Wednesday 30 October 2013

We develop trust when we show that we are reliable, by doing what we say we are going to do to take care of that treasure, and then stepping it up by doing more, by anticipating problems and handling them before they even happen...

Monday 30 September 2013

abiola omoba technology: Network marketing is based purely on relationship ...

Networking with integrity creates a greater willingness of all parties to be part of a human conduit to serve as energy and resource to one another. Sometimes you will give more than you receive and sometimes you will get back more than you give. It’s not about keeping score.
Networking with integrity creates a greater willingness of all parties to be part of a human conduit to serve as energy and resource to one another. Sometimes you will give more than you receive and sometimes you will get back more than you give. It’s not about keeping score.
Network marketing is based purely on relationship selling, which is the state of the art in selling today. Small and large companies throughout the country and the world are realizing that individuals selling to their friends and associates is the future of sales, because the critical element in buying is trust.
The currency of real networking is not greed but generosity.
It’s all about people. It’s about networking and being nice to people and not burning any bridges.
If people like you they’ll listen to you, but if they trust you they’ll do business with you.
Human beings are far more likely to communicate ideas and information with others when they are emotionally engaged. Find the key issues that concern your audience and then inculcate them within your marketing plan to get an emotional response.

abiola omoba technology: Earthing SystemCopper Bonded Earth RodsEarthing r...

We develop trust when we show that we are reliable, by doing what we say we are going to do to take care of that treasure, and then stepping it up by doing more, by anticipating problems and handling them before they even happen.
Earthing System

Copper Bonded Earth Rods Earthing rods Grounding Accessories Earthing Rod Specialist in Copper Rods, Copper Pipe, Ground Rods, Copper Earthing Electrodes. Low impedance grounding is essential to protect transmitting facilities and personnel from external or internal electrical anomalies. Copper clad driven ground rods are often insufficient due to high ground resistively or a limited installation area.

With the incorporation of innovative designs and implementation of cutting edge technology, we offer a broad range of Copper Bonded Earth Rods and Copper Bonded electrode . These products offer cost effective and efficient earth rod grounding system.

Sunday 29 September 2013

Along with Electrode another key aspect of the grouding system is the backfill compound. Back fill compound enhances the conductivity of the soil around the electrode.
It is a specially developed compound possessing high conductivity, non corrosiveness, moisture absorbing & retaining characteristics for a longer time. It reduces the soil resistivity, helps in faster dissipation of fault current and enables least fluctuation of resistance value without using salt, charcoal, etc. around the earthing electrode. 
The best feature of the   compound is that it is not soluble in water and does not cotaminate the water at all nor it moves away because of the water streams in the grounding pits . It not only improves the safety of the equipments and the mankind but is also safe on the environment
Along with Electrode another key aspect of the grouding system is the backfill compound. Back fill compound enhances the conductivity of the soil around the electrode.
It is a specially developed compound possessing high conductivity, non corrosiveness, moisture absorbing & retaining characteristics for a longer time. It reduces the soil resistivity, helps in faster dissipation of fault current and enables least fluctuation of resistance value without using salt, charcoal, etc. around the earthing electrode. 

The best feature of the   compound is that it is not soluble in water and does not cotaminate the water at all nor it moves away because of the water streams in the grounding pits . It not only improves the safety of the equipments and the mankind but is also safe on the environment
Grounding is implemented to ensure rapid decepation of fault current and to prevent hazardous damage, which in turn reduces the risk of fires and personnel injuries. A good grounding systems indirectly helps the productivity by increasing the down time of the machinery.


Why better grounding is required ?
With the time there has been revolution in the electrical, electroninc it medical and mechanical industries. 
There is enormous use of highly sophesticated equipments and electronic cards being used embeded technologies and artificial inteligence being offered to the users. Even the house hold gadgets are turning in to very sophesticated and slick devices like led tvs laptops tablets.


To protect these devices gadgets equipments and machinaries there is a requirement of grounding systems which should be more effective and dependable. 

Monday 23 September 2013

Thursday 18 July 2013

Wireless Speed & Range
When you buy a piece of wireless network hardware, it will often quote performance figures (i.e., how fast it can transmit data) based on the type of wireless networking standard it uses, plus any added technological enhancements.  In truth, these performance figures are almost always wildly optimistic.

While the official speeds of 802.11b, 802.11g, and 802.11n networks are 11, 54, and 270 megabits per second (Mbps) respectively, these figures represent a scenario that.s simply not attainable in the real world. As a general rule, you should assume that in a best-case scenario you.ll get roughly one-third of the advertised performance.

