ร€ntรณIร‘ฤ’ Tร–รšร‘KรƒRร…

ร€ntรณIร‘ฤ’ Tร–รšร‘KรƒRร…

Comments

AIRTIME GIVE AWAY

MTN
GLO
AIRTEL
9MOBILE
Vodafone
Vodacom

DROP YOUR NETWORK/NUMBER FOR THE LINK
I THANK MY GOD FOR LIFE.
Boost your page son for more likes.
Happy pre birthday CEO Mr . Antonio
Hi my boss man
sโ€™il vous plaรฎt lire attentivement et de voter pour notre Miss en lโ€™honneur dโ€™รฉlever notre prรฉcieux drapeauplease read this carefully and vote for our Miss in honor to raise our precious flag. she is in charge of the world Guineans
It's a pleasure been the assistant manager at this page. Loyalty to my boss
Mon neveu cheri, a toi toute ma gratitude!

๐€๐ง๐ญ๐จ๐ข๐ง๐ž ๐“๐จ๐ฎ๐ง๐ค๐š๐ซ๐š is a social Activist,Technologist, a m his interest range from technology to writing. A socialite, whose currently a fan of Fc .Barcelona

A social Activist, Freelance writer, tech enthusiast,Christian, and public speaker currently living in Monrovia, Liberia. he is an innovative activist,whose interest range from entrepreneurship, photography,and technology.it has always been his Quest to see the world at a better place..he is currently working on the project of women winning foundation,a non governmental organisation that seek to

31/12/2021

Poem title: The legend of Kunta kinte

My name is Kunta
I hailed from the Gambian Tribe Of
Bufferee

born fearless from the clan of Africa..
I became a gallant son, and warrior capture by the imperialist

With resilient I was brutal, and scars with iron because of my origin..

My name is Kunta and I'm beating mercilessly because I refused to be called Toby.

I am a black warrior fighting for my freedom,
Working for the oppressor and forcefully denied out of freedom

I am born out of grieve, my pain is equal to my freedom

I am Kunta kinte, fighting to return to my root..

I never forget about the mandinka people of the kinte clan

Long walk to my freedom
Oh the return to my sweet homeland,

Eventually I will never stop paying the price of freedom,

Challenging the ego of all blacks to long desire of freedom.

I seek the truth, thinking like a stranger giving me the pleasure
For truth
And I prefer the irony of truth than that of illusion

Preferring our lives free with the pay of slavery, for the Casualties of abnormal pain of slavery .

My Generation will follow my legacy because

I am Kunta Kinte, the legend of the Kinte clan..

ยฉ Splendious_Antonio

24/12/2021

What happened to Christmas Eve.. Check below ๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡
https://youtu.be/k-7KJbGDsnY

25/07/2021
09/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
05/07/2021
30/05/2021

Happy Sunday..

27/02/2021

๐—ฃ๐—ผ๐—ฒ๐—บ ๐—ง๐—ถ๐˜๐—น๐—ฒ: ๐“๐ก๐ž ๐ฉ๐จ๐ฐ๐ž๐ซ ๐Ÿ…ž๐Ÿ…• ๐๐ฅ๐š๐œ๐ค ๐ฐ๐จ๐ฆ๐š๐ง.

๐ˆ ๐š๐ฆ ๐›๐ฅ๐š๐œ๐ค ๐š๐ง๐ ๐›๐ž๐š๐ฎ๐ญ๐ข๐Ÿ๐ฎ๐ฅ

๐‘ฉ๐’†๐’„๐’‚๐’–๐’”๐’†
๐‘ฐ ๐’‘๐’๐’”๐’”๐’†๐’”๐’” ๐’•๐’‰๐’† ๐’‘๐’๐’˜๐’†๐’“ ๐’๐’‡ ๐‘จ๐’–๐’•๐’‰๐’๐’“๐’Š๐’•๐’š, ๐’‚๐’๐’… ๐‘ช๐’๐’๐’‡๐’Š๐’…๐’†๐’๐’„๐’†.

