Inner Page Banner

Who invented the Internet? The story behind the creation of the Internet!

Posted By - Posted In Internet

8 Feb 2022

blank image

The Internet was introduced by connecting a few computers to a network structure. No one knew then that the Internet would be transformed into such a virtual world as it is today. No one or company has made this physical and virtual network as large as the Internet.



Over the years, many computer scientists, engineers, programmers have transformed a connected network into many features in today’s Internet.



So, the Internet’s inventor’s contribution should not be given to a single person or a single organization.



Not only a complete network but also many important technologies related to it, such as IP address, domain, email, packet transferring, make the Internet fully functional.



And they did not make one, many of the pioneers have discovered these things over the years


ArpNet is portrayed as the model and model of the modern Internet.


The basic infrastructure of the modern Internet was first revealed in ArpNet. Arpanet was created to make American military communications more efficient and efficient.



The idea of ​​the modern Internet, the World Wide Web, began with a wide area network. And the network name was Arpanet.


This ARPANET was a network developed by the American Advanced Research Agency (Advanced Research Projects Agency Network or ARPANET).



The first was Arpenet’s Idea for a Network and created by American scientist Robert Taylor. The work of this intercomputer network, called ArpNet, started in 1966.


The network, as well as the University of the city and the area, formed a regional energy network linked to the mainframe computer of the research institute.



Raymond Tomlinson later tested the first e-mail by sending the first electronic mail.



On the modern internet, data transfer is done through packet switching/data packets. Whatever data is here, it is divided into a few lyrical and numbered packets.



And interestingly, this packet-switching technology was used to transmit data to ArpNet. Accessing from one computer to another using ArpNet was very easy.



This ARPANET model, adopted by the modern  Internet, has gradually become better and better since 1966.


Vincent Surf and Robert Kahn are two of the legends behind the creation of the modern Internet.



Because they invented Internet Protocol (IP Address) and Transmission Control Protocol (TCP).



With the discovery of technology in the mid-9’s, any type of Internet communication could be handled over HTTP or FTP through this IP address.



IP and TCP are called Internet Protocol Suites. Here communication between one IP address to another IP address makes TCP more reliable.



The current modern Internet connection is the Internet Protocol Suite.



You can access different pages or files of major mainframe computers or servers using IP addresses like numbers. However, remembering these big numbers is sometimes difficult, so a new part of the modern Internet introduced in 1985 is “domain name”.



In 1970, ArpNet introduced another revolution in communication, through the discovery of e-mail systems for communication.



Raymond Tomlinson was the originator of the email and electronic mail system. He was the one who picked this @simble for email.



Although initially used with IP address, this @ Symbol is also used to create an email address with domain address/name and it is happening.



In 1971 fast he sent an experimental mail, and he wrote in the mail “something like QWERTYUIOP”.


In 1990, Tim Berners Lee created HyperText MarkUp Language or HTML Language.



 The language used to publish the document in web version is still being done today.



 It gradually started to officially create webpages and became associated with many more languages.



 Tim Berners-Lee launched his first website on the Internet on August 6, 1991, where he described the web’s role in search of information. This was basically the introduction of the World Wide Web (www?).



Technology is vast and changing anytime, every time somebody is changing, enhancing and enriching the technology.



Therefore, one cannot be recognized for the technical invention. In the age of the Internet, the pioneers are the laborers of scientists, computer scientists, programmers, engineers.



No one has brought the Internet to such an extent today. With the efforts of these pioneering people, today’s Internet has turned into an “information superhighway.”


Although experimental and practical of the Internet was seen through Arpenet in 1966.


Yet many people have long dreamed of an active network like the Internet.



Nicola Tesla, the inventor of modern electricity, introduced the idea of ​​the “World Wireless System” in 1900, a program that was similar to the modern Internet.



From 1930 to 1940, technology visionaries Paul Otlet and Vanivar developed bus books and media files for searchable or searchable storage systems.



The launch of the modern Internet begins with the use of “packet switching” data transfer technology created by Scientific LickLider at ArpNet.

What to do if your favorite website doesn’t load suddenly?

Posted By - Posted In Internet

8 Feb 2022

blank image

If you do not load sites like Facebook or Twitter suddenly it is normal, as these sites may be blocked from your office or workplace.



But your favorite websites, there is no reason to get frustrated if you do not load.



In this article, I have shared some tricks that will tell you what to do if your favorite website does not load suddenly!



Probable cause


There are many reasons not to load a website, but no worries, you don’t have to be a huge tech geek to find these reasons. Many can easily find out where the problem really is. Many times over-site traffic, code errors and even cyber-attacks can result in page errors.



