whatsapp
07August

NFT collection for Garments Industries using Block-chain Technology.

NFT in the clothing business may create positive memories for us. For instance, since we were young, we bought a lot of clothes at various ages and seasons. After using the clothes, they occasionally broke and we forgot about it. The NFT in the clothes industry is an excellent solution if any clothing house uses it, since it increases brand value, if the clothing firm offers us a softcopy (NFT) with the hard copy we may use in META in our older life.NFT in the clothing business may create positive memories for us. For instance, since we were young, we bought a lot of clothes at various ages and seasons. After using the clothes, they occasionally broke and we forgot about it. The NFT in the clothes industry is an excellent solution if any clothing house uses it, since it increases brand value, if the clothing firm offers us a softcopy (NFT) with the hard copy we may use in META in our older life. Many domestic brands are less valued than many foreign brands, thus employing NFT in clothes can help increase all of our clothing businesses.

Read More
07August

ব্লকচেইন এ বাংলাদেশ

আজ এই তথ্য প্রযুক্তির যুগে ব্লকচেইন প্রযুক্তি সাড়া বিশ্বে আলোড়ন সৃষ্টি করেছে। যুগের সাথে তাল মিলানর খাতিরে বাংলাদেশকেও ব্লকচেইন প্রযুক্তি নিয়ে কাজ করতে হবে। ব্লকচেইন আধুনিক যুগের এক নব উদ্ভাবিত প্রযুক্তি। ব্লকচেইন প্রযুক্তি ১৯৯১ সালে গবেষণা বিজ্ঞানী স্টুয়ার্ট হ্যাবার এবং ডব্লিউ স্কট স্টরনেটা দ্বারা বর্ণনা করা হয়েছিল। ২০০৮ সালে, সাতোশি নাকামোতো ডিস্ট্রিবিউটেড ব্লকচেইনের তত্ত্বের ধারণা করেছিলেন যা বিটকয়েন ক্রিপ্টোকারেন্সি লেনদেনের জন্য কাজ করে। কিন্তু বর্তমানে এই ব্লকচেইন প্রযুক্তির নানা ক্ষেত্রে এই প্রযুক্তি উল্লেখযোগ্য অবদান রাখছে।বিকেন্দ্রিক তথ্য বণ্টনের

Read More
07August

Mask detection software using raspberry pie

Raspberry Pi is successfully implemented in the RPi project used, namely TensorFlow and the pre-trained CNN model, and the Raspberry Pi, which is a mobile device as a system for detecting masks. On March 11, 2020, the World Health Organization (WHO) proclaimed Covid-19 a worldwide epidemic. In a guide on the use of masks for decision-makers, health workers, and/or healthcare managers, issued by WHO, the advice for the use of masks in the context of the Covid-19 epidemic has been regulated. As an early preventive measure, mask use has become essential for everyone during the Covid-19 pandemic, especially in areas that have been identified as high or low transmission zones. This is also supported by numerous implementations of policies that are appealing and imposing sanctions for violators of the mandatory wearing of masks.

Read More
07August

Social Engineering

The term "social engineering" refers to many malevolent behaviors carried out through human relationships. It employs psychological tricks to persuade users to make security blunders or divulge critical information. It's all about recognizing who and what to trust when it comes to security. It's critical to understand when and when not to take someone's word for it and whether the person you're speaking with is who they claim they are. The same is true of online interactions and website use: when do you trust that the website, you're using is reputable or secure enough to disclose your personal information to?

Read More
07August

Insider Threats

According to (Mohammed Nasser Al-Mhiqani al., 2020) An insider threat is a malicious threat to a company that arises from persons within the company, such as workers, former employees, contractors, or business allies, who have inside knowledge about the company's security processes, data, and computer systems. Fraud, theft of sensitive or economically valuable information, theft of intellectual property, or sabotage of computer systems are all possible threats. The insider threat has become a well-recognised concern and one of the most significant cybersecurity threats.

Read More
07August

Computer Crime

A distributed denial-of-service attack, also known as a DDoS attack, is a malicious attempt to disrupt a targeted server's, service's, or network's regular traffic by flooding the target or its surrounding infrastructure with Internet traffic.DDoS attacks are carried out with networks of Internet-connected machines. These networks consist of computers and other devices (such as IoT devices) which have been infected with malware, allowing them to be controlled remotely by an attacker.

Read More