Hyena Attack – Presage of Downfall Chapter 2 – 3

If you missed the previous part, check it out here

hyena
The hyena followed him stealthilyPhoto by Natalie Chiasson:

Alistair Karume looked back. It was still following him. A big hyena, which hoped he would drop dead any moment, so it found it safe to follow him at a considerable distance. He felt tired, so tired that he needed a rest.

There was still a long journey before he could catch a glimpse of his destination. It was the presence of the hyena and the fact that he was still in the forest that made it impossible for him to rest. The animal meant serious business and Karume felt it would be a threat to his life.

Karume’s knees peeped out any moment he folded his legs to take a step. If you had looked at them from the sides, you would have thought they were playing peek-a-boo. His big hands swayed as if a weak string on his shoulders suspended them.

He Nearly Jumped out of his Skin

The tall man looked back again and he nearly jumped out of his skin. The ugly and hungry-looking animal had caught up with him. It had been waiting for one of his hands to fall and if not so, then it must have been betting that the man would not go for more than a hundred metres before he collapsed. From behind, the man looked like he would collapse but this was because of the way he carried himself.

The desperate hyena was about one metre high. Strong teeth were the predominant characteristic of the open mouth. A tired tongue hung loosely several inches to the ground. Saliva oozed freely from the big mouth like a stream.

The animal had big round eyes. Its yellowish-grey fur was covered at random with dark spots. The tough fur on the neck stood erect. The hyena did not look very healthy; it could have been starving for days.

The Scientific Classification of Hyena

In high school, they had learned about animals in boring Biology lessons. The scientific classification of hyena was: – Kingdom: Animalia, Phylum: Chordata, Class: Mammalia, Order: Carnivora Suborder: Feliformia, Family: Hyanidae. Now as he was about to be turned into a meal, all he had learned would not help him.

For heaven’s sake, Karume had to do something. He snatched a big stone and sent it flying towards the beast to scare it. The stone moved swiftly towards its target. He expected the hyena to run away yelping if the stone got it. The stone nearly missed the hyena but all the same, it bruised its back. It gave out a small yelp and bared its fangs. Then it charged like a wounded lion.

The Man Was in Grave Danger

Since he had no weapon, he had to show a clean pair of heels. He felt a sudden rush of adrenalin and he bolted like he had been released from a powerful spring. The hyena even in its natural wobbling gait charged after the fleeing man at a terrifying speed. As it chased him, it gave out its silly giggling noise. Hyenas are opportunistic animals and this was no different.

Karume ran as fast as a deer towards the nearest tree. He found one with low branches and began hauling himself upwards. The animal had already caught up with him. Luckily for it or unluckily for Karume, it closed its strong jaws on his wide-bottomed trouser and pulled. Karume tightened his grip. If he gave in then he would fall on the hyena’s back.

He climbed a tree
He climbed a treePhoto by Bas Masseus

There Had to be a Winner.

It was a tug of war and eventually, there had to be a winner. Karume couldn’t fathom himself as a loser so he gave out a blood-curdling scream, which caught the hyena off guard. It released his leg and although it had done damage to his trouser, he was lucky it had not touched his leg.

The animal backed off its cowardly instincts having taken over but then it seemed to sense it had the upper hand, so it went back to the base of the tree. It looked at him with watery eyes and bared its fangs.

He hauled himself to the top most branches. A cold sweat had wet his pants in the process of the struggle. He wiped his forehead and looked down. The hyena was still waiting for him. He waited and waited.

Time went by and the hyena hung around like death. Maybe it knew that whatever goes up must come down. It was unsafe to remain on the tree for the rest of the night. What if a lion came or a leopard and they decided to have him for dinner?

He did not like it at all. He had a future and a life to live, not ending up in the intestines of wild animals only to be disposed of the following day as lion’s shit or worse still, as hyena’s shit.

The story continues here.

Why you Need to Enable Two-Factor Authentication for Your Online Security

Two-factor authentication (2FA) is a specific type of multi-factor authentication (MFA) that strengthens access security by requiring two methods to verify your identity.

Two-Factor Authentication
Two-Factor Authentication

Most of our daily activities take place on mobile and laptop devices. This has made our digital accounts attract criminals from all corners of the world.

Malicious attacks against governments, companies, institutions, and individuals are happening now and then. These hacks, data breaches, and other forms of cybercrime are not slowing down soon.

Luckily, it’s easy for individuals and businesses to add an extra level of protection to user accounts in the form of two-factor authentication.

These factors include something you know for instance your username and password plus something you have like a smartphone app to approve authentication requests.

This creates an element of a zero trust security model. This translates to a scenario where you are being challenged to prove your identity further even if you have the login password.

