• Message
    Notification

    Score: 134
    Top Discussions
    Discussion Topics
    Saved Posts
    Events
    Announcment
    Tags
    telebirr
    telegebeya
    Fixed Broadband
    DNS and Hosting
    Cloud Services
    Packages
    4G/5G
    Phone & Device
    CRBT
    International
    VAS Services
    Digital lifestyle
    Events
    INTERNATIONAL SERVICES
    ኢንተርናሽናል ገንዘብ መቀበያ መንገድ
    Doni Tamrat
    Posted 3 months ago

    በሀገራችን እጅግ በጣም ብዙ ሰዎች ኢትዮጲያ ውስጥ ተቀምጠው ውጭ ሀገር የሚገኙ የኦንላይን ስራዎችን ይሰራሉ ። አብዛኛዎቹ የኦንላይን ስራዎች የሚከፍሉት በ Pay Pal ነው። ከፔይፓል ገንዘብ አውጥቶ ወደ ኢትዮጲያ ለማስገባት ምንም አይነት አመቺ ሁኔታ የለም ። ይህ ከውጪ የሚመጣ ገንዘብ ሀገራችን ውስጥ ቢገባ ሀገሪቷን የውጪ ምንዛሬ እጥረቷን ይቀርፋል። ስለዚህ ቴሌብር ከውጭ ሀገር የፋይናንስ ድርጅቶች ጋር ራሱን በማስተሳሰር በቀጥታ የሰራነውን ገንዘብ የምንቀበልበትን ሲስተም ቢያዘጋጅ ለሀገራችንም አንድ እርምጃ ይሆናል ብዬ አስባለሁ። ምን ታስባላችሁ ?

