Everything You Need To Know About 5G Network

As more and more people get connected globally, it puts pressure on the communication industry to aim for better networks. And the answer is the 5G mobile network which will soon replace its predecessor 4G LTE services. 

Here you will find all information regarding 5G technology: What is 5G? Why is it so important, and how will it change the prospects of communication? And loads more!

What is 5G?

5G is the 5th generation mobile network that comes after 1G, 2G, 3G, and 4G, with an aim to change communication around the World. This network helps to virtually connect people, machines and devices at a much faster speed. It means faster downloads, less lagging and super-fast connectivity.

The 5G mobile network will deliver faster Gbps data speeds, more reliability, huge network capacities and a smooth user experience for all users. With the help of its higher performance streak and more efficiency, it will connect users and industries through a common platform.

Technology Before 5G

So, what kind of technology came before 5G?

The first generation or 1G mobile network was all about voice calls. People could connect with friends or family across the globe carrying around a gadget that they can use anywhere.

The second-generation or 2G network started messaging service which is in usage till now. Then came 3G, which led to fast and smooth downloads and widespread internet connectivity.

And then, with the introduction of 4G technology, connectivity became faster and easier with full speeds. Most of the online services in different sectors thrive on 4G speed.

So, when we talk about 5G technology, we can imagine the next-generation level of services with ultra-fast speeds and out-of-world user experience.

How Fast is 5G Mobile Network?

5G mobile network can deliver at speeds of 20 Gbps. With 5G, you can download a full 800K movie 500 times faster than a 4G mobile network. With this, you get a rough idea of how fast 5G internet can be.

This mobile network is not only about being fast. It also involves providing a broader network range and peak data rates. 5G will bring in more network capacity than 4G by using new spectrum waves.

It will allow users to enjoy consistent data rates even when they are on the go and moving around. Stable and faster speeds are the benchmarks of the 5G mobile network connectivity.

How will be 5G helpful to us?

Artificial Intelligence technology CITY for backgroundsElectric car automated with big data

5G will enable the entire World to instantaneously connect with the help of high-speed data through billions of devices.

It will have a positive impact on these areas:

  • Communication between machines: 5G will revolutionize the way massive devices communicate and connect. And all this without any human intervention. Every sector will benefit from this including, agriculture, health, manufacturing, utility services etc.
  • Improved mobile broadband:  With 5G speed, mobile broadband connectivity will be super-fast and more stable. 
  • Critical communications: It will allow real-time control of different devices in crucial sectors such as robotics, autonomous driving, communication through vehicles and safety networks etc.
  • Birth of new technology: With better connectivity, more people will have access to new and improved technology. For example, augmented reality and VR will become an everyday accessory to people.

When was 5G launched?

The launch of the 5G mobile network was in 2019, and it is available in more than 60 countries. It may replace the 4G network by 2025 in most of the World.

What devices are compatible with 5G?

Mobiles, laptops or tablets that have 5G enabled hardware will be compatible 

with users. Most of the major tech brands have rolled out devices that are 5G enabled. These devices will be a common feature in the market as more people get access to the 5G network in the coming days.…

VPNs Explained

The ability to create a private network and protect you from public networks is called a Virtual Private Network (VPN). In simple terms, it makes a secure connection between the internet and the user. 

With the help of a VPN, the sent data passes through a tunnel of virtual encryption. It gives many advantages to the user, like protecting IP address and location, protecting from cybercriminals and hackers, and easy accessibility to different websites and services. 

What is VPN?

When we use the internet, many data are being exchanged from one device to another. VPN creates a secure channel between the devices and the internet, for example, the mobile phone and laptop.

The data are sent through a secure and encrypted connection to the VPN server. The server then sends the secured data out to the destination. A VPN does three vital things when we use the internet or go online: online privacy, freedom, and security. 

Why do we need VPN?

Now that we know what VPN is let us understand why we need it. Most of us are still unaware of VPN and do not find it necessary to use them.  

Half of the things that we do these days are done through the internet. Internet banking, online purchase, medical records, work online, and exchange of essential files and data are all passed using a VPN. With all this exchange, you obviously will not want your details known to every person. 

Without a secure internet connection, there is an excellent possibility of running into hackers and exposing your details to the outside world. VPN acts as a shield and protects your data from all unwanted users and groups. 

