The lie: A virtual private network (VPN) connection is very secure. Why it is a lie: VPN encrypts your traffic. But someone could hack into your VPN username and password and access it, and therefore your traffic and all personally indefinable information. Also, your VPN service provider has access to your internet protocol address, URLs you visit, the amount of time you spend connected online, your browsing patterns, data, etc are visible to your provider. A VPN may protect you against your ISP from seeing your traffic, but not from the VPN owner. That is why many governments now use…
MTN Uganda, you can do better
Three days I go, while on a morning run, I came across MTN staff installing Fiber Optic Internet cable. I had a brief chat with one of the men, who connected me to their head office boss responsible for last-mile home Internet packages. Unlike other telecom companies, MTN does provide opportunities to local businesses through deliberate training under MTN Business solutions, as well as Women in Business initiatives, and several other corporate social responsibilities. So, the brand is close to my heart. And truth be told, MTN Kazi Bundle solution for SMEs is one of the most effective Internet solutions…
Practical application of the Internet of Things
A lot has been said and written about the Internet of Things (IoT) and Big Data (BD), but what is the practical application of these new concepts? So many gadgets and equipment we use daily now have sensors and trackers installed. From the smart television to radios, cars, beds, houses, tables, and heck, everything in between. Millions of cameras installed in so many streets and homes generate lots of data and these are increasingly becoming interlinked. Businesses can apply IoT in many ways: Tracking behavior Decision making powered by sensors Enhanced visibility and situational analysis Optimized resources deployment And processes…
Cybercrime on the surface web
There are three levels of internet. The normal web. The deep web. And the dark web. Normal internet users access the surface web. You type any website in the any browser like Google chrome, you will be accessing the website on the surface web. Figure 1: surface web page Websites of all legal companies operate at the surface web. Many of these sites use cache on their sites. This means they will collect some information from you when you visit the sites. The objective is to improve your experience while on their website. Read the full article here
Your on-line activity: The emperor has no clothes
A story is told of an Emperor who allowed himself to be dressed in the finest suite of new clothes, which he had been told “had the special capability that it was invisible to anyone who was either stupid or not fit for his position.” In his special suite, he held a procession through town, never admitting that he was too unfit and stupid to see what he was wearing. He was afraid that people would think that he was stupid. The story goes on that “all the townspeople wildly praised the magnificent clothes of the emperor, afraid to admit…