About Me

My photo
Anantapur, Andhra Pradesh, India
Sanskrithi School of Business, Puttaparthi is affiliated to Jawaharlal Nehru Technological University - Anantapur (JNTUA) has obtained recognition by the AICTE in the year 2010. It is emerging steadily as the leading residential Business School in Andhra Pradesh with International standards. The institution located in the adobe of Bhagawan Sri Sathya Sai Baba, is engaged in nation building on the foundation of ethical and moral values as enunciated by Bhagawan Sri Sathya Sai Baba
Showing posts with label Article. Show all posts
Showing posts with label Article. Show all posts

Saturday, 13 October 2012

Ip Man Legend of the Martial Arts Grandmaster



There is a saying in kung fu that "it is hard for a student to find a good sifu(teacher), but it is even more difficult for a sifu to find a good student" It is also said that there are systems of kung fu that have been lost over the passage of time because the masters could find no worthy student to whom to pass the traditions and heritage.
This could well have been the case for Wing Chun, had Leung Bik, son of the famous Wing Chun Master Leung Jan, not met Ip Man, his only student. Ip Man proved not only to be a great student, but a genius in fulfilling the responsibility of passing the art on to the future generations of masters. It was due to Ip Man's innovations that Wing Chun was able to spread from a little city in Southern China to become one of the most popular and sought after systems of Martial Arts in the world.
Although Chinese Kung Fu has risen in popularity since the time of Bruce Lee, few people know the inside story of Bruce Lee’s master – Ip Man, the leader of the Wing Chun Kung Fu style..
Ip man, often referred to as Yip Man was born on the first of October, 1893 to Yip Oi Dor and Ng Shui in Fo shan, Kwangtung, China, at the end of the Qing Dynasty and was third of four children. He was named Ki Man. He grew up in a very wealthy family. His older brother was Ip Kai Gak. His older sister was Ip Wan Mei and his younger sister was Ip Wan Hum. Ip is the family name which is said first in Chinese culture. Foshan was situated in the most prosperous region of the Zheyleng Delta of Guangdong. He lived on Fook Yin Road in the Mulberry Gardens of Fo Shan. His was a well-known family in that area. Wong Fai hung, Cheung Hung-shing, Leung Jan, Leung Siu-ching were some of the great masters of kung fu who came from Fo shan. So Ip Man, grew up hearing the stories of the exploits of these great kung fu men. It's not surprising that he would develop into one of the greats himself.
Ip Man's education in Wing Chun began as a youth when he became a student of Chan Wah Shun, who was a student of the famous Leung Jan. Chan Wah Shun accepted Ip Man as a student towards the end of his teaching career, when he was quite old. Master Chan was a big man by Chinese standards. So his Kung fu was powerful. Six years later, Master Chan was near death. One of his dying wishes was to have his student Ng Choun Su continue training Ip. Master Yip Man followed the elder fellow-student for three years. The tuition of Master Chan was very high, each student had to pay a few ounces of silver. The common man at the time could not afford such a cost, so Master Chan’s students only numbered in the teens. This is also why Wing Chun is known as the rich person’s kung fu.
At the age of 15 Ip man moved to Hong Kong with help from Leung Fut Ting, a relative. At age sixteen, Ip Man attended school at St. Stephen's College in Hong Kong. It was a secondary school for wealthy families and foreigners who lived in Hong Kong.

