Corruption had been illegal social vices dominating
Africa and entire world at large. But due to controllable measure imposed
especially the digital system in developed world like United State and Europe;
Corruption had been minimized in those continent as a result of checks and
balances with these sophisticated Information and Communication Technological
(ICT) Gadgets..
Now, Using Nigeria as a case study to represent
African nations. Nigeria had recorded series of Cyber crimes and other human related
crimes like: Child Trafficking, Women
Trafficking, Rape, 419 (which is stealing by trick), diversion of Public and
private sector funds etc. The puzzling issue behind these crimes is that
the perpetrators sometimes are not really identified after executing the crimes
due to poor investigation process and lack of digital facilities and competency
to carry out result oriented investigation. The recent development was the
importation and introduction of digital cameras like CCTV Cameras, 3rd
eye security system Camera and other surveillance ICT cameras mounted by
individuals in private sector businesses
and Public limited Liability (PLC) companies to monitor crimes. But
unfortunately, the government of the federation of Nigeria which supposed to
have made these facilities a priority to every sector of the nation to monitor
crimes has done nothing about it except the Lagos state government have
sometimes ago approved the contract of mounting these monitoring surveillance
and CCTV Cameras in every nuke and cranny of the city to monitor crimes. This
is the only means where crime can be monitored and investigated properly in a
nation:
Also the issues of hacking government, institutions
like banking and insurance companies
as well as prominent individuals who are dealing online transactions are no
more a news in Nigeria. Hackers of these days are good in hacking with plug-in
gadgets and sophisticated ICT Phones to target rich and prominent personality’s
remote computer system as well as prominent blogger in order to divert fund
and revenue with any slighted opportunity to do that. They now go a long way by
monitoring transactions after succeeding in projecting viruses to your system
and are able to view your transactions from their different locations.
Sometimes, they manipulate your documents and data in such a way you might be
confused if it is your remote computer is operating itself without you issuing
command. No, it is the activities of hackers, to a novice to these effects must
be tracked and robbed of secrets on his online financial transactions which is
their main target but to an ICT professional like me. I suggest you get strongest
antivirus software that is up to date and setup Bit locker on your system. I
think that these two can give them a minimal hedge to intrusion on your system
but not 100% hedge as the ceaseless and determined ones will still penetrate
your system with those gadgets. Now the best option is to keep checking your
system through task manager to end their task.
To pump up the Task manager, hold down these keys
like CTRL+SHFT+ESC keys at once on
your key board, then the task manager will pump out to your view. Now check the
software and other programs that are currently running on your system and distinguish
them from any other suspected intrusions gadgets, Now when you continue this
process you will master those intruded gadgets that are not part of your
system. Now, what will you do to those
ones that are not part of your system? You right click them and end the
task, this is how you disengage their activities in your system; but this
process is continues monitoring as the determined hackers enters your system
every seconds to cause havoc as well as get hacking secret codes like your
password, so that they can have access to your online transactions. If you are
using USB plug-in access point as Modem, it is very easy for them sometimes t
block your data connections, so that you don’t have access to your INTERNET connection, this they achieve through changing your setting from network to their
computer settings thereby having direct access to your USB Modem while you are
blocked. So in order to stop them, remove your USB Plug-in Modem Immediately
they manipulate it like this or disconnect and connect back while checking
their intrusion through task manager to end their activities by clicking the
suspected gadgets and select end task.
Another way to check intrusion of these hackers is
to go through MS-DOS and issue some specific command like: NETSTAT –ANO to
display active connections on your system, under the state column is some of
their status, some connection are in “LISTENING”
state while the “ESTABLISHED” state
is sometimes an intrusion or virus on your system. Now to get the only active
connection use this command like NETSTAT
–O and NETSTAT –F which will
specify the gadget connected on the foreign status whether it a PC or Phone
gadget, this command will display some
transmission Command Protocol (TCP) Intrusion on your system. Now to end their
activities through MS-DOS use this command :
TASKKILL /PID
1644
Taskkill is a command that will
terminate the activities of the intruded gadgets through their Process Identification Number (PID)
which is already displayed in the established state under state column when you
typed in NETSTAT –O in MS-DOS
environment. Now after typing the command TASKKILL
/PID 1644 and hit the enter key, it will display:
Success: sent
termination signal to the process with pid 1644
Though this is a continuous checking process to
disengaged established hacker on your computer .
On the other hand, these hackers are good in chasing
every form of transactions you are making online to see how they can divert it.
And that is why I recommend that all online business genuine dealers should
always use a good Postal Agency or advise your clients when sending a package
to you, that they should take security seriously by using pictures and
documentation as a prove before delivering mails or parcel to the designated
addresses as these criminal hackers will tend to block mails from the post
office or try to deceive the mail delivering agents that they are actually the
rightful owners of the mails so that they can make use of the information and
in case of ATM, so that they can use it to withdraw because they have the
information already. so whenever, the expected mail or ATM did not arrive at
the specified time, please report back to the bank so that they will block the
ATM and issue you another as well as deliver it through appropriate medium or
you go to the bank yourself and get it as arranged. Though, these systems are
not common in Europe and America where every activity are monitored with CCTV
Camera and other surveillance security camera and systems. But they are common
in Nigeria where individuals are dominating government policy with bribery and
corruption.
Finally, I will not neglect the common goal and
intention of every corruption which is to divert and use for personal gain and
to detriment of their victims as a result of selfishness and greed dominating
the human race. Based on these facts, I am beckoning on entire nations of the
world to join and fight corruption of any kind to the root so that we can have
peace co-existence in the society. Thanks.
Written
by
ONYIA EMEKA HARFORD
+2348186388641
No comments:
Post a Comment