What you know and whom you know

There are two things that matters in life,
What you know and whom you know,
You need somebody,
Somebody to open up your mind,
You need people,
Because you don`t know everything,
Somebody is needed to fill the answers you don`t know,
And somebody needs you to fill the questions he/she has,
The knowledge you have within yourself,
Is what is going to help you,
And set you free,
It`s a simple general principle of life,


People love and adore you.

People love and adore you sometimes,
Only because it`s beneficial to them,
Some love us,
Because it’s compelled in their hearts,
Because of a burning in their hearts we instill on them,
Just at the sight of us,
Some people celebrate us,
Because you play a hero to them,
And they pay a tribute to us,
Because it`s us they look up to,
And they should not be let down,
We always search ourselves and wonder,
Who truly loves us?
Who hates us and why,
Whether we are a tear drop to some people or a joy to the eyes of others,
And we become glad,
When we realize that we are a celebration to some people,
We are role models to somebody,
Somebody somewhere looks up upon us,
Somebody out there finds refuge in us,

It is Kenya. Who will fill the gap?

In any of today`s African nation, it is a common thing to talk of economical and development growth. That is exactly true. Every aspect of every pillar in every country is growing. Infrastructure, education, agriculture are all growing with different speeds and dimensions. Specifically Kenya, a lot has taken place. Technology has had a major boost over the last one decade. Mobile technology is the major aspect of tehnology that has deeply rooted every individual in the society to an extend that you hardly get anyone without a cell phone in his/ her possession. Businesses are booming with the use of the same.

Agriculture is embracing technology. Modern equipments are being used to enhance the agricultural sector. Techno savvy individuals are on the rise. And this has consequently led to locally developed mobile application softwares, lots of success in software development has been realised by individuals and companies.

The government is adapting security frameworks to enhance the security of their systems. Last year, 2015, Kenya’s largest mobile phone firm Safaricom signed a deal with the government to construct a security system worth billions of shillings which would help combat crime through daily survailence that would be conducted on daily basis in major cities in the country. The government is improving the jua kali sector to help the informally trained personnel in the society self employ themselves and be part of the nation building. County goverments have been established with the aim of decentralizing development to the grass roots level and to help in development of marginalized areas.

People are investing in real estates, big businesses, agriculture, technology, learning institutions as many people crave for formal education, recreational centres, malls and supermarkets. All these has led to a lot of money circulation and as a result individuals are developing themselves.

When you go to every Kenyan city or town, Nairobi, Eldoret, Mombasa, Kisumu luxurious and recreational places are all everywhere. Big and luxurious hotels, powerful cars every where.

All these are a manifestation of a growing economy. With the involment of government in some of the areas trying to help the people and generally develop the country.

However, contrary to the above, in every town in the country there are two extremities. A short distance away from the luxurious places, it is sad to find people living in very poor conditions, living at the extreme ends of struggling hard to eke out a living. It is the same town, with two sets of people living at two extreme opposite ends.

There is a gap that is ever growing and widening between these two groups of people. And this is Kenya, and my big question is WHO WILL FILL THIS GAP?

My Home My Village.

Ben Stuff


A rising white smoke at a distance,
A sound of a mowing cow from a distance is heard,
With twinkling sound of a bell hanging down from its neck,
Marching towards the homesteads,
A mother calling her son,
A faded reply would be heard from a distance,
The sun is setting,
Everyone is busy,
Up and down winding up their chores,
It`s the sound of the village,
A sudden feeling of peace engulfs me,
It`s yet another warm feeling,
Away from the city noise,
So serene and conducive,
Bringing brotherhood closer,
Bonded by blood and culture,
The conformity in doing things,
It`s my home,
It`s my village,
With which I`m proud of,

View original post

……So Strong


Like the leaves falling gently down from its branches,
Glossily walking across the hallway,
Like a stream flowing downstream in a clear pattern,
Sensation of warmth in my heart,
Is all I feel about her,
The brightest star among the bright stars in the galaxy,
Is all I see at the deepest end of my vision at the thought of her,
Beneath the ocean of my thoughts,
I can figure her out,
Bright smile, white apple shaped eyes,
Calm composure, confident and tactical in nature,
Beautiful she stands out,
So beautiful she is; she blesses me with her unique beauty,
I look at the blue sky sometime and wonder,
“Where did she come from? All this time I have been in the search for the unknown”,
She has a face of a child,
She cares like a mother and stares at me like a kid,

How to make a bootable USB using CMD in windows.

Insert the flash disk onto your computer then open command prompt (CMD) as an administrator.
On the terminal type the following in order as below:
1. Diskpart
2. List disk
3. Select disk 2 (select your USB disk number, mine is disk 2).
4. Clean
5. Create partition primary
6. Select partition 1
7. Format fs=ntfs quick
8. Active
9. Assign
10. Exit
11. Exit

Below is the screen shot of the same. After doing that you copy the files the windows files into the flash drive. And from there you are good to go.




PCP306.make8.artwork-580-75TROJAN HORSE

Several techniques have been devised to penetrate computer systems. These includes: guessing passwords, exploiting software bugs, Trojan horses, buffer overflow attack, address spoofing, Address Resolution Protocol (ARP) cache poisoning, fake ICMP (Internet Control Management Protocol) or RIP(Routing Information Protocol) packets, SYN flooding, Ping of death, TCP session hijacking, UDP spoofing, Remote Procedure Calls, etc.

