Inner Page Banner

Who invented the Internet? The story behind the creation of the Internet!

Posted By - Posted In Internet

8 Feb 2022

blank image

The Internet was introduced by connecting a few computers to a network structure. No one knew then that the Internet would be transformed into such a virtual world as it is today. No one or company has made this physical and virtual network as large as the Internet.



Over the years, many computer scientists, engineers, programmers have transformed a connected network into many features in today’s Internet.



So, the Internet’s inventor’s contribution should not be given to a single person or a single organization.



Not only a complete network but also many important technologies related to it, such as IP address, domain, email, packet transferring, make the Internet fully functional.



And they did not make one, many of the pioneers have discovered these things over the years


ArpNet is portrayed as the model and model of the modern Internet.


The basic infrastructure of the modern Internet was first revealed in ArpNet. Arpanet was created to make American military communications more efficient and efficient.



The idea of ​​the modern Internet, the World Wide Web, began with a wide area network. And the network name was Arpanet.


This ARPANET was a network developed by the American Advanced Research Agency (Advanced Research Projects Agency Network or ARPANET).



The first was Arpenet’s Idea for a Network and created by American scientist Robert Taylor. The work of this intercomputer network, called ArpNet, started in 1966.


The network, as well as the University of the city and the area, formed a regional energy network linked to the mainframe computer of the research institute.



Raymond Tomlinson later tested the first e-mail by sending the first electronic mail.



On the modern internet, data transfer is done through packet switching/data packets. Whatever data is here, it is divided into a few lyrical and numbered packets.



And interestingly, this packet-switching technology was used to transmit data to ArpNet. Accessing from one computer to another using ArpNet was very easy.



This ARPANET model, adopted by the modern  Internet, has gradually become better and better since 1966.


Vincent Surf and Robert Kahn are two of the legends behind the creation of the modern Internet.



Because they invented Internet Protocol (IP Address) and Transmission Control Protocol (TCP).



With the discovery of technology in the mid-9’s, any type of Internet communication could be handled over HTTP or FTP through this IP address.



IP and TCP are called Internet Protocol Suites. Here communication between one IP address to another IP address makes TCP more reliable.



The current modern Internet connection is the Internet Protocol Suite.



You can access different pages or files of major mainframe computers or servers using IP addresses like numbers. However, remembering these big numbers is sometimes difficult, so a new part of the modern Internet introduced in 1985 is “domain name”.



In 1970, ArpNet introduced another revolution in communication, through the discovery of e-mail systems for communication.



Raymond Tomlinson was the originator of the email and electronic mail system. He was the one who picked this @simble for email.



Although initially used with IP address, this @ Symbol is also used to create an email address with domain address/name and it is happening.



In 1971 fast he sent an experimental mail, and he wrote in the mail “something like QWERTYUIOP”.


In 1990, Tim Berners Lee created HyperText MarkUp Language or HTML Language.



 The language used to publish the document in web version is still being done today.



 It gradually started to officially create webpages and became associated with many more languages.



 Tim Berners-Lee launched his first website on the Internet on August 6, 1991, where he described the web’s role in search of information. This was basically the introduction of the World Wide Web (www?).



Technology is vast and changing anytime, every time somebody is changing, enhancing and enriching the technology.



Therefore, one cannot be recognized for the technical invention. In the age of the Internet, the pioneers are the laborers of scientists, computer scientists, programmers, engineers.



No one has brought the Internet to such an extent today. With the efforts of these pioneering people, today’s Internet has turned into an “information superhighway.”


Although experimental and practical of the Internet was seen through Arpenet in 1966.


Yet many people have long dreamed of an active network like the Internet.



Nicola Tesla, the inventor of modern electricity, introduced the idea of ​​the “World Wireless System” in 1900, a program that was similar to the modern Internet.



From 1930 to 1940, technology visionaries Paul Otlet and Vanivar developed bus books and media files for searchable or searchable storage systems.



The launch of the modern Internet begins with the use of “packet switching” data transfer technology created by Scientific LickLider at ArpNet.

What to do if your favorite website doesn’t load suddenly?

