Wednesday, 23 September 2015

There is no such thing as a little freedom. Either you are all free, or you are not free.” – Walter Cronkite

There is no such thing as a little freedom. Either you are all free, or you are not free.”
– Walter Cronkite
CompTIA’s Security+ certification has long been a top choice for those looking for their introduction into the cyber security industry—it provides the foundational knowledge for securing a network and managing risk. It also is approved by the U.S Department of Defense to meet information assurance technical and management certification requirements, so it’s a pretty huge distinction and in great demand. The certification will help people enter into the cyber security field, and will validate a fundamental cyber security skill set. Previously, Security+ training classes were expensive, but now, at Cybrary, our online class is entirely free, forever!

About the Online CompTIA Security+ Training

The Security+ curriculum covers many areas of network security, including cloud security, encryption, security protocols, system security and network infrastructure. Our free online CompTIA Security+ training is ideal for network administrators, security consultants, security engineers, security analysts and people looking to enter into cyber security. Learn about general security concepts, basics of cryptography, communications security and operational and organizational security. With the increase of major security breaches that are occurring, security experts are needed now more than ever. 
Looking for a return (on your FREE investment)? Individuals who are Security+ certified are likely to make approximately $80,000 a year (in the USA)! Possession of this certification shows employers that you are fundamentally skilled in handling network security and risk management issues. While there are no prerequisites to this course, it’s recommended you’ve completed Network+ training and have taken the exam in order to be most successful in Security+.
CEU / CPE: 15
Total Clock Hours: 9 hrs, 35 mins
Get a Certificate of Completion
If you enjoy this course, be sure to check out the ISC2 CISSP or the CASP class next, always free at Cybrary!
This course sponsored by: @jr219595

About the CompTIA Security+ Certification Exam

In order to earn the official certification for CompTIA Security+, you must take one required exam. Test-takers must score 750/900 on the 90-question, 90-minute multiple choice exam. Review for your exam using our free CompTIA Security+ exam study guide
Certifications are valid for three years. Re-establishing your certification status requires certain guidelines be met. For more information on maintaining the CompTIA Security+ certification, visit CompTIA’s website
From Cybrary Member @jtylerc@cybrarysupport  I just wanted to thank this site, with the help of Cybrary and a study book I passed my Security+ exam.  I plan on using Cybrary for all my studying as I work towards my other certifcations. Thank you and keep up the great work.”
Do you know someone who could benefit from this training class? Email them an invite and they can join you, and you earn member points! 

Sunday, 20 September 2015

16 Lessons I Learnt From Losing My Virginity - Romance

1. Many teenage girls sleep with guys because they are trying to find love, to find self-worth. But the catch is that the more guys they sleep with, the less self-worth they had.

2. Many girls think that if they really care about guys, s’εx will bring them closer together. Indeed, sεx creates a bond. However, 80 percent of the time, the physical int!macy of first sεxμal relationship won’t last more than six months.

3. Couples who want what is best for their relationship or future marriage will have the patience to wait.

4. Most of the time, when a girl gives away her virg!nity, she assumes the relationship will last forever. But study of more than 10,000 women shows that when a girl loses her virg!nity at that age at 14, she’ll probably have about thirteen more lifetime sεxμal partners.

5. Teen s’εx frequently causes tension within families because of the dishonesty that usually accompanies the hidden int!macies. Relationships with friends are often strained, and when things turn sour, the gossip and social problems often become unbearable.

6. Everyone talks about how hard it is to say no to s’εx, but no one tells you how hard it is when you say yes.

7. It is dangerous for a teenage girl to be sεxμally active. Because a teenage girl’s reproductive system is still immature, she is very susceptible to sεxμally transmitted diseases.
8. In fact, early sεxμal activity is the number one risk factor for cervical cancer, and the second is multiple sεxμal partners. A girl’s body, like her heart, is not designed to handle multiple sεxμal partners.

9.While a girl might plan on slεεping with only one guy, she could be exposing herself to the STDs of hundreds of people through a single act of intεrcoμrsε. Here’s how: Scientists studied the sεxμal activity of a public high school of about one thousand students. About half (573) of the students had been sεxμally active, and most of them had only been with one partner. However, when the scientists
tracked the web of sεxμal activity among the students, it was discovered that more than half of the sεxμally active teens—without knowing it were linked together in a network of 288 partners within the school! So if a girl slept with a guy from this school, theoretically she could be in bεd with one-fourth of the entire student body.

