|Join Nairaland / Login / Trending / Recent / New|
Stats: 1238308 members, 1650537 topics. Date: Wednesday, 23 April 2014 at 09:56 PM
|Politics / Re: Nigerian Muslim Clerics Recruiting Boko Haram Members – Cameroon Govt - by The Arbiter: 11:17am|
The Vanguard report was interpreted by the newspaper for their own purposes. All the bold sentences in the OP text are not in the original content or were presented out of context. Read the original content below and compare with OP text
April 22, 2014: The army is asking that the federal government suspend the governors of the three northeastern states (Adamawa, Borno and Yobe ) under emergency rule. The army holds the governors responsible for the many officials in those states who are cooperating with Boko Haram (to avoid attack) or taking bribes from the Islamic terrorists. Some of these officials are covering themselves in case Boko Haram should gain power and the governors are often just responding to civilian fears of army misconduct. Those three states are where most of the Boko Haram violence is and have been under emergency rule since May 2013. Residents of those three states have justifiable complaints about the army, in particular the casual attitude of the military towards the safety of civilians and their property. The army is also unreliable when it comes to sharing information on casualties. Thus Boko Haram related deaths so far this year are believed to be (based on local reports) at least 1,500, which is 50 percent more than what the army reports. Boko Haram related deaths from 2010 to 2013 were about 3,600, so the violence is not declining. The government has been saying, for several years, that Boko Haram would be crushed within a year and never happens. More insightful observers point out that the problem is mainly one of corruption and poverty, as well as the appeal of Islamic radicalism as a magical cure. All of Nigeria suffers from corruption. Poverty is more prevalent in the Moslem north, in part because of climate. That’s because the semi-desert Sahel region south of the Sahara Desert is found in the north. Another problem is the more conservative nature of Islamic populations and the lower education levels. Many northerners understand that if the corruption and bad government went away things would automatically get better. So far few northern politicians have become enthusiastic about cracking down on corruption. That’s a common sentiment of politicians throughout Nigeria and the main reason Boko Haram is not going to be eliminated anytime soon.
In the last month security forces in the Niger River Delta have seized seven barges and ships carrying stolen oil to oil brokers in neighboring countries. Along the coast 85 refinery operations have been found and destroyed and 196 people arrested. Oil companies believe about 150,000 barrels of oil a day are being stolen by thieves who tap into oil pipelines. That’s over five billion dollars a year in lost oil revenue. Most of what the government receives from this is stolen by politicians and civil servants, so people living in the oil producing regions as an anti-corruption measure.
In Cameroon the government is being criticized because recent claims of large (over 5,000 weapons) arms seizures near the Nigerian border could not be verified by reporters. Civilians living in villages near where the government said the seizures took place said they saw nothing. The government responded that the smugglers operated in remote areas and avoided civilians as well as security forces. There are also concerns that even if weapons were seized they would, as often happens, be sold back to black market arms dealers so that government officials could keep the cash. Cameroon is also concerned about pro-Boko Haram clerics from Nigeria quietly preaching and recruiting for Boko Haram in Cameroon mosques. Islamic conservative clergy are not unusual on either side of the border, but those who do not denounce Boko Haram are suspected of quietly recruiting young men to join the “jihad” (struggle) and fight (and often die) in Nigeria. These preachers have to recruit quietly because otherwise police in Cameroon will arrest and deport them, sometimes after a vigorous interrogation. Evidence of this recruiting is showing up when some of the recruits return from Nigeria with tales of disillusionment and adversity while with Boko Haram.
April 20, 2014: In the north (Bauchi state) unidentified gunmen attacked a girl’s boarding school and burned down several buildings but left the female students alone and left without kidnapping anyone. While Boko Haram has made attacks in Bauchi state it’s unclear who was responsible for this one.
April 16, 2014: The army falsely reported that most of the girls kidnapped by Boko Haram on the 14th had been freed.
April 15, 2014: Canada has warned its citizens to avoid travelling to Nigeria. With the exception of a few cities, the entire country is considered quite dangerous because of high crime rates and Islamic terrorists (Boko Haram).
April 14, 2014: In the capital a large car bomb explosion at a bus depot killed 75 people. Boko Haram later took credit for their first attack in the capital in two years. In the northeast (the Sambisa forest where the borders of Borno, Yobe and Adamwa states meet) Boko Haram raided a boarding school for teenage girls and kidnapped over a hundred students and some of the young women on the faculty. The captives, aged 16-18, would be used for sex and slave labor (around the camps). This is a common practice in Africa. Over the next few days several dozen of the girls escaped but 85 remain missing and the army is being criticized for the inept way they are handing the search (not interviewing all the escaped girls and not sending troops to guard the school).
April 10, 2014: In the northeast Boko Haram made three attacks. Two were on villages near the Cameroon border, in which 130 people were killed while the other was at a teachers college, where eight died and several women were kidnapped.
|Politics / Re: 190 Schoolgirls Remain Missing, Not 77 – Principal by The Arbiter: 10:48am On Apr 22|
One week after scores of female students of a Borno school were kidnapped, parents of some of the students lamented the situation and begged the government to ensure the release of their wards.
The parents wailed and cried as they told the state governor, Kashim Shettima, of their predicament. Mr. Shettima visited Chibok for the first time since the kidnap of the students. The governor went to Chibok with some other Borno officials, a serving senator representing the area, Ali Ndume, and a large retinue of security officials including soldiers.