Posted By - Posted In Internet

8 Feb 2022

blank image

If you do not load sites like Facebook or Twitter suddenly it is normal, as these sites may be blocked from your office or workplace.



But your favorite websites, there is no reason to get frustrated if you do not load.



In this article, I have shared some tricks that will tell you what to do if your favorite website does not load suddenly!



Probable cause


There are many reasons not to load a website, but no worries, you don’t have to be a huge tech geek to find these reasons. Many can easily find out where the problem really is. Many times over-site traffic, code errors and even cyber-attacks can result in page errors.



The refresh button is sufficient in the browser to solve such problems, and there is nothing to do. If you have to wait for any server-side issues and refresh the page, the site will be loaded into your browser as soon as the site authorities fix the problem.



On the other hand, the problem may be in your direction.



Your internet security software may have blocked the link to that specific site or you may be having problems with your firewall, sometimes many sites may fail to load the browser extension or ads blocker tool.



So the first thing you need to do is check the link to see if the website is open for everyone.



Moreover, you can check Facebook or Twitter pages, as many people will post on social media if the site is not loaded.



If the site displays the results that are up, then you should understand that there is a problem with your end.



Fixing can be very easy. You can disable or uninstall Temporary Security software.



Then check your firewall rule to see if the link is blocked.



Now you can change the browser or enter the incognito mode of the current browser and try loading the site.



If that still does not work, then you should check your computer’s host file, the host file is like an address book on your computer, which contains information on your host file about the site that may not be loaded on your computer.





After you take the above steps, your favorite website will start loading, but even if that doesn’t work, there are some fixes.


If your favorite site might be blocked from your ISP – Internet Service Provider or Government, then I can bypass VPN access using VPN.



VPNs or virtual private networks spoof your IP address, so it behaves as if you are visiting from a different country and where your preferred site is not blocked. You can also bypass the blocked sites using a proxy, tor network.



For many people who do not want to install VPN on PC, the startpage.com search engine can be a great one.



Search your site by typing the name and then entering the “Anonymous View” link without entering the direct link, thus you can bypass your country lock or ISP lock using the web proxy.



However, many times the website itself may be down, which means there may be a server problem or any technical problem.



At that time you will not be able to access the site profits. But if access is required then the cache version can be easily accessed. Many people, including Google, store the cached version of the site on their server, from Google search results there is a down arrow key next to the name of the website, clicking on it will see an option called “Cached” and you can view the cached version of the site.



There is a dedicated service called Wayback Machine where you can access the cash version of any old website by entering the link on any website.



This tool can be very useful if you have a website down many times and you really need to find many old pages.



Many times an old deleted article and you can find it from this tool. Because once uploaded to the Internet it is never completely removed.

What is bandwidth? How many types and what?

Posted By - Posted In Internet

8 Feb 2022

blank image

Bandwidth is the amount of data that is transferred over a given channel at a given time.


 The unit of data transmission is calculated in bps (bit per second).


That is, the amount of data bits transferred per second is called bps.


 This is called Band or Bandwidth.


 Bandwidth calculation is used to explain the speed of different types of internet services. High-bandwidth service provides faster service.


Dial-up Internet service is a low-bandwidth connection.


 Broadband, such as DSL, cable, and satellite Internet services are high-bandwidth connections.


 Many DSL service providers offer high-bandwidth such as 768 kbps or higher.


 The cable internet service starts with 1 Mbps and speeds up to 30 Mbps


With a high bandwidth internet connection, a lot of data can be downloaded and uploaded in a quick time, easy video can be seen on the internet and audio can be heard.


Types of bandwidth


The bandwidth is divided into three parts based on the data transfer speed. Namely –







  • Narrowband:


Narrowband is usually from 45 to 300 bps.


This band is used for slow data transmission.


In general, the use of this band is more noticeable in telephony.


In telephony, Narrowband usually provides a frequency of 300 to 3400 Hz (Hz).


  • Voiceband:


Voiceband speeds are usually up to 9600 bps.


