Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,759 members, 7,817,099 topics. Date: Saturday, 04 May 2024 at 05:26 AM

Kellychild's Posts

Nairaland Forum / Kellychild's Profile / Kellychild's Posts

(1) (2) (of 2 pages)

Phones / Hands On Apple's Latest Release Iphone XS And Iphone XS Max by kellychild(m): 3:52pm On Sep 13, 2018
Nairaland / General / Nigerian Largest Telecommunication MTN Fall After Nigeria Orders Return Of $8.1 by kellychild(m): 9:46am On Aug 30, 2018
News has claimed that Nigerian Largest Telecommunication company MTN Group Ltd. dive to a nine-year low after Nigeria’s central bank ordered the return of $8.1 billion it claimed Africa’s largest mobile-phone company illegally moved out of the country. The wireless carrier “strongly deny” the claim.

The company was cleared in a report issued in November 2017 following a probe commissioned by Nigerian lawmakers. MTN said in 2016 that its bankers had obtained central bank approvals before any dividends were issued
The re-emergence of these issues is regrettable as it damages investor confidence and, by extension, inhibits the growth and development of the Nigerian economy,” MTN said in a statement. “We will engage with the relevant authorities to defend our position on this matter and provide further information when available.”



The shares slumped as much as 19 percent in early trade in Johannesburg to 86.99 rand, the lowest since March 2009.

The regulator fined Citigroup Inc., Standard Chartered Plc, Standard Bank Group Ltd.’s Stanbic IBTC and Diamond Bank Plc about 5.9 billion naira ($16 million) for helping to move the money, Nigeria’s central bank said in an emailed statement Wednesday. The banks and MTN were ordered to refund the cash.

The decision will come as a melt down to MTN, because the company has already settled a separate, $1 billion fine in Nigeria for missing a deadline to disconnect unregistered customers. Negotiations over that penalty went on for almost a year and weighed heavily on the share price, which has never recovered. As part of the settlement, MTN agreed to list its local unit in Lagos and is planning to do so this year.
source: https://www.techsfair.com/2018/08/nigerian-largest-telecommunication-mtn.html

Phones / Annual Iphone Launch Event Is On The Rise. by kellychild(m): 1:16pm On Aug 23, 2018
September is by the corner and we all look forward to what Apple have to unveil during this year’ s annual iPhone launch event .

hopefully Apple will be launching three devices this year as well, but unlike last year where the odd-one-out, the iPhone X, was the most premium variant, this year the third variant is anticipated to be the cheapest.
The third iPhone 2018 model is expected to sport an LCD display, a single camera setup at the front and back, and no 3D Touch. iPhone SE, given that it will be priced rather reasonably.
New leaks now confirm more details on this variant, and also confirm that the most-awaited Apple launch event may happen on September 12.

Report by German publication Macerkopf suggests that the Apple launch event is set for September 12 and pre-orders will begin from September 14.

It claims to have sourced this information from German carriers, and the report states that the event will be held at the Steve Jobs Theatre. Finally, it claims that the actual sales could begin from September 21.

https:///zbBHVU
https:///giBvk9

Science/Technology / Learn Networking In A Second by kellychild(m): 4:14pm On Aug 06, 2018
The flexibility of networking with Mikrotik software allows you to remotely to do some Settings and configurations on Mikrotik routers and switches in various platforms and ways such as Android, windows etc.

My previous article showcase cearly four ways to access your MikroTik router configurations and settings, The same configuration can be perform using a Smartphone devices. This means that you and I can remotely Mikrotik Using Android Smartphone and devices, either use the app as Winbox, via a web browser (webfig), or via SSH read more here https:///b2zbtL


What is Winbox? What role does it really play when it comes to mikrotik networking, any way here, is the notion winbox. A Winbox application is a small utility that allows administration of Mikrotik RouterOS using a fast and simple GUI.
It is a native Win32 binary which has the ability to run on Linux, windows and MacOS (OSX) using Wine or we can simply say that a Winbox is a utility that is used to perform remote server to proxy mode GUI (Graphical User Interface). read more here https:///tsMz2r



Usually Mikrotik packages are installed on the PC using the media CD / DVD or DOM installer.
Maybe there is also a thought that the title above means install Mikrotik packages from USB Stick as installation media. https:///8HcJZK

Wireless Point-to-Point is a wireless communication connection between two points, where one host or a mikrotik device is dedicated and connected to only one client. https:///2MAUoA
In Mikrotik Wireless Point-to-Point known (P2P) in short forms we make use two Mikrotik routers.( one at the base box another at the client end). see more https:///fzoC5G


With your Mikrotik Device, you can do variety of things as long as networking and technology exist, this is because mikrotik has a variety of additional features that most of us do not know and rarely used to. In this tutorial, am going to show us how to Set Email and Send Email using your Mikrotik RouterOS
Read more » https:///mp6APY


Facebook lets you connect with your friends and family via both public comments and private messaging.
But to some extent these messages can be either unwanted, or disturbing, maybe your on vacation, trip or just doing something little, that requires privacy, on this you might not need to turn your phone off, hence you need to communicate to the outside world. Read more » https:///VefzRU
Computers / Simple Approach To Red Hat Linux Commands by kellychild(m): 10:57am On Jul 06, 2018
https://www.techsfair.com/2018/07/simple-approach-to-red-hat-linux.html



On my previous article we discussed in detail on how to configure and Install RedHat/CentOS 7 Linux. I always suggest you try to install CentOS core because Red Hat Linux is mainly used for server platform.

So, if you use CentOS Desktop, your server will be bulky as well as server overhead will increase. It may in most cases slow down your server performance. On the other hand, Linux always like to play with command rather than Graphical User Interface (GUI).



If you boot your CentOS 7 core system, you will find a command prompt which will ask you to login to your Linux system. In this command prompt, you can write any command to operate your Linux system. The last line of this command prompt contains four messages.

[root@localhost ~] # root:



Here root is the user who have logged in to the system. If you login with another username, it will change according to your user name.



localhost: Hostname of your system.

If you have not changed while installing operating system, it will be localhost by default. It can be changed later by using command.





Location (~): User’s current location will be shown here. As I have logged in as a root user, it is showing (~) means /root cd command is mainly used to change the current location.

User type (# or $):

For normal user it will be ($) and for the root user it will be (#). User Type in Red Hat Linux There are three types of user in Red Hat Linux system.

System user:

System users are those users who cannot login the system but necessary for running various service such mail, ftp, apache etc


Root user: root user is the administrator or super user of Red Hat Linux system. Root user can do any task in Red Hat Linux.

Regular user:



Regular user can login to the system and can do some tasks with limitation but cannot do administrative task. Root user can assign administrative task to any regular user if he wants.

A command run from the command prompt will generally have below structure.



Command -option or argument In Red Hat Linux system, both –option and are optional. A command can perform its task without option and filename or it can take either -option or filename to perform its task.

For example, if you want to show available directories and files in your current location, you can type ls command which will show files and directories in short format.

But if you want to show in long format, you can type ls -l which will show files and directories in long format.

Again if wish to show files and directories in long format within a specific directory, you can type ls –l such as /var/log which will show all the files and directories within the specific directory with long format.



Here are the most Essential and Frequently Used Commands in Red Hat Linux.



CMD 1: man:



The man command is used to show the manual page of any Red Hat Linux built-in command. It is one of the most useful commands to any Linux system administrator because it helps to find available options and usage of any command with example so easily.





For example, if you want to know details about cd command, just use man command like below. [root@localhost ~] # man cd You will find detail manual page of cd command now. Press UP and Down arrow key to scroll this manual page or type ’q’ to quit this manual page.



CMD 2: help The help command is another useful command which returns quick summery of any built-in command. For example, if you want to know usage of cd command quickly, use this help command like below. [root@localhost ~] # help cd The help command will now show you a quick summary of cd command.



CMD 3: pwd The pwd command prints the full file name of the current working directory. If you need to know your present working directory, just use pwd command like below. [root@localhost ~] # pwd Now you will be able to show your current working directory as output. For more details about this command, please use man pwd command.



CMD 4: cd The cd command is used to switch directory path. It takes directory path as its argument. For example, if you want to go /var/log directory, just use cd command like below. [root@localhost ~] # cd /var/log Now your current directory or working directory will be log directory. To know more about cd command, please use man cd command in your shell prompt. In Red Hat Linux system, there are two ways to define directory path. Absolute path: If directory path starts with root directory (/), it is called absolute path. For example, /var/log/maillog this directory path starts with root directory, so this path notation will be called absolute path. Relative path: If path notation does not start with root directory, it is defined as relative path. Say your current directory is root directory and you want to go log directory. In this case, you can use cd command like below. [root@localhost /] # cd var/log Here relative path notation is used because directory path does not start with root directory.