“I have not seen my dear daughter, she is a good girl, we plead with government to help rescue her and her friends; we pray nothing happens to her,” said Musa Muka, whose 17-year-old daughter, Martha Musa, is among the kidnapped students.
Mr. Shettima’s visit also enabled journalists, who travelled with the governor to Chibok, hear first hand reports from parents and understand the true situation about the kidnap.
One of the obvious observations was the poor record keeping and management of information and students data by the school; which has led to conflicting information emanating from the principal, the Borno government, and the Nigerian military.
Mr. Shettima was told by anguished parents that 230 students were still missing and could be with the captors, contrary to the 85 students the Borno Education Commissioner, Musa Kubo, had said on Friday were unaccounted for.
“When we heard that they have attacked the school, we rushed down here but found our daughters missing”, said Shettima Hamma, a parent of one of the abducted students. “We were asked to register the names of our daughters, which we all did, but up to this moment we have not seen 234 of our daughters; we have only seen 39 of our daughters that were able to escape on their own”.
The female students were kidnapped from the Government Secondary School Chibok, in Chibok Local Government Area of Borno on the night of April 14. They are believed to have been kidnapped by the Boko Haram, the terrorist group responsible for the death of thousands of people since it began its insurgency in 2009.
When the news of the kidnap was first reported on Tuesday morning, the BBC Hausa Service said over 200 students were kidnapped.
However, the Nigerian military and the Borno State government later said 129 students of the school were missing, majority of them kidnapped. Both institutions relied on information from the principal of the school, Asabe Kwambura.
The military had on April 16 said it freed all but eight of the students, but withdrew the claim a day later after it turned out the claim was false.
Following the kidnap and the need to get the accurate report, Mr. Kubo, the Education Commissioner, had relocated to Chibok and through telephone calls called journalists in Maiduguri to provide regular situation report.
On Friday, Mr. Kubo told journalists that of the 129 missing students, 44 had been accounted for, while 85 were yet to be found.
Out of the 44 accounted for, he said, 16 had ran to their parents during the last week Monday night incident and were not kidnapped; while 28 others escaped from their abductors.
“Meanwhile, with this development, we have 44 out of our 129 students at the hostel on the day of attack on the school. This means that we have 85 students yet to join us,” the commissioner had said.
However, from the statements of the parents on Monday, and as later confirmed by the principal, the true figure of the victims was understated.
The ‘actual figure’
Although Ms. Kwambura was present when the parents gave the number of their wards still missing, she did not contradict the figure.
PREMIUM TIMES and other journalists later accosted the principal to get the actual situation of the number of girls missing.
“The total number of missing female students now stands at 230,” Ms. Kwambura said “Initially before the arrival of the governor, 234 were missing (the figure mentioned by Mr. Hamma). But we just recovered additional 4 female students. The number of girls recovered so far is 43. It is only 43 girls I have recovered and handed over to their parents.”
The apparently distraught principal, who appears to still be recovering from the shock of the incident, tried to justify the initial false figure of 129 missing students.
“The 129 I gave were those that sat for Physics exams on the day they were abducted,” she said.
She explained that “the total number of boarding female students is 405; this means that out 405, 230 are still missing.
“But the other issue is that out the 230 missing girls some of them had ran home to meet their parents and we have not receive any information on them.”
Ms. Kwambura also explained that “the School was initially Government Girls Secondary School (GGSS) Chibok, but in 2011 it became Government Secondary School Chibok which now allow for combined male students. So the entire students’ population, including the Day students which are boys, is 530.”
The principal explained that of the 530 final year students in the school, 125 are boys, while 405 are girls. The school, however, only has boarding facilities for girls. Also, not all the female boarding students were in the hostel on the night of the kidnap.
Following the kidnap, the school authorities were said to have gone round Chibok town and other villages and hamlets nearby to announce to parents who had wards in the school, to come state whether their wards were missing or were at home with their family.
It was from these reports from parents that Ms. Kwambura arrived at her new figure of 230 still missing and 43 accounted for.
A frustrated search
While narrating their pains to Governor Shettima, some of the parents also spoke about their personal efforts to free their wards.
“We have trailed the abductors of our daughters far into very dangerous places inside the forest, but we couldn’t go far because we were warned against going further since we have no sophisticated weapons that could match that of those holding our daughters,” Mr. Hamma said.
“When the news about the attack on the school got to us, we all ran down here to see if our daughters were okay, and unfortunately, we found that they were gone with the Boko Haram people.
Another parent of a kidnapped girl, who did not disclose his name, also briefed the governor on the efforts of the search party. He said they had travelled a distance of over 50km from Chibok to Sambisa, but had to return as they were warned of fatal danger should they proceed into the thick forest.
“We had walked into the forest for over 50km until we got to a place where we saw two houses and plenty women, about a dozen of them; they could not help us. So we continued until we came to another hamlet where we were told that if we follow a tiny foot path ahead, it would lead us to where the abductors took our daughters. We thanked them and proceeded through the path and continued to walk under low but thick threes. We walked for about 25km without seeing the sky or the sun; the whole place was dark because the low and thick branches of trees shielded the sunlight.
“After some hours of walk, we came to a stream with a locally made bridge, we walked over the bridge, everywhere was quiet, but we continued moving and searching until we met a Fulani herdsman, who urged us to move ahead of the route we were following, that surely we would see where our daughters there, because he too saw them being taken away by the Boko Haram gunmen. Many of our young men got lost in the forest, because it was too thick and very large.
