Nearby non profit organizations
13 Front Street
502 Benson Street 2nd Floor, Inter Digital Building
Roberts field high way
SD Cooper Road
Japan Freeway, Montserrado County Monrovia, Liberia - West Africa
DROP YOUR NETWORK/NUMBER FOR THE LINK
𝐀𝐧𝐭𝐨𝐢𝐧𝐞 𝐓𝐨𝐮𝐧𝐤𝐚𝐫𝐚 is a social Activist,Technologist, a m his interest range from technology to writing. A socialite, whose currently a fan of Fc .Barcelona
A social Activist, Freelance writer, tech enthusiast,Christian, and public speaker currently living in Monrovia, Liberia. he is an innovative activist,whose interest range from entrepreneurship, photography,and technology.it has always been his Quest to see the world at a better place..he is currently working on the project of women winning foundation,a non governmental organisation that seek to
Poem title: The legend of Kunta kinte
My name is Kunta
I hailed from the Gambian Tribe Of
born fearless from the clan of Africa..
I became a gallant son, and warrior capture by the imperialist
With resilient I was brutal, and scars with iron because of my origin..
My name is Kunta and I'm beating mercilessly because I refused to be called Toby.
I am a black warrior fighting for my freedom,
Working for the oppressor and forcefully denied out of freedom
I am born out of grieve, my pain is equal to my freedom
I am Kunta kinte, fighting to return to my root..
I never forget about the mandinka people of the kinte clan
Long walk to my freedom
Oh the return to my sweet homeland,
Eventually I will never stop paying the price of freedom,
Challenging the ego of all blacks to long desire of freedom.
I seek the truth, thinking like a stranger giving me the pleasure
And I prefer the irony of truth than that of illusion
Preferring our lives free with the pay of slavery, for the Casualties of abnormal pain of slavery .
My Generation will follow my legacy because
I am Kunta Kinte, the legend of the Kinte clan..
What happened to Christmas Eve.. Check below 👇👇👇👇👇👇
𝗣𝗼𝗲𝗺 𝗧𝗶𝘁𝗹𝗲: 𝐓𝐡𝐞 𝐩𝐨𝐰𝐞𝐫 🅞🅕 𝐁𝐥𝐚𝐜𝐤 𝐰𝐨𝐦𝐚𝐧.
𝐈 𝐚𝐦 𝐛𝐥𝐚𝐜𝐤 𝐚𝐧𝐝 𝐛𝐞𝐚𝐮𝐭𝐢𝐟𝐮𝐥
𝑰 𝒑𝒐𝒔𝒔𝒆𝒔𝒔 𝒕𝒉𝒆 𝒑𝒐𝒘𝒆𝒓 𝒐𝒇 𝑨𝒖𝒕𝒉𝒐𝒓𝒊𝒕𝒚, 𝒂𝒏𝒅 𝑪𝒐𝒏𝒇𝒊𝒅𝒆𝒏𝒄𝒆.
𝑴𝒚 𝒘𝒐𝒓𝒕𝒉 𝒊𝒔 𝒏𝒐𝒕 𝒊𝒏 𝒕𝒉𝒆 𝒑𝒓𝒆𝒕𝒆𝒏𝒔𝒆 𝒐𝒇 𝒎𝒂𝒌𝒆𝒖𝒑, 𝒊'𝒎 𝒏𝒂𝒕𝒖𝒓𝒂𝒍𝒍𝒚 𝒅𝒂𝒓𝒌 𝒂𝒏𝒅 𝒃𝒆𝒂𝒖𝒕𝒊𝒇𝒖𝒍.
𝑴𝒚 𝒎𝒊𝒈𝒉𝒕, 𝒍𝒊𝒆𝒔 𝒊𝒏 𝒎𝒚 𝒃𝒍𝒂𝒄𝒌 𝑷𝒂𝒏𝒕𝒉𝒆𝒓 𝒔𝒕𝒓𝒆𝒏𝒈𝒕𝒉, 𝒂𝒏𝒅 𝒔𝒉𝒊𝒏𝒊𝒏𝒈 𝒅𝒂𝒓𝒌 𝒔𝒌𝒊𝒏.