The refresh button is sufficient in the browser to solve such problems, and there is nothing to do. If you have to wait for any server-side issues and refresh the page, the site will be loaded into your browser as soon as the site authorities fix the problem.



On the other hand, the problem may be in your direction.



Your internet security software may have blocked the link to that specific site or you may be having problems with your firewall, sometimes many sites may fail to load the browser extension or ads blocker tool.



So the first thing you need to do is check the link to see if the website is open for everyone.



Moreover, you can check Facebook or Twitter pages, as many people will post on social media if the site is not loaded.



If the site displays the results that are up, then you should understand that there is a problem with your end.



Fixing can be very easy. You can disable or uninstall Temporary Security software.



Then check your firewall rule to see if the link is blocked.



Now you can change the browser or enter the incognito mode of the current browser and try loading the site.



If that still does not work, then you should check your computer’s host file, the host file is like an address book on your computer, which contains information on your host file about the site that may not be loaded on your computer.





After you take the above steps, your favorite website will start loading, but even if that doesn’t work, there are some fixes.


If your favorite site might be blocked from your ISP – Internet Service Provider or Government, then I can bypass VPN access using VPN.



VPNs or virtual private networks spoof your IP address, so it behaves as if you are visiting from a different country and where your preferred site is not blocked. You can also bypass the blocked sites using a proxy, tor network.



For many people who do not want to install VPN on PC, the startpage.com search engine can be a great one.



Search your site by typing the name and then entering the “Anonymous View” link without entering the direct link, thus you can bypass your country lock or ISP lock using the web proxy.



However, many times the website itself may be down, which means there may be a server problem or any technical problem.



At that time you will not be able to access the site profits. But if access is required then the cache version can be easily accessed. Many people, including Google, store the cached version of the site on their server, from Google search results there is a down arrow key next to the name of the website, clicking on it will see an option called “Cached” and you can view the cached version of the site.



There is a dedicated service called Wayback Machine where you can access the cash version of any old website by entering the link on any website.



This tool can be very useful if you have a website down many times and you really need to find many old pages.



Many times an old deleted article and you can find it from this tool. Because once uploaded to the Internet it is never completely removed.

Google services that were shut down in 2019

Posted By - Posted In Internet

8 Feb 2022

blank image

Maybe something new has come and occupied the place of old technology.


Our users have lost interest.


Whatever the case, Google has stopped at least 23 products and services this year. Some of them are aged two or three, and some have passed decades.

Here are the 10 discussed products and services that Google has shut down in 2019.


Google URL Shortener (2009-2019):


Google has shortened the sharing service URL shortener by shortening the long weblink launched in 2009.


Google Plus (2011-2019):


Google launched this social media campaign in the 21st. The event was shut down earlier this year for failing to attract users.


Google Aloe (2016-2019):


Aloe Social Networking App is one of Google’s short-lived products. Google wanted to provide instant messaging service like WhatsApp.


Chromecast Audio (2015-2019):


Google stopped marketing the Chromecast audio device earlier this year. This allows users to stream audio from any device to the speakers with audio input.


YouTube Gaming (2015-2019):


YouTube Gaming aims to give users a taste of live and recorded game promotion. It was shut down earlier this year for failing to get enough responses from users.


Inbox by Gmail (2015-2019):


The ‘Inbox by Gmail’ app launched in 20 worked just like Gmail.


It was originally launched to test the potential for new facilities. However, most of them are eventually added to the Gmail app, which eliminates the need for a separate app.

Google Day-Dream (2016-2019):


About three years after Google Day-Dream was launched, it closed earlier this year.


This virtual reality platform works on certain Android devices. However, it failed to create a stir.


Google Clips (2017-2019):


This is basically an action camera-style device. Launched in 2017.


Google Trips (2016-2019):


Google Trips is a travel app that aims to help users better monitor their travel plans.


Dragonfly (2018-2019):


Google’s Dragonfly project, which closed within a year of its launch, is a Google search engine project designed primarily for Chinese users. The face of the light is closed before being seen.


Other Google services that have been discontinued this year are Ario, YouTube Messages, Blog Compass, Google Cloud Messaging, Google Spotlight Stories, Google Jump, G Suite Training, Follow Your World, Datali, Google Bulletin, Google Fusion Tables, Google Fusion Tables, and Google Fusion Tables. Google Correlate

“Remote Work” is a cybersecurity tool for employees

Posted By - Posted In Internet

8 Feb 2022

blank image

“Remote desk/working” is now a very common topic.



For convenience, employees of the organization can do office work from anywhere outside, and they use different types of devices to complete the work.



How safe is it to work on an office laptop using a coffee shop’s free Wi-Fi or access files on the company’s cloud using a personal smartphone? According to a current study, the average number of cyber incidents involving employee negligence increased 26 percent from 2016 -2018.



