Wednesday 7 September 2011

Hakikisha hupotezi data zako ikiwa system yako ita-crash. Jifunze jinsi ya kufanya backup na ku-restore kukiwa na tatizo


Windows 7 inakuja na njia salama na rahisi zaidi ili kuhakikisha kwamba haupotezi mafaili yako pale komputa yako inapokumbwa na tatizo kubwa linaloweza kuharibu hard disk yako. Kwa hiyo kila wakati umejiandaa kama maafa yakitokea.

Chagua au iache Windows ichague kipi cha ku-backup. Unaweza ku-backup kwenye CD, DVD au network.

Jinsi ya kufanya backup ya mafaili yako
Angalia video hapo chini au fuata maelezo hapa


To back up your files

  1. Open Backup and Restore by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
  2. Do one of the following:
    • If you've never used Windows Backup before, click Set up backup, and then follow the steps in the wizard. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
    • If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by clicking Back up now. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.
Notes
  • We recommend that you don't back up your files to the same hard disk that Windows is installed on.
  • Always store media used for backups (external hard disks, DVDs, or CDs) in a secure place to prevent unauthorized people from having access to your files—we recommend a fireproof location separate from your computer. You might also consider encrypting the data on your backup.

To create a new, full backup

After you create your first backup, Windows Backup will add new or changed information to your subsequent backups. If you're saving your backups on a hard drive or network location, Windows Backup will create a new, full backup for you automatically when needed. If you're saving your backups on CDs or DVDs and can't find an existing backup disc, or if you want to create a new backup of all of the files on your computer, you can create a full backup. Here's how to create a full backup:
  1. Open Backup and Restore by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
  2. In the left pane, click Create new, full backup.
    Note
    You will only see this option if your backup is being saved on CDs or DVDs.

To set up a backup after upgrading from a previous version of Windows

After you upgrade Windows, you will need to set up Windows Backup, even if you had a scheduled backup in the previous version of Windows. This is because there are several changes to the backup program. Instead of selecting file types to back up, you can have Windows back up data files saved in libraries, on the desktop, and in default Windows folders, or you can choose specific libraries and folders to be backed up. You can also create a system image of your computer. For more information, see How does Windows choose which files to back up?
To set up your backup, follow these steps:
  1. Open Backup and Restore by clicking the Start button Picture of the Start button, clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore.
  2. Click Set up backup, and then follow the steps in the wizard. Administrator permission required If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

From Hossin Mubarak to Muamar Gaddafi. How Technology has shaken and changed North Africa.

Since the Arab Spring uprisings, human rights activists worldwide have championed the power of technology, mainly the Internet and mobile phones, as tools for democracy and change. Evidence shows that they are right, social media played a role in bringing down dictatorships in the Middle East and North Africa. But other evidence shows that technology actually often reinforces social inequalities in other instances, giving more voice to the powerful, further drowning out the meek cries of the politically weak.

Social media has been successful when all social classes unite to take down the heads of state. The Arab Spring is the contemporary poster boy for this movement. The proletariat united, rose up, and took down the bourgeois in Tunisia and Egypt, and is still fighting in Syria, Libya, and other nations. Twitter hashtags and facebook groups were large players in mobilizing protestors, who came from all backgrounds—rich, middle-class, and poor—and simply communicated with their mobile phones to organize mass movements. 

It seems logical, then, to assume that social media and technology penetration will lead to more democracy and social justice. The more blackberries in a country, the less the economic disparity. The more rural telecenters, the less political corruption. Or at least so goes the thinking.

Studies show otherwise. To the extent that inequalities between social classes are affected at all by the increase in ICT usage, they often became stronger and disparity increases. In a DFID study in 2005 on telephone use in India (Gujarat), Mozambique, and Tanzania, researchers found the most wealthy and educated people used phones more and with greater frequency, in both urban and rural areas.

Other studies show that not only do more educated and wealthier people have greater access to ICTs, they also value them more, and use their for more development related activities as opposed to entertainment than poorer populations. Furthermore, the rich and smart are far more likely to produce digital content, solidifying the stronghold of the elite in societal knowledge production.

The relationship between ICT penetration and social inequalities, then, is more complex than the Arab Spring would suggest. The difference with the Arab Spring is that the people united to take down one leader, whereas daily life features far more social classes and political opinions, halting social change, or at least considerably slowing it down. While technology helped bring social justice to entire nations, it did not eliminate social classes within the nations.