It's also worth noting that a wireless network is by definition a shared network, so the more computers you have connected to a wireless access point the less data each will be able to send and receive. Just as a wireless network's speed can vary greatly, so too can the range. For example, 802.11b and g officially work over a distance of up to 328 feet indoors or 1,312 feet outdoors, but the key term there is "up to". Chances are you won't see anywhere close to those numbers.

As you might expect, the closer you are to an access point, the stronger the signal and the faster the connection speed. The range and speed you get out of wireless network will also depend on the kind of environment in which it operates. And that brings us to the subject of interference.
Wireless Interference
Interference is an issue with any form of radio communication, and a wireless network is no exception. The potential for interference is especially great indoors, where different types of building materials (concrete, wood, drywall, metal, glass and so on) can absorb or reflect radio waves, affecting the strength and consistency of a wireless network's signal. Similarly, devices like microwave ovens and some cordless phones can cause interference because they operate in the same 2.4 frequency range as 802.11b/g/n networks. You can't avoid interference entirely, but in most cases it's not significant enough to affect the usability of the network. When it does, you can usually minimize the interference by relocating wireless networking hardware or using specialized antennas.....
Data Security on Wireless Networks
In the same way that all you need to pick up a local radio station is a radio, all anyone needs to detect a wireless network within nearby range is a wireless-equipped computer. There's no way to selectively hide the presence of your network from strangers, but you can prevent unauthorized people from connecting to it, and you can protect the data traveling across the network from prying eyes. By turning on a wireless network's encryption feature, you can scramble the data and control access to the network.



Wireless network hardware supports several standard encryption schemes, but the most common are Wired Equivalent Privacy (
WEP), Wi-Fi Protected Access (WPA), and Wi-Fi Protected Access 2 (WPA2). WEP is the oldest and least secure method and should be avoided. WPA and WPA2 are good choices, but provide better protection when you use longer and more complex passwords (all devices on a wireless network must use the same kind of encryption and be configured with the same password).
Unless you intend to provide public access to your wireless network — and put your business data or your own personal data at risk — you should consider encryption mandatory.

Friday 31 May 2013

abiola omoba technology: Do u need a computer repair/networking engineer to...

abiola omoba technology: Do u need a computer repair/networking engineer to...: Do u need a computer repair/networking engineer to handle any computer works in your home without going through any stress, hassle and the...Do u need a computer repair/networking engineer to handle any computer works in your home without going through any stress, hassle and the hustle and bustle of city life. Call any of the numbers below. We'll come to your home and fix anything computer (desktops and laptops) without charging you too much for the work. It's our pleasure doing it. We will come anywhere within Lagos Metropolis to troubleshoot and fix all your computer problems.
Please, feel free to call our service lines: 08032324956, 08094842710
Do u need a computer repair/networking engineer to handle any computer works in your home without going through any stress, hassle and the hustle and bustle of city life. Call any of the numbers below. We'll come to your home and fix anything computer (desktops and laptops) without charging you too much for the work. It's our pleasure doing it. We will come anywhere within Lagos Metropolis to troubleshoot and fix all your computer problems.
Please, feel free to call our service lines: 08032324956, 08094842710
Do u need a computer repair/networking engineer to handle any computer works in your home without going through any stress, hassle and the hustle and bustle of city life. Call any of the numbers below. We'll come to your home and fix anything computer (desktops and laptops) without charging you too much for the work. It's our pleasure doing it. We will come anywhere within Lagos Metropolis to troubleshoot and fix all your computer problems.
Please, feel free to call our service lines: 08032324956, 08094842710

Tuesday 26 March 2013


USB 3.0 may still have a long way to go before it becomes the speedy interface of choice for gadgets, but a sure sign that day is fast approaching is the announcement of the first motherboard sporting USB 3.0 ports. Don’t get too excited about this though, as Asus has taken a
shortcut to getting….