Let’s take a look at what steps can be taken for employees’ cybersecurity in the case of remote desk/working:



1. Provide access to device and data as per employee’s requirements:


Devices should be provided to employees of the company based on their assigned tasks.


For example, those who work in the sales team can use smartphones with GPS trackers, but those who work in call centers do not need an official smartphone, and a desktop computer may be enough for a front desk employee.


“Role-Based Access Control” model can be used for data access.


By using this model it is possible to increase information security by controlling employees’ access to sensitive information in the organization.


2. Using passcode and password on the devices supplied by the company:


Passwords and passwords must be controlled on devices provided by the organization.


If this small security is not guaranteed, then there is the possibility of plagiarizing large data.


When a company’s unprotected device is lost or stolen, there is a risk that the company’s confidential and important information is easily exposed to outsiders.


Password encryption as well as data encryption tools should be used to enhance the security of the information stored on the company’s device.



2. Use of Single Sign On (SSO) and Two-Factor Authentication (Two FA) in various company services:

Single Sign-On (SSO) solution can be used in applications used by the company for data protection, there are two benefits to using it.



Firstly, the employee does not have to remember the password for each application separately, secondly because the Two-Factor Authentication (TFA), the one-time password (OTP) on the mobile can be accessed to confirm the application.



Using these two features, it is possible to ensure sensitive data protection for the employee’s used device.



3. Install remote wiping on company-supplied devices


All of the methods we have discussed so far are about working if the company’s device is stolen or lost.



But if it is the case that any dishonest employee of the company wants to steal sensitive data of the company, which is known as an “Insider Threat”.



To reduce this type of throttle, software capable of remotely deleting data must be installed on the device supplied by the company.



4. Formulate and practice the “Bring Your Own Device (BYOD)” policy



If the “remote work” method is prevalent in the company, then there must be a BYOD policy which should be approved by the top management of the company. Subsequently, in compliance with those policies, employees will use official devices.



In addition, the Government of Bangladesh can follow the BYOD policy, which is contained in the Government of Bangladesh Information Security Manual (GOBISM).


By using the above methods it is possible to keep sensitive data of any organization, employee and company.


5. Formulate and practice the “Bring Your Own Device (BYOD)” policy


If the “remote work” method is prevalent in the company, then there must be a BYOD policy which should be approved by the top management of the company.


Subsequently, in compliance with those policies, employees will use official devices. In addition, the Government of Bangladesh can follow the BYOD policy, which is contained in the Government of Bangladesh Information Security Manual (GOBISM).


By using the above methods it is possible to keep sensitive data of any organization, employee and company.

What is the use of “Broadband”

Posted By - Posted In Knowledge

8 Feb 2022

blank image

Broadband is a high-speed Internet connection, with speeds ranging from at least 20 kilobits per second to extremely high speeds. Broadband is commonly used in co-axial cable, optical fiber cable, satellite communication, microwave communication or networking. Various bands arise as a result of variations in data communication speed Either. And these bands are again used to transfer data to different technologies at different speeds. Some of them are DSL.

The full form of DSL is the Digital Subscriber Line, which connects through Copper’s telephone line.

Line Way Frequency is divided into two (02) sections


Remain Which is as follows:


1. Data exchange and
2. Voice DSL is usually DSL data speed from 1 Kbps to 1 Mbps, but The user must be within 2 km from the telephone office.




Fiber-optic broadband is commonly known as “fiber”. Conventional copper his or Much more than co-axial cable It provides fast data management. Fiber optic cable generally uses light signals or light waves to transmit data. The fiber optic data transfer rate is about 1 terabit per second.




Cable Broadband Internet transmits data through the lines of conventional cable TV. Normally cable Internet speeds from 5 Mbps to 5 Mbps. Cable internet speed can be influenced by users in the same vicinity through the same cable connection.




Satellite broadband is basically used by a satellite orbiting around the world. Satellite broadband is used wherever conventional. Terrestrial broadband technology such as DSL or fiber optic cable is not accessible. Its Internet speed is the traditional DSL The speed can be compared to the connection. Its speed can be from 1 Kbps to 1 Mbps. But its speed depends on the weather and satellite position.


Mobile Broadband:


Wireless mobile broadband technology is accessed via 3G or 3G and LTE enabled cellphone or e-book reader. Its speed depends on the distance of the data carrier and the user. The fastest wireless technology LTE up to a maximum of 5 Mbps
With speed.

Use of Web browsers for cybersecurity

Posted By - Posted In Internet

8 Feb 2022

blank image

The Internet is the simplest way of communicating various types of information and services to the people in this era of continuous improvement, dissemination, dissemination, and use of information technology.


