Posts

Showing posts from July, 2020

Why You Should Not Expose Your Identity Everywhere

Image
  Advisably, you’re not meant to expose your identity everywhere. Today, social media has become a great challenge to your identity. It is a public podium in which different kinds of people appear for many purposes. To even forget the egoism of being scammed, cheated, or deceived your identity and sensitive information should always remain private. Here are the five security challenges you might have faced on social media and advises to avoid them: 1. Do not share your whereabouts It is always one of the habits of social media users sharing their whereabouts at current places. Be careful and not to share your current location wherever you are. This, of course, gives adversaries an opportunity to easily find victims and trace them. The only thing you need to do is to allow the ‘location’ feature of your phone to be turned on whenever you’re traveling. This will enable authority trackers to trace your whereabouts for security purposes. 2. Do not upload pictures where travelling Your ...

5G Technology: History, Concept, Features and Constraints:

Image
Historical Background History of Wireless Cellular Technology Way back in the 1950s, the first commercial analog mobile communication system was launched in the US. It had very low market penetration for years after its launch. Formally speaking, the first generation (1G) mobile phone was launched three decades later and continued to use analog signals. With the advent of microprocessors and the dawn of the digital age, analog mobile communication was digitized and we had a second generation of mobile communication (2G) technology enter the picture. 2G was fully digital, i.e., dealing only with 1s and 0s. Besides improving the quality of voice transmission and reception, 2G also introduced SMS—a feature that millennials used with devotedly before instant messengers like WhatsApp arose and changed the social lives of “netizens”. A couple of years later, General Packet Radio Services (GPRS) was added to 2G, which allowed users to browse th...

How Does Spam Attack Destroy a System?

Image
  It has been a widespread problem over a network whether a personal peer-to-peer connection, wired connection, local area network, metropolitan area network or even wide area network connection; a problem of spamming as a means of attack. Thousands of computers are hacked through this method. This  research comes up with  a ray of light on what “spam attack” means, its processes of hacking, methods of tackling and how does it affects our computers. This research is done by Muhammad Auwal Ahmad as an academic work. Introduction Spamming  is the use of messaging systems to send an unsolicited message ( spam ), especially advertising, as well as sending messages repeatedly on the same website. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads s...