Monday, November 5, 2018

Three Nigerians arrested for trafficking 35 pregnant women, newborn babies

The Nigeria Police Force, on Friday, paraded three members of a syndicate that specialised in buying and selling of newborn babies within and outside Nigeria.


The suspects are: Emmanuel Chigozie Elesuwa, 44; Chioma David, 33 and Chief Lilian Nma Achumba, 52 (Owner of Nma Charity Home in Aba, Abia State).

Parading the suspects, Deputy Force Public Relations Officer, Abuja, CSP Aremu Adeniran, said 35 pregnant girls/women, six children and one newborn baby were rescued at the Nma Charity and Rehabilitation Centre, Umunkpeyi.


He told newsmen in the state that on the 20th of July, 2018, the personnel of the Nigeria Police Force and the Nigerian Immigration Service, while on patrol, at the Idi-Iroko Border Post in Ogun State, intercepted the three suspects in possession of two newborn babies.

“The case was handed over to the anti-human trafficking and women/children protection unit of the Force for discrete investigation.

“Investigation revealed that the suspects are notorious criminals that deal in buying and selling of babies and children within and outside Nigeria.


“They admitted and confessed that they have been in operation for over 10 years. They further confessed that the 2 babies found in their possession were bought at the rate of N350k from Chief Lilian Nma Achumba.

“They also revealed that they were on their way to Benin Republic to sell the two newborn babies to their partners for N700k each,” he said.

He added that Achumba’s purpose of establishing the Orphanage Home was to harvest babies for sale and that she also operated other branches in Port-Harcourt and some other parts of the country.

Saturday, July 7, 2018

How to track a lost Android phone with Android Device Manager




If you have lost your phone don’t worry, it is often possible to get it back. With the free Android Device Manager tool you can locate your phone, seeing its position on a map so you can track it down
ADM also enables you to lock the device so that nobody will be able to see your data, and if you suspect it may have actually been stolen instead then you can remotely initiate a factory reset—wiping all your information and accounts so they are completely protected.
Android Device Manager is built-in on every new Android phone and tablet and it runs permanently in the background. So long as the device has an internet connection either through your SIM card or wi-fi, it is able to report the its whereabouts. Accessing the information that ADM is reporting is done via your Google account on any web browser—so even if you’re travelling when you lose it you still have a chance of tracking it down.

Activate Android Device Manager


ADM is rather hidden within Android. Go to Settings > Security and scroll down to Device administrators. Here you will see an option labelled Android Device Manager. Tick the box to activate the service.
That’s all there is to it. There’s nothing else to configure on the handset itself—the service will function as and when you need it.

Your phone’s position will be shown on a Google Map. It’s accurate to a few metres although does not update in real time so refresh the screen to see if it is moving.
If the phone is nearby—lost somewhere in your house, for example—click the Ringbutton. The phone will ring for five minutes at maximum volume (even if you’d got it set to silent). When you find the phone press the power button to stop it ringing.
ring-ADM
If the device isn’t nearby but you think you may be able to recover it you can click the Lock button. This locks the device and replaces the existing lock screen. You can add a message asking the person who finds the device to contact you.
new-lock-screen-ADM
Alternatively, if your device has been stolen, or you don’t want to risk your data you can click the Erase button. This will completely wipe the phone by performing a factory reset.
erase-ADM
If you’ve got more than one Android device you can install the Android Device Manager app on both of them and you’ll be able to track and manage one from the other.

If your phone is turned off

Your device needs a live data connection to be able to be tracked. However some commands, such as the Erase command, will be sent and executed the next time the device connects to the network. Obviously if the person in possession of the phone factory resets it there’s nothing you can do, although at least your data will not be compromised if this happens.


Track your phone

You can locate and manage your phone through any web browser. Go to www.google.com/android/devicemanagerand login to your Google account.