In order to decrease social inequalities in ICT usage, then, ICT designers and national policymakers should consider stipulations to favor usage of their technology by marginalized social classes.

Whether it be reducing costs to allow poorer classes to buy the product or developing voice recognition technology to engage the illiterate, extra effort will be needed to reduce the social inequality of ICT usage. Preliminary efforts by USAID’s Women in Development initiative show promise; other agencies should mimic their efforts to increase ICT usage among digital minority populations. Without these extra efforts to assist marginalized populations, ICTs will only further embed developing nations with social and economic inequalities, leading to future instability and lower quality of life.

Tuesday 6 September 2011

WikiLeaks Cable : Tanzanian President Kikwete Accused of Accepting Bribes

Tanzanian President Kikwete Accused of Accepting Bribes


DAR ES SALAAM — Surprising how some global events end up beating a path to your own front door. Just this morning I was reading a WikiLeaks U.S. cable written by the U.S. Embassy in Tanzania, which accuses the current Tanzania’s President, Jakaya Mrisho Kikwete of accepting bribes to the tune of $1 million from the UAE-based owner of the Kempinski Hotel chain, Ali Albwardy.
In addition to the bribe, Kikwete is accused of accepting a lavish shopping trip to London. Among other things, “Ali albwardy bought Kikwete five Saville Row suits”.

The fact that a cash amount is mentioned, or that a ‘contribution’ was made to his CCM ruling party isn’t an issue at all; under Tanzanian law, donations to a political party are allowed. But having stayed at the Kempinski Kilimanjaro in Dar es Salaam on quite a few occasions, it did intrigue me enough to dig further.



What is interesting however, according to the cable transcript, is the fact that Albwardy wanted to secure the rights to build a hotel on the edge of Ngorongoro Crater and “another on the Serengeti plain overlooking the main animal migration routes”.

Stringent conservation rules currently ban the construction of permanent structures inside national parks, including in the crater and on the Serengeti Plain.

It would appear that even back in 2006 – when the cable was written – the hotel publicity director, Lisa Pile, was already hinting that legislation would be changed in order to allow the construction.
Convenient coincidence this probably is not, and corporate business affairs aside, when a democratic process is swept aside, this type of conduct is nothing more than corruption at the highest levels.

Original Cable

C O N F I D E N T I A L DAR ES SALAAM 000277
SIPDIS
DEPT FOR INR, R.EHRENREICH
E.O. 12958: DECL: 02/13/2016
TAGS: PGOV PREL TZ
SUBJECT: KIKWETE CORRUPTION TIDBIT

Classified By: Ambassador Michael Retzer, Reason 1.5 (d)

¶1. (C) President Kikwete has accepted gifts (bribes) from
the owner of the Kempinski Hotel chain,s Tanzanian
properties, a citizen of the United Arab Emirates.

¶2. (C) In a conversation with the manager and the publicity
director of Dar Es Salaam,s Kilimanjaro-Kempinski Hotel
hours after accompanying A/S Frazer to her October 18, 2005
meeting with then-Foreign Minister Kikwete, I commented on
Kikwete's flashy attire, asking "Who dresses him?" "We do,"
they responded.  Initially thinking this meant Kikwete
frequented a men,s shop in the hotel, I learned later in
the evening from hotel publicity director Lisa Pile (protect)
that the hotel owner*UAE citizen Ali Albwardy*had recently
flown Kikwete to London for a subsidized shopping
expedition.  Among other things, on that trip Ali Albwardy
bought Kikwete five Saville Row suits.  He had also recently
made a $1 million cash contribution to the CCM (which is a
legal contribution under current Tanzanian law).

¶3. (C) Pile told me the Kempinski Hotel chain is greatly
expanding its presence in Tanzania.  She said that in
December it would open "the best hotel in Zanzibar."  Her
prediction was a little off; the new Kempinski hotel, located
on the beach on Zanzibar,s east coast, opened January 5.  I
attended the opening ceremony along with Zanzibari President
Karume, who was asked publicly by Ali Albwardy for a site in
Stone Town to build a new hotel.  Later that day, Pile
revealed that the Zanzibar government had already earmarked
for Ali Albwardy a hotel site in Stone Town.

¶4. (C) Pile also said in the October 18 conversation that Ali
Abwardy was about to receive the rights to construct two new
hotels on the mainland: one on the edge of Ngorongoro Crater
and another on the Serengeti plain overlooking the main
animal migration routes.  Stringent conservation rules
currently ban the construction of permanent structures inside
national parks*including in the crater and on the Serengeti
plain*but Pile said that in November legislation would be
introduced to parliament to authorize the new hotels.
(Comment: We have received no reports on new legislation,
but the Dar Es Salaam Daily News on January 15 reported that
the Tanzania National Parks Authority had approved construction
of a five star hotel on the Serengeti plain.)

