EFFIONG DANIEL ASUQUO

EFFIONG DANIEL ASUQUO

I love learning new things and making connections..

Location Abuja, Nigeria

Activity

  • Community based research is totally different because they have different factors affecting it like Religion, Ethnicity, Location etc. Also identifying the Socioeconomic and environmental factors are key in community based research.

  • Identity theft happened to my mother on he bank account, where a fraudster sent a text to her as her banker. She was curious and called the number, she gave almost all her details before i walked in to ask what she was doing? I immediately knew it was a fruad. I had to take her to the bank to change her details immediately. Luckly enough, i saved the day.

  • F-Secure Freedome VPN
    Freedome by the folks at F-Secure is a very feature rich VPN app. There are security features owing to app security along with tracking, connection and browsing protection. It shows stats about any malicious apps on your device, harmful sites and tracking attempts. The app includes more than 15 virtual location to choose from including...

  • I thought i was the only one who found Cryptography a little technical.. However, I learnt loads of new stuffs.

  • Simply create an email software that encrypts emails with simply a click, then a key is generated to the recipient through their numbers to decrypt the message..

  • From what we have learnt the site isnt secured, it has no padlock on the address bar...

  • Turly learnt a lot this past week. World wide web is related to connections of software applications interacting with one another, while internet is connection of various computers...

  • Free hotspots isn't my style. In hotels, i mind what i use their wifi for and prefer using my mobile wifi.. However, i hope my ISP has protected well enough while using their services.

  • My location doesn't interfer with server location. Discovered that datagram paths through Asia was lesser compared to USA and UK.

  • My location is different from where am sourcing info from...

  • This datagram and TCP/IP router expirence gives me an idea why i send chats to a friend, i notice that the 1st chat message gets in late, while the 2nd chat arrives before the 1st. This usually causes misundering of communication some times.
    I understand that its caused by router routing and datagram delivery..

  • I have never thought of the difference between the Internet and world wide web..

  • Am feeling like a smart dude among my peers. I ve been equiped with so many skills and resources through this course...

  • I use Microsoft system, i do a lot of system checkups and also run system defragmentation to help keep it healthy. Then i run AVG on auto mode to do all my dirty jobs..

  • AVG all the way and kaspersky is wonderfully harsh..

  • My company server was infected with trojan horse.. It infected one of our client's job, which almost costed us our reputation. On the server we see the job, when we tranfer it to our client's location, it comes up will virus alart.. We had to zip the folder and unzip it on a virus free system with active antivirus. Thats how the day was safed.

  • @Ed Evans, you will be surprised at the level of computer illitrates all over the world, who has no knowledge about computer, talk less of operating one.

  • Cyber crime is a big business, imagine the malwares and vulnerable individuals that fall victim to such rogues, especially in Africa where computer awareness is still low but alot of financial services are online.
    In this case, the illitrates suffer more because they are not litrates in IT. Their curiosity plays a role to their vulnerability...

  • Malwares can liken to be Rogue softwares with harmful consequences to both hardwares and softwares..

  • Malware is an abbreviation for malicious software. Its a software that is specifically designed to gain access or damage a computer without the knowledge of the owner, more or less espionage software.

  • Rogue security software: It deceives or misleads users. It pretends to be a good program to remove Malware infections, but all the while it is the Malware. Often it will turn off the real Anti-Virus software.

  • Just learned about differentiating types of malware and how they strive... Excellent course..

  • EFFIONG DANIEL ASUQUO made a comment

    So viruses are mostly triggered or spread by human carriers from flash drives or storage devices., while worms are spread over the network seeking vulnerable machines to prey on. Interesting..

  • Viruses from what i have learned, can be seen as parasites. We have harmful and non harmful parasites. However, we take drugs to flush out or protect ourselves from such parasites like worms etc. So also viruses and antivirus..
    This is the way i understand the course or topic thus far.

  • Enjoying every structure of this course, but found open authentication a little here and there. Will need to research more on it.

  • Work place clock cards and access to restricted areas, after inserting the card you need finger print access to authenticate the process to be accepted, that is a secured Two-factor authentication process.

