Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,152,357 members, 7,815,757 topics. Date: Thursday, 02 May 2024 at 05:49 PM

Tealoaded's Posts

Nairaland Forum / Tealoaded's Profile / Tealoaded's Posts

(1) (of 1 pages)

Science/Technology / Top 5 Most Dangerous Computer Virus In History by tealoaded: 2:52pm On Jan 26, 2017
The earliest computer viruses were pretty tame for example very earliest virus "Creeper" which just displayed the message " I'M A CREEPER : CATCH ME IF YOU CAN" were innocuous experiments in computing. Before starting with 7 Most destructive viruses in all time History . I would like to talk about very first Computer Viruses of Mac and Pc's


I think if you are a computer geek you might have some idea about Elk Cloner and Brain. When we talk about 90's, mostly viral viruses are floppy disk based and were carried from computer to computer by human hands.

Do you know how exactly did the first virus spread around the globe? And who invented it ? Well it depends on for which platform we are talking about, it can be Mac or PC . The first Apple virus was a teenager's prank.

Elk cloner : He took two weeks to write this "residue", in assembly language. The program is called as Elk Cloner. It was a boot sector virus, when an uninfected disk was inserted into an infected computer. The computer creates a clone of Elk cloner into Floppy disk which makes. The virus caused subtle errors until 50th time you inserted the disk into a computer. In this virus instead of game starting following poem came on the screen.



" Elk Cloner : The program with a personality
It will get on all your chips Yes, it's Cloner! It will stick to you like glue It will modify RAM too Send in the Cloner!"'



1

Brain : The first widespread virus for an IBM PC operating system was called as Brain. Like Elk Cloner, it was also boot sector virus. Pakistani brothers Basit and Amjad Farooq Alvi develop Brain in 1986. At that time both brothers have not heard about Elk Cloner. Alvi brothers said they developed the Brain virus to punish and track piracy of their medical software for the IBM PC. Like Elk Cloner, it was harmless annoying, and it didn’t destroy any data, moreover the infected boot sector displays following message:


“Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt) Ltd. BRAIN COMPUTER SERVICES 730 NIZAB BLOCK ALLAMA IQBAL TOWN LAHORE-PAKISTAN PHONE :430791,443248,280530. Beware of this VIRUS.... Contact us for vaccination............ $#@%$@!!”


Brain-virus
Image source : Malware wiki

This is all about the very first viruses developed for Mac and PC. Today spreading virus around the globe has become a very easy task. Today getting a computer virus in your PC can be very harmful, it can lead to a complete disaster. Today in this article we have listed 7 most famous and malicious computer viruses that had caused severe damage to real life structure and were very harmful, It accounted billions of dollars to world's economy sector.

1. ILOVEYOU

1
Image Source : Supinfo


Don't go on the name because ILOVEYOU is considered one of the most virulent computer virus ever created and after reading this paragraph even you will accept this fact with no doubt. Reonel Ramones and Onel de Guzman were two Filipino programmers who created this virus.

The virus managed to wreck havoc on computer systems all over entire globe. It has caused damages totaling estimate of $10 billion. ILOVEYOU infected over 10% of the world's internet connected computers. The impact of this virus forced government to to shutdown mailing system to prevent them from getting infected.

Working :

It used social engineering to get people to click on the attachment in this case, a love confession.
The attachment was actually a script that poses as a TXT file, due to Windows at the time hiding the actual extension of the file.
On clicking it will send itself to everyone in the user’s mailing list and proceed to overwrite files with itself, making the computer unbootable.


Fact : The two were never charged, as there were no laws about malware. This led to the enactment of the E-Commerce Law to address the problem.

2. Melissa :

image4903490x


It was named after an exotic dancer from florida, David L. Smith, He created this virus in 1999. It was posted up on alt.sex Usenet group as an infected Word document. This document claimed to be a list of password for pornographic sites. Many people become so curious in knowing password and they clicked on it and downloaded it on their hard disk. On opening it does following things :

Virus will mail itself to the top 50 people in the user’s email address book
This has caused an increase of email traffic.
It led to Disrupting the email services of governments and corporations.
Sometimes It also corrupts documents by inserting a Simpsons reference into them.


Smith was caught when they traced the Word document. The file was uploaded from stolen AOL account, this resulted in arrest of David. The virus reportedly caused $80 million in damages.

Fact : He helped FBI in capturing other virus creators, famous among them the creator of the Anna Kournikova virus. His cooperation saved him and he served only 20 months and paid a fine of $5000 of his 10 year sentence.


3. Code Red
bady
image source : f-secure

It was discovered in 2001 by two eEye Digital Security employees.
It is interesting to know this virus was name Code red because at the time of discovery the pair were drinking Code Red Mountain Dew.
Working :

The worm targeted computers with Microsoft IIS web server installed, exploiting a buffer overflow problem in the system.
It leaves very little trace on the hard disk as it is able to run entirely on memory, with a size of 3,569 bytes.
Once infected, it will proceed to make a hundred copies of itself.
Due to a bug in the programming, it will duplicate even more and ends up eating a lot of the systems resources.

It leaves a message behind on affected web pages, “Hacked By Chinese!”, which has become a meme itself. A patch was later released and it was estimate that it caused $2 billion in lost productivity.


Fact : Total of 1-2 million servers were affected, which is amazing when you consider there were 6 million IIS servers at the time.