“We continued to move on until we arrived at a junction of the foot path that leads to Konduga and the other to Damboa town.
There, we asked an old man who was surprised seeing us riding on motorcycles. We told him our mission and he confirmed to us that of course he saw our daughters with the abductors. He said the girls were brought down from the truck and made to trek into the forest ahead; he pointed to us the direction they took them, but warned us that if we venture to proceed into that part of the forest without any security personnel following us, we us and our daughters will be killed. He advised us to go back to Damboa and get more security agents to help, lest we would be embarking on the most dangerous mission. We took his advice and began to return home, while few of our group went back to Damboa. Many of our young men got lost on the way back, it took them more than three days to get back to Chibok,” he said in Hausa language.
The parent, an elderly man, said what the entourage saw when going into Sambisa “are not things we should say, because they were too gory to be mentioned or narrated again. We feared for everyone, it was a sordid experience.”
Governor Shettima was in Chibok on Monday, after days of being discouraged by security officials due to the dangers of going to the isolated town that shares proximity with the Sambisa Forest, a major base of the Boko Haram. He was accompanied by some few government officials and a large escort of armed soldiers and policemen.
Also in his entourage was a serving Senator, Ali Ndume, whose constituency also consists of Chibok Local Government Area. Mr. Ndume could not control his emotions as he addressed the parents. He described the abduction as the worst that could ever happen to any parent.
Emotions flowed freely as the government officials consoled the parents of the kidnapped girls.
“We are all touched by the incident concerning the abduction of our daughters,” said Mr. Ndume. “I am a father too, I have ten children, and every day I put my children in the position of these girls currently in captivity and I weep for them. I weep for the poor parents. My heart goes to you all, so is our governor here. But you should know our limitations here in the state concerning the security deployment; neither the governor nor I has control over our security. We can only plead with the federal government to assist us. But be assured that we are doing our best to see that these girls are freed in one piece.
Mr. Shettima also sympathised with the victims’ families.
“The worst of Boko Haram’s insurgency is taking these innocent daughters of ours; they could destroy homes, villages, churches mosques, but the worst is taking innocent girls into captivity in unknown places,” the governor said.
“Our hearts go to you all in all sincerity; we share your grief. I cannot say much than to assure you that all measures are being put in place to ensure that these girls return home safely; we are not giving up on them; we shall not.”
|Islam for Muslims / Re: Sheikh Ahmed Lemu's Son's Fine Speech at National Conference by The Arbiter: 8:45am On Apr 11|
A simple truth, well spoken and easily understood.
The problem is not the truth the Sheik spoke eloquently about but the actions of the corrupt and dammed who will ignore it, pollute it, twist its meaning and set their minions against this truth for their profit and the suffering of the rest.
|Science/Tech / World Deaths: A Statistical Look (infographic) by The Arbiter: 8:17am On Apr 11|
|Politics / Re: BREAKING: Heavy Gunfire Around Presidential Villa, SSS Headquarters!! by The Arbiter: 2:25pm On Mar 30|
When a leader or government actively uses religion, ethnic sentiments or any other means of coercion and deception to attain or remain in power rather than the consent of the people through the provision of sustainable security, peace and development of the nation and people, that leader or government commits high treason against the nation and its people.
|Science/Tech / Beware Of That Dangerous Thing Called Plastic. Its A Health Risk by The Arbiter: 2:46pm On Mar 11|
Since the 1990s, a vast body of research has linked BPA and other chemicals found in plastics to serious health problems, ranging from cancer to infertility. But the industry—often using tactics pioneered by Big Tobacco as it sought to bury evidence about the health risks of smoking—has managed to shield these substances from federal regulation. How did Big Plastic bring regulators to heel? Read on.
Plastic baby feeding bottles-a BPA risk
1937: Forty-six years after bisphenol A (BPA) is first synthesized, researchers discover that it acts like the hormone estrogen.
1976: Congress passes the Toxic Substances Control Act. BPA is presumed safe and grandfathered in.
1988: The EPA sets a safety threshold of 50 micrograms per kilogram of body weight per day, still its standard.
1996: Zoologist Theo Colborn finds that synthetic hormones in plastics, pesticides, and other products short-circuit endocrine systems, leading to disease and reproductive problems.
1996: Congress requires the EPA to screen 80,000-plus chemicals for endocrine-disrupting effects and report back by 2000. The EPA convenes an advisory panel that includes industry scientists, some with Big Tobacco ties.
1997-98: Researchers Frederick vom Saal and Wade Welshons find BPA causes enlarged prostates and lowered sperm counts in mice exposed in utero—at levels 25 times lower than the EPA'S safety threshold.
1998: Tobacco companies agree to curtail their deceptive marketing. Many tobacco scientists and consultants go to work for the plastics industry.
1998: The Consumer Product Safety Commission strikes a voluntary deal with manufacturers to remove some phthalates—endocrine-disrupting chemicals used to soften plastics—from pacifiers and teethers.
Baby with pacifier
1999: Consumer Reports finds BPA leaches from baby bottles when they're heated (PDF). Nevertheless, the FDA affirms BPA's safety, even for infants.
2003: The NIH's National Toxicology Program (NTP) hires Sciences International, a product defense firm with industry ties, to evaluate BPA.
2005: Vom Saal publishes a paper showing 90 percent of government-funded studies find very low doses of BPA are harmful, yet not a single industry-funded study does.