CMD 5:



ls The ls command shows all the contents in a directory. According to the content color, you can identify the type of any content.











A list of content color is given below. Content Type Color Directory Blue File Black and White Compress File (zip/rar/rpm) Red Executable File Green Device (terminal/cd/dvd/usb/hdd) Yellow Picture/image/media Magenta Link File Cyan A lot of options are available for ls command. Say, if you want to see long listing file format, you can use ls –l command. To know more about ls command options, please use man ls command. You will find details about ls command there.



CMD 6:



mkdir The mkdir command is to create a directory in any location in your system. Say, you want to create a directory/folder named class in your current directory. Then use mkdir commend like below. [root@localhost ~] # mkdir class So, you will find a folder named class has been created in your current directory. Use man command to know more about mkdir command.



CMD 7: touch



The touch command is used to create a file your desired directory. Say, you want to create a text file named lecture1 in your current directory. Then use touch command like below.

[root@localhost ~] # touch lecture1 So, you will find a file named lecture1 has been created in your current directory. You will find more details about touch command using man command.



CMD 8: cp



The cp command is used to copy any file or directory. Format of cp command is given below. cp [–option] source file name and path destination file name and path [–option] is optional. Say, if you want to copy your lecture1 file in /var directory with another name, use cp command like below.





[root@localhost ~] # cp lecture1 /var lecture1.bak So, you will get a copy of lecture1 file in /var directory and its name will be lecture1.bak. For more details about cp command, please use man command.



CMD 9: rm

The rm command is used to remove any file or directory. It takes file or directory name with path as its argument. Say, you want to delete the lecture1.bak file that you have copied in /var directory with cp command. Then use rm command like below. [root@localhost ~] # rm -f /var/lecture1.bak Your lecture1.bak file will be removed as soon as you execute this command. Here –f is an option which stands for force. If you don’t use this option, you will be asked to confirm for file or directory removal. A lot of options are also available for rm command. Please run man rm command to get details.



CMD 10: vi Like windows notepad, vi is a text editor. Any kind of plain text can be edit with vi shell editor. Say, you want to write some text in your lecture file. Then open lecture file with vi editor like below.



[root@localhost ~] # vi lecture By default vi editor will be opened as read mode. Now press ‘i’ to enable write mode and write your text that you want to write. Press ‘Esc’ key to go back in read mode. Generally :q keys are used to quit any opened file. But as you have edited this file, you have to save this file. So, use :wq keys to save and quit this file. If you want not to save this file but quit, use :q! keys combination.



CMD 11:



shutdown The shutdown command is used to halt, power-off or reboot your Linux system. Say, you want to down your system immediately, use shutdown command like below.

[root@localhost ~] # shutdown now Now your system will go power-off state. If you want to reboot your system, you can use shutdown command with an extra option like below.

[root@localhost ~] # shutdown –r now So, your system will reboot now. A lot of arguments and options are also available for shutdown command. Please see man shutdown command for more details.

here is the much we can take on Simple Approach To Red Hat Linux Commands, but if have any challenge doing any of the above please leave a comment in comment box below.


https://www.techsfair.com/2018/07/simple-approach-to-red-hat-linux.html
Computers / Online IT Solution For Everyone by kellychild(m): 1:20pm On May 07, 2018
Techsfair.com

I will help you out ... when it comes to mikrotik routers and switch configurations..

Lan setup and networking topologies.

wired and wireless network troubleshooting and solutions and advice for free.

general ICT procurement and advice..

Any kind of computer software and hardware problem solutions.

First hand informations on latest tech from HOW to .. to the final configuration setup.

we will also help you get your Blog Monetize within 48 hrs..
Tips and trick on how to make money online.
www.techsfair.com
techsfair1@gmail.com
+2348135186774
Science/Technology / Re: Drop Your Blog Address And Get Back To Back Traffic. by kellychild(m): 1:04pm On May 04, 2018
I prefer your dropping your link: https://www.techsfair.com/2018/05/drop-your-blog-address-and-get-back-to.html to allow you meet more bloggers who have already participated
Science/Technology / Drop Your Blog Address And Get Back To Back Traffic. by kellychild(m): 12:22pm On May 04, 2018
techsfair.com
Yes, I believe in every one's uniqueness, I believe that sharing is power, If you don't say here Am I nobody will know that you really exist. For those of us struggling with maintenance culture, this is going to help a lot of us all to generate create a link and an avenue to communicate with each other.

And moreover Some of us who are looking for a particular site to get stuffs faster and not just that but to get attention to your the blog also.

Now is that time you have being waiting for to build a back to back relationship and to draw traffic to your site. So if you need back to back traffic, drop your blog url.

Tell everyone and those reading this, the niche your in, your experiences and what your blog is all about, and also drop your facebook username and twitter handle if you have any. Readers who like or need what you blog about will visit your link and patronize you. Remember we are one big family and I personally want to discover more blogs and the owners behind them.
www.techsfair.com/
See you on top !.

Science/Technology / How To Build A Successful Blog From Scratch Section3 by kellychild(m): 11:31am On May 02, 2018
Am running a series on this topic... your can join the conversation below..

Hopefully you have being following us and you must have read the first two sections of the series section 1 & 2, if not please read both before you proceed.

from our last discussion there is one part that interests me so much and that is the part I will like to take from here :

Try to build a Blog that will live long even without your presence.

you will perfectly agree with me that so many bloggers can't go away for two days and also maintain one quarter of traffic they pull to their websites within this short period ...The reason is because of unanswered questions like the one below: Can you blog survive without you ?. If your answer to this question is yes and your very sure of it then your on your way to success but if your still worried and concerned about the performance of your website in your absence, then together we have work to do. Let me at this point introduce you to the concept of Sitemaps, Keywords and SEO. So many bloggers talks about these three things most times to show other bloggers that they are in the terran and that they know what is happening but in the quest you find that they have less experience about what they are talking about. The first book I read as a blogger was titled blogging for dummies, it actually a nice book and online so you can search for it and update your skills.

Sitemap : I have a well written article to guild and help you through you journey of sitemap.xml, Atom, Rss etc. so am only gonna give an intro and then allow to read up the article, generate your sitemap and submit it to google console and bin webmaster also.

intro : Google introduced the Sitemaps protocol so web developers can publish lists of links from across their site. A site map therefore is a comprehensive list of pages and links of your entire blog, or website or simply an overview of your entire blog site at a glance.

These (web pages and web links) contents may be addressed to users or to software for specific purposes. Many sites have user-visible sitemaps which present a systematic view, typically hierarchical, of the site. The main aim of a site map is to help visitors find specific pages, and can also be used by web crawlers. Alphabetically organized site maps, sometimes called site indexes, are a different approach.

For search engines and others, to crawl your site, there is a systematic format which you will have to follow while building your site map. The XML Sitemap, which lists the pages in a site, their relative importance, and how often they are updated. This is pointed to, from the robots.txt file and is typically called sitemap.xml. The procedure, format or the style your site map will use is particularly important for web sites which include pages that are not accessible through links from other pages, but only through the site's search tools or by dynamic construction of URL’ READ MORE HERE.


KEY WORDS:

Can you imagine how frustrating it would be to after you must have compile a list of keywords, just to realize that they are incredibly competitive on the web and looking at the rank of your site your words might even appear in the one million quest.

The reason is because most websites today are concerned with the same, limited number set of keywords that come from Google Keyword Planner. But I tell you there is a much easier way to get ahead of your competitors and discover highly relevant, precise keywords with low competition.



While Google Keyword Planner hides most of these lucrative keywords, the good news is, with Keyword Tool Pro there is a shortcut to finding these great keywords. so I advice you try it out today.

latestly you can also check out how many people on the internet searching for your keywords. Many finds it hard to identify the keys words in their website, for me I use my labels as a key by entering them o my blog and bin webmaster one per line, once you pick a keyword try to use them in your title and throughout your content, with this, you will achieve high page rank and top position in search engine results in no time.

How Do I Add A keyword To My Blog ? If your on blogger, from your blogger dashboard, Navigate to right and locate the tag search preference on the middle you will see Metag In box labeled description enter your keywords and separate the with comma. In Bin search, from the dashboard you will see a box asking you to add your keywords is pretty simple over there.

SEO : This topic always rises a lot of issues because many claim to be expert in it so we that are learners don't talk much about it but it is important to know this concept to an extent i other words am not writing this as an expert but with my little experience from what I have learn as a blogger.

