this is my ENG-102(communication English) term paper presentation about the topic "Hackers & Hacking in Bangladesh" ,and I choose a title for it - "Bangladeshi Cyber, An Emblem of Hacking" .
This paper deals with a newly arises different crime over social network. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will explorer social networks vulnerabilities, crime and present law for prevention of different crime over social network.
This paper deals with a newly arises different crime over social network. There is a lot of identity theft, theft of personal data, public defamation, cyber stalking and other criminal activities on social network sites. This paper will explorer social networks vulnerabilities, crime and present law for prevention of different crime over social network.
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
Time is now changing faster, it was started with Green Revolution, White Revolution and now it’s time for Data Revolutions. It means Cyber War; in today’s world AI is replacing human beings. A research says that more than 80% work is depending upon AI. Due to this cyber crimes and threats are also increased.
In general cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet.
Computer crime, or cybercrime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
ICTs investments in MENA countries are overtaking the rest of the world but they didn’t improve their cyber legislation systems. Cybercrime in the region is rising alarmingly and there no efforts to tackle this phenomenon. Lack of legislative and technical capabilities are common factors in most Middle East countries along with poor security awareness and education. I’m delighted to introduce my latest research to address these latest cybercrime issues in the region. This research includes extensive study for Internet penetration in MENA, country by country assessment, legal frameworks, and challenges facing legislators in the region.
Al Amin Rahman & Associates is among the very few leading law firms in Bangladesh, having its presence throughout out of the world. We believe in our lawyers, they are very professional in their work and always try to suggest the best opinion according to the situation. We understated the importance of our client and work very carefully towards the procedure of Legal service. For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link.
For further details in regards to LEGAL SERVICE in Bangladesh follow the down below link
Website: http://www.alaminrahman.com/2016/12/27/cyber-law-bangladesh/
Email: info@alaminrahman.com
Time is now changing faster, it was started with Green Revolution, White Revolution and now it’s time for Data Revolutions. It means Cyber War; in today’s world AI is replacing human beings. A research says that more than 80% work is depending upon AI. Due to this cyber crimes and threats are also increased.
In general cybercrime may be defined as “Any unlawful act where computer or communication device or computer network is used to commit or facilitate the commission of crime”.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet.
Computer crime, or cybercrime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.
Want To Learn Hacking Or Ethical Hacking Now This Is The Best Place To Start Up In The World Of Ethical Hacking Or Hacking.The Presentation Will Tell What Actually And Fundamentally Hacking Is.Help You In Differentiating Between A Hacker And A Cracker And All The Basic Concepts Of Ethical Hacking In Today's World.The Presentation Is Basically Meant For Newbies And The People Who Are Eager To Know And Understand What Ethical Hacking Is And What Is The Need Of Ethical Hacking.So After A Brief Description I Quit My Words By Giving The Presentation The Title "An Introduction To Ethical Hacking And Who Is A Hacker For Newbies"
Selected advanced themes in ethical hacking and penetration testingCSITiaesprime
Since 1980 cyberattacks have been evolving with the rising numbers of internet users and the constant evolving of security systems, and since then security systems experts have been trying to fight these kinds of attacks. This paper has both ethical and scientific goals, ethically, to raise awareness on cyberattacks and provide people with the knowledge that allows them to use the world wide web with fewer worries knowing how to protect their information and their devices with what they can. Scientifically, this paper includes a deep understanding of types of hackers, attacks, and various ways to stay safe online. This research investigates how ethical hackers adapt to the current and upcoming cyber threats. The different approaches for some famous hacking types along with their results are shown. Python and Ruby are used for coding, which we run on Kali Linux operating system.
I published a paper on "Ethical Hacking And Hacking Attacks". The purpose of the paper is to tell that what is hacking, who are hackers, their types and some hacking attacks performed by them. In the paper I also discussed that how these attacks are performed.
