There are two things that matters in life,
What you know and whom you know,
You need somebody,
Somebody to open up your mind,
You need people,
Because you don`t know everything,
Somebody is needed to fill the answers you don`t know,
And somebody needs you to fill the questions he/she has,
The knowledge you have within yourself,
Is what is going to help you,
And set you free,
It`s a simple general principle of life,
People love and adore you sometimes,
Only because it`s beneficial to them,
Some love us,
Because it’s compelled in their hearts,
Because of a burning in their hearts we instill on them,
Just at the sight of us,
Some people celebrate us,
Because you play a hero to them,
And they pay a tribute to us,
Because it`s us they look up to,
And they should not be let down,
We always search ourselves and wonder,
Who truly loves us?
Who hates us and why,
Whether we are a tear drop to some people or a joy to the eyes of others,
And we become glad,
When we realize that we are a celebration to some people,
We are role models to somebody,
Somebody somewhere looks up upon us,
Somebody out there finds refuge in us,
In any of today`s African nation, it is a common thing to talk of economical and development growth. That is exactly true. Every aspect of every pillar in every country is growing. Infrastructure, education, agriculture are all growing with different speeds and dimensions. Specifically Kenya, a lot has taken place. Technology has had a major boost over the last one decade. Mobile technology is the major aspect of tehnology that has deeply rooted every individual in the society to an extend that you hardly get anyone without a cell phone in his/ her possession. Businesses are booming with the use of the same.
Agriculture is embracing technology. Modern equipments are being used to enhance the agricultural sector. Techno savvy individuals are on the rise. And this has consequently led to locally developed mobile application softwares, lots of success in software development has been realised by individuals and companies.
The government is adapting security frameworks to enhance the security of their systems. Last year, 2015, Kenya’s largest mobile phone firm Safaricom signed a deal with the government to construct a security system worth billions of shillings which would help combat crime through daily survailence that would be conducted on daily basis in major cities in the country. The government is improving the jua kali sector to help the informally trained personnel in the society self employ themselves and be part of the nation building. County goverments have been established with the aim of decentralizing development to the grass roots level and to help in development of marginalized areas.
People are investing in real estates, big businesses, agriculture, technology, learning institutions as many people crave for formal education, recreational centres, malls and supermarkets. All these has led to a lot of money circulation and as a result individuals are developing themselves.
When you go to every Kenyan city or town, Nairobi, Eldoret, Mombasa, Kisumu luxurious and recreational places are all everywhere. Big and luxurious hotels, powerful cars every where.
All these are a manifestation of a growing economy. With the involment of government in some of the areas trying to help the people and generally develop the country.
However, contrary to the above, in every town in the country there are two extremities. A short distance away from the luxurious places, it is sad to find people living in very poor conditions, living at the extreme ends of struggling hard to eke out a living. It is the same town, with two sets of people living at two extreme opposite ends.
There is a gap that is ever growing and widening between these two groups of people. And this is Kenya, and my big question is WHO WILL FILL THIS GAP?
A rising white smoke at a distance,
A sound of a mowing cow from a distance is heard,
With twinkling sound of a bell hanging down from its neck,
Marching towards the homesteads,
A mother calling her son,
A faded reply would be heard from a distance,
The sun is setting,
Everyone is busy,
Up and down winding up their chores,
It`s the sound of the village,
A sudden feeling of peace engulfs me,
It`s yet another warm feeling,
Away from the city noise,
So serene and conducive,
Bringing brotherhood closer,
Bonded by blood and culture,
The conformity in doing things,
It`s my home,
It`s my village,
With which I`m proud of,
Like the leaves falling gently down from its branches,
Glossily walking across the hallway,
Like a stream flowing downstream in a clear pattern,
Sensation of warmth in my heart,
Is all I feel about her,
The brightest star among the bright stars in the galaxy,
Is all I see at the deepest end of my vision at the thought of her,
Beneath the ocean of my thoughts,
I can figure her out,
Bright smile, white apple shaped eyes,
Calm composure, confident and tactical in nature,
Beautiful she stands out,
So beautiful she is; she blesses me with her unique beauty,
I look at the blue sky sometime and wonder,
“Where did she come from? All this time I have been in the search for the unknown”,
She has a face of a child,
She cares like a mother and stares at me like a kid,
Insert the flash disk onto your computer then open command prompt (CMD) as an administrator.
On the terminal type the following in order as below:
2. List disk
3. Select disk 2 (select your USB disk number, mine is disk 2).
5. Create partition primary
6. Select partition 1
7. Format fs=ntfs quick
Below is the screen shot of the same. After doing that you copy the files the windows files into the flash drive. And from there you are good to go.
Several techniques have been devised to penetrate computer systems. These includes: guessing passwords, exploiting software bugs, Trojan horses, buffer overflow attack, address spoofing, Address Resolution Protocol (ARP) cache poisoning, fake ICMP (Internet Control Management Protocol) or RIP(Routing Information Protocol) packets, SYN flooding, Ping of death, TCP session hijacking, UDP spoofing, Remote Procedure Calls, etc.
Each of them has a way through which an unauthorized user can penetrate a system. However there is this one which have attracted and gained my interest, Trojan horse. It has prompted me to dig deeper and unfold what surrounds how it works and executes itself in the host computers and I`m going to look at its brief history as to how it came about.
The ancient Greeks have had wars with the Trojans for years without any conclusion. After ten years into the Trojan War, the Greeks ships were sent away. This made the Trojans believe that the Greeks had surrendered. However they had left behind a giant wooden horse, which the Trojans dragged into their walled city. At night, the Greeks hiding inside the wooden horse slipped out, killed the Trojans and set ablaze the city.
In computing what is a Trojan horse? A Trojan horse is a program that masquerades (pretends) as another, trusted, program with the aim of capturing some information i.e. username and passwords and sends them back to its source.
The classic Trojan horse was a program that would display a login prompt, leading the user to believe that a computer (or terminal) was unused and awaiting a user login. The unwary user would enter his credentials (login name and password). The program would then stash them in a file or send them out via a network connection and then exit, printing a login incorrect message and executing the real login program. The user would simply assume that a mistake has been made, enter the credentials again (this time to the real program), and continue with life, unaware that his login name and password were compromised.
More recently, Trojan horses have appeared in the form of exploitation of Microsoft Internet Explorer to redirect traffic to different ip addresses. A novel form of a Trojan horse was exposed in November of 2004, also targeting Microsoft Internet Explorer and Windows xp sp2. In this attack, the dialogue window that warns users that they may be downloading malicious content could be disguised so that the unwitting user will click on an innocuous-looking message only to install harmful software on the computer.
System Protections and Firewall, Paul Kryzynowski
Firewalls and Internet Security, William R. Cheswick and Steven M. Bellovin, Addison-
Wesley © 1994 AT&T Bell Laboratories.