21.1.24

Ram Chahiye Poem || Ram Chahiye Kavita

 Ram Chahiye || Ram poem || ram par nayi kavita || 

राम चाहिए

दशरथ, कौशल्या को निःसंतान न रहने राम चाहिए

तो सीता जी को मांग में भरने राम चाहिए

 

विश्वामित्र जी को दिव्यास्त्र सौंपने राम चाहिए

तो कबंध को श्राप से मुक्ति के लिए राम चाहिए

 

परशुराम जी के धनुष को तोड़ने राम चाहिए

तो ताड़का, खर और दूषण को मारने राम चाहिए

 

पत्थर बनी अहिल्या तार ने राम चाहिए

तो रावण को मारने राम चाहिए

 

शबरी के झूठे बेर खाने राम चाहिए

तो राम राज्य से प्रजापालन को राम चाहिए

 

सुग्रीवको बाली की शक्ति से बचाने राम चाहिए

तो हनुमानजी की भक्ति के लिए राम चाहिए

 

विभीषण को मान सम्मान के लिए राम चाहिए

तो जटायु की मुक्ति के लिए राम चाहिए

 

और अंत में लक्ष्मण, भरत और शत्रुघ्न को राज नहीं राम चाहिए

अरे कंदर्प इंसान की मृत्यु के बाद भी राम नाम चाहिए

और आप पूछते हैं राम क्युं चाहिए

-- Poem Written, Composed, Video making and Voice by @KandarpParmar 

-- Images are downloaded from the pinterest @pintereset @himaniparmar

11.9.23

What is Firewall

 FIREWALL

            A firewall is a fundamental network security device or software that acts as a barrier between a trusted internal network (such as a company's private network) and an un-trusted external network (typically the internet) to control and filter incoming and outgoing network traffic. Its primary purpose is to enhance network security by enforcing a set of rules and policies that determine which data packets are allowed to enter or leave the network.

 


Here are some key aspects and functionalities of a firewall:

  1. Packet Filtering: Firewalls inspect individual data packets and make decisions based on predefined rules. These rules specify which packets are permitted and which are denied based on criteria like source and destination IP addresses, port numbers, and protocols.

  2. Stateful Inspection: Many modern firewalls use stateful inspection, which keeps track of the state of active connections. This allows them to make more informed decisions by considering the context of the traffic. For example, it can distinguish between legitimate responses to outgoing requests and potentially harmful incoming traffic.

  3. Access Control: Firewalls can be configured to control access to specific network services and applications. They can block or allow traffic to particular ports (e.g., web servers on port 80 or email servers on port 25) based on your network security policies.

  4. Proxying and Network Address Translation (NAT): Firewalls can act as intermediaries, forwarding requests and responses between internal devices and external servers. This is known as proxying. They can also perform Network Address Translation (NAT), hiding the internal network's IP addresses from the external network.

  5. Intrusion Detection and Prevention: Some advanced firewalls incorporate intrusion detection and prevention capabilities to identify and block suspicious or malicious traffic patterns. They can also be configured to log and alert administrators about potential security threats.

  6. Application Layer Filtering: Next-generation firewalls (NGFWs) go beyond traditional packet filtering and can inspect the content of data packets, including the applications and services being used. This allows for more granular control and protection against modern threats.

  7. Logging and Reporting: Firewalls maintain logs of network traffic and security events, which can be invaluable for monitoring network activity and investigating security incidents. They often offer reporting features to help administrators analyze this data.

  8. Virtual Private Network (VPN) Support: Many firewalls support VPNs, enabling secure, encrypted communication over untrusted networks. This is particularly important for remote access and connecting branch offices securely to the main network.

  9. Security Policies: Firewalls are configured with security policies that dictate how they should handle traffic. These policies are defined based on the organization's security requirements and can be quite detailed.

  10. Zones and DMZs: Firewalls often divide the network into zones, such as trusted, semi-trusted, and untrusted. A Demilitarized Zone (DMZ) may be established for hosting publicly accessible services, with more stringent rules.

Firewalls play a crucial role in safeguarding networks from unauthorized access, cyberattacks, and potential threats. They are a critical component of network security, forming the first line of defense in protecting sensitive data and ensuring the integrity and availability of network resources. Firewalls are used in various environments, including home networks, corporate networks, data centers, and cloud infrastructures.

 

8.2.23

Known Full Forms

 Networking Full Forms

LAN = Local Area Network
 
CAN = Campus Area Network
 
MAN = Metropolitan Area Network 

WAN = Wide Area Network

Wi-Fi = Wireless Fedility

TCP/IP = Transmission Control Protocol / Internet Protocol

FTP = File Transfer Protocol

HTTP = Hyper Text Transfer Protocol

HTTPS = Hyper Text Transfer Protocol Secured

SMTP = Simple Mail Transfer Protocol


30.1.23

File Extensions

File extensions are used to identify the file of a computer. There are so many file extensions over the computer world, but there are some most known file extensions are

.DOC OR .DOCX = Microsoft Word

.XLS OR .XLSX = Microsoft Excel

.PPT OR .PPTX = Microsoft PowerPoint 

.PDF = Portable File Format

.PSD = Photoshop Document

.JPEG OR .JPG = Joint Photographics Expert Group

.PNG = Portable Network Graphics

.GIF = Graphical Interchangeable File Format

.AVI = Audio Video Interleave

11.11.22

HOW TO MAKE QR CODE

HOW TO MAKE QR CODE

 

To make QR code for free open www.canva.com

Then select any image type like Instagram Square Post



Then go to QR Code section from the left pane



Type the content you want to convert as a QR Code, customize if you want to change the foreground and background colours and Margin

 

Then click on generate

 

Tada………….. Your QR Code is Ready