Nov. 2006: The NIH helps to convene 38 scientists to evaluate BPA. It concludes 95 percent of humans have BPA exposure "within the range" associated with disease in animals and find "great cause for concern." Nevertheless, the NTP publishes a draft assessment (PDF), written largely by Sciences International, that downplays the evidence.
Feb. 2007: The Environmental Working Group reveals that Sciences International's clients include BPA producers. Congress launches an investigation.
April 2007: The NTP fires Sciences International (PDF) but continues working with its flawed draft assessment of BPA.
May 2007: The Dallas Morning News reports that the EPA's Endocrine Disruptor Screening Program may be a "misleading $76 million waste."
Oct. 2007: Eastman Chemical introduces Tritan, a BPA-free plastic, and soon hires Sciences International to advise it on safety testing.
Nov. 2007: The NTP's final report expresses "some concern" about BPA's effect on the brain and behavior but overlooks links to other diseases.
Bottled drinks-BPA risks
Feb. 2008: The FDA admits to Congress that its assurances about BPA's safety were based mostly on two industry-funded studies.
April 2008: Canada decides to label BPA a "dangerous substance" and ban it from baby products. Major US retailers say they will stop selling bottles and sippy cups that contain it.
July 2008: Congress bans some phthalates from children's products.
Oct. 2008: As attorneys general in three states call on baby bottle and formula makers to quit using BPA, the Milwaukee Journal Sentinel reveals that a draft FDA assessment finding it safe was penned partly by industry lobbyists. Meanwhile, an Eastman study finds that one of Tritan's ingredients is likely more estrogenic than BPA.
2009: At least 20 states weigh BPA bans.
March 2009: Researchers find the BPA-free plastic PET also leaches synthetic estrogen.
June 2009: Reps. Bart Stupak (D-Mich.) and Henry Waxman (D-Calif.) ask the FDA to reconsider its ruling that BPA is safe.
2010: Eastman markets Tritan as estrogen-free.
Jan. 2010: The FDA reiterates that it considers the "current low levels of human exposure to BPA" safe.
March 2010: UC-Berkeley researchers find the estrogenic weed-killer atrazine can turn male frogs female.
Sept. 2010: A California bill banning BPA in baby products is defeated. According to its sponsor, "highly paid lobbyists" argued that "food production plants in their districts would close even though those plants do not produce any baby products."
Nov. 2010: The American Chemistry Council successfully lobbies the Senate to strike down a proposed ban on BPA in baby bottles.
Late 2010: Initial results in an Eastman-commissioned study appear positive for estrogenic activity. Eastman's senior toxicologist calls it an "oh poo moment."
March 2011: A CertiChem study published by an NIH journal finds "almost all" plastic products tested are estrogenic. Eastman claims, falsely, that the EPA has rejected CertiChem's testing method. The American Chemistry Council and Society of the Plastics Industry pay a former tobacco scientist $15,000 to write a letter to the journal's editor refuting CertiChem's findings.
May 2011: The EPA's inspector general reports that the agency's Endocrine Disruptor Screening Program, which was supposed to be implemented by 2000, has yet to develop "a management plan laying out the program's goals," let alone fully vet any chemicals.
June 2011: China and the European Union ban BPA in baby bottles.
Dec. 2011: Eastman launches a PR blitz to refute CertiChem's findings.
March 2012: A research review finds "substantial evidence" that low doses of endocrine disruptors "are associated with human diseases." It concludes that "fundamental changes" to the way we test and regulate chemicals are "needed to protect human health."
July 2012: At industry request, the FDA bans BPA in baby bottles, while maintaining the chemical is safe.
Aug. 2012: Eastman files a false-advertising lawsuit against CertiChem and asks the court to gag the lab.
July 2013: A federal jury rules against CertiChem, concluding the company falsely asserted that Tritan is estrogenic. The judge bars it from discussing its findings.
Sept. 2013: The EPA withdraws a three-year-old proposal to label BPA and other endocrine disruptors found in plastic as "chemicals of concern."
|Programming / 50 Facts About Bitcoin (infographic) by The Arbiter: 5:06am On Mar 03|
|Programming / Good And Bad Habits Of Smart People (infographic) by The Arbiter: 2:37pm On Mar 02|
Found it interesting.
|Programming / 5 Online Resources To Learn Coding - For Free by The Arbiter: 5:36pm On Feb 14|
By Simon Hettrick of http://www.software.ac.uk
There's been a recent drive to get people to learn code, which has led to a few notable victories like the inclusion of coding in the national curriculum, and initiatives like the Year of Code. A recent article in the Guardian listed ten places where anyone could learn to code, but they required quite a lot of time and money to be dedicated to the cause. What happens if you want to learn to code in your spare time and don't want to pay for it?
Being the Institute's resident non-coder, I was given the task of investigating some of the free resources available to help people learn to code. The following are some of my favourites.
1. Code Academy: best for time-pressed beginners
Like many of the online courses, Code Academy's lessons are embedded in a browser alongside a terminal window (lingo: the window into which you type your code) and an output window (to show what your code does). I'm a fan of learning in this way, because the lessons, the code and the output feel connected and you quickly see your results. It also means that it's easy to get hints when your code is not working correctly.
I was impressed with Code Academy. The lessons are targeted well and the difficulty ramps up at a rate that feels challenging without being overwhelming. I'm a good way into the Python lessons and I am yet to grip my monitor with both hands and yell threats into it - which is a good sign. The coding examples are meant to represent real life scenarios (e.g. calculating the cost of a holiday). These things always seem a little artificial to me but, as far as examples go, they help give sense to why it's useful to learn to code.