It is commonly used over the telephone. Telephone lines usually transmit data in frequencies from 200 to 3600 Hz.


In telephony, frequency division multiplexing is usually used at 4 kHz carrier spacing.


Voiceband is also used for transferring data from computer to printer or from card reader to computer.



  • Broadband:


Broadband is used for high-speed data transfer.


Broadband has a broad bandwidth and the ability to carry more data.


The band speeds up to 1 Mbps (megabytes/second) or higher.


This band is commonly used for digital subscriber line or DSL, radio-link, optical fiber, microwave and satellite communications.

How to delete Google from your life? Why is it almost impossible?

Posted By - Posted In Internet

8 Feb 2022

blank image

Just wondering the title of this article, why do you or I want to do that? Maybe you should never try to completely exclude Google from your life.



 I won’t either. But maybe you are too worried about your privacy or for some other reason, you want to stop using Google services and remove Google from your online life altogether.



 If you really want to delete how do you know? And does it know that it is almost impossible to completely erase Google from our online lives? How impossible? I will discuss all this today.


Google Search Replacement


You can delete your Google Account. Still, the first thing you need to worry about is finding a replacement for the Google search engine that you can use as the default search engine instead of Google.



Google’s search engine is still Google’s main and most used service. But frankly, we are so reliant on Google search that many of us do not know any search engine except Google search.



As many of us know, there are some other popular search engines like Bing, Yahoo and DuckDuckGo. But none of them have ever been so popular and so relatable as Google and still aren’t.


If you have to use Google search as a replacement, DuckDuckGo is the closest search engine that can come to Google as a replacement.


This search engine basically declares itself as anti-Google. As such, this search engine will never track you as Google has always done.



Just like Google’s advertisers can track your ads according to your interests, DuckDuckGo’s advertisers will never be able to track you and will not show ads accordingly. Besides, this search engine will never store your personal data.



This is an advent you get if you use it as your default search engine instead of Google.



But frankly, no search engine in the world can ever be better and more popular than Google.


Google Chrome Replacement

This is another hard decision.



There’s nothing to say about Google Chrome.



We almost all use Google Chrome as our default browser. Most users use Google Chrome Primary on both our PC and smartphone. First of all, users may not like Chrome, but Google Chrome’s simple UI, Deep Integration with google and a lot of because of the habit.



Even though Google has a much better browser, most users are not able to exclude Chrome because of their habits.



But if you want to completely eliminate Google, you will need a replacement for the Google Chrome browser.


Gmail replacement


When I ask someone his email address and when he gives a yahoo email address, I literally look at him for 5 seconds to understand that such a person is still there.



Frankly, no email other than Gmail seems standard to most people like me or you.



Although Microsoft Outlook is very good in terms of email, it is not comparable to Gmail.



This is because of the deep integration of Gmail with other Google products like Google Keep, Google Calendar, etc. Another reason is that Gmail accounts are default with every Google account.



No need to create an account separately. So those who have a Google account do not use any email other than Gmail.


But to get out of Google’s ecosystem, you have to stop using Gmail.



You need to move it to another email. For example, Yahoo, Outlook and any other email provider.


YouTube Replacement



You can’t do it Truly as good as YouTube and no other video platform is so great.



Except for the visitor, even if you are a creator, there is no one more perfect place to publish your video than YouTube.



Say Audience, Tell Revenue, and Popular, there’s nothing like YouTube to publish a video from anywhere.



Yes, you can say that Vimeo is much better as a video platform.



But to be honest, it’s not even comparable to YouTube.



You can host your own video on Vimeo, of course, but your target audience will rarely get it here.



The Vimeo platform is designed specifically for filmmakers and videographers. Nowhere else can you find such a large fan base, at least for video.


Android replacement

This is probably the hardest step in getting out of the Google ecosystem. As long as you’re using Android, you’re logically inside the Google ecosystem.



Even if you do not sign in to your Google account on your Android device, you will not have to use many Google services, but since the owner of the Android operating system Google, Google has some control over Android.



So if you want to remove Google from life completely, you have to stop using your Android device. You can definitely imagine, your only destination would be iPhone, iPad, MacBook, etc.



