Picture Copyright: MenWithLocs\
I always like to read stories as well as ask any stuff related to Afro
hair and dreadlocks.
There is need to have strong love to every part of our bodies in order
to enjoy life we need to live the fullest. At times I'm like what!
Like yeah, African or black hair has a strong connection to our roots.
Sometimes we need a quick connection to our ancestors.
Sometimes we got to feel and scratch the hitch. I have got six good
clean ways to appreciate men with locs. They are not thugs, thieves
either Boko Haram but cool souls who appreciates their God's nature
and live their lives to the fullest.
1. Follow their ways for fun.
I mean not doing what they do. But watch them from a distant. If you
got big heart you can go closer and interact with them after all they
are cool folks. I have been making looking for brothers simply to get
hint on the lifestyle.
2. Attend Events featuring big artistes.
You will not miss to see a man or women with locs on every local celeb
activity. This is your time to exploit getting to unlearn and learn
from them. Most of them appear on various categories. If not DJ they
are Dancers or any other person. Don't miss any of the hottest events
of the summer!
3. Learn about locks and their history.
Don't ever come into conclusion when making Judgments without strong
points to defend. What your friend, family, community or culture say
might not be true.
If they say a big rock will be falling to the earth the next day,
trust your mind and follow the truth you have.
Quote: 'If you do or don't go out with certain people all because of
their type, then you are in the world of disappointing
4. Know It is power , commitment, strength, and dedication to grow locs.
Men with locs spend their precious time on their precious hair.
Quote: 'Everyone knows what you are what you eat. What you eat is what you are'.
5. Appreciate your culture and yourself.
The moment you appreciate other peoples culture and life sty lifestyle
means that you appreciate yours too.
6. Everything is love and life.
I can't express how exited you can have someone with locs come across
you. Honest is the first feature most of them possess. Fitness and
life in general might not be problem, not only does most of the
brothers have passion for the people. I mean the heart of helping
people.
I will add that there is no such thing bad lifestyle. Black is
beatitude. But it doesn't mean it is serious or comes with the
required structure, body height or age.
As I've matured in years and this perspective, i have realized that it
is not about the trappings or how long you have encountered men with
locs. It is about the appreciation and how passionate you perceive
them. It is the degree of personal thought attraction, soul, and heart
connection that can make the deepest intimacy possible with someone
loc'd.
It should not be new to you. It is all about the entire connection.
Conversely, you could find spending lifetime with the person you don't
like or appreciate or align with. It is about the connection and how
freely each person is flowing on your mind.
Saturday, April 25, 2015
Friday, April 24, 2015
BEST SITES TO DOWNLOAD FREE HD MOVIES 2015
Image copyright: .- hd movie center.
What is HD video?
High-definition video is video of higher resolution and quality than
standard-definition. Let us say 1080p also known as Full HD.
1080p from Wikipedia is a set of HDTV high-definition video modes
characterized by 1080 horizontal lines of vertical resolution and
progressive scan, as opposed to interlaced, as is the case with the
1080i display standard. The term usually assumes a widescreen aspect
ratio of 16:9, implying a resolution of 1920x1080 (2.1 megapixel)
often marketed as Full HD.
Hello there, i have always been looking for movies in HD, movies on
iPhone, movies for android, movies and TV shows, movies for PC, movies
legally, movies Bollywood/Hollywood, using torrent?
There so many variety of sites which offer free services such as downloads.
it not just all of them that are free.
Today we are focussing on the best sites to obtain direct HD movies.
Most of them have provided services for long and some of them are Newbies.
Here we go:
1. HD Movie Center
Availabilities:
- Over 3000 movies updated almost daily
- SERIES
- Info, embedded trailers
- User Account
- watch list
- favorite
-cast
-ratings from imdb, tmdb & metacritic
-reviews, posters, pictures
- Download links for HD 1080p from the most trusted and verified source.
2. For bit torrent client
we have :
- torrentz.eu
- hepiratebay.se.
You can download with Torch browser easily. this makes things seem easier.
Below is my recommended favourite movie list for you oooh!
1.
What is HD video?
High-definition video is video of higher resolution and quality than
standard-definition. Let us say 1080p also known as Full HD.
1080p from Wikipedia is a set of HDTV high-definition video modes
characterized by 1080 horizontal lines of vertical resolution and
progressive scan, as opposed to interlaced, as is the case with the
1080i display standard. The term usually assumes a widescreen aspect
ratio of 16:9, implying a resolution of 1920x1080 (2.1 megapixel)
often marketed as Full HD.
Hello there, i have always been looking for movies in HD, movies on
iPhone, movies for android, movies and TV shows, movies for PC, movies
legally, movies Bollywood/Hollywood, using torrent?
There so many variety of sites which offer free services such as downloads.
it not just all of them that are free.
Today we are focussing on the best sites to obtain direct HD movies.
Most of them have provided services for long and some of them are Newbies.
Here we go:
1. HD Movie Center
Availabilities:
- Over 3000 movies updated almost daily
- SERIES
- Info, embedded trailers
- User Account
- watch list
- favorite
-cast
-ratings from imdb, tmdb & metacritic
-reviews, posters, pictures
- Download links for HD 1080p from the most trusted and verified source.
2. For bit torrent client
we have :
- torrentz.eu
- hepiratebay.se.
You can download with Torch browser easily. this makes things seem easier.
Below is my recommended favourite movie list for you oooh!
1.
Favourite Movies You Should Watch _ Alphabet A-K
2.
Favourite Movies You Should Watch _ Alphabet L-Z
Happy Times!Tuesday, April 21, 2015
3 Easy Ways To Not Join Illuminati Scam
Some of the top Searches related to Illuminati Kenya, Illuminati
members list in Kenya, Kenyan Illuminati celebrities, how to join
Illuminati in Kenya, Illuminati in Kenya members, Kenyan Illuminati,
Illuminati Kenya contacts, Illuminati Kenya pastors, Illuminati Kenya
politician.
