Posts

Showing posts from February, 2019
Image
Remember the days when text messages and Snake on your Nokia 3310 were two of the most exciting things a phone could manage? We do too. Fast forward 15 years and we have in-display fingerprint scanners, punch-hole front cameras , bezel free displays and a whole new take on slider and flip phones. Flip phones were once slim, compact and hinged devices. Now, flip phones have morphed into foldable phones and they are set to be unhinged, in both senses of the word. With bendable screens, Android support, plenty of potential and huge price tags, here are the devices leading the crazy foldable smartphone trend, from the already announced to the upcoming and rumoured. Huawei 6.6-inch front, 6.38-inch rear, unfolds into 8-inch OLED tablet 4500mAh battery with 55W fast-charging Kirin 980 chipset and 5G modem Leica triple camera Huawei was the one to steal the show at Mobile World Congress 2019 , unveiling its take on a folding phone in the Mate X. Unlike the Samsung Fold (below), the

Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch

Image
Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch , according to a Bloomberg report. The company bought Beddit, a company that makes a sleep tracking sensor strip, in May 2017, so sleep tracking has long been a feature expected to come to the Apple smartwatch. The report suggests people familiar with the matter have said Apple is testing the sleep monitor in several "secret sites" around its Cupertino headquarters, though it is not expected to come to the Apple Watch until 2020. Sleep tracking is currently available to the Apple Watch through third party apps, but it's not a feature supported natively. It is however, a feature that is lacking from the device, especially with most of Apple's competition offering it. The latest Samsung Galaxy Watch Active offers four stages of sleep tracking for example, as do Fitbit's latest fitness trackers like the Charge 3. Those devices offer multiple days of use from a single charge

Updf handsover 70 ex m23 rebels to DRC

How to use the public wifi safely

WiFi is a lot like water. It is available almost everywhere and probably should be free. Unfortunately, a lot of times it is not safe to drink free water. Water that is sourced from a stream might be dirty, and unless you have a water purification system, it is not a good idea to drink much of it. Water from the ocean might be too salty. Avoid water from a sewer at all costs. WiFi can also be unsafe, especially if it is free and public. The difference between Ethernet and WiFi When people use Ethernet, safe and secure internet access is much more certain. With a wired Ethernet connection, people must physically go to the source if they want to infiltrate the network. In contrast, a wireless network system means a person merely has to be with in the reach and range of the Wi-Fi to connect. Upon connecting, you are placing your devices into a network that are likely not secure. There are many attacks you are vulnerable to when you log in. Man in the Middle Attacks A Man in the Midd
Image
How to create a simple keylogger yourself in windows:  – Keylogging is the process of recording the key presses made on a keyboard on to a log. This is often done without the awareness of the user. Keylogging is widely used as a hacking trick as well. Using keylogging, all the keypresses made on a keyboard can be efficiently recorded. This can include passwords, usernames, secret pins, confidential data etc. Keylogging can be used to detect trespassing as well. In this article, a windows framework known as Powershell is used to create a simple  keylogger . It consists of a command-line shell and associated scripting language. Powershell is built on the .NET framework and is used widely for various applications. Also see:-   How to stop windows 10 keylogger program STEP 1 Spread out the Start menu. Type in  Windows PowerShell  in the search bar. From the search results, open the applications  Windows PowerShell  and  Windows PowerShell ISE  as shown in the screenshot. ST

Museveni is the 12th most economic influencer

President Yoweri Kaguta Museveni has been ranked among the best President’s in the World, according to a New York University and World Bank experts who ranked the President 12 th in terms of influencing economic growth. The report first released in May 2018 by the World Bank economist Steve Penning’s and New York University Economics Professor William Easterly indicates that Museveni is one of the best leaders with a significant positive impact on their countries economic growth. The two experts define the best leaders as any leaders for whom estimated leader effect is positive and significant at the 95% level and the worst leader are those with negative and insignificant leader effects. The findings that were entitled “Shrinking dictators: how much economic growth can we attribute to national leaders” ranked Senior General Than Shwe of Burma as number one for being the most influential leader who steered his country’s economic growth at 3.95% and shrinkage of just 0.71%. He was th