    #TELEBIRR_#ETHIOTELECOM_#TELEBIRRSUPERAPP
    Like
    3
    Answers
    Share
    Add Suggestion or Answer
    No file chosen
    CATEGORIES
    PACKAGESTELEBIRRTELEGEBEYAFIXED BROADBANDDOMAIN NAME & HOSTINGCLOUD SERVICES4G/5GPHONE AND DEVICECRBTINTERNATIONAL SERVICESVAS SERVICESDIGITAL LIFESTYLEVOLTERCSMMSVMS
    READ MORE
    PACKAGES
    Helpful for you reply
    How i can getaway update the level 3 telebir
    By Mahamud Roble 3 months ago 5 1117
    DIGITAL LIFESTYLE
    Cannot create value or key, Error writing to the registry
    When some Windows users tried creating value or key in Registry Editor, they failed due to lack...
    By Chimdesa Diriba 6 months ago 4 149
    PACKAGES
    Asham tele
    How many of you are redeem points from asham tele to different package.
    By LALISA TADESA 5 months ago 6 938
    4G/5G
    IoT vs Smart City | ንፅፅር “የኢንተርኔት ነገሮች” እና “ብልህ ከተማ”
    IoT, or the Internet of Things, refers to the network of everyday physical objects embedded...
    By Tariku Birhanu 8 months ago 3 1125
    VOLTE
    Prosperous of Ethiopia
    New style Ethiopian
    By TESHALE TESHOME 2 months ago 0 185
    © 2024 teleforum
    FAQ Terms & Conditions Privacy
    Message Notification Score: 134 Top Discussions Discussion Topics Saved Posts Events Announcment Tags telebirr telegebeya Fixed Broadband DNS and Hosting Cloud Services Packages 4G/5G Phone & Device CRBT International VAS Services Digital lifestyle Events INTERNATIONAL SERVICES ኢንተርናሽናል ገንዘብ መቀበያ መንገድ Doni Tamrat Posted 3 months ago በሀገራችን እጅግ በጣም ብዙ ሰዎች ኢትዮጲያ ውስጥ ተቀምጠው ውጭ ሀገር የሚገኙ የኦንላይን ስራዎችን ይሰራሉ ። አብዛኛዎቹ የኦንላይን ስራዎች የሚከፍሉት በ Pay Pal ነው። ከፔይፓል ገንዘብ አውጥቶ ወደ ኢትዮጲያ ለማስገባት ምንም አይነት አመቺ ሁኔታ የለም ። ይህ ከውጪ የሚመጣ ገንዘብ ሀገራችን ውስጥ ቢገባ ሀገሪቷን የውጪ ምንዛሬ እጥረቷን ይቀርፋል። ስለዚህ ቴሌብር ከውጭ ሀገር የፋይናንስ ድርጅቶች ጋር ራሱን በማስተሳሰር በቀጥታ የሰራነውን ገንዘብ የምንቀበልበትን ሲስተም ቢያዘጋጅ ለሀገራችንም አንድ እርምጃ ይሆናል ብዬ አስባለሁ። ምን ታስባላችሁ ? #TELEBIRR_#ETHIOTELECOM_#TELEBIRRSUPERAPP Like 3 Answers Share Add Suggestion or Answer No file chosen CATEGORIES PACKAGESTELEBIRRTELEGEBEYAFIXED BROADBANDDOMAIN NAME & HOSTINGCLOUD SERVICES4G/5GPHONE AND DEVICECRBTINTERNATIONAL SERVICESVAS SERVICESDIGITAL LIFESTYLEVOLTERCSMMSVMS READ MORE PACKAGES Helpful for you reply 👍 How i can getaway update the level 3 telebir By Mahamud Roble 3 months ago 5 1117 DIGITAL LIFESTYLE Cannot create value or key, Error writing to the registry When some Windows users tried creating value or key in Registry Editor, they failed due to lack... By Chimdesa Diriba 6 months ago 4 149 PACKAGES Asham tele How many of you are redeem points from asham tele to different package. By LALISA TADESA 5 months ago 6 938 4G/5G IoT vs Smart City | ንፅፅር “የኢንተርኔት ነገሮች” እና “ብልህ ከተማ” IoT, or the Internet of Things, refers to the network of everyday physical objects embedded... By Tariku Birhanu 8 months ago 3 1125 VOLTE Prosperous of Ethiopia New style Ethiopian By TESHALE TESHOME 2 months ago 0 185 © 2024 teleforum FAQ Terms & Conditions Privacy
    Yay
    Like
    Love
    Angry
    17
    3 Answers 0 Shares
  • #telebirr #DNS #host
    #telebirr #DNS #host
    Love
    1
    0 Answers 0 Shares
  • Common Types of Malware
    While there are a variety of malware types and sub-types, there are 11 specific types of malware that are considered the most common. These types of malware include:

    1. Ransomware
    Ransomware is a virus that encrypts all the files on an infected device. Once encrypted, the device becomes unusable because none of the data stored on it can be accessed.

    Ransomware attacks will request a ransome in exchange for a decryption key that will unlock a device’s files. As there is no guarantee that the hacker will release the decryption key, paying a ransom is not an ideal solution. To prevent ransomware attacks, keep a current backup of all your files on hand so you can restore you device yourself.

    Types of Ransomware:

    Rogue Security Software: Rogue security software is a type of ransomware that poses as a virus or security breach. Users are required to pay the rogue software to remove the fake issue.
    Crypto-malware: Ransomwares that request ransoms in cryptocurrency are frequently referred to as crypto-malware.
    2. Fileless Malware
    Fileless malware is a type of malware that uses macros and system tools to invade a system rather than executable files. This type of malware will edit already installed files, which many systems recognize as legitimate. Fileless malware is difficult to protect against because there is no malicious program installed.

    To protect your devices against fileless malware, limit login credentials and knowledge. Multifactor authentication is also an additional protective element that can keep hackers from infiltrating a system and running stealth operations unknowingly.

    3. Adware
    Adware does exactly what the name suggests — tracks internet surfing habits and suggests ads and spam to the user. While this type of malware doesn’t install anything onto your device, it can hamper performance which can make your items more vulnerable to other types of attacks.

    Adware that plants malicious ads onto a users device is known as malvertising. These types of malware are intended to plant dangerous code onto a device when a link, pop-up or advertisment is clicked on. Updated operating systems and spam filters can help protect devices against adware.