If you look long enough at something, you will probably see whatever
you want. It doesn't mean you will experience or encounter the truth
though.
We get to view these massages everywhere trying to extort money from
the people. The people themselves are not innocent but know and desire
a lot till they lack self awareness
Lately I was coming across many Illuminati things. Many spread photos
on social website and others on websites.
I am glad that I do not find anything eloquent. Many of us do some
things unknowingly.
Putting yourself a tattoo similar to that of Illuminati does not mean
that you are Illuminati.
<!-- adsense -->
There are many perceiving things, people everywhere trying to change
ourselves what is wrong and rights. They play serious calculated games
on people's minds because they have understood our minds. We greatly
desire riches
But how may trades can make us get rich quickly? I'm just asking.
It is not about truth lies, but to know whether or not the symbols of
Freemasonry and other cults.
there is no theory in there, just symbols.
All these idiots that do what they are told to do, otherwise they lose
their careers, and even their lives.
Here are some quick tips to note:
- when we speak of a Freemason, was immediately right a negative
votes, it reassures
- Triangles everywhere are a big crap
Reasons not to Join:
1. Trust your own creator and yourself
Have you ever come across anything like this,' WELCOME TO THE GREAT TEMPLE OF
ILLUMINATI.
Are u a business man, politician,
musical, student and you wanted to be rich,
powerful and be famous in life? You achieve
your dreams by being a member of the
Illuminati With this all your dream and heart desire can be fully
accomplish, if u really
want to be a member of the great Illuminati
then you contact.'
No, trust yourself. Never be
2. Understand freemasonry and Illuminati
Look for all platforms to get information. Exhaust the internet
information, approach religious readers and anything that might be
useful.
3. Don't accept any invitation to join.
Never look for any means to join Illuminati ooh! You will end being conned.
Take care - Chitoh
members list in Kenya, Kenyan Illuminati celebrities, how to join
Illuminati in Kenya, Illuminati in Kenya members, Kenyan Illuminati,
Illuminati Kenya contacts, Illuminati Kenya pastors, Illuminati Kenya
politician.
If you look long enough at something, you will probably see whatever
you want. It doesn't mean you will experience or encounter the truth
though.
We get to view these massages everywhere trying to extort money from
the people. The people themselves are not innocent but know and desire
a lot till they lack self awareness
Lately I was coming across many Illuminati things. Many spread photos
on social website and others on websites.
I am glad that I do not find anything eloquent. Many of us do some
things unknowingly.
Putting yourself a tattoo similar to that of Illuminati does not mean
that you are Illuminati.
<!-- adsense -->
There are many perceiving things, people everywhere trying to change
ourselves what is wrong and rights. They play serious calculated games
on people's minds because they have understood our minds. We greatly
desire riches
But how may trades can make us get rich quickly? I'm just asking.
It is not about truth lies, but to know whether or not the symbols of
Freemasonry and other cults.
there is no theory in there, just symbols.
All these idiots that do what they are told to do, otherwise they lose
their careers, and even their lives.
Here are some quick tips to note:
- when we speak of a Freemason, was immediately right a negative
votes, it reassures
- Triangles everywhere are a big crap
Reasons not to Join:
1. Trust your own creator and yourself
Have you ever come across anything like this,' WELCOME TO THE GREAT TEMPLE OF
ILLUMINATI.
Are u a business man, politician,
musical, student and you wanted to be rich,
powerful and be famous in life? You achieve
your dreams by being a member of the
Illuminati With this all your dream and heart desire can be fully
accomplish, if u really
want to be a member of the great Illuminati
then you contact.'
No, trust yourself. Never be
2. Understand freemasonry and Illuminati
Look for all platforms to get information. Exhaust the internet
information, approach religious readers and anything that might be
useful.
3. Don't accept any invitation to join.
Never look for any means to join Illuminati ooh! You will end being conned.
Take care - Chitoh
Thursday, April 16, 2015
How To Use Your M-pesa Account Effectively
Do you need an m-pesa account or not?
M-PESA has been designed so that people without bank accounts can use
it. Your money is held safely in a bank account run by M-PESA on your
behalf. You do not have any contact with the bank and the bank does
not have your details.
The question to whether you need an account or not might not be much
of our focus.
what we need to undestand is how to use the Account effectively.
managing and taking advantage of everything available.
Here are the basics to exploit:
Manage Your M-PESA Account
You can check your current M-PESA balance status at a fee of Ksh1
only. Note that your balance is also shown at the end of every SMS
each time you do an M-PESA transaction.
To check your balance:
Select "Show balance"
Enter your secret PIN
Wait for SMS confirmation message with your balance
Call Support: You can call M-PESA Customer Service Representatives
through this menu:
Select "Call Support"
A message displays "Allow SIM card to call?"
Press "call"
The same service can be accessed by directly dialling 234 from
your Safaricom mobile.
Change PIN: For security reasons, customers can change their PIN at
any time at a fee of Ksh22.
From the M-PESA menu select "My Account".
Select "Change PIN".
Enter old PIN press OK.
Enter new PIN and confirm it.
Wait for the confirmation.
Secret Word: This allows the customer to change the secret word as
long as they remember their secret PIN.
From the M-PESA menu select "My Account".
Select "Secret Word".
Enter PIN press ok.
Wait for the confirmation.
Language: You can choose which language to use for your M-PESA:
From the M-PESA menu select "My account".
Select "Language".
Choose from English or Kiswahili.
Enter your secret PIN
Wait for display of "M-PESA" then Press OK to view language update
Update Menu
Safaricom will from time to time release new functions on the M-PESA
menu. 'Update Menu' is used to launch these new M-PESA functionalities
on your phone. You will need to enter your secret PIN to confirm the
request.