If you want an introduction to coding, you want to get started quickly and you want to pick up and drop your lessons when you have the free time, then Code Academy is the site for you.
2. Learn to Code the Hard Way: best for hardcore beginners
Learn to Code the Hard Way sounds pointlessly masochistic, but it in fact represents a departure from the use of browser-based terminals favoured by sites like Code Academy. Instead, it provides instructions on how to write code using a text editor (a different one for Mac, Windows and Linux) and tells you how to run the code using a terminal on your own machine. That's pretty easy on a Linux or Mac machine, and only slightly more difficult on a Windows one. The first thing that anyone will do when finishing a browser-based course is wonder how they code for real on their computer, and Learn to Code the Hard Way circumvents this problem by starting you off in the real world from the first lesson.
Learn to Code the Hard Way forbids you from copying and pasting from the lesson: every single character must be typed in by hand. I'm not a fan of the spare the rod approach to anything, but I have to admit that in this case it suits the discipline needed to learn to code. There are many times when I thought I'd understood something, only to find my comprehension completely lacking when it came to writing the code. The must type everything approach ensures that you concentrate on the code that you are writing and the weird and wonderful syntax that is necessary to keep your computer happy.
I focussed on the Python tutorials, and found them to cover a wide range of subjects at a level of detail that was understandable to a beginner. The rate at which the difficulty level increased was good too. In addition to the syntax, Learn to Code the Hard Way passes on a lot of tips about coding in general - and this is where it stands out from the other sites. I particularly liked the tip on reading your code back-to-front, which breaks familiarity and makes it easier to spot mistakes.
Learn to Code the Hard Way is not as easy to dip into as a browser-based system like Code Academy, but it compensates for this shortcoming by insisting on a stronger foundation for your coding, communicating some insider knowledge and providing an excellent and comprehensive series of tutorials.
3. Hour of code: best for absolute beginners (and kids)
If Learn to Code the Hard Way is at the spartan side of training, then the Hour of Code is at the end with the comfy chairs and cocoa.
The basics course starts at a much simpler point than any of the other courses described here. Rather than presenting the beginner with a terminal, the focus is on learning the conceptual side of coding using a graphical programming language known as Blockly. Rather than worrying about where to place a semi-colon, you get to concentrate on moving familiar characters from Angry Birds and Plants vs. Zombies using a series of simple instructions: forwards, turn right, etc. (highly nostalgic stuff for anyone from the Big Trak generation).
If it's a beginners course you want, the Hour of Code website delivers. The site's aimed at children, and I'm a little torn on whether it's useful to adults. If you've never studied any coding at all, then the basic introduction is a good place to get to grips with coding concepts - loops, for example, are explained very clearly. However, the early lessons may feel a little too frivolous to those with a bit of coding history. Saying that, if the basics course leaves you hungry for more, then there are links to courses where you can learn app development and languages like Python in detail.
If you have never coded before, or if you are looking for a site where your kids can learn, then Hour of Code is the place to start.
4. Code School: best for the unconventional
Code School has me conflicted. Code Academy and Learn to Code the Hard Way take the conventional approach to coding: start with "Hello World", move through the subjects of variables, arrays, conditionals and loops, then start on to the hard stuff. The introductory lesson from Code School takes a different approach, and I'm genuinely unsure whether it's a good one... but it certainly makes the course enticing. The aesthetic of the site is rather nice too.
Code School doesn't have a course on Python, so I was forced into the even more unfamiliar territory of Ruby. After entering a few commands for simple additions, the tutorial moved directly onto applying methods to strings. Now that's a bit of an entry at the deep end if you ask me (especially if you're trying not to get confused with your newly learned Python syntax), but it made a perverse kind of sense. Rather than getting hung up on printing and arithmetic, skip to the more difficult stuff that shows why it's useful to learn to code. It's the equivalent of learning "Je voudrais une bière s'il vous plaît" before "Le singe est sur la branche".
5. Bentobox: best for everything!
A bit of a cop out on this last item in my list, because it's not a course but a gateway to courses. Put together by Jon Chan, Bentobox lists a huge range of technologies - about 80 of them - and packages them together in an accessible way with links to courses where you can learn more.
If you want to learn a new technology, then Bentobox is the place to find a good course.
And there's more...
There's no shortage of resources that will help you learn to code. In fact, the proliferation of these sites is the reason that we decided to write this post. The above list is not meant to be comprehensive, it just covers a few of the sites that I feel give a good introduction to someone - like me - that is new to the field.
|Nairaland / General / Re: The Raided Home Of A Mexican Drug Lord by The Arbiter: 4:59pm On Feb 14|
This case is filled with 100 dollar Bills estimated to be 1/2 a million dollars and no doubt headed out to make another drug deal with perhaps the Columbia ns.
Another cabinet stack tight with cash - all 100's.
There were even stacks of Chinese Yuan found in one closet.
More Gold machine guns and pistols - most were never fired, just held for collection value.
More Gold machine guns and pistols - most were never fired, just held for collection value.
The money and valuables found in this one house alone, would be enough to pay for health insurance for every man woman and child in the USA for 12 years! In Nigeria it would be for 50 years - my humble estimate. It is estimated to be approximately 27 more of these houses in Mexico alone. Not to mention the ones in other countries who are enriching themselves in the drug trade. These people have so much money, they make the Arab oil sheiks look like welfare recipients. Their money can buy politicians, cops, judges, whatever they need they just throw down stacks of cash and it is theirs! This is why the drug problem is so difficult to fight.
|Nairaland / General / Re: The Raided Home Of A Mexican Drug Lord by The Arbiter: 4:59pm On Feb 14|
The back yard pool.