    4. Trojans
    Trojans, named after the Greek legend of the Trojan Horse, are a type of malware that sneaks onto a victim’s device. Once installed, the trojan waits to be activated before attacking.

    This form of malware may delete and damage data or simply create a backdoor, allowing hackers to access and use the infected device when they choose. Trojans are a popular way to connect devices to botnets — another type of malware — or launch distributed denial-of-service attacks (DDoS).

    5. Spyware
    Modern systems are designed to protect passwords and sensitive data using encryption. Spyware helps attackers get around and break down encrypted data.

    Once installed, spyware collects and logs usage data — including the websites you visit, credentials you use and keyboard buttons you push. This information is periodically updated, reported and reassembled, allowing the hacker to read your passwords and use them to break into your online accounts.

    Types of spyware:

    Keyloggers: Keyloggers are a type of spyware that monitors the keystrokes on your keyboard. These can be used to steal password data, bank information and more.
    Grayware: While not a form of malware itself, grayware can affect the performance of a device as well as monitor its user’s behaviors and history.
    RAM scrapers: RAM scrapers steal and store data from devices before it can be encrypted. For example, point-of-sale devices temporarily store credit card information, which can be monitored and stolen by RAM scrapers.
    6. Viruses
    Viruses may be one of the most commonly known types of malware. These invaders can affect device speed and performance, steal sensitive data, damage and destroy files and create backdoor opportunities for larger scale attacks.

    Viruses depend on host applications to run and survive. Removing a virus requires users to also remove its host. Additionally, viruses can infect additional systems, and downloading antivirus software is the best way to prevent this type of malware from affecting your devices.

    Type of Virus:

    Logic bombs: Logic bombs will only attack a system once they have been triggered. These triggers can be a certain date and time, a specific number of logins or the startup of a certain application. These are used by viruses to deliver malicious code at specified times, and they can go completely undetected until triggered.
    7. Worms
    A worm is a type of virus designed to copy itself and spread to devices on a shared network. This means that an infection on your home PC can quickly spread to your laptop, phone and any other systems connected to the same network.

    While the infection may not necessarily damage or delete files, it can cause your devices and network to slow down or become unresponsive. This type of malware may also use your digital address book to email itself to other people you know, potentially infecting their devices, too.

    8. Rootkits
    Injected into applications and firmware, rootkits are a type of malware that give hackers complete remote control of an infected device. Because this software gives attackers administrative privileges, they can conceal other malware attacks and affect different types of files.

    Rootkits were not initially created as malware, but their remote capabilities have made them a favorite attack option of hackers. Multiauthentication and limited administrative credentials can help protect against this malware type.

    9. Botnets
    A botnet, made up of bots, is a software that is able to follow automated, remote commands. While many botnets and bots are used for important, legitimate tasks — like search engine indexing — they can also be used as a type of malware that attacks central servers.

    If botnets are used for flood attacks like DDoS attacks, they can incapacitate systems, servers and devices. Additionally, botnets can include large numbers of technological devices, so they can be difficult to shut down completely.

    10. Mobile Malware
    Unlike traditional types of malware, mobile malware is designed to target a specific type of device: mobile devices. Mobile malware for smartphones, tablets and other mobile devices can spy on user actions, steal credentials, overtake administrative privileges and more.

    Mobile malware is frequently spread through SMS phishing (smishing) and text message scams. Trojans, ransomware and adware targeting mobile devices can also be considered mobile malware. Additionally, jailbroken phones are at a higher risk of a mobile malware invasion.

    11. Wiper Malware
    Wiper malware is a type of malware with the sole purpose of erasing data and making it unrecoverable. Many attackers who use wiper malware use this type of attack to target both private and public businesses.