That is, Apple’s ecosystem is simple. But as we all know, iPhones and other Apple devices are much more expansive and Apple’s ecosystem doesn’t have as many opportunities as Android.


Replacement of other Google products


To completely remove Google from online life, each of the Google products you use will have to be replaced with some alternatives.


Most of them may not be as relatable as Google products, but they are enough to make it work fairly.

Google services that were shut down in 2019

Posted By - Posted In Internet

8 Feb 2022

blank image

Maybe something new has come and occupied the place of old technology.


Our users have lost interest.


Whatever the case, Google has stopped at least 23 products and services this year. Some of them are aged two or three, and some have passed decades.

Here are the 10 discussed products and services that Google has shut down in 2019.


Google URL Shortener (2009-2019):


Google has shortened the sharing service URL shortener by shortening the long weblink launched in 2009.


Google Plus (2011-2019):


Google launched this social media campaign in the 21st. The event was shut down earlier this year for failing to attract users.


Google Aloe (2016-2019):


Aloe Social Networking App is one of Google’s short-lived products. Google wanted to provide instant messaging service like WhatsApp.


Chromecast Audio (2015-2019):


Google stopped marketing the Chromecast audio device earlier this year. This allows users to stream audio from any device to the speakers with audio input.


YouTube Gaming (2015-2019):


YouTube Gaming aims to give users a taste of live and recorded game promotion. It was shut down earlier this year for failing to get enough responses from users.


Inbox by Gmail (2015-2019):


The ‘Inbox by Gmail’ app launched in 20 worked just like Gmail.


It was originally launched to test the potential for new facilities. However, most of them are eventually added to the Gmail app, which eliminates the need for a separate app.

Google Day-Dream (2016-2019):


About three years after Google Day-Dream was launched, it closed earlier this year.


This virtual reality platform works on certain Android devices. However, it failed to create a stir.


Google Clips (2017-2019):


This is basically an action camera-style device. Launched in 2017.


Google Trips (2016-2019):


Google Trips is a travel app that aims to help users better monitor their travel plans.


Dragonfly (2018-2019):


Google’s Dragonfly project, which closed within a year of its launch, is a Google search engine project designed primarily for Chinese users. The face of the light is closed before being seen.


Other Google services that have been discontinued this year are Ario, YouTube Messages, Blog Compass, Google Cloud Messaging, Google Spotlight Stories, Google Jump, G Suite Training, Follow Your World, Datali, Google Bulletin, Google Fusion Tables, Google Fusion Tables, and Google Fusion Tables. Google Correlate

WhatsApp introduces new rules

Posted By - Posted In Internet

8 Feb 2022

blank image

Using WhatsApp messaging service to spread fake news has become a major problem for some countries.



In India, the country of more than one hundred million people has taken the form of an epidemic.


WhatsApp authorities are struggling to cope with this.



  The company is now active in counteracting the spread of fake news worldwide. That’s why they’re going to introduce new rules.


What’s the new rule?

The most important step is that a WhatsApp user can’t ‘forward’ a message more than five times or send it to others. The rule was introduced in India six months ago.


In the wake of the rumors circulating on WhatsApp, the killing of people beaten up has taken an awful lot. In that regard, the rule is made there. Now that rule will apply to all WhatsApp users worldwide.


Earlier, a message could be forwarded 2০ times. WhatsApp has told the media they have made such a decision only after six months of careful evaluation.


A spokeswoman for the Facebook-owned company said, “The rate of forwarding messages has dropped.


As a result, people will be more focused on sending personal messages with their close friends.


After learning about their experience from users, new measures will be taken to figure out how to handle viral messages. ‘


There are also special rules for WhatsApp groups. From now on, any group that wants to open WhatsApp will not have more than 256 members.


How much of these rules will work?


WhatsApp and Facebook have faced widespread criticism for failing to prevent negative publicity in the near future.


Last week, Facebook announced that it had closed three Facebook 500 accounts in Ukraine, Central, and Eastern Europe.


Facebook is alleged to have spread fake news from these accounts.


