Welcome, Guest: Register On Nairaland / LOGIN! / Trending / Recent / New
Stats: 3,195,597 members, 7,958,839 topics. Date: Thursday, 26 September 2024 at 04:56 AM

TrillionBrains's Posts

Nairaland Forum / TrillionBrains's Profile / TrillionBrains's Posts

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (of 13 pages)

Phones / Re: Why You Need To Choose Infinix Over Samsung! by TrillionBrains(m): 2:22pm On Aug 15, 2017
Just wish you knew the reason behind the cheapness of all these Chinese phones moving up and down in the Labour Market
Phones / Re: How To Choose A Smartphone That Is Smart For You by TrillionBrains(m): 2:18pm On Aug 15, 2017
The major problem we often encounter choosing appropriate Smartphone for our consumption might just lie on our inability to leave behind some certain myths about Smartphones which we hold on to. How about the issue of Protecting your privacy against attacks through your Smartphone

1 Like

Science/Technology / Trick To Easily Convert Text To Audio Using Notepad by TrillionBrains(m): 2:08pm On Aug 15, 2017
Everyone loves to hear what is written in a paragraph or in a document. This is the reason why the audio books are getting popular nowadays. In this article, I will show how you can convert text into audio using the Notepad.
Why Use Notepad?
Because it is the most commonly used text editor everyone uses. That’s the reason. There are other editing apps like; the notepad++, Komodo edit, but we will be making use of notepad today. Here we will be creating an application using notepad to make computer speak what you type with the help of few Basic lines of HTML codes.

STEP 1:
Open Notepad Program in your Window PC.

STEP 2:
Now, Copy the following program below this thread and paste it in Notepad or any other editing apps.
https://4.bp..com/-oDtByMeHWr4/WD1wWAkm-wI/AAAAAAAAAbI/E-Xhdo8Vdncrwg5yDJIt5Yo1aq8xD00jQCLcB/s640/convert-text-into-audio-768x461.png

STEP 3:
Now let’s save the code we entered above. The code has to be saved in .hta format rather than standard .txt format.

STEP 4:
Navigate to the location where the code/file is stored and just double-click on the saved file and Enter the text you want to hear in the text box. The moment you click the Listen button, you can hear the text you entered as Audio.
https://4.bp..com/-M0EfVh8gnXM/WD1xWEJ9kDI/AAAAAAAAAbY/f7fV2YJw8VYclhIYPx0ugDGyZ4LigYKxQCLcB/s640/create-application-for-converting-text-into-audio-using-notepad.png

And that was the trick I used to get to convert most of my text to audio files, never Rocket Science. Don't forget to indicate if it worked for you and if eventually, you encountered any difficulty on the way, also feel free to comment below.

Culled from: - http://www.trillionclues.com/2016/11/how-to-convert-text-into-audio-using.html

TV/Movies / Re: Pay TV Revolution: Nigerians To Save N9.34tr From Subscription by TrillionBrains(m): 2:05pm On Aug 15, 2017
That's welcome news if only it is going t help elevate the technology mindset of we youths and our pulse towards innovation
Phones / Re: 6 Tips For Making Safe Mobile Transactions by TrillionBrains(m): 1:59pm On Aug 02, 2017
Internet security as a whole should be looked into especially in our country Nigeria. We connect to public hotspots unnecessarily, click on fishing emails and engage in unsecured transactions with strangers, download third party online transaction applications what more. When these guys get your Banking details - Boom! you are gone. Trillionclues
Science/Technology / Must-watch TED Talks Of 2016 - Ideas Worth Spreading by TrillionBrains(m): 1:13pm On Jul 22, 2017
During the already gone year, there were series of different enticing and captivating TED talks by different individuals.

In case you don’t know, TED is a media organisation which posts talks online for free distribution, under the slogan "ideas worth spreading". TED was founded in February 1984 as a conference, which has been held annually since 1990.

It ranges from different topics on several niches across the Globe. Issues on Infrastructure, Technology, Innovations and Internet breakthrough are some of the major led talks on TED.

We, therefore, made a compilation of the best top 10 TED talks of the year 2016. These were selected based on our preferences of user opinion, the max engagement of the given talk and other clear factors.

[Can we build AI without losing control over it]
By Sam Harris


More of a question-like talk.
We all know and are aware of the current breakthrough in the technology industry. Sam Harris recognised the fact that someday, we may get to build machines that are smarter than we are.

He, therefore, stressed the fact that in the case of building machines (gods) that are smarter than we are, we get to make sure that they are gods we can live with. A great talk indeed.

[Gene Editing can wipe out mosquitoes forever]
By Jennifer Kahn


More of a suggestion based talk.
We all acknowledge the fact that mosquitoes are a very bad enemy to mankind, and have caused thousands of so many deaths.

She, therefore, outlined the risk involved in carrying out gene editing. Though they may be a frightening act to talk on but more or less worth the risk taking.

The secret to effective nonviolent resistance]
By Jamila Raqib


More of a kick towards eradicating violence.
She stressed the need to give war-affected regions a real tool that its use is powerful and as powerful as violence itself

We are therefore not just going to tell them that the war is over, instead, we must offer them a tool as outlined above.

Seven (7) more TED talks below:

http://www.trillionclues.com/2017/07/must-watch-top-10-ted-talks-of-2016.html

Science/Technology / Re: Anonymous Hacker Pulls Plug On Thousands Of Dark Net Sites by TrillionBrains(m): 10:39am On Jul 12, 2017
Aashik:
@Trillionbrains
Please I will like to chat u up on whatsapp regarding some issues am having regarding some installationsinstallations on my sys. I will thankful if u can profer solution. Thankz 07036488448

Just checkout trillionclues.com. Use the contact form as I think that will be an easy access
Crime / Re: Bankers Arrested For Defrauding Customers Of N150m by TrillionBrains(m): 10:07am On Jul 11, 2017
Hmm, many things are happening nowadays so one need to be away of the online attacks and threats. I recently made an article on 8 untold steps to protect or erase your personal Information Online
Science/Technology / Public Hotspots: The Different Ways They Harm You by TrillionBrains(m): 10:00am On Jul 11, 2017
So says the Old adage - "The best things in life are free" – and that should apply to "Wi-Fi too. But did it ever occur to you that using free Wi-Fi exposes you to a range of threats, internet insecurities and your whole chunk of data saved online?