According to Ip Man's two sons (Ip Ching and Ip Chun), while at St. Stephen's Ip Man intervened after seeing a foreign police officer beating a woman. The story goes that the police officer tried to strike Ip Man who used his martial arts to strike the officer down, at which point Ip Man and his classmate ran to school. The classmate is said to have told an older man who lived in the same apartment block. Ip Man was invited to see this man and the man asked Ip Man what martial art he studied. Ip told him, but the old man said he would not understand. The man then asked Ip Man to show him his first 2 forms (Sil Lim Tao and Chun Kiu). The man then told Ip Man that his forms were "not too great." Ip Man was then invited to Chi Sau (a form of training that involves controlled attack and defence). Ip Man saw this as an opportunity to prove his Kung Fu was good, but he was beaten after just a few strikes. It turned out that the old man was his master's elder fellow-disciple (and so, by Chinese tradition Ip Man's martial uncle or Sibak), Leung Bik, son of his master's master Leung Jan . After that encounter, Ip Man continued his training lessons from Leung Bik. Master Leung Bik's Wing Chun was much more refined than what Ip Man had leaned from Master Chan. While Chan Wah Shun had been a big man, Leung Bik was much smaller. There also was a pretty wide gap in the education level between the two masters. Chan Wah Shun was nor very well educated, while Leung Bik's father was a well-educated doctor of Chinese medicine. This education was passed to his son. Thus, Leung Bik was better able to understand the underlying principles of the Wing Chun system. This knowledge was passed to Ip Man. By the age of 24, Ip Man had returned to Foshan, his Wing Chun skills tremendously improved.
Upon learning all that Leung Bik had to teach him, Ip Man went on to explore ways to simplify Wing Chun, making it easier to understand. In addition to his education in Wing Chun, Ip Man received an advanced formal education in his youth. He learnt the theories and principles of modern science and could therefore make use of modern technological knowledge, such as mechanical and mathematical theories, to expand the principles of Wing Chun. Ip Man even changed terminology, such as the Five Elements and Eight Diagrams (Ba Gua) that were commonly used in metaphysics. This helped to demystify Wing Chun, thus making it easier for the common student to understand and apply the system.
In Foshan, Ip Man became a policeman. He did not formally run a Wing Chun school, but taught several of his subordinates, his friends and relatives. Kwok Fu and Lun Kai (2 of Ip Man's students and friends) went on to teach students of their own. The art of Wing Chun in the Foshan and Guangdong area was mainly passed down from these two individuals. Ip Man went to Kwok Fu's village house during the Japanese Occupation. He only returned to Foshan after the war, to once again take up the job of a police officer. At the end of 1949, the Chinese Communist party won the Chinese civil war. Ip Man being an officer of the opposing Kuomintang political party, decided to escape to Hong Kong without his family when the Communists had come to Foshan. In Hong Kong, Ip Man opened a Wing Chun martial arts school.

Initially, business was poor because his students typically stayed for only a couple of months. He moved his school twice, to Hoi Tan Street in Sham Shui Po, and then to Lee Tat Street in Yau Ma Tei. By then, some of his students were skilled enough that they were able to start their own schools. Some of Ip Man's students and descendants compared their skills with other martial artists in combat. Their victories over other martial artists helped to boost Ip Man's reputation as a teacher.
During the early years of the Chinese Republic, Fo Shan had a yearly festival called “Autumn Scenes.” One year Yip Man and his wife went to see the festival. While there, an officer of the military tried to take advantage of Mrs.Ip. At the time, Ip was wearing a long gown with cloth shoes. His stature was not tall, and he looked more like a gentleman than a fighter. The officer figured he was weak and helpless, so he became more daring and offensive. Ip Man immediately resorted to the “simultaneous attack and defense” technique of Wing Chun, and the officer was knocked to the floor immediately. The officer then took out his revolver, but Ip Man grabbed its barrel and used the strength of his thumb to break the trigger, rendering it useless.
When the Japanese occupied Fo Shan, the military police caught wind of Yip Man’s reputation and invited him to become their coach. But he refused from the standpoint of righteousness. That angered the Japanese greatly, to the point that they ordered another kung fu master, surnamed Leung, to challenge Master Yip Man. Yip Man accepted only after being asked many times. Master Leung thought his punch was very powerful and used it against Master Yip. Yip Man immediately executed the Wing Chun “Horse Stance and Kwan Sao” to defend himself, and then turned around and kicked Master Leung to the ground. After this occurrence, Yip Man left Fo Shan due to the increased pressure the Japanese placed on him. However, he still continued helping the Chinese government suppress the Japanese. After the Japanese resistance, Master Yip did not teach Wing Chun, but worked at the police department. In order to rid the area of evil and protect the people, Master Yip solved many crimes, including the Fo Shan Sar Ton Fon Street Robbery, and caught the robber in Sing Ping Theater. Master Yip Man continued his position as leader of the military patrol of south Kwang Chow until the collapse of Mainland China.
With the mainland lost, Ip Man left Fo Shan for Hong Kong. There he was introduced to Mr. Lee Min, who later helped Yip establish a Wing Chun school at the Mess Union in Da Nan Street, Kowloon. At the beginning, the followers were Lee Min, Leung Chan, Lou Yue. Later on, Shu Sun Tin and Yip Bue Shing also followed. The students kept increasing to the point that in 1954 Master Yip Man left the Mess Union to establish a kung fu institute at Hia Ten Street, Deep Water Bay, Kowloon. The students kept increasing, so Ip Man moved the institute from Hia Ten Street to Lee Da Street to Lee Jenwou Village to Hing Yip Building. But he did not openly advertise for students. One would have to be introduced or know a follower. Bruce Lee was introduced by Mr. Cheung Jwo Hing to learn Wing Chun when the institute was at Lee Da Street.
In 1967, Ip Man and some of his students established the Hong Kong Ving Tsun Athletic Association.