However, the big advantage of WhatsApp is that they also have a big problem in preventing fake news.


WhatsApp messages are ‘encrypted’.


That is, because of a special code it cannot be read by any third party except the sender and the person who received the message.


This means that WhatsApp will not be able to enter the account secretly to read the contents of this message if desired.


 It is not possible to read WhatsApp if anyone spreads fake news.

“Remote Work” is a cybersecurity tool for employees

Posted By - Posted In Internet

8 Feb 2022

blank image

“Remote desk/working” is now a very common topic.



For convenience, employees of the organization can do office work from anywhere outside, and they use different types of devices to complete the work.



How safe is it to work on an office laptop using a coffee shop’s free Wi-Fi or access files on the company’s cloud using a personal smartphone? According to a current study, the average number of cyber incidents involving employee negligence increased 26 percent from 2016 -2018.



Let’s take a look at what steps can be taken for employees’ cybersecurity in the case of remote desk/working:



1. Provide access to device and data as per employee’s requirements:


Devices should be provided to employees of the company based on their assigned tasks.


For example, those who work in the sales team can use smartphones with GPS trackers, but those who work in call centers do not need an official smartphone, and a desktop computer may be enough for a front desk employee.


“Role-Based Access Control” model can be used for data access.


By using this model it is possible to increase information security by controlling employees’ access to sensitive information in the organization.


2. Using passcode and password on the devices supplied by the company:


Passwords and passwords must be controlled on devices provided by the organization.


If this small security is not guaranteed, then there is the possibility of plagiarizing large data.


When a company’s unprotected device is lost or stolen, there is a risk that the company’s confidential and important information is easily exposed to outsiders.


Password encryption as well as data encryption tools should be used to enhance the security of the information stored on the company’s device.



2. Use of Single Sign On (SSO) and Two-Factor Authentication (Two FA) in various company services:

Single Sign-On (SSO) solution can be used in applications used by the company for data protection, there are two benefits to using it.



Firstly, the employee does not have to remember the password for each application separately, secondly because the Two-Factor Authentication (TFA), the one-time password (OTP) on the mobile can be accessed to confirm the application.



Using these two features, it is possible to ensure sensitive data protection for the employee’s used device.



3. Install remote wiping on company-supplied devices


All of the methods we have discussed so far are about working if the company’s device is stolen or lost.



But if it is the case that any dishonest employee of the company wants to steal sensitive data of the company, which is known as an “Insider Threat”.



To reduce this type of throttle, software capable of remotely deleting data must be installed on the device supplied by the company.



4. Formulate and practice the “Bring Your Own Device (BYOD)” policy



If the “remote work” method is prevalent in the company, then there must be a BYOD policy which should be approved by the top management of the company. Subsequently, in compliance with those policies, employees will use official devices.



In addition, the Government of Bangladesh can follow the BYOD policy, which is contained in the Government of Bangladesh Information Security Manual (GOBISM).


By using the above methods it is possible to keep sensitive data of any organization, employee and company.


5. Formulate and practice the “Bring Your Own Device (BYOD)” policy


If the “remote work” method is prevalent in the company, then there must be a BYOD policy which should be approved by the top management of the company.


Subsequently, in compliance with those policies, employees will use official devices. In addition, the Government of Bangladesh can follow the BYOD policy, which is contained in the Government of Bangladesh Information Security Manual (GOBISM).


By using the above methods it is possible to keep sensitive data of any organization, employee and company.

Benefits of social media advertisements or marketing

Posted By - Posted In Internet

8 Feb 2022

blank image

Social media nowadays, from business to businessmen, privately employed people are employed by government employees or older people.

Therefore, by marketing or advertising using social media, we can reach millions of people easily.

In addition, there are many benefits or benefits that can only be achieved through social media marketing.


1. The promotion of anything is possible:

You can promote any business or product, big or small. Today, different people are bringing different products in their own homes, marketing them and selling them on social media.

So, no matter what your business or product is, you can easily promote it through social media marketing.

2. Low cost paid advertisement:

Marketing or promotion is possible in this process with very little money. Hey, you can do most of the process yourself and for free.

