• Have you finished your question of users so as to motivate them? In fact, I am enjoying your gift of 2nd round question.
    Have you finished your question of users so as to motivate them? In fact, I am enjoying your gift of 2nd round question.
    Love
    1
    0 Answers 0 Shares
  • 5G technology has a theoretical peak speed of 20 Gbps, while the peak speed of 4G is only 1 Gbps. 5G also promises lower latency, which can improve the performance of business applications as well as other digital experiences (such as online gaming, videoconferencing, and self-driving cars).

    While earlier generations of cellular technology (such as 4G LTE) focused on ensuring connectivity, 5G takes connectivity to the next level by delivering connected experiences from the cloud to clients. 5G networks are virtualized and software-driven, and they exploit cloud technologies.

    The 5G network will also simplify mobility, with seamless open roaming capabilities between cellular and Wi-Fi access. Mobile users can stay connected as they move between outdoor wireless connections and wireless networks inside buildings without user intervention or the need for users to reauthenticate.
    5G technology has a theoretical peak speed of 20 Gbps, while the peak speed of 4G is only 1 Gbps. 5G also promises lower latency, which can improve the performance of business applications as well as other digital experiences (such as online gaming, videoconferencing, and self-driving cars). While earlier generations of cellular technology (such as 4G LTE) focused on ensuring connectivity, 5G takes connectivity to the next level by delivering connected experiences from the cloud to clients. 5G networks are virtualized and software-driven, and they exploit cloud technologies. The 5G network will also simplify mobility, with seamless open roaming capabilities between cellular and Wi-Fi access. Mobile users can stay connected as they move between outdoor wireless connections and wireless networks inside buildings without user intervention or the need for users to reauthenticate.
    0 Answers 0 Shares
  • Ethio-tell
    Tariff Information > Local
    Voice:
     Peak hour: ETB 0.50/Minute
     Off-peak hour, Sundays & public holidays: ETB 0.35/Minute
    (Peak hour is from 7:00 AM - 9:59 PM, except public holidays)
     Off net – ETB 0.75/Minute
    Data:
     For Package Users – Within the validity period ETB 0.09/MB
     For Non-package users - ETB 0.20/MB
    SMS:
     ETB 0.12 / SMS
     Off net ETB 0.20/SMS
    Ethio-tell Tariff Information > Local Voice:  Peak hour: ETB 0.50/Minute  Off-peak hour, Sundays & public holidays: ETB 0.35/Minute (Peak hour is from 7:00 AM - 9:59 PM, except public holidays)  Off net – ETB 0.75/Minute Data:  For Package Users – Within the validity period ETB 0.09/MB  For Non-package users - ETB 0.20/MB SMS:  ETB 0.12 / SMS  Off net ETB 0.20/SMS
    Like
    Wow
    3
    1 Answers 0 Shares
  • #telebirr why smart phone users use *127# instead of teleapp
    #telebirr why smart phone users use *127# instead of teleapp
    Like
    1
    1 Answers 0 Shares
  • Message
    Notification

    Score: 134
    Top Discussions
    Discussion Topics
    Saved Posts
    Events
    Announcment
    Tags
    telebirr
    telegebeya
    Fixed Broadband
    DNS and Hosting
    Cloud Services
    Packages
    4G/5G
    Phone & Device
    CRBT
    International
    VAS Services
    Digital lifestyle
    Events
    INTERNATIONAL SERVICES
    ኢንተርናሽናል ገንዘብ መቀበያ መንገድ
    Doni Tamrat
    Posted 3 months ago

    በሀገራችን እጅግ በጣም ብዙ ሰዎች ኢትዮጲያ ውስጥ ተቀምጠው ውጭ ሀገር የሚገኙ የኦንላይን ስራዎችን ይሰራሉ ። አብዛኛዎቹ የኦንላይን ስራዎች የሚከፍሉት በ Pay Pal ነው። ከፔይፓል ገንዘብ አውጥቶ ወደ ኢትዮጲያ ለማስገባት ምንም አይነት አመቺ ሁኔታ የለም ። ይህ ከውጪ የሚመጣ ገንዘብ ሀገራችን ውስጥ ቢገባ ሀገሪቷን የውጪ ምንዛሬ እጥረቷን ይቀርፋል። ስለዚህ ቴሌብር ከውጭ ሀገር የፋይናንስ ድርጅቶች ጋር ራሱን በማስተሳሰር በቀጥታ የሰራነውን ገንዘብ የምንቀበልበትን ሲስተም ቢያዘጋጅ ለሀገራችንም አንድ እርምጃ ይሆናል ብዬ አስባለሁ። ምን ታስባላችሁ ?

