<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>Network connections &#8211; Spress</title>
	<atom:link href="https://en.spress.net/tag/network-connections/feed/" rel="self" type="application/rss+xml" />
	<link>https://en.spress.net</link>
	<description>Spress is a general newspaper in English which is updated 24 hours a day.</description>
	<lastBuildDate>Thu, 17 Jun 2021 12:26:11 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">191965906</site>	<item>
		<title>Hanoi launches Covid-19 epidemiological information map</title>
		<link>https://en.spress.net/hanoi-launches-covid-19-epidemiological-information-map-2/</link>
		
		<dc:creator><![CDATA[GIANG NAM]]></dc:creator>
		<pubDate>Thu, 17 Jun 2021 12:26:11 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Around]]></category>
		<category><![CDATA[Blockage]]></category>
		<category><![CDATA[Covid 19 Hanoi]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[COVID19]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Department of Information and Communication]]></category>
		<category><![CDATA[Display]]></category>
		<category><![CDATA[Easy to use]]></category>
		<category><![CDATA[Epidemiological]]></category>
		<category><![CDATA[Epidemiology]]></category>
		<category><![CDATA[Hanoi]]></category>
		<category><![CDATA[Hanoi city]]></category>
		<category><![CDATA[Hanoi Health Department]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[Isolation]]></category>
		<category><![CDATA[Isolation zone]]></category>
		<category><![CDATA[launches]]></category>
		<category><![CDATA[Map]]></category>
		<category><![CDATA[Medical Center]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Nguyen Thanh Liem]]></category>
		<category><![CDATA[Official announcement]]></category>
		<category><![CDATA[Search]]></category>
		<category><![CDATA[Translate]]></category>
		<guid isPermaLink="false">https://en.spress.net/hanoi-launches-covid-19-epidemiological-information-map-2/</guid>

					<description><![CDATA[On June 11, the Department of Information and Communications and the Hanoi Department of Health officially launched the &#8220;Hanoi Covid-19 Epidemiological Information Map&#8221; to serve the city&#8217;s epidemic prevention and control. The Covid-19 epidemiological information map has a friendly interface, easy to use and look up. On June 11, the Department of Information and Communications [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On June 11, the Department of Information and Communications and the Hanoi Department of Health officially launched the &#8220;Hanoi Covid-19 Epidemiological Information Map&#8221; to serve the city&#8217;s epidemic prevention and control.</strong><br />
<span id="more-24403"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_11_14_39152879/f7af8fba82f86ba632e9.jpg" width="625" height="390"> </p>
<p> <em> The Covid-19 epidemiological information map has a friendly interface, easy to use and look up.</em> On June 11, the Department of Information and Communications and the Hanoi Department of Health officially launched the &#8220;Hanoi Covid-19 Epidemiological Information Map&#8221;, serving the city&#8217;s epidemic prevention and control. The Covid-19 epidemiological information map in Hanoi can be accessed directly at: https://covidmaps.hanoi.gov.vn. Through smart mobile phones or computers with internet connection, people can search and detect problems related to the Covid-19 epidemic around them or at any location in the city. Hanoi. In addition, the system also provides mapping tools for density analysis and statistics to serve the people as well as for management, monitoring, epidemic prevention and control; Covid-19 testing sites; concentrated isolation areas; blockade and medical isolation areas; hospital, medical center&#8230; Director of the Hanoi Department of Information and Communications Nguyen Thanh Liem said that the source of data and expert data on the Covid-19 epidemiology is provided by the city&#8217;s Center for Disease Control (CDC) and the Hanoi Department of Health. Internal and updated continuously right after the official announcement of CDC. The Department of Information and Communications hopes this will be one of the effective tools to support people and management agencies in the prevention and control of the Covid-19 epidemic. In phase 2, the Hanoi Department of Information and Communications in coordination with the Department of Health and CDC will continue to upgrade and add some new functions such as: Information on epidemiological points, blockade points, positive cases announced within a user-defined radius on the map; update information on maps of districts, wards and communes that have taken samples for Covid-19 testing; locate, find a way to build a suitable travel route, limit contact with points at risk of infection.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">24403</post-id>	</item>
		<item>
		<title>Tesla will have to compensate nearly 400 million dong for each customer?</title>
		<link>https://en.spress.net/tesla-will-have-to-compensate-nearly-400-million-dong-for-each-customer/</link>
		
		<dc:creator><![CDATA[Thảo Nguyên]]></dc:creator>
		<pubDate>Sat, 05 Jun 2021 16:19:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[capacity]]></category>
		<category><![CDATA[Car company]]></category>
		<category><![CDATA[Charger]]></category>
		<category><![CDATA[compensate]]></category>
		<category><![CDATA[Complain]]></category>
		<category><![CDATA[Customer]]></category>
		<category><![CDATA[dong]]></category>
		<category><![CDATA[Electric Car]]></category>
		<category><![CDATA[electricity]]></category>
		<category><![CDATA[Indemnify]]></category>
		<category><![CDATA[Limit]]></category>
		<category><![CDATA[million]]></category>
		<category><![CDATA[Model WILL]]></category>
		<category><![CDATA[Model X]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Norway]]></category>
		<category><![CDATA[REDDIT]]></category>
		<category><![CDATA[software]]></category>
		<category><![CDATA[Sue]]></category>
		<category><![CDATA[Tesla]]></category>
		<category><![CDATA[The battery]]></category>
		<category><![CDATA[Tram]]></category>
		<category><![CDATA[Upgraded version]]></category>
		<guid isPermaLink="false">https://en.spress.net/tesla-will-have-to-compensate-nearly-400-million-dong-for-each-customer/</guid>