You simply have to create profiles or pages on social media platforms. And, then you can let people know about your product or business for free and give updates from time to time.

But, if you want to show more ads on social media, then this is possible with paid advertising.

But with this, you have to spend some money. Even though it costs money, compared to the methods of physical marketing, it is much less costly marketing or promotion.

3. Targeted promotion or marketing:

With physical marketing, we can never promote an advertisement targeting a particular person.

That means, if you place an ad on the side of the road or behind a leak, you have no idea who will see that ad and who will not.

But, in marketing or promotion through social media, you will have options in hand.

That means, where you want to target ads to people, how long do you want ads to run, the age of the ads to be shown and the interest and demand of people to be shown.

So, you know for yourself, if you advertise or market online social media by focusing on everything in this genre, then you can target one and a half customers targeted to your business.

In this, the purpose of showing your ads will be 5% successful and you will get targeted customers or consumers for your business.

4. Easily get a consumer or buyer:

As I said above, unlike any other physical advertisement, in marketing or advertising via social media, we can easily target ads anywhere, as a special audience, as a person with special interest, or as the buzzword of audiences.

In this case, showing ads to targeted people in such a good way increases the chance of getting more conversions or subscribers.

And, this is how thousands of people today are getting targeted customers or customers for their businesses.

5. Growing brand awareness

Today, before buying anything, we must look at the brand or company name of the item. A good brand means more trust or trust.

So, with social media marketing, you can create a good image of your brand.

You can take your brand and company to people anywhere in the country and anywhere.

 Compared to older marketing, promotion on social media has many benefits.

Use of Web browsers for cybersecurity

Posted By - Posted In Internet

8 Feb 2022

blank image

The Internet is the simplest way of communicating various types of information and services to the people in this era of continuous improvement, dissemination, dissemination, and use of information technology.


Using this internet, people can study at home, sell products, conduct business deals, talk in video calls, pay home utility (electricity, water, gas) bills, and even buy daily raw materials.


Although there are various applications for accessing information and services through the Internet, the most commonly used web browser, which is installed on almost every computer with the operating system.


The most widely used and notable ones are Mozilla Firefox, Google Chrome, Apple Safari, Opera, Internet Explorer, Microsoft Edge, Microsoft Edge, etc…



Since the web browser is used more to get internet-based information and services, it is very important to ensure the security of the web browser and use it securely.

The web browser that is normally provided with the operating system of the computer or the web browser we install usually does not guarantee security.



If the Internet user does not have sufficient knowledge of cybersecurity and the security of the web browser is not easily ensured, various types of viruses, malware or other harmful programs spread on the Internet can easily infiltrate the user’s computer and This enables cybercriminals to take full control of the user’s computer.


The following are some things to do to ensure the security of the web browser:


1) Every web browser has privacy settings. The user should carefully review and configure these settings so that the browser’s security is not compromised.


2) Always keep the web browser updated.


3) Be careful when downloading plug-ins, add-ons, and extensions of web browsers so that harmful plug-ins, add-ons or extensions are not installed.



4) Update used plug-ins and uninstall unused and unnecessary plugins.


5) Always use active and updated anti-virus.


6) Using various types of web browser security plug-ins and using extensions to prevent unexpected popups. For example, the Adblock Plus extension.


7) Using the 64-bit web browser as the security system of the 64-bit program is improved than the 32-bit program.


Here are some precautions to be taken for a web browser user to avoid cyber attacks.


1) It is not OK to save a password in a web browser because if the user’s computer is ever exposed to viruses, malware orIf attacked by other malicious programs, the cybercriminals can get that password at any time. In this case, users can use secure software to store passwords, such as KeePass Password Safe.


2) Delete the browsing history and cache of the web browser.


3) Keep the autofill feature of the web browser disabled so that no user information is stored in the web browser.


4) If the user accesses the Internet through a web browser of a cybercafe or other computer, use the incognito mode of the web browser so that no user information is stored in the web browser.


All are alert and aware to create a safe cyber environment.

