Thursday, 31 March 2016

There is really nothing worth living for if you don't have Christ.  He is our hope, our source and the very essence of our living.

Whatever level of success,  achievements, breakthrough  you desire is in Christ Jesus.  Stop struggling with your own effort and intelligence,  surrender to Jesus and experience true peace of mind and unimaginable breakthrough in everything you do.

You have tried many things, it's time to try Jesus and you will see the difference.

#Only Jesus

Monday, 28 March 2016


For some reasons, i have decided not to comment on the current legal case between Apple computers and the FBI. Some of my friends have asked for my take on the the case and here, I want to give my own opinion about that high profile case.

Just for those who are not familiar with the case between the FBI and Apple computers, the FBI wants Apple Computers to unlock an iPhone 5S from a San Bernadino terrorist shooter; Farook. According to FBI, the phone could not be accessed since Farook was shot dead with his wife on that fateful day hence they require Apple Computers to unlock the phone which Apple has refused to unlock.

The FBI has threatened and sued Apple for failing to cooperate with them on a matter of  " National Security",   personally i see this move by the FBI as a desperate move to invade Techs companies within the United State, secondly, I don't consider the case as a matter of National Security plus Apple Computers has the legal right to protect the integrity of the data and information stored in the database of their computers within and outside the US. Lastly, i think and i know that the FBI's request for Apple to assist in unlocking the phone is bullshit! FBI has the capability, the technology and the Intel to unlock any phone, computer etc in any location in the world.  So  my conclusion is that the case is far more than unlocking a single phone, the FBI wants to set a precedent that the Department of Justice and the FBI can compel Tech companies to give up customer's information and create backs doors in mobile phone and computer OS.

QHN join Facebook, Google, Microsoft and other NGO's, individuals and organisations to condemn the FBI request. Request on National Security should not infringe on our right to freedom of expression. 

Uviowho Daniel, a blogger writes from Yanegoa.

Monday, 28 December 2015

Alright I have been silent on political issues for some time now especially on international politics, but after following the US politics and the candidates of the 2016 US presidential election, i can't anymore! Like Princess Elsa in the movie 'Frozen', i have to 'let it go'. Among all the US presidential candidate, Donald Trump is by far and by all means the most controversial of them and you will understand why if you have been following the Republican and the Democrats debates.
                                                       
So much drama, accusations and counter-accusations so far, CNN and its political commentators are also playing their parts in the campaign drama.
Trump has been  calling his party (The Republican Party)   running mates names which some people within the states think will hinder or reduce his vote in the republican primaries. But Trump is not a clay pot that can be broken by 'mere heat of the sun', he is a very tough businessman and i personally think that after surviving in the highly competitive American business sector, Trump can survive the current political hurricane in the 2016 US presidential election.

The latest of Mr. Trump's "yabing" (na so we dey call am for Naija) is that all Muslims without except should not be allowed to visit the United States for security reasons. A lot Muslim sympathizers have criticized Mr Trump some even calling for the Republican party to denounce him as a member of the party. But i want to hold a different opinion here friends: As an individual i have never been in support of religious, denominational, racial or any other kind of organized discrimination but like Albert Einstein who although being a pacifist, consent to the development and use of the Atomic bomb in the first World War, i hold opinion with Donald Trump; enough of the madness already. Is the Muslim community feel offended and insulted, then they should write and direct all those their 'open letters' to ISIS and other Islamic terrorist groups all over the world. Even if you don't agree with me, it is still my opinion and i am entitled to it just as you are entitled to support or no-support of my point here.
Donald Trump, Republican Candidate
There is no time to comment on  the many political crises in Nigeria right now but i want to advise Nigeria politicians to stop decamping to APC, APC is the ruling political party in Nigeria now but most politicians in Nigeria have fail to understand that there is still power in opposition! If there is no opposition then there is no politics and essentially no democracy. So Ayiri and co that are decamping to APC in Warri, Delta State, Nigeria should retrace their political adultery steps abeg
President Buhari

And for the record, i think APC is the worse political party ever in Nigeria. They are just accepting the decampees (if there is any word like that) from PDP without second thought. But i am not even surprised or bothered because APC is full of recycled old political thieves who left PDP to form APC. Finally, Buhari should stop the song about fighting corruption and jailing corrupt politicians from the previous administration. Why is Amechi, Tinubu, Atiku etc not in prison if Buhari is serious about fighting corruption?

Uviowho Daniel, a blogger writes from Yanegoa
Blogger Powered By Google.

Wednesday, 26 August 2015

The New Google chrome Mobile Browser

Google just updated the mobile version of its chrome browser, I am not a fan of the Google chrome but I think the new features are really cool for people who do most of their reading and research online.
Google  still gives you the regular drop-down list-like page when you make a query but this time, there is the option to check the meaning of any word or grammar that is generated from your query.