Using this internet, people can study at home, sell products, conduct business deals, talk in video calls, pay home utility (electricity, water, gas) bills, and even buy daily raw materials.


Although there are various applications for accessing information and services through the Internet, the most commonly used web browser, which is installed on almost every computer with the operating system.


The most widely used and notable ones are Mozilla Firefox, Google Chrome, Apple Safari, Opera, Internet Explorer, Microsoft Edge, Microsoft Edge, etc…



Since the web browser is used more to get internet-based information and services, it is very important to ensure the security of the web browser and use it securely.

The web browser that is normally provided with the operating system of the computer or the web browser we install usually does not guarantee security.



If the Internet user does not have sufficient knowledge of cybersecurity and the security of the web browser is not easily ensured, various types of viruses, malware or other harmful programs spread on the Internet can easily infiltrate the user’s computer and This enables cybercriminals to take full control of the user’s computer.


The following are some things to do to ensure the security of the web browser:


1) Every web browser has privacy settings. The user should carefully review and configure these settings so that the browser’s security is not compromised.


2) Always keep the web browser updated.


3) Be careful when downloading plug-ins, add-ons, and extensions of web browsers so that harmful plug-ins, add-ons or extensions are not installed.



4) Update used plug-ins and uninstall unused and unnecessary plugins.


5) Always use active and updated anti-virus.


6) Using various types of web browser security plug-ins and using extensions to prevent unexpected popups. For example, the Adblock Plus extension.


7) Using the 64-bit web browser as the security system of the 64-bit program is improved than the 32-bit program.


Here are some precautions to be taken for a web browser user to avoid cyber attacks.


1) It is not OK to save a password in a web browser because if the user’s computer is ever exposed to viruses, malware orIf attacked by other malicious programs, the cybercriminals can get that password at any time. In this case, users can use secure software to store passwords, such as KeePass Password Safe.


2) Delete the browsing history and cache of the web browser.


3) Keep the autofill feature of the web browser disabled so that no user information is stored in the web browser.


4) If the user accesses the Internet through a web browser of a cybercafe or other computer, use the incognito mode of the web browser so that no user information is stored in the web browser.


All are alert and aware to create a safe cyber environment.

Internet service provider

Posted By - Posted In Internet

8 Feb 2022

blank image

Internet Service Provider (ISP) refers to an organization that provides access to and use of the Internet. Internet service companies can vary.


 Such as commercial, socially owned, non-profit, or otherwise privately owned.


Internet services provided by the ISP may include Internet access, Internet transit, domain name registration, web hosting, Usenet services, and collocation (one such data center).




Access provider ISP


ISPs provide Internet access, connecting users to networks using a variety of technologies.

These technologies include computer modems connected to the telephone line, cable television (CATV), wireless Ethernet (Wi-Fi) and fiber optics.

The traditional method of copper is used for dial-up, DSL, ADSL, modem or IDSL only for users and small business owners. For users, using Fiber Optics is called Fiber to Home or such.

Customers who are in high demand, such as medium to large business or other ISPs – can use more high-speed DSL connections, Ethernet, Metropolitan Ethernet, Gigabit Ethernet, frame relay, ISDN primary rate interface, ATM and Sonnet.

Wireless access is another option. It has a cellular network or mobile network and satellite Internet access.



Mailbox providers


Mailbox providers are an organization that provides services for electronic mail domain hosting.


Electronic mail domain hosting comes with storage for mailboxes. These organizations provide users with the services of sending, receiving, and sending e-mail using their server.

Many mailbox providers also access providers, but some are not again (eg Yahoo, Outlook, Gmail, AOL Mail, PO Box).

There is an email hosting service covered under the explanation given in RFC 6650.

As well as the company, the university, the organization, the team or the person there is to manage their own mail server.


This is usually done by implementing the Simple Mail Transfer Protocol and accessing the message is provided through the Internet Message Access Protocol, post office protocol, webmail or a proprietary protocol.


Hosting ISP

Internet hosting service providers provide email, web-hosting or online storage services. Other services include virtual servers, cloud services, or direct server operations.


Transit ISP

Just as ISPs pay their user’s access to the Internet, ISPs pay their upstream ISPs.

The upstream ISP consists of a network larger than the normal ISP. They can offer ISP benefits that they usually do not have.


Virtual ISP

Virtual ISP (VISP) is a process in which services are purchased from another ISP, sometimes called a wholesale ISP.


[39] In this process, VISP customers use the Internet provided by wholesale ISPs.


Ideal for VIPs, mobile virtual network operators, and local exchange carriers for communication.


Wireless ISPs

Wireless Internet Service Provider means an Internet service provider that relies on wireless networking technology.