    #TELEBIRR_#ETHIOTELECOM_#TELEBIRRSUPERAPP
    Like
    3
    Answers
    Share
    Add Suggestion or Answer
    No file chosen
    CATEGORIES
    PACKAGESTELEBIRRTELEGEBEYAFIXED BROADBANDDOMAIN NAME & HOSTINGCLOUD SERVICES4G/5GPHONE AND DEVICECRBTINTERNATIONAL SERVICESVAS SERVICESDIGITAL LIFESTYLEVOLTERCSMMSVMS
    READ MORE
    PACKAGES
    Helpful for you reply
    How i can getaway update the level 3 telebir
    By Mahamud Roble 3 months ago 5 1117
    DIGITAL LIFESTYLE
    Cannot create value or key, Error writing to the registry
    When some Windows users tried creating value or key in Registry Editor, they failed due to lack...
    By Chimdesa Diriba 6 months ago 4 149
    PACKAGES
    Asham tele
    How many of you are redeem points from asham tele to different package.
    By LALISA TADESA 5 months ago 6 938
    4G/5G
    IoT vs Smart City | ንፅፅር “የኢንተርኔት ነገሮች” እና “ብልህ ከተማ”
    IoT, or the Internet of Things, refers to the network of everyday physical objects embedded...
    By Tariku Birhanu 8 months ago 3 1125
    VOLTE
    Prosperous of Ethiopia
    New style Ethiopian
    By TESHALE TESHOME 2 months ago 0 185
    © 2024 teleforum
    FAQ Terms & Conditions Privacy
    Message Notification Score: 134 Top Discussions Discussion Topics Saved Posts Events Announcment Tags telebirr telegebeya Fixed Broadband DNS and Hosting Cloud Services Packages 4G/5G Phone & Device CRBT International VAS Services Digital lifestyle Events INTERNATIONAL SERVICES ኢንተርናሽናል ገንዘብ መቀበያ መንገድ Doni Tamrat Posted 3 months ago በሀገራችን እጅግ በጣም ብዙ ሰዎች ኢትዮጲያ ውስጥ ተቀምጠው ውጭ ሀገር የሚገኙ የኦንላይን ስራዎችን ይሰራሉ ። አብዛኛዎቹ የኦንላይን ስራዎች የሚከፍሉት በ Pay Pal ነው። ከፔይፓል ገንዘብ አውጥቶ ወደ ኢትዮጲያ ለማስገባት ምንም አይነት አመቺ ሁኔታ የለም ። ይህ ከውጪ የሚመጣ ገንዘብ ሀገራችን ውስጥ ቢገባ ሀገሪቷን የውጪ ምንዛሬ እጥረቷን ይቀርፋል። ስለዚህ ቴሌብር ከውጭ ሀገር የፋይናንስ ድርጅቶች ጋር ራሱን በማስተሳሰር በቀጥታ የሰራነውን ገንዘብ የምንቀበልበትን ሲስተም ቢያዘጋጅ ለሀገራችንም አንድ እርምጃ ይሆናል ብዬ አስባለሁ። ምን ታስባላችሁ ? #TELEBIRR_#ETHIOTELECOM_#TELEBIRRSUPERAPP Like 3 Answers Share Add Suggestion or Answer No file chosen CATEGORIES PACKAGESTELEBIRRTELEGEBEYAFIXED BROADBANDDOMAIN NAME & HOSTINGCLOUD SERVICES4G/5GPHONE AND DEVICECRBTINTERNATIONAL SERVICESVAS SERVICESDIGITAL LIFESTYLEVOLTERCSMMSVMS READ MORE PACKAGES Helpful for you reply 👍 How i can getaway update the level 3 telebir By Mahamud Roble 3 months ago 5 1117 DIGITAL LIFESTYLE Cannot create value or key, Error writing to the registry When some Windows users tried creating value or key in Registry Editor, they failed due to lack... By Chimdesa Diriba 6 months ago 4 149 PACKAGES Asham tele How many of you are redeem points from asham tele to different package. By LALISA TADESA 5 months ago 6 938 4G/5G IoT vs Smart City | ንፅፅር “የኢንተርኔት ነገሮች” እና “ብልህ ከተማ” IoT, or the Internet of Things, refers to the network of everyday physical objects embedded... By Tariku Birhanu 8 months ago 3 1125 VOLTE Prosperous of Ethiopia New style Ethiopian By TESHALE TESHOME 2 months ago 0 185 © 2024 teleforum FAQ Terms & Conditions Privacy
    Yay
    Like
    Love
    Angry
    17
    3 Answers 0 Shares
  • A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.

    When a computer connects to the internet, it uses an IP address. This is similar to your home’s street address, telling incoming data where to go and marking outgoing data with a return address for other devices to authenticate. A proxy server is essentially a computer on the internet that has an IP address of its own.

    Proxy Servers and Network Security
    Proxies provide a valuable layer of security for your computer. They can be set up as web filters or firewalls, protecting your computer from internet threats like malware.

