20 Apr 2021

Online Grooming

ONLINE GROOMING

Staying safe online.

Online grooming.

Sexual abuse, both in person and online, and exploitation to obtain sexually explicit images and videos of the child are the harm caused.

It can happen quickly or over time, but at its core it’s a process of exploiting trust to shift expectations of what safe behavior is and leveraging fear and shame to keep a child silent.

Grooming is really the start of the sexual abuse/exploitation process, and is a damaging part of the sexual abuse experience.

 

 

Offenders use a multitude of tactics to manipulate children into complying with their requests.

Grooming Tactics

  • Offender falsely identifying themselves online as one of the child’s peers either as a friend or a close relative.
  • They flatter, compliments and support the predator.
  • Promise of a “better” life just to lure them into the trap.
  • Asking questions to see if a child is alone in a room.
  • Promise of gifts, money, cell phones, tablets, drugs, alcohol.
  • Using parents against the child like telling them your parents are too strict, your parents don’t understand you.
  • Telling the child to keep their conversations a secret.
  •  Manipulating children to send photos or blackmailing them with photos the child may have already sent.
  • Exchange of sexual pictures to make victim more comfortable in sending sexual pictures or videos in return.

Actions to take;

Because grooming is often the first stage of sexual abuse, it can create a sense for parents that if they can prevent grooming, they can eliminate the possibility of sexual abuse altogether.

  1. If you see, read, hear anything sexual from an adult towards a child online or in real life, report it.
  2. Empower yourself with knowledge. Learn more about the prevalence of child sexual abuse, how it happens, and how to reduce risk to your child.
  3. Stay up to date on emerging trends and risks online.

Report any case that you may suspect to be exploiting and causing any harm to your child. Always be on the lookout for your Child’s well-being, especially on the internet.

 

Share this
16 Apr 2021

Parental control guidelines on the Internet

Parental controls are the names for a group of settings that put you in control of what content your child can see. They are useful tools to help minimize the risks your children may face, but they are not 100% effective. Combined with privacy settings these can help you protect your children from the things they shouldn’t see or experience online. It’s really important to teach your child skills like critical thinking and resilience, so they know what do if they encounter risk. Always encourage them to talk to you about anything they find upsetting online.

 

Guidelines for Safe Internet Browsing by Age

Kids under 5 years:

Build a white list and choose a handful of sites you’re comfortable with, and plug them into the device your child uses. As he gets older and needs greater access, simply add to the list.

Kids 5 to 8 years:

Use a kid-friendly browser and disable the browser on your child’s device by going to Settings. Replace it with a kid-friendly one that you download from the app store. Choose an app which lets her access only sites it identifies as safe.

For 9 years and up:

Go with Google Safe Search, this search engine does an effective job of filtering explicit images and content. On a computer, go to the preferences section in Google, click “Turn on Safe-search” and then “Lock Safe-search.” On a mobile device, go to Google, click “Settings,” then select “Search settings” and choose “Filter explicit results.” Repeat for each browser.

 

parental guidelines on the internet.

Parenting Kids in the Age of Screens, Social Media and Digital Devices.

How to Set Parental Controls


Android Parental Controls

On these features you can restrict apps, games, movies, and TV your child tries to download from the Google Play Store. In order to limit or track, you need to download the Family Link app, then create a Google account for your child. Continue to select your child’s name and tap the Daily limits card, then select Edit limits and follow the instructions. When time is almost up and the device is about to be locked, the user will get a notification.

 

Amazon Fire Parental Controls

This includes Free Time, this is built into every device. It restricts purchases, bans ads, and allows access only to content you approve. On the limits you can set time restrictions for various activities and prevent the playing of games or videos for a set amount of time.

This parental control is best for kids 8years and under.

Windows 10 Parental Controls

Microsoft family lets you filter websites, block apps, games, and other media on this features. It also regulate your child’s ability to make Microsoft Store purchases.

You can set screen-time limits for individual user sessions. Keep in Mind you’ll have to set up an online Microsoft account and e-mail address for your child.