𝑰 𝒈𝒐 𝒃𝒆𝒚𝒐𝒏𝒅 𝒎𝒚 𝒍𝒊𝒎𝒊𝒕 𝒊𝒏 𝒍𝒊𝒇𝒆
𝑰 𝒂𝒎 𝒔𝒕𝒓𝒐𝒏𝒈 𝒇𝒓𝒐𝒎 𝒊𝒏𝒔𝒊𝒅𝒆 𝑨𝒏𝒅 𝒔𝒂𝒄𝒓𝒊𝒇𝒊𝒄𝒆𝒔 𝒇𝒐𝒓 𝒕𝒉𝒂𝒕 𝒐𝒏𝒆 𝒔𝒎𝒊𝒍𝒆,
𝑾𝒊𝒕𝒉𝒐𝒖𝒕 𝒂 𝒉𝒊𝒏𝒕
𝑰 𝒂𝒎 𝒏𝒐𝒕 𝒂𝒔𝒉𝒂𝒎𝒆𝒅 𝒐𝒇 𝒎𝒚 𝒄𝒐𝒍𝒐𝒓.
𝑰 𝒂𝒎 𝒍𝒐𝒗𝒆 𝒏𝒂𝒕𝒖𝒓𝒂𝒍𝒍𝒚 𝒃𝒚 𝒕𝒉𝒆 𝒘𝒐𝒓𝒍𝒅. 𝑩𝒆𝒄𝒂𝒖𝒔𝒆 𝑰'𝒎 𝒕𝒉𝒆 𝒎𝒐𝒔𝒕 𝒃𝒆𝒂𝒖𝒕𝒊𝒇𝒖𝒍, 𝒂𝒏𝒅 𝒕𝒉𝒆 𝒄𝒂𝒖𝒔𝒆 𝒊𝒔 𝒃𝒆𝒄𝒂𝒖𝒔𝒆 𝑰'𝒎 𝒑𝒓𝒆𝒕𝒕𝒚.
𝑴𝒚 𝒔𝒎𝒊𝒍𝒆 𝒎𝒂𝒌𝒆 𝒉𝒆𝒂𝒓𝒕 𝒇𝒆𝒍𝒕𝒔 𝑰 𝒂𝒎 𝒂 𝒘𝒐𝒎𝒂𝒏 𝒘𝒉𝒐 𝒊𝒔 𝒔𝒕𝒓𝒐𝒏𝒈 𝒆𝒏𝒐𝒖𝒈𝒉 𝒕𝒐 𝒇𝒂𝒄𝒆 𝒍𝒊𝒇𝒆.
𝑨 𝒘𝒐𝒎𝒂𝒏 𝒘𝒉𝒐 𝒄𝒂𝒏 𝒈𝒐 𝒃𝒆𝒉𝒊𝒏𝒅 𝒉𝒆𝒓 𝒘𝒊𝒍𝒍, 𝒂𝒍𝒘𝒂𝒚𝒔 𝒕𝒉𝒆𝒓𝒆 𝒇𝒐𝒓 𝒑𝒆𝒐𝒑𝒍𝒆 𝒕𝒉𝒂𝒕 𝒄𝒉𝒆𝒓𝒊𝒔𝒉 𝒎𝒚 𝒅𝒂𝒓𝒌 𝒄𝒐𝒍𝒐𝒓.
𝑨 𝒘𝒐𝒎𝒂𝒏 𝒘𝒊𝒕𝒉 𝒔𝒖𝒑𝒓𝒆𝒎𝒆 𝒑𝒐𝒘𝒆𝒓 𝑹𝒆𝒂𝒅𝒚 𝒕𝒐 𝒇𝒂𝒄𝒆 𝒂𝒏𝒚𝒕𝒉𝒊𝒏𝒈 𝒕𝒉𝒂𝒕 𝒄𝒐𝒎𝒆𝒔 𝒂𝒍𝒐𝒏𝒈,
𝑨 𝒘𝒐𝒎𝒂𝒏 𝒓𝒆𝒂𝒅𝒚 𝒕𝒐 𝒇𝒊𝒈𝒉𝒕 𝒇𝒐𝒓 𝒍𝒊𝒇𝒆 𝑻𝒊𝒍𝒍 𝒕𝒉𝒆 𝒆𝒏𝒅 𝑾𝒊𝒕𝒉 𝒏𝒐 𝒎𝒆𝒂𝒏𝒔 𝒂𝒏𝒅 𝒑𝒐𝒘𝒆𝒓 𝒕𝒐 𝒅𝒆𝒇𝒆𝒏𝒅.