10.The emotional side effects of premarital s’εx are also damaging to a young woman. One of the most common consequences of teenage sεxμal activity is depression. Girls who are sεxμally active are more than three times as likely to be depressed as girls who are abstinent. In fact, the condition has become so predictable that the Journal of Preventive Medicine recommends to doctors: “[Girls who are engaging in] sεxμal intεrcoμrsε should be screened for depression, and provided with anticipatory guidance about the mental health risks of these behaviours. ”Even if a girl experiments with s’εx once, research shows an increased risk of depression. Also, consider the fact that the rate of suicide attempts for sεxμally active girls (aged twelve to sixteen) is six times higher than the rate for virg!ns.

11. Unfortunately, many young women search for meaning only in relationships with guys, instead of with God. It is not uncommon for a girl to have s’εx in order to make a guy like her more or to encourage him to stay with her. She may compromise her standards because she is afraid of never being loved. Once he leaves her, though, an emotional divorce takes place. A person’s heart is not made to be that close to a person and then separated.


12. Since teenage sεxμal relationships rarely last, the girl’s sense of self-worth is often damaged. She may conclude that if she looked better, he would have stayed longer. This mentality can lead to harmful practices, such as eating disorders. Or the disappointment she feels may drive her into a state of self-hatred. Some young women even begin to hurt their own bodies in an attempt to numb the emotional pain. Such practices never solve the problems, though. If she wants to be loved, she needs to begin by loving herself.

13. In her heart, a girl who has been used knows it. However, she may immediately jump into another sεxμal relationship to escape the hurt. If she tries to boost her self-esteem by giving guys what they want, then her self-worth often ends up depending upon those kinds of relationships. Her development as a woman is stunted because without chastity she does not know how to express affection, appreciation, or attraction for a guy without implying something sεxμal. She may even conclude that a guy does not love her unless he makes sεxμal advances toward her. She knows that s’εx exists without int!macy, but she may forget that int!macy can exist without s’εx. A girl on this track usually feels accepted initially, but that acceptance lasts only as long as the physical plεasμrε.

14. Such a lifestyle will also take its toll on her ability to bond. Here’s why: Sharing the gift of s’εx is like putting a piece of tape on another person’s arm. The first bond is strong, and it hurts to remove it. Shift the tape to another person’s arm, and the bond will still work, but it will be easier to remove. Each time this is done, part of each person remains with the tape. Soon it is easy to remove because the residue from the various arms interferes with the tape’s ability to stick.

15. The same is true in relationships, because neurologists have discovered that previous sεxμal experiences can interfere with one’s ability to bond with future partners. This does not mean that if a person is not a virg!n on the wedding night, he or she will be unable to bond with a spouse. It simply means that when we follow God’s plan, we have the most abundant life possible. But when we turn from his designs and break his commandments, often we are the ones who feel broken afterwards.

16 Spiritual. Sin cuts us off from God, and this is the most serious consequence of premarital s’εx. After going too far, many of us know all too well the cloud of guilt that weighs on our hearts. The solution is not to kill our conscience but to follow it to freedom. It is calling us, not condemning us. Provided we repent, God will be there to welcome us home and let us start over.

What this all means is that our bodies, our hearts, our relationships, and our souls are not made for premarital s’εx. We should wait to have s’εx.