You may be an authority in your niche or any social media platform, but it does not restrict you to being open to hacks and online breaches when it comes to connecting to open, free and unsecured networks. We recently made a blog post on the new release of Facebook's new Wi-fi discovery feature. It may be considered a major upgrade to our world of internet connectivity, but it still does not cover the threats it exposes any individual that uses such connection. Facebook itself might be nurturing the motive of connecting a whole lot of "internet-access challenged Countries", but yet the issue of internet security is been waved aside without caution.


Bring in the issue of Mobile smartphones being the most widely used among individuals, their is still a very long way to go. Express VPN published the three best Browser extensions to stay anonymous, a major fight against internet threats.

You Risk Exposing Information To Hackers


This is a major headache encountered by individuals from attacks. Information here can range from Online Banking details. I received a text/mail from a so-called number with a very strong call to action that goes like this:

Hello Sir, this is to notify you that your bank account have been deactivated by the Central Bank Of Nigeria (CBN) due to your failure to comply with the Bank verification Number (BVN) system. You are therefore charged to en-devour to call the above number for clarification and retrieval of your account. You can also forward your account details to the following Email *Email here*. Act before it is late!

In a situation whereby a newbie is charged with the above information. 85% or more is likely to fall the Phisher. It is therefore necessary to withhold from any form of message like this and to call your Bank directly.

Social media is another platform that is likely to prove vulnerable to Information attacks. Making use of a unsecured Wi-fi and also using your social media account on a phone other than yours to enter your passwords and Usernames - never a good act. Other information exposure acts might come in form of Emails where you're expected to follow the link below to a given page. It is always advisable to copy the link to your clipboard before hitting the enter button.

Man - In - The - Middle- Attacks


This is a phenomenon whereby a Hacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other. In recent times, this has become a common feature among Hackers. A clear example is the use of Facebook for this purpose.

The Hacker here send a link to the targeted which looks like a real and secured page, usually something like this - http://www.facebook,com/xyz2345&^$fro(7y457)5437gtrafficgetResponse. The targeted being unaware of the threat clicks on the link which takes him/her to another legitimate page also but Phished page also bearing the popular Facebook Logo with a box to enter his/her details.

Rogue WiFi Networks


Here, a hacker sets up a fake network that presents itself as a legitimate network to steal information from unsuspecting users who connect to it. Have you ever seen strange WiFi names like - Kac6^^V2 or $sen(MoveOver? sure they are likely to be them. What this group of Hackers do is to setup real-looking but Fake WiFi signals and if you're not careful, you fall to their traps.


All they have to do is to setup a Malicious WiFi network using some coding skills and Boom! your data and personal information is in their Palms. Abstain from any WiFi network that is not connection from your PC to your Phone.

Packet Sniffers



A sniffer program is one used by Hackers which involves targeting your packets of transmitted data over an unsecured WiFi. Imagine yourself connecting to that free WiFi you just discovered; sure you're not going to let it go and waste just like that.

Any data shared through any unsecured connection be it Wifi or Mobile network is prone to attack and sniffing by a Hacker. Data ranging from your Passwords, school information, online transactions to Banking details are all prone to Sniffing. Get yourself your own mobile connection.

Social Hacking


We all fall to it. Cafe Visitors, this is for you. Also called Social Engineering. This one now does not have much to do with you connecting to free Wi-fi network, but your ignorance and over curiosity to handle circumstances. Firstly, if you don't have a USB drive - go get one and save yourself from this form of attack. There is also a post by kaspersky giving detailed reasons on why you should not fear connecting to public hotspot; a total different mindset on its own.

Now, this one is been carried out by the Hacker leaving a malicious USB or pen drive on a cafe table for an unsuspecting, curious customer to insert it into his/her device. From there on, the Hacker then captures sensitive information through malware - and they have your data with them.

Having seen the different ways by which public and free WiFi can harm one and the dangers associated with it, it is better still to handle your own personal network and in the process avoid the threats this form of connection can bring to you. Leave a comment if you or a friend have in any way experienced any of the threats listed above.

Culled from:- http://www.trillionclues.com/2017/07/Dangers-of-connecting-to-public-hotspots.html

Sports / Re: Ibrahimovic Grants Lukaku Permission To Wear Man United's No.9 Shirt by TrillionBrains(m): 9:46am On Jul 11, 2017
Lol, funny u. So ibra that already has an expired contract is the one granting the permission

6 Likes

Science/Technology / Re: How To Watch TV Series And Movies Free On Android by TrillionBrains(m): 12:45pm On Jul 10, 2017
Lol, that was a nice one you have up there. I also have a post which you might like on how to [url=http;//trillionclues.com]Watch Youtube videos without internet[/url]
Computers / Re: How To Turn Your Windows Pc Into A Tethering Hotspot by TrillionBrains(m): 12:37pm On Jul 10, 2017
Nice article and tutorial you have up there. These are minor things a committed tech user should know and be able to do. I also have a similar post like this on my blog which you might find compelling to you How to turn Windows 10 into Mobile Hotspot.
Science/Technology / Re: Facebook's New Feature Helps You Easily Find Free Wi-fi by TrillionBrains(m): 3:54pm On Jul 04, 2017
Just use the facebook app and follow the above details correctly. Ok?
Science/Technology / Facebook's New Feature Helps You Easily Find Free Wi-fi by TrillionBrains(m): 3:43pm On Jul 04, 2017
Away from home and in need of WiFi to perform quick task? shocked Facebook now offers you that help you need to find it. Before now, this feature was initially only available in a few selected countries.