Some of the reasons why we should use VPN are as follows:

  • It gives more security and privacy to online users.
  • There is the freedom to browse the internet without feeling insecure.
  • It keeps web browsing anonymous. 
  • Other servers cannot open the encryption key provided by the VPN. 
  • With the use of VPN, restricted web content is accessible from different locations. 

Things that VPN hides

  1. Location and IP address: if anyone finds the IP address of your device, it becomes effortless for them to find your site and your search history. It is like a letter that we send which has a return address written on it. VPN uses different IP addresses, which allows the user to maintain their privacy and gives a secure browsing experience. 
  2. Device: with the help of VPN, gadgets like laptops, tablets, smart phones, and desktops are protected. Widgets are one of the main targets for cybercriminals. Especially the use of public Wifi is one of the easy targets. In simple terms, VPN helps send and receive data at a more secure rate from hackers and cybercriminals.
  3. Browsing history: when we use the internet, everything that we do on the internet is traceable. The browser can track every history and information you use and bind the knowledge to the IP address. VPN makes sure that the IP address is protected and provides a different address instead of the one you have. It also creates a tunnel for the information to pass through it, which secures the browsing history. 
  4. Web activity: we never know if the government is spying on us. If that happens and the governments ask for records of your action against your internet service provider, then VPN comes to the rescue. It gives you the freedom to maintain your internet browsing hassle-free.  

How does a VPN work?

One should first subscribe to a VPN provider to get full access to the network. It is done by downloading and installing the application on your Smartphone, computer, smart-TV, or tablet. Choose the preferred security settings and create a safe network connection with the VPN server. It usually takes just a few clicks to connect to the VPN. When the network is connected, the VPN software encrypts the data through a secure connection to the VPN server. It then encrypts and decrypts the data from one device to another through the server. Once the decryption is done, the server sends the data to the user and replies through the internet. Now, the data traffic is again encrypted by the server and given back to the user. The software installed on the device decrypts the data similarly and makes sure that the user understands it. 

When the VPN connects, the data traffic becomes challenging to intercept by third parties and hackers. The external encrypted tunnel now blocks the IP address which we directly relate to the internet service, and only after that, it passes through the VPN server. So the IP address and the location of the server are hidden and secured. The VPN application works on the background of a device without interfering with any access to the internet.…

What Is IoT (Internet Of Things)?

iot internet of things

We are going through a digital revolution. In our day to day, life computers have become an essential accessory. Be it the simple one like the smartphone you use or the navigation system in your car. We have become dependent on them. Normally we give some input, the computer processes it and gives an output. But in IoT, the computer does not need human-machine or human-human interaction for every data it transfers.

What is IoT?

You must be thinking of what actually is IoT? It is a network of digital appliances such as computers, laptops, etc. connected together to impart data sharing between them. IoT does not require any kind of human to machine or machine to machine interaction for its fulfillment. All the devices which are connected to this technology are gifted with UIDs. An MIT graduate named Kevin Ashton first coined this term in his project. In the year 1999, he worked on a project named Gamble and Procter, which used RFIDs to identify the culprits.

How does IOT work?

There is a sure way in which IoT works. IoT is mainly blended with three parts :

  1. Sensor: This part consists of the primary input. To understand in simpler words, it is the part that the machine notices, e.g., when your car notifies you about the low amount of fuel in the tank, the part that notices the small amount of fuel is the sensor.
  2. Processor: It is the part that works like a brain and processes the data. The processor takes the data from the sensor and processes what the output should be. E.g., it is the part that makes the data like the amount of petrol in the tank sensed by the sensor and decides if it should notify you.
  3. Actuator: Now, these are the part that executes the output. It takes the instructions from the processor and acts likewise. E.g., the indicator light that notifies you about the low level of fuel is the actuator.

Scope of IoT

Day by day we are becoming more and more dependent on the machine. With the advancement of software development and the internet, it is becoming more and more common. And to think more wisely, wouldn’t it be cool if your car can interact with your house and tell it to warm up before you reach home or drive you to the fuckbuddy that you met on Free Meet N’ Fuck. The future of other technology interacting with dating applications or other services we use is interesting. Imagine if your umbrella gets the weather forecast and beeps itself to remind you about keeping it with you? There are billions of items or machines or software available for IoT. It has its application in every kind of industry. It is becoming easier to use with easily accessible WIFI networks. With some simple things, anyone can use IoT. You just need:

  • A sensor to detect input time to time
  • Software to look at the sensor data and process decisions
  • A software to manage the operation of a device which includes more than one sensor
  • And an internet connection to transmit and receive data.