NIRA is not serious

Image
NIRA as an authority established to oversee the issuance of national identity cards has been a failure not because it doesn't know what to do but the recklessness of its workers and other bodies involved in the national id process. It is unbecoming as to how alot of foreigners easily got and get our national id yet the valid citzens take more time with alot of inconviniences in getting the national id.when i write this,i know alot of you out there think that am simply writting,but the real issue is that the whole NIRA processes in getting National id are getting nuisance and too much inconviniencing with alot of bribery at some levels. Its true that foreigners have been crossing border to get national ids and hiw they apply for them is through bribery.In districts close to borders,the DISOs,GISOs and the LC1s usually get bribes to sign for these foreigners,however it shoukd be noted that RDCs are not involved in this nonsensical bribery.They are allegations that in the past mass

What Burundi's ambassador to Uganda said about tension with Rwanda.

Image
Burundian Ambassador to Uganda Jean Bosco Barege has ruled out the possibility of a “direct military confrontation” with Rwanda as tension between the two countries mounts, but quickly warned Kigali risks being attacked by several armed movements in the region if the government of President kagame makes serious miscalculations.

Bad Black for questioning at CID office

Kampala socialite Shanita Namuyimbwa, popularly known as Bad Black has appeared at the Police Directorate of Criminal Investigations (CID) for questioning over a video she posted online in which she makes serious allegations about a senior government official. She posted the video on her Facebook page seven months ago, although police have just picked interest to inquire into the claims. Bad Black on Monday appeared at CID headquarters in Kubuli, Kampala with her lawyers Julius Galisonga and Sam Muyizzi. CID spokesman SP Vincent Ssekatte said she was supposed to appear on Wednesday (February 27) but she decided to come today. "We have taken her to the officers for interrogation," he said. The Force did not say who the complainant is in the case, but the local celebrity likely breached the Computer Misuse Act, according to detectives. Mr Joseph Obwona, the deputy CID director, in a February 20 summons ordered Ms Namuyimbwa to report to CID headquarters without fail. “W

Police's say on kyaligonza

The Police yesterday, 24/02/2019, acknowledged apologies from its Sister Security Agency, the UPDF over the manner in which our officer, Sgt Namaganda Esther was treated by its officers while on official duty. The incident that was captured on video, started when the driver of motor vehicle reg. no. 18CDMI who was heading from Kampala – Mukono, wrongfully made a U-turn in the middle of the road at Seeta junction; and was stopped by the traffic officer. This prompted, two body guards to the Ugandan Ambassador to Burundi, Major General (rtd) Matayo Kyaligonza, to jump out of the car and angrily confront our officer, including assault after she attempted to stop them from making the U-turn. We want to strongly condemn such acts of brutality upon our officers, and do further congratulate our officer on the degree of patience and restraint exhibited. We are observing her treatment and speedy recovery from the injuries and trauma suffered from the incident. This is one example of the ris

WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST

Image
WHY YOUR PHONE OVER HEATS AND DRAINS BATTERY VERY FAST: Faulty capacitors and resistors are the main reason for this problem.. as all electronic experts have to agree ,that capacitors do BLOCK direct current as they allow alternating current to pass,meaning that capacitors do smoothen the output from a power supply. thus when capacitors are faulty high levels of direct current will flow via the PCD thus leading to over heating! again,we know that capacitors store current ,when current flows to the metal plate via the dielectric forming an electromagnetic field where -ve and +ve electrons are absorbed and stored at the two metallic plates to be released later thus if capacitors get faulty alot of current will directly distributed and thus draining the battery fast! resistor limit flowage of current in high levels and reduce voltage to a desired level,e.g if a battery has 4 volts and a chip need 2 volts,2 resistors of equal resistance placed in a series will be needed to half the volta

ATM hacking getting easy and an inreased trend of cyber robbery

Image
As long as there are ATMs, hackers will be there to drain them of money. Although ATM-targeted “jackpotting” malware—which forces machines to spit out cash—has been on the rise for several years, a recent variation of the scheme takes that concept literally, turning the machine’s interface into something like a slot machine. One that pays out every time. As detailed by Kaspersky Lab, so-called WinPot malware afflicts what the security researchers describe only as a “popular” ATM brand. To install WinPot, a hacker needs either physical or network access to a machine; if you cut a hole in the right spot, it's easy enough to plug into a serial port. Once activated, the malware replaces the ATM's standard display with four buttons labeled “SPIN”—one for each cassette, the cash-dispensing containers within an ATM. Below each of those buttons, it shows the number of bank notes within each given cassette, as well as the total values. Tap SPIN, and out comes the money. Tap STOP, and