Those technologies may include simple Wi-Fi wireless mesh networking or proprietary equipment that is free 900 MHz, 2.4 GHz, 1.5, 1.2, 4.1, 4.1 and 2.5 GHz band. Or approved frequencies such as 2.5 GHz (EBS / BRS), 3.65 GHz and UFH band, LMDS.


No enforcement and intelligence assistance

In many countries, Internet service providers are legally required to allow law enforcement to monitor all or some of the data transmitted by the ISP.


In some countries, intelligence agencies monitor ISPs. A controversial National Security Agency program in the United States, known as Prism; They monitor all activities of Internet users and have raised concerns about violating the privacy policy of the United States Constitution, as enshrined in the Fourth Amendment.


Modern ISPs spread a number of technologies to monitor their networks, which allows all information to be passed to law enforcement or intelligence agencies and provide them with direct monitoring.

What Is Wifi and Wi-Fi features, advantages and disadvantages.

Posted By - Posted In Internet

8 Feb 2022

blank image

WiFi is a very familiar word in this age of current information and communication technology. We are all less familiar with the term WiFi. Although we have used WiFi in many ways, many do not know what WiFi is. So let’s not know what WiFi is.


What is wifi ???


WiFi is the nickname of Wireless Fidelity. WiFi is a wireless local area network system that can easily connect to the Internet with portable computer devices. The WiFi communication system uses high frequency radio web.


WiFi is a trademark or trademark of the Wi-Fi Alliance. WiFi manufacturers use this trademark to brand IEE802.11 standard Wireless Local Area Network or Wireless Local Area Network (WLAN) devices. By far the most commonly used WLAN class is IEE802.11. The term WiFi is often used as a synonym for IEE802.11.

Wi-Fi Alliance is a non-profit organization that promotes WiFi technology and ensures WiFi products. WiFi is commonly used on all kinds of laptops, peripheral devices, printers, smart phones, MP3 players, video game consoles and personal computers.


WiFi Features

  • Wi-Fi communication uses high frequency radio web.
  • WiFi can be connected to multiple computers at the same time.
  • This is the standard developed for the Wireless Local Area Network IEE802.11 (Institute of Electrical and Eletromics Enginners).
  • It is used as a cordless telephone for various portable devices and fixed device networks.
  • Its coverage area can be across a room, a building or a few kilometers.
  • It can be used in hotspots and its coverage is not available in too many areas.
  • Wi-Fi Products Certified by WiFi Alliance.


The advantages of WiFi


  • WiFi technology can be used to connect to multiple computers at the same time.
  • WiFi is a wireless local area network system.
  • It is accessible to the Internet.
  • WiFi technology is easy to use in a limited area.
  • WiFi is cheaper than local area network.


Disadvantages of WiFi

  • One of the biggest disadvantages of using WiFi is that it is used only in hotspots.
  • Its coverage is not available in too many areas.
  • WiFi technology’s data transmission is not very high.
  • Security measures are relatively weak.


Use of WiFi


  • WiFi technology is easy to use in a limited area.
  • WiFi technology can be used to facilitate the use of students in educational institutions.
  • WiFi technology can be provided in airports, hotels, restaurants.
  • WiFi can be used very easily on all types of electronic devices.
  • Currently, the same video game can be played simultaneously using WiFi.



Differences between Facebook and Instagram:

Posted By - Posted In Internet

8 Feb 2022

blank image

Like Facebook, Instagram is a social media platform. Facebook bought Instagram in 2012.


 Although it has not been used in one eye before, its use is increasing.


This is because the use of smartphones is increasing day by day with increasing geometric data.


 I have never used Instagram before but started using it recently. Instagram is a social media-based app. People are now inspired to start using Instagram.


They find the content they like on Instagram. By doing this, they increase their brand value, enrich the business.


According to a survey, the relationship between the Instagram community is getting stronger. Among them, brand values ​​are playing a big role.


Two out of every three people (66%) think Instagram is a platform that creates a kind of interaction with the brand.


This gives marketers the opportunity to reach many valuable customer segments across segments.


Differences between Facebook and Instagram:


Although Facebook and Instagram are the owners of Facebook, there are some differences between them. He was taken down.


1. Communication is more common among friends, relatives and community people on Facebook. But business and content-based communication and content sharing are high on Instagram.


2. Only visual content can be tuned to Instagram. No text-based content can be tuned. But all kinds of content can be tuned to Facebook.


3. Engagement and sharing of content are high on Instagram. Engagement is less than that on Facebook. One study suggests that business engagement on Instagram is 10 times higher than Facebook.


4. The number of Facebook users is much larger than Instagram so its database is also quite large. However, the number of Instagram users is increasing day by day. Although people of all ages use Facebook, Instagram is more popular among young people.


