รntรณIรฤ TรรรKรRร
Nearby non profit organizations
Paynesville
13 Front Street
502 Benson Street 2nd Floor, Inter Digital Building
Roberts field high way
+231
Sinkor
50101
SD Cooper Road
50101
231
Japan Freeway, Montserrado County Monrovia, Liberia - West Africa
+231
Comments
MTN
GLO
AIRTEL
9MOBILE
Vodafone
Vodacom
DROP YOUR NETWORK/NUMBER FOR THE LINK
๐๐ง๐ญ๐จ๐ข๐ง๐ ๐๐จ๐ฎ๐ง๐ค๐๐ซ๐ is a social Activist,Technologist, a m his interest range from technology to writing. A socialite, whose currently a fan of Fc .Barcelona
A social Activist, Freelance writer, tech enthusiast,Christian, and public speaker currently living in Monrovia, Liberia. he is an innovative activist,whose interest range from entrepreneurship, photography,and technology.it has always been his Quest to see the world at a better place..he is currently working on the project of women winning foundation,a non governmental organisation that seek to

Poem title: The legend of Kunta kinte
My name is Kunta
I hailed from the Gambian Tribe Of
Bufferee
born fearless from the clan of Africa..
I became a gallant son, and warrior capture by the imperialist
With resilient I was brutal, and scars with iron because of my origin..
My name is Kunta and I'm beating mercilessly because I refused to be called Toby.
I am a black warrior fighting for my freedom,
Working for the oppressor and forcefully denied out of freedom
I am born out of grieve, my pain is equal to my freedom
I am Kunta kinte, fighting to return to my root..
I never forget about the mandinka people of the kinte clan
Long walk to my freedom
Oh the return to my sweet homeland,
Eventually I will never stop paying the price of freedom,
Challenging the ego of all blacks to long desire of freedom.
I seek the truth, thinking like a stranger giving me the pleasure
For truth
And I prefer the irony of truth than that of illusion
Preferring our lives free with the pay of slavery, for the Casualties of abnormal pain of slavery .
My Generation will follow my legacy because
I am Kunta Kinte, the legend of the Kinte clan..
ยฉ Splendious_Antonio

What happened to Christmas Eve.. Check below ๐๐๐๐๐๐
https://youtu.be/k-7KJbGDsnY
















Happy Sunday..