The way of Yip Man’s instruction depended on every student’s degree of knowledge, natural ability, personal habits, and interests. Yip Mans great innovation was to personalize instruction by making each student’s progress dependent on his own habits and will to succeed. The strength of Yip Man at over seventy was no less than that of a young man. At about a later age, robberies occurred frequently in Hong Kong. One night when Yip Man was taking a walk, two thugs with knives tried to rob him. It only took Yip Man a few kicks to knock them out of the way.
In 1972, Ip Man suffered cancer and subsequently died on the 2nd of December that same year. About 6 weeks before he died he asked his 2 sons and his student Lau Hon Lam to film him performing the Wing Chun system as practice by him. He only managed Sil Lim Tau, Chum Kiu and the Dummy form. This is because he was in a lot of pain and was weak and unsteady on his feet. He was going to do Biu Gee, the Knife form and long pole. However Grandmaster Ip Chun and Ip Ching and Sifu Lau Hong Lam stopped Ip Man because Biu Gee, the knives and full pole form require a lot of energy to perform. Ip Man had many students and worried some of them were adapting the system due to their own incomplete knowledge and felt that filming it was the only way to stop the frauds and cheats.
It is thanks to Master Ip Man that the modern Wing Chun system is so popular. Among the kung fu systems, Wing Chun is considered one of the simplest to learn and understand. The system is known to be direct, simple, economical in application, and highly effective in combat. Master Ip Man's contributions to the evolution of Wing Chun can be credited for building the systems reputation. These innovations demonstrated the intelligence of Ip Man.
Ip Kai Man was one of the first martial arts instructors, or Sifu, to teach the Chinese martial art of Wing Chun Kung Fu openly.









Written by : Debjyoti Ganguly


@copyright protected 2012.

