Tuesday, 29 September 2015

E-mail spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spam often use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.

E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include anauthentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to and from the recipient.

Monday, 21 September 2015

BECOME A COMPUTER WIZARD

How to Become a Computer Wizard
We all have them. Heck, I'm one of them. The computer genius. The power user. The geek. The nerd. The one you call when something goes wrong. The one that will sit down, and in the time it takes to go to the fridge and get a root beer, fixes the problem thats plagued you for weeks.

And here's how to be just like them.



There are very few requirements to learn how to be a computing wizard. They are:

A working computer
A mouse
A keyboard
A working internet connection
A fifth grade reading level


If you've got that, you can learn too.

I've learned almost everything I know about computers from either trial and error, Google, or the gawker network.

Really.

No secret nerd cult, no innate level of awesome geekiness, and no inborn ability to know everything about computers. Just two hands, ten fingers, the ability to read and the ability to learn from my mistakes.

Explore

Explore your surroundings. Find yourself on a geek website? Go to the homepage. Look around. Follow links. Bored and have nothing to do in Windows? Play with options. Click buttons, and see what they do. See something interesting? Poke it with a stick. Change the options to see what happens.Exploration and trial and error will teach you more than you know.  


Google is Your Friend.


The one thing I wish I could teach everyone. In 99.999999999999% of cases, a quick Google search will fix your problems. Or rather, tell you how to fix them. Google will take you places. Have a question or problem? Google it. Want to know how to do something? Google it. Don't know what a word or phrase means? Google it. If your curious, Google it. Google can tell you anything. Why does my computer have yellow lines on it? Why did my laptop shut down all of a sudden? How do I stop procrastinating? How do I ask a boy/girl out? How do I make friends? How do I make a good impression? How do I convince people to like me? How do I persuade people to help me? What not to do when taking over the world? Google can solve all your problems, because, chances are, someone else has had it too, and they probably asked about it. But don't always click the first link you see. Browse through them, till one catches your interest.
Read


There are plenty of blogs out there that deal with computers. Find them. Places like Gizmodo, How-To Geek, Lifehacker, and a thousand others. Often times, they will link to other sites. Click those links. Look at the highlights. Learn.

Easy enough right? Go on. Google something. Tech blogs. How to do this. How to do that. Computer blogs. Google Chrome error 104. Ubuntu. Lifehacker. Minecraft. Rainmeter. Click links. See something interesting? Click it. There is no better teacher than experience, but the internet is pretty good at it too.

Monday, 14 September 2015

Security challenges in Nigeria : What can ICT do?

In the last two years or so, Nigeria has been faced with severe security challenges that have threatened the soul of the nation.  Places of worship have been desecrated; homes, media houses, national and international institutions have been torched; and lives have been wasted, the recent being the murder of 29 harmless school children in Yobe State.
 Like all Nigerians, I’m worried too. Therefore, this week, I will highlight what ICT can do to help deal with the security challenges the nation is grappling with.
 ICT has made living and work a lot easier. Security experts say it is possible to see through security breaches and nip them in the bud with ICT-enabled gadgets and software before they blossom.
 Here are some ways that ICT-based technologies can assist security agencies in achieving more efficiency and effectiveness in their operations.
 Surveillance: Surveillance is a deliberate system of keeping a close watch on the behaviours or activities of persons, groups, organisations and institutions suspected of doing something illegal or warehousing information capable of causing a breach of security by government’s security agencies.
 This could be done electronically with Closed Circuit Television cameras or interception of electronically transmitted information (such as Internet traffic or phone calls) or by means of low-technology methods such as human intelligence agents and postal interception.
 Other means include: surveillance cameras, social network analysis, biometric surveillance, data mining and profiling, corporate surveillance, satellite imagery, radio-frequency identification and geo-location devices to mount surveillance on suspected targets.
 Intelligence Gathering: Intelligence gathering helps security agencies to keep tabs on the activities of suspected groups, organisations or persons likely to breach the peace. Today, such ICT tools as the internet, mobile telephony system, social media networks and the media have become veritable platforms for intelligence gathering efforts of our security agencies, so long as they observe the ethics of using these technologies for intelligence gathering purposes.
 Communication: Intercepting communication between terror groups and enhancing intelligence sharing and other collaborative measures between security agencies is now absolutely possible through ICT. We now have electronic devices and gadgets with in-built unique identification numbers that makes them electronically traceable regardless of location. So it’s no longer impossible to track communication devices or gadgets used by criminal gangs or groups.
 Financing: ICT is a vital tool for tracking, tracing and investigating suspected financial transactions funnelled to criminal activities. With the recent introduction of cash-less society, transactions will be done on electronic platforms where suspicious cash movements can be identified and questioned. This would go a long way in curbing the financing of activities that constitute a threat to national security because no terrorist group or gang can operate without funding.
 Coordination: Security agencies can minimise duplication of efforts, guard against the mishandling of information as well as enhance information sharing among them for a better management of our national security through ICT. This involves pulling the nation’s data into a coordinated and centralised database as a proactive means of combating insecurity.
 In his paper titled: Information Communication Technology and National Security in Nigeria, the Director-General, Nigeria Governors’ Forum Secretariat, A.B Okauru, suggested the development of a Central Intelligence Unit or Counter Terrorism Unit with a robust, dynamic, vibrant and updated central database for the country.
 According to him, the centralised database should contain every data and details of the nation.  An example is the conversion of the National Identification Card into an electronic form as well as making all the identification (drivers’ licence, SIM card registration, National ID etc.) into a single digital electronic form and uploaded on a central database.
 Identification: In advanced countries of the world, birth and death registration, in addition to unifying various identification initiatives, plays significant roles in national security, especially when combined with DNA, facial recognition and finger printing technologies which operate on platforms provided by ICT. That is why it is easier in those climes to easily track down criminals.
 Public enlightenment: Recently, a church unveiled its e-portal system that computerised membership registration and other ancillary services. Managers of this e-portal send regular precautionary SMS alerts that assist members to be at alert and take precautionary measures. Sensitisation and advocacy on security enlightenment issues using ICT-driven solutions, therefore, can play significant roles in tackling insecurity in the country.
 I am aware that a lot of seminars and conferences have been held on security issue on many occasions in Nigeria. This is good, but I think that it is time to ‘walk the talk’ because the recent killing of school children in Yobe State tells one story – the perpetrators are not done yet. In fact, they are becoming deadlier and more sophisticated by the day.
 Reports show that the United States and some countries in Europe, Asia, Middle East and even in Africa are taking proactive steps at checkmating threats to their national security by latching onto revolutions in ICT. Besides its speed, technology-driven surveillance and intelligence gathering cost less in terms of men and logistics. That is why terrorists’ attacks in the magnitude of 9/11 may never happen again.
Our government, therefore, needs to do more than talking by acting now.