Windows Hello Fingerprint Setup

Window 10 added new features on security which is the extra layer to verify the login through finger print . We all know finger print will be unique and easy to us to login so we don’t need to remember the window password. Go to Settings > Accounts 2. Scroll to Windows Hello and click on Set Up in the Fingerprint section 3. Click on Get Started 4. You need to key in PIN number.  If you didn’t create the Pin number then first you have to create...
More

Issue to Login through Remote Desktop Connection

While Login to Remote Desktop Connection are you receiving the error, an authentication error has occurred. Then you have to update the Operating system. If you cannot update the operating system then follow the step.     The Steps are. On Window Icon, type gpedit             2. Go to Local Computer Policy > Computer Configuration > Administrative Templates > System>          Credentials Delegation &gt...
More

Nagarjun Hike

Situated north-west of Kathmandu and it is part of Shivapuri National Park. At top of hill, Jamacha Monastery is located. We can start the hike  from the Gate of Nagarjun near by Balaju Bypass. Time Duration: 4-5 Hrs Some Pictures of the Hike Back to Main Event
More

IT Security with NRB Perspective

Date:  Saturday, 9th December 2017 Venue:  Central Plaza, 6th Floor, Narayan Chour, Naxal, Kathmandu, Nepal Organize: National Banking Institute Ltd. URL: http://nbi.com.np/program/it-risk-management-nrb-perspective Program Highlights  IT Risk Landscape in Financial industry  Introduction to Information Security  Why, What and How of Information Security  IT Governance  NRB Requirement for IT Risks Management  Data Privacy and PII Information  Threat Agents and Emergin...
More

Conference on Cyber Security and SWIFT Hacking

Date:  Thursday, 30th  November 2017 Venue:  Hyatt Regency Kathmandu, Nepal Organize: National Banking Institute Ltd. URL: http://nbi.com.np/program/conference-cyber-security-swift-hacking  Program Highlights  Latest tend in cyber crime with context to high profile cases.  Best practices for incident response  Information security program and related policies plans and programs.  Regulatory Enforcement action. Some Pictures of the Event Back to Main Event
More