Monday, 11 September 2017

ARTICLE WRITTEN BY ONYIA EMEKA HARFORD TITLED “THE TRENDS OF CORRUPTION IN THE SOCIETY”



Corruption had been illegal social vices dominating Africa and entire world at large. But due to controllable measure imposed especially the digital system in developed world like United State and Europe; Corruption had been minimized in those continent as a result of checks and balances with these sophisticated Information and Communication Technological (ICT) Gadgets..

Now, Using Nigeria as a case study to represent African nations. Nigeria had recorded series of Cyber crimes and other human related crimes like: Child Trafficking, Women Trafficking, Rape, 419 (which is stealing by trick), diversion of Public and private sector funds etc. The puzzling issue behind these crimes is that the perpetrators sometimes are not really identified after executing the crimes due to poor investigation process and lack of digital facilities and competency to carry out result oriented investigation. The recent development was the importation and introduction of digital cameras like CCTV Cameras, 3rd eye security system Camera and other surveillance ICT cameras mounted by individuals in private sector businesses and Public limited Liability (PLC) companies to monitor crimes. But unfortunately, the government of the federation of Nigeria which supposed to have made these facilities a priority to every sector of the nation to monitor crimes has done nothing about it except the Lagos state government have sometimes ago approved the contract of mounting these monitoring surveillance and CCTV Cameras in every nuke and cranny of the city to monitor crimes. This is the only means where crime can be monitored and investigated properly in a nation:

Also the issues of hacking government, institutions like banking and insurance companies as well as prominent individuals who are dealing online transactions are no more a news in Nigeria. Hackers of these days are good in hacking with plug-in gadgets and sophisticated ICT Phones to target rich and prominent personality’s remote computer system as well as prominent blogger in order to divert fund and revenue with any slighted opportunity to do that. They now go a long way by monitoring transactions after succeeding in projecting viruses to your system and are able to view your transactions from their different locations. Sometimes, they manipulate your documents and data in such a way you might be confused if it is your remote computer is operating itself without you issuing command. No, it is the activities of hackers, to a novice to these effects must be tracked and robbed of secrets on his online financial transactions which is their main target but to an ICT professional like me. I suggest you get strongest antivirus software that is up to date and setup Bit locker on your system. I think that these two can give them a minimal hedge to intrusion on your system but not 100% hedge as the ceaseless and determined ones will still penetrate your system with those gadgets. Now the best option is to keep checking your system through task manager to end their task.

To pump up the Task manager, hold down these keys like CTRL+SHFT+ESC keys at once on your key board, then the task manager will pump out to your view. Now check the software and other programs that are currently running on your system and distinguish them from any other suspected intrusions gadgets, Now when you continue this process you will master those intruded gadgets that are not part of your system. Now, what will you do to those ones that are not part of your system? You right click them and end the task, this is how you disengage their activities in your system; but this process is continues monitoring as the determined hackers enters your system every seconds to cause havoc as well as get hacking secret codes like your password, so that they can have access to your online transactions. If you are using USB plug-in access point as Modem, it is very easy for them sometimes t block your data connections, so that you don’t have access to your INTERNET connection, this they achieve through changing your setting from network to their computer settings thereby having direct access to your USB Modem while you are blocked. So in order to stop them, remove your USB Plug-in Modem Immediately they manipulate it like this or disconnect and connect back while checking their intrusion through task manager to end their activities by clicking the suspected gadgets and select end task.

Another way to check intrusion of these hackers is to go through MS-DOS and issue some specific command like: NETSTAT –ANO to display active connections on your system, under the state column is some of their status, some connection are in “LISTENING” state while the “ESTABLISHED” state is sometimes an intrusion or virus on your system. Now to get the only active connection use this command like NETSTAT –O and NETSTAT –F which will specify the gadget connected on the foreign status whether it a PC or Phone gadget, this command will display some transmission Command Protocol (TCP) Intrusion on your system. Now to end their activities through MS-DOS use this command :
TASKKILL /PID 1644

Taskkill is a command that will terminate the activities of the intruded gadgets through their Process Identification Number (PID) which is already displayed in the established state under state column when you typed in NETSTAT –O in MS-DOS environment. Now after typing the command TASKKILL /PID 1644 and hit the enter key, it will display:
Success: sent termination signal to the process with pid 1644

Though this is a continuous checking process to disengaged established hacker on your computer . 


On the other hand, these hackers are good in chasing every form of transactions you are making online to see how they can divert it. And that is why I recommend that all online business genuine dealers should always use a good Postal Agency or advise your clients when sending a package to you, that they should take security seriously by using pictures and documentation as a prove before delivering mails or parcel to the designated addresses as these criminal hackers will tend to block mails from the post office or try to deceive the mail delivering agents that they are actually the rightful owners of the mails so that they can make use of the information and in case of ATM, so that they can use it to withdraw because they have the information already. so whenever, the expected mail or ATM did not arrive at the specified time, please report back to the bank so that they will block the ATM and issue you another as well as deliver it through appropriate medium or you go to the bank yourself and get it as arranged. Though, these systems are not common in Europe and America where every activity are monitored with CCTV Camera and other surveillance security camera and systems. But they are common in Nigeria where individuals are dominating government policy with bribery and corruption.

Finally, I will not neglect the common goal and intention of every corruption which is to divert and use for personal gain and to detriment of their victims as a result of selfishness and greed dominating the human race. Based on these facts, I am beckoning on entire nations of the world to join and fight corruption of any kind to the root so that we can have peace co-existence in the society. Thanks.



Written by
ONYIA EMEKA HARFORD
+2348186388641



No comments:

Post a Comment

POLITICAL TIPS

Castle

POLITICS