The Big social network’s “Find WiFi” feature is now available all around the world and the most interesting fact is that- “it has been enabled for Android and IOS clients”. Just fresh from their handy celebration of more than 2 billion monthly connected users . With this recent upgrade, one can now locate and connect to available hotspots and nearby businesses, near you.

You might have been considering how this feature is made possible, Facebook has a way of extracting already saved information that businesses owners and companies have added to their business pages on Facebook.

Mind you, Facebook is not going to reveal every business or company details near you that might have WiFi available features, just those that are on Facebook. This is an essential feature because it is almost impossible to find any business that does not have a page or account on Facebook.
It could still be pretty useful though. Here’s how to go about locating that Wi-fi of yours.

Open the Facebook app on any Facebook enabled gadget and then click the “More” icon.

Select “Find WiFi” tab from the drop-down list of available options
. You might be prompted to turn the feature on if already off.

In a situation you can’t locate the “More” tab, then you may find the feature nested under the “Apps” section. The search results are usually presented as a list, but you can click on the Map button at the top right-hand side of the page to see things on a map as well.
Read Also:- Researcher Discovers 200,00 Open Wifi Cameras

To locate a given WiFi name on Yelp, conduct a search for the type of business you would like to transform into your home office for a few hours and next tap the filter option button in the search bar to narrow down these selections to just those locations that have WiFi enabled.

Facebook are also planning other numerous big projects including efforts via its internet.org arm to expand mobile and online connectivity in emerging markets, infrastructural investments, plans to establish solar-powered drones for more internet connectivity and lots more.

So, its up to us to enjoy these features now while awaiting for an increment in Technology of what these companies has to offer. If ever tried this feature, feel free to let us know through the comment section.

Culled from:- http://www.trillionclues.com/2017/07/facebooks-new-discover-wifi-feature.html

Science/Technology / 7 Smart Ways To Hack-proof Your Smartphone: Worth Checking Out by TrillionBrains(m): 3:04pm On Jun 15, 2017
Protecting your smartphone from vulnerable attacks can be the most daunting task for any smartphone user. Traitors get information from our tweets, texts, documents, pictures and videos of our personal lives that have been scattered all across the internet the internet for all to see. Whether they may be opportunist thefts or sponsored, here are the key ways, you can use to revoke any unwanted access to your expensive smartphone.
Level 1:-
[center]Create Strong Passwords[/center]


This is a common negligence among smartphone users, where some people use passwords such as - 1234, abcd1, Passwords. These are all wrong password settings. Here are they different techniques to step up your password privacy attitude. It is therefor worth consodering to checking the following mediums to create strong passwords:-

Choose Hard to guess passwords
Abstain from using passwords like birthdays, anniversaries or serial number sequences. They are the most obvious and are likely to be the first that hackers will try.
Never use Same Passwords fro all your online accounts
Never!!!, that's the keyword there. Protect your smartphone by using different passwords for each online account accessed by your phone. You can as well create a hidden or secret note on your smartphone and store up your different passwords there like I do; *winks*.
Update your phone's passwords often
Changing your passwords often to keep your phone secure might also help resist attackers. While you need not update them daily, figure out when would be a good time to swap passwords and create something new.

Level 2:-
[center]Adopt a proactive protection mindset[/center]


Start by accepting that sometimes there are people in your life who might want to hack into your personal details for malicious reasons. Failed relationships, people who may not like something you have said and friends who have without cause turned unfriendly may all have something to gain from your personal phone or computer. Keep such matters from happening by:

Save a backup copy of important correspondence:
Any attached files or photos you have on your smartphone should be backed up on your PC or laptop.
Think, don't assume:
Train yourself to stop using your phone for confidential information of any sort and any sensitive information you receive, delete it immediately after reading it, or back it up elsewhere.

Level 3:-
[center]Other Miscellaneous security levels:-[/center]


Be careful of what you install
When you install a smartphone app, you may be asked to grant it different permissions, including the ability to read your files, access your camera or listen into your microphone.
Make it hard for intruders to get in
If a thief gets physical access to your phone, they can cause all sorts of trouble. For a start, your email app probably contains a trove of personal information. Make sure your phone is locked when not in use: both Android and iOS can be set to require a six-digit passcode.
Beware Of Open Wifi
As per written by the Guardian. We all know there’s a risk involved in using an open wireless network. But you may not realise how severe it is: anyone in the vicinity

So, those were smart techniques to handling your smartphone away from intruders and attacks. Sure, we have missed some methods which you might have been using. As usual, let us know in the comment section. I remain Excel from Trillionclues.com

http://www.trillionclues.com/2017/06/smart-ways-to-hack-proof-your-smartphone.html

Science/Technology / How To Unsubscribe Once From Irrelevant Email Newsletters by TrillionBrains(m): 2:43pm On Jun 07, 2017
Having your e-mail inbox filled with all sorts of irrelevant newsletters which you may have subscribed knowingly or unknowingly is just a general problem for all There is no running away from it. I too had the same problem but mine was even more quiet heart breaking. The unwanted newsletters where sending me like up to five mails per day (5mails/day). That was when I started looking for an easy but effective means to unsubscribe from all these mails with a few click of a button other than doing so one after the other.

[center]Unsubscribe to Bulky Useless Email Newsletters[/center]


So without much ado, I bring you information on a site called Unroll.me. A quiet amazing website that will go a long way towards helping unsubscribe form all those unwanted email newsletters of yours. Just follow the below instructions and you are good to go.>>>>>

Step 1:
You have to first visit the website at Unroll.me

Step 2:
Next, you have to click on the sign-up button, which you may locate at the top of your device or also on the page.

Step 3:
Now you have to enter the email account you want to perform the task on, and don’t forget to Tick/Check the “I agree to terms and privacy policy” button, next click on Continue.

Step 4:
Now a pop up window appears asking for permission to access your mails and manage your newsletters. Just click on ALLOW and proceed to the next step.