Exotic art collection - some of which was illegal to own - some stolen.
This pile of cash before it was counted was estimated to be approximately 18 Billion Dollars!
After it was counted it turned out to be a little more than 22 Billion Dollars!
Guns were hidden all over the house, along with ample ammo, just in case of trouble.
Stacks of cash were found in every nook and cranny...
|Nairaland / General / The Raided Home Of A Mexican Drug Lord by The Arbiter: 4:58pm On Feb 14|
Source album here.
This guy had a better gun collection that most legitimate museums do.
Just a quaint little villa in the hills - Drug money bought it all!
Man-made cave and hot tub inside the home.
A collection of exotic animals - which were cared for in the grandest fashion, by the way.
8 Lions were on the property.
A very rare Tiger.
|Computers / 'the Moon' Worm Infects Linksys Routers Via Authentication Bypass Vulnerability by The Arbiter: 4:42pm On Feb 14|
Source Lucian Constantin
A self-replicating program is infecting Linksys routers by exploiting an authentication bypass vulnerability in various models from the vendor's E-Series product line.
Researchers from SANS Institute's Internet Storm Center (ISC) issued an alert Wednesday about incidents where Linksys E1000 and E1200 routers had been compromised and were scanning other IP (Internet Protocol) address ranges on ports 80 and 8080. On Thursday the ISC researchers reported that they managed to capture the malware responsible for the scanning activity in one of their honeypots -- systems intentionally left exposed to be attacked.
The attacks seems to be the result of a worm -- a self-replicating program -- that compromises Linksys routers and then uses those routers to scan for other vulnerable devices.
"At this point, we are aware of a worm that is spreading among various models of Linksys routers," said Johannes Ullrich, the chief technology officer at SANS ISC, in a separate blog post. "We do not have a definite list of routers that are vulnerable, but the following routers may be vulnerable depending on firmware version: E4200, E3200, E3000, E2500, E2100L, E2000, E1550, E1500, E1200, E1000, E900."
The worm, which has been dubbed TheMoon because it contains the logo of Lunar Industries, a fictitious company from the 2009 movie "The Moon," begins by requesting a /HNAP1/ URL from devices behind the scanned IP addresses. HNAP -- the Home Network Administration Protocol -- was developed by Cisco and allows identification, configuration and management of networking devices.
The worm sends the HNAP request in order to identify the router's model and firmware version. If it determines that a device is vulnerable, it sends another request to a particular CGI script that allows the execution of local commands on the device.
SANS has not disclosed the name of the CGI script because it contains an authentication bypass vulnerability. "The request does not require authentication," Ullrich said. "The worm sends random 'admin' credentials but they are not checked by the script."
The worm exploits this vulnerability to download and execute a binary file in ELF (Executable and Linkable) format compiled for the MIPS platform. When executed on a new router, this binary begins scanning for new devices to infect. It also opens an HTTP server on a random low-numbered port and uses it to serve a copy of itself to the newly identified targets.
The binary contains a hardcoded list of over 670 IP address ranges that it scans, Ullrich said. "All appear to be linked to cable or DSL modem ISPs in various countries."
It's not clear what the purpose of the malware is other than spreading to additional devices. There are some strings in the binary that suggest the existence of a command-and-control server, which would make the threat a botnet that attackers could control remotely.
Linksys is aware of the vulnerability in some E-Series routers and is working on a fix, said Mike Duin, a spokesman for Linksys owner Belkin, in an email Friday.
Ullrich outlined several mitigation strategies in comments to his blog post. First of all, routers that are not configured for remote administration are not directly exposed to this attack. If a router needs to be administered remotely, restricting access to the administrative interface by IP address will help reduce the risk, Ullrich said. Changing the port of the interface to something other than 80 or 8080, will also prevent this particular attack, he said.
|Politics / Re: President Jonathan Ranked Among Sexiest World Leaders by The Arbiter: 2:41pm On Feb 13|
The ranking was done by this website http://hottestheadsofstate.wordpress.com/list/
Pres Jonathan is actually No 19. on the list after Obama and Laura Chinchilla.
|Politics / Re: Facts About The Nigerian Naval ship That Won Global Competition by The Arbiter: 2:38pm On Feb 13|
Extra Info. Source here.
Africa was represented at the International Fleet Review (IFR) by just one ship, but that ship has a history any navy crew could be proud of.
Nigerian Navy Ship (NNS) Thunder, a former Hamilton-class US Coast Guard cutter was gifted to the Nigerian Navy in 2011 - classified in Nigerian service as a frigate - after a comprehensive refit.
As USCGC Chase, NNS Thunder saw service on Operation MARKET TIME during the Vietnam War, participating in more than 12 gunfire support missions over 1969-70.
She later participated in Operation URGENT FURY, the US invasion of the Caribbean island of Grenada in 1983.
|Politics / Re: Nigeria Ship NNS Thunder Wins Global Tug-of-war Competition by The Arbiter: 5:17am On Feb 13|
I initially doubted the story because there was no mainstream news link but was able to get it on the Australian navy website at last.
