Skip to main content

Posts

Showing posts from May, 2017

Intel® Core™ i9-7900X Processor

What the f****!!  These were my exact words when this appeared in my news feed. i9? Could not believe it all these years we have been praising and bowing down to the great i7 little did it know that it could be shelved sooner or later. Before we even dive into the i9 story line there is still a new baby in town. AMD is back with the mighty Ryzon 7. This baby is no joke she harbors the following specs: ·          8 core processor ·          16 threads ·          Turbo max of 4GHZ ·          L3 cache of 16MB ·          2667MHZ of memory speed. If you planning to buy a desktop definitely consider this processor. I know AMD have been in the hide out for a while but now we have seen what has been cooking. In this regard Intel on the other hand is not accepting any def...

Windows kills update for clovers cpu

For the last several years windows has been pushing updates for windows 10 to all system, but as time goes by Microsoft has been capping updates for older hardware. Systems using  Intel's Clover Trail atom CPUs and  are running windows 10 will no longer receive  both creature update and major update. They will only receive security update till January 2023.  Most systems using these cpu’s were shipped with either windows 8 or 8.1and were also set to receive updates till 2023. The same systems were also eligible to get a free update to windows 10. For one to receive these security updates you have to periodically keep up with  the operating system update of which are supported for 18 months then if you haven’t upgraded you no longer get the security fixes. This is a problem for the Clover Trail machines, because those systems are prevented from installing and using the Windows 10 Creators Update, leaving them stuck on last year's Anniversary U...

How public likes work

Almost by now half of Kenyan youths either know or are using the public likes platform to make some extra cash on the side. Personally I have no objection on these and its actually a good path to follow. The sad part is a couple of friends have sent me the referral links for me to join but when I ask them how these platform work, almost no of the have a clue they always say “click the envelop , the airplane or whatever image then click send ” How it works? To some extend this is very true. Now let’s get into Nitty gritties of how the website works. Public likes is a social media advertising tool. It’s the middle man between the advertiser and the customer. Advertisers place their ads on public likes platform and members intern are paid to view them. They also swank of elevating startups by using social media platform as a way to increase the number of eyeballs to your company. Apart from Facebook they also get you through to twitter, Instagram, google+ and YouTube...

Products Overview

HA- Lizard This a high availability software for citrix and Xenservers . its also open source and can be accrued from Halizard . Some of its fictions include:    Auto-start of any failed VMs Auto-start of any VMs on after reboot Detection of failed hosts and automated recovery of any affected VMs Detect and clean up orphaned resources after a failed host is removed Removal of any failed hosts from pool with takeover of services Fencing support for HP ILO, XVM and POOL fencing (forceful removal of host from pool) Split brain prevention using heuristics from external network points and quorum Have a visit and explore all the cool functionality that the app can do and handle. Freecodecamp Its a nonprofit that consists of an interactive learning web platform, an online community forum, chat rooms, Medium publications, and local organizations that intend to make learning web development accessible to anyone some of the coding languages les...

YouTube monetization

The word out there is that there is a lot of money online and worse is that they even told that they can make this money in the comfort of their bed. So as an online guy I had to sort through all these crap just to find and differentiate the real from the fake, and if possible jump in to this work on your bed. I mean who would not like such a life (wake up at 10am sit up in bed grab my laptop tap, tap, tap, tap…. And Bank some $$$$$$. For these article my main focus we be on YouTube. Lots and lots of people have been told that they can make money from YouTube.  This is very true a lot of YouTube personalities are making a crap tone load of cash from it, but not at the comfort of their bed. It involves a lot of reach on the area of focus/ niche that you decide to concentrate. Once you have the material you need to upload your content constantly to a point where people care enough to subscribe to your channel. This requires originality as well. Monetisation ...

WannaCry ransomware attack

This is an ongoing cyber-attack of the WannaCry ransomware computer worm targeting the Microsoft Windows operating system.  The attack started on Friday, 12 May 2017, infecting more than 230,000 computers in 150 countries, with the software demanding ransom payments in the cryptocurrencyBitcoin in 28 languages. The attack has been described by Europol as unprecedented in scale. Basically what happens is that a user data is locked, encrypted or even stolen and held at ransoms . The attacker then asks for pay in various forms mostly in bitcoins (it’s hard to retract the money back) and once paid they give you the decrying key or send back your data. (Not 100% guaranteed) It’s discovered over a million internet-connected devices that expose SMB on port 445. Of those, more than 800,000 run Windows,  given that these are nodes running on the internet exposing SMB – it is likely that a large percentage of these are vulnerable versions of Windows with SMBv1 still...

Self-flying taxi

A couple of months ago we discussed about Drones ecosystem. As said earlier this technology has been around for a while but not explored for the consumer market. Now Tech companies are now dipping their heads on the drone jar and fetching out any idea that is drone related but the Dubai self-flying taxi has topped them all. Flying taxis The days of sitting in a taxi while it's stuck in a traffic jam could soon be a thing of the past for people in Dubai, assuming there is traffic there. Dubai is now developing a self-flying taxi drone of which is to be launched and out in the market soon. The head of Dubai's transportation agency said that self-flying taxis would start taking people across the city starting from July. These egg shaped drone is purposely to ferry humans within various parts of the city. its has a sitting capacity of one person and can fit a small load.  Maximum load including human is 100KG it’s not yet clear on the fly time but it’s sai...

Encryption

Meaning : E ncryption   is the process of encoding a message or information in such a way that only authorized parties can access it This technology has been around for decades and has been used by various agencies, individuals and independent parties to transmit information between themselves. One thing to note is that this prevent intermediate intervention but does not take into consideration the integrity of the information. I.e. if a third party may be able to decipher and alter the message this will not be noted by the receiver. End-to-end encryption : this is still encryption but it makes sure that encryption is carried out on both parties, sender and receiver. With this not only is the message scrambled but only the sender and receiver can only decrypt the message. How encryption work This is a very complicated process that basically happens behind the scene but I will try and explain it in simple terms. First you create a message that you woul...

WhatsApp & telegram security flaws

Both companies pride themselves in having state of the art encryption systems and ensure their users that the communication between each other is secure and no man in the middle attack will happen. Sadly enough this was put to test and several security companies have opposed to these after finding loop holes in these encryption systems WhatsApp has the ability to force the generation of new encryption keys for offline users, unbeknown to the sender and recipient of the messages, and to make the sender re-encrypt messages with new keys and send them again for any messages that have not been marked as delivered. The recipient is not made aware of this change in encryption, while the sender is only notified if they have opted-in to encryption warnings in settings, and only after the messages have been re-sent. This re-encryption and rebroadcasting effectively allows  WhatsApp to intercept and read users' messages. This loop hole discovered by a security rese...