Gigabyte’s four new AMD 785G-series boards with integrated DirectX 10.1 / UVD 2.0
Gigabyte MA-785GT-UD3H, click for larger image. AMD took the NDA wraps off its 785G-series motherboards today. As such, a host of benchmarks for the integrated on-board DirectX 10.1 support will likely be found in all corners of the web. Technically speaking, the AMD 785G chipset includes an enhanced on-board ATI Radeon HD 4200 graphics engine 

Gigabyte’s four new AMD 785G-series boards with integrated DirectX 10.1 / UVD 2.0
Gigabyte MA-785GT-UD3H, click for larger image. AMD took the NDA wraps off its 785G-series motherboards today. As such, a host of benchmarks for the integrated on-board DirectX 10.1 support will likely be found in all corners of the web. Technically speaking, the AMD 785G chipset includes an enhanced on-board ATI Radeon HD 4200 graphics engine 

Wednesday 13 March 2013


The world record for an over clocked processor currently stands at 8.429GHz and was set using an AMD FX-8150 Bulldozer chip. Getting to such high frequencies requires specialized cooling, and in that case the over lockers turned to helium as a solution. Yesterday, manufacturer Gigabyte set its own record by pushing an Ivy Bridge Core i7-3770K processor……

Thursday 7 March 2013


“By the way, if you get mad at your Mac laptop and wonder who designed this demonic device, notice the manufacturer's icon on top: an apple with a bite out of it.” 

Monday 4 March 2013

Law #10: Technology Is Not A Panacea


Technology can do some amazing things. Recent years have seen the development of ever cheaper and more powerful hardware, software that harnesses the hardware to open new vistas for computer users, as well as advancement in cryptography and other sciences. It’s tempting to believe that technology can deliver a risk free world, if we just work hard enough. However, this is simply not realistic.
            Perfect security requires a level of perfection that simply doesn’t exist, and in fact isn’t likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That’s just a fact of life. But ever if software could be made perfect, it wouldn’t solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature this is usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys will respond by shifting their focus away from the technology and toward the human being at the console. It’s vital that you understand your role in maintaining solid security, or you could become the chink in your own systems’ armor.

Law #9: Absolute Anonymity Isn’t practical, In Real Life Or ON The Web


Virus scanner work by comparing the data on your computer against a collection of virus “signatures”. Each signature is characteristic of a particular virus, and when the scanner finds, data in a file. Email, or elsewhere that matches the signature, it concludes that it’s found a virus. However, a virus scanner can only scan for the viruses it knows about. It’s vital that you keep your virus scanner’s signature file up to date, as new viruses are created every day.
The problem actually goes a bit deeper than this, though. Typically, a new virus will do the greatest amount of damage during the early stages of its life, precisely because few people will be able to detect it. Once word gets around that a new virus is on the loose and people update their virus signatures, the spread of the virus falls off drastically. The key is to get ahead of the curve, and have updated signature files on your computer before the virus hits.
Virtually every maker of anti-virus software provides a way to get free updated signature files from their website. In fact, many have “push” services, in which they’ll send notification every time a new signature file is released. Use these services. Also, keep the itself that is, the scanning software update as well. Virus writers periodically develop new techniques that require that scanners change how they do their work.
Law #9: Absolute Anonymity Isn’t practical, In Real Life Or ON The Web
            All human interaction involves exchanging data of some kind. If someone enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you. In one glance, they can gauge your height, weight and approximate age. Your accent will probably tell them what country you’re from, and may ever tell them what region of the country. If you talk about anything other than the weather, you’ll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn’t take long for best bet is to live in a cave and shun all human contact.
            The same thing is true of the internet. If you visit a website, the owner can, if he’s sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask tour actual Ip address, subscribe to an anonym zing service that launders the bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonym zing service? Maybe it’s the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owner. If so, the second website owner may be able to correlate information from the two sites and determine who you are.
            Does this mean that privacy on the web is a lost cause? Not at all. What it means is that the best way to protect your privacy on the internet is the same as the way you protect your privacy in normal life through your behavior. Read the privacy statement on the website you visit and only do business with ones whose practices you agree with. If you’re worried about cookies, disable them. Most importantly, avoid indiscriminate web surfing recognize that just as most cities have a bad side of town that’s best avoided, the internet does too. But if it’s complete and total anonymity you want, better start looking for that cave.

Law #8: An Out Of Data Virus Scanner Is Only Marginally Better Than No Virus Scanner At All


Virus scanner work by comparing the data on your computer against a collection of virus “signatures”. Each signature is characteristic of a particular virus, and when the scanner finds, data in a file. Email, or elsewhere that matches the signature, it concludes that it’s found a virus. However, a virus scanner can only scan for the viruses it knows about. It’s vital that you keep your virus scanner’s signature file up to date, as new viruses are created every day.
The problem actually goes a bit deeper than this, though. Typically, a new virus will do the greatest amount of damage during the early stages of its life, precisely because few people will be able to detect it. Once word gets around that a new virus is on the loose and people update their virus signatures, the spread of the virus falls off drastically. The key is to get ahead of the curve, and have updated signature files on your computer before the virus hits.
Virtually every maker of anti-virus software provides a way to get free updated signature files from their website. In fact, many have “push” services, in which they’ll send notification every time a new signature file is released. Use these services. Also, keep the itself that is, the scanning software update as well. Virus writers periodically develop new techniques that require that scanners change how they do their work.

