New Decade Savings: Ditch it or Keep it?

Zed The Financialist

  1. The 52 week savings challenge

This is a challenge where you start by saving 50 shillings next week (week 1 of the year), then 100 bob the next week, 150 bob next week and so on and so forth, until the last week of December where we will save 2,600 bob, and your savings will add up to Kshs 68,900 . The point is to add 50 shillings every week to the previous week’s savings amount. here’s the plan;

50-Challenge-sheet

However how many have had the discipline to keep up with the challenge till December? I mean realistically can you remember how much you put in mid May for example. It seems quite technical and honestly saving does not really come out easily for anyone. It takes a certain level of personal conversations and standing orders to get people there.

It’s not just our money, it’s our money minds, out of sight is out…

View original post 448 more words

Mobile Phone Hacking Applications & Techniques

What is Phone hacking

It is the practice or action of getting unauthorized access to information and data stored in another individual’s phone.

The level of access you can get depends on your abilities.

Why should someone hack into a cell phone?

1. How to hack a cell phone to protect your kid
· The latest statistics have shown that a huge number of kids, especially teenagers own a cell phone.
· Parents want their kids to have a cell phone so they can call them whenever they want to hear their voice and determine their location.
· However, owning a cell phone as a kid brings some risks too.
· First of all, kids can be tricked by people with bad intentions when they use text messages or when they use the Internet.
· Additionally, kids can decide to skip school and not answer their phones when their parents are calling.
· These are some of the situations when you definitely want to know how to hack

your kid’s phone.

2. How to hack into someone’s phone and discover the truth about your relationship
· While it is true that relationships are based on trust, it is also true that there are periods when people feel that something is not right with their partners.
· This is when they start looking for answers to one simple question – how to hack

into someone’s phone.
· By getting your partner’s phone hacked you will get access to their call logs, voice messages, browsing history and many other things that can confirm or eliminate your suspicions.
3. Protect your business from employee betrayal distraction
· Finally, if your employees have business phones, then you should definitely learn how to hack Android phone remotely (in case they have Android phones).
· In this way, you can check their location at any time and check the list of calls.
· You should also learn how to hack someone’s phone pictures in order to find out what they are doing during working hours.

By Eve,

The University of Nairobi, Finance Department

SYSTEM HACKING

System Access

  • System access is the ability for an unauthorized intruder to gain access to a system or device for which the intruder does not have an account or a password.
  • Entering or accessing systems to which one does not have access usually involves running a hack, script, or tool that exploits a known vulnerability of the system or application being attacked.

System Access Techniques

  • System Access (also known as System Hacking) follows: foot printing / Reconnaissance phase.
  • System-hacking phase in a single pass – It involves using a methodical approach that includes:
    • cracking passwords,
    • escalating privileges,
    • executing applications,
    • covering tracks – concealing evidence, and then
    • Pushing into a more involved attack.

By Eve Ojal

The University of Nairobi, Finance Department

BUSINESS PROCESS RE-ENGINEERING

Business Process Re-engineering also commonly known as BPR involves the radical redesign of core business processes to achieve dramatic improvements in productivity, cycle times and quality.

In BPR, companies start with a blank sheet of paper and rethink existing processes to deliver more value to the customer. They typically adopt a new value system that places increased emphasis on customer needs. Companies reduce organizational layers and eliminate unproductive activities in two key areas.

-First, they redesign functional organizations into cross-functional teams.

-Second, they use technology to improve data dissemination and decision making.

How Business Process Re-engineering works:

Business Process Re-engineering is a dramatic change initiative that contains five major steps that managers should take:

  • Refocus company values on customer needs
  • Redesign core processes, often using information technology to enable improvements
  • Reorganize a business into cross-functional teams with end-to-end responsibility for a process
  • Rethink basic organizational and people issues
  • Improve business processes across the organization

By Eve,

University of Nairobi, Finance Department

ETHICAL HACKING

Most people think hackers have extraordinary skill and knowledge that allow them to hack into computer systems and find valuable information. The term hacker conjures up images of a young computer whiz who types a few commands at a computer screen and poof! the computer spits out passwords, account numbers and other confidential data.
In reality, a good hacker, or security professional acting as an ethical hacker, just has to understand how a computer system works and know what tools to employ in order to find a security weakness.
Most ethical hackers are in the business for hacking for profit, an activity known as Penetration Testing or Pen Testing. Pen testing is usually conducted by a security professional to identify security risks and vulnerabilities in systems and networks.
The purpose of identifying risks and vulnerabilities is so that a counter measure can be put in and the risk mitigated to some degree. Ethical hackers are in the business of hacking and as such need to conduct themselves in a professional manner.
Additionally, state, country, or international laws must be understood and carefully considered prior to using hacking software and techniques. Staying within the law is a must for the Ethical Hacker. An Ethical Hacker is acting as a security professional when performing pen tests and must always act in a professional manner.
By Eve,
The University of Nairobi, Finance Department

CHESS GAME

Chess is a strategy game played by two players on a sixty four-squared chessboard.

Each player begins with a set of sixteen pieces which is either white or black comprising of a king, a queen, two castles also called rooks, two horses also known as knights, two bishops, and eight pawns. Each of the six piece types moves differently, with the most powerful being the queen and the least powerful the pawn. The main agenda is to checkmate the opponent’s king by placing it under an inescapable threat of capture. To this end, a player’s pieces are used to attack and capture the opponent’s pieces, while supporting each other.

In addition the game can be won by the opponent resigning voluntarily, it mostly happens when too much material is lost, or checkmate appears unavoidable. A game can also end in a draw when a checkmate cannot be reached.

 

A chess match requires fast thinking and problem solving on the fly because your opponent is constantly changing the parameters.

 

FIMS Officer. University Of Nairobi, Finance Department.