Showing posts with label Technews. Show all posts
Showing posts with label Technews. Show all posts

Thursday, 31 March 2016

6 Most Popular Methods For Cracking Passwords And Their Countermeasures


On daily basis, we here or receive complaints of accounts being hacked, information being stolen, privacy intrusions and many more which shows that there are several methods used by hackers in hacking your account and also getting your personal information.

We have researched the most popular methods used by every hackers in getting your password and we are providing some countermeasures to those methods in this post.

NB: This post is not to teach you how to hack, but will provide a more secured suggestion on how prevent your password being hacked.

1. Phishing
Phishing is the most easiest and popular hacking method used by hackers to get someone account details. In Phishing attack, hacker will send fake page of real website like Accessbank, facebook to victim. When someone login through that fake page his details is automatically sent to the hacker. This fake pages can be easily created and hosted on free web-hosting sites.

Countermeasure: Phishing attacks are very easy to avoid. The url of this phishing pages are different from the real one. For example URL of phishing page of Accessbank might look likeAccesbank.com (As you can see There is only one "s". Always make sure that websites url is correct, and never follow an email link to login account details (Especially Bank Accounts).


2. BruteForce Attack
Any password can be cracked using Brute-force attack. Brute-force attacks try every possible combinations of numbers, letters and special characters until it matches the correct password. Brute-force attacks can take a very long time depending upon the complexity of the password. And the cracking time is determined by the speed of computer and complexity of the password.

Countermeasure: Use long and complex passwords. Try to use combination of upper and lowercase letters along with numbers and possibly characters. Brute-force attack will take hundreds or even thousands of years to crack such complex and long passwords.

Example: Passwords like "myrealname" or "mypassword" can be cracked easily whereas computer will take thousand of days to crack passwords like "Ya34lL!"


3. Rats and Keylogger
In keylogging or RATing the hacker sends keylogger or rat to the victim. This allows hacker to monitor every thing victim do on his/her computer. Every keystroke is logged which includes passwords and usernames. Moreover hackers can even control the victims computer to perform some remote functions.

Countermeasure: Never login to your bank account from cyber cafe or someone else computer. If its important use on-screen or virtual keyboard while tying the login. Use latest anti-virus software and keep them updated. And never install any file from the internet without proper scanning and verifying the source.


4. Rainbow Table
A Rainbow table is a huge pre-computed list of hashes for every possible combination of characters. A password hash is a password that has gone through a mathematical algorithm such as md5 or CHA5 and is transformed into something which is not recognizable. A hash is a one way encryption so once a password is hashed there is no way to get the original string from the hashed string. A very commonly used hashing algorithm to store passwords in website databases is MD5. It is almost similar to dictionary attack, the only difference is, in rainbow tables attack hashed characters are used as passwords whereas in dictionary attack normal characters are used as passwords.

Example: ("hello" in md5 is 5d41402abc4b2a76b9719d911017c592 and empty string ("" is d41d8cd98f00b204e9800998ecf8427e

Countermeasure: Make sure you choose password that is long and complex. Creating tables for long and complex password takes a very long time and a lot of resources.

5. Guessing
This looks silly but this can easily help hackers to get ones password within seconds. If the hacker knows you, he can use information he knows about you to guess your password. Hacker can also use combination of Social Engineering and Guessing to acquir

Wednesday, 10 February 2016

HOW A JUMIA STAFF DIE WHILE WORKING!!!

A soon-to-be-married Nigerian collapsed, and died, on Monday after prolonged exposure to “inhumane” working conditions.
Ola, as the man is being identified, worked for online retail firm Jumia where employees say they are now being treated like animals.
Ola is one of the many Jumia employees who package goods you order for via the firm’s online portals. The warehouse where he works is one of the hottest around the world, employees told NewsroomNG.
Ola slumped and died on Monday inside a Jumia warehouse located at Adeniyi Jones in Ikeja area of Lagos State.
The tragic news hit the airwaves after an anonymous Jumia employee wrote zinok247.com
“I am a staff of Jumia Nigeria and you need to know what is going on in this slave trade company,” the employee wrote zinok247.com