Step 5:
Next, you are taking to a page or dashboard of Unroll.me where you can click on the “Edit Subscriptions” button from the top right hand side corner to unsubscribe form all these unwanted mails at once.

Well, that was it but I would like to tell you that when subscribing to certain email newsletters online, one has to be careful as some might be super-relevant while some are just not.
So I would like to know your experiences with the service by making use of the Comment section. Also I would be more than willing to help with any difficulty making use of the service. You can see the image below for clear guidance>>>>

http://www.trillionclues.com/2017/06/how-to-unsubscribe-to-irrelevant-email.html

Computers / How To Turn Your Windows 10 PC Into A Mobile Hotspot by TrillionBrains(m): 3:38pm On May 22, 2017
Sharing your PC’s internet connection is easy in Windows 10. The feature allows up to eight devices to get online simultaneously. Here’s how I did it using a PC running the Creators Update. The most common way Sharing one's internet connection with several devices boils down to turning one of your devices into a mobile hotspot so that all your gadgets can get on the internet when a router isn’t available. There are two main ways by which you can turn on the mobile hotspot on your Windows 10 and enjoy a better internet connection sharing.


[center]First, you can tap on the interenet connection button on the far right hand corner of your taskbar. a pull up appears where you can select a tile with the caption Mobile Hotpots. Click the corresponding tile and you are good to go[/center].


[center]The second, is to start with the settings section in your computer. This is a more secure and less problematic method. All you have to do is to Open the Settings app (click Start and choose the settings cog icon in the lower-left corner), and go to Network & Internet > Mobile hotspot.[/center]

On this screen , there is an on/off button at the top to activate the mobile hotspot feature. Below that is a drop-down menu labeled Share my Internet Connection from. With the help of this button, you can now choose which internet connection you wish to use. You could choose whichever you prefer ranging form a Wi-Fi and ethernet connection, for example.

Below that setting is the all-important network name, which is the router name everyone will see when they search for nearby Wi-Fi connections. Next is the password. Windows automatically generates a network name and password. If you’d like to change either or both of these options click the Edit button.

One last setting for anyone whose PC has Bluetooth. There’s a feature that lets another device turn on the mobile hotspot feature remotely if both devices are paired. This is on by default.

That’s pretty much all there is to mobile hotspots in Windows 10. Make sure to note the network name and password, then turn on the feature either in the Settings app or taskbar, share the password with other devices, and everyone will be online in no time. Happy network sharing and don't forget to leave a comment below if it worked for you.

https://trillionclues..com.ng/2017/05/how-to-turn-windows-into-hotspot.html

Science/Technology / Concise Guide To Different File Extensions/types Found On Most Normal Computers by TrillionBrains(m): 3:30pm On May 16, 2017
Hey guys, today we will be looking into the different basic file extensions and file types usually found on most normal computers.

What Are File Extensions?


You may have noticed that many of the files you can see on your computer have different three character endings, such as .doc, .png, .exe, .jpg, .apk etc. The last three characters therefore are positioned to tell the computer system which programs is designed or allocated to open a designated file type. Here we will go through several of the most common types of file extension you will see arranged in alphabetical order, and explain exactly what they are too as this will help you understand the risk, limitation of downloading a giving file type:

#The .Doc/.Docx File Extension For Microsoft Word Documents:


Probably the most popular program and file type among individuals. These are files made with Microsoft Word, being text-based documents. This is one of the most common formats you will come across, and may even use to make your own written documents.

#.Exe (Disk Operating System Executable File):


These are programs usually run by the computers operating system. It therefore executes the system programs. Most times it may also be a medium by which certain viruses and infected programs are been shared. So, it is therefore advisable to recognize the sender before opening such programs.

#.Gif (Graphics Interchange Format):


This is mostly used to show little animations of a few frames that play in an endless loop. You will probably have seen many of these recently, as there are many of them doing the rounds on social media networks and the internet at large. A really nice upgrade.

#.Htm or .Html (Hyper Text Markup Language):


This is the a file extension that usually runs on web pages. Its is used to create file types that run only on the web not on you local computer. This type of file is usually accessed by all on the web.

#.Txt FilesTypes (ASCII Text):


Text files are the most simplest of file types containing only but "plain text". Several different programs are used in opening this kind of file types like the default Notepad on your system. These types of files usually comes as README files in programs to be installed.

#.Zip Files (Compressed Zip Archive):


ZIP files are file types where the contents of the file are compressed in order to save storage space, or to make transmission easier. Many large files will be compressed in this way. You will need to Unzip them with a program like WinRAR to open their contents. You should be careful when unzipping files from unknown sources, as they may contain harmful viruses.

#.Ppt Files (PowerPoint Files):


These file types are made by using Microsoft PowerPoint, a program used for creating presentation on slides or images, combining text and pictures. Usually used for for office or educational purposes.

Thanks guys, if you made it to the last of this post. Having gone through the following file extensions, well it is your time now to tell me the ones not included up their. Comments are allowed!!!

http://trillionclues..com.ng/2017/05/guide-to-different-computer-extensions.html

Science/Technology / Private And Anonymous Browsing Made Easy With Tor Browser by TrillionBrains(m): 4:26pm On May 05, 2017
Hello guys, I know most of us have heard about or are even making use of the greatest of Browsers known as the Tor Browser, but hang on a little; remember their are newbies in the house. So with no much time wasting, i introduce to you the Tor Browser, how to use it, the risk involved and the EXPECTATIONS shocked too of course.

Tor browser is perhaps the single most accessible piece of software you can use to keep your online activities private and anonymous, while at the same time enhancing your security. It’s also incredibly easy to use, using as it does, a modified version of Mozilla’s Firefox browser. To put it simply, if you can use Google, you can use the Tor Browser.

Why Use Tor?