  • Its great to know how easy or instances that may lead to ones account to be compromised. However, the security solely depends on the owner of such account to mount guard and monitor it. That can be a little stressful though..

  • Abuja was weak, after i added upper and lower cases plus numeric values and _@# signs, it became very strong.

  • Am liking this course more and more. Someone like me who can spell words in my native tongue aside English language can make a combination of esthetically strong passwords.. Hmmmmm happy to know..

  • My passwords are a little porous from what i have learned today. I will make things more complicated from henceforth. Will incorporate %@134upper and lower cases to my passwords now.

  • We as users should make passwords difficult to attack? We many achieve this when we first opened a new user account, but as time goes on if too complex, we many forget the combinations.. This is a #challenge for everyone..

  • From alittle research checking on the best passwording style, found that the secured way to store passwords is using slow hash, bcrypt algorithm. Its more secured.

  • Finger print or thumb print is helping out to solve complex and long passwords entries.

  • @ Lynne, i appreciate the advise and have been equipped now than ever to tackle threats.. Will surly be more security conscious.

  • I am happy to update my knowledge base on cyber security. Cant wait to learn more on week2. Also found the extra resource links helpful. I am already feeling equipped.

  • Shopping online is trending in Nigeria, i personally prefer that because of comfort and simplicity. But everybody worries about privacy of information, banking detail security and so on.
    Hackers continue to try to infiltrate financial institutions’ server with malware and phishing software, and in many cases are very successful.

  • @ Co Gelderloos, i will put your procedures into use. Thanks for the useful hints.

  • Agobot/Phatbot/Forbot/XtremBot
    This is probably the best known bot. The bot is written in C++ with cross-platform capabilities and the source code is put under the GPL.
    It was written by Ago alias Wonk, a German who was arrested in May 2004 for cyber crime.

    Chinese Foreign Ministry spokesman Zhu Bangzao rejected allegations that China stole U.S. nuclear...

  • What a useful information on security resources... I feel equipped already.

  • I have alittle issues on windows update. i found out that updates also contain a lot of megabytes, overtime it eats up and becomes gigs on the hard disk, resulting to system slowdown.. Can updates or patches be reduced? Or rather, can OS be light enough to accommodate future updates or patches, This will help our hard disk and processors.

  • The malware dubbed 'stuxnet' attacked on Iranian uranium centrifuges to my opinion caused the following to the programme
    1. Confindentiality was not violated, the malware did not transmit any data to any source.
    2. Integrity was altered by Stuxnet, the programs that made the motors rotate at specific rate was breached
    3. Users had full access to data,...

  • With the world tending towards IoT (internet of things) this is a serious issue we all are taking lightly. Imagine if that is hacked, that means all my life has been hacked and manipulated. I see network security experts being the next high paid individuals.

  • Delightful insight to what i have expirenced in the past..

  • This is getting interesting, am liking the course. malware names i never knew are getting me interested.

  • I can imagine African businesses and Government establishments that are suffering from such attacks without a good enough fight..

  • Good morning all, internet security is not a joke because i have been a victim at work place and my private e-mail. This caused me a lot emotionally and tension at my former employment. Cant wait to learn new skills and technics to overcome cyber security threats...

  • Social media in its context is the new wave or pop culture. The internet of things is the next revolution, this course gives one a basic background to leap into the next level..

  • I love social media and cloud computing, hence i get close to trends so i dont get lost...

  • Awesome resources, this id very informative..

  • Doing it over again? I will be a resource station and stick to professional ethics/formal personality... Though for selected sites, a times it feels good to be casual, once in a while anyway.

  • Circle of Friends and past colleagues makes most of my links. So most already know my abilities, so if i acquire new skills and hope for endorsement, i pretty get it. But some times, we need more, will use this format and see how it turns out..

  • Passive support can only change to massive support if there is ease of means to donate. if i can get a code from my service provider to text a word to a particular number and that's all, the donation is made, then the amount is deducted from my phone. i guess a lot of donations can be achieved.