					<description><![CDATA[Tesla customers in the US and Norway markets are suing the popular electric car company for using software to limit the battery capacity and charging current of Model S and X. Strength of Tesla electric car is the ability to upgrade the vehicle&#8217;s software over a network connection, similar to what today&#8217;s smartphone models do. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Tesla customers in the US and Norway markets are suing the popular electric car company for using software to limit the battery capacity and charging current of Model S and X.</strong><br />
<span id="more-20869"></span> </p>
<p> Strength of <strong> Tesla electric car</strong> is the ability to upgrade the vehicle&#8217;s software over a network connection, similar to what today&#8217;s smartphone models do. However, not every software upgrade that the US automaker has released also brings benefits to users. Recently, a court in Norway has declared <em> Tesla brand penalty</em> due to the limitation of the vehicle&#8217;s charging current as well as the vehicle battery capacity. Accordingly, the US electric vehicle brand must compensate 16,000 USD (365 million VND) for each customer affected by this software upgrade. It is known that most Tesla models with limited charging current and battery capacity are Model S and Model X vehicles equipped with high-capacity 85 kWh battery packs. Currently this battery pack has been discontinued in 2016. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_180_39044669/9eb935522410cd4e9401.jpg" width="625" height="375"> <em> Tesla electric vehicle models equipped with 85kWh battery packs have been affected by the software update </em> Over the past few years, many Tesla car users have complained about the car having a shorter range after a major software update rolled out in 2019. In connection with this incident, many users have created many Hot topics and discussions on the Reddit platform and Tesla car user forums. Some users said that after the Tesla electric car was upgraded with software, the vehicle&#8217;s travel range was reduced by about 20 km compared to before. Also because of the above incident, many people have filed a lawsuit in the California court. In this indictment, the user accuses the Tesla car brand of using the car battery capacity limit feature through a software update. As such, it appears that Tesla&#8217;s software update affects not only users in the US but also a lot of people in other markets, including Norway, where the courts have sided with users. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_06_02_180_39044669/fd85576e462caf72f63d.jpg" width="625" height="416"> A representative of the US electric car company said that the software upgrades that users complain about are important, in order to &#8220;protect the battery pack as well as improve its usage life&#8221;. It is known that after the court ruling in Norway, Tesla will have a few weeks to appeal. A representative of the US electric car company said that the software upgrades that users complain about are important, in order to &#8220;protect the battery pack as well as improve its usage life&#8221;. The class-action lawsuit against Tesla in the US is still pending.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">20869</post-id>	</item>
		<item>
		<title>How to find lost iPhone even without internet connection</title>
		<link>https://en.spress.net/how-to-find-lost-iphone-even-without-internet-connection/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 20 May 2021 20:28:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[connection]]></category>
		<category><![CDATA[Device]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Find]]></category>
		<category><![CDATA[Find My]]></category>
		<category><![CDATA[Find My iPhone]]></category>
		<category><![CDATA[internet]]></category>
		<category><![CDATA[Internet connection]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IOS 13]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Offline]]></category>
		<category><![CDATA[Ohio]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Screen]]></category>
		<category><![CDATA[setting]]></category>
		<category><![CDATA[Unfortunately]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-find-lost-iphone-even-without-internet-connection/</guid>

					<description><![CDATA[This feature on iOS 14 will help you increase the ability to find your iPhone when you accidentally lose it. On iPhones and Apple devices there is an app called Find My iPhone. It allows remote location tracking of iOS devices including Mac computers, iPhones, Apple Watches, AirPods&#8230; It has been replaced by the Find [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>This feature on iOS 14 will help you increase the ability to find your iPhone when you accidentally lose it.</strong><br />
<span id="more-16682"></span> On iPhones and Apple devices there is an app called Find My iPhone. It allows remote location tracking of iOS devices including Mac computers, iPhones, Apple Watches, AirPods&#8230; It has been replaced by the Find My app from iOS 13 and up. after.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_101_38791403/0fac17890acbe395bada.jpg" width="625" height="351"> However, to be able to use this feature, your iPhone needs to be connected to a WiFi or mobile data network, so if your device does not have a network, &#8220;open&#8221;. But that was before, since iOS 14 Apple has released a new feature update that can help you find your iPhone even when offline. <strong> First, go to Settings => select iCloud account at the top => Find => Find iPhone => turn on the Find Network feature</strong> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_101_38791403/aee4bbc1a6834fdd1692.jpg" width="625" height="1353"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_101_38791403/303720123d50d40e8d41.jpg" width="625" height="1353"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_101_38791403/00366d137051990fc040.jpg" width="625" height="1353"> Enabling the Find My Network feature allows you to locate this iPhone even when it&#8217;s offline. As long as there are other iPhones around the lost iPhone, it will send you the location through the connection. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_10_101_38791403/2c6d43485e0ab754ee1b.jpg" width="625" height="379"> And the note of this feature is that the machine needs to be turned on, not powered off. And if your device is powered off, &#8220;oh no&#8221;, but because iPhone can be accessed from the lock screen to turn off WiFi and mobile data, you will still have more chances to find your beloved iPhone. .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16682</post-id>	</item>
		<item>
		<title>Launching 5-layer protection solution, attack prevention for digital transformation</title>
		<link>https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</link>
		
