design task, technical design construction; it is imperative that contractors, when participating in bidding, must fully express the technical regulations specified in Section 2 of the QCVN 10: 2014 / BXD Regulation; It is not accepted for contractors who do not satisfy all design documents but do not fully show the technical regulations specified in Section 2 of the QCVN 10: 2014 / BXD Regulation. For the construction management and use units, proactively review and have plans to repair and renovate the works, ensuring the requirements for PWDs to access and use according to QCVN 10: 2014 / BXD and other relevant standards and regulations.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/access-for-people-with-disabilities-needs-to-be-paid-more-attention/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1046</post-id>	</item>
	</channel>
</rss>