Internet service provider

Posted By - Posted In Internet

8 Feb 2022

blank image

Internet Service Provider (ISP) refers to an organization that provides access to and use of the Internet. Internet service companies can vary.


 Such as commercial, socially owned, non-profit, or otherwise privately owned.


Internet services provided by the ISP may include Internet access, Internet transit, domain name registration, web hosting, Usenet services, and collocation (one such data center).




Access provider ISP


ISPs provide Internet access, connecting users to networks using a variety of technologies.

These technologies include computer modems connected to the telephone line, cable television (CATV), wireless Ethernet (Wi-Fi) and fiber optics.

The traditional method of copper is used for dial-up, DSL, ADSL, modem or IDSL only for users and small business owners. For users, using Fiber Optics is called Fiber to Home or such.

Customers who are in high demand, such as medium to large business or other ISPs – can use more high-speed DSL connections, Ethernet, Metropolitan Ethernet, Gigabit Ethernet, frame relay, ISDN primary rate interface, ATM and Sonnet.

Wireless access is another option. It has a cellular network or mobile network and satellite Internet access.



Mailbox providers


Mailbox providers are an organization that provides services for electronic mail domain hosting.


Electronic mail domain hosting comes with storage for mailboxes. These organizations provide users with the services of sending, receiving, and sending e-mail using their server.

Many mailbox providers also access providers, but some are not again (eg Yahoo, Outlook, Gmail, AOL Mail, PO Box).

There is an email hosting service covered under the explanation given in RFC 6650.

As well as the company, the university, the organization, the team or the person there is to manage their own mail server.


This is usually done by implementing the Simple Mail Transfer Protocol and accessing the message is provided through the Internet Message Access Protocol, post office protocol, webmail or a proprietary protocol.


Hosting ISP

Internet hosting service providers provide email, web-hosting or online storage services. Other services include virtual servers, cloud services, or direct server operations.


Transit ISP

Just as ISPs pay their user’s access to the Internet, ISPs pay their upstream ISPs.

The upstream ISP consists of a network larger than the normal ISP. They can offer ISP benefits that they usually do not have.


Virtual ISP

Virtual ISP (VISP) is a process in which services are purchased from another ISP, sometimes called a wholesale ISP.


[39] In this process, VISP customers use the Internet provided by wholesale ISPs.


Ideal for VIPs, mobile virtual network operators, and local exchange carriers for communication.


Wireless ISPs

Wireless Internet Service Provider means an Internet service provider that relies on wireless networking technology.

Those technologies may include simple Wi-Fi wireless mesh networking or proprietary equipment that is free 900 MHz, 2.4 GHz, 1.5, 1.2, 4.1, 4.1 and 2.5 GHz band. Or approved frequencies such as 2.5 GHz (EBS / BRS), 3.65 GHz and UFH band, LMDS.


No enforcement and intelligence assistance

In many countries, Internet service providers are legally required to allow law enforcement to monitor all or some of the data transmitted by the ISP.


In some countries, intelligence agencies monitor ISPs. A controversial National Security Agency program in the United States, known as Prism; They monitor all activities of Internet users and have raised concerns about violating the privacy policy of the United States Constitution, as enshrined in the Fourth Amendment.


Modern ISPs spread a number of technologies to monitor their networks, which allows all information to be passed to law enforcement or intelligence agencies and provide them with direct monitoring.

What Is Wifi and Wi-Fi features, advantages and disadvantages.

Posted By - Posted In Internet

8 Feb 2022

blank image

WiFi is a very familiar word in this age of current information and communication technology. We are all less familiar with the term WiFi. Although we have used WiFi in many ways, many do not know what WiFi is. So let’s not know what WiFi is.


What is wifi ???


WiFi is the nickname of Wireless Fidelity. WiFi is a wireless local area network system that can easily connect to the Internet with portable computer devices. The WiFi communication system uses high frequency radio web.


WiFi is a trademark or trademark of the Wi-Fi Alliance. WiFi manufacturers use this trademark to brand IEE802.11 standard Wireless Local Area Network or Wireless Local Area Network (WLAN) devices. By far the most commonly used WLAN class is IEE802.11. The term WiFi is often used as a synonym for IEE802.11.

