RezwanAhmed & His Team || Software Engineer

A C R O N Y Ms::

Read More Durud Sharif during Pandemic


করোনা ভাইরাসে আজ সারা বিশ্ব সহ বাংলাদেশও বিপর্যস্ত ।
সাথে এই মহামারীতে একে অপরকে দোষারোপ করে যাচ্ছে , এমন একটা শক্তিশালী ভাইরাস ছড়ানোর জন্য।
দোষারোপ না করে, সবচেয়ে ভালো হয় – আমরা বেশী করে দোয়া ও দুরুদ শরিফ পড়া। আয়াতুল কুরসি আমরা কম বেশী সবাই পারি । বেশী করে আয়াতুল কুরসি সুরার সাথে সুরা ফাতিহা পড়তে হবে।
বাসা থেকে বের হবার সময় বেশী করে আয়াতুল কুরসি আর সুরা ফাতিহা পড়তে হবে। আল্লাহ্‌ যেন আমাদের সবাইকে সুস্থতা দান করেন।

Short Description of Islamic Scholar Speecher Dr. Zakir Naik


ডাক্তার জাকির নায়েকের সংক্ষিপ্ত পরিচয়:-

ডাক্তার জাকির নায়েক কে ?

আমেরিকার একজন খ্রিষ্টান ডাক্তার উইলিয়াম ক্যাম্পবেল, ১৯৯২ সালে যখন পৃথিবীর বুকে ঘোষণা দিল কুরআন মিথ্যা -ইসলাম মিথ্যা। সাথে তাঁর প্রমাণও দিল। মুসলিম এবং বিশ্বের পবিত্র আল- কুরআন থেকে ৩০ টি ভুল বের করল।কোন মুসলিম এলোনা তাঁর জবাব দেওয়ার জন্য।

সৌদি আরব থেকে কোন মুসলিম এলোনা তাঁর জবাব দেওয়ার জন্য। দেওবন্দী আলেমরা বা কোন পির উলামা এলেননা তাঁর জবাব দেওয়ার জন্য।অনলাইনে কোন মুসলিমও জবাব দিল না। এই নিয়ে ইসলামের বিরুদ্ধে বই লেখা শুরু হল ইসলাম নিয়ে তামাশা বাড়তেই থাকল। ভারত যে দেশে ঘন্টায় ২৬ জন নারী ধষির্ত হয় যে দেশে মুসলিম দের কোন সম্মান নেই বাবরি মসজিদ, ধংস গুজরাটে মুসলিম গনহত্যা ইত্যাদি, ইসলাম বিদ্বেষী ঘটনা। সেদেশ থেকে এল চিকন শামলা বর্ণের মানুষ পেশায় একজন ডাক্তার এই তাঁর পরিচয়।

সেই ডাক্তার গেল আমেরিকার শিকাগোতে খ্রিষ্টান ডাক্তার উইলিয়াম ক্যাম্পবেল এর কাছে (২০০০ সালের ১লা এপ্রিল) ৪ ঘন্টা ১৯ মিনিট ২৩ সেকেন্ডের একটি বিতর্ক। বিশ্বের খাতিমান মিডিয়ার সামনে কুরআনের বিরুদ্ধে সব অপবাদের জবাব তো দিলই সেই সাথে বাইবেল থেকে ৩৮ টিরও বেশি ভুল ধরিয়ে দিল।

ডাক্তার উইলিয়াম ক্যাম্পবেল
কোন উত্তরই দিতে পারল না।শুরু করলেন নতুন এক নবদিগন্তের অভিযাত্রা। লোকটি আর কেউ নন ডাক্তার জাকির নায়েক। আর আজ কিছু মুসলিম ওনার নামে অপবাদ দিচ্ছে। তিনি ইংরেজি ভাষায় কথা বলেন জানিনা আপনারা কতজন ভাল ভাবে ইংরেজি জানেন। নাকি ডাবিং শুনে মন্তব্য করছেন ?

 


Islamphobia Country Bangladeshi Muslim never follow the Law and Safety for Prevention CORONA


Our country people always too much Islamphobia that these Islamic people already forgotten the Important Advice of the Muslim world Last Prophet Hazrat Muhammad Sm.