To protect sensitive data, you must verify that the users trying to access that data are who they say they are.

What Two-Factor Authentication Protects You From

2FA is an effective way to protect against many security threats that target user passwords and accounts, such as;

  • Phishing
  • Brute-force attacks
  • Credential exploitation
  • Hacking and many more

Two-factor authentication protects and secures your logins from attackers exploiting weak or stolen credentials.

The 2FA sends a second authentication factor to a physical device that is not readily available to an attacker. This authentication factor is in most cases just a bunch of codes.

Facebook Two Factor Authentication
Facebook Two Factor Authentication

Common Types of 2FA

Any site that offers password-only protection is not good as it can be hacked at any time. There are various types of Two-Factor Authentication used.

  • Hardware Tokens for 2FA – these are small gadgets, like a key fob that produces a new numeric code every 30 seconds. The device provides a 2FA code to the user when they try to access an account.
  • SMS Text-Message and Voice-based 2FA – they communicate with a user’s phone directly by sending a one-time passcode (OTP) through text message. Like the hardware token, the OTP code must be entered into the application to gain access. Likewise, voice-based 2FA delivers the code verbally after dialling the user’s number.
  • Software Tokens for 2FA – this is a popular form of two-factor authentication that uses a software-generated time-based one-time passcode (TOTP aka soft-token). The user downloads and installs a free 2FA app on their smartphone, laptop or desktop. The app is then used with any site that supports this type of authentication. To sign in, the user enters the username and password and then is prompted for a code that is shown on the app.
  • Push Notification for 2FA – in this type of 2FA, a website or app being accessed sends the user a push notification that an authentication attempt is taking place. The device owner has the prerogative to accept or deny access with a single touch of the screen.

How to Activate the Two-Factor Authentication

Many sites and apps support the use of 2FA to help combat the rise of hackers who target their users.

Most apps and websites have two-factor authentication and are activated via security options. Locate the security options button and read through the provided options. Once you find the 2FA option, click on it and follow the instructions.

If the instructions are not clear, it is also possible to do an online search for the same. You will find numerous articles that will guide you. Be wise and protect your online presence now.

How to Transfer Money from Mpesa to Equity Bank Account

This is a simple guide on how to transfer money from Mpesa to Equity Bank account. The advancement of technology use in Kenya has opened many possibilities and made our work easy.

How to Transfer Money from Mpesa to Equity Bank Account
Equity Bank

You can transfer money from your Mpesa to your equity account within the blink of an eye. This will be done through your phone and you don’t have to visit any branch.

Equity Bank Limited (The “Bank”) is incorporated, registered under the Kenyan Companies Act Cap 486 and domiciled in Kenya.

The Bank has subsidiaries in Kenya, Uganda, South Sudan, Rwanda and Tanzania.  Its shares are listed on the Nairobi Securities Exchange and Uganda Securities Exchange.

Equity Bank was founded as Equity Building Society (EBS) in October 1984 and was originally a provider of mortgage financing for the majority of customers who fell into the low-income population.

How to Transfer Money from Mpesa to Equity Bank Account Using Sim Tool Kit

What you need to transfer money from Mpesa to Equity is an account number and Equity Bank’s Mpesa pay bill number 247247.

  • Go to your Mpesa Menu using the Sim Tool Kit.
  • Select Lipa na Mpesa.
  • Select the Paybill option.
  • Enter 247247 as the Business number.
  • Enter the Equity Account number you wish to deposit to.
  • Enter the amount you would like to deposit to the Equity account.
  • Enter your Mpesa Pin number and press OK.
  • You will receive a transaction confirmation message from Mpesa and Equity Bank.

How to Send Money from Mpesa to Equity Bank Using Mpesa App

  1. Access the M-Pesa app: Download and install the M-Pesa app on your mobile device. Ensure that you have a registered M-Pesa account and have logged into the app.
  2. Navigate to the “Lipa na M-Pesa” option: In the M-Pesa app, find and select the “Lipa na M-Pesa” option, which is usually located on the app’s main menu.
  3. Choose “Pay Bill”: Within the “Lipa na M-Pesa” menu, select the “Pay Bill” option.
  4. Enter the Equity Bank Paybill number: You’ll be prompted to enter the Paybill number for Equity Bank. Enter the correct Paybill number, which is usually “247247.”
  5. Enter your Equity Bank account number. This is the account where you want to deposit the money.
  6. Enter the amount: Input the amount of money you want to deposit into your Equity Bank account.
  7. Confirm the details: Review the transaction details, including the Paybill number, your Equity Bank account number, and the amount. Ensure that all information is correct.
  8. Enter your M-Pesa PIN: To authorize the transaction, you’ll need to enter your M-Pesa PIN.
  9. Complete the transaction: Once you’ve entered your PIN, the transaction will be processed, and the money will be deposited into your Equity Bank account.