๐‘ด๐’š ๐’˜๐’๐’“๐’•๐’‰ ๐’Š๐’” ๐’๐’๐’• ๐’Š๐’ ๐’•๐’‰๐’† ๐’‘๐’“๐’†๐’•๐’†๐’๐’”๐’† ๐’๐’‡ ๐’Ž๐’‚๐’Œ๐’†๐’–๐’‘, ๐’Š'๐’Ž ๐’๐’‚๐’•๐’–๐’“๐’‚๐’๐’๐’š ๐’…๐’‚๐’“๐’Œ ๐’‚๐’๐’… ๐’ƒ๐’†๐’‚๐’–๐’•๐’Š๐’‡๐’–๐’.
๐‘ด๐’š ๐’Ž๐’Š๐’ˆ๐’‰๐’•, ๐’๐’Š๐’†๐’” ๐’Š๐’ ๐’Ž๐’š ๐’ƒ๐’๐’‚๐’„๐’Œ ๐‘ท๐’‚๐’๐’•๐’‰๐’†๐’“ ๐’”๐’•๐’“๐’†๐’๐’ˆ๐’•๐’‰, ๐’‚๐’๐’… ๐’”๐’‰๐’Š๐’๐’Š๐’๐’ˆ ๐’…๐’‚๐’“๐’Œ ๐’”๐’Œ๐’Š๐’.

๐‘ฐ ๐’ˆ๐’ ๐’ƒ๐’†๐’š๐’๐’๐’… ๐’Ž๐’š ๐’๐’Š๐’Ž๐’Š๐’• ๐’Š๐’ ๐’๐’Š๐’‡๐’†
๐‘ฐ ๐’‚๐’Ž ๐’”๐’•๐’“๐’๐’๐’ˆ ๐’‡๐’“๐’๐’Ž ๐’Š๐’๐’”๐’Š๐’…๐’† ๐‘จ๐’๐’… ๐’”๐’‚๐’„๐’“๐’Š๐’‡๐’Š๐’„๐’†๐’” ๐’‡๐’๐’“ ๐’•๐’‰๐’‚๐’• ๐’๐’๐’† ๐’”๐’Ž๐’Š๐’๐’†,
๐‘พ๐’Š๐’•๐’‰๐’๐’–๐’• ๐’‚ ๐’‰๐’Š๐’๐’•

๐‘ฐ ๐’‚๐’Ž ๐’๐’๐’• ๐’‚๐’”๐’‰๐’‚๐’Ž๐’†๐’… ๐’๐’‡ ๐’Ž๐’š ๐’„๐’๐’๐’๐’“.

๐‘ฐ ๐’‚๐’Ž ๐’๐’๐’—๐’† ๐’๐’‚๐’•๐’–๐’“๐’‚๐’๐’๐’š ๐’ƒ๐’š ๐’•๐’‰๐’† ๐’˜๐’๐’“๐’๐’…. ๐‘ฉ๐’†๐’„๐’‚๐’–๐’”๐’† ๐‘ฐ'๐’Ž ๐’•๐’‰๐’† ๐’Ž๐’๐’”๐’• ๐’ƒ๐’†๐’‚๐’–๐’•๐’Š๐’‡๐’–๐’, ๐’‚๐’๐’… ๐’•๐’‰๐’† ๐’„๐’‚๐’–๐’”๐’† ๐’Š๐’” ๐’ƒ๐’†๐’„๐’‚๐’–๐’”๐’† ๐‘ฐ'๐’Ž ๐’‘๐’“๐’†๐’•๐’•๐’š.

๐‘ด๐’š ๐’”๐’Ž๐’Š๐’๐’† ๐’Ž๐’‚๐’Œ๐’† ๐’‰๐’†๐’‚๐’“๐’• ๐’‡๐’†๐’๐’•๐’” ๐‘ฐ ๐’‚๐’Ž ๐’‚ ๐’˜๐’๐’Ž๐’‚๐’ ๐’˜๐’‰๐’ ๐’Š๐’” ๐’”๐’•๐’“๐’๐’๐’ˆ ๐’†๐’๐’๐’–๐’ˆ๐’‰ ๐’•๐’ ๐’‡๐’‚๐’„๐’† ๐’๐’Š๐’‡๐’†.