With the increase in these things, the day is not away when IOT is going to be everywhere. Which also raises concerns about IOT cybersecurity. We will save this for another article, but it is a whole new area to consider. …

Tips For Improving Online Privacy

online privacy tips

If you’re looking for tips on online privacy, this article will provide you with some valuable tips to keep yourself safe from all the malicious trackers online.

Today, everything is digitally connected, and we even use some personal information on the website to access the data. So it becomes crucial to keep yourself secure both online and offline.

Online privacy is vital, and if you’re worried about the misuse of your information or falling prey to identity theft, be rest assured, this article will help you improve your online privacy. There are a few steps that you can take to protect your personal information while visiting various entertainment, news, social media sites, etc.

Here are some tips for online privacy

  • Limit oversharing your personal information on social media.

The most important thing you can do to keep yourself safe on social media is not to overshare your personal information. When you provide too much information on social media channels, it becomes easier for hackers to steal your data that can be a piece of cake for them to access your financial details.

In 2018, Identity Theft Resource Center study found that 52% of people shared personal information on social media that was readily identifiable, and it was because of oversharing. They also found that around 48% shared information regarding their children, while almost 33% shared their location. And 42% shared information about their traveling plans. 

For privacy concerns, ignore the “about me” section on social media platforms. It is unnecessary to provide information about your birthplace because it can become an easy target for identity theft. It would be best to do some research on privacy settings and limit people from accessing your details. 

For your social media profiles, you should choose to create strong passwords to prevent hackers from logging in to your account with your name. You can create passwords using special characters, upper-lower case letters, numbers and stop using any accessible information like birthdate or year. 

  • Use incognito or private mode for browsing. 

You can surf the internet using private mode if you don’t want the computer to save your browsing history. Today, browsers have their versions of privacy protection. Such as, in Chrome, it’s called incognito mode, Firefox, it’s called Private Browsing, etc., others won’t be able to track your history if you turn on these private modes on your computer. 

Still, these modes aren’t entirely private. Your ISP ( Internet Service Provider) can still see your browsing history even when in incognito mode, and the websites you browse can also trace. But as a result, it is the only best tool that can help you to keep your privacy from anonymous trackers.

  • Make use of various search engines.

Even if you entirely rely on the Google search engine for browsing, it is not necessary because people use various search engines anonymously for privacy concerns. These anonymous search engines don’t share your history and can also block trackers from the websites.

  • Ensure that your mobile is safe.

Most of us tend to spend half of our time on our phones browsing, emailing, and watching videos rather than using laptops. And so it is vital to put equal effort into protecting privacy on phones as much as on our computers. 

The first most important thing is to use a password for your phone. It might be troublesome every time you want to unlock your phone, but this provides extra protection from misusing it or if your phone gets stolen or is lost. 

Also, download gaming apps with caution because these tools can contain dangerous viruses. It is best to download games only from legit sources. Another place to watch out for is dating apps. Many adult dating apps allow you to search to meet local MILFs near me, but they are also a common target for malicious actors. You should also not ignore software updates as they have essential protection that can save your device against viruses. Skipping them can leave your smartphone at risk and easy to attack.


If you follow these tips, it can save your device from any attacks and greatly help keep your device safe. You can also protect yourself from the internet by using high-quality antivirus, keeping your primary email private, using apps with end-to-end encryption, etc., because hackers are always looking to steal information online. …

Using A VPN For Better Online Privacy

In the recent days, you might have heard virtual private Network in short called as VPN. It is crucial to learn about the basics of VPN. It offers a virtual network which is private such that they connect to the internet for safety and security. The main purpose of a VPN is to put the data of yours private so that no one gets to know your information.

The working of virtual private network

Your VPN actually works by providing route to the internet connection of your device through your private server instead of internet service provider. It happens such that the information is transferred to the internet network. The data comes from VPN instead of your system. It acts as the sorts intermediary as you form a connection to the internet by covering your IP address. The numbers string your ISP and assigns it to your device. It also safeguards your identity. However, if your information is obstructing then it becomes it difficult to read it until it reaches to the destination finally.

A private tunnel is created by a VPN from your device to the internet. It then hides your information which is important through something called as encryption.

What are the encryption basics?

The term, encryption is utilized for describing how your information is put private while using virtual private network. It hides the data that it becomes unreadable without a strong password which is called as a key. This essential key breaks the code which is difficult such that your information has been turned into one code. Only your VPN and computer know its key. The decoding procedure of your information is called as decryption. This is the procedure of making information which is encrypted as again the readable data through the application key.