After Transferring Money from Mpesa to Equity Bank

Check for the confirmation message after sending the money. You will receive a confirmation message from either M-Pesa or equity bank. The message is important as it shows that the transaction has gone through.

M-Pesa rates apply when sending money from M-Pesa to the Equity Bank account. However, the amounts will differ depending on the amount you want to send to your bank. The amount you can transfer is also capped at the daily M-Pesa rates.

You can contact Equity Bank using any of the following means below for any help.

Equity Bank Contacts

Phone: +254 763 063 000 / +254 763 000 000

Twitter: @KeEquityBank

Facebook: Equity Bank Kenya

info@equitybank.co.ke

How MacBooks Are Different From Other Laptops | Guide

How MacBooks Are Different From Other Laptops

Everyone knows laptops are great and if you are reading this article then this means you are a laptop user as well! 

However, at least once in life, every laptop user thinks about the MacBook, an old competitor of all kinds of laptops. 

For years many people have not been able to decide whether MacBooks are better than laptops. 

As you read this, you are probably asking yourself the same question, right? 

If this is true then you are at the right place since here we will explain to you how MacBooks are different from other laptops! 

Make sure you read this article till the end, this will help you get to know every difference between MacBook and laptops and decide whether you need a MacBook or a laptop.

All The Differences Between MacBook and other PCs and Laptops 

If you compare both the devices then there are so many differences, although both look the same they work and function so differently. 

Here are some of the basic differences between the two devices: 

Designs And Looks 

The former CEO of Apple, Steve Jobs, spent over three decades ensuring that Apple’s products were works of art. 

There is currently nothing that can compete with a MacBook in terms of appearance. 

An aesthetic characteristic that sets a MacBook apart from Windows computers is its design. 

Despite some Windows business laptops competing directly with MacBook, they nevertheless lack a certain air of refinement.

While Windows laptop designs aren’t something you should underestimate. 

Before the MacBook came, Windows laptops were the ones that dominated the market. 

Whether you need a student laptop or a convertible laptop, there is a wide range of designs available in Windows laptops.

Laptops are indeed beautiful but for now, there’s nothing that would beat Mac’s design! 

Performance 

When it comes to performance you can say it’s a tie between both devices. 

Since MacBook is already great at its performance. You don’t need to deal with the loading screen at all, just one tap and you get the page you need! 

Watching movies or videos is so fun since there will be no log at all. 

Windows and other laptops provide the same performance, they are as smooth as Mac. 

However, the only difference between them is that as the laptop ages, its performance worsens.

There will be one day when it will start lagging and will get slow as well, while Mac’s performance will remain the same way it used to be!

And this is one of the main reasons why people choose to build a Hackintosh.

For those of you who don’t know about Hackintosh, it is using macOS on a custom-built PC. So, a custom Macintosh will be called a Hackintosh.

As MacBook is costly, which we will discuss in the next point, people choose to go for Hackintosh, which gives the same experience as Macbook.

It all starts with choosing a compatible motherboard for Hackintosh. All of this process of choosing a motherboard for building a Hackintosh is explained in reports of consumers.

Prices 

Price is the next factor to consider if you haven’t done so before. 

Because PCs and the most recent Macs typically have different preloaded software and setups, comparing costs between them can be challenging. 

It’s crucial to assess whether a device has all the features you need or if additional peripheral devices may be needed when considering how you use it.

When it comes to choosing the system configuration that works best for you, you have more options with PCs. And you’re likely to receive the most value for your money. 

A PC will offer additional memory and storage options, improved security, quick reaction times, and superb performance right off the bat, offering you more value for your money.

However, do not forget that although Macs are more expensive buying them is worth it since all the parts will be created by the same company.

While Laptops don’t provide this service which means you will need to buy all the parts separately. 

How MacBooks Are Different From Other Laptops

Keyboards 

Macs and laptops both have keyboard difficulties, although none is particularly prone to them. 

Users have complained that the most recent Apple keyboard with the Butterfly design is unreliable. 

Similar to that, depending on the manufacturer, laptop keyboards running Windows might also be unstable. 

However, the customer service is where there is a difference, and Windows laptops win out here.

While Apple keyboards require time, Windows laptop keyboards can be readily replaced or repaired. 

Additionally, there are a few locations where you may get the keyboard on your MacBook repaired or replaced.

Customer Support 

It’s comforting to know that Apple provides a range of support and service options in case something goes wrong. 

Apple typically receives top marks for customer service. The majority of Apple goods come with a one-year limited warranty and 90 days of free phone support.