This is best for kids over 8 year.

Follow us to get more insights on the internet and technology on our blogs, click here.

Share this
24 Mar 2021

PHISHING ATTACK

PHISHING

Phishing is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message.

Phishing attacks are the practice of sending fraudulent communications that appear to come from a reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login information, or install malware on the victim’s machine.

Three Stages Of a Phishing Attack

Step 1: The Information (Bait)

The first of the three steps of a phishing attack is preparing the bait. This involves finding out details about the target. It can be as simple as knowing that they use a particular service or work at a particular business. If a service leaks a list of just email addresses of its users, criminals will be able to know all the owners of those email addresses. They will use that service and can target them with emails that pretend to be from that service.

In more sophisticated spear phishing attacks, cyber criminals can harvest details from your social media profiles in order to build a highly customized spear phishing message that is highly likely to convince you of its genuineness.

How to identify phishing attacks.

Glance at how your emails can be hacked.

Step 2: The Promise (Hook)

Once the attacker has acquired the necessary information to use as bait, they then need to lay out the hook. To actually make the target perform an action, the attacker needs to promise something or scare them into action.

In many scams the hook involves making the target believe that one of their accounts have been compromised. This creates a sense of urgency and making the target act quickly, perhaps without thinking. The attacker can then redirect the target to follow a link to a page where they can harvest the victim’s details.

Step 3: The Attack (Catch)

The third phase of phishing is the actual attack. The cyber criminal sends out the email, and prepares for the prey to fall for the bait.

What the attacker’s next action will be will depend on the nature of the scam. For example, if they used a landing page to gain the victim’s email password, they can then log in to the victim’s email account in order to harvest more information and start sending further phishing emails to the victim’s contacts.

Ways to Prevent Phishing Attacks

Don’t give your information to an unsecured site

If the URL of the website doesn’t start with “https” do not enter any sensitive information or download files.

Know what a phishing scam looks like

There are many sites online that will keep you informed of the latest phishing attacks and their key identifiers. The earlier you find out about the latest attack methods and share them with your users through regular security awareness training, the more likely you are to avoid a potential attack.

Install firewalls

Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker.

Don’t give out important information unless you must

As a general rule of thumb, unless you 100% trust the site you are on, you should not willingly give out your card information.

Need domains and hosting, Internet connection, Web solutions? Feel free to contact us anytime. Give us a call or drop us an email.

 

Share this
16 Mar 2021

INTERNET LATENCY

INTERNET LATENCY

Latency, also called ping. It measures how much time it takes for your computer, the internet, and everything in between, to respond to an action you take. Like clicking on a link. In other words, it affects how responsive your internet connection, video, or game feels.

Ping is another way of describing latency. The ping is the request you’re sending to the server, and the ping rate is how long it takes for that request to transmit and come back with the result.

It is generally measured in milliseconds (ms) and is unavoidable due to the way networks communicate with each other. It depends on several aspects of a network and can vary if any of them are changed.

Aspects of internet latency.

What causes latency?

  1. Transmission medium:The physical path between the start point and the end point. The type of medium can impact latency. Distance is usually the main cause of latency—in this case, it refers to the distance between your computer and the servers your computer is requesting information from.
  2. Propagation: In physics, propagation is the sending out or spreading of light or sound waves, movement. When we’re talking internet, propagation is the action of sending out your data packets to a server. Theoretically, latency of a packet going on a round trip across the world is 133ms. In actuality, such a round trip takes longer, though latency is decreased when direct connections through network backbone are achieved.
  3. Routers: The efficiency in which routers process incoming data has a direct impact on latency. Router to router hops can increase latency. An old, slow router can bog down your computer’s connection to your internet provider’s modem, whether you use WI-Fi or an Ethernet connection.
  4. Storage delays: Accessing stored data can increase latency as the storage network may take time to process and return information.
  1. Internet connection type: Your internet connection type can also play a role in how high or low your latency is. For the most part, DSL, cable, and fiber internet tend to have lower latency, while satellite internet tends to have higher latency.