Free Online Cyber Security Training




Free Online Cyber Security Training

Cybrary provides completely free Cyber Security training classes to everyone, everywhere, forever! Get started growing your skill set today, become part of our free education revolution! You can begin with a particular course below, or if you’d like to focus on learning about a specific Cyber Security topic of interest, search for that topic here: Search Any Cyber Security Topic
Begin Your Free Cyber Security Training Journey Here:
  • CompTIA Security+ – In this class you will gain a stable foundation of Cyber Security and Information Assurance as well as prepare for the security industry’s most sought after entry level certification.
  • Cryptography – Learn how to secure data communications through the use of cryptographic messaging and practices.
  • Ethical Hacking and Penetration Testing – Learn the fundamentals of hacking and penetration testing. Think like a hacker, so that you can stop them from intruding into your systems. This class will help prepare you for the industries most sought after certification, EC-Council’s CEH.
  • Computer and Hacking Forensics – In order to catch cyber criminals, you have to learn how to retrace their steps and correctly acquire and document the evidence. Also prepare for the industry leading CHFI certification from the EC-Council.
  • CompTIA Advanced Security Practitioner (CASP) – This advanced certification covers deep topics that span across both Cyber Security as well as Information Assurance.
  • ISACA Certified Information Systems Auditor (CISA) – Become an expert in information systems auditing and controlling with this leading auditor certification from ISACA.
  • Certified Information Systems Security Professional (CISSP) – The leading certification for Information Assurance management personnel. This course is both very deep, and very broad. Be ready to study hard!
  • Post Exploitation – Learn what to do to maintain your presence and to gather intelligence after you have exploited the target system.
  • Social Engineering and Manipulation – Take a look inside the form, function and flow of a highly skilled social engineering cyber-attack. Learn to protect the human element.
  • Python for Security Professionals – Learn the commands and functions that every aspiring cyber security professional must know from Python. This isn’t a full programming course, but rather a course designed for non-coders who are developing their career in security.
  • Metasploit – An in-depth look inside the Metasploit Framework intended to show you how to use it to its full potential.
  • Malware Analysis and Reverse Engineering – An introduction to reverse engineering malware. This class is for experienced Cyber Security professionals, generally at least two to three years in the field is preferred.
  • Advanced Penetration Testing by Georgia Weidman – This class is for advanced Cyber Security professionals. You will learn in depth, hands-on, advanced hacking techniques to help you target and penetrate almost any highly secured environment.
About Our Online Cyber Security Classes
Cyber Security jobs are growing three times faster than information technology jobs. However, this rapidly growing and very exciting industry lacks the number of skilled professionals required to handle the jobs. Some common  jobs within Cyber Security include information assurance, security analyst, penetration tester, malware analyst/reverse engineering and Intel. With these types of opportunities available, aspiring or growing Cyber Security professionals should focus on continually increasing their skill set, because the Cyber Security industry never rests, it is continually changing. However, traditionally, Cyber Security classes are the most expensive training classes. As you know, that barrier to entry has been removed.
Cyber Security training of all skill levels is now free so that the aspiring Cyber Security professionals can begin their career and those already in the field can become better and expand their opportunities. Together, we can contribute to everyone’s ability to learn. In the free training classes below, we ask that you contribute, discuss on the forums, share information and participate in helping others learn.
Some of the more advanced Cyber Security training classes can be very hard to find, but at Cybrary we are continually looking to add more. Therefore, if you have a suggestion for a new class, please share it on theSuggestions page. If you are a Subject Matter Expert looking to add a class, please message @CybrarySupportwith your suggestion.

5 Benefits Of Sleep To Your Health

Hello nigeria, people tend to ignore the fact that sleep has various health benefits to their body, thats why they give themselves little or no sleep and suffer from insomnia. Lets see the benefits your body derives from sleeping. 
1. Sleeping Improves the Brain - researchers found out that an hour of sleep in the day time improves your brain cells, thus making it to function well and to retain memory. Well speaking from experience, whenever am stressed up, my brain will be so nervous and restless but whenever i have slept well both in the siesta and in the night, it calms down my brain and makes me read and understand very clearly 
2. Your Body Recovers Its Lost Nutrients - when you give yourself a sound sleep, your body recovers what it lost due to the stress or hard labour and improves digestion.
3 Sleeping Makes You Gain Weight - some people keep on complaining why they are so skinny and thin and have tried all possible means to add weight and all their efforts prove abortive but these people in particular dont observe their siesta and sleep less than 7 hours in the night and expect to gain weight. Nay its impossible. i added ten pounds in 2 weeks because i gave myself over to sleep and rest and i added weight. You dont need to buy drug that makes people add weight, Just give yourself some sleep
4. Sleep Makes Your Face Look Plump And Handsome - oh you wanna be handsome. Then give yourself a good amount of sleep in the day time for at least a month, stare at yourself in a mirror and notice a change in your cheeks and face and gives you a beautiful look.
5. Sleeping Improves Hair Growth - i tried all possible means to have side beards and i also had hair losses but when the doctor recommended sleep to me, i did and my facial hairs are now improving, including hairs in my hands etc.
Conclusively, sleeping is the best recipe that i could recommend to any one.5 Benefits Of Sleep To Your Health