Friday, 12 October 2012

The Net



  We all know that human being needs 5different elements to survive. No1 is Food , No2 is Water , No3 is Oxygen , No4 is House  and No5 is Clothes. But in 20th century you need 6 elements to survive. Do you know what is the 6th element? It does not matter much whether you are a farmer or a stock broker, if you want to take yourself to the next level then you have to be a slave of internet. Yes the 6th element is[ INTERNET ].
  The Internet is a network that links millions of computers around the world. Not so long ago, few people had heard of the Internet. Today, the Internet has revolutionized how people use computers. Many people depend on it daily to communicate with others and to get the information they need. You don't have to connect your computer to the Internet, but once you do, you'll probably wonder how you lived without it.
           Now a days internet became a daily use product.From online shopping to weather forecast , Railway reservation to 1st day 1st show movie ticket , Divine message to ingredients of a potential Bomb everything what you want you can get by some clicks. Wikipedia, Google, Yahoo, Facebook, Tweeter, Youtube, Photofunia, .net forum we all know about this sites. Just think -  how do u feel if in a fine morning you want to video chat with your girlfriend/boyfriend but you failed to find the facebook server. This invisible net bind us from top to bottom.
Everybody knows about the good side of internet but now I want to tell about the evil side of internet. Unlike all other technology internet also have some bad effect. In 20th century a kid may not know about Rabindranath Tagore but he/she is familiar with the term [ HACKING ].
HACKING : It means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. We all know about fb apps but very few of us know that some apps content secret cookies. Those apps give you a simple innocent looking link and ask you if you want to know your girlfriend’s/boyfriend’s name then click on the link. If you click on the link, Those cookies are so obedient to their master that they will automatically saved in your browser and it will transfer every information about your net banking account, emails, social networking profile to his master without your permission.
Another type of hacking is software hacking. You will create software and one group of people will break the entire security systemof your software by adding some extra “dll” files and make free to all. This same things can happen in the case of Books.
Today the biggest market of pirated product is internet. Whatever you want, new games or upcoming game’s first looks that not yet officially published by the company, new movie that released yesterday, new video album of linking park   you can download, just you must know the right place.
Every one of us use social networking site but nobody reads the security manual. We simple violate the rules and upload our personal photos, videos and information. One wrong click can make your private life a public topic.       One hackerchoose his targets using a two-pronged process known as the "pre-hacking stage".
Part 1: Targeting
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.
Part 2: Research and Information Gathering
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.
Part 3: Finishing The Attack
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).
CLASSIFICATION OF HACKER :Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie. In contrast to Raymond, they usually reserve the term cracker for more malicious activity. According to (Clifford R.D. 2006) a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".These subgroups may also be defined by the legal status of their activities.
UOLOAD & SHARE :What 3rd party software you use to download videos or movies or games or e-books? We all know “torrent” the largest server of information. To download from torrents one special downloader is needed and it is available for free. How much data you download from torrent the downloader software upload that much of data from your hdd without your permission. You can’t even know from which drive and what data the software will upload.
SPYWARE:It is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.
While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.
Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.
CAN I GUESS YOUR PASSWORD:Is your browser secure enough to surf private data. Let’s check how much secure your browser is …. Please follow the steps…….
1-      Open Internet explore
2-      Go to www.gmail.com
3-      Type your mail id and password [ don’t press enter or don’t hit sign in button].
4-      Copy and paste this script into address bar and hit enter.
SCRIPT- javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j<F.length;%20++j)%20{%20f%20=%20F[j];%20for%20(i=0;%20i<f.length;%20++i)%20{%20if%20(f[i].type.toLowerCase()%20==%20%22password%22)%20s%20+=%20f[i].value%20+%20%22\n%22;%20}%20}%20if%20(s)%20alert(%22[ AXEL BLAZE ]%20Says%20Password%20in%20forms%20on%20this%20page:\n\n%22%20+%20s);%20else%20alert(%22[BADBOY ]%20Says%20There%20are%20no%20passwords%20in%20forms%20on%20this%20page.%22);})();
HTTP vs HTTPS : One day my girlfriend just asked me that if the web browser says http:// and not https:// that my security is compromised. Is this true? If you're just browsing the web and not entering any sensitive information, http:// is just fine. However, on pages that you enter your password, credit card number, or other financial information or personal information, you should always look for the https:// prefix. If you don't see the "s," don't enter any information that you want to keep secure. HTTP stands for Hypertext Transfer Protocol. It's the first element you see in any URL and you can think of it as the language used to deliver information over the web. Most web browsers (including Internet Explorer) use an encrypted protocol called Secure Sockets Layer (SSL) to access secure webpages. These pages use the prefix HTTPS. The "s" stands for secure.
LISTOFNOTABLEHACKER GROUPS:
  • Chaos Computer Club, is based in Germany and other German-speaking countries. Famous among older hackers.
  • Masters of Deception, initial membership grew from meetings on Loop-Around Test Lines.
  • w00w00, is currently one of the largest non-profit security teams in the world with more than 30 active participants.
  • TESO, was a famous hacker group, which originated in Austria and quickly became international. It was active from 1998 to 2004, and during its peak around 2000, it was responsible for a significant share of the exploits on the bugtraq mailing list.
  • L0pht, was a hacker collective active between 1992 and 2000 and located in the Boston, Massachusetts area.
  • Cult of the Dead Cow, also known as cDc or cDc Communications, is a computer hacker and DIY media organisation founded in 1984 in Lubbock, Texas.
  • milw0rm is a group of "hacktivists" best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai.
  • TeaMp0isoN is a group of Black-Hat Computer Hackers established in mid-2009
  • Anonymous, a group of hackers originating in 2003.
  • LulzSec, a group of hackers originating and disbanding in 2011 that claimed to hack "for the lulz". Currently broken up.
  • Decocidio is an anonymous, autonomous collective of hacktivists which is part of Earth First!!, a radical environmental protest organisation, and adheres to Climate Justice Action

Written By- Indrajit Chowdhury
 ( A creator not a follower )


Mishti Bengali

“I LOVE YOU” is “AMI TOMAY VALOBASI” in Bengali. Like the language, the people of Bengal are mishti(sweet) too and  holds the soul of the ‘Bhadralok’: the intelligent, sensitive and cultured. Apart from the Mishti Doi(sweet curd) and Rasogollas(sweet) theres a lot to the Bengali language and the culture. Heres an insight to the language and its people.
 