** Everyone should be staying into his area.
** No-one shouldn’t enter into another area.
** Wash hand Properly one more time.

Administration, what can do, where lots of Awamileage thieves already theft thousand Reliefs of the poor people, work-less people of Bangladesh.

If today, any political party calling to arrange for such type of Seminar as like as Namaz – e – Janaza of Bramanbaria, then they become hard and hardly ban.

But, it’s already proved that the Administration, Police team never control if now happen any big movement of the part of poor citizens of Bangladesh for lack of Relief and proper food.

আজকের বাংলাদেশে যদি কোন বিরোধী দলের সমাবেশ হতো, তাহলে তারা শক্ত হাতে প্রতিরোধ করতো ছাত্রলীগের মত হাতুড়ি বাহিনী দিয়ে।

অথচ, কোথাকার এক আলেম, যিনি একটা দলের সিনিয়র নেতা ছিলেন, তাঁর জানাজায় লাখ মানুষের সমাগম ঘটিয়েছে।

অবাক হতে হয় সব আলেম সমাজ আমাদের বিশ্ব নবী হজরত মুহাম্মদ সাঃ মহামারী সম্পর্কিত যেসব উপদেশ সমুহ বলেছেন – এসব আলেম সমাজ মনে হয় জানে না ভালো করে, আবার জানলেও মানলেনও না ভালো করে।

 

 


Meaning of Phishing Virus Malware Ransomware Firewall and Cyber Attack SmartPhone Security


Phishing

A play on the word ‘fishing’, phishing also tries to lure the unsuspecting to take a bite. It is the process of attempting to fraudulently acquire sensitive data, such as passwords and credit card numbers. Phishing is often attempted with bogus emails, but it can also be done through messaging apps.

Virus

A virus, or more specifically a computer virus, is malicious software that is designed to spread and modify computer programs. Viruses can be used with the specific goal of causing damage to the computer system or to allow hackers to take control of a system.

Malware

Malware –effectively malicious software –is an umbrella term for software that is designed to damage or disrupt a computer. Specific types of malware include spyware, trojan horses, and worms.

Ransomware

A type of malware, ransomware is a software virus that uses encryption to lock a user out of their system. It is used to extort money out of companies and individuals, with those behind the attack only giving access back (if at all) once a ransom has been paid.

Cyber Attack

Any type of offensive action that is designed to unlawfully take control of files, a device, computer system, network, or server, etc. A cyberattack can be a single targeted action against a device, or an attempt to bring down the infrastructure of an organization or government.

Firewall

A firewall is a network security system that is designed to control the flow of data through a computer network. The idea is that the firewall will filter out non-trusted data when passing from one network to another.

Zero-day

A Zero-day vulnerability is a computer software flaw that is unknown to the software’s creators and leaves that software open to exploitation from hackers. This method of targeted hacking is called a Zero-day exploit.

Mobile Security

Mobile security, or mobile device security, is a broad field of security in mobile computing covering passwords, software, hardware, encryption, and so on. It has taken on a greater significance in light of the increasing amount of business and personal financial data now stored on smartphones.


Celebrating 48th Victory Day of Bangladesh


বিজয় দিবসের শুভেচ্ছা সবাইকে।
বিনম্র শ্রদ্ধার সাথে স্মরণ করছি সকল শহীদ আর তাঁদের আত্মার মাগফেরাত কামনা করছি।

বাংলাদেশ আর লাখো শহীদের রক্তের বাংলাদেশ চিরজীবী থাকুক।
বাংলাদেশের শিশু থেকে তরুণ-তরুণী, বৃদ্ধ প্রতিটা মানুষ যেন লাখো শহীদকে সম্মান করে বিজয়ের আনন্দ উদযাপন করে।
বাংলাদেশ নামের আমাদের দেশটা স্বাধীনতার ৪৭ বছরে আমাদের অনেক কিছুই দিয়েছে অনেক কিছু হারানোর সাথে সাথে।
এখন সময় আমরা বাংলাদেশকে যেন ভালো কিছু দিতে পারি ভালো কাজ আর দেশপ্রেম দিয়ে বাংলাদেশকে এগিয়ে নেয়া।

প্রতিটা নাগরিকের কর্তব্য দেশপ্রেম, ভালোবাসা, শিক্ষায় আর উন্নত প্রযুক্তির সাথে সমন্বয় করে নিজের জায়গা থেকে বাংলাদেশকে এগিয়ে নিয়ে যাওয়া।

16th December 1971 is the Iconic historical day Victory day of Bangladesh
Million of people & Oppressed Women sacrifices their lives. Respectfully remember all Martyrs on this 48th Victory
day celebration moments.

