There is really nothing worth living for if you don't have Christ. He is our hope, our source and the very essence of our living.
Whatever level of success, achievements, breakthrough you desire is in Christ Jesus. Stop struggling with your own effort and intelligence, surrender to Jesus and experience true peace of mind and unimaginable breakthrough in everything you do.
You have tried many things, it's time to try Jesus and you will see the difference.
#Only Jesus
Thursday, 31 March 2016
Monday, 28 March 2016
For some reasons, i have decided not to comment on the current legal case between Apple computers and the FBI. Some of my friends have asked for my take on the the case and here, I want to give my own opinion about that high profile case.
Just for those who are not familiar with the case between the FBI and Apple computers, the FBI wants Apple Computers to unlock an iPhone 5S from a San Bernadino terrorist shooter; Farook. According to FBI, the phone could not be accessed since Farook was shot dead with his wife on that fateful day hence they require Apple Computers to unlock the phone which Apple has refused to unlock.
The FBI has threatened and sued Apple for failing to cooperate with them on a matter of " National Security", personally i see this move by the FBI as a desperate move to invade Techs companies within the United State, secondly, I don't consider the case as a matter of National Security plus Apple Computers has the legal right to protect the integrity of the data and information stored in the database of their computers within and outside the US. Lastly, i think and i know that the FBI's request for Apple to assist in unlocking the phone is bullshit! FBI has the capability, the technology and the Intel to unlock any phone, computer etc in any location in the world. So my conclusion is that the case is far more than unlocking a single phone, the FBI wants to set a precedent that the Department of Justice and the FBI can compel Tech companies to give up customer's information and create backs doors in mobile phone and computer OS.
QHN join Facebook, Google, Microsoft and other NGO's, individuals and organisations to condemn the FBI request. Request on National Security should not infringe on our right to freedom of expression.
Uviowho Daniel, a blogger writes from Yanegoa.
Monday, 28 December 2015
Alright I have been silent on political issues for some time now especially on international politics, but after following the US politics and the candidates of the 2016 US presidential election, i can't anymore! Like Princess Elsa in the movie 'Frozen', i have to 'let it go'. Among all the US presidential candidate, Donald Trump is by far and by all means the most controversial of them and you will understand why if you have been following the Republican and the Democrats debates.
So much drama, accusations and counter-accusations so far, CNN and its political commentators are also playing their parts in the campaign drama.
Trump has been calling his party (The Republican Party) running mates names which some people within the states think will hinder or reduce his vote in the republican primaries. But Trump is not a clay pot that can be broken by 'mere heat of the sun', he is a very tough businessman and i personally think that after surviving in the highly competitive American business sector, Trump can survive the current political hurricane in the 2016 US presidential election.
The latest of Mr. Trump's "yabing" (na so we dey call am for Naija) is that all Muslims without except should not be allowed to visit the United States for security reasons. A lot Muslim sympathizers have criticized Mr Trump some even calling for the Republican party to denounce him as a member of the party. But i want to hold a different opinion here friends: As an individual i have never been in support of religious, denominational, racial or any other kind of organized discrimination but like Albert Einstein who although being a pacifist, consent to the development and use of the Atomic bomb in the first World War, i hold opinion with Donald Trump; enough of the madness already. Is the Muslim community feel offended and insulted, then they should write and direct all those their 'open letters' to ISIS and other Islamic terrorist groups all over the world. Even if you don't agree with me, it is still my opinion and i am entitled to it just as you are entitled to support or no-support of my point here.
And for the record, i think APC is the worse political party ever in Nigeria. They are just accepting the decampees (if there is any word like that) from PDP without second thought. But i am not even surprised or bothered because APC is full of recycled old political thieves who left PDP to form APC. Finally, Buhari should stop the song about fighting corruption and jailing corrupt politicians from the previous administration. Why is Amechi, Tinubu, Atiku etc not in prison if Buhari is serious about fighting corruption?
Uviowho Daniel, a blogger writes from Yanegoa
Blogger Powered By Google.
So much drama, accusations and counter-accusations so far, CNN and its political commentators are also playing their parts in the campaign drama.
Trump has been calling his party (The Republican Party) running mates names which some people within the states think will hinder or reduce his vote in the republican primaries. But Trump is not a clay pot that can be broken by 'mere heat of the sun', he is a very tough businessman and i personally think that after surviving in the highly competitive American business sector, Trump can survive the current political hurricane in the 2016 US presidential election.
The latest of Mr. Trump's "yabing" (na so we dey call am for Naija) is that all Muslims without except should not be allowed to visit the United States for security reasons. A lot Muslim sympathizers have criticized Mr Trump some even calling for the Republican party to denounce him as a member of the party. But i want to hold a different opinion here friends: As an individual i have never been in support of religious, denominational, racial or any other kind of organized discrimination but like Albert Einstein who although being a pacifist, consent to the development and use of the Atomic bomb in the first World War, i hold opinion with Donald Trump; enough of the madness already. Is the Muslim community feel offended and insulted, then they should write and direct all those their 'open letters' to ISIS and other Islamic terrorist groups all over the world. Even if you don't agree with me, it is still my opinion and i am entitled to it just as you are entitled to support or no-support of my point here.