Search engines optimization (SEO) is the process of optimizing your pages and posts in order to increase their chances of showing in search engines result pages (SERPs) on Google, Bing, and other search engines, and therefore driving organic traffic to your blog.

The goal is to make your website more popular, more visible, more important than all the competitors.

we all want to rank high and show on at least the first Tenth search pages of Google.

We might not reach the top of the heap, but we all aim to land anywhere near the top.

The big question is how do we accomplish our dream? How do I overtake all these good guys and end guy at the top. Let me start by saying that your site optimization start from you. People always ask How ? and i will tell them submit your sitemap to search engines and then it will be indexed and crawl by robots, once this process is complete your bond to get organic traffics to your blog. and at this point your building a successful blog. before I end this section, I will encourage to start posting your articles on google plus, pinterest, Facbook.com and other social media platform and forums that are handy to you sign up is free and you will enjoy blogging and stop struggling with your earnings.

If you wish to start a blog but don’t have web designing skills,I would advise that you start your blog today with Blogger (hosted by google ), WordPress (hosted) or

Wordpress (self hosted without plugins). Blogger is pretty easy to learn.

If you wish to go with WordPress then avoid installing plugins till you learn how to secure a WordPress website.

if you can drop two quality posts a week then that's fine for a start. Try to blog about topics you’re familiar with and genuinely interested in. Also, try to understand each post you make, this will help you to build internal links on future posts.

here are the series source : https://www.techsfair.com/

Phones / Xiaomi Mi 6X With 18:9 Display And Snapdragon 660 Is Here by kellychild(m): 1:21pm On Apr 25, 2018
Xiaomi unveils Mi 6X,. The phone sees Xiaomi start using 18:9 displays in the middle of its range after the recent launch of the more affordable Redmi 5 line and the high-end Mi Mix 2S.
Xiaomi Mi 6X comes with the following specifications:

18:9 2160 x 1080 LCD display,
Snapdragon 660 processor,
dual-camera setup with a 20-megapixel main sensor,
a 20-megapixel selfie camera with a flash,
a fingerprint sensor on the rear,
USB-C, and no headphone jack.
It's 7.3mm thick,
weighs 166 grams,
and comes in black, red, blue, gold, and pink.
Pricing starts at 1599 yuan, about $250 USD or 17,000 Indian rupees.

Though Xiaomi Mi 6X is focused on China, it could hint at an important upcoming device for India and other big markets for Xiaomi. Last year's Mi 5X eventually morphed into the Mi A1 outside of China, marking Xiaomi's first Android One phone and one that marked a turning point for Google's program, which previously targeted very low-end devices.
source: https://www.techsfair.com/2018/04/xiaomi-mi-6x-with-189-display-and.html

Phones / Gionee To Launch New Smartphones With Face Unlock And 18:9 Displays. by kellychild(m): 12:31pm On Apr 25, 2018
The Chinese smartphone maker Gionee is set for the launch of a new range of smartphones tomorrow. The launch does not say much about the phone specifications, but shows smartphones with very thin bezels on the sides. According to industry sources, the smartphones are expected to be priced in the bracket of Rs 9,000 and Rs 15,000 and a "Full View Display" is expected to be one of the key features of these Smartphones.









According to sources from Gizbot, the smartphones will come with face unlock and Full view displays. The device is expected to come with 4GB RAM and 32GB inbuilt storage which can be expanded via a microSD card upto 256GB. That’s not all, the company is reportedly in talks with multiple telecom operators to give away data for free.

Before now, David Chang, Global Sales Director, of Gionee in India, said that the Gionee company has come to India to stay. He also refuted reports in the Chinese media that the company is facing financial woes in paying its suppliers.











"We are equally excited about our presence in the Indian market and would like to assure all Gionee lovers that the brand is here to stay," Chang added.









The company had 2.2 percent share in the Indian smartphone market for 2017, according to Counterpoint Research.



Gionee, which established its presence in India in 2012, claims to have retail presence in over 42,000 stores and has 600 exclusive service centres in the country. It claims a customer base of 1.25 crore in the country.
source: https://www.techsfair.com/2018/04/gionee-to-launch-new-smartphones-with.html

Science/Technology / How To Bypass Icloud Activation On Iphone by kellychild(m): 4:27pm On Apr 23, 2018
So many face challenge with iPhone iCloud locked. This often happens when you forgot your iPhone iCloud account and passwords, in this case you will not longer be able to use your mobile phone. In most cases it happens to be that the person involved paid for your second-hand phone, the previous owner can still block you from using it. They can do this by keeping the device locked to their iCloud account and not allowing you to log into the phone.



Assuming your case is in the first sentence, all you need do is to ask Apple official service for help, but if you paid for your second-hand phone, it will be a little bit troublesome. For me am profounding two solutions, which includes: contacting the owner of iPhone, and another one is bypass your iPhone activation lock in hardware. I will also provide some other different safe iCloud removal methods by which you can comfortably unlock iCloud locked iPhone. so let get down to the full tutorial.

Solution 1: Bypass iCloud activation on iPhone through DNS method.

In the activation window, press the home button and then select Wi-Fi settings and then tap on the 'I' bonded by a circle. Now it's time to remove the existing DNS server and put a custom one in motion. Now, let's follow the steps below to bypass iCloud activation on iPhone.

How to bypass iCloud activation lock steps:

Step 1: Enter the new DNS server as 78.109.17.60
USA/North America: 104.154.51.7



Europe: 104.155.28.90

Other areas: 78.109.17.60

Step 2: Tap on "Back" > "Done" > "Activation help."

Step 3: You will see a message would appear saying you have successfully connected to my server after previous step. And then you need to tap on the "Menu" on the top right.

Step 4: Scroll through a number of applications available for use such as YouTube and select the appropriate application which you think can provide with the information you require for the owner of the phone.



Solution 2: Bypass iCloud activation online

You can check this website Official iPhoneUnlock to bypass iCloud activation online, Official iPhoneUnlock is a professional iPhone unlock website, which can provide online service to easily unlock your iCloud activation lock, but you need pay some money for their service. And I think it is a nice choice if you encounter iCloud activation lock problems, it is very easy. After you paid then you will get your iCloud account unlocked in 1-3 days.

Solution 3: Bypass iCloud activation on iPhone with a suitable tool.

You can use some functional tools available that can come in handy in bypassing the iCloud activation for your iPhone or iPad. And we recommend the 'iCloud activation bypass tool version 1.4'. The tools name abides by what it says and is a really easy tool to use.

Techsfair.com Warning



This post is for technical sharing, if you have a locked iClound, please contact Apple official service


Process:


1. Take down the chips on the motherboard without iCloud

2. Take off chips on the motherboard with iCloud

3. Bond the chips onto the iCloud motherboard
source: https://www.techsfair.com/2018/04/how-to-bypass-icloud-activation-on.html
Science/Technology / Apple Introduces The 13-inch Macbook Pro (non Touch Bar) Battery Replacement by kellychild(m): 11:19am On Apr 23, 2018
The latest program Unveiled by Apple shows that, In some of Apple's 3-inch MacBook Pro, with non Touch Bar units, a component may fail causing the built-in battery to expand. According to the report, this is not a safety issue and Apple will replace eligible batteries, free of charge. Apple says that the affected units were manufactured between October 2016 and October 2017 and eligibility is determined by the product serial number.Replacing these batteries will be at no cost to consumers, since there is only but limited number of Apples 3-inch MacBook pro with expanded batteries so far.





9to5Mac spotted the program, which will allow users to get the computer’s battery replaced for certain non-Touch Bar 13-inch MacBook Pro models. Apple notes that a small number of computers manufactured between October 2016 and October 2017 have a faulty component which causes the battery to expand. The page for the program has a field for owners to submit their computer serial number to check its eligibility.


source:https://www.techsfair.com/2018/04/apple-introduces-13-inch-macbook-pro.html

Phones / Samsung S9 And S9+ Is The More Popular Choice In The Country. by kellychild(m): 4:49pm On Mar 14, 2018
Three day from now we are expecting the all new Samsung Galaxy S9 and S9+ on UAE shelves starting. Both will come in 3 storage options - 64GB, 128GB and 256GB - and will range from Dh3,099 to Dh3,899.



According to the source, Samsung Electronics Gulf says pre-orders for its latest flagships, the Galaxy S9 and S9+, outpaced those of its predecessors.

The company revealed that the S9+ is the more popular choice in the country; until March 7, pre-orders for the 5.8-inch S9 comprised 40 per cent of the demand, while the 6.2-inch S9+ got the lion's share with 60 per cent.