๐‘จ ๐’˜๐’๐’Ž๐’‚๐’ ๐’˜๐’‰๐’ ๐’„๐’‚๐’ ๐’ˆ๐’ ๐’ƒ๐’†๐’‰๐’Š๐’๐’… ๐’‰๐’†๐’“ ๐’˜๐’Š๐’๐’, ๐’‚๐’๐’˜๐’‚๐’š๐’” ๐’•๐’‰๐’†๐’“๐’† ๐’‡๐’๐’“ ๐’‘๐’†๐’๐’‘๐’๐’† ๐’•๐’‰๐’‚๐’• ๐’„๐’‰๐’†๐’“๐’Š๐’”๐’‰ ๐’Ž๐’š ๐’…๐’‚๐’“๐’Œ ๐’„๐’๐’๐’๐’“.

๐‘จ ๐’˜๐’๐’Ž๐’‚๐’ ๐’˜๐’Š๐’•๐’‰ ๐’”๐’–๐’‘๐’“๐’†๐’Ž๐’† ๐’‘๐’๐’˜๐’†๐’“ ๐‘น๐’†๐’‚๐’…๐’š ๐’•๐’ ๐’‡๐’‚๐’„๐’† ๐’‚๐’๐’š๐’•๐’‰๐’Š๐’๐’ˆ ๐’•๐’‰๐’‚๐’• ๐’„๐’๐’Ž๐’†๐’” ๐’‚๐’๐’๐’๐’ˆ,

๐‘จ ๐’˜๐’๐’Ž๐’‚๐’ ๐’“๐’†๐’‚๐’…๐’š ๐’•๐’ ๐’‡๐’Š๐’ˆ๐’‰๐’• ๐’‡๐’๐’“ ๐’๐’Š๐’‡๐’† ๐‘ป๐’Š๐’๐’ ๐’•๐’‰๐’† ๐’†๐’๐’… ๐‘พ๐’Š๐’•๐’‰ ๐’๐’ ๐’Ž๐’†๐’‚๐’๐’” ๐’‚๐’๐’… ๐’‘๐’๐’˜๐’†๐’“ ๐’•๐’ ๐’…๐’†๐’‡๐’†๐’๐’….

๐‘ฐ ๐’‚๐’Ž ๐’๐’๐’• ๐’‚๐’”๐’‰๐’‚๐’Ž๐’†๐’… ๐’๐’‡ ๐’Ž๐’š ๐’„๐’๐’๐’๐’“,
๐‘ฐ ๐’‚๐’Ž ๐’‚ ๐’•๐’“๐’–๐’† ๐’—๐’Š๐’“๐’•๐’–๐’๐’–๐’” ๐’˜๐’๐’Ž๐’‚๐’ ๐’๐’‡ ๐’”๐’–๐’ƒ๐’”๐’•๐’‚๐’๐’„๐’† ,
๐‘จ๐’๐’… ๐’•๐’‰๐’†๐’“๐’† ๐’˜๐’Š๐’๐’ ๐’ƒ๐’† ๐’๐’ ๐’Š๐’Ž๐’‚๐’ˆ๐’Š๐’๐’‚๐’•๐’Š๐’๐’ ๐’๐’‡ ๐’”๐’๐’“๐’•๐’” ๐’‚๐’๐’… ๐’๐’ ๐’…๐’Š๐’”๐’•๐’Š๐’๐’ˆ๐’–๐’Š๐’”๐’‰ ๐’๐’ ๐’Ž๐’š ๐’•๐’‰๐’๐’–๐’ˆ๐’‰๐’•

๐‘ฉ๐’†๐’„๐’‚๐’–๐’”๐’†
๐‘ฐ ๐’˜๐’Š๐’๐’ ๐’‚๐’๐’˜๐’‚๐’š๐’” ๐’”๐’‰๐’Š๐’๐’† ๐’๐’Š๐’Œ๐’† ๐’•๐’‰๐’‚๐’• ๐’ƒ๐’“๐’Š๐’ˆ๐’‰๐’• ๐’”๐’•๐’‚๐’“, ๐’‚๐’„๐’„๐’๐’“๐’…๐’Š๐’๐’ˆ ๐’•๐’ ๐’Ž๐’š ๐’”๐’•๐’“๐’†๐’๐’ˆ๐’•๐’‰ ๐’๐’‡ ๐’„๐’‰๐’‚๐’“๐’‚๐’„๐’•๐’†๐’“ ๐’Š๐’ ๐’๐’Š๐’‡๐’†,