Today's security is that the main downside and every one the work is finished over the net mistreatment knowledge. whereas the information is out there, there square measure many varieties of users who act with knowledge and a few of them for his or her would like it all for his or her gaining data. There square measure numerous techniques used for cover of information however the hacker or cracker is a lot of intelligent to hack the security, there square measure 2 classes of hackers theyre completely different from one another on the idea of their arrange. The one who has smart plans square measure referred to as moral hackers as a result of the ethics to use their talent and techniques of hacking to supply security to the organization. this idea describes concerning the hacking, styles of hackers, rules of moral hacking and also the blessings of the moral hacking. Mukesh. M | Dr. S. Vengateshkumar "Ethical Hacking" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-6 , October 2019, URL: https://www.ijtsrd.com/papers/ijtsrd29351.pdf Paper URL: https://www.ijtsrd.com/engineering/computer-engineering/29351/ethical-hacking/mukesh-m
designing a customer driving-strategy and mix for a new company in the market place.
this is a group work term paper for MKT-101 (Principles of Marketing) course.
to complete this work one should know more about Principles of Marketing and the markets , and also think as a marketer.
it is a "term paper" of A company's overview.
to crate a term paper in BUS-101(Introduction To Business) course it is important to know about the company, you interested to work on.
the total work can be need more than two or three months for complete a term paper.
"macro-economics" group presentation on "Measuring a nations income".
Example- regarding close economy (household, firms, government) with open economic(NX) discuss.
>to hard to see here so download it.
Here I share a presentation on "Haiku" poetry in the case of English and Bengali literature that I presented in my university as from personal interest. That's why in last of the presentation I give a Haiku example from myself.
Thank you for enjoying the presentation
Levelwise PageRank with Loop-Based Dead End Handling Strategy : SHORT REPORT ...Subhajit Sahu
Abstract — Levelwise PageRank is an alternative method of PageRank computation which decomposes the input graph into a directed acyclic block-graph of strongly connected components, and processes them in topological order, one level at a time. This enables calculation for ranks in a distributed fashion without per-iteration communication, unlike the standard method where all vertices are processed in each iteration. It however comes with a precondition of the absence of dead ends in the input graph. Here, the native non-distributed performance of Levelwise PageRank was compared against Monolithic PageRank on a CPU as well as a GPU. To ensure a fair comparison, Monolithic PageRank was also performed on a graph where vertices were split by components. Results indicate that Levelwise PageRank is about as fast as Monolithic PageRank on the CPU, but quite a bit slower on the GPU. Slowdown on the GPU is likely caused by a large submission of small workloads, and expected to be non-issue when the computation is performed on massive graphs.
Adjusting OpenMP PageRank : SHORT REPORT / NOTESSubhajit Sahu
For massive graphs that fit in RAM, but not in GPU memory, it is possible to take
advantage of a shared memory system with multiple CPUs, each with multiple cores, to
accelerate pagerank computation. If the NUMA architecture of the system is properly taken
into account with good vertex partitioning, the speedup can be significant. To take steps in
this direction, experiments are conducted to implement pagerank in OpenMP using two
different approaches, uniform and hybrid. The uniform approach runs all primitives required
for pagerank in OpenMP mode (with multiple threads). On the other hand, the hybrid
approach runs certain primitives in sequential mode (i.e., sumAt, multiply).
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
Quantitative Data AnalysisReliability Analysis (Cronbach Alpha) Common Method...2023240532
Quantitative data Analysis
Overview
Reliability Analysis (Cronbach Alpha)
Common Method Bias (Harman Single Factor Test)
Frequency Analysis (Demographic)
Descriptive Analysis
Techniques to optimize the pagerank algorithm usually fall in two categories. One is to try reducing the work per iteration, and the other is to try reducing the number of iterations. These goals are often at odds with one another. Skipping computation on vertices which have already converged has the potential to save iteration time. Skipping in-identical vertices, with the same in-links, helps reduce duplicate computations and thus could help reduce iteration time. Road networks often have chains which can be short-circuited before pagerank computation to improve performance. Final ranks of chain nodes can be easily calculated. This could reduce both the iteration time, and the number of iterations. If a graph has no dangling nodes, pagerank of each strongly connected component can be computed in topological order. This could help reduce the iteration time, no. of iterations, and also enable multi-iteration concurrency in pagerank computation. The combination of all of the above methods is the STICD algorithm. [sticd] For dynamic graphs, unchanged components whose ranks are unaffected can be skipped altogether.
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
The Building Blocks of QuestDB, a Time Series Databasejavier ramirez
Talk Delivered at Valencia Codes Meetup 2024-06.
Traditionally, databases have treated timestamps just as another data type. However, when performing real-time analytics, timestamps should be first class citizens and we need rich time semantics to get the most out of our data. We also need to deal with ever growing datasets while keeping performant, which is as fun as it sounds.