		<dc:creator><![CDATA[Thanh Hà]]></dc:creator>
		<pubDate>Wed, 19 May 2021 12:25:13 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5layer]]></category>
		<category><![CDATA[attack]]></category>
		<category><![CDATA[Bkav]]></category>
		<category><![CDATA[Bkav 2021]]></category>
		<category><![CDATA[Bkav Endpoint]]></category>
		<category><![CDATA[Bkav Endpoint 2021]]></category>
		<category><![CDATA[Bkav Pro 2021]]></category>
		<category><![CDATA[Bkav Technology Group]]></category>
		<category><![CDATA[Convert]]></category>
		<category><![CDATA[debut]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[file]]></category>
		<category><![CDATA[Gap]]></category>
		<category><![CDATA[Launching]]></category>
		<category><![CDATA[Malware Mã]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[New version]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Personal information]]></category>
		<category><![CDATA[Prevention]]></category>
		<category><![CDATA[Product sets]]></category>
		<category><![CDATA[protect]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[solution]]></category>
		<category><![CDATA[transformation]]></category>
		<category><![CDATA[Unnecessary]]></category>
		<category><![CDATA[Vu Ngoc Son]]></category>
		<guid isPermaLink="false">https://en.spress.net/launching-5-layer-protection-solution-attack-prevention-for-digital-transformation/</guid>

					<description><![CDATA[Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation. Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Bkav Technology Group this morning (May 11) launched a suite of Bkav 2021 solutions with 5-layer protection technology, attack prevention and control for digital transformation.</strong><br />
<span id="more-16156"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_11_8_38803011/5b5d6bf475b69ce8c5a7.jpg" width="625" height="375"> </p>
<p> Bkav&#8217;s suite of application technology solutions with 5 layers of protection. The product set includes antivirus software Bkav Pro 2021 for individual users and Bkav Endpoint 2021 for agencies and businesses. This set of solutions is applied artificial intelligence (AI) to kill viruses even without updating the identification pattern, especially integrating a series of new technologies to protect personal information and user data. Specifically, the set of AI application solutions aims to create a 5-layer protection system including: The network layer is responsible for protecting and monitoring all incoming and outgoing network connections; operating system layer to monitor and detect operating system vulnerabilities; the data layer is responsible for protecting and monitoring changes to data or system configuration; application layer that monitors the behavior and vulnerabilities of applications; The user layer helps ensure enforcement of information security policies. According to Mr. Vu Ngoc Son, Vice President in charge of anti-malware of Bkav, the new version of AI technology applied in Bkav 2021 can identify malicious code up to 99.9% as well as reduce the ability to &#8220;catch&#8221;. clean files down to approximately 0%. This new technology also optimizes performance 144% more than the previous 2020 version. The business version of Bkav Endpoint also provides reporting statistics in the form of a visual Dashboard, helping businesses get an overall picture of the periodic protection situation by week, month, and year, including the number of scanned files. , number of files are malicious code, number of controlled connections, number of dangerous connections blocked, rate of infected malware types, number of times to prevent data encryption, spy attacks, number of holes OS vulnerabilities&#8230; Customers who already have a license will be automatically upgraded to the new version for free from May 11, 2021.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16156</post-id>	</item>
		<item>
		<title>How to find the lost iPhone even when disconnected with iOS 14</title>
		<link>https://en.spress.net/how-to-find-the-lost-iphone-even-when-disconnected-with-ios-14/</link>
		
		<dc:creator><![CDATA[editor]]></dc:creator>
		<pubDate>Thu, 13 May 2021 05:50:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Apple ID]]></category>
		<category><![CDATA[Apple Watch]]></category>
		<category><![CDATA[disconnected]]></category>
		<category><![CDATA[Feature]]></category>
		<category><![CDATA[Find]]></category>
		<category><![CDATA[Find My]]></category>
		<category><![CDATA[Find My iPhone]]></category>
		<category><![CDATA[Find My network]]></category>
		<category><![CDATA[IOS]]></category>
		<category><![CDATA[IOS 13]]></category>
		<category><![CDATA[iOS 14]]></category>
		<category><![CDATA[Ipad]]></category>
		<category><![CDATA[Iphone]]></category>
		<category><![CDATA[IPod Touch]]></category>
		<category><![CDATA[lost]]></category>
		<category><![CDATA[MAC]]></category>
		<category><![CDATA[Minh Hoa]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Offline]]></category>
		<category><![CDATA[Operating system]]></category>
		<category><![CDATA[Send Last Location]]></category>
		<category><![CDATA[WIFI]]></category>
		<guid isPermaLink="false">https://en.spress.net/how-to-find-the-lost-iphone-even-when-disconnected-with-ios-14/</guid>