Each of them has a way through which an unauthorized user can penetrate a system. However there is this one which have attracted and gained my interest, Trojan horse. It has prompted me to dig deeper and unfold what surrounds how it works and executes itself in the host computers and I`m going to look at its brief history as to how it came about.

The ancient Greeks have had wars with the Trojans for years without any conclusion. After ten years into the Trojan War, the Greeks ships were sent away. This made the Trojans believe that the Greeks had surrendered. However they had left behind a giant wooden horse, which the Trojans dragged into their walled city. At night, the Greeks hiding inside the wooden horse slipped out, killed the Trojans and set ablaze the city.

In computing what is a Trojan horse? A Trojan horse is a program that masquerades (pretends) as another, trusted, program with the aim of capturing some information i.e. username and passwords and sends them back to its source.

The classic Trojan horse was a program that would display a login prompt, leading the user to believe that a computer (or terminal) was unused and awaiting a user login. The unwary user would enter his credentials (login name and password). The program would then stash them in a file or send them out via a network connection and then exit, printing a login incorrect message and executing the real login program. The user would simply assume that a mistake has been made, enter the credentials again (this time to the real program), and continue with life, unaware that his login name and password were compromised.

More recently, Trojan horses have appeared in the form of exploitation of Microsoft Internet Explorer to redirect traffic to different ip addresses. A novel form of a Trojan horse was exposed in November of 2004, also targeting Microsoft Internet Explorer and Windows xp sp2. In this attack, the dialogue window that warns users that they may be downloading malicious content could be disguised so that the unwitting user will click on an innocuous-looking message only to install harmful software on the computer.


System Protections and Firewall, Paul Kryzynowski

Firewalls and Internet Security, William R. Cheswick and Steven M. Bellovin, Addison-

Wesley © 1994 AT&T Bell Laboratories.

Linux-do – The Path to Linux

Lands of Unix

For some people Linux is merely an operating system, an inexpensive alternative to Windows or Mac. For me and many others Linux represents a path – ‘Linux-do’ as the Japanese would probably put it (Bushido or Bushi-do – ‘the way of the warrior’). My main goal when using various distributions was always broadening my understanding of mechanics underlying operating systems – how the kernel software lets the user communicate with hardware, how to compile software, etc. Due to its intrinsic flexibility, Linux offers quite a lot.

images.duckduckgo.comDisciples of ‘Linux-do’ such as I typically follow a stepwise progression towards enlightenment – becoming one with the operating system. Beginners usually start with the more user-friendly distributions, for example Ubuntu, OpenSUSE or Mageia/OpenMandriva Lx. The majority of them are content with that level of understanding, however, many want to know Linux better and continue their exploration (‘distro-hopping’). The next step…

View original post 178 more words

Celebrating Linux Diversity

Lands of Unix

Some time ago I wrote about excessive forking, how it dilutes out human efforts and leads to duplication of results. Embarrassing as it is, I have to admit that my judgment was clouded and procured far too hastily. In my musings I have neglected the positive aspects of forking and producing re-spins of popular distributions. This was brought to my attention by a recent article on DistroWatch.com, as part of the Distro Watch Weekly series.

One of the key features of Linux-verse and the open-source community in general is freedom. Programmers, developers and the like are not limited by ‘egoistic’ corporate agreements and copyright claims. Naturally, too much freedom may lead to waste of resources, but this is greatly overshadowed by the real consequence – evolution.

In the animal kingdom various species developed different mechanisms of adaptation, connected tightly with the size of their progeny. On the one hand, we…

View original post 162 more words

Does Academic qualification ensure success?

It is common to find someone who completed or graduated recently with good grades from any prestigious university, college or a tertiary institution but still languishing in life. And it is also common to find someone who failed in his academic life succeeding in businesses, real estates or farming. And it is also true finding someone who succeeded both in his academic and later part of his life.

But my biggest worry is: what is the correlation between succeeding in academics and succeeding in life? I have always pondered on this issue over and over trying to find tangible correlation between the two. I have been in school for the last 15 years, I have been having A`s all along. However I have never felt the satisfaction that I have actually succeeded in my life.

My parents always say “Go to school, get good grades, succeed and bring success and prestige back to the family”. But sincerely where are we going wrong here? Is there a stage that these issues have to be addressed?

Parents and teachers are doing great work, worth much more of what we get in our lives. They are the backbone of our lives, foundation of what we later become. Every one of them wishes best to their children and their students.
But to some extent I think there is something wrong with our Kenyan education system. There is no point where succeeding in life is discussed. Everything implanted in us is to get good grades, pass and proceed to the next class. Issues on how to tackle every life`s challenge mostly economically is never the topic to be discussed. An A in school is equated to successful life and a D is equated to doom in life. But there is more to that. There is more to a successful life and wealth creating life than just grades.

Looking keenly, life in school is dictated by one`s grades and an urge to get better grades; A`s and B`s. Cramming for exams, passing the tests for good grades is common hearsay of the schools. Fears brought by exams deviates one to move away from doing that which they are passionate about and that which would actually bring success in their later life. However except for some few who go an extra mile to balance between the academics and their passions.

Just as a thought, there is more to succeeding in academics and to successful life. We must identify what we are passionate about and spend more time on it to realize the satisfaction within us in a succeeding life.
Well, I`m not criticizing the education system, it has groomed me personally but something on the curriculum should be added which I more than belief would be of greater importance. Succeeding in life and wealth creation lessons should be added to the curriculum. This would not only help in streamlining students to a successful life but also reduce the unemployment rates.