    Wiper malware is also used after other malware attacks. Because it can erase and destroy data, attackers will use wipler malware to remove traces of invasions, which can make organizational recovery difficult to impossible.
    Common Types of Malware While there are a variety of malware types and sub-types, there are 11 specific types of malware that are considered the most common. These types of malware include: 1. Ransomware Ransomware is a virus that encrypts all the files on an infected device. Once encrypted, the device becomes unusable because none of the data stored on it can be accessed. Ransomware attacks will request a ransome in exchange for a decryption key that will unlock a device’s files. As there is no guarantee that the hacker will release the decryption key, paying a ransom is not an ideal solution. To prevent ransomware attacks, keep a current backup of all your files on hand so you can restore you device yourself. Types of Ransomware: Rogue Security Software: Rogue security software is a type of ransomware that poses as a virus or security breach. Users are required to pay the rogue software to remove the fake issue. Crypto-malware: Ransomwares that request ransoms in cryptocurrency are frequently referred to as crypto-malware. 2. Fileless Malware Fileless malware is a type of malware that uses macros and system tools to invade a system rather than executable files. This type of malware will edit already installed files, which many systems recognize as legitimate. Fileless malware is difficult to protect against because there is no malicious program installed. To protect your devices against fileless malware, limit login credentials and knowledge. Multifactor authentication is also an additional protective element that can keep hackers from infiltrating a system and running stealth operations unknowingly. 3. Adware Adware does exactly what the name suggests — tracks internet surfing habits and suggests ads and spam to the user. While this type of malware doesn’t install anything onto your device, it can hamper performance which can make your items more vulnerable to other types of attacks. Adware that plants malicious ads onto a users device is known as malvertising. These types of malware are intended to plant dangerous code onto a device when a link, pop-up or advertisment is clicked on. Updated operating systems and spam filters can help protect devices against adware. 4. Trojans Trojans, named after the Greek legend of the Trojan Horse, are a type of malware that sneaks onto a victim’s device. Once installed, the trojan waits to be activated before attacking. This form of malware may delete and damage data or simply create a backdoor, allowing hackers to access and use the infected device when they choose. Trojans are a popular way to connect devices to botnets — another type of malware — or launch distributed denial-of-service attacks (DDoS). 5. Spyware Modern systems are designed to protect passwords and sensitive data using encryption. Spyware helps attackers get around and break down encrypted data. Once installed, spyware collects and logs usage data — including the websites you visit, credentials you use and keyboard buttons you push. This information is periodically updated, reported and reassembled, allowing the hacker to read your passwords and use them to break into your online accounts. Types of spyware: Keyloggers: Keyloggers are a type of spyware that monitors the keystrokes on your keyboard. These can be used to steal password data, bank information and more. Grayware: While not a form of malware itself, grayware can affect the performance of a device as well as monitor its user’s behaviors and history. RAM scrapers: RAM scrapers steal and store data from devices before it can be encrypted. For example, point-of-sale devices temporarily store credit card information, which can be monitored and stolen by RAM scrapers. 6. Viruses Viruses may be one of the most commonly known types of malware. These invaders can affect device speed and performance, steal sensitive data, damage and destroy files and create backdoor opportunities for larger scale attacks. Viruses depend on host applications to run and survive. Removing a virus requires users to also remove its host. Additionally, viruses can infect additional systems, and downloading antivirus software is the best way to prevent this type of malware from affecting your devices. Type of Virus: Logic bombs: Logic bombs will only attack a system once they have been triggered. These triggers can be a certain date and time, a specific number of logins or the startup of a certain application. These are used by viruses to deliver malicious code at specified times, and they can go completely undetected until triggered. 7. Worms A worm is a type of virus designed to copy itself and spread to devices on a shared network. This means that an infection on your home PC can quickly spread to your laptop, phone and any other systems connected to the same network. While the infection may not necessarily damage or delete files, it can cause your devices and network to slow down or become unresponsive. This type of malware may also use your digital address book to email itself to other people you know, potentially infecting their devices, too. 8. Rootkits Injected into applications and firmware, rootkits are a type of malware that give hackers complete remote control of an infected device. Because this software gives attackers administrative privileges, they can conceal other malware attacks and affect different types of files. Rootkits were not initially created as malware, but their remote capabilities have made them a favorite attack option of hackers. Multiauthentication and limited administrative credentials can help protect against this malware type. 9. Botnets A botnet, made up of bots, is a software that is able to follow automated, remote commands. While many botnets and bots are used for important, legitimate tasks — like search engine indexing — they can also be used as a type of malware that attacks central servers. If botnets are used for flood attacks like DDoS attacks, they can incapacitate systems, servers and devices. Additionally, botnets can include large numbers of technological devices, so they can be difficult to shut down completely. 10. Mobile Malware Unlike traditional types of malware, mobile malware is designed to target a specific type of device: mobile devices. Mobile malware for smartphones, tablets and other mobile devices can spy on user actions, steal credentials, overtake administrative privileges and more. Mobile malware is frequently spread through SMS phishing (smishing) and text message scams. Trojans, ransomware and adware targeting mobile devices can also be considered mobile malware. Additionally, jailbroken phones are at a higher risk of a mobile malware invasion. 11. Wiper Malware Wiper malware is a type of malware with the sole purpose of erasing data and making it unrecoverable. Many attackers who use wiper malware use this type of attack to target both private and public businesses. Wiper malware is also used after other malware attacks. Because it can erase and destroy data, attackers will use wipler malware to remove traces of invasions, which can make organizational recovery difficult to impossible.
    Like
    Yay
    Love
    8
    6 Answers 0 Shares
  • What is FTP server and how does it work?