4. Video content shared on Instagram feeds are short-lived. Its length is up to a maximum of 1 minute. But Facebook video content is maximum up to 4 hours in length. As a result, the video rate is higher on Instagram. Because people don’t like to see big content.


5. Instagram’s internal interface is quite sophisticated, making it easy to navigate. But because Facebook has so many features, they are not easy to use.

It’s also a bit difficult to navigate. Moreover, Facebook’s audience size is huge, making it a little difficult to get business information to the right person at the right time.

But Instagram can easily convey the message to the right audience.


6. Friends can be added to Facebook but Instagram does not have such a system.


Content can be shared between them only by increasing followers.

7. Photos of different sizes and formats can be tuned to Facebook, but images of certain sizes and formats can be tuned on Instagram.


8. Photos of different sizes and formats can be tuned to Facebook, but images of certain sizes and formats can be tuned on Instagram.


9. It can be accessed by logging into Facebook using the mobile phone app, mobile phone browser, and desktop browser.


But Instagram can only log in with the mobile phone app and use the full feature. However, some third-party tools or extensions can be used on the desktop for Instagram, but there are some limitations, not all features can be used. Instagram can also be used with mobile phone browsers but not all features.


10. Facebook has personal profiles, business pages, groups, events. But Instagram does not have such features.


11. Facebook has its own ad account that can be used to advertise. Instagram does not have its own Aid account.


In addition to Facebook’s business page, Facebook advertising can be used to advertise on Instagram.


12. Before sharing content on Instagram it can be edited inside the app. Such as cropping pictures, dimming colors, reducing or increasing brightness, etc. In addition, different layouts can be created. There is no such arrangement on Facebook.


13. The use of hashtags is not as important on Facebook, but more important for Instagram.


Instagram hashtags can be expanded by using hashtags, creating clickable links and finding essential content.



14. Video can be shared from Instagram for 15 seconds to 10 minutes via IGTV.


This feature can also be accessed by logging into the instagram.com desktop. Although videos are shared on Facebook, they are not archived under any such feature.


15. Live video can be promoted on Instagram but it cannot be saved on an account after the promotion. But Facebook’s live video is auto-saved.


16. The same person can open multiple accounts on Instagram by logging into Facebook. But there are rules for opening multiple accounts on Facebook. However, no more than 5 accounts can be opened on Instagram.


17. Instagram ‘Username’ can be changed at any time from the app but you have to apply to change the user name on Facebook.


Subject to approval. Once you change the user name on Facebook, it cannot be changed for the first time in 60 days.


Next time you have to wait for 120 days to make changes.


18. Clicked links cannot be used on an Instagram tune. However, click-through links can be added when boosting the ad from the ad account. However, the tune of the clicked link can be shared on Facebook.

However, through the above discussion, we notice clearly some differences between Facebook and Instagram.


 To do well on Instagram, you need to share visual content regularly. Create new followers and strengthen relationships with existing followers.

What is the Internet? what’s the utilization of the Internet? What are the advantages of the internet? What are the restrictions on the Internet?

Posted By - Posted In Internet

8 Feb 2022

blank image

What is the Internet?


The Internet may be a global system of interconnected computer networks that use standard Internet protocol suites (often called TCP / IP, though not all TCP uses) to serve billions of users worldwide, which may be a network of many personal, public, academic, business. And government networks Among kagura, which benefits from the worldwide to the local, electronic, wireless and optical networking technologies, connected by a good array.


the web carries the infrastructure to support a good range of data resources and services like the planet Wide Web (WWW) inter-link hypertext documents and email.


What is the utilization of the Internet?


The Internet is one of the foremost useful technologies in times that not only helps us in our lifestyle but also improves our personal and professional lives.


The Internet helps us achieve this in some ways. the web is widely used for operation for college kids and for educational purposes in order that they will be researched or add knowledge to different subjects.


Even business professionals and organizations, like doctors, access the web to filter the knowledge they have to use. therefore the Internet is that the largest encyclopedia for all, altogether age groups.


The Internet has served to be more useful for maintaining contact with friends and relatives who live abroad permanently.


What are the advantages of the Internet?




E-mail is now an important communication tool for businesses. With e-mail, you’ll send and receive instant electronic messages, which act like typing letters.
Your messages are delivered instantly to people anywhere within the world, like traditional mail, which takes tons of your time.

Email is free, fast, and really cheap compared to telephone, fax, and postal services.


Information: Information is perhaps the most important benefit the web offers. there’s an enormous amount of data available on the web for just a couple of things from government laws and services, trade fairs and conferences, market information, new ideas, and technical support. you’ll look for almost any quite information using any of the search engines like Google, Yahoo, MSN, etc.