Perhaps the most astonishing of questions ever. Well, firstly, Tor itself is an acronym and an analogy. It stands for the The Onion Router, the idea being that like an onion, Tor has many layers of encryption and protection built into it, that make it easy for you to become anonymous online, and make it next to impossible to track you, and your activities.
In real terms, Tor has been designed to stop anyone, including government agencies, Internet Service Providers, and corporations from learning your location, and from consequently tracking your browsing habits and selling that data on.
Proof of just how effective the Tor Browser, and the Tor network it runs on can be proved by the fact that lots of journalists, activists, law enforcement professionals, whistle-blowers and businesses all use it so why not you?.

How Tor Works.

The protocol behind how Tor works was originally designed for the US NAVY
as a way of being able to use existing communications networks around the world securely. The US Navy still uses it today. Tor Browser works by first of all encrypting the web traffic you send out into the Internet. It then routes all your web traffic through the Tor network, a series of ‘relays’ or ‘nodes’ run by thousands of volunteer computers around the world taking different routes each time. This makes it extremely hard for anyone to identify the source of the information and next to impossible to track the user. While that’s a ridiculously simple analogy of how Tor works, it pretty much covers all the bases.

Easy To Use Tor Browser?

So having gotten all this knowledge, i will say; "Very, very easy". You don’t really need to know anything about encryption or how it all works. Tor is also based on the not-for-profit Mozilla Firefox browser, looks good, and crucially, is simple and easy to use.
Tor Browser is also easy and 100% free and open source browser which you can get from several downloaded software sites.


Thanks to you if you made it to this last paragraph of a little but mighty tutorial. See you next time!!!
https:///8Px30E
Webmasters / 8 Steps To Protect Or Erase Your Personal Information Online by TrillionBrains(m): 3:33am On Apr 01, 2017
Hello guys,
Today, we want to talk about the internet with regards to personal security.

We give our email and social media accounts our full names, we mention places we go to, we enter our postcode and phone numbers when requested, and we do much more in addition to that as well. All this adds up to make a very full picture of our lives. When I realized this, I began to panic. But there are some great ways of getting rid of all this information. Here are 8 handy tips to help you remove your identity from the internet:
1. Social Networks:>>>Social media accounts can contain an awful lot of information about yourself that you have volunteered in the past. Some of it you will even have forgotten, or may regret. Luckily, we can erase our accounts' histories by deactivating them. Once we do this, the information will be unobtainable. Though, many social networks will allow you to retrieve your account later on if you change your mind (usually this is a cooling-down period that last approximately 14 days).

2. Can you remember where you have been online? >>>Have a think about any sites you may have registered with during your years surfing the internet. If you can log back into these you will also be able to delete your profiles. If you have forgotten the old passwords, there will be a way to gain access by providing your email address. Otherwise have a look through your inbox to find log-in details you've long forgotten.

3. Give false information>>> Some sites will not offer you that chance to delete your account, and so this is where you will need to get creative. Make an online cloak for yourself by changing your profile name, address etc. Give completely false info, so no one will ever know it is you. This is almost as good as erasing the account.

4. Free your inbox of spam>>> Receiving lots of spam emails is a sure sign that your information has been bandied about a little too much. Check your inbox for emails that show advertising and links to news webpages. Find the unsubscribe option and happily select it.

5. Banish your name from search engines>>>Choose a search engine, like Google, and put your name into it. If the search brings up true details about you, you may decide that this displeases you.

6. Get in touch with webmasters>>>If a website does not offer the chance for you to delete information about yourself, search for the webmaster of the site and write your request into the contact box provided.

7. Tell these places to forget your information>>>Contact the customer service department at these American websites. If you have ever entered your details online before, they are sure to appear here. Fortunately, you can request that they delete the information they have about you.

8. And Finally.......As an absolute last resort, when you are sure you will not be needing the site's customer support service, you can delete your actual email account. From now on it'll be like you never existed at all.

Thanks guys, that will be up till will see again next time>>>>>>>>Bye!!!
http://trillionclues..com.ng/2017/03/8-steps-to-protect-or-erase-your.html

Technology Market / Amazing Tips On How To Recognize A Fake Gadget Before Buying It by TrillionBrains(m): 1:51am On Mar 18, 2017
Hey Guys,
Just taught about writing on this. It is not a certified facts that you must make mistakes before you can be able to master a thing, sometimes you just have to learn from what happened to others or just apply precautionary measures. When it comes to modern technology such as smart phones and tablets, top brands are often copied, and more often than not, you're almost unable to recognize them. Is it possible to recognize a fake gadget before buying it? So, before purchasing the product you want to have, bear in mind the following tips:

1. Notice the differences in the packaging and the product-------------There are many tips to bear in mind when comparing a counterfeit product to the real thing. More often than not, a copy wouldn't pay much attention to the packaging, whereas an official retailer will take care of the slightest details of design and packaging. In the case of the packaging, pay attention to the print quality. The font should be legible and consistent. Nothing should be loose inside. Goods are always packaged well to ensure that nothing gets damaged during transportation. Even the seams and corners of the packaging film should be impeccable.


2. Notice what material is used-------------------------Be it plastic, rubber or aluminum, all materials can be of a high quality or a low quality. In the case of top of the range brands, they do not tend to save on materials. The plastic covering is smooth. There are no seams or other imperfections. When looking closely at a fake, cheap plastic is often used alongside matte shades and irregular surfaces.

3. Notice the fonts --------------------------------------The logo is the face of the brand, and for this reason, deserves special attention. Logos on top brands are created in such a way so as they'll be easily recognizable even after years of use. Fonts must be smooth, readable and durable. Fake products often get this bit wrong.

4. Check the charger-------------------------------------The charger should be adapted for use in your country. If you're asked to buy an adapter or a separate charger than take it as a warning sign that the product you have purchased may be a fake. Furthermore, brand chargers don't have seams between plastic parts and don't come in different colors. Originals always have neat metal tips and quality insulation and finishes.