๐‘ฐ ๐’‚๐’Ž ๐’‘๐’๐’˜๐’†๐’“๐’‡๐’–๐’, ๐’”๐’•๐’“๐’๐’๐’ˆ, ๐’‚๐’๐’… ๐’ƒ๐’†๐’‚๐’–๐’•๐’Š๐’‡๐’–๐’. ๐‘จ๐’๐’… ๐‘ฐ ๐’๐’๐’—๐’† ๐’Ž๐’š ๐’‘๐’“๐’Š๐’„๐’†๐’๐’†๐’”๐’” ๐’„๐’๐’๐’๐’“.

๐‘จ ๐’ƒ๐’Š๐’ˆ ๐’”๐’‚๐’๐’–๐’•๐’† ๐’•๐’ ๐’‚๐’๐’ ๐‘ฉ๐’๐’‚๐’„๐’Œ ๐’ƒ๐’†๐’‚๐’–๐’•๐’Š๐’‡๐’–๐’ ๐’˜๐’๐’Ž๐’†๐’ ๐’Š๐’ ๐‘จ๐’‡๐’“๐’Š๐’„๐’‚.

, .


๐—˜-๐—บ๐—ฎ๐—ถ๐—น : ๐—ฆ๐—ฝ๐—น๐—ฒ๐—ป๐—ฑ๐—ถ๐—ผ๐˜‚๐˜€๐—ฎ๐—ป๐˜๐—ผ๐—ป๐—ถ๐—ผ@๐—ด๐—บ๐—ฎ๐—ถ๐—น.๐—ฐ๐—ผ๐—บ

26/01/2021

Stop wasting your time following someone elseโ€™s idea of the ideal life, be The architect of your destiny.. There's hope still, regained those wasted time's.

Your time is way too valuable to be wasting on people that can't accept who you are, create opportunities based on what you believe.over the past years you had no idea of who you are and what you capable of, it is not yet late as hope is still alive.
Realize your plans, and set a goal.. Fight and regained those wasted time's, achieve more by fighting and pushing hard for success..
Be the architect of your destiny today.
..

29/12/2020

A good seed will bear good fruits..

Dreams are the seeds of change. Nothing ever grows without a seed, and nothing ever changes without a dream... We all are like a seed growing up to become fruitful or fruitless..

25/12/2020

...

24/10/2020

Good Afternoon Fans..

12/10/2020
04/10/2020

04/10/2020

Poem Title: Don't loose hope, its not yet over.

I just hope
that you find
a reason to smile
I hope you stay
happy all the while,
Don't lose hope,

No matter what
as things would
change soon,
Trust and Enjoy
the process,
make sure it's sweet,

Workhard with the
straight head till the end
What you want with life
is all up to you,

Don't give up on ur Dreams,
n forget the pain,
If you don't lose hope,
Things will be fine,
Everything will fall into place on time!


..
..
ยฉ antoine_tounkara

Follow me on Writco.... Full link
https://www.writco.in/Poem/P48310042020062247

Photos from ร€ntรณIร‘ฤ’ Tร–รšร‘KรƒRร…'s post 23/09/2020

The Art of perfection...
Adobe Draw...
Portrait of Aford Karnga..
A Pan-africanist.. And emerging Cyber security expert..

23/09/2020

Title : Beware of Cyber crimes online.




We live in a digital era which understands that our private information is more vulnerable than ever before. We all live in a world which is networked together, from internet banking to government infrastructure, where data is stored, and retrieve on computers and other devices. A portion of that data can be sensitive information, whether that be intellectual property, financial data, personal information, or other types of data for which unauthorized access or exposure could have negative consequences.

Cyber-attack is now an international concern and has given many concerns over internet crimes and other security attacks that could endanger the global economy. Organizations transmit sensitive data across networks and to other devices in the course of doing businesses, and cybersecurity describes to protect that information and the systems used to process or store it.

As the volume of cyber-attacks grows, companies and organizations, especially those that deal information related to national security, health, or financial records, need to take steps to protect their sensitive business and personal information.