๐ฃ๐ผ๐ฒ๐บ ๐ง๐ถ๐๐น๐ฒ: ๐๐ก๐ ๐ฉ๐จ๐ฐ๐๐ซ ๐
๐
๐๐ฅ๐๐๐ค ๐ฐ๐จ๐ฆ๐๐ง.
๐ ๐๐ฆ ๐๐ฅ๐๐๐ค ๐๐ง๐ ๐๐๐๐ฎ๐ญ๐ข๐๐ฎ๐ฅ
๐ฉ๐๐๐๐๐๐
๐ฐ ๐๐๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐ ๐๐ ๐จ๐๐๐๐๐๐๐๐, ๐๐๐
๐ช๐๐๐๐๐
๐๐๐๐.
๐ด๐ ๐๐๐๐๐ ๐๐ ๐๐๐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐, ๐'๐ ๐๐๐๐๐๐๐๐๐ ๐
๐๐๐ ๐๐๐
๐๐๐๐๐๐๐๐๐.
๐ด๐ ๐๐๐๐๐, ๐๐๐๐ ๐๐ ๐๐ ๐๐๐๐๐ ๐ท๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐, ๐๐๐
๐๐๐๐๐๐๐ ๐
๐๐๐ ๐๐๐๐.
๐ฐ ๐๐ ๐๐๐๐๐๐
๐๐ ๐๐๐๐๐ ๐๐ ๐๐๐๐
๐ฐ ๐๐ ๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐
๐ ๐จ๐๐
๐๐๐๐๐๐๐๐๐๐ ๐๐๐ ๐๐๐๐ ๐๐๐ ๐๐๐๐๐,
๐พ๐๐๐๐๐๐ ๐ ๐๐๐๐
๐ฐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐
๐๐ ๐๐ ๐๐๐๐๐.
๐ฐ ๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐ ๐๐๐๐๐
. ๐ฉ๐๐๐๐๐๐ ๐ฐ'๐ ๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐๐๐, ๐๐๐
๐๐๐ ๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐ ๐ฐ'๐ ๐๐๐๐๐๐.
๐ด๐ ๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐ ๐ฐ ๐๐ ๐ ๐๐๐๐๐ ๐๐๐ ๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐ ๐๐ ๐๐๐๐ ๐๐๐๐.
๐จ ๐๐๐๐๐ ๐๐๐ ๐๐๐ ๐๐ ๐๐๐๐๐๐
๐๐๐ ๐๐๐๐, ๐๐๐๐๐๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐ ๐
๐๐๐ ๐๐๐๐๐.
๐จ ๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐ ๐น๐๐๐
๐ ๐๐ ๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐ ๐๐๐๐๐,
๐จ ๐๐๐๐๐ ๐๐๐๐
๐ ๐๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐ ๐ป๐๐๐ ๐๐๐ ๐๐๐
๐พ๐๐๐ ๐๐ ๐๐๐๐๐ ๐๐๐
๐๐๐๐๐ ๐๐ ๐
๐๐๐๐๐
.
๐ฐ ๐๐ ๐๐๐ ๐๐๐๐๐๐๐
๐๐ ๐๐ ๐๐๐๐๐,
๐ฐ ๐๐ ๐ ๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐๐ ,
๐จ๐๐
๐๐๐๐๐ ๐๐๐๐ ๐๐ ๐๐ ๐๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐ ๐๐๐
๐๐ ๐
๐๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐ ๐๐๐๐๐๐๐
๐ฉ๐๐๐๐๐๐
๐ฐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐, ๐๐๐๐๐๐
๐๐๐ ๐๐ ๐๐ ๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐ ๐๐๐๐,
๐ฐ ๐๐ ๐๐๐๐๐๐๐๐, ๐๐๐๐๐๐, ๐๐๐
๐๐๐๐๐๐๐๐๐. ๐จ๐๐
๐ฐ ๐๐๐๐ ๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐.
๐จ ๐๐๐ ๐๐๐๐๐๐ ๐๐ ๐๐๐ ๐ฉ๐๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐ ๐๐ ๐จ๐๐๐๐๐.
, .
๐-๐บ๐ฎ๐ถ๐น : ๐ฆ๐ฝ๐น๐ฒ๐ป๐ฑ๐ถ๐ผ๐๐๐ฎ๐ป๐๐ผ๐ป๐ถ๐ผ@๐ด๐บ๐ฎ๐ถ๐น.๐ฐ๐ผ๐บ
Stop wasting your time following someone elseโs idea of the ideal life, be The architect of your destiny.. There's hope still, regained those wasted time's.
Your time is way too valuable to be wasting on people that can't accept who you are, create opportunities based on what you believe.over the past years you had no idea of who you are and what you capable of, it is not yet late as hope is still alive.
Realize your plans, and set a goal.. Fight and regained those wasted time's, achieve more by fighting and pushing hard for success..
Be the architect of your destiny today.
..
A good seed will bear good fruits..
Dreams are the seeds of change. Nothing ever grows without a seed, and nothing ever changes without a dream... We all are like a seed growing up to become fruitful or fruitless..

...

Good Afternoon Fans..



Poem Title: Don't loose hope, its not yet over.
I just hope
that you find
a reason to smile
I hope you stay
happy all the while,
Don't lose hope,
No matter what
as things would
change soon,
Trust and Enjoy
the process,
make sure it's sweet,
Workhard with the
straight head till the end
What you want with life
is all up to you,
Don't give up on ur Dreams,
n forget the pain,
If you don't lose hope,
Things will be fine,
Everything will fall into place on time!
..
..
ยฉ antoine_tounkara
Follow me on Writco.... Full link
https://www.writco.in/Poem/P48310042020062247

The Art of perfection...
Adobe Draw...
Portrait of Aford Karnga..
A Pan-africanist.. And emerging Cyber security expert..