• Online Chat: Many ‘chat rooms’ that you simply can access the online are wont to meet new people, make new friends, also as confine touch with old friends. you’ll chat on MSN and yahoo websites.




Many services are provided on the web, including Internet Banking, Job Search, Purchase Tickets, Hotel Reservations, Guidance Services, which covers an array of issues associated with every aspect of life.

Communities: all types of communities originated on the web. this is often an excellent thanks to meet people with similar interests and discuss common issues.




As you get information on the web, you’ll shop online. There are many online stores and sites which will find products and use them employing a MasterCard.
you are doing not need to leave your home and may make your purchase from the convenience of your home. It’s really amazing and possesses a good range of products from family needs, from electronics to entertainment.


Entertainment: the web offers the convenience of expanding audio/video songs, plays. Many of which may be downloaded. One such popular website is YouTube.


Software downloads:


you’ll download freely from the web like utilities, games, music, videos, movies, etc.


What are the restrictions on the Internet?


Theft of private information: Electronic messages sent via the web are often easily snooped and tracked, revealing who and what they’re talking about. If you employ the web, your personal information, like your name, address, MasterCard, bank details, and other information, are often accessed by unauthorized people.
If you employ a Mastercard or Internet banking to buy online, your details can also be ‘stolen’.


Negative Impact on Family Communication: it’s generally seen that the longer spent on the web, the less the sensation of communication between relations and therefore the feeling of isolation.


Internet Distance: there’s some debate about whether the web is probably going to be susceptible to addiction. Some researchers claim that it’s just people trying to urge out of their problem in a web world.


Virus Threat: Today, not only human viruses are found, but computers are.

Computers get these viruses mainly from the web . an epidemic may be a program that disrupts the traditional functioning of your computing system . Computers connected to the web are susceptible to virus attacks and that they can crash your entire hard disc.





This is often seen as sending unsolicited email. This multiple or wide emailing is usually compared to mass junk mailing because it unwantedly interrupts the whole system. Most spam commercial ads, often for questionable products, get-rich-quick plans, or semi-legal services.
Spam costs very less to send to the sender – most costs are paid by the sender for the recipient or carrier

Details Of IP address

Posted By - Posted In Internet

8 Feb 2022

blank image

Internet Protocol Address or Internet Protocol Address (IP address or Internet Protocol (IP) address) is a numerical label assigned to each of the techniques or devices connected to a computer network where the network nodes use the Internet Protocol for communication.


[1] The main functions of Internet Protocol Addresses are two: Identifying the host or network interface and locating the location.


TCP / IP planners released the Internet Protocol address as 32 bit [1] and this designation is known as Internet Protocol version 4 which is still in use.


However, as the use of the Internet increased abnormally and the unused address was decreasing day by day, a new addressing designation (IPv3) was introduced, in which 128-bit numbers were used to publish each address and subsequently adapted to RFC 2460. [3] Use binary number rank to store Internet Protocol addresses. Although the human-readable signals usually used to express it is to say for example, (IPv4) and 2001: db8: 0: 1234: 0: 567: 1: 1 (IPv6).



The Internet is assigned by the Internet Protocol Address Space Allocation Authority (ICNA), and to manage it locally, they have assigned five regional Internet registries (RIRs) that assign IP address blocks to local Internet registrars (Internet Service Providers) and other organizations.



IP version

Two versions of Internet Protocol are used: IP version 4 and IP version 6. Version two publishes IP addresses in two different ways.


However, due to the widespread adoption of IP version 4, the release of version 4 is usually taken as an IP address.


IP version 4

Anyone address in IP version 4 is released with 32 bits. That is why IPv3 can have unique address numbers.


4294496296 (232). In IPv3 some addresses have been set aside for special needs such as private networks (~ 18 million addresses) or multicast addresses (~ 270 million).


IPv3 addresses are usually expressed through dot-decimal, which consists of 4 decimal numbers, where each number has a limit of 0-255 and the numbers are separated by a dot, eg: Each number/part of the address represents a group of 8 bits. In many cases, IPv4 addresses are expressed with hexadecimal, octal, or binary numbers instead of dot-decimal.



IPv3 subnet


At the beginning of the Internet Protocol, network administrators split the IP address into two parts: one is the network number and the other is the host number.


The network number is the first 8 bits or the first octet of the IP address and the host number with the remaining 24 bits or 3 octets.


Network number The Internet Protocol finds the specified network and identifies the device or computer on that network with the host number.


This can be compared to the home or home address. To search for a building, one has to first find the area (network number) and later identify the building with the home number (host number).


But as the number of networks increases day by day, this designation of finding a network is problematic because it is not possible to provide a unique network number for a large number of networks with one octet.