    File Transfer Protocol Server is a computer that provides file storage and access services on the Internet. They provide services in accordance with the FTP protocol. FTP, the file transfer protocol is a set of standard protocols for file transfer on the network, using the client/server model. FTP is a protocol specifically used to transfer files.

    FTP is a client/server system. Users use a client that supports the File FTP Protocol connect to a server program on a remote host. The user issues a command on the client, and the remote host server executes the command issued by the user after receiving the command, and returns the execution result to the client. Simply put, the user sends a command to the server, asking the server to send a file to the user. The server responds and sends the file to the client. The user receives the file and places it in the user's working directory. This process is carried out by the FTP server.

    How Does FTP Server Work?
    FTP is based on the TCP protocol service, which is a file transfer protocol on the Internet. By default, two ports 20 and 21 are used, a data port and a command port, and port 20 is a data port for file transfer between the client and the server data flow. Port 21 is a command port used to transmit control flow and accept related FTP commands and parameters issued by the client.
    What is FTP server and how does it work? File Transfer Protocol Server is a computer that provides file storage and access services on the Internet. They provide services in accordance with the FTP protocol. FTP, the file transfer protocol is a set of standard protocols for file transfer on the network, using the client/server model. FTP is a protocol specifically used to transfer files. FTP is a client/server system. Users use a client that supports the File FTP Protocol connect to a server program on a remote host. The user issues a command on the client, and the remote host server executes the command issued by the user after receiving the command, and returns the execution result to the client. Simply put, the user sends a command to the server, asking the server to send a file to the user. The server responds and sends the file to the client. The user receives the file and places it in the user's working directory. This process is carried out by the FTP server. How Does FTP Server Work? FTP is based on the TCP protocol service, which is a file transfer protocol on the Internet. By default, two ports 20 and 21 are used, a data port and a command port, and port 20 is a data port for file transfer between the client and the server data flow. Port 21 is a command port used to transmit control flow and accept related FTP commands and parameters issued by the client.
    Like
    2
    3 Answers 0 Shares
  • What is the maximum number of IP address that can be assigned ti hosts on a local subnet that uses the 255.255.255.224 subnet mask
    What is the maximum number of IP address that can be assigned ti hosts on a local subnet that uses the 255.255.255.224 subnet mask
    0
    0.00%
    1
    50.00%
    1
    50.00%
    0
    0.00%
    Like
    Wow
    2
    5 Answers 0 Shares
  • If a host on a network has the address 172.16.45.14/30, What is the address of the subnetwork to Which this host belongs?
    If a host on a network has the address 172.16.45.14/30, What is the address of the subnetwork to Which this host belongs?
    0
    0.00%
    0
    0.00%
    0
    0.00%
    2
    100.00%
    Like
    1
    4 Answers 0 Shares
  • The size of Host bits in class C of IP address is
    The size of Host bits in class C of IP address is
    1
    20.00%
    4
    80.00%
    0
    0.00%
    0
    0.00%
    Like
    2
    4 Answers 0 Shares
  • What is a VLAN?
    VLANs (Virtual LANs) are logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. Each VLAN acts as a subgroup of the switch ports in an Ethernet LAN.