Apple provides a variety of support options, including telephone support, support via online resources, and support at Apple Retail Stores, where you can schedule a Genius appointment. 

Additionally, numerous Apple Authorized Service Providers can assist you with any problems you encounter.

This is something not all laptop brands can’t offer. 

Therefore, Mac wins this competition. 

a man fixing a laptop
Laptop Repair: Photo by IT services EU on Pexels.com

Gaming 

It’s no surprise that PCs are the preferred option of gamers for running, downloading, or streaming games as PCs enable more external devices and a more comprehensive range of form factors. 

The majority of online and console games can only be played on PCs, regardless of whether you’re a casual or competitive gamer.

Unfortunately, this is where Mac loses since it can’t handle games at all. 

You can indeed play games on Mac but they won’t be smooth and lag-free. 

You can’t keep as many games as you want on Mac which means if you are a gamer then Mac isn’t a good choice for you. 

Conclusion on How MacBooks are Different from other Laptops

MacBooks and Laptops have their advantages and disadvantages. 

However, do not forget that MacBooks are outstanding and useful. 

Although it’s expensive, it’s worth your money at all costs. 

It has smooth and lag-free performance, which means working on it is something everyone will enjoy! 

So why not buy it soon? If you are bored with your laptop or looking forward to changing the old one, get a MacBook. 

Lastly, make sure you do not expect good gaming performance from it since it’s something Mac can’t fulfil properly.

What is IoT (Internet of Things) and How Does It Work?

The internet of things or IoT refers to the system of physical computing devices, digital and mechanical machines, animals, objects, or people with sensors, processing ability, software and other technologies that enable them to connect and exchange data with other systems and devices over the internet and other communication networks.

Internet of Things
An Image Depicting Internet of Things: Image by Gerd Altmann from Pixabay

They transfer data over a network without requiring human-to-computer or human-to-human interaction. Internet of things devices do not need to connect to the public internet but only need to be connected to a network and be addressable individually.

The internet of things is getting bigger daily as more things than people are getting connected. In this case, we are talking of billions of IoT devices or things.

How Does IoT Work?

An IoT system consists of web-enabled smart devices that use integrated systems such as microprocessors, sensors and communication hardware to collect, send and act on data they gather from where they are located.

The data they collect can be analyzed locally or sent to the cloud. Internet of things devices can also communicate with other related devices and act on the data they receive from other smart devices.

Mostly, these devices work without human intervention, not unless the need for access to the data or configuration of the IoT device. Artificial intelligence use is also incorporated to make data collection dynamic and much easier.

Applications of Internet of Things Devices

There are many areas where the internet of things devices are being used in the modern world. You will find them in the commercial, industrial, and infrastructural sectors.

Smart Home

IoT devices are currently being used in home automation. You will find them in heating, lighting and air conditioning systems.

Medical and Healthcare

IoT devices are being widely used in the medical and healthcare system. For example, they enable remote health monitoring and emergency notification systems. Think of smart devices such as blood pressure and heart rate monitors. Add to the list advanced devices capable of monitoring specialised implants such as advanced hearing aids, and pacemakers among others.

Transportation Sector

A lot of transportation systems are using IoT devices in the integration of communications, controlling and processing information. A good example is smart parking systems, smart traffic control, and electronic toll collection systems among others.

Manufacturing Sector

IoT devices are used in industrial applications and smart manufacturing. This is because manufacturing devices are being fitted with sensing, communication and networking capabilities.

Agricultural Sector

IoT devices have found a lot of use in the farming sector. They are used to collect data on rainfall, temperature, soil fertility, pest infestation, and weather patterns, to mention but a few.

Advantages of Internet of Things Devices

There are several advantages of these smart devices with some listed here below.

  • IoT encourages interaction between devices. This process is known as machine-to-machine interaction.
  • It provides good automation and control.
  • They are integrated with more technical information making it is easier to operate them.
  • IoT provides efficient monitoring features.
  • It saves a lot of time.
  • IoT helps to save more money by reducing manual tasks and time.
  • Automating daily life tasks makes it easy to monitor devices.
  • Increased efficiency and time-saving.
  • Its good features make a better quality of life.

Disadvantages of IoT Devices

Though there are several advantages, there are certain disadvantages too. Enlisted below are the various demerits:

  • Internet of Things devices does not have any international compatibility standard.
  • They may become highly complex and end up failing.
  • Internet of Things devices may get affected by privacy and security breach.
  • Reduced safety for users.
  • Reduction in the employment of manual tasks results in job reductions.
  • Internet of Things devices may take control of life in due course with the increasing Artificial Intelligence technology.

You can learn more about IoT from this great book known as IoT and Edge Computing for Architects.

Verified by MonsterInsights