![]() |
Donald Trump, Republican Candidate |
There
is no time to comment on the many
political crises in Nigeria right now but i want to advise Nigeria politicians
to stop decamping to APC, APC is the ruling political party in Nigeria now but
most politicians in Nigeria have fail to understand that there is still power
in opposition! If
there is no opposition then there is no politics and essentially no democracy.
So Ayiri and co that are decamping to APC in Warri, Delta State, Nigeria should
retrace their political adultery steps abeg
![]() |
President Buhari |
And for the record, i think APC is the worse political party ever in Nigeria. They are just accepting the decampees (if there is any word like that) from PDP without second thought. But i am not even surprised or bothered because APC is full of recycled old political thieves who left PDP to form APC. Finally, Buhari should stop the song about fighting corruption and jailing corrupt politicians from the previous administration. Why is Amechi, Tinubu, Atiku etc not in prison if Buhari is serious about fighting corruption?
Uviowho Daniel, a blogger writes from Yanegoa
Blogger Powered By Google.
Wednesday, 26 August 2015
The New Google chrome Mobile Browser
Google just updated the mobile version of its chrome browser, I am not a fan of the Google chrome but I think the new features are really cool for people who do most of their reading and research online.Google still gives you the regular drop-down list-like page when you make a query but this time, there is the option to check the meaning of any word or grammar that is generated from your query.
Google automatically redirect you to the meaning of the word you click on the result page of the query with a small letter of 'g' in a blue circle.
Google has been updating its mobile version of chrome browser to meet the continues challenge of its rival like Opera mobile, uc browser etc. However, I think Google also need to review the desktop version of the chrome browser and disable some of the funny default options that the desktop version of chrome come with. It should be more flexible like the new Microsoft Edge, Internet Explorer 11 and Opera desktop version.
So go get your chrome browser updated if you have not already done that. And here is a link to guide you on the different browsers for mobile phones. CLICK ME.
Thursday, 20 August 2015
If you have an opportunity to have a glance
Tuesday, 11 August 2015
Nothing thrilled me more the bizarre nature of subatomic
particles in my college school days. Everything about Quantum Mechanics or
Physics was and is still very interesting to me especially the laws and
principles such as the THE DOUBLE SPLIT EXPERIMENT, EINSTEIN’S TIME DILATION,
UNCERTAINTITY PRINCIPLE, SPACE-TIME, ETHER, to mention a few.
I was so in love with these theories, ideas and principles
that I spent 40% of my school time in our school library buried in the many and
sometimes scary nature of our subatomic particles far above the world of ‘Gross
Matter’. To be honest, I missed so much missing classes and I also gained a lot.
When I successfully and single-handedly build the first and the only Periscope
in my school, I was given scholarship and made the Vice president of my school
science club: JUNIOR ENGINEERS AND SCIENTIST CLUB (JETs club) and also doubled
as the physics and chemistry laboratory prefect.
Here I am going to be talking about the UNCERTAINTITY
PRINCIPLE.
Faced with the many and bizarre problems and behavior of the
moving electron in the nucleus of the atom, scientist and physicists in the 19th
century made so many predictions to determine where the electron could be at a
particular time. But all theories, laws and ideas to pin the electron to a fix
position proved futile until Heisenberg
came with his Uncertainty
Principle which for the sake of simplicity states that: the more precisely the position of some particle
is determined, the less precisely its momentum can be known, and vice versa. With
this understanding, scientists’ and engineers were able to develop the first
Nuclear weapon and other breakthroughs in the field of
nuclear physics.
I am still
interested in Quantum physics and who knows I might just be the first African
to develop a Nuclear Weapon since president Buhari recently signed a document
that will see Nigeria and Nigerians going into arms production .LOL
Thursday, 5 March 2015
Here Are 5 Common Network Security Mistakes You Might Be Making:
Have you ever been scammed or had a computer virus take over your system. You're left wondering: “how the heck did this happen to me”? You thought you had followed all the standard advice on securing your network and computer, but you still ended up with a security breach or malware infestation.
Here Are 5 Common Network Security Mistakes You Might Be Making:
1. You're Not Using Strong Encryption On Your Wireless Network
Are you scratching your head because hackers broke into your network, even though you had wireless encryption enabled? You may have been using encryption, but you might have been using the outdated and highly vulnerable Wired Equivalent Privacy (WEP) encryption. WEP was cracked years ago and hacking a WEP-encrypted network is now trivial, due to a proliferation of easy to use WEP hacking tools. Even a novice hacker can break into a WEP-based network.
The Solution: replace your network's WEP encryption with Wi-Fi Protected Access 2 (WPA2). WPA2 is a much more robust wireless protection method and is the current standard for “secure” wireless networks. Some older routers may be too old to support an upgrade to WPA2 while others can be upgraded via a firmware update. Check your router manufacturer’s support page for your specific router to see if it supports WPA2.
2. Your Passwords Aren’t Strong Enough
A weak password can be a hackers gateway into your network, your system, and your online accounts. Increased computing power has decreased the amount of time it takes for password cracking tools to crack a password.