Bless!
M-PESA has been designed so that people without bank accounts can use
it. Your money is held safely in a bank account run by M-PESA on your
behalf. You do not have any contact with the bank and the bank does
not have your details.
The question to whether you need an account or not might not be much
of our focus.
what we need to undestand is how to use the Account effectively.
managing and taking advantage of everything available.
Here are the basics to exploit:
Manage Your M-PESA Account
You can check your current M-PESA balance status at a fee of Ksh1
only. Note that your balance is also shown at the end of every SMS
each time you do an M-PESA transaction.
To check your balance:
Select "Show balance"
Enter your secret PIN
Wait for SMS confirmation message with your balance
Call Support: You can call M-PESA Customer Service Representatives
through this menu:
Select "Call Support"
A message displays "Allow SIM card to call?"
Press "call"
The same service can be accessed by directly dialling 234 from
your Safaricom mobile.
Change PIN: For security reasons, customers can change their PIN at
any time at a fee of Ksh22.
From the M-PESA menu select "My Account".
Select "Change PIN".
Enter old PIN press OK.
Enter new PIN and confirm it.
Wait for the confirmation.
Secret Word: This allows the customer to change the secret word as
long as they remember their secret PIN.
From the M-PESA menu select "My Account".
Select "Secret Word".
Enter PIN press ok.
Wait for the confirmation.
Language: You can choose which language to use for your M-PESA:
From the M-PESA menu select "My account".
Select "Language".
Choose from English or Kiswahili.
Enter your secret PIN
Wait for display of "M-PESA" then Press OK to view language update
Update Menu
Safaricom will from time to time release new functions on the M-PESA
menu. 'Update Menu' is used to launch these new M-PESA functionalities
on your phone. You will need to enter your secret PIN to confirm the
request.
Bless!
How to do Bank to M-PESA and M-PESA to Bank Bank to M-PESA
What is M-PESA to Bank Transfer?
This service is available to M-PESA registered customers through:
The PayBill functionality on the M-PESA menu
Via USSD for Bank to M-PESA.
<!-- adsense -->
Business Numbers and USSD codes for various institutions
**To use this service, you must be registered for mobile banking with your bank.
BANK Bank to M-PESA (USSD) M-PESA to Bank (PayBill no.)
1 Bank of Africa(BOA) *987# 972900
2 Barclays Bank K LTD *224# 303030
3 CFC Stanbic *208# 600100
4 Chase Bank *275# 552800
5 Comm. Bank of Africa *654# 880100
6 Consolidated Bank LTD *262# 508400
7 Co-operative Bank *667# 400200
8 Credit Bank *669# 972700
9 Diamond Trust Bank(DTB) *385# 516600
10 Ecobank *335# 700201
11 Equatorial Commercial Bank *286# 498100
12 Equity Bank *247# 247247
13 Family Bank Ltd *325# 222111
14 Faulu DTM *339# 328585
15 First Community Bank Ltd *342# 919700
16 GTBank Kenya Ltd 910200
17 Gulf African Bank *399# 985050
18 Housing Finance Company LTD *231# 100400
19 I & M Bank Limited *458# 542542
20 IMPERIAL BANK LTD *356# 800100
21 Jamii Bora Bank *344# 529901
22 KCB *522# 522522
23 K-REP BANK *527# 111999
24 KWFTDTM *378# 101200
25 Musoni *279# 514000
26 National Bank *625# 547700
27 NIC Bank Limited *488# 488488
28 Post Office Savings Bank *498# 200999
29 Rafiki DTM *366# 802200
30 SMEP DTM *741# 777001
31 Standard Chartered Bank *722# 329329
32 Transnational Bank *862# 862862
33 UBA Bank *368# 559900
34 Vision Fund Kenya *985# 200555; 549900
35 ABC Bank 111777
36 CITIBANK N.A KENYA 100229
37 Prime Bank Via Bank App 982800
38 Uwezo DTM 504600
Benefits of this service to the customer
Convenience : You can access money from your account any time
whether the bank is open or not
Save on time and the cost of travelling to your branch and queuing
Reduction of risk associated with handling cash
Very convenient in emergency situations – You can access the funds
in your account fast.
Cash withdrawn is available on M-PESA and can be used to pay
utility bills, pay for purchases and money transfer. (E.g. withdraw
2000 from your bank account and immediately pay your water bill and
buy your power tokens all from the comfort of your house.)
Gives customers 24 hours access to money in their bank account
How to do Bank to M-PESA/ M-PESA to Bank
Bank to M-PESA
This is via USSD (short) code.
You need to register for mobile banking or internet banking
with your branch to get the short code to allow you move money from
your bank account into your M-PESA account conveniently.
The customers simply dials the USSD number and follows
instructions (this menu is different for different banks)
M-PESA to Bank
This is done via paybill.
Steps:
Go to M-PESA menu on your phone
Go to Lipa na M-PESA, paybill option
Paybill - enter bank business number (consult with bank)
Enter account number which is your bank account number
Enter amount
Enter M-PESA pin.
SMS confirmation received on phone
Bless!
This service is available to M-PESA registered customers through:
The PayBill functionality on the M-PESA menu
Via USSD for Bank to M-PESA.
<!-- adsense -->
Business Numbers and USSD codes for various institutions
**To use this service, you must be registered for mobile banking with your bank.
BANK Bank to M-PESA (USSD) M-PESA to Bank (PayBill no.)