When you enter the details of your credit card into a website of shopping. That data is encrypted and made unreadable until it reaches to the final destination that is to a user in terms of shopping. Various services of VPN utilize various types of procedures of encryption but it happens in this like:

  • When you connect to the virtual private network, it happens through a tunnel which is secure where your information is encoded. It is meant that your information is transformed into a code which is unreadable because it travels among your VPN server and computer.
  • You can browse the internet and search as much as you want with security and safety as your VPN protects personal data and acts as a bridge.
  • The device seems to be on the similar network locally as your virtual private network. Such that your address of IP will your servers of VPN providers.

It is always a good idea to browse the internet but have a comprehensive knowhow of VPN; that, it stands in between to protect all your personal info.

How you can utilize VPN and what it does for you?

Many of the individuals agree that most of them use VPN as it is best thing. A better manner of illustrating the VPN necessity is to display how you get exposed when your connection of internet is not encrypted.

Transfer of data with or without VPN:

While shopping or paying bills to bank, each day acts are online moving. As it transfers information like credit card details and other numbers VPN is used. Without using VPN, you are not at all shouting your data which is sensitive. Not using VPN is like opening door to others to steal your information. It is important to worry about sensitive information like your details of bank.

Many of them think that HTTP does this task, actually it safeguards the data interacted among web browser of a person and website. Even though your data safeguarded by HTTP, your data is still going to be vulnerable mainly when you utilize Wi-Fi in public way. It is like closing the door but not locking it. Without a VPN you are exposed to many types of problems although you are connected to internet in public or at your house. When you are searching in your browser at home, your internet service provided sees everything you perform and logs into it. This data is easier to get attacked by hackers.

On the other side when you utilize a VPN, your data is not at all exposed. VPN server remains as your data origin. Your online activities will not be logged or tracked by ISPS and hackers who are unsavory if you use a VPN. Your sensitive data is not acquired using a VPN. Even the data is obstructed it is encrypted one which seems as nonsense without key of decryption.

Normal reasons for utilizing VPN

  • Most of the people use VPN to prevent form ISPS and hotspots of WIFI to not track what you are searching or doing on the web.
  • Another reason is to acquire access to a restricted region.

The Workings Of Fiber Optic Internet

The upcoming future of the broadband is fiber optic internet. In the recent days it utilizes the technology of fiber optic for reaching the fastest speeds which is as fast as ten thousand Mbps. Having a broadband became compulsory to the present modern world that we are living in. This internet is siding away the rivals from its place. Fiber optic internet is a form of fiber optic communications. When you send a light beam through the glass cables of fiber optic, you can be capable to transport the data through it which is actually a process that is fascinating.

How Fiber Optic Internet Operates

The cables of fiber are made up of little optical fibers. These fibers made seems to be thin and are less than a tenth as a human hair thickness. Although they are thin, they might have many things going on inside them. Every optical fiber consists of two parts one is core other is cladding.

  • The core is actually made with glass and it is the fiber innermost part where the light usually through it.
  • Another one is cladding which is plastic or glass with thicker layer. It is wrapped around the core.

These both of the parts work as one for making a phenomenon known as total internal reflection. This total internal reflection is the way how the light is capable to move through the fibers without escaping from them. This happens when the light hits the glass at shallow angle which is lower than forty-two degrees and reflects back again like the reflection that happens against a mirror. The part cladding keeps the light inside the core as the plastic or glass is created with a different lower refractive index or optical density. Two of these terms clearly shows how the part of the glass bends and slows down the passing light.

The light is transmitted down to the fiber in LED or Laser pulses which travel in a fast way. These created pulses carry the data which is binary, this is the system of coding we find on the internet. The code of binary is created of bits which are just zeroes or ones. These code bits send the message in the eight-part patterns which are organized known as bytes. It is simple to translate this binary code bits into the pulses of light. One pulse means it is one and no pulse means it is zero. These optic pulses of light can travel for about sixty miles even before they experience any kind of degradation. For transporting the information across miles of thousands these light pulses go through the optical amplifiers that keeps boosting their signal such that no information is lost or stolen.

Once the light pulses reach their destination, an optical network terminal will convert these pulses into Ethernet which is electrical. This is the way how light is going to turn into something you can utilize for connecting your devices to the internet. This kind of conversion only occurs at the last mile end which is not at all a mile but known as a term for the fiber last stretch which connects you to the Internet backbone.