You need to make your passwords as long, complex, and random as possible. Avoid use of dictionary words in your password as cracking tools test for these. Having one embedded in your password will help the tool find your password much quicker than if it had random characters in it.
Check out our article on How to Create a Strong Password for tips on composition.
3. Your System Doesn’t Have The Latest Security Patches
Hackers love to find systems with unpatched vulnerabilities because they can be exploited with specially crafted attacks that take advantage of the unpatched weakness. OS vendors are constantly detecting new threats in the wild and developing security patches to close the holes.
Most OSes feature a set-and-forget “auto update” capability that will automatically download and apply the latest security patches on a regular basis.
The Solution: turn on auto update for your OS security patches as well as any apps that have auto update capability. You should also periodically run a manual patch check to ensure that the auto update process isn’t broken.
4. You Don’t Have a Backup Strategy
When things go bad, your first question might be “do I have a backup of those files”? You shouldn’t have to ask yourself this question, you should know the answer, and the answer should be "let me go pull up my backup of those files”.
Backups are critical resources. Some computer malware such as ransomware can encrypt your files and hold them hostage. If you have a backup of your files then you can laugh at the ransom demand and tell those hackers to go stick it in their ear or some other orifice.
Check out our article on Developing a Backup Strategy for some tips on how to go about backing up your stuff.
5. You’re Not Aware of The Latest Threats And Scams
Scammers and hackers are constantly evolving their tools and tactics. Educating yourself on the current threats is key to not falling victim to the newest and most dangerous scams and hacks happening in the world.
Emerging Graphics File Formats - New and Upcoming Graphics Formats
JPEG Format - About JPEG and JPEG 2000 File Formats
JPEG (or JPG) stands for Joint Photographic Experts Group, and was named for the organization that developed the format. Here you'll find information and specifications on the JPEG (jpg) and upcoming JPEG2000 (jp2) graphic file formats used on the Web and in digital photography. Includes software for working with JPEG images, technical specs, news, answers to frequently asked questions, and tips for working with JPEG graphicsTuesday, 3 March 2015
QHN, Our big story - Net Neutrality
Quantum Hack Networks-QHN, bring to you the new word in the tech industry and it means and stands for, Net Neutrality, enjoy.
Net neutrality (also network neutrality, Internet neutrality, or net equality) is the principle that Internet service providers and governments should treat all data on the Internet equally, not discriminating or charging differentially by user, content, site, platform, application, type of attached equipment, or mode of communication. The term was coined by Columbia University media law professor Tim Wu in 2003 as an extension of the longstanding concept of a common carrier.[1][2][3][4]
Examples of net neutrality violations include when the Internet service provider Comcast intentionally slowed peer-to-peercommunications.[5] In 2007, one other company was using deep packet inspection to discriminate against peer-to-peer, file transfer protocol, and online games, instituting a cell-phone style billing system of overages, free-to-telecom value-added services, and bundling
Net neutrality[edit]
Network neutrality is the principle that all Internet traffic should be treated equally.[7] According to Columbia Law School professor Tim Wu, the best way to explain network neutrality is as a principle to be used when designing a network: that a public information network will end up being most useful if all content, sites, and platforms are treated equally.[8] A more detailed proposed definition of technical and service network neutrality suggests that service network neutrality is the adherence to the paradigm that operation of a service at a certain layer is not influenced by any data other than the data interpreted at that layer, and in accordance with the protocol specification for that layer.[9]
Open Internet[edit]
The idea of an open Internet is the idea that the full resources of the Internet and means to operate on it are easily accessible to all individuals and companies. This often includes ideas such as net neutrality, open standards, transparency, lack of Internet censorship, and low barriers to entry. The concept of the open Internet is sometimes expressed as an expectation of decentralized technological power, and is seen by some as closely related to open-source software.[10]
Proponents often see net neutrality as an important component of an open Internet, where policies such as equal treatment of data and open web standards allow those on the Internet to easily communicate and conduct business without interference from a third party.[11] A closed Internet refers to the opposite situation, in which established corporations or governments favor certain uses. A closed Internet may have restricted access to necessary web standards, artificially degrade some services, or explicitly filter out content.
Dumb pipe[edit]
Main article: Dumb pipe
The concept of a dumb network made up of dumb pipes has been around since at least the early 1990s. The idea of a dumb network is that the endpoints of a network are generally where the intelligence lies, and that the network itself generally leaves the management and operation of communication to the end users. In 2013 the software company MetroTech Net, Inc. (MTN) coined the term Dumb Wave which is the modern application of the Dumb Pipe concept to the ubiquitous wireless network. If wireless carriers do not provide unique and value added services, they will be relegated to the dumb pipe category where they can't charge a premium or retain customers.
Source:Wikipidea
Subscribe to:
Posts (Atom)
-
IBM has teamed with Xamarin to make it easier for C# developers to integrate back-end systems like databases with mobile apps. Featured ...
-
Here are some things you need know about the new Blackberry Messenger BBM The New BBM Logo BBM users have started to receiv...