  • Social media has played a lot of success role to true courses such as exposure and funding, which in turn translates into needed solution.

  • The Chibok girls saga, which got the world attention through social media #bringbackourgirls, the became an instant success campaign.

  • my job has been challenging and has made me to apply snail speed on this course, but it is worthy of completion.
    However, this course is opening my eyes to technical issues regarding my carrier and giving me more tools/skills to help in resolving complex analysis.

  • Rufaro, Thanks so much. Will keep a date with the course.

  • Rebecca, i think this may help in terms of knowing how many friends they have on Facebook, click on their name then check their profile, on the profile page, all the information you need are displayed there. That is how I check on people who send me friend request before I accept them.

  • This analysis is throwing more light into how I can identify a power node amongst the lots..

  • Henry is the power guy, just like real world, celebs might have a lot of followers but few follow back, but once they Twitt, it goes viral because of the retwitted message originating from them. This is a power node.

  • I have a very high cluster on my Facebook and Twitter. My friends follow through almost anything my fellows post. It's like a community carried into a digital or virtual world that lives on and on.....

  • Am racing against all odds to catch-up with studies and work... However, the topic gives me an analogy on the concept of correlation of concepts in real life cases..

  • Naturally, students run away from maths. However, I agree with you.. :D

  • I agree with you Natasha, that was my first statement.

  • The nodes, edges and hubs are more like family tree pattern, if they become random, then the phenomenon of stringed connections where friends of yours friends connect to you. locations and common interest becomes less important.
    This is usually common, when platforms acts as nodes and edging themselves together eg. when posting on Instagram or Twitter...

  • Reading people's comments helped to connect the dots.. The reading was cloudy but after reading the comments section, I found some answers to my questions and curiosity.

  • Recruiting Companies varify people from Facebook, LinkedIn, Twitter etc. This helps them to know who they want to hire and how you relate with people socially or otherwise.
    However, some advertising companies pay huge amount to get info from social media platforms to get users shopping patterns to help them push their adverts on such users that suit their...

  • This course has enhanced my approach in judging military operations during warfare within and outside my country. With the global issue on terrorism, I now make calculative and theoretical analysis towards it.

    I would like to partake in such courses in the future.. Thank you.

  • Anthropology of human behaviour and social media is key to help us strike a balance to this study. Social media has given us a platform to understand the past and present trends to how humans are interconnected regardless our believes, region, geographical location and social status.

    Social media is simply a platform for us to interconnect and reason...

  • This course is opening me up to newer platforms I didn't take serious in time past. Loving this course..

  • As I grew older and acquired more education, I discovered my online personality and image was important, so I needed to be more careful on my followers, friends and what I posted. The pattern changed.

    My preferred social media platforms (SMP) are; LinkedIn, Pinterest, twitter, Facebook, Google+, Instagram. They fit into my activities.

    I use various...

  • Hello, can't wait to explore the possibilities this course will present to me.

  • Hello, my social media profile is a simple introduction of who I am and what I expect to achieve/attract through that platform.

    Some platform helps us in advertising who we are and what we can do. Examples of such are; LinkedIn and Facebook etc. This platforms are most verifiable to me. Though this is applicable to people who have ethical integrity in its...

  • Thanks Guy, I will check on it..

  • From the little I know, there are always cheats during war. The 1st world war saw the Germans use Zeppelins to pound civilian locations in England, to force them abandon the war.
    However, if allowed, biological weapons will be crazy. The components and contents of it can create more damage than what we are ready for. I sure do know, we don't want to see...

  • I really wish a course on cyber security as regards to military can be offered..

  • We can't ban killer robots because they go where humans can't. I stand to be corrected, i truly feel they should be semiautomatic not fully auto. If you have lost a loved one or someone so dear to our hearts, we will consider replacing humans with robots. They may be controlled from a remote location by the handler, through camera and other computerised...

  • This started in world war one when the use of Zeppelins were used to throw bombs on non-combatant targets. Which weren't accurate, hence unmanned weapon systems emerged.