The device manager service will now launch and attempt to make contact with your phone. So long as the phone is switched on and has an internet connection it should be found within just a few seconds.
Lyricsiq.comhttps://lyricsiq.com for entertainment gist

Thursday, July 5, 2018

List of Questions

Latex formatted questions may not properly render

Q1 Given f(x) = $$(7x^{4} - 5x^{3})$$, evaluate \[\frac{d f(x)}{d x}\]
 
 
 
 

Q2 Evaluate \[\int x^{2} e^{3x} dx\]
 
 
 
 

Q3 Find the volume of a sphere generated by a semicircle \[y=\sqrt(r^{2}-x^{2})\] revolving around the x-axis
 
 
 
 

Q4 Determine \[\int\frac{x^{2}+1}{(x+2)^{3}}\]
 
 
 
 

Q5 Evaluate \[\int \frac{x+1}{x^{2}-3x+2} dx\]
 
 
 
 

Q6 Find $$ \int {\sec^3 x}{\tan x}dx$$
 
 
 
 

Q7 Find the $$\int {\tan^3 x}{\sec^3 x}dx$$
 
 
 
 

Q8 Find $$\int x\cos ax^2dx$$ with respect to x
 
 
 
 

Q9 Evaluate \[\int x e^{6x} dx\]
 
 
 
 

Q10 Evaluate $$\int e^{4x}dx$$
 
 
 
 

Q11 Integrate with respect to x :$$ \int_{1}^{4}\frac{x+1}{\sqrt{x}}dx$$
 
 
 
 

Q12 Integrate with respect to x :$$ \int_{-1}^{3}\frac{x}{\sqrt{7+x^2}}dx$$
 
 
 
 

Q13 Integrate with respect to x :$$ \int_{-1}^{2}\frac{x^2}{(x^3+4)^2}dx$$
 
 
 
 

Q14 Evaluate \[\int_{-1}^{2} y^{2}+y^{-2} dy\]
 
 
 
 

Q15 Find the integral with respect to x $$ \int \cos x\sin x dx$$
 
 
 
 

Q16 Evalute \[\int x^{2}(3-10x^{3})dx\]
 
 
 
 

Q17 Evaluate \[\int 3e^{x}+5\cos (x) -10 \sec^{2}(x) dx\]
 
 
 
 

Q18 Evaluate \[\int \cos (6x+4)dx\]
 
 
 
 

Q19 Evaluate \[\int(3x-2)^{6} dx\]
 
 
 
 

Q20 Integrate \[\int (x^{3}+3x^{2}+2x+4)\]
 
 
 
 

Q21 Differentiate \[y=3\sqrt(x^2)(2x-x^{2})\] with respect to x
 
 
 
 

Q22 Differentiate with respect to x: \[f(x) = (ax{^3} + bx)\]
 
 
 
 

Q23 Given \[y(x)=x^{4} - 4x^{3} + 3x^{2} -5x \], evaluate \[\frac{d^{4} y}{d x^{4}}\]
 
 
 
 

Q24 Given \[\frac{2x^{5}+x^{2}-5}{t^{2}}\], find \[\frac{d y}{d x}\] by using the first principle
 
 
 
 

Q25 Find the derivative \[f(x)=2x^{2}-16x+35\] by using first principle
 
 
 
 

Q26 Evaluate the limit \[\lim {x\rightarrow \infty} \frac{6e^{4x}-e^{-2x}}{8e^{4x}-e^{2x}+3e^{-x}}\]
 
 
 
 

Q27 Evaluate the limit \[\lim {x\rightarrow -\infty} \frac{x^{2}-5t-9}{2x^{4}+3x^{3}}\]
 
 
 
 

Q28 Evaluate the limit \[\lim {x\rightarrow \infty} \frac{2x^{4}-x^{2}+8x}{-5x^{4}+7}\]
 
 
 
 

Q29 Evaluate the limit \[\lim {t\rightarrow 4} \frac{t-\sqrt(3+4)}{4-t}\]
 
 
 
 

Q30 Evaluate the limit \[\lim_{h\rightarrow 0}\frac{2(-3+h)^{2}-18}{h}\]
 
 
 
 

Q31 Differentiate \[y=3\sqrt(x^2)(2x-x^{2})\] with respect to x
 
 
 
 

Q32 Differentiate with respect to x: \[f(x) = (ax{^3} + bx)\]
 
 
 
 

Q33 Given \[y(x)=x^{4} - 4x^{3} + 3x^{2} -5x \], evaluate \[\frac{d^{4} y}{d x^{4}}\]
 
 
 
 

Q34 Given \[\frac{2x^{5}+x^{2}-5}{t^{2}}\], find \[\frac{d y}{d x}\] by using the first principle
 
 
 
 

Q35 Find the derivative \[f(x)=2x^{2}-16x+35\] by using first principle
 
 
 
 

Q36 Evaluate the limit \[\lim {x\rightarrow \infty} \frac{6e^{4x}-e^{-2x}}{8e^{4x}-e^{2x}+3e^{-x}}\]
 