The internet backbone is what it makes it possible for the individual around the globe for connecting through the web. This is mostly created of fiber optic cables. This fiber optic internet might seem to the customers like a brand type of new technology. Yet it is around many internet early days in the world. These fiber optic cables were present under the ocean for connecting it the Europe and US in the year 1988. These were the first lines of submarine to be laid and at present they are extended in a crisscross way in the entirety of the floor of the ocean.

The core of the internet is the backbone. The minute you connect to a site no matter the destination or the device, several steps are being taken to bring you at that point and each one of them is connected through the backbone of the internet.…

What is the Dark Web?

The dark web is nothing but one of the parts on internet that are actually not indexed by the search engines. The dark web is considered to be the hotbed for criminal activities. In recent years Dark Web has become worse and there are many Dark Web listings that are said to harm an enterprise.

Here it is possible to buy all kinds of drugs, credit card numbers, and guns, stolen credentials for subscriptions, counterfeit money, and even hacked accounts of Netflix. There is software available that helps in breaking into some computer. There is a different price for different items. For example, login credentials may be available for a bank account is available for $500.

But everything here is not illegal. There is a legitimate side to this dark web. There are BlackBook and chess club for which you can become member.

Tools which are at risk

  • Attacks or infections that include even malware, botnets, and even DDoS
  • Access that includes exploits, keyloggers, and even RATs or remote access Trojans
  • Espionage that also includes services, targeting, and customization
  • Tutorials and many other support services
  • Refunds
  • Phishing
  • Credentials
  • Operational data
  • Customer data
  • Financial data
  • Trade secrets and intellectual properties
  • Other emerging threats

There are three risk variables for each of these 12 categories. They are:

  • Enterprise devaluing- this may include undermining the reputational damage, brand trust, and even losing the actual ground to some competitor
  • The next thing can be disrupting the enterprise. This may include malware attacks, DDoS attacks that affect the actual business operations
  • Another most important risk is defrauding the actual enterprise. This usually includes Espionage, IP theft that may impair the actual ability of an enterprise and result in heavy financial loss. Adult dating/hookup sites like https://localsexfinder.app are often targets of this as sexfinder sites are often easy targets for those with malicious intent.

Browser and dark web

All the activities mentioned above and looking at the bustling marketplace may make you think that it is easy to navigate through the dark web. But it is not true. This place is more chaotic and messy than you expect. The many reasons are it looks more anonymous when you are surrounded by people whom you don’t know.

It is very important to use the anonymous browser when you are accessing the dark web. The majority of people make use of Tor. This browser will route the actual request through many proxy servers that are operated via many volunteers all over the world. This helps in making the IP address difficult to identify. It is really hard to trace the IP address. Tor actually works like some magic. But the result is actually maddeningly slow, and unbelievable, and unpredictable.

Search engine

There is a search engine called a dark web search engine. But it is really hard to keep up with the landscape which is constantly shifting. There is the best search engine known as Grams. But even this results in repetitive results. In some cases even Grams result in irrelevant results. There is one more option called The Hidden Wiki that is nothing but Link lists. But even the indices sometimes result in timed-out connections that are really frustrating.

Dark web sites

This looks very much like any other site. But there are some differences mainly the naming structure. General sites end with .co, or .com but the dark web sites usually end in .onion. this represents anonymous and hidden service. The service can be reached through a Tor network. It is possible to reach out to these sites when the user has appropriate proxy in their browsers.

There is one more difference between dark web sites and other sites. That is scrambled naming is used by these dark web sites. This is the reason URLs of dark web sites are challenging to remember. For example, ‘eajwlvm3z2lcca76.onion is the unintelligence address used by the commerce site known as Dream Market.

The majority of the dark web sites are usually set up scammers. Scammers who frequently move around do this and it helps them in avoiding the wrath related to their victims. There is chance that very popular commerce sites which have existed for years may disappear suddenly. This happens if the owners decide for cash in and they flee.

But best thing officials of law enforcement are getting better day by day in prosecuting and finding the owners of these sites that sell services and goods. A few years back, the site called AlphaBay was made to shut down by a team of cybercops from 3 major countries. This was the major source of dark web for contraband that was sending shudders all over the network.