Title : Beware of Cyber crimes online.
We live in a digital era which understands that our private information is more vulnerable than ever before. We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored, and retrieve on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.
Cyber-attack is now an international concern and has given many concerns over internet crimes and other security attacks that could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cybersecurity describes to protect that information and the systems used to process or store it.
As the volume of cyber-attacks grows, companies and organizations, especially those that deal information related to national security, health, or financial records, need to take steps to protect their sensitive business and personal information.
The objective of Cybersecurity is to protect information from being stolen, compromised or hijacking
And so The problem here is Where are we now..
Nowadays, viruses are more deadlier, more invasive, and harder to control. We have already experienced cyber incidents from cyber criminals, and following the recent arrest of the popular Nigeria Yahoo boy Ramon Olorunwa Abbas popularly known as Ray hushpuppi who boasted online about his lavish lifestyle of private jets, designer clothes and luxury cars has been busted in a $431 million cyber scam.
hushpuppi was noted by creating fake websites for well-known companies and banks in a bid to steal credit card information and then launder the stolen money.
and also for being the leader of a transnational network that allegedly conspired to launder hundreds of millions of dollars through email scams and other schemes, some of which targeted a New York law firm, a foreign bank and an English Premier League soccer club.
this is something seriously alarming to all internet media influencer. So how do we keep ourselves safe from Cyber crimes online..
You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. But it may not be so simple. There are far more concerns in Cyber crimes, and If so, have you ever heard about the following cyber crimes attack:
web-base attack
Denial of service(DOS)
Social engineering
phishing or fake messenger
Cookies stealer
DNS poisoning or pharming
USB hacking
session hijacking, and
System base Attacks.These are common cyber crimes attacks that happens daily in our world..
Now to let me provide clearity on few of those cyber crimes attacks that I have listed above.
1. Web-based attacks
These are the attacks which occur on a website or web applications.this attack occur mainly when criminals take advantage of vulnerabilities in coding to gain access to a server or database, these types of cyber vandalism threats are known as application layer attacks. Users trust that the sensitive personal information they divulge on your website will be kept private and safe.
2. DNS Spoofing, or poisoning..
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.
3. USB hacking :Hackers can also use USB drives to gain access to sensitive information kept on a computer or network. Hackers may infect one or more USB drives with a virus or Trojan, that when run, will provide hackers with full access to logins, passwords, and information on an individual computer or the network the computer is connected to. that's why its important to disabled all your ports from your computer, Or Avoid plugging any USB into your computer that you donโt personally own. Friends, associates or anyone else that might want to transfer files to your computer via USB drive should be encouraged to use Google Drive, Dropbox or other cloud-based file-sharing services.
4. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data.
5. Phishing.
A common one currently,is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
Like for example:
Most phishing attacks are sent by email.The crook will register a fake domain that mimics a genuine organisation and sends thousands out thousands of generic requests.
And more besides There are two other, more sophisticated, types of phishing involving email. The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim:
Their name;
Place of employment;
Job title;
Email address; and
Specific information about their job role..
And for the past year's in Information technology, I have seen lot of young people in our country been ignorant to cyber crimes like phishing Attack, through their mobile phone, and this is what we called mobile phone hacking..
That's why most people social media accounts are been hack due to this attack, and they are not aware of any
6. Denial of Service or DOS
It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server..
System-based attacks
These are the attacks which are intended to compromise a computer or a computer network. Some of the important system-based attacks are as follows-
A.) Virus
It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.
B.) Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.
C.) Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.
D.) Backdoors
It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.
E.) Bots
A bot (short for robot) is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.
So what's the solution to becoming safe from online cyber attacks.
Here are the following ways you can protect yourself from Cyber crimes attack..
#1.) Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it.
#2.) Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.
#3.) Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don't ask for personal information via pop-up screens.
#4.) Install a phishing filter on your email application and also on your web browser. These filters will not keep out all phishing messages, but they will reduce the number of phishing attempts.
#5.) Delete suspicious email and do not click, and Never provide your personal Information, but make sure to Check the correctness of email addresses in your box.
#6.) Use Antivirus softwar, and always Install an Anti-Phishing Toolbar, with the Use of Web Application Firewall, and Data Encryption..
#7.) Make sure your security software is current, and update it regularly, and Go offline when you donโt need an internet connection.
Note: Keeping your account safe keeps you in control, which means that no one else can damage your image or asset.Imagine that your account was hacked. They may be looking to steal information from you.Or, they could use it to make damaging posts from your social media account..
Therefore be aware of Cyber crimes, and protect yourself now..
Follow link....
https://about.me/antoinetounkara
..
Videos (show all)
Category
Contact the business
Telephone
Website
Address
Skd Complex
Monrovia
50101
GARDNERSVILLE
Monrovia, 1000
Coalition of Youth and Student for Better Liberia is Civil Society grouping in promoting the PAPD and helping the mole the minds of youths through Education.
Chicken Soup Factory N.T.A. Community
Monrovia
This is a youth organization that bring Young people together
Monrovia, 1000
Youth Elections Dialogue is movement of young people in Liberia to ensure civility in Liberia electoral Process.
POINT FOUR JUNCTION, BEHIND NEW GT BANK, BUSHROD ISLAND
Monrovia, 231
Christ Conquerors Youth Ministry, is a youth ministry of the Soul Winning church of God Liberia Inc.
Lynch Street, Monrovia, Liberia
Monrovia
Youth Initiatives of the IGF are created to encourage and involve young people in a substantive discussion on Internet governance.
Weaver Street
Monrovia
The Effort Baptist Church Youth Ministry is a Ministry within Effort Baptist Church Liberia