Friday, 21 August 2015

Uber Missed Criminal Records of Drivers, Prosecutors Assert

SAN FRANCISCO — For more than a year, regulators in various cities have questioned whether Uber, the ride-hailing service, vets its drivers for criminal backgrounds as carefully as traditional taxi companies.
Now the district attorneys of San Francisco and Los Angeles have offered perhaps the most concrete evidence to date that people convicted of murder, sex offenses and various property crimes have driven for Uber, despite assurances from the company that it employs “industry-leading” screening.
The district attorneys said Wednesday that background checks used by Uber failed to uncover the criminal records of 25 drivers in the two cities. The charges were made in a 62-page amended complaint to a civil suit, originally filed in December, that claims Uber has continually misled consumers about the methods it uses to screen drivers.
“We are learning increasingly that a lot of the information that Uber has been presenting the consumer has been false and misleading,” said George Gascón, the district attorney in Uber’s hometown, San Francisco.
As Uber has aggressively pushed its service into cities around the world, often not waiting for permission from local regulators, it has faced hostility from local taxi drivers who fear it is undercutting their business, as well as increasing skepticism regarding the trustworthiness of some of its drivers.
Some of the most pointed questioning has come from Mr. Gascón, who argues that Uber’s background checks are not as thorough as another service, called Live Scan, that is typically used by taxi companies.
He said in a news conference Wednesday that about 30,000 registered sex offenders in California did not appear in a public registry Uber uses in its background checks. The checks also go back only seven years.
“So, for example, if someone was convicted of kidnapping eight years ago, and they were just paroled last week — they just got out of prison — the Uber background check process will not identify the person as a convicted kidnapper,” Mr. Gascón said.
He said this was “troubling and misleading to Uber customers and to the public at large” because Uber says its process goes back as far as the law allows.
Mr. Gascón was careful to couch this as a case of consumer deception. Uber is not by law required to use the Live Scan system favored by district attorneys. The question is whether the consumer is getting all the right information, he said.
The suit, which Mr. Gascón said “is only really scratching the surface,” does not name the criminals but includes some details about their crimes. One driver was convicted of second-degree murder in Los Angeles in 1982, and spent 26 years in prison before being paroled in 2008. He applied to be an Uber driver under a different name from those in his court records.
The complaint said Uber’s background check process could not identify the driver because it does not use biometric identifiers, like a fingerprint; because it cannot access criminal records that help to track aliases; and because the checks do not go back as far as the law allows. The complaint added that the Live Scan process would have identified the driver’s criminal past.
One driver was convicted of felony sexual exploitation of children in Wyoming in 2005, and another of “felony kidnapping for ransom with a firearm” in 1994. Other drivers were convicted of charges like robbery, assault with a firearm, identity theft and driving under the influence. Several were convicted of more minor charges, like welfare fraud.
“The main concern that we have here, and that we continue to have, is the fact that the consumer is not given the information, you know, the truthful information, in order to make an informed decision,” Mr. Gascón said.
The amended filing also asserts that Uber representatives continually changed their description of Uber’s screening.
An Uber representative said in a statement that the company’s background check method was no worse than Live Scan. “The reality is that neither is 100 percent foolproof — as we discovered last year when putting hundreds of people through our checks who identified themselves as taxi drivers,” the Uber statement said. “That process uncovered convictions for D.U.I., rape, attempted murder, child abuse and violence.”
In a recent blog post, the company also said that going back seven years in background checks was guided by two California laws that aimed to make it easier for criminals who have done their time to ease back into the work force by loosening the restrictions on what they have to disclose to prospective employers.
“We understand that there are strongly held views about the rehabilitation of offenders,” the post said. “But the California State Legislature decided — after a healthy debate — that seven years strikes the right balance between protecting the public while also giving ex-offenders the chance to work and rehabilitate themselves.”
Uber, which recently celebrated its fifth anniversary, is already valued around $50 billion by investors. The company has raised a multibillion-dollar war chest to finance a global expansion and move into areas like food delivery. But government officials say that in its pursuit of breakneck growth, the company is cutting corners on background checks.
The company and its competitors use background check companies that can turn around requests in a day or two. And in states across the country, Uber — along with its rivals Lyft and Sidecar — have repeatedly fought proposals that would require them to match the checks required of traditional taxi drivers.
In California, for instance, Uber and other companies successfully lobbied to kill a law that would have required drivers to undergo a background check by the state’s Justice Department, as is required of taxi drivers.
The suit by the Los Angeles and San Francisco district attorneys includes other charges like operating at airports without permission. Lyft, Uber’s largest American competitor, has already settled with the district attorneys for $500,000.

