Hosting Technology

Fancy Hosting Your Website From Your Mobile Phone? Here’s How…

How would you like to host your websites from your mobile phones or tablets? Preposterous? No, actually, it is quite doable and in very few steps too.

In this example, we will be setting up a WordPress website/blog on an android device.

PS: Your Android device does not have to be rooted to carry out these tasks.

servers ultimateQuick Steps

  • You will need a PC to work from to make the setup process easier.
  • Your android phone and the PC must be connected to the same WiFi – same LAN.  (Note that the WiFi need not be Internet enabled.)
  • However, you will need to find a way to download and install the trial version of Servers Ultimate to your Phone from Google Play Store. There is a Pro version you can buy if you decide you like the app. You will also need to download and install Servers Ultimate Packs A to E from the same link.

Create the Servers

  • Go to and download the WordPress web software to your PC. Extract the archived files to a single folder on your PC. Copy this folder, preferably, to the root of your device SD Card
  • Start the Servers Ultimate app on your device, click on the “+” sign on the top right of your screen
  • Select “MySQL server”
  • Give the server a name and save it. Named mine “wp_mysql” (without the quotes, of course)
  • Again, click on the “+” sign on the top right of your screen
  • Select “PHP and Lighttpd Server”
  • Give the server a name. Named mine WordPress. Do not exit the screen just yet!

Configure the services

  • Select the next tab labelled “Specific”
  • Look under “Servers”, ensure the options “Enable Lighttpd Server” and “Enable PHP Server” are checked.
  • Scroll down and look under “Document Root”. Browse to the WordPress folder on your phone and select it.
  • Under “Server Tag”, you may enable all the options, especially “Enable PHPMyadmin”
  • Now press save. The screen will exit.
  • From the Server Ultimate default screen, click the start icon to start the two servers, “WordPress” and “wp_mysql”
  • Now right-click on the server labelled WordPress. From the context menu, select Information. Note the IP address that has been assigned to it. It will be in the form

Create Database

  • Go to the following URL
  • Log in with the following credentials; Username is “root”. Leave the password blank
  • Click on the “Databases” at the top left of the screen
  • Enter “wordpress_db” in the Create Database field and tap Create

Final Installation

  • Type the following URL in your browser to start the WordPress installation;
  • When prompted fill in wordpress_db in the Database Name field
  • Fill in root in the User Name field
  • Leave the password field blank
  • On the Welcome Page, fill in the details requested for, then click Install WordPress. On completion, you will be taken to the admin page of your website.
  • To view the front end, your type the IP address to your browser.

As it is, you can only view your site from within your LAN. In the next part of this post, we would go through the paces on how to access your new site from anywhere on the Internet.


Using Gmail’s 2- Factor Authentication In Nigeria

Wikipedia defines Two-step verification (also known as Two-factor authentication, abbreviated to TFA) as a process involving two stages to verify the identity of an entity trying to access services in a computer or in a network.

For Gmail, what this means is that even if your password is compromised, no one can have access to your mails unless they also 2f1have access to your mobile line. Unless you add your laptop as a trusted device, everytime you log into your email account over the web, you will be required to also input a one-time code before gaining access to your mails.

Nice, isn’t it.

For Nigerians, the bad part. Curiously, Gmail does not support Nigerian mobile lines at all.

Fortunately, there is a way around this. Simply put, all you need do is get a valid US number that you can receive SMS on.

And How do you get this?

Heywire is the maker of a free consumer text messaging app available on Android, iOS and Windows Phone, with millions of users. It is also available on your PC using your browser. They give you a real US mobile number for free with which you can text or receive SMS from any mobile messaging service. The person you are texting or receiving SMS from DOES NOT need to have a HeyWire account, you can text them directly to their normal phone.

  • The app allows you to send free texts messages to mobile phones in 45 countries over WiFi or 3G – Excluding Nigeria of course.
  • However, you can receive text messages from any mobile line or bulk messaging services.
  • Text FREE from the Web: Go to, login with your HeyWire number
  • 1 HeyWire account across all your devices — iPhone, iPod Touch, iPad & Computer
  • Text using Wi-Fi, 3G, 4G, or LTE.

With this app, you can configure the 2-Step Verification for your Gmail account using your Heywire US number to receive your code.


Hosting Technology

Free Business Class Email Addresses For Your Personal Domains

Zoho_logoMicrosoft recently ended free email service support for custom domains, the mainstay for many Small and Medium Business Enterprises. Google buried Google Apps free edition, a similar business email application back in December 2012. So with Microsoft and Google having turned their backs, what option remains for these SMEs?


Zoho recently announced its offer of free business class email hosting open to individuals and businesses. Under this email hosting plan, business owners can start hosting their emails, along with their custom domains, at no cost and without any advertisements to distract them.

This free offer is subject to a limit of 10 mailboxes per domain. However, business owners can extend the free user limit to 25 users by simply referring other customers to Zoho Mail. The two-way referral incentive program also benefits the new Zoho Mail user by providing them an additional five bonus free user accounts.

“Free email and ad-free email historically haven’t gone together. This changes with Zoho Mail,” said Raju Vegesna, Zoho evangelist. “At a time when companies — including the ones with deep pockets — have ended the support of free email service for businesses, we found it even more important to stick to our guns and extend the coverage of our free email plan. There is no catch or fine print here. When we say free and ad-free, we really mean it. At Zoho, we are committed to helping entrepreneurs and small businesses get started by providing an email solution that will grow with them as they expand their business.”