4. Sasser
98_20_the-netsky-and-sasser-worms-25-years-of-viruses

In year 2004 Windows has got its first worm. It was created by a computer Science student Sven Jaschan, who is also known for creating Netsky worm. It was an annoying worm as it slows down and crashes the computer, while making it hard to reset without cutting the power. The effect of this virus were incredibly disruptive, It has affected million of computers.



Working :

The worm took advantage of a buffer overflow vulnerability in Local Security Authority Subsystem Service (LSASS),
which controls the security policy of local accounts causing crashes to the computer.
It will also use the system resources to propagate itself to other machines through the Internet and infect others automatically.



Fact : The damage was estimated to have cost $18 billion. Jaschen was tried as a minor and received a 21 month suspended sentence.



5. Zeus
30malware21

It was first identified in year 2009, Zesus is a Trojan horse and was made to infect Windows computers. It has managed to compromise over thousands of FTP accounts and computers from large multinational cooperations including Amazon, Oracle, Bank of America etc. Controllers of the Zeus botnet used it to steal the login credentials of social network, email and internet banking accounts.
Zeus%2BChart
Source
In the US alone, it was estimated that more than 1 million computers were infected, with 25% in the US. About $70 million were stolen and in possession of the ring. 100 people were arrested in connection of the operation.
Fact : In late 2010, the creator of Zeus announced his retirement but many experts believe this to be false.

read more at teazhacked.tk
Webmasters / All You Need To Know About Hacking by tealoaded: 1:04pm On Dec 19, 2016
In this article, I will be explain most of the things you'll need to know to be a hacker and what's it really all

about. But before I proceed, this article is for EDUCATIONAL PURPOSE ONLY, whatever you do with it after this, you are

on your own.

A computer is a device that can be instructed to carry out an arbitrary set of arithmetic or logical operations

automatically. The Internet is run on computers and it connects millions of other computers and here is where we come.



Hacking is identifying weakness or finding vulnerables in computer/smart systems networks and exploiting this found

weakness to gain access to the system. The name of the people who do this is called Hackers.

Types of hackers
A hacker is any skilled computer expert that is capable of breaking into any computer systems and networks using bugs

and exploits.
Hackers are classified based on their intent.
1) White hat Hackers (Ethical Hacker)
2) Black hat Hackers (Crakers)
3) Grey hat Hackers (Ethical/Crackers)
4) Hacktivist
5) Phreakers

WHEN HACKING BECOMES A CRIME:- CYBER CRIME
Cybercrime is a Offence that is committed against individuals or groups of individuals with a criminal motive to

intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or

indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups)

and mobile phones (SMS/MMS)" cc: wikipedia

Common types of Cyber crimes
Computer Fraud:
1)Altering in an unauthorized way
2)Altering, destroying and stealing of datas
examples includes including bank fraud, carding, identity theft, extortion, and theft of classified information.

Cyber terrorism:
Cyberterrorism in general is an act of terrorism committed through the use of cyberspace or computer resources
examples are hacking of information servers during a political election

Cyberextortion:
Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated

denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop

the attacks and to offer "protection".

And here is where the reliever comes in; Ethical Hacking

What is ethical hacking?

Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures

that protect the weaknesses. Ethical hackers must abide by the following rules.

Get written permission from the owner of the computer system and/or computer network before hacking.
Protect the privacy of the organization been hacked.
Transparently report all the identified weaknesses in the computer system to the organization.
Inform hardware and software vendors of the identified weaknesses.

Legality of ethical hacking

Ethical hacking is legal if the hacker abides by the rules stipulated in the above section on the definition of

ethical hacking. The International Council of E-Commerce Consultants (EC-Council) provides a certification program

that tests individual’s skills. Those who pass the examination are awarded with certificates. The certificates are

supposed to be renewed after some time.
Summary

Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.
Cybercrime is committing crime with the aid of computers and information technology infrastructure.
Ethical hacking is about improving the security of computer systems and/or computer networks.
Ethical hacking is legal.


Terminologies and Meaning
Bug: A software bug is an error, flaw, failure or fault in a computer program or system that causes it to produce an

incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made in

either a program's source code or its design, or in components and operating systems used by such programs.

Exploit: is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or

vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or

something electronic (usually computerized).

read more at teazhacks..com
Computers / A Algorithm That Can Predict The Future by tealoaded: 10:06am On Dec 12, 2016
Human can now figure what is likely to happen next based on a image; with little or no effort.

A team of researchers are working on an artificial intelligence that can predict what will happen in the immediate future based on an image. An Al that animate a still image to what is likely to happen in the Future. The algorithm can also produce video on what is likely to happen in next scene.


HOW IT WORKS

Previous systems developed to create predictive videos have worked on a frame-by-frame basis, while MIT's system generates all 32 frames simultaneously.

The frame-by-frame method creates a larger margin of error, say the researchers.

Once the algorithm was able to generate videos, the researchers refined it using a deep-learning method called called 'adversarial learning'.

This involves using two neural networks compete against each other.

In this case, one generating videos, and one determining the difference between the real and the generated videos.

The idea was for the video-generating network to eventually be able to fool the other network into thinking that new videos are real. read more @ teazhacks..com

Computers / How To Access And Control Your Friend's/family Remotely From Your Computer by tealoaded: 9:01pm On Nov 28, 2016
Yeah, you read that right!!!, you can really access another computer through your own computer.

Have you ever wish that you could access your files and document on your home computer when you are in your work office? Or you really wanted to access your computer at work while you are out of the states. Yeah No need to worry any longer, they are varieties of ways you can do that.