Demand was so high that pre-orders were exhausted at some retailers in the UAE. Samsung, however, has guaranteed that more supplies will come to cater to all customers.



For the S9 and S9+, Samsung focused on upgrading the camera and, so far, initial reviews have been favourable.



besting the Google Pixel 2 (98), Apple iPhone X and Huawei Mate 10 Pro (97), and iPhone 8 Plus (94).



The UAE's smartphone market grew 2 per cent in 2017, Samsung says its growth was double at 4 per cent, quoting figures from research firm GfK.



The Galaxy S9 and S9+ also come with the new built-in Samsung Members app, which provides its users with exclusive rewards that are regularly updated. Among the companies who have tied up with Samsung are Apparel Group and Marriott International Hotels. Galaxy Entertainer, which provides buy-one-take-one offers, is also back.

source : https://www.techsfair.com/2018/03/samsung-s9-is-more-popular-choice-in.html

Science/Technology / Google To Ban Ads On Cryptocurrencies, Related Articles by kellychild(m): 4:06pm On Mar 14, 2018
Alphabet Inc’s Google said on Wednesday it will ban advertisements for cryptocurrencies and related content starting in June.



Under the new policy, the company will ban ads for unregulated or speculative financial products like binary options, cryptocurrency and financial spread betting among others.



In a separate blog post, Google said it took down 3.2 billion ads that violated its advertising policies in 2017, nearly double the number of ads it removed in 2016.



"Improving the ads experience across the web, whether that's removing harmful ads or intrusive ads, will continue to be a top priority for us," Scott Spencer, director of sustainable ads, said.

In January, Facebook Inc said it will ban ads promoting financial products and services tied to cryptocurrencies and initial coin offerings.



The policy will be implemented across its platforms, including Facebook, Audience Network and Instagram, the company said.

source : https://www.techsfair.com/2018/03/google-to-ban-ads-on-cryptocurrencies.html
Science/Technology / Get Your Iphone 7 Repaired For Free, On "No Service" Issues. by kellychild(m): 1:49pm On Feb 08, 2018
According to Apple repair program, a small percentage of iPhone 7 devices may show "No Service" in the status bar (even when cellular coverage is available), this is because a component has failed on the main logic board. This failure in the component has leads to distortion in the signal strength of these devices.

The apple product affected units were manufactured between September 2016 and February 2018 according to apple and sold in China, Hong Kong, Japan, Macao, and the U.S.

To be certain apple outlined the product to be iPhone 7 series with model numbers that are covered in this program, which includes A1660, A1780, and A779, for you to check and see if your device is among these series, customers are therefore advice to check the number on the back of their device.

From the repair program if your device exhibits the symptom described above, Apple will repair your device, free of charge. Your iPhone will be examined prior to any service to verify that it is eligible for this program. This program only applies to iPhone 7.



Apple will be contacting customers via email who may have paid for a repair related to this issue to arrange for reimbursement. If you believe you paid for a repair related to this issue, and have not received an email from Apple by the end of March 2018, please contact Apple.

Service process

Customers who are in need of a repair should contact an Authorized Apple Service Provider, visit an Apple retail store, or get in touch with Apple support. Apple will be sending all iPhone 7 models in need of repair to an Apple Repair Center.

Note: all other further damages such as Wireless carrier partners, cracked screen, and so on are not participating in this program. And your iPhone 7 has any damage which impairs the ability to complete the repair, such as a cracked screen, that issue will need to be resolved prior to the service. In some cases, there may be a cost associated with the additional repair.
source:
https://www.techsfair.com/
Science/Technology / Stelcoin Is Bringing Freelancing To Blockchain by kellychild(m): 12:14pm On Jan 31, 2018
A good boss of mine always say that success come in the form of boxer and singlet. It is left for you to choose which one to cloth with, He emphasis that being poor is just a matter of seeing opportunities and passing it by, over and over again. For me cryptocurrency are making many mighty and rich as the day break. Many today live in pain of had I known that bitcoin will be this valued they would have invested years back. For me opportunities are spread under the sun each day all you need to do is just to get informed.


For future billionaires I introduce a new way of turning around the financial status of my friends, lovers and serious minded investors with just a coin. SETlcoin.

Stelance is a freelancing community where free-lancers globally will be able to not only
render services but also own personal offices on the internet with a total target community of
about 5 million people.
Services will be rendered by freelancers and received by buyers but
the only system of payments and payment currency will be Stelcoin.


PURPOSE
The goal is to become the first and largest trusted decentralized freelance community in the
world with professional freelancers and to attract buyers globally.
Freelance jobs means, Fields where freelancing is especially common including journalism
and other forms of writing, computer programming and graphic design, consulting, and
many other professional and creative services.
source https://www.techsfair.com/2018/01/stelcoin-is-bringing-freelancing-to.html
Science/Technology / Configuration Backups On Mikrotik Routers. by kellychild(m): 2:11pm On Jan 29, 2018
The main reason for configuration backup is to back up MikroTik RouterOS configuration done into a single file, which can be stored on the router or downloaded from it using FTP or Winbox for future use. The configuration restore can be used for restoring the router’s configuration, exactly as it was at the backup creation moment, from a backup file. This process for this configuration is simple and the features pretty good.


The restoration procedure will have to align on same the configuration that is going to be restored on the router, where the backup file was originally created, or similar to it so it will create partially broken configuration if the hardware has been altered by any means.all the same some changes can be made while restoring files usinf terminals.

Here will start our backup procedures by lunching our winbox application, click on files , click on backups on the top tag. You will noticed that by default all backups are encrypted. click here to read more https://www.techsfair.com/2018/01/configuration-backups-on-mikrotik.html
Science/Technology / Configuring NTP Server On A Mikrotik Router. by kellychild(m): 1:57pm On Jan 29, 2018
Today in this tutorial am going to explain how we can configure an NTP server on a mikrotik router.
Network Time Protocol (NTP) is a networking protocol for time synchronization between computer systems and network devices over packet-switched, variable-latency data networks.

First of all we must understand why you need to setup this server; well the reason is that if you want all the time in your devices to be synchronized then you need this server.


So in other for you to successfully install an NTP server on your mikrotik router, you will need to make that the package is install in the router, to check and verify you should click on system, >>>>> packages and make sure the package ntp is installed.
Click here to learn more on how to install packages on mikrotik router.

So then to configure NTP the first step is to go this which I provide here http://www.pool.ntp.org
Step 2 you will click on use the pool and then it will direct to a page displaying the servers, the next step we are going to configure the pool using the first and the second address provided on use the pool page.


So here we are going to go back to our router, click on system click on NTP server.
We are going to enable the server and the broadcast also my checking the box click on apply and ok.

The broadcast will be sending information, telling the entire network that is a time server.

Next thing to do is to configure the NTP client click on system, click on NTP client, the reason for the client is that you will need a client that is engaged on the internet to enable the router synchronization, in this category the router in turn will then redistribute the time to others devices.

continue reading here https://www.techsfair.com/2018/01/configuring-ntp-server-on-mikrotik.html
Science/Technology / Upgrading Your Mikrotik OS And Firmware To The Latest Version. by kellychild(m): 3:35pm On Jan 26, 2018
Hello guys welcome again, today am going to show you how to upgrade your mikrotik OS and routerboard to the latest version.

Before you carry out this upgrade practice make sure that your router is connected to the internet.

The first thing we will is to login to the router.







Click on system.

Click on packages and then you will see the list of all installed program on the router OS in a bold writing, the once in faded writing are the ones that are disable or not currently in use.

All of the packages have something special they perform.

To upgrade the router OS click on check update and then you will see the available OS to upgrade to.

for more on this and other related post

source: https://www.techsfair.com/2018/01/upgrading-your-mikrotik-os-and-firmware.html

Phones / Re: Tecno L9 Plus With 13MP Camera, 5000mah Battery. Review And Price. by kellychild(m): 3:54pm On Jan 19, 2018
all thes people reviewing techno and infinix you people are trying but i de cry for you guy.... you guys shoild review good phones abeg una [



Tecno L9 Plus packed 5000 mAh battery, which can supply up to 72 hours of use once fully charged.

THE DOWNSIDE OF THIS HANDSET IS IT SUPPORT NO 4G.


PRICING

Tecno L9 Plus is available in Nigeria. You can buy from any leading online stores in the country or office close to you
Tecno L9 Plus price in Nigeria ranges from 65,000 Naira to 70,000 Naira which reads about $200 – $200+.


