Posts

Showing posts from January, 2019
Google has announced its timeline for closing its social network Google+, and the process is starting very soon. For example, if (for some reason) you were thinking of signing up to experience the ailing social network before it's gone for good, you'll have to do it before February 4, when Google will remove the ability to create new profiles, pages, communities and events.  The Google+ comment feature will disappear from Blogger on February 4, and Google+ comments on all sites will begin vanishing into the ether on April 2. Google+ sign-in buttons will also vanish from sites over the coming weeks (being replaced by regular Google login buttons in some cases).  You can download your own Google+ data using  Google Takeout , which lets you grab your personal information from all of Google's sites and services. If you're a community owner or moderator, you'll also be able to grab the author, body text and photos for every community post from early March. On Ap
If you are using a free VPN,THEN YOU ARE NOT SAFE The reason is simple – many of them simply sell your data to 3rd party advertisers. And this defeats the whole purpose of having a VPN in the first place. But there’s more: 1. Many free VPN services are not transparent about how they make money from you using their services; in most cases, when you’re not being sold a product you are most likely the product. 2. Most free VPNs simply sell your data to affiliated/partnered companies or to the third party who is willing to pay the most. 3. Some free VPNs have gotten caught using shady practices like injecting ads, referring affiliate traffic and more (more info can be found on the CSIRO research and FTC complaint against a free VPN). 9 Popular Free VPN Services That Can Sell Your Data The following free VPNs can sell your data to 3rd parties (according to their privacy policy) Hola Betternet Opera VPN HotSpot Shield Psiphon Onavo Protect ZPN FinchVPN TouchVPN The

Is our privacy over technology advancement guaranteed here in africa?

Are Africans who use internet or technological equipments secure?THE REALM OF CYBER SPYING IN AFRICA Many african governments have resorted to cyber surveillance equipments in trying to tame their opponents or for sovereign security but the employment of these technologies put citzens at a risk of loosing their privacy. Lets look at some scenerios . Report identifies some European companies as having supplied Ethiopia with advanced cyber surveillance technology used to target Ethiopians at home and abroad. According to international reports Ethiopia appears to have acquired FinFisher surveillance software from the United Kingdom and German-based Gamma International – as well as Italy-based Hacking Team’s Remote Control System. Such tools provide security and intelligence agencies with access to files, information, and activity on the infected target’s computer. They can log keystrokes, passwords, and turn on a webcam or microphone, essentially converting a personal computer into a

WILL RWANDESE STOP OR BE STOPPED FROM COMING TO UGANDA?

Image
I think to many who know Rwanda and the magnitude of the daily influx of rwandese in uganda,and the openness of the ugandan boarders plus the freedom of travelling and working Rwandese get here in uganda, then the answer is NO.Yesterday evening i listened to news over RBA,of a one Cyemayire Emmanuel who was allegedly deported by CMI operatives and how he compelled Fellow rwandese never to rush back to uganda again,citing that its very dangerous for rwndese to work in uganda now.I woke up in the morning to go and check at the bus terminals to real see if the number of rwandese entering buses or disembarking was reduced!! It is shocking that even today the number of rwandese who board buses to kampala,mbarara,toro,bunyoro...is ever increasing.The leaders in rwanda have bittery been saying and compelling rwandese not to rush to Uganda but its impossible. Many rwandese especially in districts that neighbouring uganda even sneak into uganda without proper documentation.For example in kisor
WHO IS TOM VOLTAIRE OKWALINGA?WHY HAS THE UGANDAN GOVERNMENT FAILED TO GET HIS REAL IDENTITY For nearly 8 years Ugandans and the government of Uganda hqve been wondering about TVO,a character on Facebook that has been spilling and exposing sensitive information about the government. He has frustrated the government to the extent that one day,a one by the name of shaka robert was arrested and jailed in anticipation that he was thetrue identity behind the Facebook's TOM voltaire okwalinga(TVO).there has been lotsa speculation about who this TVO may be or how he gets information. Many people refered to TVO as: Charles Rwomushana:i think that, this man can never be TVO. Tamale Mirundi:The fearless motor mouthed journalism legend can never be TVO.what i like about tamale is straightforwardness and the hatred he has for the mafias in government and with this hatred for them,they would work had to unearth him so that museveni goes against him.i think he also canot afford to hide for al

Are ugandans using MTN and Airtel safe?

Image
Facebook vulnerabilities I have heard that Facebook is determined to have a new development in the incorporation of both instagram,messenger and whatsapp in a sort of intergrated messaging procedure but before you do this i wanna alert you on and of some holes in your social media platforms..these holes may be carried on and it may end up affecting all the applications. One is the authentication and verification of a phone number associated with a given account on some of the social mediaccount e.g especially those created using an email account as   . . a login id ,these accounts are usually compelled to add a phone number which must be verified but on such accounts one can temporary use a phone number without verification for a couple of weeks or more month because on the three facebook accounts iam testing iam and gave been able to use one phone number to login to three different facebook profile accounts;where one is originally verified and associated with a different account wh

ARe we really safe on facebook? Is our privacy guaranteed?

Facebook vulnerabilities I have heard that you are about to have a new development in the incorporation of both instagram,messenger and whatsapp in a sort of intergrated messaging procedure but before you do this i wanna alert you on and of some holes in your social media platforms... One is the authentication and verification of a phone number associated with a given account on some of the social mediaccount e.g especially those created using an email account as   . . a login id ,these accounts are usually compelled to add a phone number which must be verified but on such accounts one can temporary use a phone number without verification for a couple of weeks or more month because on the three facebook accounts iam testing iam and gave been able to use one phone number to login to three different facebook profile accounts;where one is originally verified while the two others are temporarily using it,a phone number verified to be a login id of another different facebook account can

Are all simcards registered?

Has any one ever wondered onthis issue?