It is no wonder time-series databases are now more popular than ever before. Join me in this session to learn about the internal architecture and building blocks of QuestDB, an open source time-series database designed for speed. We will also review a history of some of the changes we have gone over the past two years to deal with late and unordered data, non-blocking writes, read-replicas, or faster batch ingestion.
1. 1 | P a g e
Bangladeshi Cyber , An Emblem of Hacking
Taibul Islam
2013-3-10-020
ENG 102
Section : 15
Ms. Israt Jahan
12th
August , 2014
2. 2 | P a g e
Index :
1. Abstract page - 3
2. Introduction page -4
3. Hack and Hacking page - 5
4. Hackers page - 6
5. History of Hacking in Bangladesh page - 7
6. Main or Negative Uses page - 8
7. Positive Uses page - 9
8. Kill or Cure page - 10
9. Conclusion page - 11
10. References page – 12
11. People who gave the interview page – 13
12. Sample Question for solving term paper page - 14 – 16
3. 3 | P a g e
Abstract:
Hackers and Hacking are two related terms which really means the abuse of some
kind of technology . Mainly these kinds of words are related with computer terms . In our
country Bangladesh , these terms are now so much well known that people think these
are some kind of negative matter . The title of this term paper is giving a overall
massage about the hacking sector also . So , this term paper will help one to come at a
point which is the real meaning of Hacking and hacking sector in our country
Bangladesh.
4. 4 | P a g e
Introduction :
In our modern Bangladesh where the uses of technology is increasing day by day
, the abuses of those technology is also increasing . People are involved in technology for
their mutual benefit or profit but some people are also involved in abuses . The
honorable government have their law for the using of technology where the abuses rate
is increasing and people are now so much aware of that . The affected users always want
the law should be obeyed , as hacking create its huge face among the technology users .
5. 5 | P a g e
Hack and Hacking:
Clearly, “hack” is the word of the moment ; its technological connotations
have proliferated in both scope and presence . It was at M.I.T. that “hack” first came to
mean fussing with machines . In the nineteen hundred sixty , the term seems to have
migrated from the M.I.T. context to computer enthusiasts in general and in time became
an essential part of their lexicon . ( source: www.newyorker.com/tech/elements/a-short-
history-of-hack )
Hacking may be done in many ways . Computer hacking , including some types of
activity, e.g. Hacker ( programmer subculture ) , activity within the computer programmer
subculture and Hacker ( computer security ) , to access computer networks , legally or
otherwise . Sometimes it may causes computer crimes .
Phone hacking , the practice of intercepting telephone calls or voicemail messages without
the consent of the phone's owner .
Illegal taxicab operation .
Pleasure riding , horseback riding for purely recreational purposes .
Shin-kicking The act of stealing jokes .
Hacking , an area within , Roof and tunnel hacking . This kind of hacking called offline-
hacking.
6. 6 | P a g e
Hackers:
Hacker is a term that has been used to mean a variety of different things in
computing .
Currently , "hacker" is used in two main conflicting ways ,
1. as someone who is able to subvert computer security ; if doing so for malicious
purposes , the person can also be called a cracker .
2. an adherent of the technology and programming subculture .
In computer security , a hacker is someone who focuses on security mechanisms of
computer and network systems . While including those who endeavor to strengthen such
mechanisms , it is more often used by the mass media and popular culture to refer to
those who seek access despite these security measures . That is , the media portrays the
'hacker' as a villain .
In the programmer subculture of hackers , a hacker is a person who follows a spirit of
playful cleverness and loves programming . It is found in an originally academic
movement unrelated to computer security and most visibly associated with free software
and open source . It also has a hacker ethic , based on the idea that writing software and
sharing the result on a voluntary basis is a good idea , and that information should be
free , but that it's not up to the hacker to make it free by breaking into private
computer systems .
7. 7 | P a g e
History of Hacking in Bangladesh :
Maybe the Hacking first started in 1947 by William Shockley who invented the
transistor and demonstrates its use for the first time . The first transistor consisted of a
messy collection of wires , insulators and germanium . According to a recent poll
on CNN's website , the transistor is believed to be the most important discovery in the
past 100 years .
The history of hacking in Bangladesh is actually unknown to all , on the other hand this
sector is an increasing or raising part in our country at present . Mostly the abuses of
internet means the main part of hacking in Bangladesh and it is increasing now a days .