See full specifications and more detail here: http://www.trendsgadget.com/2017/03/tecno-l9-plus-with-13mp-camera-5000mah.html?m=1[/quote]
Science/Technology / How To Monitor Client Traffic On Mikrotik Using Torch, Queues And Connections. by kellychild(m): 3:39pm On Jan 19, 2018
Hello guys, welcome to my personal blog. Today am going to share some experience on various way you can monitor a client on your network if you are using mikrotik modules so stick around let’s get started.
Before we start I just want to point out some reason why you must monitor the traffic flowing in and out of your network.


Most of the reasons why network administrators shows so much concern about Monitoring client traffic is complains, it is not new that client always complains of slow internet speed, well this can be segmented by monitoring the actual source that is pulling most of the bandwidth and the solve the problem by either using queues or filter method to deal with the interface that is causing the congestion to the network, if the problem exist within the LAN of the client. Actually that is called bandwidth management, which implies sharing the available speed among work groups so that everyone can carry out their responsibilities.

>>>>> click on Torch. A new page will pop up
On the top left corner of the page choose the interface you want to monitor Wan, Bridge, ether by clicking the drop down menu, and then click on start on the top right page.
Once that is done you will see the src address and the dis address.
The Tx and the Rx of the traffic flowing on the interface.

You can also choose the port and the kind of protocol you want to monitor.
The second way to monitor the performance of a client on your network is by viewing the connections. For you to be able to do this, click on IP to open a small menu , below the menu you will find a tab firewall >>>>>>> click on firewall >>>>>> on the menu you will a tab called connections, click on connections, what this does is to show all connection that are established on your router with their src and dist address, for you to be able to identify if the connection established is within your network or outside your network. Now here is the deal you can look at any IP address and double click on it if there is any reason ( such as congesting the network for a very long time ) to block or filter that interface or IP here you can do that comfortably. You can click on the filter icon, click on drop down arrow on src address, this will allow to filter base on several protocols such: comment, connection type , connection mark, dist, ICMP code, ICMP mark etc. so now if you want to filter using address you can from the drop down arrow put in and type in the address you want to filter and then click on filter on the top right side of the page.

In the connection you will also see your Tx and Rx to monitor if some of .................and the know how to manage them.
The last method to monitor client traffic on your network is by using queues Tree. For me I believe that if your network queues are properly configured all the traffic flowing in and out of your net is therefore accounted for.

To use queues click on queues. ......... , now click on the red plus sign to add a queues Tree to your network.
Make sure to name the queues for easy recognition of the particular interface.
On the parent choose the interface you want to queues ranging from Wan, global in, global out, global total, ether and bridge interfaces.

You can set the queue type to default if you want.
Then input the mini and max limit speed you want from the interface.
Click ok and apply.

Thanks, hopefully this article was helpful.
Follow us on facebook for more.
Don’t forget to share this article to a friend.

find more about this post here https://www.techsfair.com/2018/01/how-to-monitor-client-traffic-on.html#more

Science/Technology / Did You Forgot The Password For Your Iphone, Ipad, Or Ipod Touch And Your Locked by kellychild(m): 5:36pm On Jan 16, 2018
If you forgot the password for your iPhone, iPad, or iPod touch, or your device is disabled here is what to do.

If you eventually forgot your password, or if you see a message, that says that your apple device is disabled, follow these steps to remove your password.


If you enter the wrong password on an Apple iOS device six times in a row, you'll be locked out and a message will say that your device is disabled, this happens don't panic. Just follow my steps below:

The first thing you have to do is to choose a method to erase your device.

Unless you made a backup before you forgot your password, there is no more ways to save your device's data so it is advice you back your device at time intervals. At this point You'll need to erase your device, which will deletes all of your data and settings. Choose a way to erase your device so you can remove your password:

If you've backed up some stuffs with iTunes or your device si connected to iTunes, then you can use iTunes.
If you can't sync or connect with iTunes, use recovery mode.


Erase your device with iTunes to remove your passcode
If you've synced your device with iTunes, you can restore your device. This will erase the device and its passcode.

Using the following will help you to restore your device to normal:

Connect your device to the computer you synced with.
Open iTunes.
If asked for a passcode, try another computer you've synced with, or use recovery mode.
Wait for iTunes to sync your device and make a backup.

After the sync and backup have finished, click Restore [your device].
When you reach the Set Up screen while restoring your iOS device, tap Restore from iTunes backup.
Select your device in iTunes. Look at the date and size of each backup and pick the most relevant one.

Now delete your device with recovery mode to remove your password.
If you've never synced with iTunes or set up Find My iPhone in iCloud, you'll need to use recovery mode to restore your device. This will erase the device and its passcode.

Connect your iOS device to your computer and open iTunes. If you don't have a computer, borrow one from a friend, or go to an Apple Retail Store or Apple Authorized Service Provider.
While your device is connected, force restart it:

On an iPhone X, iPhone 8, or iPhone 8 Plus: Press and quickly release the Volume Up button. Press and quickly release the Volume Down button. Then, press and hold the Side button until you see the recovery-mode screen.
On an iPhone 7 or iPhone 7 Plus: Press and hold both the Side and Volume Down buttons at the same time. Keep holding them until you see the recovery-mode screen.
On an iPhone 6s and earlier, iPad, or iPod touch: Press and hold both the Home and the Top (or Side) buttons at the same time. Keep holding them until you see the recovery-mode screen.

When you see the option to Restore or Update, choose Restore.

iTunes will download software for your device. If it takes more than 15 minutes, your device will exit recovery mode and you'll need to repeat steps 2 and 3.

Wait for the process to finish. Then you can set up and use your device.

source https://www.techsfair.com/2018/01/did-you-forgot-password-for-your-iphone.html#more

Science/Technology / Google Launches Three New Photography Apps.techtips by kellychild(m): 11:40am On Dec 12, 2017
According Google research blog, each of the world's approximately two billion smartphone owners is carrying a camera capable of capturing photos and video of a tonal richness and quality unimaginable even five years ago.



Until recently, those cameras behaved mostly as optical sensors, capturing light and operating on the resulting image's pixels.



The next generation of cameras, however, will have the capability to blend hardware and computer vision algorithms that operate as well on an image's semantic content, enabling radically new creative mobile photo and video applications.



Today Google is launches a trio of new photo apps – a part of new series of what it has dubbed photography “appsperiments.” he apps, some of which are available on both the iOS App Store and Google Play, give Google a way to test out more experimental features to see how users respond, the company explains in an announcement on its Google Research blog.





The apps involve a number of technologies now in development at Google, including those focused on object recognition, person segmentation, style algorithms, efficient image encoding and decoding technologies, Google says.



Specifically, that the three photographic apps in question are called Storyboard, Selfissimo!, and Scrubbies.



The functions of the first, Storyboard, is to turns videos into single-page comic layouts on your mobile device. uses the concept of turning photos into images as an inspired work of art – also integrated includes comic book art –which is something that grew popular with the launch of the Artificial Intelligence.



While that company has more recently shifted focus to b2b, its consumer app still ranks in the top 150 in the Photo & Video category on the App Store. But attention for this sort of creative photography has waned a bit. Perhaps turning it on for video could bring it back to the limelight again?



The Storyboard app is a new take on those art-inspired photo effects . Instead of turning a photo into comic book art, it automatically selects interesting frames from a video then lays them out using one of six visual styles.



Google Storyboard app is only available on Android devices - for now. and you can download it here






The Google second app, Selfissimo!, is designed for selfies, just like it's name implies.




In this case, the app is an automated selfie photographer that takes black and white photos of you every time you pose. Whenever you stop moving, a new photo is taken. The end result is a contact sheet of photos – like you’d have from a real photoshoot.



This Google app is made available for both iOS and Android users, and you can easily get it here.



The third Google app is called Scrubbies, and is specially designed for video. This app will allow you to change the direction and acceleration of video playback effect in other to create looping videos. Instead of looping apps like Instagram’s Boomerang, Google Scrubbies does it all.



You actually swipe on the video itself to “remix” it. Google describes this process as “scratching it like a D.J.” One finger plays the video, while two fingers captures the playback for you to save and share.



Scrubbies is available for iOS users only. you can easily download it here



Is this the first time the first time for Google to launch an experimental photography apps like this ? let find out.



Google researchers developed Motion Stills to make iOS’s Live Videos less shaky, then brought a variation of that app to Android to offer a new recording experience for shooting sharable clips. This same Live Photo editing technology was also baked into the main Google Photos app, after some initial testing.



That means it’s possible that – if all goes well with the new app experiments – the features they offer could eventually make their way to Google Photos, as well.