¶4. (C) Later on October 18, over dinner, an Indian/South
Asian man described as a business associate of Ali Albwardy
briefly took Pile from the table for a conversation in
Kiswahili.  I am not sure what was said, but Kikwete's name
came up several times and he passed her an envelope.  Pile
told me the envelope was stuffed with 1 million shillings
( $1,000) and was to pay for a Kikwete meeting at the
Kilmanjaro-Kempinski later that month.  Apparently Kikwete is
a regular customer, but no name ever appears on the hotel
registry when a government bigshot has an "event" in one of
the guest rooms.

¶5. (C) Bio Note:  Lisa Pile, an Australian citizen, has
lived in Dar working for Kempinski Hotels since early 2004.
Before that she had served in a similar capacity with the
Kempinski chain in China.  Her family in Australia is prominent in
Australia's Liberal Party (the center-right party of Prime
Minister John Howard).

¶6. (C) Comment:  What does it all mean?  I don,t know, but
my guess is that the investor Ali Albwardy has access to
oil money out of the UAE.  I suspect giving free clothes and
the campaign donation is just the way these people do business.

¶7. (C) For his part, Kikwete probably thinks having all these
five star hotels around is a good idea for the country,and I
agree with him.  His new minister of Natural Resources and
Tourism, Anthony Diallo, says he wants to double tourism,s
contribution to the national economy in ten year,s time.
Kikwete probably believes there is no harm in taking these
&little gifts8 to do what he would have been inclined to do
anyway.  That said, they are what they are: bribes.

Timu yako ilishanyimwa goli la wazi? Teknolojia kutumika sasa.


Frank Lampard protests after his shot appeared to cross the line
Fifa president Sepp Blatter finally accepted the need for goal line technology after England's defeat by Germany in Bloemfontein in last year's World Cup.
Following the news, the Barclays Premier League is keen to introduce goal line technology and wants to be used as a testing ground as early as next season, though the timing may prove too tight.
The Football Association is known to be fully supportive of the introduction of the technology.

A representative of one of the competing firms, asked how much money a system might make, added: "There are something like 87 countries around the world with at least two professional leagues. It's telephone numbers."
In March, the International Football Association Board ruled it would adopt a system, if Fifa's stringent technical standards - which include the referee being notified electronically to a wristwatch within one second - can be met.
Testing earlier this year by EMPA proved unsatisfactory, with Hawk-Eye declining to attend, but potential providers are sure to be encouraged by Fifa's decision to embrace the technology.

England midfielder Frank Lampard's shot in a crucial phase of the game clearly crossed the line but the goal was not given by the match referee or his assistants.

Next year's European Championships in Poland and Ukraine will be the first such tournament to have extra goalmouth assistant referees, extending the system used now in the Europa and Champions League.
The favourites to land the lucrative goal line contract are UK-based Hawk-Eye, Germany-based Cairos, backed by Adidas, and Swiss-based watch-makers Tag-Heuer and Longines.

Blatter has indicated the technology could be ready for the 2014 World Cup in Brazil.

Get paid from Facebook. The company is encouraging users to try to break through security systems - then report it – then get cash


Facebook says it has paid out £24,500 in three weeks to hackers who have discovered security flaws in the social network.

One of the hackers - or "White Hats", as Facebook calls them, has already earned over £4,000 for spotting six issues and reporting them.

Another bagged a £3,000 reward for identifying one particularly serious problem.

The payments are being made through Facebook's new "bug bounty" scheme, which invites all users to offer information about undiscovered security holes in return for cash.

Facebook admits it has received plenty of bogus reports since launching the scheme but says it is not deterred.

"We realise [...] that there are many talented and well-intentioned security experts around the world who don’t work for Facebook," said Joe Sullivan, the company's chief security officer.

"Over the years, we have received excellent support from independent researchers who have let us know about bugs they have found."

He went on: "We established this bug bounty programme in an effort to recognise and reward these individuals for their good work and encourage others to join."

Mr Sullivan said Facebook had been surprised at how quickly "White Hats" from all around the world had responded to the call for information.

"Facebook truly does have the world's best neighbourhood watch programme," he said.