  • The difficulties of getting the balance right between the media and the military is when to relate sensitive information to the media. During the #bringbackourgirls campaign the then elected state gave an incorrect information that was retracted back from the global information domain. This was a major error to the elected state of that time.

  • Lino, I agree with you. Military officers that are defence information directors as the are called in my country, should in a moment of their life go study investigative journalism, this will help them a lot.

  • Reporting live from the theater is only meant for the Commanders and the elected state leaders. Example is the US President and the Navy seals that took Osama bin Laden down. If live reports was on before and after the mission, the target would have relocated and the causalities wouldn't have been funny.

  • Well trained Commanders who are vested in military ethics should always lead the charge during military operations. Operations should be kept secret till carried out successfully, then it can be announced. For example, the Osama Bin Laden's operations. If it was announced, I doubt if it would have been a successful operation.

    My opinion is, the Media should...

  • I believe the idea of conscription for nation building is welcome. In my country Nigeria, all graduates from the University and polytechnics, engage in a compulsory one year national youth service. This is aimed to achieve tolerance and socialising amongst young citizens. This scheme is coordinated by the military.
    However, this isn't meant for combat...

  • In my country, there is also one year compulsory national youth service as it is called. If you are below 30 years, after you graduate from the University or polytechnic, one is required to compulsorily serve the country for one year.

    This scheme is coordinated by the Nigerian military. It's not necessarily for military purpose but to foster unity amongst...

  • Hassain, You are on point. Very well said.

  • Thank you Adams for the extra concern, am pleased someone is listening.

    In week 5, words usage in explaining concepts was a little abstract. Please use simple words because the important thing is the ability to communicate with the audience. I had to translate to everyday English before I could make total sense of some topics or paragraphs. This took extra...

  • Just caught this from the video that a state must have it's foundation on an ethical moral stance, which is the model on with drives the ethical operations of its military.

  • I finally made it to the end, want to thank the course developers and tutors for this excellent course, looking forward to learn from you soonest.

  • This last video just reminded me that SM isn't about platforms but content. I have so enjoyed the course.

  • Change, evolution, revolution and humans are all part of life, this gives meaning to our existence. We tend to make life simpler, meaningful and interesting, thus inventions became necessary.

  • Just like it was said in the video, the world has changed SM in the sense that when the platforms were formed or created, the inventors never knew the pattern it will follow in terms of usage. But today culture, religion, geographical region and economic variables all affect the input/output of SM.

  • 1) yes there are differences between offline and online presence with some of my contacts. They seem perfect in looks, ready for the set. They tend not to show too much of private life, its more of a formal one.
    2) most people are segmented in the sense that it's easy to know those from humble background and wealthy ones. The wealthy ones, incline towards...

  • I don't think it is exaggerated and homogenised that hundreds of posts on social media, carry regular patterns and repetition of genres and posting. Most memes are more like series and episodes that continues in a pattern of story telling.

  • Social media, has brought the world closer. We can afford to see events happening on real time or just as it happened with the help of social media..

  • I think people are just having fun. Though, they tend to live a life of fairy-tales on social media. What some cant naturally get or achieve, SM helps them to. Examples are friends posting expensive holidays and foods etc.

  • In terms of technology, people brag about using newer social media platforms, like when people are talking about WhatsApp, most High class have moved to wechat, Twitter, instagram and Pinterest etc.

    Some also brag about selfies of eateries, expensive restaurants and vacations.

  • In my own view, people tend to post selfies of themselves having fun and expressing their wealth or success through flashy selfies. However, I do have a mixture of both Brazilian and Chilean exhibitors.

  • To me social media has contributed to some and has also not contributed. Some people dress well and post nice pictures which can be verified but if they are people you know offline, you ignore them and see them as jokers.
    But same people might scale through with people that don't know them offline. In return, this persons meet rich people and end up becoming...

  • I wish this week, will be more user friendly..

  • This week was tasking, I enjoyed the course..

  • It will be bad if one side maintains just war theory rules and the other doesn't. Then i will say a perfidious violation of trust occurred between them.

    Pretending as being an AMERICA soldier and infiltrating their lines may sound smart and being a strategy. But it violates the principle of just war.