Salute & Respect to all Martyrs & freedom fighters of Bangladesh.

Happy and Respected Victory Day 16the December.
May Allah Rest in Peace all people, who lost their life, family for bring a Nation, a Flag, gifted a Beautiful Bangladesh.


Improve Your SEO Search Engine Optimization


No matter if you have a beautifully rendered website, or a stunning portfolio you won’t get very far if you’re lacking sufficient SEO (Search Engine Optimisation).

Google, Yahoo, and Bing are extremely objective when it comes down to things like sitemaps, alt tags, and keywords – just to name a few. Understanding the terminology isn’t really that important, but understanding how to improve your SEO is.

Search Engine Optimization (SEO)

SEO is the process in which the traffic to your website is improved from search engines such as Google, Yahoo, and Bing via organic or algorithmic search results in search engines. The higher a website appears in search results, the higher the number of visitors the page will receive from the search engine. There are several methods to improve your pages ranking without submitting to the paid schemes offered by search engines. Listed below, and in no particular order, are 10 that we believe are absolutely vital!

—————–

1. Page Titles

The title tag is used by search engines to display a page in search results, as well as appearing at top of the browser. These tags tell search spiders and users what your page is about. Google only displays between 50 – 60 characters in their title tags, therefore its important to keep descriptions short, compelling and relevant. Keywords and page topics should feature towards the front.

2. Keywords

The placement of keywords throughout your site is perhaps one of the most important SEO tactics. It’s useful to take into account how someone would search for information on the specific service or product you are offering, as the keywords they use are likely to be the keywords you want to be using. BUT make sure you don’t add ridiculous amounts of keywords, especially if they are unrelated as this can lead to your site being flagged as spam. Search engine spiders are programmed to ignore ‘keyword-stuffing’.

3. ALT Tags

Each image and video that you have on your site can have descriptive words added to its imprint. These are known as alternative text descriptions. These descriptions allow for search engines to locate your page using the keywords found in your image and video descriptions, as well as the usual text throughout the site. Therefore increasing the opportunities your site is found, which consequently raises its page ranking.

4. Sitemaps

A sitemap – a page specifically listing and creating links to all the other major pages on your site – allows for search spiders to locate pages quickly, and with more relevance to the search in question. Therefore every page is easier to find for both the spiders and users alike, and can be reached with significantly less clicks.

5. Mobile Site

‘With nearly 40% of organic traffic coming from mobile devices in 2015’, its hardly surprising that websites with a mobile friendly interface will rank higher in Google searches. Ultimately Google is trying to provide the best user experience – so really the better the user experience on your site, the better you will rank with Google.

6. Don’t Use Flash

Many small businesses like to run their sites using Flash as it is easy to launch and is fairly cheap. However, Google always ranks Flash sites lower then sites running on alternative platforms – partially because you cannot link to an individual page. Changing a Flash-based site to WordPress will hugely increase your search engine rankings.

7. Update Content Regularly

I’m sure this is something you would be doing regularly anyway – but even so, it’s an absolute must! Regularly updated content is viewed as one of the best indicators of a site’s relevancy. Make sure to keep it fresh.

8. URL Structure

A URL is up there in the first things that a search engine uses in order to determine a page rank, hence why it’s vital to make them easy for spiders to search. This can be done by keeping the URLs short (which also enhances the user experience), keeping them relevant to the page’s topic and keywords, and by ensuring the URLs help categorise the site pages.