While some Facebook users are making money from the bug bounty scheme, not all believe it goes far enough.

It does not cover the thousands of third party games and applications that use the site - even though web security firms warn that these pose a bigger threat than the main network.

Mr Sullivan conceded the programme could not be extended to applications due to the size of the task.

Other users suggested that if Facebook stopped constantly rolling out new features, it would have fewer flaws to correct.

Monday 5 September 2011

Kila mtu anazungumzia Cloud Computing. Ni nini hasa? Je, ni kwa watu wa kisasa zaidi?



Kwa muda mrefu sasa komputa zetu za nyumbani au makazini zimekuwa ndiyo namna ya kuhifadhi na kutumia mafaili na programs yingine mbalimbali, wakati Internet ni mahali tunapojipatia information zote (rich resource for information) na kuwasiliana. Kitu ambacho kimekuwa kikifanya kazi tofauti kwa wakati wote huu ni services kama Gmail, Hotmail, Yahoo, n.k. Service hizi zinahifadhi data zetu mahali pengine hivyo unapotaka kuona email uliyotumiwa na bosi wako, unakwenda online na kufungua account yako kuion. Huu ni mfano mzuri wa hii service mpya inayoitwa ‘CloudComputing’ au ‘Web 2.0’ au ‘Software as a service
Kwa sasa applications nyingi ziko online na unazitumia kwa kupitia web browser. Kwa mfano picha zako, database za kampuni, n.k.



Cloud Computing na faida zake ni nini?
Kwa urahisi kabisa cloud computing ni kitendo cha kuhifadhi data au applications zako kwenye server maili kadhaa kutoka ulipo wewe. Kila unapotaka kuzitumia unaingia kwenye Internet na kuingia kwenye account yako na kuzikuta hapo. Hakuna haja ya kuzihifadhi kwenye komputa yako, unakuwa unazipata na kuzitumia pale unapozihitaji tu siyo tu kwa kutmia komputa bali kwa kutumia kifaa chochote kama simu ya mkononi, tablets, notebook, n.k. Hii inamaanisha una uwezo wa kuzitumia data zako wakati wowote na mahali popote ulipo.

Watu wengi na makampuni mengi yanajiingiza kwenye mfumo huu kwa sababu ya urahisi wake. Kwa kutumia cloud computing hauhitaji tena komputa yenye storage capacity kubwa sana nyumbani kwako, kumbuka data zako zinahifadhiwa mahali pengine kabisa. Hii inaleta urahisi kwa sababu hununui komputa ya ghali sana. Pia kumbuka komputa inatumia umeme hivyo unakuwa unatumia umeme mdogo zaidi kama uko kwenye cloud ukilinganisha na mtu anayehifadhi kila kitu kwenye system yake nyumbani. Kwa makampuni gharama za kununua hardware zinapungua sana.

Ubaya wake
Japokuwa tunayazungumzia mazuri ya cloud computing, si kweli kwamba basi tusahau mfumo tuliouzoea wa kuwa na komputa na kila kitu ndani yake nyumbani kwako. Ukweli ni kwamba unahitaji Internet connection kila mara unapotaka kutumia data zako au applications services. Hii ni mbaya hasa kwa nchi kama za kwetu Africa ambapo kuna matatizo ya Internet na umeme.
Tatizo lingine kubwa ni data security. Wakati makampuni mengi yanayohifadhi data zetu kwenye serves zao wanatuhakikishia kwamba watazihifadhi data zetu vizuri, usalama wake ni mdogo kwa maana anayezihifadhi ni mtu mwingine na wala huwezi kugundua ikiwa atazitumia au kuziangalia data hizo bila ruhusa yako. Hii ni hatari zaidi kwa makampuni kwa maana siri zao za kibiashara zinakuwa zinahifadhiwa na mtu mwingine mahali pengine.

Ushauri
Ni vizuri kama tunataka mafanikio, kuhakikisha kabla ya kujiingiza kwenye teknolojia hii, basi tunajua faida na madhara yake. Elimu ya teknolojia hii itakusaidia kufahamu kama unahitaji cloud computing kwa matumizi yako au ya biashara yako. Kuna wale wanaopendelea urahisi wa kuweza kuzi-access data zao wakati wowote na mahali popote (flexibility and mobility) lakini wapo wale wanaopendelea kuwa na uhakika kwa kuhifadhi data zao wenyewe (ownership and control).