    VLANs can spread across multiple switches, with each VLAN being treated as its own subnet or broadcast domain. This means that frames broadcasted onto the network will be switched only between the ports within the same VLAN.

    A VLAN acts like a physical LAN, but it allows hosts to be grouped together in the same broadcast domain even if they are not connected to the same switch. Here are the main reasons why VLANs are used:

    VLANs increase the number of broadcast domains while decreasing their size.
    VLANs reduce security risks by reducing the number of hosts that receive copies of frames that the switches flood.
    you can keep hosts that hold sensitive data on a separate VLAN to improve security.
    you can create more flexible network designs that group users by department instead of by physical location.
    network changes are achieved with ease by just configuring a port into the appropriate VLAN.
    What is a VLAN? VLANs (Virtual LANs) are logical grouping of devices in the same broadcast domain. VLANs are usually configured on switches by placing some interfaces into one broadcast domain and some interfaces into another. Each VLAN acts as a subgroup of the switch ports in an Ethernet LAN. VLANs can spread across multiple switches, with each VLAN being treated as its own subnet or broadcast domain. This means that frames broadcasted onto the network will be switched only between the ports within the same VLAN. A VLAN acts like a physical LAN, but it allows hosts to be grouped together in the same broadcast domain even if they are not connected to the same switch. Here are the main reasons why VLANs are used: VLANs increase the number of broadcast domains while decreasing their size. VLANs reduce security risks by reducing the number of hosts that receive copies of frames that the switches flood. you can keep hosts that hold sensitive data on a separate VLAN to improve security. you can create more flexible network designs that group users by department instead of by physical location. network changes are achieved with ease by just configuring a port into the appropriate VLAN.
    Like
    Haha
    Wow
    5
    5 Answers 0 Shares
  • What is the difference between ipconfig and ifconfig commands?

    IPCONFIG stands for Internet Protocol Configuration. This is a command-line application that displays all the current TCP/IP (Transmission Control Protocol/Internet Protocol) network configuration, refreshes the DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name Server). It also displays IP address, subnet mask, and default gateway for all adapters. It is available for Microsoft Windows, ReactOS, and Apple macOS. ReactOS version was developed by Ged Murphy and licensed under the General Public License.

    ifconfig(interface configuration) command is used to configure the kernel-resident network interfaces. It is used at boot time to set up the interfaces as necessary. After that, it is usually used when needed during debugging or when you need system tuning. Also, this command is used to assign the IP address and netmask to an interface or to enable or disable a given interface.
    What is the difference between ipconfig and ifconfig commands? IPCONFIG stands for Internet Protocol Configuration. This is a command-line application that displays all the current TCP/IP (Transmission Control Protocol/Internet Protocol) network configuration, refreshes the DHCP (Dynamic Host Configuration Protocol) and DNS (Domain Name Server). It also displays IP address, subnet mask, and default gateway for all adapters. It is available for Microsoft Windows, ReactOS, and Apple macOS. ReactOS version was developed by Ged Murphy and licensed under the General Public License. ifconfig(interface configuration) command is used to configure the kernel-resident network interfaces. It is used at boot time to set up the interfaces as necessary. After that, it is usually used when needed during debugging or when you need system tuning. Also, this command is used to assign the IP address and netmask to an interface or to enable or disable a given interface.
    Like
    Love
    Haha
    4
    4 Answers 1 Shares
  • How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
    How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
    0
    0.00%
    0
    0.00%
    2
    100.00%
    0
    0.00%
    Like
    2
    3 Answers 0 Shares
More Results