8. 8 | P a g e
Main or Negative Uses :
Hacking is mainly known for its negative uses . People think the hacking is only
for bad or harm someone or some group who or which is related with technology .
Actually , the hacking is mainly for that . Hackers through their terms for hacking
technologies . From the beginning the Hackers think that they always do the right thing
which should be done who are Hacked by them . These kind of Hackers are known as
The black hat hackers , who hacked the technology only for some kind of jealousy or for
their personal benefit . In our country Bangladesh these kind of Hacking is increasing
more and more among the new users of technology , and the people called these kind of
term as the Cyber War. They always target mostly Financial data , Intellectual property ,
personal data , System asses etc .
9. 9 | P a g e
Positive Uses:
The uses of Hacking can be positive by hackers . These Kind of hack or hackers
are often known as the White hat Hackers . These kind of Hacking mainly done only to
save Hacked technology or secure the technology from hacking . Most of the Hackers
first starts their Hacking life by using this type of Hacking , sometimes they also work
as a middle group for hack and hacking terms or technology . People mostly think that
these term should be increased only for its positive side . These kind of uses can be
increased if people want this kind of uses .
10. 10 | P a g e
Kill or Cure :
There are a law to stop the Hacking , and it says that if a person intentionally
causes loss or damage to any other person or organization by any act which destroys ,
deletes or alters any information residing in a computer resource or diminishes its value
or utility or affects it by any means , would be considered to have engaged in hacking.
So for the cyber crime this law can be applied in everywhere . And the main thing is
awareness of the users and people .
11. 11 | P a g e
Conclusion :
It is clear to everyone that there are mainly two kind of hackers , White hat and
Red hat hackers. There have another hackers who try to call them as Gray or Brown hat
hackers . Hackers identity can be defined in many ways but these should be stopped or
in some case these should be cured not only from Bangladesh but also from the whole
world . So , the reader of this term paper , I think , a real technology user and always uses
his / her technology only for using not for abusing .
12. 12 | P a g e
References :
a) Hacking
b) Hacker
c) Hacking Term
d) History of hacking
## These following terms are collecting from –
1) Wikipedia
2) Wikimedia
3) Google
## The terms of Hacking sectors of Bangladesh from -
A) TeachtuneBD.com
13. 13 | P a g e
People who gave the interview :
1. Md. Ismail Hossain , CSE department , IUB
2. Rafaetul Kabir Adeab , CSE department , IUB
3. Code – A , EWU ( Hacker )
4. Sabbir Ahmed , CSE department, AIUB
5. Md. Tanvir Hossain Tuhin , CSE department , AIUB
6. Al Masum Fahim , CSE department , AUST
There are another two people who didn’t like to give their identity .
These people are giving their valuable time and ideas to complete this term
paper.
14. 14 | P a g e
Bangladeshi Cyber , A Emblem of Hacking
Interviews for the term paper of ENG – 102
Questionnaires
(If you are a “Hacker” your name and detail must be hidden)
Student name :
University name :
Department :
1. What do you mean by Hack or Hacking ?
a) It is full of logic
b) It is nothing but hell
c) It should be stopped
d) It should be done in an increasing rate
2. Are you a Hacker ? (This answer will be hidden)
a) No
b) Yes
c) Want to be
d) Don’t want to be
3. What kind of Hacking should be done ?
a) White Hat
b) Red Hat
c) None of them
d) Both of them
15. 15 | P a g e
4. Is it so much helpful ?
a) Yes
b) No
c) Can be
d) Must be
5. Hacking increases ideas – Do you agree with that ?
a) Yes
b) Obviously
c) Only for sometime
d) No
6. Hackers are so much genius – Is it true ?
a) Yes
b) Not always
c) No
d) May be
7. Will Hacking make our country developed ?
a) Yes
b) No
c) Can be
d) Must be
8. How many technologies you Hacked ? (This answer will be hidden)
a) Less than 100
b) More than 100
c) Didn’t do
d) Can’t count
16. 16 | P a g e
9. How many technologies that you use is Hacked ? (This answer will be hidden)
a) Mostly all
b) Not any
c) Half of them
d) I Hacked others
10. Your idea or philosophy about Hacking in Bangladesh -------------------------
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
Your signature :
Date :