Google also hinted that these three apps may be the first of many tests to – the company tells us they’re the “first installment” in a series of “apps periments.” source : http://www.techsfair.com/2017/12/google-launches-three-new-photography.html

1 Like

Phones / Xiaomi Redmi 5, Redmi 5 Plus Coming December 7th. by kellychild(m): 4:28pm On Dec 04, 2017
Xiaomi said, they are setting up a platform to officially announce their new Redmi 5 and Redmi 5 Plus Smartphone in China on Thursday 7th december.

An information from the director of the company product management, Donovan Sung, as he shows off the gadget photos on twitter.

For now there are not really any specific details on pricing or specifications available for both Smartphone’s, but form the twitted photos It is clear that both phones have slim bezels and approximately 18:9 screens, which is equivalent with many high-end devices leaked this year.


The Redmi 5 is expected to be powered by a 1.8GHz octa-core processor which is speculated to be the Snapdragon 450 chipset.

It is also expected to comes with a rear-mounted fingerprint sensor and packs a 4,100mAh battery. The proposed Redmi 5 listing shows that the device might launch in three configurations of 2GB RAM/16GB ROM, 3GB RAM/32GB ROM and 4GB RAM/64GB ROM.

The internal storage can also be expanded up to 128GB using a microSD card.

We think that the pricing will not be so high, hence it will affordable following the Xaomi Redmi 4 pricing at 6,999 rupees in India, or about $108. With this you can gets a phone with a metal build, a fingerprint sensor, a 5-inch 720p display, a Qualcomm Snapdragon 435 processor, a 13-megapixel camera, and a 4,100mAh battery. source http://www.techsfair.com/2017/12/xiaomi-redmi-5-redmi-5-plus-coming.html#more

Science/Technology / Re: Stick To Google Adsence Policy And Make More Money. Tag# Earn $100 Online Daily by kellychild(m): 2:04pm On Nov 29, 2017
dayo2me:
do you have the in-depth know-how of adsense?

why do adsense keep denying my application every time?


Adsence have policy you must adhere to visit https:///8HcJZK and click through for more information, please ask questions were necessary we will be glad to help for free.
Science/Technology / Stick To Google Adsence Policy And Make More Money. Tag# Earn $100 Online Daily by kellychild(m): 1:46pm On Nov 29, 2017
Google adsence is a free program introduced by the number one world wild website Google, to appreciate and encourage web developers, at least to an extent of paying their internet bills and also fund their research sources, and not a get rich quick platform. Web developer’s look up to this, as a means of authentication from Google, and actually it can be frustrating if one keeps on being rejected for some certain errors, infact most developer quit blogging and some others buys adsence, so then the approval into adsence now seems to be the begging of most of our young web developers.

One thing is to get approved, and another is to gather audience, that will read and click and click through your pages and Google serving ads for to generate income. For me blogging is all about goal orientation, such as keep on doing it, until you get it right. Like I know for sure it will get right some day.

Now there are rules and guidelines guiding adsencs program, but we never worry to read through these lines, and even if we do, at the end we will all click I agree, even when the rules are against us, the reasons been that we focus more on dollar earning generated by our ads, which we have calculated and compare in our various local currency and it seems so big and then becomes an openings, leading most developers to violate some rules on Google serving ads.


Well I have not seen such happening I only heard of this incidence about certain people complaining that their adsence was withdrawn from them and then I decide to put to more clear and simple writing, some of the risk involved in violating Google adsence rules. Also to outline parameters to watch out for, and be conscious while using Google adsence.

Disclaimer: This section is a cut copy of AdSense program policies
All publishers are required to adhere to the following policies, so please read them carefully. If you fail to comply with these policies without permission from Google, we reserve the right to disable ad serving to your site and/or disable your AdSense account at any time. If your account is disabled, you will not be eligible for further participation in the AdSense program.

Because we may change our policies at any time, please check here often for updates. In accordance with our online Terms and Conditions, it's your responsibility to keep up to date with, and adhere to, the policies posted here. Exceptions to these policies are permitted only with authorization from Google.

Invalid clicks and impressions
Publishers may not click their own ads or use any means to inflate impressions and/or clicks artificially, including manual methods.

Clicks on Google ads must result from genuine user interest. Any method that artificially generates clicks or impressions on your Google ads is strictly prohibited. These prohibited methods include, but are not limited to, repeated manual clicks or impressions, automated click and impression generating tools and the use of robots or deceptive software. Please note that clicking your own ads for any reason is prohibited.

Encouraging clicks
Publishers may not ask others to click their ads or use deceptive implementation methods to obtain clicks. This includes, but is not limited to, offering compensation to users for viewing ads or performing searches, promising to raise money for third parties for such behavior or placing images next to individual ads.

In order to ensure a good experience for users and advertisers, publishers participating in the AdSense program may not:

· Compensate users for viewing ads or performing searches, or promise compensation to a third party for such behavior.

· Encourage users to click the Google ads using phrases such as "click the ads", "support us", "visit these links" or other similar language.

· Direct user attention to the ads using arrows or other graphical gimmicks.

· Place misleading images alongside individual ads.

· Place ads in a floating box script.

· Format ads so that they become indistinguishable from other content on that page.

· Format site content so that it is difficult to distinguish it from ads.

· Place misleading labels above Google ad units. For instance, ads may be labelled "Sponsored Links" or "Advertisements", but not "Favorite Sites" or "Today's Top Offers".

Traffic sources
Google ads may not be placed on pages receiving traffic from certain sources. For example, publishers may not participate in paid-to-click programs, send unwanted emails or display ads as the result of the action of any software application. Also, publishers using online advertising must ensure that their pages comply with Google's Landing Page Quality Guidelines.

To ensure a positive experience for Internet users and Google advertisers, sites displaying Google ads may not:

· Use third-party services that generate clicks or impressions such as paid-to-click, paid-to-surf, autosurf and click-exchange programs.

· Be promoted through unsolicited mass emails or unwanted advertisements on third-party websites.

· Display Google ads, search boxes or search results as a result of the actions of software applications such as toolbars.

· Be loaded by any software that can trigger pop-ups, redirect users to unwanted websites, modify browser settings or otherwise interfere with site navigation. It is your responsibility to ensure that no ad network or affiliate uses such methods to direct traffic to pages that contain your AdSense code.

· Receive traffic from online advertising unless the site complies with the spirit of Google's Landing Page Quality Guidelines. For instance, users should easily be able to find what your ad promises.

Ad behavior

Publishers are permitted to make modifications to the AdSense ad code so long as those modifications do not artificially inflate ad performance or harm advertisers. Please see Modification of the AdSense ad code for more information.

Ad placement

Publishers are encouraged to experiment with a variety of placements and ad formats. However, AdSense code may not be placed in inappropriate places such as pop-ups, emails or software. Publishers must also adhere to the policies for each product used. Please see our ad placement policies article for more information.

Google ads, search boxes or search results may not be:

· Integrated into a software application (does not apply to AdMob) of any kind, including toolbars.

· Displayed in pop-ups or pop-unders, including where a page containing Google ads, search boxes, or search results is loaded in a pop-up or pop-under.

· Placed inside emails, or on pages where email messages are the primary focus.

· Placed on pages where dynamically-generated content (such as live chat, instant messaging, or auto-refreshing comments) is the primary focus of the page.

· Obscured by elements on a page.

· Underneath or adjacent to buttons or any other object such that the placement of the ad interferes with a user’s typical interaction with the app or ad.

· Placed on any non-content-based page. (Does not apply to AdSense for search or mobile AdSense for search.)

· Placed on pages published specifically for the purpose of showing ads.

· Placed on pages whose content or URL could confuse users into thinking it is associated with Google due to the misuse of logos, trademarks or other brand features.

· Placed on, within or alongside other Google products or services in a manner that violates the policies of that product or service.

Site behavior

Sites showing Google ads should be easy for users to navigate. Sites may not change user preferences, redirect users to unwanted websites, initiate downloads, include malware or contain pop-ups or pop-unders that interfere with site navigation.

Google advertising cookies
AdSense publishers must have and abide by a privacy policy that discloses that third parties may be placing and reading cookies on your users' browsers, or using web beacons to collect information as a result of ad serving on your website. Learn more about preparing your privacy policy.

Away from these rules and policies below is some of the factors every web develop should always be mindful of :

Page views
This is the total number of pages views by your visitors, this factor is very important for a site as you will also testify with me it may be an error if someone has a hundred page views and earn $10 per day.

Impressions
In Google Adsence, an impression is counted for each ad request that returns at least one ad to the site. It is the number of ad units (for content ads) or search queries (for search ads) that showed ads.