Google automatically redirect you to the meaning of the word you click on the result page of the query with a small letter of 'g' in a blue circle.


Google has been updating its mobile version of chrome browser to meet the continues challenge of its rival like Opera mobile, uc browser etc. However, I think Google also need to review the desktop version of the chrome browser and disable some of the funny default options that the desktop version of chrome come with. It should be more flexible like the new Microsoft Edge, Internet Explorer 11 and Opera desktop version.

So go get your chrome browser updated if you have not already done that. And here is a link to guide you on the different browsers for mobile phones. CLICK ME.
   
 
 
 

Thursday, 20 August 2015

If you have an opportunity to have a glance
 
I am just wondering guys; if by some chance both the Jesus Christ and the Devil appears before mankind, who do you think would get more attention? ( attention as used here means just attention and nothing more )  the Devil who has sworn to destroy all mankind with him or Jesus Christ who sacrificed his precious life to redeem mankind from eternal destruction?


Tuesday, 11 August 2015


Nothing thrilled me more the bizarre nature of subatomic particles in my college school days. Everything about Quantum Mechanics or Physics was and is still very interesting to me especially the laws and principles such as the THE DOUBLE SPLIT EXPERIMENT, EINSTEIN’S TIME DILATION, UNCERTAINTITY PRINCIPLE, SPACE-TIME, ETHER, to mention a few.

I was so in love with these theories, ideas and principles that I spent 40% of my school time in our school library buried in the many and sometimes scary nature of our subatomic particles far above the world of ‘Gross Matter’. To be honest, I missed so much missing classes and I also gained a lot. When I successfully and single-handedly build the first and the only Periscope in my school, I was given scholarship and made the Vice president of my school science club: JUNIOR ENGINEERS AND SCIENTIST CLUB (JETs club) and also doubled as the physics and chemistry laboratory prefect.

Here I am going to be talking about the UNCERTAINTITY PRINCIPLE.

Faced with the many and bizarre problems and behavior of the moving electron in the nucleus of the atom, scientist and physicists in the 19th century made so many predictions to determine where the electron could be at a particular time. But all theories, laws and ideas to pin the electron to a fix position proved futile until Heisenberg  came with his Uncertainty Principle which for the sake of simplicity states that: the more precisely the position of some particle is determined, the less precisely its momentum can be known, and vice versa. With this understanding, scientists’ and engineers were able to develop the first Nuclear weapon and other breakthroughs in the field of
nuclear physics.

I am still interested in Quantum physics and who knows I might just be the first African to develop a Nuclear Weapon since president Buhari recently signed a document that will see Nigeria and Nigerians going into arms production .LOL

 

Thursday, 5 March 2015

Here Are 5 Common Network Security Mistakes You Might Be Making:


Have you ever been scammed or had a computer virus take over your system. You're left wondering: “how the heck did this happen to me”? You thought you had followed all the standard advice on securing your network and computer, but you still ended up with a security breach or malware infestation.
Here Are 5 Common Network Security Mistakes You Might Be Making:
1. You're Not Using Strong Encryption On Your Wireless Network
Are you scratching your head because hackers broke into your network, even though you had wireless encryption enabled? You may have been using encryption, but you might have been using the outdated and highly vulnerable Wired Equivalent Privacy (WEP) encryption. WEP was cracked years ago and hacking a WEP-encrypted network is now trivial, due to a proliferation of easy to use WEP hacking tools. Even a novice hacker can break into a WEP-based network.
The Solution: replace your network's WEP encryption with Wi-Fi Protected Access 2 (WPA2). WPA2 is a much more robust wireless protection method and is the current standard for “secure” wireless networks. Some older routers may be too old to support an upgrade to WPA2 while others can be upgraded via a firmware update. Check your router manufacturer’s support page for your specific router to see if it supports WPA2.  
2. Your Passwords Aren’t Strong Enough
A weak password can be a hackers gateway into your network, your system, and your online accounts. Increased computing power has decreased the amount of time it takes for password cracking tools to crack a password.
You need to make your passwords as long, complex, and random as possible. Avoid use of dictionary words in your password as cracking tools test for these. Having one embedded in your password will help the tool find your password much quicker than if it had random characters in it.
Check out our article on How to Create a Strong Password for tips on composition.
3. Your System Doesn’t Have The Latest Security Patches
Hackers love to find systems with unpatched vulnerabilities because they can be exploited with specially crafted attacks that take advantage of the unpatched weakness. OS vendors are constantly detecting new threats in the wild and developing security patches to close the holes.
Most OSes feature a set-and-forget “auto update” capability that will automatically download and apply the latest security patches on a regular basis.
The Solution: turn on auto update for your OS security patches as well as any apps that have auto update capability. You should also periodically run a manual patch check to ensure that the auto update process isn’t broken.  
4. You Don’t Have a Backup Strategy
When things go bad, your first question might be “do I have a backup of those files”? You shouldn’t have to ask yourself this question, you should know the answer, and the answer should be "let me go pull up my backup of those files”.
Backups are critical resources. Some computer malware such as ransomware can encrypt your files and hold them hostage. If you have a backup of your files then you can laugh at the ransom demand and tell those hackers to go stick it in their ear or some other orifice.
Check out our article on Developing a Backup Strategy for some tips on how to go about backing up your stuff.
5. You’re Not Aware of The Latest Threats And Scams
Scammers and hackers are constantly evolving their tools and tactics. Educating yourself on the current threats is key to not falling victim to the newest and most dangerous scams and hacks happening in the world.