9. Grow Natural Links

Another key ranking factor in Google’s algorithm is the number of organic and quality inbound links to your site. This works because Google ranks the reliability and relevance of your site partially as a result of how many times it has been recommended by third parties. Therefore it is important to monitor how these links are growing.

10. Monitor your Progress

You won’t know if all your hard SEO work is paying off unless you keep track of your search standings. Keep an eye on your page ranking via tools like Alexa and the Google toolbar. On top of this its important to check your referrer log so that you can see how your visitors arrive to your site, and the search terms they are using to get there.

We hope you find this post useful. Apart from SEO, if you’re looking to have a new website built in Shopify or WordPress, please get in touch and we’ll be happy to help.


BOOT-LOADER


Boot-loader is a piece of code that runs before any operating system is running. Boot-loader are used to boot other operating systems, usually each operating system has a set of boot-loaders specific for it.

A boot-loader is a vendor-proprietary image responsible for bringing up the kernel on a device. It guards the device state and is responsible for initializing the Trusted Execution Environment (TEE) and binding its root of trust.

A boot loader is a type of program that loads and starts the boot time tasks and processes of an operating system or the computer system. It enables loading the operating system within the computer memory when a computer is started or booted up.

A boot loader is also known as a boot manager or bootstrap loader.


Prophet Hazrat Md. Sm. Never Celebration the time of His birthday


Prophet Hazrat Muhammad Sm. never make celebration the time of his birthday. But, Prophet Hazrat Muhammad Sm. celebrated his birthday time by keeping fast. He never celebrated his birthday through  using heavy food, or conference.

মহানবী (সা.) জন্ম তারিখ নয়, জন্ম বার বা জন্মের দিন উদযাপন করতেন। কিন্তু সে উদযাপনও কোনো উৎসব, মিছিল বা ভোজনরসিকতার মাধ্যমে নয়।

মহানবী (সা.) তাঁর জন্মের দিন সোমবার রোজা রাখতেন। হাদিসবিশারদরা লিখেছেন, মহানবী (সা.)-এর জন্মের কারণে প্রতি সোমবার রোজা রাখা মুস্তাহাব। হজরত আবু কাতাদাহ আনসারি (রা.) থেকে বর্ণিত, ‘মহানবী (সা.)-কে সোমবার রোজা রাখা সম্পর্কে জিজ্ঞেস করা হলে তিনি বলেন, ওই দিন আমি জন্মগ্রহণ করেছি। ওই দিনই আমি নবুয়ত লাভ করেছি বা আমার ওপর ওহি অবতীর্ণ হয়…। ’ (সহিহ মুসলিম, হাদিস : ১১৬২)

https://www.kalerkantho.com/online/Islamic-lifestylie/2017/12/01/572332?fbclid=IwAR384VjIoG6_dx8SfMUZitvfYwM6z7OPmz5nytQAJg9N9BKR3jF02uMydbE


Pray to Your Creator and Your Creator or Allaah will Make fill-up Your Wishes


” হে আদম সন্তান, আমার ইবাদতের জন্য তুমি নিজের অবসর সময় তৈরী করো ও ইবাদাতে মন দাও, তাহলে আমি তোমার অন্তরকে প্রাচুর্য দিয়ে ভরে দিব, এবং তোমার দারিদ্র্য দূর করে দিব।

আর যদি তা না করো, তবে তোমার হাতকে ব্যস্ততায় ভরে দিব এবং তোমার অভাব কখনোই দূর করবো না।”

(তিরমিজি ২৬৫৪, ইবনে মাজাহ ৪১০৭)

অতএব সকলের উচিৎ সুখের মালিককে খুশি করা!


KGHS 1999 Batch Reunion


After 19 years, we’re going to get together with all 99 Batch of Khilgaon Gov’t. High School 1999.
We all back to the memory of school session.

It was a different meet up time with all friends of School, and rest of all classmates of the morning shift & day shift of the 1999 Batch of Khilgaon Gov’t. High School located at Dhaka, Bangladesh.


Security Engineering


Security engineering is concerned with the development and evolution of systems that can resist malicious attacks, which are intended to damage the system or its data or information.
Software security engineering is part of the more general field of computer security.

Software engineers should be aware of the security threats faced by systems and ways in which these threats can be neutralized.