 

How do you fix high latency?

  • Turn off any downloads, and be sure to check for anything that’s downloading in the background.
  • Close any unused applications or browser tabs.
  • Use an Ethernet cable to connect your device to your router or modem, if at all possible.
  • Update your router’s and modem’s firmware—outdated firmware can even cause slow internet speeds.
  • Make sure your router settings are solid. Dig in to your modem and router, and make sure none of your settings are creating bottlenecks. Most routers have a settings page where you can change your password, adjust which channel the router is using, and more.Usually the login information is printed right on a sticker on the bottom of the device.
  • Upgrade your internet package. If you’ve upgraded your equipment and tweaked your settings but still aren’t getting the speeds you want, the next step is to upgrade to a faster internet package. Not sure how much speed you need? We’ve got a handy speed recommendation on our packages, check them out.

 

Bandwidth vs. latency

Higher bandwidth is better. Bandwidth is a measure of how much data can be transferred from one point in a network to another within a specific amount of time. When talking about internet connections, it’s usually measuring how much data can be downloaded to your device from a server on the internet.Your actual bandwidth will often be less than your maximum bandwidth because of network congestion and other external factors. If you want to see how fast your internet connection is now, use a speed test.

 

Lower latency is better. It refers to how much time it takes for a signal to travel to its destination and back. To test this, your computer sends a “ping” of information to a remote server and measures how long it takes for the signal to come back.

Lower latency is better because it is essentially a delay between when you take an action and when you see the result—high latency is when it takes longer to see the results. The less delay, the better.

Every time you put in a request to your internet connection, it sends a signal to the server to retrieve the information and then bring it back to you. Since this usually happens pretty quickly, it is measured in milliseconds.

Share this
24 Feb 2021

THE INTERNET AND ITS USAGE.

THE INTERNET.

The internet is the global system of interconnected computer networks that uses the internet protocol suite to communicate between networks and devices. The internet provides networking, as it links computers to allow them operate interactively. It is a network of networks that share each other. It is inter-working as it can connect to different networks using intermediary devices. On the internet every device has its own unique IP address. Principles of an IP address:

  • It identifies the host,specifically its network interface
  • It provides the location of the host in the network.

Principles of an IP address is characterized as follows:

  • A name indicates what we seek.
  • An address indicates where it is.
  • A route indicates how to get there.
  • The header of each IP packet contains the IP address of the sending host, and that of the destination host.

PEERING ON THE INTERNET.

Peering is a process by which two internet networks connect and exchange traffic. This allows direct hand of traffic between customers without having to pay a third party to carry that traffic across the Internet for them. This could involve running a circuit across town from one network’s facility to the other’s. Network operators may peer for reasons such as:

  • They have control over their traffic, in that it goes across the Internet via whatever path the transit provider decides to use.
  • It’s cheaper to hand off traffic themselves rather than paying somebody else to do it.
  • It gives greater control over their traffic flows, or allows them to better serve local populations.

 

PEERING

Peering is typically settlements free.

We have two main types of peering, public and private peering.

Public peering, done through an Internet exchange, is more common and more efficient. An Internet exchange is an Ethernet switch in a data center, which all the networks peering in the facility connect to. A network can peer with many other networks through a single connection using an Internet exchange. Peering arrangements needs to be negotiated with each peer, but no new cabling needs to be done.
Private peering within a data center combines the two approaches. Two networks put routers in the same building, and run a direct cable between them rather, than connecting through the exchange point switch. This is most useful when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point. This is sometimes done when the networks are exchanging a large volume of traffic, which won’t fit on a shared connection to an exchange point.

Check out our packages and feel free to contact us here.

 

 

Share this
18 Feb 2021

BENEFITS OF HAVING A WEBSITE.

 

 

Website is a collection of web pages and related content. Its published on one web server and identified by a common domain name. It is a group of World Wide Web pages usually containing hyperlinks to each other and made available online by an individual or company.