Je, wewe unatumia cloud computing?..tueleze unaionaje

Sunday 4 September 2011

Why People Can’t Find Jobs



By Ron McGowan

They’re out of touch – We’re a society that knows how to apply for a job. The challenge for employment seekers today is to become proficient at finding work. That’s a much more complicated process than applying for a job. Anyone missing this skill will be unemployed for a long time.

They’re looking in the wrong places – It’s highly unlikely that you’ll find employment in today’s workplace by attending a job fair, looking at a newspaper, looking at Internet job sites, or sending out unsolicited resumes/CV’s to employers. The majority of employment opportunities are never advertised and employment seekers must learn how to sniff them out and how to approach employers in a strategically effective way.

They’re using the wrong tools – Most employment seekers use one tool only: a resume/CV. They must learn how to create a variety of tools that are marketing oriented and focused on the needs of the employer. The approach used by most employment seekers is the same as it has been for most of the 20th century – and it doesn’t work.

They’re making it hard to get hired – If the only option you give an employer is to offer you a permanent full-time position, you’re making it hard for them to hire you. This is especially true for small businesses, where most of the action can be found. Being willing to accept part-time, temporary and contract work – without reservations – is essential.

They’re ignorant about Social Media – The personal branding guru, Dan Schawbell says “Your first impression isn’t a handshake anymore. It’s your online presence that will decide the fate of your career.” Managing your online presence is as important as managing your credit rating. 70 percent of recruiters in the U.S. report that they have rejected candidates because of information they found out about them online. Getting hired today is as much a function of being found online as it is about applying to employers.

Their governments are failing them – Governments are stuck in the 20th century. They keep trying to solve 21st century problems with 20th century solutions. For the past few years, they have poured billions of dollars, euros and pounds down the drain trying to stimulate the economy and propping up dying and inefficient industries. At the same time, small businesses that have been creating most of the new jobs for years have been virtually ignored by governments. The countries that will succeed in the coming decade are the ones that will give small businesses the support and resources they need to expand and that also encourage and support graduates to create their own jobs. For an increasing number of workers, the era of the traditional job and all the stability that came with it is over. We need to accept that, adjust to it, and move on.

Ron McGowan is the author of the international best seller “How to Find WORK in the 21st Century”, currently in use at over 400 colleges and universities worldwide and used extensively by career/employment counselors.

What is your thought on this issue? Comment below.

Varsities advised to develop people-centred ICT systems



Original story by Gerald Kitabu

Universities in the country have been challenged to embrace and develop customized information and communication technology (ICT)-based systems tailored to meet the needs of the people.

The challenge was thrown by deputy minister for Communications, Science and Technology Charles Kitwanga at the inauguration of an exhibition week hosted by the College of Information and Communications Technologies (CoICT) in marking the golden jubilee of the University of Dar es Salaam.

He said the inauguration of the ICT College should usher in a new beginning in ICT training, research and innovations to produce competent human resources and job creators and not job seekers because that was the main aim of any university.

“It is expected that the graduating candidates from this college will come out of the university well-equipped with skills and expertise that will enable them to engage in direct professional employment or be creators of IT employment for others” he said.

Citing examples from the tiger ecomies in South Asia, the minister said ICT had helped countries with very limited natural resources like Singapore, Malaysia and South Korea to efficiently utilize their human resources in creating something from nothing.

However, computerized systems in most of the countrys' offices and activities have largely helped in effectively running the governments at low costs, he added.

“Brazil, China, India and South Africa are among the developing countries of our level that have put efforts in ICT research in solving the energy problem by stimulating studies of alternative energy sources that can be integrated in a smart power grid,” he said. He said the government was ready to provide moral and material supports to the college, adding that it had already set up funds for research in ICT.

Earlier, acting principal of the college Prof. Justinian Ikingura said inauguration of the college had come at the right time because it would indulge seriously in new and emerging technologies.

“The college will serve as an ICT hub for research, technology incubation and product development by forging close links and collaboration with internal partners and local industries,” he said.

Saturday 3 September 2011

HP to set up major center in Tanzania


Original story by John Kulekana in Capetown

HEWLETT-Packard Company (HP), one of the world's largest information technology companies, will soon open a major centre in Tanzania, as part of its global expansion plan, a senior official with the firm said over the weekend.

"The move is part of HP global expansion plan. At present paper work on the project is going on. It will be a fully operational office," HP Senior Vice-President (Growth Markets), Mr Brian Humphries said.

Mr Humpries said this during talks with President Jakaya Kikwete on the sidelines of a three-day 21st World Economic Forum (WEF) for Africa, which ended in Cape Town, South Africa towards the end of last week.