Wi-Fi Alliance is a non-profit organization that promotes WiFi technology and ensures WiFi products. WiFi is commonly used on all kinds of laptops, peripheral devices, printers, smart phones, MP3 players, video game consoles and personal computers.


WiFi Features

  • Wi-Fi communication uses high frequency radio web.
  • WiFi can be connected to multiple computers at the same time.
  • This is the standard developed for the Wireless Local Area Network IEE802.11 (Institute of Electrical and Eletromics Enginners).
  • It is used as a cordless telephone for various portable devices and fixed device networks.
  • Its coverage area can be across a room, a building or a few kilometers.
  • It can be used in hotspots and its coverage is not available in too many areas.
  • Wi-Fi Products Certified by WiFi Alliance.


The advantages of WiFi


  • WiFi technology can be used to connect to multiple computers at the same time.
  • WiFi is a wireless local area network system.
  • It is accessible to the Internet.
  • WiFi technology is easy to use in a limited area.
  • WiFi is cheaper than local area network.


Disadvantages of WiFi

  • One of the biggest disadvantages of using WiFi is that it is used only in hotspots.
  • Its coverage is not available in too many areas.
  • WiFi technology’s data transmission is not very high.
  • Security measures are relatively weak.


Use of WiFi


  • WiFi technology is easy to use in a limited area.
  • WiFi technology can be used to facilitate the use of students in educational institutions.
  • WiFi technology can be provided in airports, hotels, restaurants.
  • WiFi can be used very easily on all types of electronic devices.
  • Currently, the same video game can be played simultaneously using WiFi.



What is web design? How to learn

Posted By - Posted In Internet

8 Feb 2022

blank image

What is web design?


Today, the Internet and its use are everywhere and its use is increasing day by day.


In this case, all kinds of small companies, firms or most businesses are launching a website to promote or market their business online.


One, the website may also think of making JK for any purpose. That purpose can be online marketing, product promotion, online services, contact customer, digital marketing or a website can be created for any other purpose.


Different, different types of websites can be created.


Now, these different types of websites that design and create websites are called web designers.


And, the web designers use the skills, experience or process that a web designer designs or creates.


What do you need to learn from being a web designer?


You don’t need any special qualifications for learning web designing.


If you have little or no interest in this field, you can learn web designing through various courses.


So let’s know, in particular, what we have to learn specifically for this course.


Photoshop basics:


Hey, you need to learn the basics of Photoshop.

Because, before creating a website, we need to create an idea or design in Photoshop.

In this, there will be many benefits to building a website later.




HTML means “HyperText Markup Language”, a type of coding language or language.

This is a markup language that is used to create web pages.

HTML education is very easy and after that, you can create a simple web page.




CSS is a cascading style sheet that is a kind of coding language or language.

HTML works to give structure to our website. And, CSS works to style and design the structure of web pages created by our HTML.

CSS can make a web page beautiful and attractive.




JavaScript is a type of client-side scripting language that is used to influence different types of processes or processes on a webpage.

For a good and experienced web designer, having the knowledge and experience of JavaScript is very important.



Then, learn about CSS when knowledge comes to HTML. And, finally, learn about JavaScript.

This way you can become a good designer very quickly by practicing everyday issues.


How to learn web design?


Now, finally, we have the question, “How do I learn web design”? So what


Then be aware that to become a good web designer you can take this course in two ways.



  • Online web design courses.
  • Offline web design courses.


And, if you are a new graduate or just 12, I would say take this course from a good institute or college.


In this, you will be better able to learn and, with the help of a teacher or other classmate, can help you solve your own problems or problems.


Moreover, after taking a course from an institute or college, you will be given a certificate which will help you a lot in the future.


So, if you are interested in doing web design courses for your interest and general knowledge, you can learn a lot using online websites.


But, if you are thinking about making a career in web design and serious about this topic, take a full-time web designing course from a good institute while taking in knowledge from various online websites.


    Page 1 of 3123