RezwanAhmed & His Team || Software Engineer


Ensure Security of The Social Page facebook and LinkedIn


People sometimes have no idea that anytime their business page of social page Facebook, LinkedIn can hack for lack of following some step. For ensure the security, and Protect Facebook business page You can follow this. From my long experience, I will suggest always following some major Security System for Protect Your Facebook and Social Media Page.

  1. Must should be open an individual account for page.
  2. And than ownership and admin section give access permissions only the Page Author.
  3. Then Made an Individual Account for your page account.
  4. Ensure 2 factor Authentication of the Page.
  5. always using your phone number base logging code.

Realtime Web filtering Online Security Extension make Secure Web Surfing

Real-time web filtering Comodo Online Security extension for Browser Chrome, Internet Explorer, Mozilla firefox which protects you online by instantly blocking harmful and phishing websites.
Real-time web filtering Comodo Online Security extension make protects you online.

  • Instantly blocks dangerous and fraudulent websites
  • Works with incognito, private and normal browsing modes
  • Takes seconds to download and install
  • No impact on browsing speed
  • Blocks different harmful websites which may have been missed by in-browser web filters

Antivirus and Internet Security: Difference of Function

Antivirus (AV) software provides a basic level of protection for your system,. However, Internet Security expands on capabilities such as scanning files and software, activity monitoring and vulnerability search with features tailored for Internet use.

Indeed, many Internet Security products are marketed as ‘suites’ because they contain several different programs that can be accessed by a single interface. These might include a firewall, anti-spam controls, ad blockers, webcam protection, keylogger protection, parental controls and credit card safeguards.

There might also be additional protection against web-specific types of malware such as spyware and adware.

Cat5 vs Cat5e vs Cat6

Cat5 vs Cat5e vs Cat6

The primary differences between the various types of computer and telephone (CAT) cabling available, specifically the difference between CAT5, CATe and CAT6. In a nutshell, the primary differences boil down to differences in the way each conveyance media handles network support, crosstalk, and bandwidth.

Cat5 vs Cat5e

  • Network Support – CAT 5 cable will support 10BASE-T and 100BASE-T network standards, that is it supports networks running at 10 Mbps or 100 Mbps. CAT 5e is an enhanced version of Cat5 that adds specifications for crosstalk (see below). Cat5e cable is completely backwards compatible with Cat5, and can be used in any application in which you would normally use Cat5 cable. However, the added specifications of Cat5e enable it to support Gigabit Ethernet (1000BASE-T), or networks running at 1000 Mbps.


  • Crosstalk – Crosstalk is the “bleeding” of signals between one cable into another, due to a process called induction. This effect can result in slow network transfer speeds, and can even completely block the transfer of signals over the cable. Cat5e cable has been improved over Cat5 cable in this respect, and crosstalk has been greatly reduced.


  • Bandwidth – The bandwidth of a given conveyance media is essentially it’s information carrying capacity. The greater the bandwidth of a system, the faster it is able to push data across a network. Cat5 is rated at 100Mhz while Cat5e is rated at 350Mhz. This coupled with other more stringent specifications makes Cat5e ideally suited for networks which plan to operate at Gigabit Ethernet speeds.


  • Bottom Line: If you plan on to implement Gigabit Ethernet, go with Cat5e. Also, the small increase in price of Cat5e over Cat5 is more than made up for by “future proofing” your network’s cabling infrastructure.

Security Management

Security management is vitally important, but it is not usually considered to be part of application security engineering. Rather, application security engineering is concerned with designing a system so that it is as secure as possible, given budget and usability constraints. Part of this process is ‘design for management’, where you design systems to minimize the chance of security management errors leading to successful attacks on the system.

For critical control systems and embedded systems, it is normal practice to select an appropriate infrastructure to support the application system.

Pretty Good Privacy PGP

Pretty Good Privacy (PGP) is an e-mail encryption scheme that has become a de facto standard. Its Web site serves more than a million pages a month to users in 166 countries [PGPI 2012]. Versions of PGP are available in the public domain; for example, you can find the PGP software for your favorite platform as well as lots of interesting reading at the International PGP Home Page. 

When PGP is installed, the software creates a public key pair for the user. The public key can be posted on the user’s Web site or placed in a public key server. The private key is protected by the use of a password. The password has to be entered every time the user accesses the private key. PGP gives the user the option of digitally signing the message, encrypting the message, or both digitally signing and encrypting.


RANSOMWARE – A Type of Malicious Software and Malware

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid.

Ransomware stops you from using your PC. It holds your PC or files for “ransom”.

There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

ransomware-all-you-need-to-knowRansomware can:

  1. Prevent you from accessing Windows.
  2. Encrypt files so you can’t use them.
  3. Stop certain apps from running (like your web browser).
  4. The most  common format of the extensions that Ransomewares come in are – exe. , doc. , ppt., XLS., Java Script – JS. VB Script –  VBS. 

How Will Take Protection against this Ransomware:

  1. use a reliable, paid antivirus as well as free basis good security products that includes an automatic update module and a real-time scanner.
  2. don’t store important data only on my PC .
  3. using 2 backups tools for save data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.
  4. The Dropbox/Google Drive/OneDrive/etc. application on my computer are not turned on by default.
  5. The OS – Operating System and the software I use is up to date, including the latest security updates.
  6. don’t use an administrator account on my computer.
  7. turned off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc. in the browser.
  8. adjusted all browsers’ security and privacy settings for increased protection
  9. removed outdated plugins and add-ons from browser.
  10. use an ad blocker to avoid the threat of potentially malicious ads.



Ransomware (a.k.a. rogueware or scareware) restricts access to your computer system and demands that a ransom is paid in order for the restriction to be removed.

A decade-old form of malicious software known as ransomware has been making headlines after cybercriminals hijacked hundreds of thousands of computers worldwide.
Ransomware, which is often transmitted by email or web pop-ups, involves locking up people’s data and threatening to destroy it if a ransom is not paid.
businesses and individuals do to protect themselves from ransomware.
** Update your software
** Install antivirus software
** Create backups of your data
** Create a security plan for your business and Personal PC.

Microsoft Asia launched its Malware Infection Index 2016

Absolutely, it should make obstacle to develop digital Bangladesh, if the Government cannot maintain as well as develop the security system of the Internet Gateway System of Bangladesh. Then hackers should be easily hacked many websites.

13412948_1126320390761724_2472809649983622035_nOn the last June 7, 2016 Microsoft Asia launched its Malware Infection Index 2016, which has found that Bangladesh is among the top three vulnerable countries at risk of malware threats.

Out of the top five locations across the globe most at risk of infection, a total of four are from the Asia-Pacific — Pakistan, Indonesia, Bangladesh and Nepal, topping the rankings at first, second, third and fourth places respectively in terms of computers encountering malware.

These malware can steal users’ personal information, download more malware, or give a malicious hacker access to the PC. The findings are based on data from the Microsoft Malware Protection Center (MMPC) and the Microsoft Security Intelligence Report (SIRv20).