Ashley Madison Hackers:

Ashley Madison Hackers: Catch Them if You Can

ashley-madison-hackers

ManageEngine OpManager, a powerful NMS for monitoring your network, physical & virtual (VMware/ HyperV) servers & other IT devices. Deploy and start monitoring in less than an hour. Trusted by over a million admins world-wide. Try it for free.
Print
Email

The Ashley Madison hacker gang will be tough to apprehend, based on our informal survey of security experts. The hackers this week dumped nearly 10 gigabytes of stolen personal data onto the Web -- details gleaned from accounts established on the site, which is dedicated to matching up people who want to engage in extramarital affairs.
"In this case, the hackers seemed to have taken all necessary precautions to protect their anonymity while utilizing the Dark Web via Tor," said Troy Gill, a senior security analyst with AppRiver.
"I'm not sure much more is known about them now than when this whole event began," he told TechNewsWorld.
Tor is a network designed to keep the identities of the people using it anonymous. The Dark Web is a part of the Internet outside the observation of search engines, and it is inaccessible through conventional Web-surfing tools.
The Impact Team, which last month broke into Ashley Madison, used Tor to hide its identity online, and the Dark Web to post stolen data to the Internet.
When the Impact Team announced it had stolen data from the site, it demanded that owner Avid Life Media shut it down -- along with two other sites it owned, Established Men and Cougar Life. When Avid didn't comply with the hackers' demands, the gang released its cache of stolen data to the Internet.
How

Find a Rat

"From what I understand, the perpetrators were very careful with their execution and were able to remain anonymous," Gill said. "When used correctly, the Dark Web offers a tremendous amount of anonymity."
Just as the human element can be the weakest link in a cyberdefense chain, so too can it be when trying to cage cautious hackers.
"One possible approach that might still prove useful might be to somehow compel those with knowledge of the hackers to come forward," Gill noted.
It's very difficult to track down attackers, especially if they are careful about how they set up their infrastructure and conduct their attack, said Ben Johnson, chief security strategist with Bit9 + Carbon Black.
"In fact, it is nearly impossible," he told TechNewsWorld.
"Often, it is only through a slippage in blending hidden and real identities," Johnson said. Sometimes an insider's disclosure leads to the determination of hackers' actual identities.
Seasoned hackers can be tripped up by tiny mistakes, noted Adam McNeil, a malware intelligence analyst withMalwarebytes, "but as of now, we have not heard of any of those things."

Fighting Moral Turpitude

Something as simple as resizing a Tor window could lead to a hacker's demise, McNeil told TechNewsWorld.
"When you try to go full screen in Tor, it will tell you that going full screen will allow people to collect metrics which could disclose your identity," he explained.
"Other hackers have used Tor to hide their identity but have exposed it through poor operational security," McNeil added.
Although many data breaches have a financial or espionage angle to them, that doesn't seem to be the case with the Ashley Madison break-in.
"The motivation for disclosing the data is slightly different than in other cases, because there doesn't seem to be a financial motivator ," McNeil observed. "These hackers seem to be concerned about moral turpitude. They're trying to create transparency and right some wrongs of society."

Unintended Consequences

However, once a massive amount of data is made public, what happens to that data is out of the hackers' hands.
"This information can be used to not only steal additional information and ultimately the person's identity, but also embarrass or hold individuals at ransom, especially given that many users would want to keep this information secret from colleagues or spouses," said Eric Chiu, president and founder of HyTrust.
"That's an unintended consequence of the action," added Malwarebytes' McNeil. "It will definitely happen."
Since information is still scant on how the Impact Team pulled off the Ashley Madison caper, security experts say it's too soon to assess what the threat level may be to other websites.
Still, "any time a large volume of logon information is publicly leaked," warned Bit9's Johnson, "there is a tremendous amount of brute-forcing attempted against pretty much every consumer and other high-value website out there."