					<description><![CDATA[With the new feature in iOS 14 you can locate your iPhone even in the absence of a network connection. On Apple devices there is an app called Find My iPhone that allows remote location tracking of iOS devices including Mac computers, iPhones, Apple Watch, AirPods &#8230; Then it does. is replaced by the Find [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>With the new feature in iOS 14 you can locate your iPhone even in the absence of a network connection.</strong><br />
<span id="more-13663"></span> On Apple devices there is an app called Find My iPhone that allows remote location tracking of iOS devices including Mac computers, iPhones, Apple Watch, AirPods &#8230; Then it does. is replaced by the Find My app from iOS 13 and later. To use this feature, iPhone needs to be connected to a Wi-Fi or mobile data network. However, since iOS 14, Apple has released a new feature update that can help users find iPhone even when offline. This is especially useful in case you forgot your iPhone or iPhone to be stolen by a fraudster.</p>
<p> The iPhone can be located even when the network is disconnected because iOS 14 has updated the Find My network feature along with the Send Last Location feature, from there. helps to save the last location of the iPhone before Wi-Fi (or mobile data) turned off and connect with other iPhone devices (running iOS 14 together) to find the exact location. Here&#8217;s how to find the lost iPhone even when the network is disconnected: &#8211; Go to the item <strong> Setting </strong> (Settings), click on your Apple ID account name at the top. <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_296_38810506/895326273865d13b8874.jpg" width="625" height="612"> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_296_38810506/af1203661d24f47aad35.jpg" width="625" height="747"> -Click on the item <strong> Find</strong> (Find My). Select item <strong> Find iPhone</strong> (Find my iPhone) <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_05_12_296_38810506/7bbbd0cfce8d27d37e9c.jpg" width="625" height="742"> &#8211; Turn on the feature <strong> Network Find</strong> (Find My network) by sliding the slider to the right and turn on the feature <strong> Send last location</strong> (Send Last Location) and features <strong> Find iPhone</strong> . If you have an iPad or iPod Touch, just do the same. <strong> Minh Hoa</strong> <em> (th)</em></p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">13663</post-id>	</item>
		<item>
		<title>Training on management and operation of the system of sending and receiving electronic documents in CAND</title>
		<link>https://en.spress.net/training-on-management-and-operation-of-the-system-of-sending-and-receiving-electronic-documents-in-cand/</link>
		
		<dc:creator><![CDATA[Anh Minh]]></dc:creator>
		<pubDate>Sat, 01 May 2021 13:57:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[administration]]></category>
		<category><![CDATA[CAND]]></category>
		<category><![CDATA[create]]></category>
		<category><![CDATA[Document]]></category>
		<category><![CDATA[Documents]]></category>
		<category><![CDATA[E government]]></category>
		<category><![CDATA[Electronic]]></category>
		<category><![CDATA[Interconnection]]></category>
		<category><![CDATA[Management]]></category>
		<category><![CDATA[Management software]]></category>
		<category><![CDATA[Muscle weakness]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Office]]></category>
		<category><![CDATA[Opening]]></category>
		<category><![CDATA[operate]]></category>
		<category><![CDATA[operation]]></category>
		<category><![CDATA[Police]]></category>
		<category><![CDATA[Receiving]]></category>
		<category><![CDATA[sending]]></category>
		<category><![CDATA[student]]></category>
		<category><![CDATA[System]]></category>
		<category><![CDATA[Training]]></category>
		<category><![CDATA[Under]]></category>
		<category><![CDATA[VDI]]></category>
		<category><![CDATA[Virtualization]]></category>
		<guid isPermaLink="false">https://en.spress.net/training-on-management-and-operation-of-the-system-of-sending-and-receiving-electronic-documents-in-cand/</guid>