Because of that, the Internet addressing specification was introduced in 1981 by the introduction of the cloudful network. [4]


Classful network designation eliminates the difficulty of network numbers as well as simplifies sub-network design.


In this designation, the first 8 bits of the IP address or the first three bits of the octet are called the IP address class.


Three classes A, B, and C have to be created for universal unicast addressing. Depending on the class, how many unique network numbers can be provided. The higher the number of network numbers, the less the number of host numbers.


Although the cloudful network designation was successful in satisfying the need for a network number in the initial stage, the problem was encountered due to the increasing number of networks.


Because of this, cloudless inter-domain routing was introduced for Internet Protocol address space instead of Cloudful Network.


This method uses a variable-length subnet mask for address space allocation and prefix of different lengths for routing.


IPv4 Private Address


At the beginning of the network planning, all hosts (computers or devices) were thought to give a unique IP address so that all computers on the Internet could communicate directly with each other. The public address is protected due to increasing internet usage Is to meet the requirements.


In private networks, computers are not directly connected to the Internet, such as banks, computers in different corporate establishments that communicate with each other through TCP / IP, they do not need a universal unique IP address.



There are 3 levels of RFC 1918 IP addresses stored for private networks.


These addresses are not routed over the Internet and therefore there is no need to synchronize with the IP address register to use them.

The first of the Internet!

Posted By - Posted In Internet

8 Feb 2022

blank image

The age of the Internet is approaching fifty! In the last twenty years, the Internet has spread to more than 210 countries of the world, tied the whole world to one sutra, and has gone the distance.


  Today we will discover the amazing storytelling of the first half-first e-mail, first YouTube video, first multiplayer game, first cybercafe, etc., on the half-century phenomenal trail of the Internet!


First Email (1971)

Handwritten correspondence for the sake of e-mail is gone. People who do not have an email account will rarely be available at this time.

E-mail is so popular that it is estimated that more than 24 million e-mails are circulating around the world every second, that year, that number is pushing over 74 trillion!

But do you know when the first email was sent in history? During our independence war, in that 3! Computer engineer Ray Tomlinson was working on a time-sharing system called Timex.

He uses two programs named CYPNET and SNDMSG together to send the first network e-mail and make a promise! Earlier, e-mail could only be sent from one user to another on one computer, but Ray was the first to send network e-mail from one computer to another. It is the beginning of a new horizon of the information technology revolution.


First Computer Virus (1971)

There are two aspects to the good of all discoveries.


While scientists have been relentlessly researching how to make the Internet more useful to human well-being, mathematician John von Neumann has come up with a fancy idea – how viruses attack human flesh, such as the virus that can be created on the internet!


Whatever he thought — Virus and Worms — he created a theory in the first place — a program that could randomly program computer programs! With his theory, in  1949, an engineer named Bob Thomas of the BBN company made the world’s first computer virus – Creeper! He attacked a computer named Arpanet in 1971.


However, Creeper was not created for any harmful purpose. On the computer infected with Creeper only the text “Approach the creeper: catch me if you can” appears! World’s First Antivirus – The Reaper! It could detect and remove the Creeper virus by locating it everywhere on the computer system.


First Search Engine (1991)

“Search engine” Google comes first in our head. Without Google, the Internet can not be thought of.


But the first search engine was born long before Google. Alan Emtage, a computer scientist at McGill University, was given a Master’s Degree as a System Administrator at the university in 1989.


While at work he found that finding software for students all the time on the Internet was a daunting task! He thought of creating something that could easily find any information he wanted.


From that idea, he created a Script set that can easily find information from Varsity’s system database itself!


First Web Browser (1991)

Now that we all use CodeWeb, it’s the world’s first browser, created by Tim Bernard Lee.


He created the browser for the nuclear recharge of the European company Cern. It could only be run on Nextstep. But since the Nextstep form was not created for everyone to use, the WorldWideWeb browser had no public access.


First cybercafe (1994)

Siberia, the world’s first cybercafe, opened in Britain at the bottom of the event office on London’s Whitefield Street in 1994. Even ordinary people were not used to the Internet.


But over time, the popularity of cybercafe continues to grow and the owners of cybercafe open their branch offices in Paris, Bangkok, Tokyo etc.


The first Facebook profile


Who is Facebook’s first profile? Who again Facebook founder Mark Zuckerberg! In fact, three more profiles were opened before his profile was opened, but because they were experimental, the achievements of the first profile go by the name of Zuckerberg! That profile page was what it looked like


First youtube videos (2005)


The young man named Javed Karim captured the 18-second video in April 2005, at the Zoo in San Diego, then the history!

    Page 1 of 212