The objective of Cybersecurity is to protect information from being stolen, compromised or hijacking

And so The problem here is Where are we now..

Nowadays, viruses are more deadlier, more invasive, and harder to control. We have already experienced cyber incidents from cyber criminals, and following the recent arrest of the popular Nigeria Yahoo boy Ramon Olorunwa Abbas popularly known as Ray hushpuppi who boasted online about his lavish lifestyle of private jets, designer clothes and luxury cars has been busted in a $431 million cyber scam.

hushpuppi was noted by creating fake websites for well-known companies and banks in a bid to steal credit card information and then launder the stolen money.

and also for being the leader of a transnational network that allegedly conspired to launder hundreds of millions of dollars through email scams and other schemes, some of which targeted a New York law firm, a foreign bank and an English Premier League soccer club.

this is something seriously alarming to all internet media influencer. So how do we keep ourselves safe from Cyber crimes online..

You might think that the only form of cybercrime you have to worry about is hackers stealing your financial information. But it may not be so simple. There are far more concerns in Cyber crimes, and If so, have you ever heard about the following cyber crimes attack:
web-base attack
Denial of service(DOS)
Social engineering
phishing or fake messenger
Cookies stealer
DNS poisoning or pharming
USB hacking
session hijacking, and
System base Attacks.These are common cyber crimes attacks that happens daily in our world..

Now to let me provide clearity on few of those cyber crimes attacks that I have listed above.

1. Web-based attacks
These are the attacks which occur on a website or web applications.this attack occur mainly when criminals take advantage of vulnerabilities in coding to gain access to a server or database, these types of cyber vandalism threats are known as application layer attacks. Users trust that the sensitive personal information they divulge on your website will be kept private and safe.

2. DNS Spoofing, or poisoning..
DNS Spoofing is a type of computer security hacking. Whereby a data is introduced into a DNS resolver's cache causing the name server to return an incorrect IP address, diverting traffic to the attacker?s computer or any other computer. The DNS spoofing attacks can go on for a long period of time without being detected and can cause serious security issues.

3. USB hacking :Hackers can also use USB drives to gain access to sensitive information kept on a computer or network. Hackers may infect one or more USB drives with a virus or Trojan, that when run, will provide hackers with full access to logins, passwords, and information on an individual computer or the network the computer is connected to. that's why its important to disabled all your ports from your computer, Or Avoid plugging any USB into your computer that you donโ€™t personally own. Friends, associates or anyone else that might want to transfer files to your computer via USB drive should be encouraged to use Google Drive, Dropbox or other cloud-based file-sharing services.

4. Session Hijacking
It is a security attack on a user session over a protected network. Web applications create cookies to store the state and user sessions. By stealing the cookies, an attacker can have access to all of the user data.

5. Phishing.
A common one currently,is a type of attack which attempts to steal sensitive information like user login credentials and credit card number. It occurs when an attacker is masquerading as a trustworthy entity in electronic communication.
Like for example:
Most phishing attacks are sent by email.The crook will register a fake domain that mimics a genuine organisation and sends thousands out thousands of generic requests.
And more besides There are two other, more sophisticated, types of phishing involving email. The first, spear phishing, describes malicious emails sent to a specific person. Criminals who do this will already have some or all of the following information about the victim:

Their name;
Place of employment;
Job title;
Email address; and
Specific information about their job role..

And for the past year's in Information technology, I have seen lot of young people in our country been ignorant to cyber crimes like phishing Attack, through their mobile phone, and this is what we called mobile phone hacking..
That's why most people social media accounts are been hack due to this attack, and they are not aware of any

6. Denial of Service or DOS
It is an attack which meant to make a server or network resource unavailable to the users. It accomplishes this by flooding the target with traffic or sending it information that triggers a crash. It uses the single system and single internet connection to attack a server..

System-based attacks
These are the attacks which are intended to compromise a computer or a computer network. Some of the important system-based attacks are as follows-

A.) Virus
It is a type of malicious software program that spread throughout the computer files without the knowledge of a user. It is a self-replicating malicious computer program that replicates by inserting copies of itself into other computer programs when executed. It can also execute instructions that cause harm to the system.

