Posts

Showing posts with the label FACEBOOK MARKETING

What is Router and Router Network ?

Image
 ROUTER :  Router is the Foremost function of a network layer. Routing is defined as the decision made for establishing a path from Source to Destination.  Routing Decisions are made by routing algorithm, Which are in numbers. Depends on the user to choose, one of them, which best suits his purpose. Every Router Must have It's Unique ID To send and Receive data from other Computer or Network. Create a Root from Source to Destination. For Example , Multiple Systems have Only One Printer then it must be necessary to do work on first come first serve basis.                                                             Fig. Router Working. Routing can be classified as follows :  (1). Static Or Non-adaptive Routing : In this routing, the path from source to destination to decides and  freezed. Every packet for the full session will have to follow this path Every Packet for the full session will have to follow this path. If some obstruction aries then packet will be hold up in the path bu

What Is IPv6 Address ?

Image
 IPv6   IPv6 is a short form of Internet Protocol version 6. It was Designed by the IEFT to replace the current version internet protocol, IP version 4 (IPv4) It is also referred to as the next generation internet Protocol. IPv6 Support large Number of hierarchical addresses that will be allow the internet to grow and provide new routing capabilities not built into IPv4. Like IPv4, IPv6 associate an address with specific network connection, not with the specific computer. Thus address segment are similar to IPv4. IPv6 permits multiple prefixes to be assigned to a given network, and allow a computer to have multiple, Simultaneous Address per Network.   Fig: IPv6 Types Of IPv6 Address: There are Three Types of IPv6 Addresses, Which are as Follows:- (1). Unicast : The Destination address specific a single computer (Host or Router), The datagram should  be routed to the destination along a shortest path. (2). Anycast : The Destination is a set of computers possibly at different location, t

What is TCP and UDP ? Its Differences.

Image
 TCP (Transmission Control Protocol) : TCP is a communication Protocol is an Standard way to define how to Establish and Maintain a Network Conversation through which applications or programs can exchange data. TCP work with IP(Internet Protocol),Which define how computer send packets of data to each other. TCP and IP are the basic rules defining the internet.   Fig: TCP Working Dig.                          UDP(User Datagrams Protocol): UDP Provide the primary mechanism that application programs used to you send datagrams to other application programs. UDP provide protocol ports Used to distinguish among multiple programs on a single machine. In UDP, in addition to the data sent, each UDP message contains both a destination port number and a source port number. Making it possible for the UDP software at the destination to delivery the message to the correct recipient and for the recipient to a send a reply. As Show in the given Diagram.      Fig: UDP Working Model. Differences Betwe

What is Sniffing ? Its Types.

Image
Sniffing:- It is the act of collecting packets from network collection using either a special application or aap piece of hardware called as sniffer. A Sniffer takes a copy-of an display all of the traffic and network card sees. When implemented correctly a sniffer is completely passive, having no effect on the traffic. Except for the Fact that it takes processing time and memory, a sniffer Should have no effect on its host computer. Ethereal,Ettercap, and Packetyzer are some popular sniffer that allow for traffic collection and Tcp stream reconstruction. Traffic collection refers to the sniffers ability to receive a copy of network traffic. Traffic analysis is the sniffer's ability to break out relevant fields from the captured packets.  Fig : Packet Sniffing PACKET Sniffing :-  A General packet sniffer captures all packets And something as Diagnostic tools to help you examine and troubleshoot packet contents and connections. Basically the attackers has modified the software of a

What is Phishing?

Image
 Phishing:-   It is the most common form, is the process of luring a victim to a fake website by clicking on a link.The victim usually encounter the link in email message sent to him on a web page Bin browse by him. It's a methods Mostly Used by the hackers to Trap Peoples and get valuable Information From User Site's Or System. Its Many Types of Online Methods to Trap the People and get the Information they want and they use that information in many Purpose or Sold your Information too some one harm you or your data directly or Indirectly. Once the victim click on the link He/She may be induced to divulge sensitive information such as His credit card number or password. Phishing attempts often use URL's dad are very similar to the real URL. For example: Real URL maybe www.Truebank.com  Fake URL maybe www.Trubank.com       FIG : PHISHING  Methods of Phishing: Three of the most popular methods fisher employee are as follows: (1). Impersonation :- Impersonation Is the most p

What is FACEBOOK Lite ?