1 Bank of Africa(BOA) *987# 972900
2 Barclays Bank K LTD *224# 303030
3 CFC Stanbic *208# 600100
4 Chase Bank *275# 552800
5 Comm. Bank of Africa *654# 880100
6 Consolidated Bank LTD *262# 508400
7 Co-operative Bank *667# 400200
8 Credit Bank *669# 972700
9 Diamond Trust Bank(DTB) *385# 516600
10 Ecobank *335# 700201
11 Equatorial Commercial Bank *286# 498100
12 Equity Bank *247# 247247
13 Family Bank Ltd *325# 222111
14 Faulu DTM *339# 328585
15 First Community Bank Ltd *342# 919700
16 GTBank Kenya Ltd 910200
17 Gulf African Bank *399# 985050
18 Housing Finance Company LTD *231# 100400
19 I & M Bank Limited *458# 542542
20 IMPERIAL BANK LTD *356# 800100
21 Jamii Bora Bank *344# 529901
22 KCB *522# 522522
23 K-REP BANK *527# 111999
24 KWFTDTM *378# 101200
25 Musoni *279# 514000
26 National Bank *625# 547700
27 NIC Bank Limited *488# 488488
28 Post Office Savings Bank *498# 200999
29 Rafiki DTM *366# 802200
30 SMEP DTM *741# 777001
31 Standard Chartered Bank *722# 329329
32 Transnational Bank *862# 862862
33 UBA Bank *368# 559900
34 Vision Fund Kenya *985# 200555; 549900
35 ABC Bank 111777
36 CITIBANK N.A KENYA 100229
37 Prime Bank Via Bank App 982800
38 Uwezo DTM 504600
Benefits of this service to the customer
Convenience : You can access money from your account any time
whether the bank is open or not
Save on time and the cost of travelling to your branch and queuing
Reduction of risk associated with handling cash
Very convenient in emergency situations – You can access the funds
in your account fast.
Cash withdrawn is available on M-PESA and can be used to pay
utility bills, pay for purchases and money transfer. (E.g. withdraw
2000 from your bank account and immediately pay your water bill and
buy your power tokens all from the comfort of your house.)
Gives customers 24 hours access to money in their bank account
How to do Bank to M-PESA/ M-PESA to Bank
Bank to M-PESA
This is via USSD (short) code.
You need to register for mobile banking or internet banking
with your branch to get the short code to allow you move money from
your bank account into your M-PESA account conveniently.
The customers simply dials the USSD number and follows
instructions (this menu is different for different banks)
M-PESA to Bank
This is done via paybill.
Steps:
Go to M-PESA menu on your phone
Go to Lipa na M-PESA, paybill option
Paybill - enter bank business number (consult with bank)
Enter account number which is your bank account number
Enter amount
Enter M-PESA pin.
SMS confirmation received on phone
Bless!
How To Avoid Being Tracked On The Internet 2015.
From my last post on how to delete your web browsing search data, i
also considered to make this post to guide over internet security.
It's a good idea to avoid using the same website for both your
web-based email and as your search engine.
Web email accounts will
always require some type of a login, so if you use the same site as
your search engine, your searches can be connected to your email
account. By using different websites for different needs -- perhaps
Yahoo for your email and Google for your searches -- you can help
limit the total amount of information retained by any one site.
log out of your email and clear your browser's cookies before going to
other sites, so that your searches and browsing are not connected to
your email address.
Use a different browser for your email account than for your searches
and web browsing.
Avoid downloading search engine toolbars (for example, the Google
toolbar or Yahoo toolbar). Toolbars may permit the collection of
information about your web surfing habits.
Google combines information about you from most of its services,
including its search engine, Gmail, and YouTube. Be sure to disable
automatic sign-ins.
Be sure to clear your browser's cache and cookies.
Cookies.
When you visit different websites, many of the sites deposit data
about your visit, called "cookies," on your hard drive. Cookies are
pieces of information s
ent by a web server to a user's browser.
The web server may use the cookie to customize the display it sends to
the user, or it may keep track of the different pages within the site
that the user accesses.
Ghostery is a browser tool that scans webpages for trackers (including
cookies) and notifies you of the companies whose code is present on
the page you are visiting. Ghostery is available at
.
Flash cookies.
Many websites utilize a type of cookie called a "flash cookie"
(sometimes also called a "supercookie") that is more persistent than a
regular cookie.
Normal procedures for erasing standard cookies, clearing history,
erasing the cache, or choosing a delete private data option within the
browser will not affect flash cookies.
Flash cookies thus may persist despite user efforts to delete all
cookies. They cannot be deleted by any commercially available
anti-spyware or adware removal program.
Fingerprinting. A device fingerprint (or machine fingerprint) is a
summary of the software and hardware settings collected from a
computer or other device. Each device has a different clock setting,
fonts, software and other characteristics that make it unique. When
you go online, your device broadcasts these details, which can be
collected and pieced together to form a unique "fingerprint" for that
particular device. That fingerprint can then be assigned an
identifying number, and used for similar purposes as a cookie.
Fingerprinting could eventually replace the cookie as the primary
means of tracking.
Tracking companies are embracing fingerprinting because it is tougher
to block than cookies.
Cookies are subject to deletion and expiration, and are rendered
useless if a user decides to switch to a new browser
Fingerprints leave no evidence on a user's computer. Therefore, it is
impossible for you to know when you are being tracked by
fingerprinting.
Using Mobile Apps
If you use a smartphone or other mobile device to access the Internet,
chances are that you may be using mobile applications (apps) rather
than an Internet browser for many online activities. The apps can
collect all sorts of data and transmit it to the app-maker and/or
third-party advertisers. This data may then be shared or sold.
When you install an app, you are allowing it to access certain data on
your phone.
However, many mobile apps do not have privacy policies, and when they
do, they are often dense with legalese, lengthy, and difficult to read
on devices with smaller screens.
Some of the data points that an app may access from your smartphone or
mobile device include:
your phone and email contacts
call logs
internet data
calendar data
data about the device's location
the device's unique IDs
information about how you use the app itself
Many apps track your location. There are location-based services like
Yelp and Foursquare that need your location in order to function
properly. However, there are also apps (such as a simple flashlight)
that do not need your location to function and yet still track it.