					<description><![CDATA[On April 26, in Hanoi, the Office of the Ministry of Public Security held a training course on management, operation and use of the system of sending and receiving electronic documents in the CAND. With the participation of 150 practitioners from the Departments under the Ministry of Public Security. On July 12, 2018, the Prime [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>On April 26, in Hanoi, the Office of the Ministry of Public Security held a training course on management, operation and use of the system of sending and receiving electronic documents in the CAND. With the participation of 150 practitioners from the Departments under the Ministry of Public Security.</strong><br />
<span id="more-10807"></span> On July 12, 2018, the Prime Minister issued a Decision on sending and receiving electronic documents between agencies in the state administrative system. Next, on March 12, 2019, the Prime Minister officially pressed the button to open the national document axis. This is an important legal basis, a strong breakthrough for state agencies to increase the use of electronic documents, eventually replacing paper documents, creating a foundation for new developments of the Government. electronic coating.</p>
<p> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_26_5_38641007/af05bf8598c7719928d6.jpg" width="625" height="341"> <em> Delegates at the training course on operating the system of sending and receiving electronic documents CAND. </em> Performing the assigned tasks, the Office of the Ministry of Public Security has urgently researched, developed and implemented the document management software system of the Ministry of Public Security in accordance with the standards and professional processes specified in the Decision. linking with the National Electronic Document Axis and officially sending and receiving electronic documents with the Government Office, ministries, branches and localities, as well as implementing sending and receiving electronic documents to all police units, localities &#8230; so far functional units of the Ministry of Public Security have completed technical infrastructure, connected to large-area computer networks, the Ministry of Public Security. , equipped with basic security equipment to all police units and localities. At the same time, to research and develop an infrastructure virtualization system (VDI) to serve electronic document transmission in CAND. During the training period, the trainees will be introduced and instructed in detail by the trainers on issues such as virtualization system and instructions for installing VDI system; Integrated data encryption solution in VDI; Drafting and promulgating electronic documents, managing electronic documents, making electronic documents and submitting electronic documents; How to digitally sign and authenticate electronic documents; The process of receiving, processing and issuing electronic documents to and from the CAND &#8230; The training course took place from April 26 to April 28 to help trainees understand and grasp the process of receiving, processing, digitally signing and issuing electronic documents from, to and from; proficient use of document management software, VDI infrastructure virtualization system to send and receive electronic documents within the Ministry of Public Security and with agencies in the state administrative system, contributing to effective department of leadership and command of leaders of the Public Security at all levels in the new situation; step by step build e-Government, digital transformation program in CAND.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">10807</post-id>	</item>
		<item>
		<title>What documents can a chip-based citizen ID card replace?</title>
		<link>https://en.spress.net/what-documents-can-a-chip-based-citizen-id-card-replace/</link>
		
		<dc:creator><![CDATA[XM/Báo Tin tức]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 03:40:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Barcode]]></category>
		<category><![CDATA[Biometrics]]></category>
		<category><![CDATA[Card]]></category>
		<category><![CDATA[chipbased]]></category>
		<category><![CDATA[Citizen]]></category>
		<category><![CDATA[Database management system]]></category>
		<category><![CDATA[Deal]]></category>
		<category><![CDATA[Digital signatures]]></category>
		<category><![CDATA[Documents]]></category>
		<category><![CDATA[Driving license]]></category>
		<category><![CDATA[Health Insurance]]></category>
		<category><![CDATA[ID card]]></category>
		<category><![CDATA[Identification]]></category>
		<category><![CDATA[Install the chip]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Papers]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Procedure]]></category>
		<category><![CDATA[replace]]></category>
		<category><![CDATA[Social insurance]]></category>
		<category><![CDATA[To replace]]></category>
		<category><![CDATA[You read]]></category>
		<guid isPermaLink="false">https://en.spress.net/what-documents-can-a-chip-based-citizen-id-card-replace/</guid>

					<description><![CDATA[Readers ask: What papers can a citizen&#8217;s identity card (CCCD) replace in current administrative transactions? Most of the people are satisfied with the simple procedure and do not take much time. In this regard, the News newspaper provided the following information: According to the web portal of the Ministry of Public Security, compared to a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>Readers ask: What papers can a citizen&#8217;s identity card (CCCD) replace in current administrative transactions?</strong><br />
<span id="more-8809"></span> <img decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_22_294_38597257/1e5a8b48bb0a52540b1b.jpg" width="625" height="373"> </p>
<p> <em> Most of the people are satisfied with the simple procedure and do not take much time.</em> <em> <strong> In this regard, the News newspaper provided the following information:</strong> </em> According to the web portal of the Ministry of Public Security, compared to a bar code Citizen Identification Card (CCCD), an electronic chip with CCCD can integrate more information about health insurance and social insurance. driver… CCCD card with electronic chip has high security, large storage capacity, allows integration of many accompanying applications such as: Digital signature application, biometric application, one-time password application &#8230; can widely used and connected for public and private services. Next time, when the CCCD card has electronic chip with full integration of information, then the people going to do the transactions and procedures will not have to carry many papers but only need to use the CCCD card with the chip. perform transactions. In addition, the integration of chips on the CCCD gives flexibility when it is necessary to add or modify information on the card after being issued by the police. Data on the chip can be accessed immediately without being dependent on the network connection through devices that allow reading information on the chip, making identity authentication instant, minimizing. multi-work forging identity. According to the plan, the Ministry of Public Security will set a target to grant 50 million new identity cards before July 1, 2021. This is the chance that from July 2021, the national database system of the population will be completed to connect with the project of citizenship identification with chip. Theoretically, when completing the data system on the population, the CCCD card with electronic chip can integrate more information about health insurance, social insurance, driver&#8217;s license &#8230; This is the basis Simplify administrative procedures when integrating information into a CCCD card.</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">8809</post-id>	</item>
		<item>
		<title>New series of smartphones with 5G, good prices in Vietnam</title>
		<link>https://en.spress.net/new-series-of-smartphones-with-5g-good-prices-in-vietnam/</link>
		