BENEFITS.

  1. A great marketing channel.

Having a website you can market your services and products and reach thousands of people. By staying up to date with the latest digital marketing trends you can push your page and climb search engine results.

2. Online Presence 24/7

Having a websites means that your customers are able to find you anytime anywhere. Even when its past working hours, customers can still get to know more about your services. It offers the user convenience as they can access the information they need in the comfort of their own home, with no added pressure to buy.

3. Advertising

SEO and online advertising are a great way to help build up awareness, if it’s done correctly traffic to your website can see an increase. Be a company that a potential new customer sees when searching for a specific product and service online. Use your website’s contact page to make purchasing a of product or finding a retail outlet easier than ever before.

4. Professionalism

A website tends to increase the number of customers you may get. By this, they get to purchase your products as they have the pleasure of running through the website and know the kind of services that would suit them. It would be hard for your services to get a market if you lack a website on your company.

5. Growth Opportunity.

Websites are great ways in providing a place that potential investors can be referred to. It shows what your company is about, what it has achieved and what it can achieve in the future.

Interested in having your own website? click here to get us help you get one.

Want to get a domain and hosting services as well? take a look

Share this
11 Feb 2021

INTERNET SPEED DETERMINANTS

Internet speed determinants.

Broadband speed refers to how quickly data can be uploaded or downloaded. When comparing broadband deals, pay attention to how many Kbps or Mbps you get and at what cost.

Broadband speed is measured in Mbps (megabits per second) and Kbps (kilobits per second). A bit is the smallest unit of data that can be transferred so when it comes to calculating speed the higher the number of bits per second, the faster your broadband connection will be.

Kbps and Mbps measures are:

  • 1 Kbps: 1,000 bits per second
  • 1 Mbps: 1,000,000 bits per second

Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office.

Determinants.

To determine how much broadband speed, you need, you may also want to consider the usage requirement of everyone in your household or office. This is because the number of people using the connection can affect the overall broadband speed.

Ways to determine your current Broadband speed;

  • When choosing a bandwidth, you should consider the monthly bill as it should reflect the minimum speed you are getting.
  • Do a speed test online for the bandwidth you have chosen. These tests work by sending data to and from a main server. They then time how quickly the data completes the round-trip. The result gives you the exact current speed of your internet connection.

It’s good practice to regularly test the speed of your broadband connection. This way, you can always make sure that you are getting what you pay for.

Speed test on broadband.

 

 

A good broadband speed will depend on your personal preference and how you use the internet. We have 3 categories of users.

  • Light users: If you need a broadband connection to check your emails, do your online banking, and browse just a little, then you are a light user and your broadband speed can be kept minimal.
  • Medium users:If you use the internet frequently for social media, browsing the net, and catching up on the latest episode of your favorite series over and above the internet basics, then you’re considered a medium user. Medium users will need a slightly faster connection than light users.
  • Heavy users:If you use the internet for a significant amount of time, then you can be considered a heavy user. Heavy users are those who do peer-to-peer file sharing, online gaming or stream films and music.Speed is one of the main things you will need to consider, when choosing a broadband package. However, many consumers don’t know what broadband speed is or how many Mbps they’ll need when setting up broadband for their home or office. You can click here to see our internet packages that will suite your usage.
Share this
21 Sep 2020

VIRTUAL PRIVATE SERVERS (VPS).

VIRTUAL PRIVATE SERVERS (VPS).

A VPS is a virtual machine, performing the functions of a server, running on powerful server hardware.

VPS or a Virtual Private Server is a service used in the hosting world where it acts as a standalone dedicated server. With the use of cloud technology and virtualization, the VPS comes into play.

VPS server has its own dedicated resources but the difference is that in one powerful physical server there can be more than one VPS. By the use of virtualization, the physical server is divided into the required number of Virtual Private Servers and the resources are dedicated accordingly.

Virtualization Process.

Dedicated server.

virtualization process.

VIRTUAL PRIVATE SERVERS (VPS) USAGE.

