Tuesday, June 26, 2018

how to know the original memory cards

in the nowadays most smartphones come with the adequate internal storage.
But most of the low budget may need an external storage for proper functioning.

Monday, June 25, 2018

what is Ransomware attacks

Ransomware

What it is:

 Ransomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment in order for the restriction to be removed. The two most common means of


what is online Pharming?

Pharming is a common type of online fraud.










what is Hacking?

Hacking is a term used to describe actions taken by someone to gain unauthorized access to a computer. The availability of information online on the tools, techniques, and malware makes it easier for even non-technical people to undertake malicious activities.



 

how Distributed denial-of-service (DDoS) attack

 

What it is:

online Scams and Fraud

It's not always easy to determine whether an email, contest or promotion is real or an Internet scam or fraud. The offers might seem too good to be true – and they may be. The key to being safe is recognizing the telltale signs of scam artists and fraudsters.




how to Protecting your home computer network

Scott Jones is the Director General of Cyber Defence at the Communications Security Establishment (CSE). CSE provides advice, guidance and services to help protect government networks and electronic information. The Cyber Defence branch at CSE works to stop malicious cyber threats on government systems and helps departments understand the cyber threat environment. 


what is DDoS attack???


DDoS is short for Distributed Denial of Service. DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
 

GLO Gives up to 6GB Free Data on Recharge

Globacom is here with an amazing offer! Nigeria's first indigenous telecom operator, Globacom has launched the Glo Yakata tariff plan in Nigeria that gives both new and existing Glo customers up to 22 times values on all their recharges. These benefits include free data, unlimited Glo to Glo calls and free minutes to call other networks.

Tuesday, June 19, 2018

how to earn airtime for any network with opera news

how to get free airtime for all network

to start earning free airtime simply download
and install the opera news app by the following
link here

after installation then launch it and claim you airtime

then start referring people to get more money
but you have use the referalls code that giving to you
on the application to get more friend and more money

the more you referring the more you earn

Monday, June 18, 2018

how to get free data for all network using dent android app

first of all what is dent?

 dent is an android app that help you to topup you internet mobile data for your friend or family and it can also help you to earn airtime for free

Saturday, June 9, 2018

latest vivo-y65-launched-featuring-eye

Vivo Y65 sports 5.5 inches TFT LCD display at 1280 x 720 pixels resolution. The screen has a measurement of 153.56 x 75.79 x 7.49 mm, and weighs at 157g on a plastic build. The phone which is tagged your life, your shots" features 13 megapixels rear camera with LED flash, and 5MP front-facing sensor for selfies.



Thursday, June 7, 2018

What is Bitcoin mining?

As mentioned in an earlier section, one can think of Bitcoin as one big global ledger system that records transactions (or ‘moving money’) between one person to another. Whenever Bitcoin transactions are processed on the Bitcoin network – that means Bitcoin is moved from one person to another – someone has to make sure all the transactions are recorded properly and that the ledgers on all the systems are synchronized all over the world.

Wednesday, June 6, 2018

How Bitcoin Mining Works

When you hear about bitcoin "mining," you envisage coins being dug out of the ground.  

But bitcoin isn't physical, so why do we call it mining?
Because it's similar to gold mining in that the bitcoins exist in the protocol's design (just as the gold exists underground), but they haven't been brought out into the light yet (just as the gold hasn't yet been dug up). The bitcoin protocol stipulates that 21 million bitcoins will exist at some point. What "miners" do is bring them out into the light, a few at a time.
They get to do this as a reward for creating blocks of validated transactions and including them in the blockchain.

Is Bitcoin used by criminals?

There is often public misconception that Bitcoin is mostly used by criminals, but nothing could be further from the truth. This is mainly because many people think Bitcoin is anonymous, when in fact it’s the opposite - all Bitcoin transactions are transparent for the whole world to see. People might not be able to link the identity to Bitcoin right away (that is also why it is sometimes called ‘pseudo anonymous’), but once they do, they can track everything you’ve ever done on the Bitcoin network. This makes it a particularly bad tool for illicit use.

 While Bitcoin might actually turn out to be one of the safest and least ‘bad’ ways to use money, it doesn’t mean that criminals don’t use it. Just like normal money, they do. But there are two important things to note - firstly, that as more data becomes available in the industry, the more it is becoming clear the number of bad uses is very, very minute - if the entire Bitcoin ecosystem is represented by a big mountain, the size of the bad parts is a couple of rocks. Second, that in any financial system, this is a risk that can never be eliminated, merely mitigated, and Bitcoin has some of the best tools in the world for that.

How do I get Bitcoin?

There are a number of ways you can get Bitcoin:


What is Bitcoin?

Many people believe Bitcoin to be very complicated, when in fact it’s a lot more simple and intuitive than what most people think. This series aims to help everyone get a grasp of the basics, and over time also present further learning opportunities for those that want to know more.


best ways to make money while you sleep

You snooze, you lose, right? Well, not necessarily. Making money wile you sleep is possible with these smart ways listed below.


5-ways-to-make-money

Tuesday, June 5, 2018

Unlimited MTN Free Browsing Cheat for June 2018 with Psiphon

hmm may be some of you guys think that 
free browsing in not longer working again.

am happy to tell your that it come back again ohh!!


Monday, June 4, 2018

how to Protect yourself from Android malware?

As we say each time, to protect yourself against Android malware, the best practice is to avoid downloading and installing apps from "Unknown Sources." Only download apps from the official Google Play app store and make sure you check user reviews, too, before installing.


how to remove an Android virusess?

If you feel that your Android phone is not operating as it should and you suspect that a virus may have infected it, here are tips that can help you clean up its act.

How to detect malware on your android phone?

Android is the most widely used mobile operating system in the world. It currently holds more than 65 percent of market shares globally with over a billion users. As evidenced by the recent spate of trojan viruses hackers are constantly changing their tactics to trick Android users into installing malware. In this world of mobile attacks, the security of your device is as critical as ever.


Sunday, June 3, 2018

How to Hide Your Online Status in WhatsApp

By default, WhatsApp shows your friends whether you’re online now or when you were last online. If you prefer, you can hide your status..

What Is A SIM Card (And What Comes Next)?

A Subscriber Identity Module (SIM) card is a chip inside most modern cellular phones that stores information your phone needs to communicate with your carrier’s cell towers. SIM cards come in different sizes and if you were to remove the SIM card from your phone you wouldn’t be able to text, call, or access anything on the internet.


Has ESET discovered anything big in botnets this year?

Yes, our investigation into Operation Windigo resulted in one of ESET’s biggest botnet research projects ever. Our research team uncovered a network of infected servers employed to redirect users to malicious web content, steal credentials, and send spam. We discovered that over the last few years more than 25,000 servers had been infected. At the time of writing our report, more than 10,000 servers were still infected. (Editor: You can download the award winning research paper on Windigo here.)


What are the biggest risks for home users and businesses with regards to botnets?

The risks associated with botnets are exactly the same as the risks associated with malicious software in general. The risks are varied; one can have sensitive information stolen from the electronic device, such as intellectual property, blueprints, or passwords giving access to sensitive resources (for example online games). Infected computers can also be used to overload servers or send spam.


What is a botnet, how does it work and how does it spread?

The word botnet is made up of two words: bot and net. Bot is short for robot, a name we sometimes give to a computer that is infected by malicious software. Net comes from network, a group of systems that are linked together. People who write and operate malware cannot manually log onto every computer they have infected, instead they use botnets to manage a large number of infected systems, and do it automatically. A botnet is a network of infected computers, where the network is used by the malware to spread.