Posts

Why You Should Not Expose Your Identity Everywhere

Image
  Advisably, you’re not meant to expose your identity everywhere. Today, social media has become a great challenge to your identity. It is a public podium in which different kinds of people appear for many purposes. To even forget the egoism of being scammed, cheated, or deceived your identity and sensitive information should always remain private. Here are the five security challenges you might have faced on social media and advises to avoid them: 1. Do not share your whereabouts It is always one of the habits of social media users sharing their whereabouts at current places. Be careful and not to share your current location wherever you are. This, of course, gives adversaries an opportunity to easily find victims and trace them. The only thing you need to do is to allow the ‘location’ feature of your phone to be turned on whenever you’re traveling. This will enable authority trackers to trace your whereabouts for security purposes. 2. Do not upload pictures where travelling Your ...

5G Technology: History, Concept, Features and Constraints:

Image
Historical Background History of Wireless Cellular Technology Way back in the 1950s, the first commercial analog mobile communication system was launched in the US. It had very low market penetration for years after its launch. Formally speaking, the first generation (1G) mobile phone was launched three decades later and continued to use analog signals. With the advent of microprocessors and the dawn of the digital age, analog mobile communication was digitized and we had a second generation of mobile communication (2G) technology enter the picture. 2G was fully digital, i.e., dealing only with 1s and 0s. Besides improving the quality of voice transmission and reception, 2G also introduced SMS—a feature that millennials used with devotedly before instant messengers like WhatsApp arose and changed the social lives of “netizens”. A couple of years later, General Packet Radio Services (GPRS) was added to 2G, which allowed users to browse th...

How Does Spam Attack Destroy a System?

Image
  It has been a widespread problem over a network whether a personal peer-to-peer connection, wired connection, local area network, metropolitan area network or even wide area network connection; a problem of spamming as a means of attack. Thousands of computers are hacked through this method. This  research comes up with  a ray of light on what “spam attack” means, its processes of hacking, methods of tackling and how does it affects our computers. This research is done by Muhammad Auwal Ahmad as an academic work. Introduction Spamming  is the use of messaging systems to send an unsolicited message ( spam ), especially advertising, as well as sending messages repeatedly on the same website. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads s...

New Year 2020: A Piece of Advice for My Fellow Youngsters

Image
Whether or not you’re celebrating the New Year, a piece of advice should be given to us for our bright future. A year is equivalent to 12 months/365 days or 52 weeks. There’s a lot you can do if you budget it out and plan what you want to achieve in these 12 months. So, what do you really want? Admission, money, job, skills, knowledge, business, marriage, or something else? It doesn’t matter whatever you want to achieve as long as you can persist. As youngsters, we shall not be wasting our time and all the resources we have on nothing. We must find something that will benefit us whatever, or however, it is. Catherine Cook of MyYearBook said “To any entrepreneur: if you want to do it, do it now. If you don’t, you’re going to regret it.” Don't say next year, next month, or even tomorrow; start it now. So let’s see what to do: 1. Find a pen and a book and write all your plans down 2. Create a lucrative idea - imagine anything (thinking about solving peoples' problems) 3. Make a ...

Deep thoughts of the mind

Image
I can't repudiate the existence of something just because I fail to experience it emotionally, psychologically or physically. Critical thinking and imagination play a very important role in our sciences and philosophy, just like imagining the existence of the cosmos in general, the quantum like dark matter, and a very typical example is the black hole or singularity. The matter and energy in this gigantic universe could be proved after wide scientific research which sometimes takes scientists for decades, and could happen to exist physically to us humans. But imagining the mysterious hereafter, phantoms or superhuman activities could also be experienced psychologically because they seem to be esoteric or obscured supersensory. In this case, repudiation of such subtle imagination would always results an unintelligible or irrational decision, not only because they transcend the human power of intelligence or intellect to prove or disprove the reality of their existence. The most i...