Sunday, 31 January 2016

Worldremit, MTN Partner To Transfer Money

WorldRemit, International money transfer firm has partnered with MTN Group to allow WorldRemit customers globally to send money instantly to MTN Mobile Money wallets in Rwanda, Uganda and Zambia.
Serigne Dioum, MTN Group Head of Mobile Financial Services said: “Together, we are now providing an instant, fully digital and very affordable solution to send international remittance to Rwanda, Uganda and Zambia. Other countries will follow soon.”
The pact opens up both platforms to more customers, increase their commitment and helping them onboard more customers in the countries and those in the diaspora.
By turning to Mobile Money which has already overtaken cash pick-up and bank deposits in Uganda, WorldRemit and MTN’s Mobile Money services will reach millions of people without bank accounts, giving them access to a variety of life-enhancing financial services including savings and insurance schemes.
“At WorldRemit, we are pioneering international mobile-to-mobile remittances. Our partnership with MTN allows our customers around the world to send money instantly from the WorldRemit app to MTN Mobile Money users in Rwanda, Uganda and Zambia. Together with MTN, we make sending money home as easy as sending an instant message,” Alix Murphy, Senior Mobile Analyst at WorldRemit said.
With its presence in over 52 countries, the WorldRemit app is used to send around 400,000 money transfers every month to over 125 destinations. Its partner, MTN Mobile Money is used by customers in 15 countries across Africa, these deal therefore opens up Africa to financial inclusion

Tuesday, 19 January 2016

4 Interesting Reasons Why CDMA Networks Are ‘Disappearing’ In Nigeria

Code Division Multiple Access (CDMA) networks are disappearing from the Nigerian telecommunication scene. The last one to dissipate, when many thought that it  had a strong customer-base was Visafone which was recently taken over by MTN. As these networks  vanish from the data arena, Jovago.com, Africa’s No 1 hotel booking portal examines reasons why CDMA networks are liquidating.

Limited reach

Despite the fact that many of these CDMA networks attempted to offer fantastic largesse to their customers, one shortcoming for them was their limited reach as their capacity only carried major Nigerian cities like Lagos, Port Harcourt and probably Kano. If you want to call your business partner in the East, you may not reach him because of the network limitation.

Fierce competition from GSM networks

Obviously, if the reach is limited, it will be difficult to compete with the GSM networks whose services are reasonably received throughout the nooks and crannies of Nigeria. This aside, there is a sweeping competition among the GSM network making it very difficult for CDMAs to enter into the race. Visafone tried but it could not maintain the momentum. You do not require a fortune-teller to predict the demise of CDMA.

Their rates

A CDMA phone is the mini-version of the famous landlines. Although calls between CDMAs are substantially cheap, if you attempt to use it to dial a GSM number using this network, the interconnection rate became quite expensive. As a result, many stuck to using their GSM phones.

Permanent SIM card

Many techies found using a phone tied to a permanent SIM card uncomfortable. Many Nigerians who owned CDMA phones oftentimes had second mobile devices that gave them the freedom to switch between GSM networks. The additional cost accrued from owning two phones had most people opting for the more flexible GSM platform.

Monday, 11 January 2016

Google Copyright Removal Requests Keep Soaring

The company received 12.1 million requests to remove URLs from search results in the first week of 2016 alone


Google received a record number of requests to remove URLs from search results in the first week of 2016: 12.1 million, which is 44 times more than the number of requests made during the same period four years ago.


A Vocativ analysis of all requests to remove URLs in the first week of January each year from 2012-2016 showed that nearly 90 percent of all requests were reviewed. The same percentage of URLs were ultimately removed from search results after complaints that they linked to material allegedly violating copyrights.


Copyright holders generally ask Google via an online form to remove links they believe link out to content posted illegally. The majority of the requests come from the music and movie industries, according toTorrent Freak
According to Google, the average amount of time it takes to review each piece of content is about six hours.
If a URL gets removed and its owner thinks that’s unjustified, the decision to remove it can be appealed.