HP specializes in developing and manufacturing computing, data storage and networking hardware. It is also involved in designing software and delivering services.

Major product lines include personal computing devices, enterprise and industry standard servers, related storage devices, networking products, software and a diverse range of printers, all-in-one's and other imaging products.

President Kikwete said he was glad with the firm's decision and pledged full government's support.Mr Kikwete also called upon the company to assist Tanzania develop and promote IT industry through training of local experts.

Mr Humpries said apart from marketing its products to households, small- to medium-sized businesses and enterprises directly as well as via online distribution also deals with institutions, including governments in provision of IT solutions.

The president told the HP executive that the government was committed to promotion and development of CIT application in the country and briefed him on various on-going projects and initiatives.

He said the country has invested 'substantially' in marine and terrestrial fiber-optic networks that will cover every district by the end of this year.The networks are expected to reduce costs for internet service providers and improve connectivity in the country.

Earlier last week, a South Korean conglomerate, Samsung Corporation announced plans to open an assembly plant in Tanzania under export processing zone (EPZ) scheme.

Virusi vya komputa vinajaribu kukuingilia kila unapojaribu kutumia Internet. Email yako imepona?



Virus kwa ufupi

Ni program kama program nyingine za komputa. Tunaposema program ya komputa inamaanisha kwamba mtaalamu wa kuandika program ametumia ujuzi wake kuandika program inayoweza kutumika kwenye komputa kama vile Microsoft Word n.k. Hata hivyo hii si program ya kawaida. Nia na madhumuni yake huwa si mazuri na madhara yake yanaweza kuwa makubwa. Kwa mfano komputa yangu ilipoingiliwa na virusi wakati nafanya project ya mwisho ya degree, nilipoteza kazi yangu siku mbili kabla ya kukabidhi baada ya virus kuingilia komputa yangu. Kwa bahati nilikuwa nimeweka back up kwenye flash memory. Hata hivyo back up haikuwa up-to-date hivyo ilinichukua masaa zaidi ya ishirini na tano kuongeza yale niliyopoteza. Masaa haya yangeweza kutumika kwenye kuiboresha project sio kufanya upya vitu ambavyo nilishavifanya.

Kwa kifupi virus ni kipande kidogo cha software program kinachojishikilia kwa siri kwenye program za kweli tunazotumia kila siku. Kwa mfano kama unatumia Microsoft Excel (Spreadsheet) hako kamdudu kanaweza kuwa kamejibanza kwenye hii program. Kila unapoifungua Spreadsheet unajikuta umefungua hicho kiprogram bila kujua.
Virusi vya komputa vinafanya kazi vipi?


Email Viruses- Watu wengi hivi karibuni wamekuwa wakipata virusi vya kwenye email (e-mail viruses). Email virus anajificha kwenye email na kusafiri nayo kama attachment kwenye message. Virus huyu ana uwezo wa kujiongeza (raplicates itself) hivyo anaweza kujituma mwenyewe kwa kutumia email yako kwenda kwa watu wote walio kwenye contact zako. Hata hivyo virus huyu hawezi kufanya kazi mpaka ufungue attachment au link iliyoificha. Hivyo kama umepokea email yenye virus, bado hawezi kufanya chochote mpaka utakapofungua attachment au link iliyomficha. Kwa sababu hiyo kuanzia leo USIFUNGUE email attachment au links kama huna uhakika. Mtumie email rafiki aliyekutumia uhakikishe kama ni yeye aliyetuma.


Trojan Horses – Hawa ni pia ni komputa program. Program inajifanya kuwa program ya kawaida ila unapoifungua tu inaingia na kujificha kwenye hard disk ya komputa yako. Ana tabia ya kufuta kila kitu kilichopo kwenye hard disk na hata kuharibu operating system hivyo kuiua komputa yako kabisa. Tofauti nyingine kati ya email virus na huyu Trojan ni kwamba Trojan hawezi kujiongeza (can not replicate itself).
Worms – Hawa wana tabia ya kutumia komputa network  kujiongeza na kutafuta komputa ya mtu siyo na vikingaji (antvirus program) ili waingie.
Kwa nini watu wanateneza virus?
Unaweza kujiuliza ni kwa nini watu wanatengeneza virus! Ukweli ni kwamba kuna sababu kama mbili:
  • Uharibifu - Kuna watu wanpenda kuharibu na kuona wengine wanahangaika kutafuta solution kwa kitu ambacho amekifanya yeye
  • Sifa ya kuvumbua - Kila mtu anapenda kuwa kama Isaac Newton. Kuacha historia kwamba waliweza kuitingisha dunia na kufanya kitu ambacho weni hawajakifanya.
Jinsi ya kujikinga na virus

Kuna njia kadhaa:
1.       Kama una hofu kubwa sana ya virus basi tumia operating system yenye kinga zaidi kama UNIX. Ni vigumu sana kusikia virus wameingilia operating system ya UNIX kwa sababu ya kinga mbali mbali zilizotengenezewa ndani.