𝑰 𝒂𝒎 𝒏𝒐𝒕 𝒂𝒔𝒉𝒂𝒎𝒆𝒅 𝒐𝒇 𝒎𝒚 𝒄𝒐𝒍𝒐𝒓,
𝑰 𝒂𝒎 𝒂 𝒕𝒓𝒖𝒆 𝒗𝒊𝒓𝒕𝒖𝒐𝒖𝒔 𝒘𝒐𝒎𝒂𝒏 𝒐𝒇 𝒔𝒖𝒃𝒔𝒕𝒂𝒏𝒄𝒆 ,
𝑨𝒏𝒅 𝒕𝒉𝒆𝒓𝒆 𝒘𝒊𝒍𝒍 𝒃𝒆 𝒏𝒐 𝒊𝒎𝒂𝒈𝒊𝒏𝒂𝒕𝒊𝒐𝒏 𝒐𝒇 𝒔𝒐𝒓𝒕𝒔 𝒂𝒏𝒅 𝒏𝒐 𝒅𝒊𝒔𝒕𝒊𝒏𝒈𝒖𝒊𝒔𝒉 𝒐𝒏 𝒎𝒚 𝒕𝒉𝒐𝒖𝒈𝒉𝒕
𝑰 𝒘𝒊𝒍𝒍 𝒂𝒍𝒘𝒂𝒚𝒔 𝒔𝒉𝒊𝒏𝒆 𝒍𝒊𝒌𝒆 𝒕𝒉𝒂𝒕 𝒃𝒓𝒊𝒈𝒉𝒕 𝒔𝒕𝒂𝒓, 𝒂𝒄𝒄𝒐𝒓𝒅𝒊𝒏𝒈 𝒕𝒐 𝒎𝒚 𝒔𝒕𝒓𝒆𝒏𝒈𝒕𝒉 𝒐𝒇 𝒄𝒉𝒂𝒓𝒂𝒄𝒕𝒆𝒓 𝒊𝒏 𝒍𝒊𝒇𝒆,
𝑰 𝒂𝒎 𝒑𝒐𝒘𝒆𝒓𝒇𝒖𝒍, 𝒔𝒕𝒓𝒐𝒏𝒈, 𝒂𝒏𝒅 𝒃𝒆𝒂𝒖𝒕𝒊𝒇𝒖𝒍. 𝑨𝒏𝒅 𝑰 𝒍𝒐𝒗𝒆 𝒎𝒚 𝒑𝒓𝒊𝒄𝒆𝒍𝒆𝒔𝒔 𝒄𝒐𝒍𝒐𝒓.
𝑨 𝒃𝒊𝒈 𝒔𝒂𝒍𝒖𝒕𝒆 𝒕𝒐 𝒂𝒍𝒍 𝑩𝒍𝒂𝒄𝒌 𝒃𝒆𝒂𝒖𝒕𝒊𝒇𝒖𝒍 𝒘𝒐𝒎𝒆𝒏 𝒊𝒏 𝑨𝒇𝒓𝒊𝒄𝒂.
𝗘-𝗺𝗮𝗶𝗹 : 𝗦𝗽𝗹𝗲𝗻𝗱𝗶𝗼𝘂𝘀𝗮𝗻𝘁𝗼𝗻𝗶𝗼@𝗴𝗺𝗮𝗶𝗹.𝗰𝗼𝗺
Stop wasting your time following someone else’s idea of the ideal life, be The architect of your destiny.. There's hope still, regained those wasted time's.
Your time is way too valuable to be wasting on people that can't accept who you are, create opportunities based on what you believe.over the past years you had no idea of who you are and what you capable of, it is not yet late as hope is still alive.
Realize your plans, and set a goal.. Fight and regained those wasted time's, achieve more by fighting and pushing hard for success..
Be the architect of your destiny today.
A good seed will bear good fruits..
Dreams are the seeds of change. Nothing ever grows without a seed, and nothing ever changes without a dream... We all are like a seed growing up to become fruitful or fruitless..
Good Afternoon Fans..
Poem Title: Don't loose hope, its not yet over.
I just hope
that you find
a reason to smile
I hope you stay
happy all the while,
Don't lose hope,
No matter what
as things would
Trust and Enjoy
make sure it's sweet,
Workhard with the
straight head till the end
What you want with life
is all up to you,
Don't give up on ur Dreams,
n forget the pain,
If you don't lose hope,
Things will be fine,
Everything will fall into place on time!
Follow me on Writco.... Full link
The Art of perfection...
Portrait of Aford Karnga..
A Pan-africanist.. And emerging Cyber security expert..
Title : Beware of Cyber crimes online.
We live in a digital era which understands that our private information is more vulnerable than ever before. We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored, and retrieve on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
Cyber-attack is now an international concern and has given many concerns over internet crimes and other security attacks that could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cybersecurity describes to protect that information and the systems used to process or store it.
As the volume of cyber-attacks grows, companies and organizations, especially those that deal information related to national security, health, or financial records, need to take steps to protect their sensitive business and personal information.
The objective of Cybersecurity is to protect information from being stolen, compromised or hijacking
And so The problem here is Where are we now..