Friday, 14 August 2015

6 free tools that stop Windows 10 from spying on everything you do


View gallery
.
windows-10-2
Microsoft’s new Windows 10 platform has received quite a reception from bloggers and tech journalists. More importantly, it has been received with open arms by consumers eager to wipe Windows 8 from their desktops and laptops, and start fresh.
A fresh start is exactly what Windows 10 has given Microsoft, but it’s not all good news. While the new software is certainly a huge step in the right direction, some serious privacy concerns have been raised following the revelation that Windows 10 may be spying on almost everything you do.
Microsoft has indeed played fast and loose with users’ privacy in Windows 10. By default, the new operating system is configured to track usage, and even to monitor your files and folders in some cases. Just look at how scary Microsoft’s privacy statement is.
Features like this aren’t always a bad thing, but opting people in by default is hardly a user-friendly policy.
In an earlier post, we told you about a few things you can do to opt out of many of Microsoft’s tracking features in Windows 10. Since this is such a widely publicized issue, however, there are already plenty of tools you can use to help simplify the process of taking your privacy back in Windows 10. And in a recent post, gHacks supplied a nice quick comparison of six different options.
Below you’ll find six different apps covered, along with brief descriptions. Click on the name of any app to download it.

Destroy Windows 10 Spying

View gallery
.
This is a fairly basic program that allows users to enable a wide range of privacy settings in one simple interface, rather than having to dig around through Windows 10’s settings.
Download Destroy Windows 10 Spying

Disable Win Tracking

View gallery
.
This app is similar in intent to Destroy Windows 10 Spying, but with only four options, its focus is far more narrow.
Download Disable Win Tracking

DoNotSpy 10

View gallery
.
We have covered DoNotSpy10 before here on BGR, and it’s one of the most comprehensive options out there for taking control of your privacy in Windows 10. There’s a caveat, though: It’s freeware, but it installs Open Candy software on your PC, which will display ads automatically in other apps.
Download DoNotSpy 10

Windows 10 Privacy and S**t

View gallery
.
This is just a simple batch file — check gHacks for details on how it works.
Download Windows 10 Privacy and S**t

Windows 10 Privacy Fixer

View gallery
.
This app offers one tidy screen that lets you import your current privacy settings and then disable whichever features you want.
Download Windows 10 Privacy Fixer

W10 Privacy

View gallery
.
Last, and unfortunately also least, is W10 Privacy. This app is one of the best options out there in terms of covering as many privacy settings as possible… but it’s only available in German for the time being.
Download W10 Privacy

Monday, 10 August 2015

See what Watching Parents Have Sex, Made This 5 Years Old Calabar Girl Do

Image result for family
The rate this little children are learning about everything this days is just giving me headaches. They learn both good and bad from everything around them, they learn from daddy, mummy, auntie, sister, brother, nollywood, hollywood, bollywoods, name them.

Just imagine last month i went to visit a friend in a particular neighbourhood in calabar, as i was busy chilling with my guy and talking in his room, this little girl whom i later learnt to be the daughter of his neigbour peered through the curtain and let herself in uninvited, my friend scolded her for not greeting which she did immediately, we continued our gisting and take little notice of her as she played with the dvd dics around the tv, she now came to the bed where i was and continued her play there, i was gisting and laughing too before i notice that she has played very close to me, i stopped and asked her name, classs and school as was normal which she responded, i continued my gist before i felt her hand touch my legs, innocently as i taught her to be i didn't give much attention to it until she was so close that she stretched out her hand and i felt her grab my dick, HOLY MOSES!!

I jumped up and shouted,my friend pulled her up and gave her a very sharp konk, GOOD LORD am i dreaming or what? I looked at her and she was oblivious of the magnitude of what she has just done, my friend pushed her out and went to make a report to her parents, the mum came and apologized and it was settled, when she left i learnt that she is living in a one room apartment with her parents, now only god knows what she might have been seeing or hearing at nights when they might have taught her sleeping.