5. Look closely at wires and plugs -----------------------If it's a counterfeit product, be on the look out for wire quality. In the original, a plugged-in cable will sit firmly and evenly. A counterfeit will likely have incorrect angles and loose parts. Notice also, the length of a plug, which usually doesn't coincide with the depth of the socket. Pay attention to the quality of the insulation and the symbols on it. The wire should be flexible and even-colored and the markings shouldn't be erasable.

http://trillionclues..com.ng/2017/03/amazing-tips-on-how-to-recognize-fake.html
Phones / Re: Amazing Tips On How To Recognize A Fake Gadget Before Buying It by TrillionBrains(m): 1:50am On Mar 18, 2017
Quite complicating

Phones / Re: Amazing Tips On How To Recognize A Fake Gadget Before Buying It by TrillionBrains(m): 1:49am On Mar 18, 2017
Like this..................................

Phones / Re: Amazing Tips On How To Recognize A Fake Gadget Before Buying It by TrillionBrains(m): 1:48am On Mar 18, 2017
@newyorks
Don't forget to visit our page in full or follow the link below for more detailed instruction
Phones / Amazing Tips On How To Recognize A Fake Gadget Before Buying It by TrillionBrains(m): 1:12am On Mar 18, 2017
Hey Guys,
Just taught about writing on this. It is not a certified facts that you must make mistakes before you can be able to master a thing, sometimes you just have to learn from what happened to others or just apply precautionary measures. When it comes to modern technology such as smart phones and tablets, top brands are often copied, and more often than not, you're almost unable to recognize them. Is it possible to recognize a fake gadget before buying it? So, before purchasing the product you want to have, bear in mind the following tips:

1. Notice the differences in the packaging and the product-------------There are many tips to bear in mind when comparing a counterfeit product to the real thing. More often than not, a copy wouldn't pay much attention to the packaging, whereas an official retailer will take care of the slightest details of design and packaging. In the case of the packaging, pay attention to the print quality. The font should be legible and consistent. Nothing should be loose inside. Goods are always packaged well to ensure that nothing gets damaged during transportation. Even the seams and corners of the packaging film should be impeccable.


2. Notice what material is used-------------------------Be it plastic, rubber or aluminum, all materials can be of a high quality or a low quality. In the case of top of the range brands, they do not tend to save on materials. The plastic covering is smooth. There are no seams or other imperfections. When looking closely at a fake, cheap plastic is often used alongside matte shades and irregular surfaces.

3. Notice the fonts --------------------------------------The logo is the face of the brand, and for this reason, deserves special attention. Logos on top brands are created in such a way so as they'll be easily recognizable even after years of use. Fonts must be smooth, readable and durable. Fake products often get this bit wrong.

4. Check the charger-------------------------------------The charger should be adapted for use in your country. If you're asked to buy an adapter or a separate charger than take it as a warning sign that the product you have purchased may be a fake. Furthermore, brand chargers don't have seams between plastic parts and don't come in different colors. Originals always have neat metal tips and quality insulation and finishes.

5. Look closely at wires and plugs -----------------------If it's a counterfeit product, be on the look out for wire quality. In the original, a plugged-in cable will sit firmly and evenly. A counterfeit will likely have incorrect angles and loose parts. Notice also, the length of a plug, which usually doesn't coincide with the depth of the socket. Pay attention to the quality of the insulation and the symbols on it. The wire should be flexible and even-colored and the markings shouldn't be erasable.

http://trillionclues..com.ng/2017/03/amazing-tips-on-how-to-recognize-fake.html
Webmasters / 81 Year Old Masako Wakamiya - An Octogenarian App Developer by TrillionBrains(m): 7:09am On Mar 11, 2017
Most 81-year-olds struggle to use a computer at all, let alone able to produce their very own iPhone app, but Masako Wakamiya is far from being a run-of-the-mill senior.

The Japanese lady used everything she had learned over the previous 20 years about code to produce an iPhone app called Hinadan inspired by a traditional Japanese holiday known as Girls’ Day. The game is simple – players must arrange a series of dolls in a specific order, and the app beeps in approval or disapproval depending on the player’s inputs.

Masako’s journey to tech-savviness began when she turned 60. She had worked in a bank for the previous 43 years, but was forced to retire. She purchased a computer and set it up all by herself. She soon began chatting online and discovering the world of possibilities on the internet.
The game took inspiration from Girls’ Day, a traditional Japanese holiday that involves dolls being dressed up.
Masako told her amazing story at the 2014 edition of TEDxTokyo. Watch this inspiring video in which she encourages seniors to embrace technology and never stop learning:

http://trillionclues..com.ng/2017/03/81-year-old-masako-wakamiya.html
Webmasters / Russian Military On Significant Cyber War Effort Increase. by TrillionBrains(m): 7:39am On Mar 04, 2017
Last time, it was on the diversion of hacking towards hardware no longer software>>>http://trillionclues..com/2017/03/russian-military-announces-significant.html, Today it began with Russia announcing plans to increase spending on its armed forces, and the creation of a new branch of its armed forces to focus on information warfare, the country’s defence minister has said.

Declaring increases to spending on more troops, missiles and planes, the Russian defence minister, Sergey Shoygu, said that the formation of the dedicated information warfare was a key part of future military planning and that “propaganda needs to be clever, smart and efficient.” He did not however go into specifics regarding just what type of missions the new information warfare division would have.

That said, the move is likely to heighten the West’s concerns about what it sees as Moscow-sponsored “fake news. Moscow’s activities in this area have come under intense scrutiny in recent months, especially after U.S. intelligence agencies have claimed to have evidence that Kremlin mounted an in-depth “influence operation” to help Donald Trump win the U.S. presidential election last November. European intelligence agencies have also highlighted the fact that Russia seems to be seeking to destabilise governments and influence elections in Europe with cyber-attacks and the dissemination of fake news.
Moscow has denied interfering in other countries’ elections. That said, Russian military planners like their counterparts elsewhere, have openly admitted that the spreading of propaganda, disinformation and hacking is a crucial part of modern warfare and its importance and influence is only set to grow.