Smartphones and other mobile devices may ask you for specific
permissions when you install an app.
Instant messaging (IM)
Virtually all IM programs have the ability to archive and the IM
program may automatically turn this feature on. Archiving IM
conversations simply means saving the conversation in a text file just
like you would any other file.
Some of these IM programs automatically save your chats unless you
select otherwise.
IM has become a new target for spammers. "Spim," usually involves
get-rich-quick scams or pornography. Often the spimmer will include a
link in the message, which could cause spyware to be installed on your
computer if you click on the link. You can reduce your exposure to
spim by adjusting your IM account to only allow messages from
specified people.
Social networking
Online social networks are websites that allow users to build
connections and relationships to other Internet users.
Although you may post a picture or comment online that is intended to
be seen only by friends, it can be difficult to control re-use of that
information by others. By adjusting the privacy settings on your
social networking sites to the highest privacy level, you may be able
to limit the amount of information leaked for secondary uses.
Identity thieves, scam artists, debt collectors, stalkers, and
corporations looking for a market advantage are using social networks
to gather information about consumers.
Companies that operate social networks are themselves collecting a
variety of data about their users, both to personalize the services
for the users and to sell to advertisers.
Blogging
Web logs, or "blogs," are journals (or newsletters) that are
frequently updated and intended for general public consumption.
Depending on the service you use to post your blog, your private
information may be available. Generally blog services will allow you
at least some control over how much personal information you make
public.
Most blogs also allow comments by readers. Although some allow you to
comment anonymously, others require registration and at least an
e-mail address. Consider carefully how much information you're willing
to give and if you want your personal information linked to your
comments or posts forever.
There have been reports of employers firing employees for blogging.
The content does not even necessarily have to be about the employer.
Using online banking services
Most banks and other financial institutions use a system of passwords
and encryption to safeguard your information. Be sure to use a
different password for online banking (and for any other online
financial accounts) than you use on any other website. Make sure that
your password is random and cannot be easily guessed.
Make sure that any device used for managing your financial account has
an up-to-date operating system, firewall, and software (Including
antivirus and anti-malware programs). Otherwise, your login
credentials could be stolen.
When managing your financial accounts online, be careful that you are
giving your information to the proper institution. Many fraudulent
sites have been set up to look like the real thing. Beware of
"phishing" e-mails, which typically ask you to update your account
information, but are really looking to steal your personal
information. Never respond to unsolicited requests for passwords or
account numbers, no matter how realistic they look.
Consumer (but not business) bank accounts generally are protected by
the Electronic Funds Transfer Act, which limits consumer losses for
online theft to $50, as long as the consumer reports the loss within
60 days after the fraudulent transfer appears on the statement.
2: How Others Get Information about You Online
Marketing
The Internet can be useful to businesses for marketing purposes.
Through the Internet, businesses can sell and communicate with
customers. The Internet also allows businesses to identify and learn
about their customer base.
Additionally, many customers expect that a company they interact with
in the physical world will also have an online presence. What
consumers may not be aware of is how all of these purposes interact.
When a business meets your need of having a website with store hours
and directions, it may also meets its need of determining how many
customers may want to go to a particular store branch.
Web bugs. Many websites use Web bugs to track who is viewing their
pages. A Web bug (also known as a tracking bug, pixel tag, Web
beacon, or clear gif) is a graphic in a website or a graphic-enabled
e-mail message. The Web bug can confirm when the message or page is
viewed and record the IP address of the viewer.
Online Privacy Tip: You can defeat e-mail Web bugs by reading your
e-mail while offline, an option on most e-mail programs. Some e-mail
systems avoid Web bugs by blocking images that have URLs embedded in
them. You might have seen the message "To protect your privacy,
portions of this e-mail have not been downloaded." This message
refers to Web bugs. You can choose to allow these images to be
downloaded, but they likely contain Web bugs.
Direct marketing. Consumers may notice that online newspapers and
other businesses have boxes asking you if the site can save your
account information for future transactions. Whether it asks you for
permission to save your information or not, you can bet that your
information is being stored and used by the marketing department.
Companies engaged in behavioral targeting routinely monitor
individuals, the searches they make, the pages they visit, the content
they view, their interactions on social networking sites, and the
products and services they purchase.
When consumers are using mobile devices, even their physical location
may be tracked. This data may be compiled, analyzed, and combined with
information from offline sources to create even more detailed
profiles.
Marketers can then use this information to serve advertisements to a
consumer based on his or her behavioral record. Ads may be displayed
based upon an individual's web-browsing behavior, such as the pages
they have visited or the searches they have made. Advertisers believe
that this may help them deliver their online advertisements to the
users who are most likely to be influenced by them.
Behavioral information can be used on its own or in conjunction with
other forms of targeting based on factors like geography or
demographics. Marketers have developed an array of sophisticated data
collection and profiling tools which monitor and analyze our online
activity.
BLESS!
also considered to make this post to guide over internet security.
It's a good idea to avoid using the same website for both your
web-based email and as your search engine.
Web email accounts will
always require some type of a login, so if you use the same site as
your search engine, your searches can be connected to your email
account. By using different websites for different needs -- perhaps
Yahoo for your email and Google for your searches -- you can help
limit the total amount of information retained by any one site.
log out of your email and clear your browser's cookies before going to
other sites, so that your searches and browsing are not connected to
your email address.
Use a different browser for your email account than for your searches
and web browsing.
Avoid downloading search engine toolbars (for example, the Google
toolbar or Yahoo toolbar). Toolbars may permit the collection of
information about your web surfing habits.
Google combines information about you from most of its services,
including its search engine, Gmail, and YouTube. Be sure to disable
automatic sign-ins.
Be sure to clear your browser's cache and cookies.
Cookies.
When you visit different websites, many of the sites deposit data
about your visit, called "cookies," on your hard drive. Cookies are
pieces of information s
ent by a web server to a user's browser.