Today I will be listing out three downloadable programs/browser based software.

1. Chrome Remote Desktop (Any)
2. Windows Remote Desktop (PC)
3. TeamViewer (Any)

1. Chrome Remote Desktop
Install the Remote Desktop Chrome extension. You can find this in the Google Chrome web store, and it is a free download. Be sure to only install the extension from the Google Chrome team.

You will need to install the Chrome extension on the computer you want to connect to and the computer you are connecting from.
You can install the Chrome extension on Windows, Mac and Linux computers, and virtually any modern version can run it.

Enable remote access. On the computer that you want to connect to, open the Remote Desktop app that you installed in Chrome. Sign in with your Google account if you are not already, and then click the “Enable remote connections” button.

Create a PIN. As an extra layer of security, you can create a PIN that will be required whenever you start a connection. This will help protect your computer even if someone is able to compromise your Google account.

Install the components. Once you create your PIN, the remote connection software will be installed on the computer. You may need to accept these installations, depending on the security settings on your computer.

Disable Sleep mode. You will not be able to connect to a computer that is Sleeping or in Hibernate. Make sure to disable these if you want to connect remotely.
Open the Control Panel and then select Power Options. You may have to switch views to see the icon.
Click the “Change plan settings” link next to your active plan.
Set Sleep and Hibernate to Never. Click the “Save changes” button when you are finished.

Connect to the computer. On the computer you are using to connect with, open the Chrome Remote Desktop app. Click the “Get started” button and select the computer that you want to connect to. You will be asked for the PIN, and then you will be connected.
You will only be able to choose computers that you have previously linked with your Google account.

Use the remote computer. Your remote computer’s display will be shown in your Google Chrome browser. You may experience a slight delay when using the remote computer, as commands need to be sent through the internet in order to reach it.

Click the Disconnect button in the top menu to end the connection.
Use the Send Keys button to send key commands to the remote computer, such as Ctrl + Alt + Del and Print Screen.

Share your screen temporarily. If you want to share your screen with someone on a temporary basis, such as for technical support, you can use the Remote Assistance option. Click the Share button on the Chrome Remote desktop main menu, and then copy the code that is displayed. Give this code to the person that is assisting you, and they will be able to connect through the Chrome Remote Desktop app on their computer

2. Windows Remote Desktop (PC)
Enable Remote Desktop on the computer you want to access. On the Windows PC that you want to access, you will need to enable Remote Access so that other computers can connect to it. You can enable this on the Pro or Enterprise versions of XP, Vista, 7, and 8. This method requires that you be on the same network as the computer you want to access, either through the router or through a VPN.
Press the Windows key + Pause to open the System menu. An alternative method is to click the Start menu, open up the Control Panel, click System and Security, then click System.
Click the “Remote settings” link on the left side of the window.
Check the “Allow remote connections to this computer” box. You can adjust some of the advanced options, such as length of time an invitation is good for, by clicking the “Advanced” button.


Add users. You will need to set which users can log in remotely on that machine. Click the “Select Users” button, and then click the Add button. Choose which users you would like to add.

Find the system name. When you connect to the computer, you will need to know the system name. You can find this by pressing Windows key + Pause and looking for the “Computer name” entry.

Disable Sleep mode. You will not be able to connect to a computer that is Sleeping or in Hibernate. Make sure to disable these if you want to connect remotely.

Open the Control Panel and then select Power Options. You may have to switch views to see the icon.
Click the “Change plan settings” link next to your active plan.
Set Sleep and Hibernate to Never. Click the “Save changes” button when you are finished.

Connect to the computer. Log on to the computer that you want to use to connect to the remote computer. Click the Start menu and enter “remote desktop connection” into the Search field. Click it to open it.

Enter in the system name of the computer that you want to connect to.
Enter in the user name that you are connecting with.
Click the “Show options” button to open the advanced options for your connection. You can use these options to tweak your connection to give you the best performance, as well as configure the sound and display.
Click Connect to start connecting to the computer. When the connection is made, the other computer’s display will appear in a window on your computer. You can navigate Windows just like you normally would.

Open port 3389 to allow connections through the internet. If you want to be able to connect to your remote computer directly over the internet, without having to use a VPN, you will need to open port 3389 on the firewall of the computer you are connecting to. This will expose the Remote Desktop to the internet, meaning potentially anyone access it. For this reason, it is highly recommended that you have a very strong password.
To find out how to open ports on your router, check out this guide.
Once you open port 3389, you will be able to connect to the computer by entering its public (external) IP address. To find the public IP address, check out this guide. Remember, you will need the IP address of the computer you are connecting to.

Connect to your remote desktop with a smartphone or tablet. If you are running Windows 8 0r 8.1 Professional, you can connect to your remote desktop through the official Microsoft apps on iOS and Android. You will need to have Remote Desktop configured on your computer.



3. TeamViewer (Any)
Download TeamViewer. This is a free program for home users that allows you to quickly set up a remote connection between your computers. This programs is especially useful for Mac computers, as configuring native remote desktop connections is very tricky and potentially expensive. It is also useful for Mac-to-PC connections and vice versa.

Select a download; there is an all-in-one complete version, or a special TeamViewer Host version for unattended access only.
Besides TeamViewer, there are several other popular programs available, such as LogMeIn, WebEX, LapLink, RealVNC, and GoToMyPC.

Install TeamViewer on the remote computer. When you start the installer, you will be asked if you want to Install or Run TeamViewer. Select Install to configure TeamViewer on the computer, allowing you to connect to it anytime.