Sunday, 10 January 2016

How To Download Torrent Files Without Torrent Clients



  • Before talking on the topic I would love to state what a torrent or rather, a torrent File is. A torrent is a protocol based peer to peer file sharing system that is used to deliver large amount of data files online.
  • I suppose you tried to download a file (i.e an app, movie, ebook etc.) from a torrent site but it was not successful or maybe you do not have access to a torrent client, whatever the case maybe I am going to show you a number of ways to download torrent files without using the service of a torrent client like uTorrent, bitTorrent etc. Get a sit and grab some popcorn as I give you step-by-step ways you can get this done
  • 1. Using a Cloud Service
  • There are some cloud services online that enable one to cache torrent files, these files so cached in these system are then saved in the Cloud Storage and can then be downloaded using any suitable browser or download manager. Some of the popular Cloud Services you could use for free are: Zbigz.com, Torrent2ddl.com, Boxopus.com, Bitport.io, Bytebx.com, Filestream.me, Furk.net etc
  • 2. Using Browsers with Inbuilt Client
  • Okay, I decided to make this come second, some browsers have the capacity to download torrent files. Two of such apps are Torch Browser and FlashGet download manager. In torch browser,there’s an integrated torrent client, download accelerator, and media grabber. The torrent client opens up in a new tab and has a bunch of basic torrent features. Download here: (http://torch.en.softonic.com/).
  • On the other hand, after downloading Flashget V3 from their official website (http://www.flashget.com/en/download.html)
  • go to Firefox addon page and search for “FlashGot” addon. After installing Flashgot addon, go to any torrent site and search for the file you want, hover the cursor to the torrent link and right click, move to Flashgot2.x then click it. Ensure you change your proxy in the flashgot download manager to your Local Host if using wifi (connectify) or any tunneling apps. Another alternative way to download is by using Freedownloadmanager – It has inbuilt torrent downloader too.

Sunday, 1 November 2015

Cloud computing: Key concern is data protection — IBM Cloud Leader, Central W/Africa

While the level of maturity and awareness in cloud computing in Nigeria and the rest of the African countries are improving, the Cloud Leader, IBM Central W/Africa, Yusuf Assenjee in an interview with Technology Journalists at the just concluded IBM Business Connect 2015 held in Lagos said that key concern in many countries is around data protection.

Noting that the big global cloud providers have a track record around security, he said that Nigeria needs to have regulatory framework around data protection.
In Nigeria, the cloud market is very active. I see a lot of local companies, manage service provider and even Telcos are all in the cloud market and cloud space. So I would say, in Nigeria, the level of maturity and awareness are there.

Untold secrets of internet speed


You  know it doesn’t make sense to be angry with an inanimate object, but that doesn’t stop you from lashing out on your mobile device from time to time; especially when it takes so long to load pages on the internet.
Although sometimes, the Internet Service Providers, ISPs are to blame, there are efforts you can make to speed up browsing.

Reduce the web cache
Although Cache helps in storing data for future use, on the flip side it can deplete the pace of the internet. A good first  step in speeding up your slow internet connection to tweak your internet options.  The task here is to make your web cache as small as possible. The less disk space your reserve for your temporary files is less data that your computer needs to search through.

Friday, 16 October 2015

NCC: Why FG Is Blocking Unregistered Sim Cards

The Executive Vice Chairman of the Nigerian Communications Commission (NCC) Prof Umar Danbatta has explained why the commission has decided to block all unregistered sim cards. According to him, it was meant to assist security agencies to monitor criminals.

Prof Danbatta, made the disclosure on Thursday, while speaking at the NCC Day at the ongoing International Trades Fair in Abuja.

The NCC boss who was represented by the Head of Public Affairs in the Commission, Reuben Mouka, said it is dangerous for subscribers to use phone lines that do not bear their identities because of the security implications.

Thursday, 11 June 2015

WINDOWS 10 COMING ON JULY 29



Microsoft announced the general availability for Windows 10 release to be set on July 29th.
 It means in less than three weeks time, your current PC (apart from Windows XP, vista and older versions) will be eligible for a free upgrade to Windows 10.

JUMIA NIGERIA: TAKING CUSTOMER SATISFACTION TO NEW HEIGHTS



Admit it! At one point or the other you have wondered how Jumia does it. Does what? How Jumia manages to cater to its vast number of customers nationwide and still maintain a good level of satisfaction among them.

Wednesday, 27 May 2015

PHOTOS FROM NEW MEDIA CONFRENCE HELD AT TERRA KULTURE TODAY


The New Media Conference is a gathering of social media enthusiasts, Online Influencer, Bloggers, Vloggers, Digital Marketers, and more....

The THEME of the event was NEW MEDIA IN THIS AGE- CHANGING THE WHOLE PERSPECTIVE...

Tuesday, 26 May 2015

Globacom nears 30m subscribe


Telecommunications company, Globacom, has said that almost 30 million subscribers across Nigeria are now on its network. National Sales Coordinator of Globacom for North West Operations, Samuel Edoho disclosed last weekend in Abuja at an award ceremony where the company was recognized as the network provider of the year 2014 by the Independent Newspaper Limited. 