The International Fleet Review Sports Carnival was contested on Thursday 10 October. 350 people turned up to Macquarie University sportsground to watch or participate in the coveted Mons Cup Rugby Union competition involving 10 Australian and international teams. In a well contested physical game HMAS Albatross won the Mons Cup against a combined HMAS Perth and HMAS Parramatta rugby team, 7-0.
Over at Randwick Barracks the IFR Tug of War and Soccer Competitions got underway with 21 teams from 12 nations, totalling 500 people. HMAS Kuttabul came out the victor of the Albatross/Nirimba cup, winning the soccer final against HMAS Huon, 2-0.
The crew of Nigerian warship NNS Thunder overpowered HMS Daring in the IFR Tug of War, accepting the Lockheed Martin sponsored trophy with a tribal war cry! The Royal Australian Navy (RAN) team also polished off HMS Daring’s team in the netball with 39-16 goals at the final whistle blow. And to cap it off, the IFR ‘Ashes’ 20/20 match between the RAN and Royal Navy was taken out by the home side with a resounding 140-48 run victory.
Not all sporting endeavours however were held on land, with the RAN Sailing Association (RANSA) hosting the IFR Sailing Regatta the previous day. Over 70 boats vied to win the Sydney Harbour yacht race with Incognito crossing the line first. The inaugural Rear Admiral Nigel Coates AM memorial trophy, which had been specially crafted from salvaged timber from HMAS Penguin’s wharf by sailors from the Navy Sailing Association, was presented to the skipper by Mrs Vickie Coates. Catering was provided for the Sailing Regatta, Mons Cup Rugby and Soccer Competitions by the Australian Defence Credit Union.
More imagery is available for download at: http://images.defence.gov.au/fotoweb/grid.fwx?ArchiveID=5003&Search=IFR13031
|Politics / Re: Scores Killed, Thousand Displaced As Boko Haram Invades Borno by The Arbiter: 1:28pm On Feb 12|
The story is half-true.
The real details are:
Airforce planes circle the area regularly and on the fateful day but missed the amassed BH infidels.
BH infidels invaded konduga around 5:30 pm on motorbikes chanting war cries. The konduga villagers, forewarned by various attacks in surroundings areas had taken ancient precautionary measures with the result that the bokoharam firearms were rendered useless.
The assailants resorted to machete attacks and house burnings using grenades and incendiaries while the villagers milled in confusion.
The villagers rallied, repelled and apprehended about 13 members of the BH.
True facts sourced an hour ago from a native who was in the area yesterday. Its a version which will not make the news.
|Programming / Re: Codes For V.Basic 10 User Interface That Will Be Linked To Access 2007 database by The Arbiter: 2:22pm On Feb 05|
Have my hands full at the moment so cant be of much help. But you can easily implement this on your own just dust your VB and Sql skills.
1. Create form with connectivity to your database.
2. Create text boxes for the data you want to update.
3. Code the database update Sql which would update database with textbox data.
4. Embed the Sql code in a button which will execute Sql code on click.
5. Add another button which calls the Arcgis program with the required parameters when it is clicked.
6. Dont forget to code in database connectivity checkers, data validation, update verification, database connection termination, etc
|Programming / Re: A Application Have Standalone And Web Client by The Arbiter: 2:13pm On Feb 05|
Or use Postgres database
javadoctor: Client side : jsf //--allows managed bean injection as an expression language.
|Science/Tech / Think You are Good At lying -Take The 5 Sec Test by The Arbiter: 6:09am On Feb 05|
Don't click play on the video yet or you'll ruin the surprise! First, try this quick test to find out if you're an expert at deception or not.
Quick, draw a capital Q on your forehead....Now you can read on or watch the video.
University of Hertfordshire psychology professor Richard Wiseman says in the video above that the direction you draw the Q can reveal if you're a good liar or not—and, interestingly enough, whether you're an extrovert or an introvert.
You can take the test with a big grain of salt, since undoubtedly many introverts are adept at lying. The way you chose to draw the Q, however, could say something about your perspective.
|Jobs/Vacancies / Re: Massive Sack In UBA Kano: Managers Are Mainly Affected. by The Arbiter: 5:05pm On Feb 04|
The story is authentic and factually correct. A regional branch head amongst those affected. Two of the affected managers are acquaintances. It even involved a manager who had served the bank for about 27 - 30 years.
A very sad development. Will post details if i get them.
Affected UBA branches
1. Kantin kori
2. Airport road
3. Post office road
|Programming / Re: Help With Darkcomet by The Arbiter: 5:34am On Feb 03|
Download the Teamviewer for Windows from here (Mac and Linux also available): http://www.teamviewer.com/en/download/windows.aspx
Download the all the documentation on this page: http://www.teamviewer.com/en/help/firststeps.aspx
Read them first before any installation. Follow the step-by-step installation procedures in the manual but make sure you choose the personal option. Teamviewer must be installed on both master and slave systems.
Follow configuration procedures given in the manuals and you are good to go.
|Programming / Re: Help With Darkcomet by The Arbiter: 6:25pm On Feb 02|
Legal RAT- Teamviewer. Go for the personal version its free. I use it regularly to access my office computer from home and do everything as if i was there. However, you need to disconnect the screen of the office computer or any1 there can see it operating itself.
|Programming / Re: Backtrack On Window 7 by The Arbiter: 6:00am On Feb 02|
@ peetayo - You may love Backtrack but have you really tried Kali. From my personal experience Kali is much better than Backtrack. Anyways here are excerpts from a review of Kali by a Backtrack user.
Read the full review here.