The web server may use the cookie to customize the display it sends to
the user, or it may keep track of the different pages within the site
that the user accesses.
Ghostery is a browser tool that scans webpages for trackers (including
cookies) and notifies you of the companies whose code is present on
the page you are visiting. Ghostery is available at
.
Flash cookies.
Many websites utilize a type of cookie called a "flash cookie"
(sometimes also called a "supercookie") that is more persistent than a
regular cookie.
Normal procedures for erasing standard cookies, clearing history,
erasing the cache, or choosing a delete private data option within the
browser will not affect flash cookies.
Flash cookies thus may persist despite user efforts to delete all
cookies. They cannot be deleted by any commercially available
anti-spyware or adware removal program.
Fingerprinting. A device fingerprint (or machine fingerprint) is a
summary of the software and hardware settings collected from a
computer or other device. Each device has a different clock setting,
fonts, software and other characteristics that make it unique. When
you go online, your device broadcasts these details, which can be
collected and pieced together to form a unique "fingerprint" for that
particular device. That fingerprint can then be assigned an
identifying number, and used for similar purposes as a cookie.
Fingerprinting could eventually replace the cookie as the primary
means of tracking.
Tracking companies are embracing fingerprinting because it is tougher
to block than cookies.
Cookies are subject to deletion and expiration, and are rendered
useless if a user decides to switch to a new browser
Fingerprints leave no evidence on a user's computer. Therefore, it is
impossible for you to know when you are being tracked by
fingerprinting.
Using Mobile Apps
If you use a smartphone or other mobile device to access the Internet,
chances are that you may be using mobile applications (apps) rather
than an Internet browser for many online activities. The apps can
collect all sorts of data and transmit it to the app-maker and/or
third-party advertisers. This data may then be shared or sold.
When you install an app, you are allowing it to access certain data on
your phone.
However, many mobile apps do not have privacy policies, and when they
do, they are often dense with legalese, lengthy, and difficult to read
on devices with smaller screens.
Some of the data points that an app may access from your smartphone or
mobile device include:
your phone and email contacts
call logs
internet data
calendar data
data about the device's location
the device's unique IDs
information about how you use the app itself
Many apps track your location. There are location-based services like
Yelp and Foursquare that need your location in order to function
properly. However, there are also apps (such as a simple flashlight)
that do not need your location to function and yet still track it.
Smartphones and other mobile devices may ask you for specific
permissions when you install an app.
Instant messaging (IM)
Virtually all IM programs have the ability to archive and the IM
program may automatically turn this feature on. Archiving IM
conversations simply means saving the conversation in a text file just
like you would any other file.
Some of these IM programs automatically save your chats unless you
select otherwise.
IM has become a new target for spammers. "Spim," usually involves
get-rich-quick scams or pornography. Often the spimmer will include a
link in the message, which could cause spyware to be installed on your
computer if you click on the link. You can reduce your exposure to
spim by adjusting your IM account to only allow messages from
specified people.
Social networking
Online social networks are websites that allow users to build
connections and relationships to other Internet users.
Although you may post a picture or comment online that is intended to
be seen only by friends, it can be difficult to control re-use of that
information by others. By adjusting the privacy settings on your
social networking sites to the highest privacy level, you may be able
to limit the amount of information leaked for secondary uses.
Identity thieves, scam artists, debt collectors, stalkers, and
corporations looking for a market advantage are using social networks
to gather information about consumers.
Companies that operate social networks are themselves collecting a
variety of data about their users, both to personalize the services
for the users and to sell to advertisers.
Blogging
Web logs, or "blogs," are journals (or newsletters) that are
frequently updated and intended for general public consumption.
Depending on the service you use to post your blog, your private
information may be available. Generally blog services will allow you
at least some control over how much personal information you make
public.
Most blogs also allow comments by readers. Although some allow you to
comment anonymously, others require registration and at least an
e-mail address. Consider carefully how much information you're willing
to give and if you want your personal information linked to your
comments or posts forever.
There have been reports of employers firing employees for blogging.
The content does not even necessarily have to be about the employer.
Using online banking services
Most banks and other financial institutions use a system of passwords
and encryption to safeguard your information. Be sure to use a
different password for online banking (and for any other online
financial accounts) than you use on any other website. Make sure that
your password is random and cannot be easily guessed.
Make sure that any device used for managing your financial account has
an up-to-date operating system, firewall, and software (Including
antivirus and anti-malware programs). Otherwise, your login
credentials could be stolen.
When managing your financial accounts online, be careful that you are
giving your information to the proper institution. Many fraudulent
sites have been set up to look like the real thing. Beware of
"phishing" e-mails, which typically ask you to update your account
information, but are really looking to steal your personal
information. Never respond to unsolicited requests for passwords or
account numbers, no matter how realistic they look.
Consumer (but not business) bank accounts generally are protected by
the Electronic Funds Transfer Act, which limits consumer losses for
online theft to $50, as long as the consumer reports the loss within
60 days after the fraudulent transfer appears on the statement.
2: How Others Get Information about You Online
Marketing
The Internet can be useful to businesses for marketing purposes.
Through the Internet, businesses can sell and communicate with
customers. The Internet also allows businesses to identify and learn
about their customer base.
Additionally, many customers expect that a company they interact with
in the physical world will also have an online presence. What
consumers may not be aware of is how all of these purposes interact.
When a business meets your need of having a website with store hours
and directions, it may also meets its need of determining how many
customers may want to go to a particular store branch.
Web bugs. Many websites use Web bugs to track who is viewing their
pages. A Web bug (also known as a tracking bug, pixel tag, Web
beacon, or clear gif) is a graphic in a website or a graphic-enabled
e-mail message. The Web bug can confirm when the message or page is
viewed and record the IP address of the viewer.