		<dc:creator><![CDATA[Song Tử]]></dc:creator>
		<pubDate>Tue, 20 Apr 2021 14:07:07 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[5G]]></category>
		<category><![CDATA[AMOLED]]></category>
		<category><![CDATA[Charger]]></category>
		<category><![CDATA[Find X2]]></category>
		<category><![CDATA[Frequency]]></category>
		<category><![CDATA[Galaxy A32 5G]]></category>
		<category><![CDATA[good]]></category>
		<category><![CDATA[Mi 11 Lite 5G]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[OPPO]]></category>
		<category><![CDATA[OPPO Smart 5G]]></category>
		<category><![CDATA[PHONEARENA]]></category>
		<category><![CDATA[Poco F3]]></category>
		<category><![CDATA[prices]]></category>
		<category><![CDATA[Reno5 5G]]></category>
		<category><![CDATA[Series]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[smartphones]]></category>
		<category><![CDATA[Snapdragon 765G]]></category>
		<category><![CDATA[Snapdragon 780G]]></category>
		<category><![CDATA[Snapdragon 870]]></category>
		<category><![CDATA[Snapdragon X55 5G]]></category>
		<category><![CDATA[Vietnam]]></category>
		<category><![CDATA[Xiaomi]]></category>
		<category><![CDATA[Xiaomi Mi 11 Lite 5G]]></category>
		<guid isPermaLink="false">https://en.spress.net/new-series-of-smartphones-with-5g-good-prices-in-vietnam/</guid>

					<description><![CDATA[In addition to high-end smartphones, a series of major brands such as Samsung, Xiaomi, Oppo introduced 5G models in the mid-range price segment in the first half of 2021. Galaxy A32 5G was introduced in Vietnam at the end of March, priced at 7.7 million dong. Currently, products are reduced by 900,000 VND, to 6.8 [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>In addition to high-end smartphones, a series of major brands such as Samsung, Xiaomi, Oppo introduced 5G models in the mid-range price segment in the first half of 2021.</strong><br />
<span id="more-5299"></span> <img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/434105682e2ac7749e3b.jpg" width="625" height="416"> </p>
<p> <strong> Galaxy A32 5G</strong> was introduced in Vietnam at the end of March, priced at 7.7 million dong. Currently, products are reduced by 900,000 VND, to 6.8 million VND. This is one of the cheapest smartphones on the market with a 5G network connection. This shows that the South Korean tech giant is ready for the mid-range 5G smartphone war. Image: <em> Phone</em> <em> Arena</em> . <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/54482f610423ed7db432.jpg" width="625" height="416"> <em> The rear camera system of the machine is placed directly on the back, not in a square or rectangular frame, creating a modern, eye-catching feel. Most smartphones nowadays use perforated screens, this product still uses the rather old U-shaped design with the top notch. Machine with 6.5 inch screen, resolution reuse at HD +. The configuration of the Galaxy A32 5G includes MediaTek Helio D720 chip, 8 GB RAM, 128 GB internal memory, 5,000 mAh battery and 15 W fast charging capacity. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/aeefd6c6fd8414da4d95.jpg" width="625" height="420"> <strong> Reno5 5G</strong> (right) is the second Oppo smartphone in Vietnam with a 5G network connection next to Find X2. This product can be 5G compatible with all three major carriers including Viettel, Mobifone and Vinaphone. The device is equipped with Oppo Smart 5G technology to support receiving 5G or 4G signals according to the existing network status. <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/b900bf1c875e6e00374f.jpg" width="625" height="412"> <em> Oppo smartphone model has a slim and light design. It uses a 6.43 inch screen, AMOLED panel, Full HD resolution and 90 Hz refresh rate. The product owns Snapdragon 765G chip, 8 GB RAM, 256 GB internal memory, 4,300 mAh capacity battery, 65 W. Rono5 5G fast charging capacity is being sold for 10.7 million VND. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/c964b64d9d0f74512d1e.jpg" width="625" height="398"> <strong> Poco F3</strong> is on shelves in Vietnam at the end of March, priced at 10 million dong. Compared with competitors in the same price range, the machine has a strong configuration and a higher scanning frequency. Accordingly, the device uses Snapdragon 870 processor, 8 GB RAM and 256 GB internal memory. According to Xiaomi, the Snapdragon X55 5G chip allows the device to be compatible with many 5G networks around the world. Image: <em> GSMArena</em> . <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/0fe671cf5a8db3d3ea9c.jpg" width="625" height="416"> <em> This model owns a 6.67 inch screen, AMOLED panel, Full HD + resolution, 120 Hz refresh rate and 120 Hz touch sampling rate. The battery of the Poco F3 has a capacity of 4,520 mAh, fast charging capacity of 33 W. Photo: GSMArena. </em> <img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_18_119_38560124/048879a152e3bbbde2f2.jpg" width="625" height="351"> <strong> Xiaomi Mi 11 Lite 5G</strong> was launched in Vietnam on April 15, priced at 10.5 million dong. The product is equipped with Snapdragon 780G chip, 8 GB RAM, 128 GB internal memory, 5G network connection. Machine has many youthful colors such as yellow, blue and black. This is one of the thinnest and lightest smartphones available today. Accordingly, the machine weighs 159 grams and is 6.81 mm thick. The product has a fingerprint sensor built into the power key instead of the screen. Besides, the black version of Mi 11 Lite 5G uses glossy plastic material, easy to dirty. Image: <em> Sami Tech</em> .</p>
]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">5299</post-id>	</item>
		<item>
		<title>Cyber ​​weapons &#8211; Weapons of immeasurable danger</title>
		<link>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</link>
					<comments>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/#respond</comments>
		