I have worked on Backtrack since Backtrack 3 was released. Then worked on Backtrack 4 and then 5. I was using Backtrack 5 R3 in last few months... until it finally happened. Kali linux was released.
Kali Linux is a penetration testing and security auditing Linux distribution. After its release in March 2013, Kali Linux has quickly become the new favorite among PenTesters worldwide as their choice for the PenTesting OS. Replacing its predecessor Backtrack, Kali incorporated several new features and looks quite promising. It is available for i386 and amd64 architectures and has the same Minimum Hardware Requirements as Backtrack:
1 GHz CPU, 8 GB of Hard Disk Space, 300 MB RAM, And DVD-writer/Ability to boot with a Pen drive.
To be very concise, Kali is an offshoot of Backtrack, which is an Offshoot of ‘Whax’, which is itself an Offshoot of ‘Whoppix’, which is derived from ‘Knoppix’. Something common among all of these distros is that they were focused on Digital Forensics and Intrusion Detection, with Backtrack and Kali adding a whole lot of Tools for PenTesting purposes. Backtrack has been “giving machine guns to monkeys since 2007”, so it has had a long reign as the favorite distro of PenTesters worldwide. ‘Offensive-Security’, the creators of Backtrack, decided to incorporate many changes in new Backtrack 6 (as it was called at that time). Since it was built from scratch, it was significantly different from the older versions of Backtrack and Offensive-Security decided to give a new name to the Distro – ‘Kali Linux’.
What was wrong with Backtrack and why it needed a change?
We all love Backtrack but bottom-line is that there are a lot of problems associated with this distro. The most annoying problem is ‘updating’. There was always a fear of ‘breaking’ something if you updated it. There were too many tools and some of them weren’t updated as frequently as the others. So updating the ‘dependencies’ of some would cause others to crash and we struggled to maintain a balance where all these tools and their dependencies would co-exist without getting in each other’s way.
Remembering the locations of the tools was a pain and it just made things complicated.
In addition, Backtrack had a lot of ‘puny’ errors which crept up here and there while we were working, small issues that we had to resolve on our own or run to Backtrack forums and get help from other Pentesters there.
For example, the ‘wicd d-bus error’ that was ready to greet us when we installed a fresh copy of BT5 and tried to connect to a network. Backtrack forums (and other websites) are filled with ‘how-to posts’ that attempt to provide solution to such problems. Eventually we learned to get around these issues but it did waste a lot of our time.
Continue reading the full review here.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 5:20am On Feb 02|
All requests above served. If i have missed any1 bring it to my attention.
I didnt expect this much interest. Like i had previously said, do take advantage of the brains in the Nairaland programming section to further develop yourself.
|Science/Tech / Re: Spot The International Space Station Over Lagos Skies On These Dates by The Arbiter: 5:31pm On Feb 01|
@OP Nice post. I had tot i was the only satellite gazer here.
Track satellites across the world with Orbitron on your desktop. Its free and available for download from http://www.stoff.pl/
Current version is 3.71. Works on Win 9x/Me/2k/XP/2k3/Vista and you can update satellite tracking data from the internet daily.
Nigeria's NIGCOMSATs can be tracked using the software.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 3:35pm On Feb 01|
Due to the growing number of requests its reasonable i provide a download link for fast download. I cant keep up with emailing every1. Shall email all subsequent requests a download link which will expire 5pm tomorrow.
The password to unzip is: c++programmer
Use 7zip to unzip file.
@viruzemmy2 - I have a big library so be specific and i may be able to help.
@xxolisexx and above check mails.
Full Title: Beginning_Programming_with_C++_for_dummies
Author: Stephen_R._Davis (same author of C++ for dummies)
Book contents cover what an algorithm is and is strictly for beginners. C++ for dummies is a step higher.
I cant post the link directly (for reasons ---> ).
If you can get it on the internet for download please help yourself. My offer still stands. Pm me a blank email or post your email for Dlink.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 3:06pm On Jan 31|
^ Better late than never. Check ur mail.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 11:01am On Jan 31|
Dont forget to drop your C++ codes and questions so you may get the added benefits of tips and experience from ace coders on Nairaland.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 8:19am On Jan 31|
Book sent to all the emails above ^
Wish you every luck in the exams.
|Programming / Re: Help Him To Understand The Algorithm Stage In Programming by The Arbiter: 5:43am On Jan 31|
You need C++ for Dummies. Just reading it for 6 hours (with absorption) will confidently prep you up for your exams.
Drop a mail and i may get you a copy.
|Programming / Re: Backtrack On Window 7 by The Arbiter: 5:34am On Jan 31|
It depends on your usage and preference. The backtrack user community grew very large and it was decided it be released as an operating system with the name Kali for pc and tablets. Kali is essentially an updated version of Backtrack.
My recommendation: Why use an old software when the new is freely available and operates in the same way as the old one. So go for the Kali release.
Tips for quick usage:
1. Choose any method i previously posted for using Kali. For a bootable USb use Linuxlive usb creator for Windows. Download it from here. If you're a nerd then use RMPrebUSB
2. Download Kali documentation and follow tutorials in it. The testing tools in Kali have dedicated websites and forums. Visit them to learn more.
3. Read up a good book on Linux - drop your mail and i may get you a copy.
|Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health |
religion celebs tv-movies music-radio literature webmasters programming techmarket
Nairaland - Copyright © 2005 - 2014 Oluwaseun Osewa. All rights reserved. See Nairalist and How To Advertise