Check the “Show advanced settings” box.
Select “personal/non-commerical use”.
Read and accept the license agreement.

Configure TeamViewer for later remote connections. Make sure “Yes” is checked before continuing the installation. TeamViewer will be configured so that you can connect to it from any computer over the internet.
Make sure that “Full access” is checked so that you can access the computer remotely without having to approve it on the remote computer.


Start the “Unattended access” setup process. After installation is complete, the “Unattended access” wizard will start. Follow the steps laid out in the wizard to complete the setup.
You will need to give your computer a name as well as a password. Make sure that the password is strong to prevent unwanted intruders.

Create a TeamViewer account. This will allow you to quickly see which of your remote computers are online and available to connect to. Once your account is created, you will see your computer appear on the list in TeamViewer.

Keep TeamViewer running. TeamViewer will need to be running in order to connect to that computer. TeamViewer runs in the background, and takes minimal system resources.

Connect to the computer remotely. Once TeamViewer is configured on the remote computer, you can connect to it from another device. You can do this by logging into the TeamViewer website and connecting through the browser, or by downloading and installing the TeamViewer program on that computer.
You will need to log in and use your password to connect to the remote computer.

Read more at teazhacks..com
Computers / How To Delete Yourself Completely From The Internet With Just A Click by tealoaded: 8:41pm On Nov 28, 2016
A swedish website is offering everyone a chance to erase all their online activities the with a click button. Once you simply input your email and password then all internet traces linked to the email will be erased completely.

The service is called Deseat.me, it was designed by two swedish researches.Using Google’s OAuth protocol to access users’ data, it then provides them with delete links for each of their accounts, enabling the user to wipe the slate clean.

read more on teazhacks..com

Religion / WTF: Nigerian Pastor Dr. Sign Fireman Arrested Over Ritual Murder Of A Virgin Gi by tealoaded: 6:18pm On Jan 08, 2014
Welcome back.... it tealoaded bringing you ahead of the latest gist of all time
but it seeks we would be starting this year with a tremendous news of a Controversial Lagos miracle pastor Pastor Ofuche Ukoha, popularly known as Dr. Sign Fireman, has been arrested by Lagos police over alleged ritual murder of a 12 year old girl.

"Sign Fireman has been implicated in a ritual murder scandal involving a boy in his church who strangled a 12 year old girl while trying to obtain feces from her for ritual purposes.

The disclosure of Pastor Fireman's involvement in the scandal was made by an eighteen year old boy paraded by the police in Lagos. The teenage suspect stated during the parade that he was sent on the ritual mission by Pastor Fireman.

He said he had always dreamt of becoming rich and had approached the pastor personally, after years of attending the church without his own financial miracle happening, Mr. Fireman reportedly told him the way to get his Sign for finance was to get the feces of a virgin girl. The suspect said Pastor Fireman promised him a reward of N100,000 for the assignment.

The suspect narrated how he sought and killed the 12 year old girl simply named "Bose", the daughter of poor lady on his street.

Confirming the incident to a Lagos correspondent this morning, Lagos Police PRO, Mrs. Ngozi Braide said Pastor Fireman was arrested on Tuesday five days after he was declared wanted by the police. She said investigation has commenced regarding his involvement.

She also said the outcome of the investigation would soon be made public.

With his church receiving hordes of miracle seekers every weekend, Pastor Fireman's church auditorium at Aguda, Surulere area of Lagos is reportedly notorious for using semi nude ushers

see more @ tealoaded..com

U AR WELCOM grin

Religion / Re: 'bloodshed Will Occur In Nigeria On January 25' - Prophet by tealoaded: 2:33pm On Jan 04, 2014
funny.... my God is behind me and no evil will ever occur to me *tealoaded..commmmmmmmm*
Politics / Nollywood Star, Desmond Elliot Joins Politics! To Contest Under Labour Party In by tealoaded: 12:00pm On Dec 21, 2013
Nollywood actor, Desmond Elliot has joined the Labour Party.
The actor who is a solid follower of Jimi Agbaje is not only canvassing for him to be the next Governor of Lagos State, but he is also contesting for a seat in the House or Reps. under Surulere constituency, in Lagos. Desmond BB’s status has mostly been around politics lately, here are part of his words on BB;



Well, I want a better and more comfortable LAGOS. I’m willing to exchange my ‘in-action’ and ‘silence’ to speak up for a leader who will give me the Lagos of my DREAMS.



I have established that making Jimi Kolawole Agbaje governor, is one of my priorities and I’m off to work on that. Join the MOVEMENT!!Its JAYKAY 2015 The hope has begun”.

Religion / Pastor Chris Is In Hell Trouble by tealoaded: 3:01pm On Dec 12, 2013
JUST SEEN THIS PICS POSTED BY HIS CHURCH MEMBER <NAME WITHHELD> AND I FEEL LIKE TO SHARE IT WITH THE NAIRALANDER.

Celebrities / Maheeda At It Again But This Time Its The "Pie" by tealoaded: 5:37pm On Dec 11, 2013
Hmmm...Maheeda has shown over and over again, like Lady Gaga, that she has no limits. See the pic she tweeted today. 18+ o biko. Like other Maheeda photos, it's not suitable for work place...continue.