Bengali is a language of the Indo-Aryan branch of the Indo-European family of languages. Bengali probably arose out of the Magadhi or Ardhamagadhi. Its earliest examples are the caryagitis. Bengal was not always indo-european. This group of languages are first attested in India in the Rigveda, the language of the earliest parts of which probably dates back to the copper-bronze age of Punjab and west, 1400–1200 BC.
The Bengali linguists Suniti Kumar Chatterji and Sukumar Sen suggested that Bengali had its origin in the 10th century, deriving from Magahi Prakrit (a spoken language) through Magahi Apabhramsha (its written counterpart). The Bengali scholar Muhammad Shahidullah and his followers offered a competing theory, suggesting that the language began in the 7th century ce and developed from spoken and written Gauda (also, respectively, a Prakrit and an Apabhramsha).
It is spoken by more than 210 million people as a first or second language, with some 100 million Bengali speakers in Bangladesh; about 85 million in India, primarily in the states of West Bengal, Assam, and Tripura; and sizable immigrant communities in the United Kingdom, the United States, and the Middle East. It is the state language of Bangladesh and one of the languages officially recognized in the constitution of India.
There are two standard styles in Bengali: the Sadhubhasa (elegant or genteel speech) and the Chaltibhasa (current or colloquial speech). The former was largely shaped by the language of early Bengali poetical works. In the 19th century it became standardized as the literary language and also as the appropriate vehicle for business and personal exchanges. Although it was at times used for oration, Sadhubhasa was not the language of daily communication.
Chaltibhasa is based on the cultivated form of the dialects of Kolkata (Calcutta) and its neighbouring small towns on the Bhagirathi River. It has come into literary use since the early 20th century, and by the early 21st century it had become the dominant literary language. Although distinctions in the use of Bengali are associated with social class, educational level, and religion, the greatest differences are regional. The four main dialects roughly approximate the ancient political divisions of the Bengali-speaking world, known as Radha (West Bengal proper); Pundra, or Varendra (the northern parts of West Bengal and Bangladesh); Kamrupa (northeastern Bangladesh); and Bangla (the dialects of the rest of Bangladesh.
A simple Bengali sentence usually follows subject–object–verb word order. When present, the negative particle comes at the end of the sentence. The verb linking the subject and predicate, is often omitted. Compound verbs and a suffix, are a special feature. There are 3 verb tenses, but their subdivisions make them 10. There are two moods, indicative and imperative, and two numbers, singular and plural. The first, second, and third persons are expressed through six forms. Gender is natural, and there is no special declension for feminine and neuter. Adjectives are usually not modified according to the number or case of the nouns they qualify.

The Bengal Renaissance refers to a social reform movement during the nineteenth and early twentieth century’s in the region of Bengal in undivided India during the period of British rule. The Bengal renaissance can be said to have started with Raja Ram Mohan Roy (1775–1833) and ended with Rabindranath Tagore (1861–1941). Nineteenth century Bengal was a unique blend of religious and social reformers, scholars, literary giants, journalists, patriotic orators and scientists, all merging to form the image of a renaissance, and marked the transition from the 'medieval' to the 'modern'.
Ishwar Chandra Vidyasagar played a massive role by giving birth to the Bengali Alphabets in his book “Barno Parichay”
 


Raja Ram Mohan Roy is regarded as the "Father of the Bengal Renaissance."
 

Rabindranath Tagore is Asia's first Nobel laureate and a versatile genius, also composer of Jana Gana Mana the national anthem of India as well as Amar Shonar Bangla the national anthem of Bangladesh.
 
Swami Vivekananda is considered a key figure in the introduction of Vedanta and Yoga in Europe and America and is also credited with raising interfaith awareness, bringing Hinduism to the status of a world religion during the end of the 19th century.
 
Jagadish Chandra Bose was a Bengali polymath: a physicist, biologist, botanist, archaeologist, and writer of science fiction. He pioneered the investigation of radio and microwave optics, made very significant contributions to plant science, and laid the foundations of experimental science in the Indian subcontinent. He is considered one of the fathers of radio science, and is also considered the father of Bengali science fiction.
Satyendra Nath Bose was a Bengali physicist, specializing in mathematical physics. He is best known for his work on quantum mechanics in the early 1920s, providing the foundation for Bose-Einstein statistics and the theory of the Bose-Einstein condensate. He is honoured as the namesake of the boson.
Subhash Chandra Bose was one of the most prominent leader and highly respected freedom fighters from Bengal in the Indian independence movement against the British Raj.
 
Sri Aurobindo is one of the most respected freedom fighters from Bengal and also a poet, philosopher, and yogi.

 

Satyajit Ray is regarded as one of the greatest auteur of 20th century cinema.

 

Ravi Shankar A multi time Grammy Winner.

 


Amartya Sen was awarded by The Nobel Prize for his extensive work in the field of economics.



Sourav Ganguly also known as Dada is the 1st Bengali captain of international cricket team of India under whom the team flourished to a great level
 



Mamta Banarjee the present Chief Minister of West Bengal and the supremo of All India Trinomool Congress has concurred the hearts of many all over the world with her legendary slogan of “Ma, Mati, Manush” (Mother, Soil, Humans).






        So, don’t hesitate, come, learn cause learning new things are always fun, why not start with a new language called Bengali. Don’t worry. It’s easy and fun and i am sure you will enjoy it. At least by now you are well capable of telling your girlfriend/boyfriend or going to be girlfriend/boyfriend ‘I Love You” in Bengali. Trust me, he/she will appreciate your effort.




You are welcome.
-Debjyoti Ganguly