“An army for informational operations has been set up that is much more effective and stronger than what we had previously created for the purpose of what we call counter-propaganda, “Mr Shoygu informed the lower Russian house of parliament, the Duma, state news agency Itar-Tass reported.
Commenting on Mr Shoigu’s remarks to the BBC, former Russian commander-in-chief Gen Yuri Baluyevsky said a victory in information warfare “can be much more important than victory in a classical military conflict, because it is bloodless, yet the impact is overwhelming and can paralyse all of the enemy state’s power structures.”
http://trillionclues..com.ng/2017/03/russian-military-announces-significant.html
Science/Technology / What Tech Skills Do Employers Look Out For? by TrillionBrains(m): 5:16pm On Feb 24, 2017
With the new year already advancing, it’s time to dive right into the hopeful feeling of making a few significant life changes. The age-old “get healthy” and “fix my finances” promised are worthy resolutions, but many people use this time of self-reflection to explore the job market, intent on finding a better position that pays more, offers them room for growth, and utilizes their skills and education.

You can’t work the cash register at a major chain retailer these days without some level of comfort around its computer-based setup. But if you’re going into a career-oriented job hunt in the coming year, you might be surprised by the results of a new study by Novel Aspect. Their report shows that employers are still seeking the same old Microsoft Office skillset – typically Outlook, Excel, and PowerPoint–but that the highest paying jobs aren’t feeding out of Microsoft experience. It’s Amazon Web Services that’s bringing in the higher salaries.
“The most popular software applications featured in Indeed.com job listings serve a range of business needs. The top 20 list includes programs that focus on everything from accounting to document management as well as client services and design. The three most popular software skills are all part of the Microsoft Office Suite of products, which has consistently reigned supreme since the company began in 1989.

“Excel, Outlook, and PowerPoint rank the highest for desirable software skills since spreadsheets, email, and presentations drive just about all business environments. Companies mention the three products collectively in 35.4% of job listings. By comparison, Microsoft Office competitor iLife – produced by Apple – is only represented in 9.7% of Indeed job listings. Microsoft Access, an industry-leading database management system, was No. 5; overall, the company secured 4 of the 10 most sought after software spots.”
So why are employers still listing Microsoft experience if the real money is in your ability with other platforms? It could be a simple matter of failing to update their expectations. After all, a couple decades ago knowing how to put together a really vibrant, dynamic PowerPoint could make you the company’s go-to guy. Now, first graders are using PowerPoint to create their Thanksgiving recitals. Of course, as unlikely as it may seem in the current job market, there are still candidates who aren’t familiar with those old standbys, so employers may still feel the need to be specific.

If you’re in the market for a new job, take a look at Novel Aspect’s comprehensive list of skillsets and their correlating pay expectations. Then brush up on at least the lingo while you begin your search, and make a few “For Dummies” books part of your holiday wish list for today’s current hot-ticket skills.
http://trillionclues..com.ng/2017/02/what-tech-skills-do-employers-look-out.html

Science/Technology / Google Discloses Windows Vulnerability That Windows Fails To Patch Again! by TrillionBrains(m): 11:43am On Feb 20, 2017
Microsoft is once again facing embarrassment for not patching a vulnerability on time.

Yes, Google's Project Zero team has once again publicly disclosed a vulnerability (with POC exploit) affecting Microsoft's Windows operating systems ranging from Windows Vista Service Pack 2 to the latest Windows 10 that had yet to be patched.

A few months back, the search engine giant disclosed a critical Windows vulnerability to the public just ten days after revealing the flaw to Microsoft.

However, this time Google revealed the vulnerability in Windows to the public after Microsoft failed to patch it within the 90-day window given by the company.

Google's Project Zero member Mateusz Jurczyk responsibly reported a vulnerability in Windows' Graphics Device Interface (GDI) library to Microsoft Security Team on the 9th of June last year.

The vulnerability affects any program that uses this library, and if exploited, could potentially allow hackers to steal information from memory.

While Microsoft released a patch for the vulnerability on 15th June, the company did not fix all the issues in the GDI library, forcing the Project Zero researcher to once again report it to Microsoft with a proof-of-concept on 16th of November.

"As a result, it is possible to disclose uninitialized or out-of-bounds heap bytes via pixel colors, in Internet Explorer and other GDI clients which allow the extraction of displayed image data back to the attacker," Jurczyk notes in the new report.

Now, after giving the three-month grace period to the company, Google released the details of the vulnerability to the public, including hackers and malicious actors.
Google Project Zero team routinely finds security holes in different software and calls on the affected software vendors to publicly disclose and patch bugs within 90 days of discovering them. If not, the company automatically makes the flaw along with its details public.

Although Windows users need not panic, as hackers will require physical access to the host machine to exploit the vulnerability, the Redmond giant will have to release an emergency patch before sophisticated exploits are developed.

Microsoft recently delayed its this month's Patch Tuesday by a month due to "a last-minute issue that could impact some customers and was not resolved in time for [Microsoft's] planned updates" on 14th February.

So, if there is no expected emergency patch this month, this newly disclosed vulnerability will be left open for hackers for almost a month to exploit — just like we saw last time when Russian hackers actively exploited then-unpatched Windows kernel bug in the wild — which could put Windows users at potential risk.

http://trillionclues..com.ng/2017/02/google-discloses-windows-vulnerability.html
Webmasters / Google Discloses Windows Vulnerability That Windows Fails To Patch Again! by TrillionBrains(m): 9:18am On Feb 20, 2017
Microsoft is once again facing embarrassment for not patching a vulnerability on time.

Yes, Google's Project Zero team has once again publicly disclosed a vulnerability (with POC exploit) affecting Microsoft's Windows operating systems ranging from Windows Vista Service Pack 2 to the latest Windows 10 that had yet to be patched.

A few months back, the search engine giant disclosed a critical Windows vulnerability to the public just ten days after revealing the flaw to Microsoft.