Online Privacy Tip: You can defeat e-mail Web bugs by reading your
e-mail while offline, an option on most e-mail programs. Some e-mail
systems avoid Web bugs by blocking images that have URLs embedded in
them. You might have seen the message "To protect your privacy,
portions of this e-mail have not been downloaded." This message
refers to Web bugs. You can choose to allow these images to be
downloaded, but they likely contain Web bugs.
Direct marketing. Consumers may notice that online newspapers and
other businesses have boxes asking you if the site can save your
account information for future transactions. Whether it asks you for
permission to save your information or not, you can bet that your
information is being stored and used by the marketing department.
Companies engaged in behavioral targeting routinely monitor
individuals, the searches they make, the pages they visit, the content
they view, their interactions on social networking sites, and the
products and services they purchase.
When consumers are using mobile devices, even their physical location
may be tracked. This data may be compiled, analyzed, and combined with
information from offline sources to create even more detailed
profiles.
Marketers can then use this information to serve advertisements to a
consumer based on his or her behavioral record. Ads may be displayed
based upon an individual's web-browsing behavior, such as the pages
they have visited or the searches they have made. Advertisers believe
that this may help them deliver their online advertisements to the
users who are most likely to be influenced by them.
Behavioral information can be used on its own or in conjunction with
other forms of targeting based on factors like geography or
demographics. Marketers have developed an array of sophisticated data
collection and profiling tools which monitor and analyze our online
activity.
BLESS!
How To Delete Your Searches And Browsing Activity In Google
Stop Google from tracking your search history and remove your previous
serch History.
Online Privacy: Browsing the Internet
Almost all browsers give you some control over how much information is
kept and stored. Generally, you can change the settings to restrict
cookies and enhance your privacy. Most major browsers now offer a
"Private Browsing" tool to increase your privacy. However,
researchers have found that "Private Browsing" may fail to flush out
all traces of online activity.
Do Not Track (DNT) is a setting in most major browsers that tells
websites that you do not wish to be tracked. In order for DNT to
work, the sites that you visited must agree to honor the preference to
not be tracked. Although a few large companies have agreed to honor
DNT, many have refused because DNT threatens advertising income.
Search engines. Search engines have and use the ability to track each
one of your searches. They can record your IP address, the search
terms you used, the time of your search, and other information. It is
advisable that you review your search engine's privacy policy.
Today i will be focussing on how to secure yourself at the current stae.
Below is the procedure on How To Delete Your Searches And Browsing
Activity In Google:
You can delete your past searches or other activity from your Web &
App Activity page. Learn more about what's saved in your Web & App
Activity.
Computer
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Click Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
iPhone or iPad app
Any searches that you do while using the Google app are stored on your
iPhone or iPad (device history), and also in your Web & App Activity.
Delete recent searches from your device
When you're searching in the Google app, you may see your recent
searches appear as suggestions below the search box. You can delete
these searches right from the search box.
Open the Google app .
Touch the search box that appears when you open the app.
Swipe the search you want to remove to the left.
Touch Delete.
Note: Any searches you've deleted from below the search box will be
deleted from your iPhone or iPad device history, but a copy of the
searches stays in your Web & App Activity.
Delete all past searches on your device
Open the Google app .
Touch the search box that appears when you open the app.
Touch View search history.
Touch Clear All in the top right corner > Clear on-device history.
Note: Any searches you've deleted from the Google app will be deleted
from your iPhone or iPad device history, but a copy of the searches
stays in your Web & App Activity.
Stop saving searches on your device
Open the Google app .
In the top left corner of the home screen, touch your photo.
Touch Privacy > Browsing.
Turn the "On-device history" off (grey). When On-device history is
off, new searches you do won't be saved to your device and the pages
you visit won't be saved to your Recents.
Delete searches from your Web & App Activity
Any searches you've deleted from the Google app will be deleted from
your iPhone or iPad device history, but there will still be a copy of
the searches in your Web & App Activity. Follow the instructions below
to remove the searches from your Web & App Activity.
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Touch Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
Mobile browser
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Touch Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
Prevent future searches from being saved
Visit your Account History page.
Touch Pause > Pause history.
Tip: If you occasionally want to prevent your searches from being
saved, you can search within an incognito window in Google Chrome
while not signed in to your Google Account. If you're using a browser
other than Google Chrome, check your browser's help instructions to
see whether it has a similar private browsing mode.
Bless!
serch History.
Online Privacy: Browsing the Internet
Almost all browsers give you some control over how much information is
kept and stored. Generally, you can change the settings to restrict
cookies and enhance your privacy. Most major browsers now offer a
"Private Browsing" tool to increase your privacy. However,
researchers have found that "Private Browsing" may fail to flush out
all traces of online activity.
Do Not Track (DNT) is a setting in most major browsers that tells
websites that you do not wish to be tracked. In order for DNT to
work, the sites that you visited must agree to honor the preference to
not be tracked. Although a few large companies have agreed to honor
DNT, many have refused because DNT threatens advertising income.
Search engines. Search engines have and use the ability to track each
one of your searches. They can record your IP address, the search
terms you used, the time of your search, and other information. It is
advisable that you review your search engine's privacy policy.
Today i will be focussing on how to secure yourself at the current stae.
Below is the procedure on How To Delete Your Searches And Browsing
Activity In Google:
You can delete your past searches or other activity from your Web &
App Activity page. Learn more about what's saved in your Web & App
Activity.
Computer
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Click Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
iPhone or iPad app
Any searches that you do while using the Google app are stored on your
iPhone or iPad (device history), and also in your Web & App Activity.
Delete recent searches from your device
When you're searching in the Google app, you may see your recent
searches appear as suggestions below the search box. You can delete
these searches right from the search box.
Open the Google app .
Touch the search box that appears when you open the app.
Swipe the search you want to remove to the left.
Touch Delete.