		<dc:creator><![CDATA[CTV Lê Ngọc/VOV.VN (theo topwar.ru)]]></dc:creator>
		<pubDate>Thu, 15 Apr 2021 07:28:29 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[APCS]]></category>
		<category><![CDATA[Apple II]]></category>
		<category><![CDATA[BELL]]></category>
		<category><![CDATA[Botnet]]></category>
		<category><![CDATA[Computer virus]]></category>
		<category><![CDATA[Computer worm]]></category>
		<category><![CDATA[Container ship]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[danger]]></category>
		<category><![CDATA[Digital]]></category>
		<category><![CDATA[Evergreen Group]]></category>
		<category><![CDATA[Gas]]></category>
		<category><![CDATA[immeasurable]]></category>
		<category><![CDATA[Malignant software]]></category>
		<category><![CDATA[Network connections]]></category>
		<category><![CDATA[Robert Morris]]></category>
		<category><![CDATA[Rootkit]]></category>
		<category><![CDATA[Stuxnet virus]]></category>
		<category><![CDATA[Suez Canal]]></category>
		<category><![CDATA[Tankers]]></category>
		<category><![CDATA[Trojan]]></category>
		<category><![CDATA[virus]]></category>
		<category><![CDATA[Weapons]]></category>
		<guid isPermaLink="false">https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/</guid>