 
 
 

Q37 Evaluate the limit \[\lim {x\rightarrow -\infty} \frac{x^{2}-5t-9}{2x^{4}+3x^{3}}\]
 
 
 
 

Q38 Evaluate the limit \[\lim {x\rightarrow \infty} \frac{2x^{4}-x^{2}+8x}{-5x^{4}+7}\]
 
 
 
 

Q39 Evaluate the limit \[\lim {t\rightarrow 4} \frac{t-\sqrt(3+4)}{4-t}\]
 
 
 
 

Q40 Evaluate the limit \[\lim_{h\rightarrow 0}\frac{2(-3+h)^{2}-18}{h}\]
 
 
 
 

Wednesday, July 4, 2018

The Basics

Install the First Version of Windows, If It’s Not Already Installed

Shrink Your Windows Partition

Install the Second Version of Windows

Choosing Your OS and Modifying Boot Settings


Monday, July 2, 2018

phone hacks: How to find a lost phone, or any other kind of smart phone or devices
MOBILE
How to find a lost phone, whether it’s Android, iPhone, or any other kind
By Simon Hill — Posted on April 24, 2018 - 6:00AM
 how to find a lost phone
Tom Grundy/Shutterstock
So you’ve lost your phone. We’ve all been there. It was just in your pocket a minute ago — and now it’s gone, lost to the phone fairies, forgotten between the seats of your couch, or misplaced somewhere during your busy day. Maybe it’s just in your other coat, or maybe it’s already in the hands of someone who found it on the sidewalk. Either way, all you want to do is get it back.

Thankfully, there are plenty of ways to get a hold of your missing phone. If it’s a smartphone (or even a tablet) running iOS, Android, or even Windows Phone, chances are good it already has the software needed to hunt it down — or there’s an app you can install to track your phone. Here’s our guide on how to find a lost phone or a similar device.

Have you ever wondered what happens to a smartphone after it’s stolen? Read how this filmmaker spied on a thief to find out.

Smartphones
If your lost phone happens to be a smartphone, all three of the major smartphone platform providers (Apple, Google, and Microsoft) include phone retrieval technology in their smartphones. Usually, the way these apps work is through the account associated with your device. For Android devices this is your Google account, for iPhones, this is your iCloud account, and for Windows Phones this is your Microsoft account. All three allow you to remotely lock and wipe your phone, make it ring, and set up special messages to alert whoever finds it.

Of course, these features are only as good as your phone’s battery. If your smartphone dies, it’s about as easy to find as your wallet or anything else you might misplace.

We also recommend caution when communicating with anyone who has found your smartphone. Be careful to avoid giving away any personal information, such as your home address, until you know you’re dealing with someone you can trust. Stick with sending phone numbers or email addresses to communicate how the good Samaritan can return your phone. Here’s how each of the three operating systems work.

How to find a lost Android phone
Android not only offers Google’s proprietary service for finding and managing your device remotely but also a number of third-party apps designed for finding your smartphone. The easiest to use is Find My Device, which is built directly into your Android smartphone through Google Play Services — it can also be used in a browser or downloaded from the Google Play Store. Most devices running Android 2.3 or later should be able to use this feature.

Using the feature is as easy as searching  “Where is my phone” in Google, which will prompt the service to start looking for your smartphone. We’ve previously written about Find My Device and its ability to call you, set up a new password, and make your phone ring from afar, along with the variety of other functions it uses for notification purposes. While you can configure Find My Device ahead of time, the service should be available in the event you lose or misplace your phone. It will use Wi-Fi or GPS to help you hunt down your device.

find lost android device
find lost android device
To verify your Android smartphone has the Find My Device feature turned on, go to Settings > Google (or Google services) > Security and make sure Remotely locate this device is turned on in the Find My Device section.

If you can’t find your smartphone, you can always wipe it to prevent sensitive information from getting into the wrong hands. Your device will need an internet connection, however, and enough juice to communicate with you. In Android 5.0 Lollipop, Google also introduced Factory Reset Protection (FRP). It’s designed to prevent would-be thieves from being able to steal your phone, wipe it, and then use it or sell it. If you factory reset a phone with FRP enabled and try to set it up as a new device, you’ll be prompted to enter the username and password for the last Google account that was registered on the device, and if you can’t, the phone will remain locked.