Image
FACEBOOK Lite is an Lite App of Facebook. Which was espacially Design or developed to easily useable on small mobile and where space have less space to install apps. Facebook Lite App Size Was 1.5Mb Approx. Which was very small and its Easily Able to install by anyone at Any Phone. Its Data Quality and Some special high level functions are not available in Facebook lite. But it contains all the basic features Facebook. Image and vedio quality are medium as compared to Facebook. Shared content has also so have Limited quality. Facebook lite design for small mobile Who cant able to install Facebook. Its Was very Popular in Facebook Apps. Over 1 Billion people Download this Which was very attractive.

What is FACEBOOK For in 2022

Image
FACEBOOK : FACEBOOK is Generally a Social Public Interface Platform Where People Come To share their photos, and videos and do Some Live Streaming, and Comment on Others' Posts. FACEBOOK Used To Easily share Our feelings with the help of (photos, videos, live streaming)  with Family and Friends or the Public, and Comments on Other posts.                                              IMG:  Mark Zuckerberg(CEO)  FACEBOOK is also a vast world or We can Say It Was a Technical Or Social County its population was in crores and we get easily in touch with the people you want and it's very easy to find them. FACEBOOK User interface was One of the Best.Its Easy to Understand by Any People Even Many Uneducated people also use this to entertain themselves. FACEBOOK was also Used For Digital Or Social Marketing  due to its high volume of users. Many National and International Companies Come on FACEBOOK To Find their Customers. FACEBOOK Increases their Growth By Brought some Of the Grea

What is Cyber Crime? | Its Classifications.

Image
  Cyber Crime :    "A Crime in which a Computer was directly and Significantly instrumental" . " Any illegal that targets the security of  computer system and the data proceed by them,Which is directed by any electronic operation,is called cybercrime ". The term "Cyber-Crime" has other names also such as : Internet Crime. E-Crime. High-tech Crime. Computer Related Crime Etc...    Classification Of Cyber Crime: (1).Crime Targeted Against Individuals:   This Kind of Crime are Exploited because of human weakness like greed and naivety.Financial Frauds,Sale of non existent,child pornography,Copyright violation etc. are example of this crime. As the Internet is Developing Day by Day the Criminals are Exploring them with new tools that are expanded to a large number of victims. (2).Crime Targeted Against Property:   The Stealing of mobile phones is included in this Category.Cell phones,laptops,personal Digital Assistant(PDAs) and Removable medias(CDs and Pen dri

What is (E-Mail or IP)Spoofing?

Image
  Spoofing : The most  Common  Type of Spoofing that You are Likely to encourage is  IP  Or  E-Mail  Spoofing.  Primarily used to  Spoof   The Source  Address  of the E-Mail or IP of the Device. In this Case E-Mail is look Just Like E-Mail come from the Trusted Server or Website.But its come from the Wrong Or Harmful sites Which Directly or Indirectly Affect the Customer In Various Ways. It's Common In Now Days People Submitted Their Emails at many untrusted websites and We Don't know where they use our information.  E-Mail Marketing is also a very Big-market your E-mails also used for that purpose to send you some deals by them and many other uses.                                                                 fig:-  Example Of Spoofing E-Mail Spoofing used to :- (1) . Delivery   a  phishing  message (One that cons the user into divulging confidential information)  Replying to the E-mail won't work properly,but clicking on links in the E-mail will take the user to a spoo

DIFFERENT TYPES OF FACBOOK ADS | 2020

Facebook Ads   are extremely versatile and there are now 11 different variations you can use to solve a whole host of business problems from driving traffic to your website to reaching people in your local area.  Below is a list of the various Ads available to Facebook advertisers and throughout this chapter, we’ll walk you through each type individually.              1. Boost your posts.              2. Promote your Page.               3. Send people to your website.               4. Increase conversions on your website.               5. Get installs of your app.               6. Increase engagement in your app.               7. Reach people near your business.              8. Raise attendance at your event.               9. Get people to claim your offer.             10.Get video views.              11.Collect leads for your business. HOW TO CHOOSE YOUR AD TYPE : When you go to create a new Facebook ad (by clicking the green button on your ads dashboard), you’ll get to choose among t