Common Attachment Types and Extensions of different File


Common Attachment Types and Extensions (note that some of these extensions could be blocked if you try to send them via email)

Document Type Extension
Microsoft Word .doc or .docx
Microsoft Excel .xls or .xlsx
Microsoft Powerpoint .ppt or .pps
Microsoft Outlook .pst [Personal folder file
Text only .txt
Word Perfect .wp

 

Text only .txt
Rich text format .rtf
Portable Document format .pdf
GIF Graphics .gif
JPEG Graphics .jpg

Document Type                  Extension

Word Perfect                       .wp
Text only                             .txt
Rich text format                   .rtf
Portable Document format   .pdf
GIF Graphics                        .gif
JPEG Graphics                      .jpg
HTML Files                            .htm or .html
Self-extracting Archive          .sea
Executable Files (Windows)  .exe (only open if you know what it is)
Visual Basic Script                .vbs (only open if you know what it is)


Lightspeed and Powerplay


Lightspeed, its low-latency wireless-transmission technology, and PowerPlay, a way to charge mice while using them on a custom mat. Both solve the main complaints some gamers have around wireless mice: that they’re laggy and could lose charge at any moment.

PowerPlay is the more intriguing of the two because it’s something we’ve never seen before in the mouse arena. High-end wireless mice might give you a charging cradle, while others usually pack a cable in the box to juice back up.


SEO Analytics Tools


Raven Tools : Report on all marketing campaigns using metrics that pertain to SEO, PPC and social media.

SEM Rush : This tool gives users the ability to track keywords across both paid and organic search campaigns.

moz : This platform enables users to monitor social media, manage SEO campaigns, and more.

BrightEdge : Measure and improve the SEO of your site with this content performance tool.

MarketMuse : Allow Market-Muse to crawl your site and identify gaps in content, find prominent keywords and determine how your site stacks up against competitors.

gShift : Gauge your company’s web presence with this analysis tool, then use these insights to improve the discover ability of your brand on search and social.

SerpStat : This software conducts in-depth competitive analysis based on SEO performance through domain lookup.


Pervasive Technology and Mobile Computing


The realisation that pervasive technology can provide a direct link between data and people has crystallised into the idea of participatory sensing, which appropriates everyday mobile devices such as cellular phones to form interactive sensor networks that enable public and professional users to gather, analyse and share local knowledge.

Its potential for data collection at a high granularity in space and time, very difficult for scientists to achieve otherwise, together with its potential for citizen involvement at all layers of society, make this an extremely promising tool for monitoring and managing the environment.


Sound Pollution in Bangladesh


I think there have no proper law against this terrible sound pollution in Bangladesh. My hearing system should be damage for this heavy sound of ambulance and Police team’s vehicle.

Though sound pollution happening in many countries, But In Bangladesh, sound pollution is another one greatest issue for the environment.
Most probably, Ambulance, VIP & Police Protocol team vehicle always create so enormous sound on the road that they can go forward swiftly.
Absolutely, this is their duty. But, when an ambulance and Police vehicle fall into a traffic jam. They must try to do wait and stop their whistle of vehicle; otherwise they misconduct the sound pollution law.


Zigbee | IEEE 802.1.5 | IEEE Standard 802.15.2012


A second personal area network standardized by the IEEE is the 802.14.5 standard [IEEE 802.15 2012] known as Zigbee. While Bluetooth networks provide a “cable replacement” data rate of over a Megabit per second, Zigbee is targeted at lower powered, lower-data-rate, lower-duty-cycle applications than Bluetooth. bluetooth_street_small
zigbeewaspmote_exp_radio_board-375

 

 

For example, home temperature and light sensors, security devices, and wall mounted switches are all very simple, low-power, low-duty-cycle, low-cost devices.
Zigbee is thus well-suited for these devices. Zigbee defines channel rates of 20, 40, 100, and 250 Kbps, depending on the channel frequency.