- See more at: http://tealoaded..com/2013/12/maheeda-at-it-again-but-this-time-its.html#sthash.6DjCf59h.dpuf
Religion / Prophet T.b Joshua's Synagogue:the Busiest Tourist Destination In Nigeria by tealoaded: 1:13pm On Dec 10, 2013
Apart from the 120 different nationals of Caucasoid, Mongoloid and Negroid descent, who live and work at The Synagogue Church of all Nations, thousands also throng this wonder on earth every week to behold the man in The Synagogue, Prophet T.B Joshua.
It is from these nationals that the four “wise men”, namely, Wiseman Harry from Greece, Wiseman Racine Bousso from Senegal, Wiseman Christopher Orji from Nigeria and Wiseman Daniel Emelandu, also from Nigeria, emerged as subordinates, but equally anointed men of God to Prophet Joshua.

prophet-tb-joshua

This move is seen worldwide as one of the biggest achievements of the church apart from the miracles which even the Wisemen perform. And till date, the church remains a spectacle in Nigeria.
In one of its releases, under the gangling former DG, Nigerian Tourism Development Corporation, Otunba Segun Runsewe, stated that over 60,000 people from all over the world come to The Synagogue every year on scheduled visits. Every week, guests from all over the world come in groups and batches for some sort of pilgrimage at The Synagogue. Sandra Du Plissés, from South Africa, told our correspondent that whenever she wants to feel heaven, she comes to Synagogue in Nigeria. Her opinion, you may say, but there are several others like her who we encountered at The Synagogue. Visiting The Synagogue is not a bed of roses; it starts by the intending “pilgrim” sending an e-mail to the church for approval. Some get approved while others don’t. On approval, the visitor pays up front for his food, accommodation. At the supermarket and the bookstore at The Synagogue, the Dollar is a legal tender. Airport bus shuttle, intra city transportation, visits to the Prayer Mountain and the church, seminars and workshops are part of the excursion. Talking about the Prayer Mountain, it is a resort completely tucked away from the church at Agodo Egbe. It is a swampy area which has now been dredged and is navigable. While clearing the place, the animals in the bush and the fish in the water were left to live normally in their natural habitat. So, the tourists who come to this place feed the monkeys in the forest, roll on the white sand at the waterfront and generally feel the touch of nature while seeking spiritual answers to their numerous questions. At any point in time, it is not uncommon to see a squatting Thai, an American, South Africans, Koreans and some other Europeans and South Americans strolling up and down the superlative edifice known as The Synagogue Church of All Nations.

Health / Rivers State Has The Highest HIV/AIDS Rate In Nigeria– FG by tealoaded: 1:27pm On Dec 09, 2013
The Federal Government has released the 2012 National HIV/AIDS and Reproductive Health Survey-Plus which indicates that Nigeria now has HIV prevalence rate of 3.4 per cent.

The annual survey, which was conducted to monitor the HIV/AIDS epidemic among the country’s population, also monitors other sexual and reproductive health indicators.

Rivers State is leading other states of the country with a prevalence rate of 15.2 per cent.

The Minister of Health, Onyebuchi Chukwu, who was represented by the Permanent Secretary of the ministry, Mr. Sani Bala, at the national dissemination of the findings of the survey in Abuja on Thursday, said the results from the survey was a reflection of the efforts by the Federal Government in the fight against HIV/AIDS in the country.


The survey indicated that, “Compared with the 3.6 per cent in 2007, about 3.4 per cent of Nigerians are currently living with HIV/AIDS, with 3.2 per cent in urban and 3.6 per cent in the rural areas; 2.9 per cent among young people aged 15-19 years.”

Taraba State ranked second with a prevalence rate of 10.5 per cent, followed by Kaduna State with 9.2 per cent; Nasarawa state, 8.1 per cent and the Federal Capital Territory with 7.5 per cent.

Ekiti State, however, has the lowest prevalence rate of 0.2 per cent; Zamfara State, 0.4 per cent; Bauchi State, 0.6 per cent; and Ogun State, 0.6 per cent.

The Rivers State government however expressed doubts over the statistics

Speaking to journalists, the Technical Assistant to the Rivers State Commissioner for Health, Dr. Nyemenim Michael said, “Rivers state has had a prevalence rate of 3.1per cent but today, we are seeing a prevalence rate of 15.2 per cent. We are terribly worried and alarmed by these figures. This is because, to the best of our knowledge, these figures do not reflect the true health position. Not from our hospital services, not from activities we have in our outreach programmes.”

Meanwhile, the Integrated Biological and Behavioural Surveillance Survey has said the HIV/AIDS prevalence rate among the rank and file of the Nigeria Police is now below the national average.

The IBBS showed that the rate dropped to 2.6 per cent in 2010, compared to 3.5 per cent in 2007.

The National Coordinator, Police Action Committee on AIDS, Dr. Grace Okudo, a Commissioner of Police, disclosed this in interview with journalists on Friday in Abuja.