Tor is highly vulnerable and it comes with anonymous nature. It is vulnerable mainly to DDoS that is distributed denial of service attacks. This is the reason sites are changing their address constantly for avoiding DDoS. This results in a highly dynamic environment. …

History and Timeline of the Internet

Since the time it was founded the world wide web has touched the lives of a lot of people around the world and changed the way in which we connect with others as well as the nature of our work. Through the internet we are able to discover share and the nature of our work. The internet basically has become an integral part of the modern society. The internet as we know it today wasn’t always like that. The internet has evolved from simple computer networks to global interconnectivity networks and instantaneous wireless communication. The rapid and dramatic evolution of the internet has helped us understand the changing nature of technology and communications.


The internet never existed even after the invention of the computer until much later in the 1960s. in 1962, computer scientist at MIT came up with the idea of a global computer network. He shared his idea with his colleagues at the us department of research and technology. They are the pioneers of the first ARPANET which is the present world wide web. It was the first real network that run on packet switching technology. Computers at UCLA and Stanford were the first to be connected to the internet. They were the first host on what came to be the internet. The first message that was ever sent through the network was Login however it crushed at the letter G.

Another major milestone is the that was experienced during the 1960s, was the inception of Unix. It was an operating system whose design heavily influenced that of Linux and Free USB. (The operating system that is very popular in today’s web servers.


Arpanet was fully developed and operation in 1970 and it was established through the corporation of Harvard, MIT and BBN which is the company that created the first interface message processor. The computers used to connect to the network in 1970.

Ray Tomlinson developed the email in 1971 and is responsible for the decision to use the @ symbol to separate the user name from the computer name. it later came to be known as the domain.

One of the most impressive developments back in 1971 was the initiation of project Gutenberg. For those who are not familiar with the site, it refers to a global effort that is aimed at making books and documents electronically available for free in a variety of eBook and electronic formats. It started with Michael Hart gaining access to a large block of computing time and came to the realization that the future of computers wasn’t in computing itself but rather in storage, retrieval and searching of information that at that time was only available in libraries. He manually typed the Declaration of Independence and made the information available electronically and this was the birth of eBooks.

France started its own system very similar to Arpanet known as the CYCLADE. It was shut down eventually however it did pioneer a key idea. The host data should be responsible for data transmission rather than the network itself.

Arpanet made its first transatlantic connection in 1973 with the university college of London. During the same year the number of emails accounted for 75% of all Arpanet network Activity.
1974 was the breakthrough of the internet transfer protocol. There was a proposal which was aimed at linking Arpa-like networks together into what is inter-network and it would have a central control and would work around a transmission control protocol. It eventually came to be known as TCP/IP.

With the ever-increasing popularity of emailing, the first modern email program in 1975 by John Vittal who was a programmer at the University of Southern California. The biggest advancement in the technology was the addition of the reply and forward feature.

1977 was a very big year during the development of the internet. It is the year that the first PC modems that were developed by Dennis Hayes and Dale Heatherington were introduced and initially sold to computer hobbyists.

The first bulletin board system was developed back in 1978 during a blizzard in Chicago. It is also the year that the first unsolicited commercial email messages were sent to 600 California Arpanet users by Gary Thuerk.

The beginning of the world of warcraft and second life started back in 1979 with the development of multi user dungeon. They were entirely text based virtual worlds that combined the elements of role-playing games, fiction and online chat.

It was ushered into the scene back in 1979 by two graduate students. Usenet was an internet-based discussion system that allowed people from around the world to converse about the same topics by posting public messages categorized by news groups.


The European Organization for Nuclear Research launched ENQUIRE which is a hypertext program that allowed scientist at the particle physics lab to keep track of people, software and projects using hypertext.

Arpanet computers switched to TCP/IP which was developed by Vinton Cerf and it affected a few hundred computers. This marked the birth of the name server which was developed in 1973. The domain name system was also developed in the 1980s and it was important in that it made the addresses on the internet more human friendly. By the year 1987 there were nearly 30,000 hosts on the internet. The original Arpanet protocol had been limited to around 100 hosts however the adoption of the TCP/IP made large number hosts very possible.


The first commercial dial-up Internet provider came to existence and it is the same year that Arpanet ceased to exist. The codes for the world wide web was written along with the standards for html, HTTP and URL’s. The first web page was created during this year and it explained what the world wide web was. It was during the 1990s that the first MP3, webcams, content-based search protocol, first graphical web browser and the first governments to join in on the fun of the internet. It was the same decade that the first new story was broken on the internet rather than traditional media and the birth of Google.…