Cyber security getting more important than ever

The age of digitization has led to many significant changes, both in our day-to-day lives and larger scale operations. One such example is the nature of terrorism. In the last decade or so, a new wave of terror attacks have surfaced — namely cyber-terrorism and cyber-warfare. 2017 saw one of the biggest cyber threats ever, in the form of malware built off a worm called “WannaCry.” Through a phishing scam, the malware managed to infect computers and lock systems down. This scam demanded $300 in bitcoins to get users back into their own files and devices. The attack hit over 200,000 computers in 150 countries, including the United States, Russia, Britain, Spain, India, Taiwan, Ukraine, and more. Specifically, the targets included universities, the Russian Interior Ministry, FedEx, railway systems, and more. One of the worst hit targets was Britain’s National Health Services. Because hospitals, ambulance companies, and doctors’ offices were hit, outpatient services had to be canceled an
Bug Allows Bypass of Face ID and Touch ID Authentication of WhatsApp iOS version A Reddit user has discovered a method to bypass recently introduced Face ID and Touch ID authentication for WhatsApp iOS version. Earlier his month WhatsApp introduced authentication feature for its iOS version allowing users to unlock their phone using Face ID and Touch ID. Users can enable this feature by going to Settings -> Account -> Privacy -> Screen Lock in WhatsApp. Users can also set a time interval to application lock itself like immediately, after 1 minute, after 15 minutes, or after 1 hour. Now a Reddit user has discovered a method to bypass this authentication unless the time duration is set to immediately. According to the user, Face ID and Touch ID authentication can be easily bypassed by using the Share Sheet in iOS. The share sheet allows sharing information from the current context with apps, social media accounts, and other services. 1. Get to the iOS Share Sheet using an
Image
The Bounty Hunter Anand Prakash – Bug Bounty Hunter does it again Anand Prakash and his colleague at it again managed to unveil the essential API related vulnerability which led to the leakage of client secret and server tokens of all Uber developer applications. Anand Prakash – bug bounty hunter does it again Anand Prakash, AppSecure is a top-ranked hacker to be precise 4th worldwide and 1st in India on Uber’s bug bounty program. He has earned more than 25 lakhs approx $35000 till date from Uber alone. This is not the first time the bug bounty hunter is doing it either, earlier in 2018 he managed to identify an issue on Tinder allowing them to login into any tinder account. The bug bounty hunter is also ranked 3rd worldwide and 1st in India on Twitters bug bounty program. AppSecure led by Anand Prakash and Manisha Sangwan managed to identify an essential API flaw which led to leakage of client secret and server tokens of all Uber developer applications. According to internet r

I have got another way of using facebook without paying OTT.. I will never use VPN and. I will never pay OTT

After MTN interrupting in one way i used to loginto Facebook, WhatsApp, Instagram and twitter...... I ...i have designed another way of ysing social Media without paying OTT taxes.

Tecno Camon IClick2 ,Tecno Camon iAce 2XTecno Camon iSky 2,where can i get it here in east Africa?

Image
Rearcno Camon IClick2 smartphone was launched in October 2018. The phone comes with a 6.20-inch touchscreen display The Tecno Camon IClick2 is powered by octa-core processor and it comes with 4GB of RAM. The phone packs 64GB of internal storage that can be expanded up to 128GB via a microSD card. As far as the cameras are concerned, the Tecno Camon IClick2 packs a 13-megapixel (f/1.8) primary camera and a 5-megapixel secondary camera on the rear and a 24-megapixel front shooter for selfies. The Tecno Camon IClick2 runs Android 8.1 and is powered by a 3750mAh. The Tecno Camon IClick2 is a Dual-SIM (GSM and GSM) smartphone that accepts Nano-SIM and Nano-SIM. Connectivity options include Wi-Fi, GPS, Bluetooth, Micro-USB, Active 4G on both SIM cards, 3G and 4G (with support for Band 40 used by some LTE networks in India). Tecno Camon IClick2 KEY SPECS Display 6.20-inch Processor octa-core Front Camera 24-megapixel RAM 4GB OS Android 8.1 Stora