She said, “We are proud to tell you that the efforts by the Nigeria Police Force to keep its rank and file free from HIV/AIDS are yielding fruits. The HIV prevalence in the Nigeria Police was 3.5 per cent in 2007. But because of our consistent efforts, it reduced to 2.6 per cent in the 2010, which is far below the national average.”

visit my page at tealoaded..com


PUNCH

Celebrities / “the Sex Tape Just Took Me To Another Level In My Career” – Chidinma by tealoaded: 2:18pm On Dec 07, 2013
In a recent interview with Nonye Ben-Nwankwo of the Punch, Kora award winner and Ex Project Fame winner, Chidinma Ekile, sheds more light on the sex tape controversy and how it actually made her more popular;
You eventually came into the spotlight and it opened doors to controversies and scandals…


I have been in the news lately. My manager told me that I am a balloon on top of lots of needles. People want me to drop on those needles and get deflated. He told me to be careful. The first time was when my nude picture went viral. I actually went for a photo shoot for my friend. I wore a tube dress. Some mischief makers actually cropped off the lower part of the picture and posted it on the Internet. It was as if I was nude. I wasn’t happy at all. I had that picture. I had to post the real picture on the net and people now got convinced the nude picture wasn’t original. I thought that was the end, I didn’t know a bigger scandal was coming…
You mean the sex video?
Oh yes. I woke up one morning and I was greeted on the internet with ‘Chidinma and sex tape’. I was worried primarily because of my mother. I didn’t let her see the video but I had to show her the photos. I didn’t want to go out that day. I couldn’t go out. But my mum felt otherwise. She told me to ignore the mischief makers. I almost took some actions but I thought against it. I met Sound Sultan on a set. He told me, ‘Babe, you are now a star. I welcome you officially into the industry.’ I trended for three days. Even people who didn’t know me got to know me. My fan base grew. And then, I was happy because more than 90 per cent of the public didn’t believe I was the one in that video. There were people who didn’t need to see the video to believe I couldn’t have done such thing. I am just grateful to everyone who didn’t believe the story. My twitter account was hacked and the people created another account. They kept releasing nasty pictures and they were even responding to the tweets as if I was the one doing it. I was just watching and laughing. It put me in the spotlight. I used it for good.
But such scandal shouldn’t be good for your career…
Ever since I started, I have been scared of scandals. I didn’t want to have any. But I realised that I cannot run away from it. It is just normal. It is not everybody who is happy seeing me rise. Some people are trying to do something to stop me. But sex tape is not enough to stop me. They should bring up something else. The sex tape just took me to another level in my career. It moved me up. This is no more ‘little’ Chidinma. It didn’t bring me down in any way. I am still doing a lot of things

please drop your comment below

see more @ tealoaded..com

Celebrities / Re: NBC Bans Several Songs Including Wizkid's Caro, Phyno And Olamide's Ghost Mode, by tealoaded: 2:04pm On Dec 07, 2013
tealoaded:
According to Beatfm On-Air-Personality Gbemi Olateru-Olagbegi, NBC has banned several Nigerian and foreign songs/videos for either 'obscene lyrics or visuals'.

see more @ tealoaded..com

Celebrities / NBC Bans Several Songs Including Wizkid's Caro, Phyno And Olamide's Ghost Mode, by tealoaded: 2:03pm On Dec 07, 2013
According to Beatfm On-Air-Personality Gbemi Olateru-Olagbegi, NBC has banned several Nigerian and foreign songs/videos for either 'obscene lyrics or visuals'.

Celebrities / Olamide And Phyno Dominate The Headies 2013 Nominees List! + Full List Of Nomine by tealoaded: 5:57pm On Dec 05, 2013
The Headies 2013 nominee's list is out.
The year in review is from March 2012 - June 2013.
See if your favorite artists made the list and tell us what you think.



BEST RECORDING OF THE YEAR

A non-voting category for the best single recording by an artiste or group in year under review.

I WISH – WAJE
GOOD MORNING – BRYMO
NATURAL SOMETHING – SOUND SULTAN
THIS YEAR - JAYWON

PRODUCER OF THE YEAR

An individual responsible for producing the most acclaimed song or album in the year under review.

PHEELZ - DUROSOKE
DTUNES – SHO LEE
DEL B – LIMPOPO
LERIQ – LIKE TO PARTY
LEGENDURY BEATS – EMI NI BALLER

BEST MUSIC VIDEO

A voting category for the best conceptualist, best directed and most exciting video in the year under review. This award goes to the video director.

ALINGO – JUDE OKOYE/CLARENCE PETERS
OLIVER TWIST – SESAN
GAGA CRAZY – AJE FILM WORKS
AZONTO– MOE MUSA
YES/NO - CLARENCE PETERS

BEST R&B/POP ALBUM

A category for the best R&B/Pop Album in the year under review (by single individual or group).

IYANYA VS. DESIRE – IYANYA
O.B.O. – DAVIDO
R&BW – BANKYW
BLESSED – FLAVOUR
AWAY & BEYOND – 2FACE

BEST R&B SINGLE

A category for the best R&B single in year under review (by single individual or group).

DON’T LET GO – CAPITAL FEMI
GOOD GOOD LOVING – BANKYW
LIKE TO PARTY – BURNA BOY
RICH & FAMOUS – PRAIZ
OMOTE – ESE PETERS

BEST POP SINGLE

A category for the best pop single in year under review (by single individual or group)

IHE NE ME – 2FACE
The KICK - WANDE COAL FT DON JAZZY
GOBE – DAVIDO
CATCHING COLD – TUNDE EDNUT
UR WAIST – IYANYA
GOODY BAG – D’PRINCE

BEST REGGAE/DANCEHALL SINGLE

A category for the best Reggae/Dancehall single in year under review (by single individual or group).

I WISH - WAJE
RIHANNA - OREZI
GIVE IT TO ME – GENERAL PYPE
GO DOWN – BABA DEE

BEST RAP ALBUM

A Non-Voting Category for the Best Album By A Rap Artiste Or Group In Year Under Review.

OGA BOSS – ILL BLISS
THE SECOND COMING – VECTOR
YBNL – OLAMIDE
BOOK OF RAP STORIES – REMINISCE

BEST COLLABO

A voting category for the best R&B, Pop or Hip-hop collaborative track (including cameos).