Page RPM
In Google Adsence Page RPM is equal to the Estimated earnings divided by Number of page views multiply by 1000. For example, if you earned an estimated $0.15 from 25 page views, then your page RPM would equal ($0.15 / 25) * 1000, or $6.00.

Active View Viewable: this simply implies

How much of the ad was visible on the screen

How long was the ad visible?

Estimated earning

Estimated earnings, which are visible in your Performance reports, reflect close estimates of recent account activity. These reports show estimated earnings to offer a close estimate of recent account activity as soon as possible. However, these earnings aren't finalized until the end of the month and won't necessarily reflect the amount you will ultimately be paid.

Finalized earnings are accurate earnings amounts that include all revenue you will be paid for validated clicks and impressions. These amounts are equal to the current balance found on your "Transactions" page. After our earnings records are processed and verified by the 3rd of the month, your current balance from the previous month is posted to your "Transactions" page and to the "Finalized earnings" section of your Home page.

CTR
Your ad Click-Through Rate is the number of ad clicks divided by the number of individual ad impressions. Mathematically given as CTR = Clicks / Ad Impressions X 100

So in essence assuming , you get 5 clicks out of 500 ad impressions, your CTR would be 1% (5/500X100).

CPC:
This is the Cost per Click revenue you earn each time a visitor clicks on your ad. CPC therefore is determined by the advertisers. In some competitive niches like finance, marketing, online products etc. advertisers may be willing to pay more per click than others.

CPM:
CPM means “Cost Per 1000 Impressions.”

Sometimes advertisers opt for CPM ads instead of CPC and set their price for 1000 ad impressions. And they pay each time their ads appear on any website.

My question now is ….What does It Takes To Make $100 A Day With AdSense ?

This is very simple from my calculations, when your CTR is 1% and your average CPC is $0.25. it’s quite achievable to make $100 dollars a day, and lots of people are doing it. Let's assume that a Page View = An Ad Impression.

So then to make $100 everyday you need 40,000 Page Views/day Or, 400 Clicks a day @ 1% CTR and $0.25 CPC. For 40,000 Page Views you have to produce at least 500 awesome articles on your website. These pages must attract at least 80 or more page views every day very simple. I encourage you with this little article to work even more had surely, you will earn good with your adsence, make sure to stay away from violating the Adsence policy. source https:///5gzo1U
Science/Technology / Antivirus And Anti-malware Software Management. by kellychild(m): 12:20pm On Nov 24, 2017
Antivirus software is an application that scans files for executable code that matches pattern, known as signatures or definitions that are known to be common to viruses. The antivirus software also monitors system for activities that are associated with virus, such as accessing the system boot sector. antivirus software should deployed on various networks systems as well s individual computers, and the signature database and program updates should be downloaded and installed on a regular basis as well as whenever a new threat is active. Antivirus software does not actually protect against spam, but it can identify malware symptoms and can provide protections from adware and spywares.
Antivirus updates must be managed as they made available.

Antivirus engine can include enhancement, bugs fixes or new features being added to the software engine improving the manner in which the update operates. Updates can be implemented automatically or manually depending on the software. Automatic updating refers to software that periodically downloads and applies without user intervention, whereas manual updating refer to software the user must be involved to either initiate the update, download the updates or at least approve installation of the update.

Anti-spyware software is specifically designed to protect system against attacks. Some antivirus packages include protection against adware and spyware, but in most cases it is necessary to maintain anti-spyware protection in addition to anti-virus protection. Some example of anti-spyware protections you may need might include Webroot’s spy Sweeper and STOP zilla Anti-spyware. Some of the antivirus software applications installed in a mobile include also BullGuard mobile security, Kaspersky mobile security, ESET mobile security, Lookup premium, and Trend micro mobile security.
Most security software that are created in the past few years, provide general, all-round anti-malware protection. There are many complex and harmful threats that can find their way into your digital devices. Having good anti-malware installed will help protect your system a long way and also other systems you might not connect to from becoming infected through any malware you encounter.

Firewall
A firewall is a software program or even a hardware device that protects network from unauthorized access by blocking outgoing and incoming unsolicited traffics. Firewalls only permit access to outgoing an incoming traffics that are legitimately permitted by the network administrator. This software is used to determine the source of traffic and then use it complex nature to filter algorithms and analyses incoming network data base on the destination, source address , port numbers and data types.

There are basically two types of firewalls.
Host or personal firewalls installed on a single computer and are used to secure most home and computers.
Network base firewalls are dedicated hardware/ software combinations that protects all the computers on the network behind the firewall.
Software firewalls
Software firewalls can be useful for small home offices and business. The firewall provides many features that can be configured to suit various network computing needs. Some of these features include:
Enabling and disabling security on certain ports.
Inbound and out bond filtering
Reporting and logging activities .
Malware and spyware security.
Pop blocking.
Port assigning, forwarding and triggering.

Windows firewall configurations
Window firewall is a software based firewall that is included with all current windows operating system client and server version. You can configure your window firewall by using the windows firewall program in control panel or through group policy settings. Although almost all version of will provide a wizard. You can equally use windows firewall with advance security consoles to monitor the rules in the flow of information to and fro from the system specify new rules, modify existing rules, or even in deleting rules. For more information you can refer to your windows firewall entries in the HELP AND SUPPORT CENTER, and the windows firewall technical reference on the Microsoft Technet website.
I hope this post have being of a good information for you, and I will like to thank you for stopping by. source http://www.techsfair.com/2017/11/antivirus-and-antimalware-software.html

Science/Technology / Experience Wireless Connectivity This Season Every Where You Go With MTN MIFI by kellychild(m): 12:36pm On Nov 20, 2017
With the customized MTN portable MIFI, which is just like every other Access point, that is a networking device that facilitates the communication and provides an enhanced security to wireless devices on a network. It also functions as an extender of WAN to a physical range in some networks you can connects up to 10 Wi-Fi enabled devices at same time. Your Smartphone, Tablets, Laptops, Computers, Game Consoles, Smart TVs etc.
The high mobility, (which means you can move from place to place with your access point) of the MTN portable wireless router got you going with your Internet connectivity on the move everywhere at anytime.

MTN wireless MFI supports up to (eight) 8 hours of battery life, when in operation and more during off peak hours.
The MTN MIFI is uniquely designed for home or Small Business use.
Simply buy an MTN 4G LTE MiFi(a free Sim+4GLTE MiFi device ) at N15, 000 only and get as much as 100% data bonus for 3 months.
Promotional offer available for a limited time only.
Where to Buy? Click here for MTN stores near you for affordable 4G compatible mobile devices, buy on www.Jumia.com

How to set up the MTN 4g MIFI
After you might have gotten your MTN portable MIFI it is now time to set it up for use. to set up you MTN MIFI please follow these simple steps below:

Step1 on onboxing your MTN MIFI package insert your registered 4Glit sim card in the provided sim space.
Step 2 insert your battery and cover the back.
Step 3 power on the device by holding the power button for a period of three 3 seconds.
Step 4 gets your MIFI user name and password written on the inside of the battery.
Step5 enable your device to access wifi signal by turning your wifi icon on the device.
Step6 search MTN mobile wireless internet E5573 click on connect and enter the appropriate password.
Step 7 lunches your browser and type in the IP address 192.168.8.1 or simply type in my 4glte.ne this will lunch you into the MTN user interface where you will do your configurations. And choose your bundle plan.
Step8 enter your user name as ADMIN and password as ADMIN and click on login.

Congratulation your MIFI is ready for use source http://www.techsfair.com/2017/11/mtn-mifi.html#more
Phones / How To Fix Unfortunately Google Plays Services Has Stopped In Your Android. by kellychild(m): 11:50am On Nov 17, 2017
Fix Unfortunately Google play Services Has Stooped On Your Android.

Every device is bound to have issues or problem with time, these fault come either naturally from factory, commonly called factory error or during end user. Whichever one is it? One thing for sure is that you can always troubleshoot and fix your mobile device with just a tip from this blog. So today we are going fix one of the common android mobile device problems. Which can constantly pop up in front of your mobile device and disturb you with a message "unfortunately Google play services has stopped".

This message could be annoying and will not even allow performing any task on your mobile device. If you want to know why please read my post on google play services here, the post explains in clear terms all the importance of Google play services on every device running Android operating system.To fix unfortunately Google play services has stop please follow these simple steps.


#1 Clear the Google Play Services cache
To clear the Google Play Services cache, click on your device's Settings menu and look for google play services App. click on it and then tap on Google Play Services. Tap on Force stop, and then on Clear cache. And then, you should restart your phone.