Nowadays, viruses are more deadlier, more invasive, and harder to control. We have already experienced cyber incidents from cyber criminals, and following the recent arrest of the popular Nigeria Yahoo boy Ramon Olorunwa Abbas popularly known as Ray hushpuppi who boasted online about his lavish lifestyle of private jets, designer clothes and luxury cars has been busted in a $431 million cyber scam.
hushpuppi was noted by creating fake websites for well-known companies and banks in a bid to steal credit card information and then launder the stolen money.
and also for being the leader of a transnational network that allegedly conspired to launder hundreds of millions of dollars through email scams and other schemes, some of which targeted a New York law firm, a foreign bank and an English Premier League soccer club.
this is something seriously alarming to all internet media influencer. So how do we keep ourselves safe from Cyber crimes online..
You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. But it may not be so simple. There are far more concerns in Cyber crimes, and If so, have you ever heard about the following cyber crimes attack:
Denial of service(DOS)
phishing or fake messenger
DNS poisoning or pharming
session hijacking, and
System base Attacks.These are common cyber crimes attacks that happens daily in our world..
Now to let me provide clearity on few of those cyber crimes attacks that I have listed above.
1. Web-based attacks
These are the attacks which occur on a website or web applications.this attack occur mainly when criminals take advantage of vulnerabilities in coding to gain access to a server or database, these types of cyber vandalism threats are known as application layer attacks. Users trust that the sensitive personal information they divulge on your website will be kept private and safe.
2. DNS Spoofing, or poisoning..
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.
3. USB hacking :Hackers can also use USB drives to gain access to sensitive information kept on a computer or network. Hackers may infect one or more USB drives with a virus or Trojan, that when run, will provide hackers with full access to logins, passwords, and information on an individual computer or the network the computer is connected to. that's why its important to disabled all your ports from your computer, Or Avoid plugging any USB into your computer that you don’t personally own. Friends, associates or anyone else that might want to transfer files to your computer via USB drive should be encouraged to use Google Drive, Dropbox or other cloud-based file-sharing services.
4. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data.
A common one currently,is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
Like for example:
Most phishing attacks are sent by email.The crook will register a fake domain that mimics a genuine organisation and sends thousands out thousands of generic requests.
And more besides There are two other, more sophisticated, types of phishing involving email. The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim:
Place of employment;
Email address; and
Specific information about their job role..
And for the past year's in Information technology, I have seen lot of young people in our country been ignorant to cyber crimes like phishing Attack, through their mobile phone, and this is what we called mobile phone hacking..
That's why most people social media accounts are been hack due to this attack, and they are not aware of any
6. Denial of Service or DOS
It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server..
These are the attacks which are intended to compromise a computer or a computer network. Some of the important system-based attacks are as follows-
It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.
It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
C.) Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.
It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
A bot (short for robot) is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
So what's the solution to becoming safe from online cyber attacks.
Here are the following ways you can protect yourself from Cyber crimes attack..
#1.) Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it.
#2.) Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.
#3.) Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don't ask for personal information via pop-up screens.
#4.) Install a phishing filter on your email application and also on your web browser. These filters will not keep out all phishing messages, but they will reduce the number of phishing attempts.
#5.) Delete suspicious email and do not click, and Never provide your personal Information, but make sure to Check the correctness of email addresses in your box.
#6.) Use Antivirus softwar, and always Install an Anti-Phishing Toolbar, with the Use of Web Application Firewall, and Data Encryption..
#7.) Make sure your security software is current, and update it regularly, and Go offline when you don’t need an internet connection.
Note: Keeping your account safe keeps you in control, which means that no one else can damage your image or asset.Imagine that your account was hacked. They may be looking to steal information from you.Or, they could use it to make damaging posts from your social media account..
Therefore be aware of Cyber crimes, and protect yourself now..
Videos (show all)
Contact the business
Coalition of Youth and Student for Better Liberia is Civil Society grouping in promoting the PAPD and helping the mole the minds of youths through Education.
Monrovia, BROTHER'S � �
Chicken Soup Factory N.T.A. Community
This is a youth organization that bring Young people together
Youth Elections Dialogue is movement of young people in Liberia to ensure civility in Liberia electoral Process.
It is a Organization
This Is One Of The Best Organization In Logan Town , And We Stay Need More Membe
POINT FOUR JUNCTION, BEHIND NEW GT BANK, BUSHROD ISLAND
Christ Conquerors Youth Ministry, is a youth ministry of the Soul Winning church of God Liberia Inc.
Lynch Street, Monrovia, Liberia
Youth Initiatives of the IGF are created to encourage and involve young people in a substantive discussion on Internet governance.
The Effort Baptist Church Youth Ministry is a Ministry within Effort Baptist Church Liberia