B.) Worm
It is a type of malware whose primary function is to replicate itself to spread to uninfected computers. It works same as the computer virus. Worms often originate from email attachments that appear to be from trusted senders.

C.) Trojan horse
It is a malicious program that occurs unexpected changes to computer setting and unusual activity, even when the computer should be idle. It misleads the user of its true intent. It appears to be a normal application but when opened/executed some malicious code will run in the background.

D.) Backdoors
It is a method that bypasses the normal authentication process. A developer may create a backdoor so that an application or operating system can be accessed for troubleshooting or other purposes.

E.) Bots
A bot (short for robot) is an automated process that interacts with other network services. Some bots program run automatically, while others only execute commands when they receive specific input. Common examples of bots program are the crawler, chatroom bots, and malicious bots.

So what's the solution to becoming safe from online cyber attacks.

Here are the following ways you can protect yourself from Cyber crimes attack..

#1.) Be cautious about all communications you receive. If it appears to be a phishing communication, do not respond. Delete it.

#2.) Do not click on any links listed in the email message, and do not open any attachments contained in a suspicious email.

#3.) Do not enter personal information in a pop-up screen. Legitimate companies, agencies, and organizations don't ask for personal information via pop-up screens.

#4.) Install a phishing filter on your email application and also on your web browser. These filters will not keep out all phishing messages, but they will reduce the number of phishing attempts.

#5.) Delete suspicious email and do not click, and Never provide your personal Information, but make sure to Check the correctness of email addresses in your box.

#6.) Use Antivirus softwar, and always Install an Anti-Phishing Toolbar, with the Use of Web Application Firewall, and Data Encryption..

#7.) Make sure your security software is current, and update it regularly, and Go offline when you donโ€™t need an internet connection.

Note: Keeping your account safe keeps you in control, which means that no one else can damage your image or asset.Imagine that your account was hacked. They may be looking to steal information from you.Or, they could use it to make damaging posts from your social media account..

Therefore be aware of Cyber crimes, and protect yourself now..

Follow link....
https://about.me/antoinetounkara



..

Videos (show all)

Stop wasting your time following someone elseโ€™s idea of the ideal life, be The architect of your destiny.. There's hope ...
A good seed will bear good fruits..
Title: Happiness + self content is a key to a simple life.
Value of your life...

Telephone

Address


Skd Complex
Monrovia
50101

Other Youth Organizations in Monrovia (show all)
Coalition Of Youth And Student For Better Lliberia Coalition Of Youth And Student For Better Lliberia
GARDNERSVILLE
Monrovia, 1000

Coalition of Youth and Student for Better Liberia is Civil Society grouping in promoting the PAPD and helping the mole the minds of youths through Education.

Dream chaser Dream chaser
Rehab
Monrovia, BROTHER'S ๏ฟฝ ๏ฟฝ

Organization

Determine youth for progressive change Determine youth for progressive change
Chicken Soup Factory N.T.A. Community
Monrovia

This is a youth organization that bring Young people together

FBI official FBI official
Monrovia

Esther's Generation Esther's Generation
Margibi
Monrovia

Spiritual

Youth Elections Dialogue - Liberia Youth Elections Dialogue - Liberia
Monrovia, 1000

Youth Elections Dialogue is movement of young people in Liberia to ensure civility in Liberia electoral Process.

Block Buster Ent Block Buster Ent
Lynch Street
Monrovia

It is a Organization

100% GANG 100% GANG
This Is One Of The Best Organization In Logan Town , And We Stay Need More Membe
Monrovia

Christ Conquerors Youth Ministry Christ Conquerors Youth Ministry
POINT FOUR JUNCTION, BEHIND NEW GT BANK, BUSHROD ISLAND
Monrovia, 231

Christ Conquerors Youth Ministry, is a youth ministry of the Soul Winning church of God Liberia Inc.

IGF Youth Liberia IGF Youth Liberia
Lynch Street, Monrovia, Liberia
Monrovia

Youth Initiatives of the IGF are created to encourage and involve young people in a substantive discussion on Internet governance.

Effort Baptist Church Youth Ministry Effort Baptist Church Youth Ministry
Weaver Street
Monrovia

The Effort Baptist Church Youth Ministry is a Ministry within Effort Baptist Church Liberia