He said the company achieved the feat due to the company’s consistent investment and deployment of innovative and customer oriented services for its teaming subscribers.   Edoho said the company, with close to 30 million subscribers in its network, plans to soar towards its aspiration of building Africa’s biggest and best telecommunications network in the continent.

Thursday, 21 May 2015

JUMIA Mobile Week Megathon: Be part of the BIGGEST MOBILE SALE IN AFRICA



The biggest mobile sale ever

At Jumia, we are known to offer the best prices online for the world's hottest phone brands ranging from Innjoo, Infinix, Tecno, LG, Samsung, Lenovo, Apple and so much more. 

Enjoy unbelievable mobile phone deals during the Mobile Week Megathon. 

This Mobile Week Megathon is definitely going to break the internet, even bigger than Jumia black Friday! Do not be left behind on this wonderful week long mobile phone price slash. Now is the right time to buy that sleek mobile phone you have been craving for. 

Wednesday, 20 May 2015

Konga.Com: The Brand Building Force Behind Infinix Success In Nigeria



Nigeria has been purported to be one of the fastest growing economies in the world and today foreign investors and businesses are increasingly focusing on Africa’s most populous country. One company that is forging a success story in Nigeria is leading Chinese smartphone manufacturers – Infinix mobility. What is interesting about the success model for this company is that it has been built on a long term partnership with Nigerian ecommerce company, Konga.com.

Saturday, 16 May 2015

Leaked press render of the Galaxy Tab S2 offers a first look at Samsung's upcoming tablet

The leaked render reveals a design that is similar to that of the Galaxy Tab A, with a metal frame running around the sides of the tablet.
Galaxy Tab S2
From the image above, it looks like the Galaxy Tab S2 features a physical home button (which may also double up as a fingerprint sensor), with the power and volume buttons on the right hand side. Also housed on the right side of the tablet are the microSD and SIM-card slots.
The successor to the high-end Galaxy Tab S series, Samsung's upcoming tablets will reportedly be announced in the month of June. While there isn't any official confirmation confirming the imminent launch of the tablets, recent leaks suggest that the Galaxy Tab S2 will be offered in 8-inch and 9.7-inch variants.
As for the specs, both tablets are expected to feature Super AMOLED displays with a resolution of 2048 x 1536 (in a 4:3 ratio like the Nexus 9), 64-bit octa-core Exynos processor, 3GB RAM, minimum of 32GB storage, microSD card slot, Wi-Fi 802.11 ac/b/g/n, LTE Category 6 connectivity along with an 8MP camera at the back and a 2.1MP shooter up front. Software-wise, the Galaxy Tab S2 will run Android 5.0 out of the box.
Source: Twitter (OnLeaks)

Tuesday, 12 May 2015

Google's self-driving cars involved in 11 accidents in six years

FILE - This May 13, 2014 file photo shows a Google self-driving Lexus at a Google event outside the Computer History Museum in Mountain View, Calif.

Google says its self-driving cars have been involved in 11 accidents since the project began.  A team of drivers that is testing the fleet of more than 20 vehicles have driven 1.7 million miles so far.

"...Not once was the self-driving car the cause of the accident," Chris Urmson said in a post on technology news website Backchannel's blog Medium. No one was injured in the accidents, Urmson added.

"If you spend enough time on the road, accidents will happen whether you're in a car or a self-driving car."

Infinix: Share your #Zero2Hero story and win amazing prizes




Hello All! Got a ‪#‎Zero2Hero‬ story? Share them here and you could be part of the 100 people that will get an amazing surprise!
Here’s a “How To” guide to do it:

12 THINGS YOU CAN BUY IN NIGERIA WITH THE $10,000 APPLE WATCH

The gold edition of the Apple Watch goes on sale in April 2015 in select countries with a starting price of $10,000 which translates to about N2,400,000.
At BambooNaija.com, we thought to list 12 other things that you can buy from our website with the same amount.

Monday, 11 May 2015

The Samsung S6 Duos.......




The recent introduction of Samsung Galaxy S6 Duos to the smart phone ecosysm  has gained market attention  as a result of dual t SIM cards capacity.

The  S6 Duos comes with an impressive set of charging features that support the built-in Qi wireless charging capability, using a wireless charging pad with ease.

With the super-fast charging feature, the device can run for four hours on just 10 minutes of charging, and charges to full capacity in about 80 minutes. The home button also doubles as a fingerprint reader, meaning that users no longer need to swipe, to open the phone.