2.       Kama unatumia operating system nyingine yeyote basi hakikisha unaweka vikinga (ant-virus - virus protection software). Unaweza kupata kopi ya bure hapa.
3.       Usiamini program nyingi unazozipata kwenye internet, nyingi zina virus isipokuwa program unazopata kutoka kwa watengenezaji wenyewe wanofahamika. Wakati mwingine nunua program iliyo kwenye CD kuliko kuchukua (download) moja kwa moja.
4.       Usifungue email attachment bila kuwa na uhakika.
5.       Hakikisha umeruhusu (enable) Macro Virus Protection (angalia maelezo hapo chini) kwa wanaotumia Microsoft applications. Pia usiruhusu macros unapofungua document. Macro hazihitajiki kwenye document hivyo ukipokea document yenye macro jiulize ni kwa nini kabla hujaruhusu.
Jinsi ya kujikinga na Macros unapotumia Microsoft Word (maelezo haya ni kwa version mpya za Microsoft Office)
         i.            Go to ‘File’




       ii.            Click Options




      iii.            Click Trust Center


     iv.            Click Trust Center settings




       v.            Click Macros
     vi.            Set the settings as shown


Kama una swali ama unataka maelezo zaidi wasiliana nasi kwa kandika comment hapa chini
Kila la kheri



Friday 2 September 2011

Do you wish to create a simple network(WIFI hotspot) in a matter of seconds!!!!

Article by Othmar Mwambe


You can share internet access with your friends using only your computer as main access point...without using long procedure to set ad hoc. A wireless ad hoc network is a decentralized type of wireless network.[1] The network is ad hoc because it does not rely on a preexisting infrastructure, such as routers in wired networks or access points in managed (infrastructure) wireless networks.

Follow the following proceudres


  1. Download and install Connectify.
  2.  Run Connectify.
  3.  Click the Connectify icon at the system tray.
  4.  Give the network a name and a password.
  5. Under the Internet dropdown box, select your 3G connection (it works for wireless connection and LAN connection as well).
The author of this atricle (Othmar Mwambe) is a student  at

Tartu University
University of Tartu in Estonia pursuing MSc in Software Engineering


Thursday 1 September 2011

Kwa wapenzi wa teknolojia, Hakikisha unatazama video hii. Jifunze mambo mbali mbali

Tazama Video (bonyeza 'Read More') ujifunze kuunganisha TV yako na komputa; kufunga motherboard; kufunga hard drive; n.k.

Je, unajua Kila unapofungua website au blog unaacha fingerprints? Ina madhara hivyo jifunnze kujihami