GHOST MODE – PHYNO FT. OLAMIDE
TONY MONTANA (REMIX) – NAETO C FT. D’BANJ
BADDEST BOY – EME FT. WIZKID, SKALES & BANKYW
EZIOKU – LYNXXX FT. IKECHUWKU, ILL BLISS & PHYNO
EMI NI BALLER – CHIDINMA FT. SUSPECT & ILL BLISS
BABY MI DA (REMIX) – DR. VICTOR OLAIYA FT. 2FACE

BEST RAP SINGLE

A voting category for a single (released on-air) recording of a rap.

MAN OF THE YEAR – PHYNO
ANAM ACHI KWANU – ILL BLISS FT. PHYNO
DUROSOKE – OLAMIDE
2 MUSSHH – REMINISCE
GHOST MODE – PHYNO FT OLAMIDE

BEST VOCAL PERFORMANCE (MALE)

A non-voting category for the single male artiste with the most outstanding vocal performance on a single song or album.

RICH AND FAMOUS – PRAIZ
OMOTE – ESE PETERS
DON’T LET GO – CAPITAL FEMI
YES/NO – BANKYW

BEST VOCAL PERFORMANCE (FEMALE)

A non-voting category for the single female artiste with most outstanding vocal performances on a single song or album.

I WISH – WAJE
TOH BAD – NIYOLA
IRAWO - SEYI SHAY
TOTALLY YOURS - ZAINA
ONLY YOU – NIKKI LAOYE

NEXT RATED

This category is a voting category for the most promising upcoming officially unreleased (or signed) act in the year under review.

SEAN TIZZLE
DAMMY KRANE
BURNA BOY
SEYI SHAY
PHYNO

HIP HOP WORLD REVELATION

A voting category for the best new artiste in the year under review.

W.A.J.E – WAJE
OMO BABA OLOWO – DAVIDO
FRENZY – D’PRINCE
THE YEAR OF R’N’B – CAPITAL FEMI

LYRICIST ON THE ROLL

A non-voting category for the Rap Artiste with the best lyrical depth and performance on a single song or album.

OLAMIDE – VOICE OF THE STREETS
BOOGEY – SANCTUM
MODE 9 – LET IT GO
PHYNO – MAN OF THE YEAR



BEST STREET-HOP ARTISTE

A voting category for the artiste whose songs are inspired by the streets. Such song should captain lingua, which may also be originated by the artiste and popular on the street.

TERRY G – RUN MAD
DUROSOKE – OLAMIDE
MY DEAR – DAMMY KRANE
SKIBO – SOLID STAR
ALAYE – LKT

BEST ‘ALTERNATIVE’ SONG

A voting category for the artiste whose songs reflect any form or style of music which falls outside the mainstream of recent or past popular musical trends.

REPETE – BLACKMAGIC
OMO PASTOR – AJEBUTTER FT. BOJ
FEEL ALRIGHT - SHOW DEM CAMP FT. BOJ & POE
THIS YEAR - JAYWON

ALBUM OF THE YEAR

A voting category for the best album (solo or group) in year under review, that meets judges requirements of excellence (in every realm: Songwriting, production, rendition and promotion) and acceptability (Sales and popularity).

IYANYA VS. DESIRE– IYANYA
O.B.O. – DAVIDO
R&BW - BANKYW
BLESSED – FLAVOUR
YBNL – OLAMIDE

ARTISTE OF THE YEAR

Most critically and commercially adjudged artiste in the year under review. Overall most successful artiste for the year under review.

why dont you take your time and check my website tealoaded..com
Nairaland / General / Nnamdi Azikwe International Airport, Abuja Closed Temporarily! by tealoaded: 5:09pm On Dec 05, 2013
The Nnamdi Azikiwe International Airport in Abuja has been temporarily closed by officials of the Nigerian Airspace Management Authority, NAMA, following the breakdown of a Saudi Arabian Boeing 747 cargo plane on the runway of the airport last night. The airport authorities say the plane, which veered after landing at the airport, has to be fixed before it can be evacuated from the runway.

This closure has adversely affected all flights that are Abuja bound as well as those that were billed to travel to other parts of the country. Many Abuja bound passengers are now stranded. Pic above shows passengers stranded at the airport in Abuja this morning.

Celebrities / Police Uncover Another Baby Factory In Imo! Rescues 16 Pregnant Teenage Girls by tealoaded: 2:46pm On Dec 04, 2013
The Police Command again has uncovered another baby-making factory in Egbu, near Owerri the State capital, arresting the proprietor, one Dr. James Ezuma who runs a Non-Governmental Organization (NGO), and a clinic. 16 girls were rescued in the process. The girls were kept in two rooms in the building that houses his NGO, with no windows while repulsive odour oozed out from their rooms
The girls, aged 14-19 were encouraged to get pregnant and take home the sum of N100,000 at delivery, on the condition that they would abandon their babies who would be eventually used for purposes ranging from child trafficking to rituals.

The commissioner of Police has warned the general public to endeavour to keep an eye on their girls so that they would not fall prey to such miscreants like Dr. Ezuma, who does not mean well for the society.

One of the girls who spoke amidst tears said, her boyfriend rejected the pregnancy and was directed here by her aunt. She said though she was given N100,000 after delivery, on the promise that they would train her baby, but she never knew her baby would be sold to unknown persons even without her consent.