Note: Any searches you've deleted from below the search box will be
deleted from your iPhone or iPad device history, but a copy of the
searches stays in your Web & App Activity.
Delete all past searches on your device
Open the Google app .
Touch the search box that appears when you open the app.
Touch View search history.
Touch Clear All in the top right corner > Clear on-device history.
Note: Any searches you've deleted from the Google app will be deleted
from your iPhone or iPad device history, but a copy of the searches
stays in your Web & App Activity.
Stop saving searches on your device
Open the Google app .
In the top left corner of the home screen, touch your photo.
Touch Privacy > Browsing.
Turn the "On-device history" off (grey). When On-device history is
off, new searches you do won't be saved to your device and the pages
you visit won't be saved to your Recents.
Delete searches from your Web & App Activity
Any searches you've deleted from the Google app will be deleted from
your iPhone or iPad device history, but there will still be a copy of
the searches in your Web & App Activity. Follow the instructions below
to remove the searches from your Web & App Activity.
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Touch Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
Mobile browser
Delete items one at a time
Visit your Web & App Activity page.
Check the box next to the items you want to remove.
Touch Remove items at the top of the page.
Delete multiple
Visit your Web & App Activity page.
In the top right corner of the page, touch Options Settings > Remove items.
Choose the time period for which you want to delete your history.
(To remove all items, select The beginning of time).
Touch Remove.
Note: If you turned on the option to include history from Chrome and
other apps in your Web & App Activity, visit the additional Web & App
Activity page to see that information. If you only want to remove
additional Web & App Activity from a certain device, choose that
device in the "Remove items" dropdown menu.
Prevent future searches from being saved
Visit your Account History page.
Touch Pause > Pause history.
Tip: If you occasionally want to prevent your searches from being
saved, you can search within an incognito window in Google Chrome
while not signed in to your Google Account. If you're using a browser
other than Google Chrome, check your browser's help instructions to
see whether it has a similar private browsing mode.
Bless!
Thursday, April 9, 2015
Installing Microsoft XML Parser and Microsoft XML (MSXML)
What is MSXML?
Microsoft XML Core Services (MSXML) is a Component Object Model (COM) implementation of the W3C DOM model.
With Microsoft XML Core Services (MSXML), formerly known as the Microsoft XML Parser, customers can build XML-based applications that follow the World Wide Web Consortium (W3C) XML standards.
In my previous tutorial of unbricking Alcatel ot 918 and MTK installation process, I encountered some major challenges which left me out with sleepless nights trying hard.
For simpe preview:
It reached a point where I was uploading the scatter file to the flash tool. Since this point I encountered the error, that some .cpp files missing xml files not found and even MSXML not installed. For this tutorial I prepared a step to step guide on how to solve the issue. It might help someone in the future:
Installation procedure:
in this example we shall use Microsoft XML Parser 3.0
To install Microsoft XML Parser 3.0, follow these steps:
- Check if the operating system meets the requirement to install Microsoft XML Parser 3.0.
The following operating systems are support by Microsoft XML Parser 3.0: - Windows 2000
- Windows Server 2003
- Windows XP
- Download Microsoft XML Parser 3.0.
- Install Microsoft XML Parser 3.0.
To download I recommend you get it from Microsoft website.
For different version of your operating system, simply check on the same page for latest version.
Bless!
Wednesday, April 8, 2015
HOW TO INSTALL MTK DRIVER USING CMD – PROBLEM SOLVED
I have been struggling to unbrick Alcatel One Touch 918, for three days but only got it right on the fourth day. It's been quite tiresome as my time having been wasted only to realize the wrongly installed drivers on my computer.
Here is the step by step procedure on how to go about it:
Start menu, type cmd in search programs and files
- cmd.exe will appear in the programs list right-click on cmd.exe and choose Run as Administrator
- In the command session type set devmgr_show_nonpresent_devices=1 and press enter
- In the command session type devmgmt.msc and press enter
- The Device Manager console will appear
- In Device Manager click on View and choose Show Hidden Devices
- If there is list entry Ports (COM & LPT) expand it and note the following change
- If there is an entry MediaTek PreLoader USB VCOM Port (COMn) then the driver is already installed
- Right click on the entry and choose Uninstall
- The uninstall dialogue box appears
- Check Delete the driver software for this device and click OK
- The MediaTek device will be uninstalled
- If this was the ONLY port listed, the list entry Ports (COM & LPT) will also disappear (DON'T PANIC)
- Ensure your CUBE is POWERED OFF (wait for vibration to show it is completely off)
- Attach the powered off cube to the computer via USB
- The computer will start to install the drivers, but will probably report Device Driver software was not successfully installed.
- Click on the balloon message and a message box will say MT65xx Preloader No Driver Found
- Return to the Device Manager
- There should be a list entry Other Devices - expand it.
- Find the child list entry MT65xx Preloader
- Right click and choose Update Software Driver...
- Update Driver Software dialogue is displayed
- Choose Browse my computer for driver software
- In the Browse for driver software dialogue click browse and navigate to the download location where you extracted the ROM's zip file content.
- Navigate to the sub-folder containing the *.inf files.
- Click Next
- Windows may prompt saying Windows can't verify the publish of this driver software
- Choose Install this driver software anyway
- Windows should say Installing Driver Software
- Windows will then say Windows has finished installing the driver software for this device: MediaTek PreLoader USB VCOM Port
- Unplug and replug the CUBE
- Windows will start installing the driver instance
- Sometimes the install will fail
- Click the balloon message and message box will say Install failed - device unplugged
- Unplug and replug the CUBE and things should be OK
- Return to the Device Manager
- There should now be a list entry Ports (COM & LPT)
- Expand this item and it should contain MediaTek PreLoader USB VCOM Port (COMn)
Be patient sine everything will go well. Don’t lose that precious phone of yours opting to buy a new one. No.
Bless!
Subscribe to:
Posts (Atom)