Emerging Graphics File Formats - New and Upcoming Graphics Formats


Algo Vision LuraTech
"Algo Vision LuraTech GmbH is one of the leading developers of JPEG2000 implementations and technology for the compression of images, data and scanned documents in color."
LizardTech
"LizardTech develops imaging software and solutions that simplify and enhance the distribution, management and control of digital images and documents." Products include DjVu for digitizing paper documents and MrSID for high quality compression of photos and other images.
Zoomify
Solutions for delivering high resolution images over the Web.
About MNG - Multiple-Image Network Graphic
MNG (pronounced "ming") is the proposed multiple-image extension of the PNG (Portable Network Graphics) format for Web animation. Here you'll find resources for its support and development.
About SVG - Scalable Vector Graphics
SVG stands for Scalable Vector Graphics, a new vector format currently in development for Web graphics and animation. Here you'll find SVG authoring tools, samples, source code, technical specifications, and the latest news and information about SVG development.
JPEG Format - About JPEG and JPEG 2000 File Formats
JPEG (or JPG) stands for Joint Photographic Experts Group, and was named for the organization that developed the format. Here you'll find information and specifications on the JPEG (jpg) and upcoming JPEG2000 (jp2) graphic file formats used on the Web and in digital photography. Includes software for working with JPEG images, technical specs, news, answers to frequently asked questions, and tips for working with JPEG graphics

Tuesday, 3 March 2015

QHN, Our big story - Net Neutrality

Quantum Hack Networks-QHN, bring to you the new word in the tech industry and it means and stands for, Net Neutrality, enjoy.
Net neutrality (also network neutralityInternet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common carrier.[1][2][3][4]
Examples of net neutrality violations include when the Internet service provider Comcast intentionally slowed peer-to-peercommunications.[5] In 2007, one other company was using deep packet inspection to discriminate against peer-to-peer, file transfer protocol, and online games, instituting a cell-phone style billing system of overages, free-to-telecom value-added services, and bundling


Net neutrality[edit]

Network neutrality is the principle that all Internet traffic should be treated equally.[7] According to Columbia Law School professor Tim Wu, the best way to explain network neutrality is as a principle to be used when designing a network: that a public information network will end up being most useful if all content, sites, and platforms are treated equally.[8] A more detailed proposed definition of technical and service network neutrality suggests that service network neutrality is the adherence to the paradigm that operation of a service at a certain layer is not influenced by any data other than the data interpreted at that layer, and in accordance with the protocol specification for that layer.[9]

Open Internet[edit]

The idea of an open Internet is the idea that the full resources of the Internet and means to operate on it are easily accessible to all individuals and companies. This often includes ideas such as net neutrality, open standardstransparency, lack of Internet censorship, and low barriers to entry. The concept of the open Internet is sometimes expressed as an expectation of decentralized technological power, and is seen by some as closely related to open-source software.[10]
Proponents often see net neutrality as an important component of an open Internet, where policies such as equal treatment of data and open web standards allow those on the Internet to easily communicate and conduct business without interference from a third party.[11] A closed Internet refers to the opposite situation, in which established corporations or governments favor certain uses. A closed Internet may have restricted access to necessary web standardsartificially degrade some services, or explicitly filter out content.

Dumb pipe[edit]

Main article: Dumb pipe
The concept of a dumb network made up of dumb pipes has been around since at least the early 1990s. The idea of a dumb network is that the endpoints of a network are generally where the intelligence lies, and that the network itself generally leaves the management and operation of communication to the end users. In 2013 the software company MetroTech Net, Inc. (MTN) coined the term Dumb Wave which is the modern application of the Dumb Pipe concept to the ubiquitous wireless network. If wireless carriers do not provide unique and value added services, they will be relegated to the dumb pipe category where they can't charge a premium or retain customers.

Source:Wikipidea

Animal Affairs I & II

                                                                Animal Affairs I & II   Chicken I . I am scared for my life. Chicken II...