We talked more on this and agreed that it is very wrong for couples living in a one room apartments to have sex at nights with there wards in the same room, you might think they are sleeping but never make such a mistake, i also learnt that this was not her first time as she has previously done such on two occasions. I dont want to go into how some movies and shows both local and foreign has destroyed innocent minds. Let us protect this young ones from sex corruption and abuse.

Omotola Wants Buhari To Scrap NYSC

In an interview with NewTelegraph,Omotola Jalade Ekehinde made known her wish to have Buhari scrap NYSC. Read excerpts below:


What advice do you have for President Muhammadu Buhari?

He should scrap NYSC. It’s not useful, he should please do that for Nigerians. Our children don’t need it anymore.

Why do you want NYSC scrapped, knowing fully well it’s a national orientation programme?

I have looked at the programme thoroughly and exactly what it’s supposed to have achieved over the years. Believe me, there is no credible or tangible result. It’s a total waste of time and resources and I think all the time and resources should be channelled into something more resourceful.

For instance, I have had situations where some members of my staff, in the name of NYSC, left for a year only to come back and their spaces had been taken by another. You can imagine. NYSC is not just adding any value to our society or even to the lives of our children.

Friday, 7 August 2015

Tips For Creating A Successful Blog/Site

What you need to know to create a successful blog.

These days a lot of people are interested in creating their own blog/website. The motive is pretty obvious; to make money...no thanks to lack of jobs and the present state of the economy.

Most of these people after reading success stories of people like Linda Ikeji and Seun Osewa of Nairaland.com all want to rush into blogging to make their own money too. But what they don't know or understand is that it's not a get rich quick scheme. It requires a whole lot of dedication, determination, time and hardwork.

Most of us know Linda's story, Linda Ikeji's blog was created around the time when not so many people have access to internet, a year or so after Nairaland.com was created (visitors and contributions back then were nothing to write home about), but these guys didn't give in 'cause their sole aim I believe, wasn't to make money quick but doing what they know how to do best.

You don't just go in today and expect to start making money instantly, it just doesn't work that way. And the funny thing is that the first thing these new generation bloggers aim at after a few post on their blog is getting Adsense approval or Affiliate marketing, but you don't even have what it takes to support it yet *lol*.

No quality/unique content, most just copy and paste stuffs from other sites on their own blog. How do you expect me to come read the same thing I've already read elsewhere on your blog? With this, there will be no traffic, which means no 'clicking'...so how the hell are you even going to make money from that Adsense? You need to get your acts together first. Post unique stuffs, make yourself stand out among the others, give your visitors something that'll keep them coming back.

*. Below are some few tips

Identify your audience

Before you create content, you should identify your target audience (same as choosing a niche). These are the people you want to visit your blog/site. Once you have this sorted out getting traffic won't be herculean task.

Know what your audience want

The key to getting traffic is knowing what your audience want or are searching for. You can use powerful tools like "Google trends" to explore related keywords your target audience might be searching for. Understanding related terms to your blog/site's content helps you create more relevant content for your visitors which in turn gives you more traffic.

Create valuable content

Give your visitors the best possible experience they can get by creating unique, specific and quality content. This will keep them coming back and reduce bounce rate as they know they can't get what you've got to offer elsewhere.

Don't frustrate your audience

It's annoying when you visit a blog and ads keep popping in your face from every corner, it causes distraction and increases bounce rate.

*. Make sure you fix broken links

*. Don't force people to register before they can use your site, especially if what you're offering can be easily accessed elsewhere on the internet.

*. Try as much as possible to always avoid grammar or spelling mistakes.

*. Make sure there are not too many ads in a page on your site.

*. Make navigation easy for visitors, use navigation bars that calls out important sections of your blog/site which is clear about where it takes them e.g 'Home', 'News', 'Contact Us' e.t.c

Make your blog/site mobile-friendly

More than 60% of internet users in Nigeria today access the web using their mobile devices. Make sure your blog/site is mobile friendly, loads and displays correctly on a mobile device. Click here google webmasters tool to check if your blog/site is mobile friendly.

Now that you've known all these, you can proceed to creating your own blog and making it the best among peers. Goodluck.