Law #7: Encrypted Data Is Only As The Decryption Key


Suppose you installed the biggest, strongest, most secure lock in the world on your front door, but you put the key under the front door mat. It wouldn’t really matter how strong the lock is, would it? The critical factor would be the poor way the key was protected, because if a burglar could find it, he’d have everything he needed to open the lock. Encrypted data works the same way on matter how strong the crypto algorithm is, the data is only as safe as the key that can decrypt it
            Many operating system and cryptographic software products give you an option to store cryptographic keys on the computer. The advantage is convenience you don’t have to handle the key but it comes at the cost of security. The keys are usually obfuscated (that is, hidden), and some of the obfuscation methods are quite good. But in the end, no matter how well hidden the key is, if it’s on the computer it can be found. It has to be after all, the software can find it, so a sufficiently motivated bad guy could find not, too. Whenever possible, use offline storage for keys. If the key is a word or phrase, memorize it. If not, export it to a floppy disk, make a backup copy, and store the copies in separate, secure locations. (All of you administrators out there who are using Syskey in “local storage” mode you’re going to reconfigure your server right this minute, right?)

Law #6: A Computer Is Only As Secure As The Administrator Is Trustworthy


Every computer must have an administrator: someone who can install software, configure the operating system, add and manage user accounts, establish policies, and handle all the other management tasks associated with keeping a computer up and running. By definition, these tasks require that he have control over the computer. This puts the administrator in a position of unequalled power. An untrustworthy administrator can negate every other security measure you’ve taken. He can change the permissions on the computer, modify the system security policies, install malicious software, add bogus users, or do any of a million other things. He can subvert virtually any protective measure in the operating system, because he controls it. Worst of all, he can cover his tracks. If you have an untrustworthy administrator, you have absolutely no security.
            When hiring a system administrator, recognize the position of trust that administrators occupy, and only hire people who warrant that trust. Call his references, and ask them about his previous work record, especially with regard to any security incidents at previous employers. If appropriate for your organization, you may also consider taking a step that banks and other security-conscious companies do, and require that your administrators pass a complete background check at hiring time, and at periodic intervals afterward. Whatever criteria you select, apply them across the board. Don’t give anyone administrative privileges on your network unless they’ve been vetted and this includes temporary employees and contractors, too.
            Next, take steps to help keep honest people honest. Use sing in/sing out sheets to track who’s been in the server room. (You do have a server room with a locked door, right? If not, re read Law #3). Implement a”two person” rule when installing or upgrading software. Diversify management tasks as much as possible, as a way of minimizing how much power any one administrator has. Also, don’t use the Administrator account instead, give each administrator a separate account with administrative privileges, so you can tell who’s doing what. Finally, consider taking steps to make it more difficult for a rogue administrator to cover his tracks. For instance, store audit data on write only media, or house system A’s audit data on system B, and make sure that the two system have different administrators. The more accountable your administrators are, the less likely you are to have problems.

Law #5: Weak Passwords Trump Strong Security


The purpose of having a logon process is to establish who you are. Once the operating system knows who you are, it can grant or deny requests for system resources appropriately. If a bad guy learns your password, he can log on as you. In fact, as far as the operating system is concerned, he is you. Whatever you can do on the system, he can do as will, because he’s you. Maybe he wants to read sensitive information you’ve stored on your computer, like your e-mail. Maybe you have more privileges on the network then he does, and being you will let him do things he normally couldn’t. Or maybe he just wants to do something malicious and blame it on you. In any case, it’s worth protecting your credentials.
Always use a password-it’s amazing how many accounts have blank passwords. And choose a complex one. Don’t use your dog’s name, your anniversary date, or the name of the local football team. And don’t use the word “password”! Pick a password that has a mix of upper-and lower-case letters, number, punctuation marks, and so forth. Make it as long as possible. And change it often. Once you’ve picked a strong password, handle it appropriately. Don’t write it down. If you absolutely must write it down, at the very least keep it in a safe or a locked drawer-the first thing a bad guy who’s hunting for passwords will do is check for a yellow sticky note on the side of your screen, or in the top desk drawer. Don’t tell anyone of them is dead.
Finally, consider using something stronger than passwords to identify yourself to the system. Windows 2000, for instance, supports the use of smart cards, which significantly strengthens the identity checking the system can perform. You may also want to consider biometric products like fingerprint and retina scanners.