However, this time Google revealed the vulnerability in Windows to the public after Microsoft failed to patch it within the 90-day window given by the company.

Google's Project Zero member Mateusz Jurczyk responsibly reported a vulnerability in Windows' Graphics Device Interface (GDI) library to Microsoft Security Team on the 9th of June last year.

The vulnerability affects any program that uses this library, and if exploited, could potentially allow hackers to steal information from memory.

While Microsoft released a patch for the vulnerability on 15th June, the company did not fix all the issues in the GDI library, forcing the Project Zero researcher to once again report it to Microsoft with a proof-of-concept on 16th of November.

"As a result, it is possible to disclose uninitialized or out-of-bounds heap bytes via pixel colors, in Internet Explorer and other GDI clients which allow the extraction of displayed image data back to the attacker," Jurczyk notes in the new report.

Now, after giving the three-month grace period to the company, Google released the details of the vulnerability to the public, including hackers and malicious actors.
Google Project Zero team routinely finds security holes in different software and calls on the affected software vendors to publicly disclose and patch bugs within 90 days of discovering them. If not, the company automatically makes the flaw along with its details public.

Although Windows users need not panic, as hackers will require physical access to the host machine to exploit the vulnerability, the Redmond giant will have to release an emergency patch before sophisticated exploits are developed.

Microsoft recently delayed its this month's Patch Tuesday by a month due to "a last-minute issue that could impact some customers and was not resolved in time for [Microsoft's] planned updates" on 14th February.

So, if there is no expected emergency patch this month, this newly disclosed vulnerability will be left open for hackers for almost a month to exploit — just like we saw last time when Russian hackers actively exploited then-unpatched Windows kernel bug in the wild — which could put Windows users at potential risk.

http://trillionclues..com.ng/2017/02/google-discloses-windows-vulnerability.html

Science/Technology / Re: Anonymous Hacker Pulls Plug On Thousands Of Dark Net Sites by TrillionBrains(m): 12:34am On Feb 12, 2017
Exactly @KevMitNick, more down that link
Science/Technology / Anonymous Hacker Pulls Plug On Thousands Of Dark Net Sites by TrillionBrains(m): 11:29pm On Feb 11, 2017
Twenty percent of the Dark Net was taken offline last week, when a hacker compromised a server hosting some 10,000 websites on the Tor network.
The Tor network, knowingly designed to hide the identities of its users while online, is widely used on the Dark Web, which isn't indexed by mainstream search engines and serves as a hub for illegal online activities.
Visitors to the affected pages were greeted with the message, "Hello, Freedom Hosting II, you've been hacked." Freedom Hosting II is the server that hosted the Tor pages been visited by the affected users.

The attacker, who has claimed to be part of the hacker collective Anonymous, reportedly took Freedom Hosting II offline because 50 percent of its sites contained child pornography and prosecutions.
The original Freedom Hosting sites hosted as much as 50 percent of the Dark Web's pages as of the year 2013, when it was taken down by the law enforcement. A number of child porn prosecutions also followed that action.
Rudimentary Hack

This incident supposedly was the first hack carried out by the attacker, who claimed responsibility in an interview with Motherboard. In addition to taking Freedom II offline, the person stole 74 gigabytes in files and a 2.3-GB database.
The database stolen from Freedom II contains 381,000 email addresses -- thousands of them with .gov extensions, Troy Hunt, who runs the Have I Been Pwned website, told Wired.
However, those .gov addresses may not be legitimate, he noted.
The hack of Freedom II was relatively rudimentary, said Tim Condello, technical account manager and security researcher at RedOwl.
"They identified a configuration issue and used it to identify the root user of the system and gain control of it that way," he told TechNewsWorld. After gaining control of the system, "they overwrote the index file and redirected the landing page for all the websites to a landing page containing their message."

Shared Vulnerabilities
This attack demonstrates that when it comes to resistance to vulnerabilities, the Dark Web doesn't have an edge.
"The underlying technology of the Dark Web isn't anything revolutionary. The way a content management system or a hosting service operates is identical to how it's done on the open Web," Condello said.
"The difference is how the content is communicated, so it's accessible only through the Dark Web," he continued.
"The code that's used for a forum on the Dark Web is the same code that's used on the clear Web," Condello explained, "so if there's a vulnerability identified for WordPress, that vulnerability can be exploited on a Dark Web website using WordPress just as it would on the open Web."

Flaws in Dark Web
The attack on Freedom II also shows the danger of concentrating resources in a central location.
"The fact that so many sites used this single particular hosting provider meant that a breach of that provider meant a breach of thousands of sites," noted Danny Rogers, CEO of Terbium Labs.
"The anonymity of the Dark Web relies on its distributed nature," he told TechNewsWorld. "These sorts of centralizations create significant weaknesses."
Although breaking into servers and stealing data on the open Web is illegal, it remains to be seen what the consequences may be for the hacker of Freedom II.
"I'm sure they angered a lot of people, but I'm not sure how much anyone can do about it," Rogers said.
There may be legal ramifications from the attack, but they could be for the people identified in the dump of stolen data rather than for the hacker.
"The data release is going to be a major boon to law enforcement," Rogers observed.

More Attacks to Come
Attacks on the Dark Web are commonplace, but they don't often get the visibility of the assault on Freedom II.
"These attacks will continue on a pace with what we see on the clear Web," Condello maintained.
"I think the new pattern is going to be [that] as vulnerabilities are revealed on the open Web, people are going to go to the Dark Web and see if there are any sites with those same vulnerabilities," he suggested. "Getting access to sites built around anonymity and pulling the curtain back on that can give you power and money."
http://trillionclues..com.ng/2017/02/anonymous-hacker-pulls-plug-on.html

(1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) (13) (of 13 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (1) (2) (3) (4) (5) (6) (7) (8) (9) (10)

Nairaland - Copyright © 2005 - 2024 Oluwaseun Osewa. All rights reserved. See How To Advertise. 144
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.