Also speaking, another victim, 18 year old Blessing A. who came from Lagos, told journalists that she became stranded when she got pregnant, but was directed to the place with the promise that her child would be taken care of.

The suspect while speaking to journalists insisted that he was not into child trafficking, and that the child was given out for adoption on the consent of the mother.

Other items recovered from the suspect include, a gun and 10 exotic cars of different models.

Celebrities / Danielle Okeke's Behind: Real Or Fake? by tealoaded: 2:39pm On Dec 04, 2013
yeah how come does grow so fast

see more at tealoaded..com

will appreciate it

Celebrities / We Have Returned The $700m Abacha Looted To Nigerian Government – Swiss Envoy by tealoaded: 6:40pm On Nov 29, 2013
The Government of Switzerland has disclosed that it had returned to the Nigerian government about $700m looted by late military Head of State, General Sani Abacha.


Switzerland Ambassador to Nigeria, Dr. Hans-Rudolf Hodel, made this known in Abuja recently at a press briefing ahead of a two-day seminar on Anti Money Laundering and Combating Financing of Terrorism.



The envoy asserted that the Swiss government was ready to reopen the case if Nigerian government presents concrete evidence of any other money still being held in any Swiss bank, noting that Switzerland had no interest in withholding illicit funds. He said his country had returned about $1.7bn to their countries of origin in the last 15 years.

“Switzerland and Nigeria agreed to request the World Bank to participate in the review of the use of funds, in the framework of a budget control process of various welfare projects,” he said.

He disclosed that his country was yet to receive any request for information on the November 4 Berne Declaration report: Swiss Traders Opaque Deals in Nigeria, which allegedly accused the Nigeria National Petroleum Corporation of conniving with some Swiss-based oil firms of fraudulent deals, worth $6.8bn.

“I have no knowledge that we have been contacted by the authorities. In case they will start proceedings and they will need our help; of course, with international legal cooperation, we will help them if they approach us. But until now, they have not approached us,” he said.


why don't you come on and visit my page @ tealoaded..com
Celebrities / Beyonce 'banned' From Visiting The Egyptian Pyramids After Her 'stupid And Rude' by tealoaded: 6:32pm On Nov 29, 2013
She is adored by her millions of fans and has even earned the nickname Queen B.

But Beyonce failed to impress the man known as Egypt's Indiana Jones when she visited the country in 2009.

Zahi Hawass, Egypt's former head of antiquities, claims he banned the singer from visiting the Pyramids after her ‘stupid and rude’ behaviour.

The star visited Egypt back in 2009 as part of her I Am... Tour, where she toured the pyramids with Hawass.

But according to the Huffington Post, the controversial archaeologist bad-mouthed the star to local reporters back then, allegedly calling her a 'stupid person' who 'doesn't understand a thing'.

Now, in a new interview, Hawass, 66, claims the Love On Top singer arrived late for her tour of the ancient site.

'Most people I take on tours are very nice and we become friends. But this lady...,' the former minister of state antiquities told The Independent.

'She said she would come at 3pm but she came late. I said "You have to say I'm sorry I'm late". But she didn't open her mouth,' said Hawass, who is described as the 'gatekeeper' of the pyramids.

The last straw came when Beyonce's photographer allegedly almost hit Hawass.

'I brought a photographer and she also had a photographer and a guard. When my photographer started to shoot, he said "No, Stop! I am the one who says yes or no, not you!"
'I said: "In that case since you almost hit my photographer and you are not polite - out! I am not giving you the privilege of having you on my tour!" I said Beyoncé was stupid and I left.'

'This never happened,' said the rep. 'The last time she was in Egypt was on tour in 2009. Nothing like this happened. Lies and more lies.'
Hawass is a controversial figure who has been criticised for his love of the spotlight.

During the interview, he boasted about his fame.

'People attack me because I am famous. When I took President Obama to Giza, the camel driver recognised me and he asked "But who is the friend of Hawass?" When I gave a lecture at your Dome of the Millennium 1,700 came to hear me. Bill Clinton got 700.'


Hawass is currently under investigation from the US Justice Department for allegedly accepting a $200,000-a-year pay packet from National Geographic to allow the magazine access to the Pyramids and other sites.

He is also branching out into fashion.

According to Vanity Fair, he has launched a clothing line that focuses on khakis, leather jackets and denim shirts, with profits said to be going to the Children’s Cancer Hospital in Cairo.

why don't you come on and visit my page @ tealoaded..com

Politics / INCREDIBLE!! Sokoto Govt. Plans Mass Wedding For 250 Widows, Widowers! by tealoaded: 2:00pm On Nov 26, 2013
The Sokoto State Government said on Sunday that it would give out in a mass wedding, 250 widows and widowers across the state to give them a new lease of life.
Alhaji Zubairu Goronyo, the state Commissioner for Social Development, who announced this at the screening of the beneficiaries in Sokoto, said that the venture would gulp N30 million.
According to him, a date will soon be fixed for the exercise.
A correspondent of the News Agency of Nigeria, NAN, who witnessed the screening that was done to establish the health status of the beneficiaries, reported that it was handled by various committees.
Alhaji Zubairu said that beds, mattresses, sets of chairs, curtains and two sets of female wrappers would be given to each of the 125 brides.
He said that similarly, the grooms would be given two sets of guinea brocade, N20,000 each as dowry to formalise the marriage agreement, and another N20,000 each to boost their businesses.

see more @ http://tealoaded..com/2013/11/incredible-sokoto-govt-plans-mass.html

(1) (of 1 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 129
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.