Law #4: If You Allow A Bad Guy To Upload Programs To Your Website, It’s Not Your Website Anymore


This is basically Law #1 in reverse. In that scenario, the bad guy tricks his victim into downloading a harmful program onto his computer and running it. In this one, the bad guy uploads a harmful program to a computer and runs it himself. Although this scenario is a danger anytime you allow strangers to connect to your computer, Website are involved in the overwhelming majority of these cases. Many people who operate website are too hospitable for their own good, and allow visitors to upload program to the site and run them. As we’ve seen above, unpleasant things can happen if a bad guy’s program can on your computer.
If you run a website, you need to limit what visitors can do. You should only allow a program on your site if you wrote it yourself, or if you trust the developer who wrote it. But that may not be enough. If your website is one of several hosted on a shared server, you need to be extra careful. If a bad guy can compromise one of the other site on the server, it’s possible he could extend his control to the server, itself, in which he could control all of the sites on it-including yours. If you’re on a shared server, it’s important to find out what the server administrator’s policies are. (By the way, before operating your site to the public, make sure you’ve followed the security checklists for IIS 4.0 and IIS 5.0.

Law #3: If A Bad Guy Has Unrestricted Physical Access To Your Computer, It’s Not Your Computer Anymore


Oh, the things a bad guy can do if he can lay his hands on your computer! Here‘s sampling, going from stone age to space age:
He could mount the ultimate low-tech denial of service attack, and smash your building, and hold it for ransom.
He could boot the computer from a floppy disk, and reformat your hard drive. But wait, you say, l’ve configured the BIOS on my computer to prompt for a password when I turn the power on. No problem-if he can open the case and get his hands on the system hardware; he could just replace the BIOS chips. (Actually, there are even easier ways).
He could remove the hard drive from your computer, install it into his computer, and read it.
He could make a duplicate of your hard drive and take it back his lair. Once there, he’d have all the time in the world to conduct brute-force attacks, such as trying every possible logon password. Programs are available to automate this and, given enough time, it’s almost certain that he would succeed. Once that happens, Laws #1 and #2 above apply.
He could replace your keyboard with one that contains a radio transmitter. He could then monitor everything you type, including your password.
Always make sure that a computer is physically protected in a way that’s consistent with its value-and remember that the value of a computer includes not only the value of the hardware itself, but the value of the data on it, and the value of the access to your network that a bad guy could gain. At a minimum, business-critical computer like domain controllers, database servers, and print/file servers should always but you may want to consider protecting other computers as well, and potentially using additional protective measures.
If you travel with a laptop, it’s absolutely critical that you protect it. The same features that make laptop great to travel with-small size, light weight, and so forth-also make them easy to steal. There are a variety of locks and alarms available for laptops, and some models let you remove the hard drive and carry it with you. You also can use features like the Encrypting File System in Microsoft Windows 2000 to mitigate the damage if someone succeeded in stealing the computer. But the only way you can know with 100% certainty that your data is safe and the hardware hasn’t been tampered with is to keep the laptop on your person at all times while traveling.

Monday 25 February 2013

Motherboards are component in every computer and are necessary for the function of a desktop or laptop computer. But this product contains harmful components and should be recycled property.


A diamond will not dissolve in acid. The only thing that can destroy it is intense heat.
According to Moore’s law microchips double in power every 18 to 24 months.
  

220 million tons of old computer and other technological hardware are trashed in the unit states each year.

On average, people upgrade their computer systems every two years but fail to trade-in or recycle their old unit. This is how many of them make it into the waste stream, thus posing danger to animals and alike from the toxins they contain.

Millions of computers make it into landfills annually. By 2004, it was estimated that about 315 millions computer were land filled. These computers (including all components) equate to about 1.2 billion pound of land, 2 million pounds of cadmium and 400,000 pounds of mercury. These harmful substances can easily contaminate groundwater or air through incineration.

One component is a substance called beryllium, which is a very strong and light metal used to create strings and connections. However, beryllium is considered a carcinogen by the international agency for research on cancer.

Motherboards are component in every computer and are necessary for the function of a desktop or laptop computer. But this product contains harmful components and should be recycled property.