					<description><![CDATA[The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently. The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><strong>The downside of digital is the risk of being attacked by cyber weapons &#8211; a problem that has been of particular interest to experts in many fields and the media recently.</strong><br />
<span id="more-976"></span> </p>
<p>The modern world is being &#8220;digitized&#8221; at a rapid rate. Almost every service, every industry, from finance, industrial enterprises, &#8230; to the armed forces, is already networked at one level or another. In the &#8220;smart home&#8221; with TVs, refrigerators, vacuum cleaners, washing machines, microwave ovens &#8230;, and even smart light bulbs are becoming common; On the street, there were the first cars with autonomous driving systems.</p>
<p>Such devices are expected to make people&#8217;s lives easier, but certainly these technologies will also be applied in other areas as well. While digital systems and services make the quality of human life much better, in theory all digital systems can be hacked &#8211; which is already in practice. positive.</p>
<p><strong>Computer virus</strong></p>
<p>Theoretical basis for the development of the &#8220;computer virus&#8221; was formed almost simultaneously with the emergence of the computer itself in the mid-20th century. In 1961, engineers Viktor Vysotsky, Doug McIlroy and Robert Morris of the Room Bell&#8217;s telephone experiment had developed programs that could make copies of themselves &#8211; the first viruses. They are created in the form of a game that engineers call &#8220;Darwin&#8221;, the purpose of which is to send bots to friends to see which will destroy more of the competitors&#8217; programs and create more copies of itself to fill someone else&#8217;s computer.</p>
<p><img fifu-featured="1" decoding="async" loading="lazy" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/984065cd4f8fa6d1ff9e.jpg" width="625" height="397"></p>
<p><em>Cyber ​​weapons are said to be equally complex and are weapons of mass destruction; Source: topwar.ru</em></p>
<p>In 1981, Virus 1,2,3 and Elk Cloner appeared on Apple II personal computers; a few years later, the first anti-virus programs appeared. The word &#8220;computer virus&#8221; in fact includes many types of malware: worms, hijackers (rootkits), spyware, zombies, adware, virus blocking (winlock), Trojan viruses (trojans) and their combination. If the first viruses are often written for entertainment, over time they begin to be &#8220;commercialized&#8221; &#8211; to steal personal and financial data, disrupt device operations, encrypt the data. for the purpose of blackmail &#8230;</p>
<p>With the advent of electronic money, computer viruses received a new function &#8211; bringing the user&#8217;s computer &#8220;as a slave&#8221; to mining cryptocurrency, forming a huge network of computers. botnet infection (before that, botnet also existed, such as to send spam mail or DDoS attack). Opportunities like this cannot help but make the military and intelligence agencies in general with missions &#8211; steal something, destroy something &#8230;, care.</p>
<p><strong>Computer virus &#8211; a strategic weapon</strong></p>
<p>On June 17, 2010, for the first time in history, the win32 / Stuxnet virus &#8211; a computer worm that infects not only computers running the Microsoft Windows operating system, but also industrial systems that control the processes. automatic production, detected. This worm can be used as a means of gathering unauthorized data (spying) and sabotaging automated process control systems (APCS) of industrial enterprises, power plants, boilers, etc.</p>
<p>According to cybersecurity experts, this virus is the most complex software product, developed by a professional team of dozens of experts. In terms of complexity, it can be compared to a Tomahawk cruise missile, and is designed for cyber operations. The Stuxnet virus has damaged some uranium enrichment centrifuges, slowing down Iran&#8217;s nuclear program. Intelligence agencies of Israel and the US are suspected of developing the Stuxnet virus.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/5397a01a8a5863063a49.jpg" width="625" height="391"></p>
<p><em>Industrial facilities, infrastructure, services &#8230; all can be targets of cyber weapons; Source: topwar.ru</em></p>
<p>Later, other computer viruses were discovered, with a degree of complexity similar to that of win32 / Stuxnet (most suspected of being an Israeli / US product), such as: Duqu, designed to collect confidential data in a confidential manner; Wiper (late April 2012), destroyed all information on some of the servers of one of the largest oil companies in Iran and completely paralyzed its work for a few days; Flame, a spy virus, is believed to be developed specifically for attacks on Iran&#8217;s computer infrastructure (can identify mobile devices with Bluetooth module, track location, stealing confidential information and eavesdropping on conversations); Gauss, aimed at stealing financial information: e-mail, passwords, bank account data, cookies, as well as system configuration data; Maadi (suspected of Iran) &#8211; can collect information, remotely change computer parameters, record audio and transmit it to remote users &#8230;</p>
<p><strong>Application</strong></p>
<p>In the Middle East, for example, the largest producer of liquid natural gas (LNG), has an interest that seriously conflicts with the interests of another country. The Middle East country has a network of oil and gas pipelines, LNG production lines and a fleet of Q-Flex and Q-Max tankers designed to transport LNG and has a military base of the third country. three are on its territory. An armed attack directly on a Middle Eastern country could do more harm than good. Then, the solution might be the use of cyber weapons.</p>
<p>Modern oil and container ships are becoming more and more automated; No less automation is used in LNG plants. Therefore, specialized malware is loaded into the control systems of the Q-Flex and Q-Max tankers, or their LPG storage systems, theoretically permissible at a certain time ( or on an external command, if there is a network connection) creates an artificial accident that completely or partially destroys selected tanks / tanks. It is very likely that flaws in the LNG production process lead to neutralization, including potentially destroying the plant.</p>
<p><img decoding="async" loading="lazy" class="lazy-img" src="https://photo-baomoi.zadn.vn/w700_r1/2021_04_15_65_28937588/2c2cdda1f7e31ebd47f2.jpg" width="625" height="359"></p>
<p><em>Cyber ​​weapons can easily have the same effects as the recent Suez Canal clogging; Source: topwar.ru</em></p>
<p>An explosion of an LNG carrier due to an accident at the entrance to a port or the failure of the LNG storage device can not only result in damage to the vessel itself, but also damage to coastal infrastructure. The goals could therefore be: undermine the energy supplier&#8217;s reputation, with the possibility of consumers reorienting the natural gas market of another country; increasing prices for world energy sources, helping to generate more revenue for the national budget; undermining political activity and interfering in the internal affairs of other countries in the region, due to a decrease in the financial capacity of the country in question.</p>
<p>Depending on the economic damage inflicted, a complete shift in ruling elites could occur, as well as a limited conflict between that state and its neighbors, who may want to take advantage of neighboring countries&#8217; weaknesses to change the balance of power in the region. The crux of this activity is secrecy, so that there is no direct blame without clear evidence. The United States has repeatedly been accused of conducting hostile operations against even its most staunchest allies.</p>
<p>Another option for using cyber weapons has been suggested by a recent incident. A giant ship &#8211; an oil tanker or a container ship, passing through a narrow canal, suddenly the control system gives out a series of commands to dramatically change the direction and speed of movement, resulting in the ship spinning break and completely block the channel. It can even be flipped, making it extremely time-consuming and costly to rescue it. The Evergreen Group&#8217;s container ship blocking the Suez Canal shows how congestion of shipping arteries affects the global economy. It is especially effective if such incidents occur simultaneously on several channels.</p>
<p>Or most recently, Iran is accusing Israel of terrorizing its Natanz nuclear base network &#8230; In the absence of a clear trace of the culprit, it would be extremely difficult to establish &#8211; anyone can also be blamed for this. Therefore, the development of industrial-scale cyber weapons is considered to be a top priority. Information technology along with nanotechnology and biotechnology are the cornerstones of dominance in the 21st century, but the development of cyber weapons is much cheaper than the development of promising nano biotechnology. and conventional modern weapons ./.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://en.spress.net/cyber-%e2%80%8b%e2%80%8bweapons-weapons-of-immeasurable-danger/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">976</post-id>	</item>
	</channel>
</rss>