Huwezi kutumia internet kwa matumizi ya kawaida bila kutumia Web browser. Hii ni interface inayotuwezesha kufungua blog, websites na progams nyingine za Internet.  Kuna aina sita za Web browser:
·         Internet ExplorerMicrosoft Inc
·         Google ChromeGoogle Inc
·         Mozilla FirefoxMozilla Corporation
·         Safari Apple
·         Opera Opera Software
Ili kurahisisha matumizi yake, Internet browser zote zinahifadhi kumbukumbu ya web sites zote ulizotembelea. Zinafanya hivyo kwa sababu kadhaa. Sababu ya kwanza ni kwamba kwa kuhifadhi kumbukumbu hizo huwa inamrahisishia mtumiaji anapotaka kutembelea website hizo hizo hapo baadaye. Hii inapelekea internet experience kuwa faster kwa sababu baadhi ya information imehifadhiwa kwenye komputa yako na sio kwenye server maili kadhaa kutoka ulipo.
Pamoja na kwamba web browser inaokoa muda wako, kuna mswala kadhaa yanayoweza kuleta madhara kwenye komputa yako.
Kawanza kumbuka kwa kuwa wewe umerahisishiwa  unapotembelea web sites ulizozea, hali hii inamwezesha mtu mwingine kuziona kumbukumbu hizo zinazohifadhiwa na webbrowser. Baadhi ya web site ulizotembelea inawezekana information zilizohifadhiwa ni muhimu au za siri (kama mambo ya kiakazi). Mtu mwingine mwenye nia mbaya anaweza kujua kila website uliyotembelea na nini ulichofanya kwenye website hiyo. Kuepusha watu kuona information zako usiache fingerprint unapotumia internet. Unafanya hivyo kwa kufuta (delete) kumbukumbu zote ambazo web browser imezihifadhi.
Unaweza kufuta kumbukumbu hizo kirahisi kabisa kama ifuatavyo:
·         Google Chrome: Select “Tools” and choose “Clear Browsing History”
·         Safari: Click on the “History” tab in your menu bar. Select “Clear History” located at the bottom of the list.
·         Internet Explorer: Select the “Safety” drop down menu at the top right of the screen. Choose “Delete Browsing History.”
·         Mozilla Firefox: Click on the “Tools” menu, then select “Clear Recent History.”
Pia kuna njia nyingine unayoweza kutumia web browser bila kuacha fingerprint. Web browser zote zina feature inayokuwezesha kufanya hivyo: Kwa watumiaji wa Internet explore hii inaitwa “In Private”; kwa Mozilla Firefox na Safari hii inaitwa “Private Browsing”; na kwa Google Chrome hii inaitwa “incognito”. Njia hii ni nzuri zaidi hasa kwa wale wanaotumia komputa za public kwa mfano café, shuleni, vyuoni, kazini, n.k.
Kila la kheri

Can Twitter Benefit Business Executives?


It has been a while since I blogged. It feels good to be back!
The usefulness of Twitter continues to be debated. Last week, George Packer, a staff writer at The New Yorker, wrote that he wants to yell Stop every time he hears about Twitter. With constant updates, Twitter only adds to the overwhelming amount of information we receive every day, according to Mr. Packer. Nick Bilton of New York Times responded yesterday to Mr. Packer’s article by listing the numerous ways in which Twitter has been found to be useful.

Amidst this debate, which has been going on since Twitter became available (see Clive Thompson’s 2007 article in Wired Magazine as an illustration of this debate during its earlier days), the use of Twitter continues to grow. Yesterday’s Wall Street Journal covered the increasing use of Twitter in Europe and provided a variety of examples of how European firms are benefiting from Twitter. The article suggested that Twitter can be a useful tool provided you have clear objectives and strategy for using Twitter.

What I found noteworthy in the WSJ article is the increasing adoption of Twitter by business executives. The article stated that while most business executives consider “tweeting” as a waste of their time, some have been quick to use Twitter as part of their busy routines. For instance, Paul Johns, VP of Complinet, a multinational provider of risk and compliance information for financial services, has been able to use Twitter to generate additional revenue for his company. Mr. Johns tweets three or four times daily and he is able to generate cash through Twitter by putting up a link to a trial system with a unique URL, which allows his firm to know which deals come from Twitter.

A recent NY Times interview of Cristóbal Conde, President and C.E.O. of SunGard, also illustrated the use of Twitter by business executives. Mr. Conde and others at SunGard use Yammer, a Twitter-like service, to enable a flatter SunGard. They use Yammer to see what others are doing, share information, collaborate, brag about their successes and, in the process, according to Mr. Conde, flatten the organization. Mr. Conde uses Yammer to share what he learns from clients - their biggest problems, their biggest issues, and their biggest bets. Instead of communicating these via broadcast emails, which he considers to be too formal, Mr. Conde shares them via brief Yammer posts. He credits Yammer with helping him create a more collaborative and merit-based culture at SunGard.
The above examples are not the only examples of use of Twitter by business executives. A BusinessWeek slideshow from May 2009 documented the use of Twitter by 50 CEOs who included Richard Branson and Mark Cuban. These CEOs use Twitter for a variety of purposes, including staying in touch with their far-flung workforce, having a two-way dialog with their business partners and customers, and broadcasting important announcements to customers.

The best way for business leaders to understand Twitter (and other social media) is to begin using it. Once they begin to use Twitter, their skepticism will give way to an appreciation of how Twitter can be used beneficially. They will find that it is a highly malleable tool that easily lends itself to innovative uses (see NY Times article “Twitter is What You Make of It” and Leading Virtually’s past post “Where There’s a Will, There’s Twitter“).
Related Posts Plugin for WordPress, Blogger...

 
Design by Goodluck Mboya | Bloggerized by IT4Dev - Premium Design