    This extra security is also valuable when coupled with a secure web gateway or other email security products. This way, you can filter traffic according to its level of safety or how much traffic your network—or individual computers—can handle.

    How to use a proxy? Some people use proxies for personal purposes, such as hiding their location while watching movies online, for example. For a company, however, they can be used to accomplish several key tasks such as:

    Improve security
    Secure employees’ internet activity from people trying to snoop on them
    Balance internet traffic to prevent crashes
    Control the websites employees and staff access in the office
    Save bandwidth by caching files or compressing incoming traffic
    A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online. When a computer connects to the internet, it uses an IP address. This is similar to your home’s street address, telling incoming data where to go and marking outgoing data with a return address for other devices to authenticate. A proxy server is essentially a computer on the internet that has an IP address of its own. Proxy Servers and Network Security Proxies provide a valuable layer of security for your computer. They can be set up as web filters or firewalls, protecting your computer from internet threats like malware. This extra security is also valuable when coupled with a secure web gateway or other email security products. This way, you can filter traffic according to its level of safety or how much traffic your network—or individual computers—can handle. How to use a proxy? Some people use proxies for personal purposes, such as hiding their location while watching movies online, for example. For a company, however, they can be used to accomplish several key tasks such as: Improve security Secure employees’ internet activity from people trying to snoop on them Balance internet traffic to prevent crashes Control the websites employees and staff access in the office Save bandwidth by caching files or compressing incoming traffic
    Like
    Yay
    Wow
    Love
    10
    10 Answers 0 Shares
  • Types of cyberattacks.
    Here is a list of common cyberattacks aimed at inflicting damage to a system.

    Man in the Middle attack: The attacker puts himself in the communication between the sender and the receiver. This is done to eavesdrop and impersonate to steal data.
    Phishing: Here, the attacker will act as a trusted entity to perform malicious activities such as getting usernames, passwords, and credit card numbers.
    Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target device and offers an anti-virus tool to remove the malware. This is done to install malicious software into the system.
    Malware: Malware is software that is designed to attack the target system. The software can be a virus, worm, ransomware, spyware, and so on.
    Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app, or browser, which automatically downloads malicious code to the system.
    DDoS: This is done to overwhelm the target network with massive traffic, making it impossible for the website or the service to be operable.
    Malvertising: Malvertising refers to the injections of maleficent code to legitimate advertising networks, which redirect users to unintended websites.
    Password Attacks: As the name suggests, here, the hacker obtain credentials like passwords.
    Check out our blog on Cyber Security Tips and Best Practices to prevent Cyber Security attacks
    Types of cyberattacks. Here is a list of common cyberattacks aimed at inflicting damage to a system. Man in the Middle attack: The attacker puts himself in the communication between the sender and the receiver. This is done to eavesdrop and impersonate to steal data. Phishing: Here, the attacker will act as a trusted entity to perform malicious activities such as getting usernames, passwords, and credit card numbers. Rogue Software: It is a fraudulent attack where the attacker fakes a virus on the target device and offers an anti-virus tool to remove the malware. This is done to install malicious software into the system. Malware: Malware is software that is designed to attack the target system. The software can be a virus, worm, ransomware, spyware, and so on. Drive-by Downloads: The hacker takes advantage of the lack of updates on the OS, app, or browser, which automatically downloads malicious code to the system. DDoS: This is done to overwhelm the target network with massive traffic, making it impossible for the website or the service to be operable. Malvertising: Malvertising refers to the injections of maleficent code to legitimate advertising networks, which redirect users to unintended websites. Password Attacks: As the name suggests, here, the hacker obtain credentials like passwords. Check out our blog on Cyber Security Tips and Best Practices to prevent Cyber Security attacks
    Like
    Love
    5
    0 Answers 0 Shares
  • Telebirr should consider selling items with its users by mortgage in which an item is taken and paid for for months after signing an agreement.
    Telebirr should consider selling items with its users by mortgage in which an item is taken and paid for for months after signing an agreement.
    Like
    3
    1 Answers 0 Shares
  • Anybody who won something bigger among Telebirr users on Ethiotelecom Gamification?
    Anybody who won something bigger among Telebirr users on Ethiotelecom Gamification?
    Like
    1
    2 Answers 0 Shares
  • Asham tele is a promotion app made to benefit telebirr users indirectly through your airtime recharge. You can increase points by buying mobile card and recharge it on your simcard.
    The more points you get the more you can redeem voice and internet packages and the more electronic devices you can buy from Ethiotelecom shop centers.
    Asham tele is a promotion app made to benefit telebirr users indirectly through your airtime recharge. You can increase points by buying mobile card and recharge it on your simcard. The more points you get the more you can redeem voice and internet packages and the more electronic devices you can buy from Ethiotelecom shop centers.
    Like
    Haha
    Yay
    Wow
    8
    4 Answers 1 Shares
More Results