#2 Update Google Play Services
Updating Google Play Services should fix that annoying “Google Play Services has stopped” error. It may be that probably an older version of Google Play Services is running on the background causing error while trying to authentic a newer version of Google play services on your android installed device. If you already have the latest version try uninstalling and reinstalling it anyway. You can download Google Play Services here.

#3 Disable Google Play Services updates
This method I don’t really like it because it will probably stop apps from updating, but it really works. To disable the services, open up Settings and then go to Apps. From the list, select Google Play Services. This will show you a lot of information about the application, but what you need is the button that says Uninstall updates. Tap on that, and then restart your device.

#4 Factory reset, Restore and backup device.
As a factory reset (also known as a hard reset) will wipe your phone, it is best to use this last option. Because everything on your phone will be wiped, you should create a back up file or folder and save your data either on a computer or in a hard drive before you start.
Performing a factory reset varies depending on your device (usually a combination of the power and volume buttons), so it's best to do a quick search for some instructions specific to the device you are using. But for some few Android devices click on setting.
source http://www.techsfair.com/

1 Like

Phones / Install Xiaomi MIUI 9 Update Without Loosing Your Data. by kellychild(m): 3:37pm On Nov 14, 2017
Finally the Xiaomi MIUI 9 is available and you can install it in your devices. Let start by showing you how to update to MIUI 9 and start enjoying the new features. The Xiaomi MIUI 9 is an android nougat base device and Xiaomi says is very good at competing to other android devices in term of speed. So let find out, first of all, before you begin this upgrade make sure your battery level is above 50% and then very important make sure to back up all the important content of your device.

In other to update you to MIUI 9 you need an internet connection, data cable, and a computer system or alternatively, you can download the update directly to you android device. Once you finish downloading it, on the download file of you phone
, you can now go setting>>> update. To update click the three dot on top right of your phone, choose the update package by choosing the file you downloaded earlier, once the decryption is complete it will ask you to erase data this is why it is important that you back up your files on a computer or on cloud. In case you get an error message why trying to update you device, don’t worry it’s normal just go back to the setting>>>> about and factory reset your device try this method again, but this time click on erase and update after a while it will take approximately five to ten minutes then you will be on the new MIUI 9 and you will start to enjoy a new animation by default on each window.

Xiaomi MIUI 9 is as fast as Xaiomi says it is compare to MIUI 8, the MIUI9 comes with a better version of 7.8.10.1 beta and 7.0 android nougats. With Xiaomi MIUI 9 you can move icons around on the home screen. Another amazing feature is what you will experience if you swap to the left side of the screen, and then from the home screen you will have options to open in a new dimension, and also a touch light icon at the bottom, I don’t know why is like that, since you can also trigger the touch light by holding down the home button.

With Xiaomi MIUI 9 you have an option for multi-task widow available, all you need is to locate the screen you want to work on, click on the multi-tasking widow and drag it to the top of the screen for a full view and to work on. You also have the silent button on the top screen instead pressing up and down key and you can silent this device up to about eight hours.

If you among those who have the Redmi Note 4 and Mi Max 2 you can download and install the corresponding ROMs from Xiaomi's website.
You can also follow the below highlighted steps on how to download and install the MIUI 9 Global Stable ROM.
Xiaomi Redmi Note 4 Fastboot ROM
Xiaomi Mi Max 2 Fastboot ROM
This list will be updated with new MIUI 9 Global Stable ROM links as Xiaomi makes them available.
Before fastbooting, user must have the bootloader unlocked. They can do it by switching off their devices and then press and hold volume down and power button simultaneously, it should power up the phone with fastboot screen.
User can connect their phone with USB to a computer system, then click on Refresh button in flash tool app and it should show device ID. If not, install Mi PC Suite and drivers posted here. Extract the fastboot ROM downloaded, to a folder on the computer.

Open MiFlash tool, and select clean all in the right down corner
Click Select and browse to a folder where you extracted the Fastboot ROM and click Flash
It will start flashing the phone and will take around 3-5 Minutes depending on the computer performance and the device too. Users should note that they cannot remove their device while flashing, or unplug it from source, also make sure your battery level is good enough before performing this operation
Device will reboot with MIUI 9.

How was your experience installing MIUI 9 Global Stable ROM on your Smartphone?
Let us know on the comment box below.
Thanks and stay connected for more. source http://www.techsfair.com
Phones / How To Set Up Icloud On Your Apple Devices by kellychild(m): 2:10pm On Nov 14, 2017
How do I set up iCloud? And is it possible to use iCloud on a Windows PC?. All these and more we are going to answer in the post below.
In the early days of Apple, MobileMe was in vogue before iCloud came in 2011 as a replacement, iCloud is Apple's remote storage and cloud computing service, which allows you to access your photos, contacts, email, bookmarks and documents online anytime and anywhere. It's a useful tool and if you can manage with the pretty stingy base storage allocation of 5GB free storage set of services, available to anyone with an iPhone, iPad, iPod touch, Apple TV, Mac or even Windows PC, then you can save more documents.

In this post I am going explain to you how you can set up your iCloud services on every of your devices, how to sign up for an Apple ID and iCloud account, and how to activate iCloud in general and specific iCloud services in particular.

How to set up iCloud:
Create an Apple ID
Your iCloud account is based on your Apple ID. So if you haven't got an Apple ID already, you'll need to create one. If you've already got an Apple ID, you can skip ahead to the next section.

There's two ways to sign up for an Apple ID: on your iPad or iPad, as part of the device's setup process, or in a browser on any device at any time.
If you're setting up a new iPad or setting up a new iPhone, the simplest option is to create an Apple ID then and there. At the appropriate moment during setup, tap 'Don't have an Apple ID or forgot it', and 'Create A Free Apple ID'. Then enter your details.
Note that you don't need to be on an Apple device, or even own an Apple device, to create an Apple ID: anybody, even curious Windows or Linux users, can create an account. You simply have to visit the ID section of Apple's website and click Create Your Apple ID at the top right.

How to set up iCloud: First all you will need to update your device to the latest OS.
Apple advises you to make sure that the device you'll be using iCloud services on is running the most recent version of its respective OS.
If your device is brand-new you shouldn't need to update its OS, although it's still worth checking in case some bug fixes have been released since it was boxed up.
For iPads and iPhones, go to Settings > General > Software Update. iOS will either tell you that the operating system is up to date, or give you details of a newer version and let you download and install it.

How to set up iCloud: Update iOS
On Apple TV, open the Settings app, scroll down and select 'System' and then, under the Maintenance submenu, click on 'Software updates'. Select 'Update Software' and the new update will be downloaded to the Apple TV. After a while you'll see a tvOS update prompt: select 'Download and Install'. Read more about updating the tvOS software on your Apple TV.
To update Mac OS X, click the apple icon at the top-left corner of the screen, and select About This Mac. Click Software Update. You'll see any software updates that are available for your Mac: you can either select them all or choose to only update Mac OS X itself.

How to set up iCloud:
Turn on iCloud on iPad, iPhone or iPod touch
It's easy to switch on iCloud. As with signing up for an Apple ID, this can be done during the setup process for your Apple device, or later on if you declined the option initially.
Partway through the setup process for an iPhone or iPad, iOS will ask if you want to use iCloud. (You'll be given the self-explanatory options 'Use iCloud' and 'Don't use iCloud'.) You'll just need to tap Use iCloud, enter your Apple ID and password, and proceed from there.

How to set up iCloud on iPad
If you didn't activate it during setup, you can go to Settings > iCloud later on, and then enter your Apple ID and password.

How to set up iCloud: Apple TV
Turn on iCloud on fourth-gen Apple TV
Setting up iCloud on the fourth-gen Apple TV is easy. When you first turn on the Apple TV you'll be asked for your Apple ID and password. Fill in your details and you'll be able to access your iCloud for photos sharing, iTunes Match and various other features.
If you didn't enter your Apple ID when you first set up, you can do so by going to Settings > Accounts > iCloud, then selecting Sign In.

How to set up iCloud: MAC OX
Turn on iCloud on Mac
Start the System Preferences app and click iCloud. On the next screen you'll be able to sign in with your Apple ID (or sign out), and tick the iCloud services you want to use on your Mac.

How to set up iCloud: Turn on iCloud on PC
It's a bit trickier, but even Windows PC users can benefit from iCloud services.
You need to download iCloud for Windows and install it. Open the program, and sign in with your Apple ID. As with iCloud on the Mac, you can then decide which iCloud services you want to use: iCloud Drive, photo sharing, Mail/Contacts/Calendars, and internet bookmarks. Put a tick next to the ones that appeal. source http://www.techsfair.com

(1) (2) (of 2 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 253
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.