Artificial Intelligence Concepts


One of the first games to be beaten by computer, tic-tac-toe can be used to teach artificial intelligence concepts.

crsqorgwyau5p49


Image

Is the Job Right for You – 4 Things Need to Know


nextstep-infographics-22_3


We need Clean and Traffic Jam free Dhaka City


The Southern section of the city Dhaka important place will be covered through WiFi as well as make Wireless Internet WiFi zone.
That’s a good idea. But, remind this a country never should be Digital only setup WiFi.

A country should be digital, when will make clean city, proper transport system, good highway, lane, suitable transport road and good drainage system.


Mail SERVER Types: POP3 | SMTP | IMAP


In computing, a server is a computer program or a device that provides functionality for other programs or devices, called “clients”. This architecture is called the client–server model, and a single overall computation is distributed across multiple processes or devices. in computing System, there have different types of E-mail server : POP3, IMAP, SMTP, NNTP, LDAP, etc.

  • Post Office Protocol 3 (POP3) servers hold incoming e‑mail messages until you check your e‑mail, at which point they’re transferred to your computer. POP3 is the most common account type for personal e‑mail. Messages are typically deleted from the server when you check your e‑mail.

  • Internet Message Access Protocol (IMAP) servers let you work with e‑mail messages without downloading them to your computer first. You can preview, delete, and organize messages directly on the e‑mail server, and copies are stored on the server until you choose to delete them. IMAP is commonly used for business e‑mail accounts.

  • Simple Mail Transfer Protocol (SMTP) servers handle the sending of your e‑mail messages to the Internet. The SMTP server handles outgoing e‑mail, and is used in conjunction with a POP3 or IMAP incoming e‑mail server.

    Windows Mail also supports additional server types: Network News Transfer Protocol (NNTP), which is used to read and post newsgroup messages, and Lightweight Directory Access Protocol (LDAP), which is used to access directory services.


Bengali Happy New Year 1423


শুভ নববর্ষ ১৪২৩

softdata archive 1423

 

 

 

 

 

সবাইকে অনেক শুভেচ্ছা।
বাংলা নব বর্ষ বরনে শহরের অলিগলিতে, বড় রাস্তার সিগন্যালে থাকবে প্রানের জোয়ার।তরুন-তরুণী, যুবক – যুবতী, বৃদ্ধ – বৃদ্ধা সব বয়সের মানুষের মাঝে থাকবে নুতুন করে এগিয়ে যাবার স্বপ্ন।

আবার দিনের শুরুতে তরুন – তরুণীরা আনন্দের জোয়ারে অতি মাত্রার বেহাল্লাপনা করার আগেে অবশ্যই গতকাল ১৩ই এপ্রিলের পৃথিবীর ঝাকুনির কথা মনে রেখো…!!


Slingbox :: Control Your TV from anywhere, Watch TV From Any Place


Slingbox 500/SlingTV is ideal for anyone looking for a full smart entertainment solution, at home and on the go.

Slingbox grants instant access to live sporting events without blackouts, and time-sensitive breaking national or local news. Slingbox makes it simple to access your live and recorded shows, movies and sports. Whether in the home or on the go, with a Slingbox device connected at home and Slingplayer on your mobile device, you’re in control of your TV experience.

012slingbox-m1-product-photos

Don’t get fooled by “Big Cable”.
You’ve probably heard some of these recently: “Watch your games live!”, “See the latest shows on the road!” Maybe even “Watch your channel live with this app!” We hate to burst your bubble, but the cable companies aren’t telling you the whole truth. Only Slingbox can deliver every bit of content from your TV to any of your internet connected devices

Freedom In Technology


Happy Victory Day 45th celebration of Bangladesh’s Victory in the Liberation War 1971

Happy Victory Day | 44th celebration of Bangladesh’s Victory in the Liberation War 1971

Happy Victory Day !!! December 16, 2015.
The 44th celebration of Bangladesh’s Victory in the Liberation War 1971.
Salute to all freedom fighters and Martyrs of Bangladesh. Long Live Bangladesh.

freedom in technology that’s not new for a Country. A Country is a dream place for every citizen, freedom fighters, every designer, every politician, after all every technologist. Freedom in Technology means that every person can use the technology as well as get more benefit from this technology. When all citizens of a country can use technology except any obstacles, then we can say that Get Freedom In Technology.