There are also third-party apps that you can install to help you find your phone. Cerberus Anti-theft is a great app that offers remote access and control, allowing you to obtain more information regarding the whereabouts of your phone. It provides a number of additional features, such as more granular control on how you track your device, screenshots of what your device is doing, photos from the camera to possibly catch the would-be thief, and other, more detailed notifications that Find My Device doesn’t offer. If your device is rooted, there are even more features available to prevent someone from resetting or turning off your device until you can recover it.

Another option for select Samsung smartphones is the Find My Mobile service. It can be used to locate a missing phone, lock it down, or wipe it completely. You’ll need a Samsung account, though, and the Remote Controls options enabled on your phone. To check and see if Find My Mobile is available for your smartphone, go to Settings > Lock screen & Security. If you see Find My Mobile in the menu, you can use the service; enable the Remote Controls options via Settings > Security > Find My Mobile > Remote controls.

samsung-find-my-mobile

Saturday, June 30, 2018


While the smartphone has made many of our work easier, there is also a concern about security. Where, when a hacker breaks into our smartphone and stole our most important information, this fear remains often. To overcome this, the scientists continue to develop a better security system. Many smartphones include facial recognition, fingerprint scans and other biometric systems. However, the trouble with these easy-to-use tools is that once compromised they cannot be reset.

But now, American scientists have developed a security system that will use the smartphone's password as the brain of the user after it's been in the market. Smartphones will be unlocked only by recognizing the brainwaves in response to a series of pictures - an advance that could better protect devices from hackers. According to the scientists at Buffalo University, electroencephalography (EEG) is currently a very easy system, through which the waves of the brain can be recorded.

"You can't grow a new fingerprint or iris if that information is divulged," said Wenyao Xu, an assistant professor at the University at Buffalo (UB) in the US. "That's why we're developing a new type of password - one that measures your brainwaves in response to a series of pictures. Like a password, it's easy to reset; and like a biometric, it's easy to use," said Xu.

The "brain password," which presently would require users to wear a headset, but in the future, it has to be tried to make it even better. It could have implications in banking, law enforcement, airport security and other areas.

"To the best of our knowledge, this is the first in-depth research study on a truly cancelable brain biometric system. We refer to this as 'hard cancellation,' meaning the original brain password can be reset without divulging the user's identity," said Zhanpeng Jin, an associate professor at UB.
get the latest hacking gist here
We have consistently seen various vectors of attack rear their head when it comes to Android smartphones. We’ve seen Shattered Trust, Cloak and Dagger, and Rowhammer, just to name a few. RAMpage is the latest one on the block, and while it is a hardware vulnerability, it doesn’t necessarily need physical access to your device to exploit. How it works is relatively simple.

A group of university researchers have discovered that this vulnerability could theoretically work on any device with LPDDR memory, which includes virtually every smartphone released since 2012, including some Apple devices.

When a CPU reads or writes a row of bits in the RAM module present on the device, the neighbouring rows are slightly affected due to a tiny electric discharge. This isn’t usually a problem as we know RAM does this and that’s why it’s periodically refreshed to make sure nothing goes wrong. But what if we start “hammering” the same “row”? What if we continuously read or write to the same row in order to disrupt neighbouring rows? This can cause a bit-flip in a memory row that we shouldn’t own or have access to at all. That’s what Rowhammer is, and it’s being used as part of a larger vulnerability called RAMpage. The CVE is CVE-2018-9442 and it affects devices shipped with LPDDR2, LPDDR3, or LPDDR4 RAM.

RAMpage can be used to gain root access on a device, but the researchers managed to get it to do a whole lot more as well. It could be used to bypass JavaScript sandboxes and even perform an attack running on another virtual machine on the same computer on x86 devices. ARM-based devices are also vulnerable, and that’s where our Android phones come in. DRAMMER stands for “Deterministic Rowhammer Attacks on Mobile Devices”.

The attack allows a hacker access to the entire operating system. This includes accessing the data stored by other applications, which the Android security model is meant to prevent. An attacker can gain full control of a device allowing them to obtain stored passwords, personal photos, emails, instant messages and even business-critical documents.
get the latest hacking gist here

Unordered List

Sample Text

Blog Archive

Search This Blog

Powered by Blogger.

Three Nigerians arrested for trafficking 35 pregnant women, babies

Three Nigerians arrested for trafficking 35 pregnant women, newborn babies The Nigeria Police Force, on Friday, paraded three members of a s...

Popular Posts

Recent Posts

Text Widget