  • Hosting a personal server

Keeping your most important files in a VPS set up with proper security measures could be a safe and cost-effective method for getting rid of those pesky external hard drives for backups. You could even set-up a private sync service on your VPS.

  • Testing Environment

A VPS is an excellent environment to test new software, operating system setups, and even new hardware before deploying to actual use.

  • VPS for VPN

With the alarming need to protect privacy on the Internet, more and more individuals use VPN for personal gains. If you share or access sensitive data or you don’t want anyone to know about your activities, you need to trust your VPN provider. In that case, you can become your VPN provider yourself and install a VPN server on a VPS.

  • VPS as a representative

It works as an intermediary between your device and the rest of the Internet. When your device sends a request, a proxy intercepts it and checks whether it has requested data in the cache. If yes, it returns the cached version of the data without connecting to the requested resource. If not, a proxy server passes your request further but changes your IP to its own. Just a click away to get our vps hosting plans. Here.

 

Share this
01 Jul 2020

Tips On Branding Your Business

Branding Trends

Define Your Branding

In order to define your branding you need to have  self-discovery for your business. Branding needs at least your company or business to have a mission. The mission helps to know which direction the company is taking. You need to know the benefits and features of your products and services that you are offering. Getting to know your products and services helps more in knowing the type  of customers to expect and how to deal with them.

It is also important to know, what your customers and prospects think of your company. What customers think of your company or business helps you to know what your strengths and weaknesses are. You can also get ideas on what to input or output in your company. What qualities would you want them to associate which your company? give them your best services and they will definitely give you a high ranking.

Once you have defined your brand, get the word out there by;

  • Getting a great logo and placing it everywhere, let your brand be known.
  • Develop a tagline that is memorable, meaningful and concise. A statement that captures the essence of your brand.
  • Integrate your brand by extending every aspect of your business. How you answer your phones,your salespeople wear on calls.Simply get everything on the right track on the business.
  • Be true to your brand, give a legit service or product and your customers will definitely recommend you to someone else.
  • Have a message for your brand, a key message that you want to communicate about your brand. Also get your employees to be aware of your brand attributes.
  • Be consistent, continue with the positive trends in order to maintain your business and expand it as well.

Defining your brand helps your costumers understand your products and services more. Depending on how your branding game is, customers might not need to look for other options on the same product. You can check on our page for our brands. Just a click. 

 

Share this
01 Jun 2020

WIRELESS NETWORKS.

Wireless Networks

HAPPY FAMILY ENJOYING KEMNET WIRELESS NETWORK

Wireless networks are computer networks that are not connected by cables of any kind. The use of a wireless network enables enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The basis of wireless systems are radio waves, an implementation that takes place at the physical level of network structure. They use radio waves to connect devices such as laptops to the Internet, the business network and applications.

Four Types Of Wireless Networks.

These are created through the use of mobile phone signals typically provided and maintained by specific mobile phone service providers. WWANs can provide a way to stay connected even when away from other forms of network access. Covers large areas such as neighboring towns and cities.

WLAN are wireless networks that use radio waves. The backbone network usually uses cables, with one or more wireless access points connecting the wireless users to the wired network. The range of wlan can be anywhere from a single room to an entire campus.

WPANs are short-range networks that use Bluetooth technology. They are commonly used to interconnect compatible devices near a central location, such as a desk. A WPAN has a typical range of about 30 feet. Interconnects devices in a short span, generally within a person’s reach.

Connects several wireless LANs.

Metropolitan area network is similar to a local area network (LAN) but spans an entire city or campus. MANs are formed by connecting multiple LANs thus, MANs are larger than LANs but smaller than wide area networks (WAN).
MANs are extremely efficient and provide fast communication via high-speed carriers, such as fiber optic cables. To get all our home wireless packages, its a click away. Here.

KEMNET WIRELESS NETWORKS

Discover how you can benefit from affordable High speed Dedicated Kemnet wireless network packages

Share this

© Kemnet Technologies. All rights reserved.

Click Me