Zoho Mail: Hosted Email for Businesses

Zoho Mail is a powerful email hosting service that caters to businesses of all sizes yet is simple to set up and manage. It respects the privacy of business users and offers a feature rich, secure email solution.

Integrated Suite – The Zoho Mail Suite comes pre-integrated with complementary applications such as Calendar, Contacts, Tasks, Notes and Chat, providing a comprehensive suite of applications for businesses. The suite also includes Zoho Docs, a powerful document management system with an integrated office suite that also syncs a user’s documents across devices.

Privacy and Security – Not in the business of serving ads, all of Zoho’s online application plans — including the free plan — are completely ad-free. Users’ activity is never tracked and emails are not scanned to serve ads, thereby respecting our users’ data and privacy. Zoho Mail also includes anti-spam and anti-virus features, offering these built-in safeguards within the application. With an option to enable two-factor authentication, users can further secure their access to the system with their mobile phones.

Mobile – Emails hosted on Zoho Mail can be accessed through email apps from any mobile device using standard protocols like IMAP and POP. Zoho Mail also supports Microsoft Exchange ActiveSync for push email. Alternatively, users can manage their email through smartphone- and tablet-optimized web apps from their mobile devices.

Pricing and Availability

Businesses can sign up and subscribe to Zoho Mail Free, Standard or Premium editions at


Bank App Users Warned Over Android Security

Mobile banking on Android smartphones could put consumers at risk of fraud and cost banks millions.

An IT security company, MWR Labs, investigated the security standards of Android mobile phone brands to determine the overall exposure to risk of consumers who use mobile banking. It said that its results indicated that on some handsets as many as 64 per cent of manufacturer added applications were exposing users to serious security issues.

Mobile-moneyThe company looked at six classes of potential vulnerabilities in apps and packages in the leading brands and mobile phones using a modified version of Mercury, its security testing framework, to automatically scan the devices and identify security weaknesses.

The research discovered security vulnerabilities in software added by phone manufacturers or network providers which could be targeted by a malicious application inadvertently downloaded by the user. These weak apps often have more permissions that allow them to access contacts, make telephone calls and even record the content of those calls, meaning that the potential consequences are serious and sensitive data could be compromised. Other applications were found that allowed further apps to be installed with an arbitrary set of permissions, essentially leaving consumers fully exposed to fraud.

“We found that while banking apps were generally well written and had very few security issues, the integrity of consumer phones was often compromised by software provided by the phone manufacturer or additional software added by the network provider, exposing online banking customers to potential fraud,” said MWR’s managing director Harry Grobbelaar.

“Some of the leading Android handset manufacturers are already looking at shipping mobile devices with native near-field communication (NFC) payment functionalities but if the software in the phones is not secure, the risk will then be even higher,” he said.

He said that as more businesses use smartphones as mobile point-of-sale devices, these devices will become critical in the payment chain and if not adequately protected could “introduce additional risks for card fraud that could cost banks millions a year.”

Grobbelaar added that there were many examples of malicious apps sending premium rate text messages and expected there will be a “natural progression” to higher value areas such as payments and banking.

This article was first published on ITPro


Watching porn is bad for your smartphone

We’re not making any moral judgments here. But it is definitively a bad idea to visit pornography sites on your smartphone or tablet.

Nearly one-quarter of malware on mobile devices comes from porn websites, according to a new study from Blue Coat, a Web security and optimization company.

 Mobile users don’t check out porn sites often — less than 1% of all mobile traffic is pornography. But when they do go to those sites, the risk of inadvertently downloading malware to their devices increases three-fold. That makes watching porn on smartphones a far bigger threat than viewing porn on a PC.

Porn led to more malware on smartphones and tablets than e-mail spam, malicious websites, and fake apps combined.

Part of the problem, Blue Coat said, is that the nature of mobile devices makes differentiating legitimate sites from malicious ones a tricky task. There is no way to hover over shortened URLs to reveal their true destination, for example.

“No matter how tantalizing a link might look on a desktop, there are cues that you shouldn’t go there, such as an address that just doesn’t look safe,” said Hugh Thompson, chief security strategist for Blue Coat. “When you click a link on a mobile phone, it’s harder to know what form of Russian roulette they’re playing.”

Porn is a leading traffic driver on the Internet, and for many years, porn sites had been a primary source of malware on PCs as well.

“When you delve into the world of online pornography, you don’t often know where you are, or where the content is coming from,” said Thompson. “But when you’re visiting those sites, you are more inclined to make riskier choices than elsewhere on the Web.”

But cyberattackers are increasingly finding new ways to target an even larger audience, including phishing, uploading malicious advertisements and poisoning search engine results.

Security experts predict that broader-based cybercrime schemes are likely to appear on smartphones and tablets soon. For now though, mobile attacks appear to be mirroring techniques used on traditional computers.

Still, major security firms have widely predicted that this will be the year mobile devices will finally emerge as a major target for cybercriminals. Smartphones have become personal computers that travel around with us at all times, and the vast majority of users don’t even lock them with a password.

Cyberthieves continue to make so much money attacking Windows PCs that there hasn’t been much incentive to change tactics. But we’re about to hit a tipping point. Most people still do their online banking and shopping on their PCs, but those transactions are happening on mobile phones more frequently.

According to research from Juniper Networks (JNPR), 300 million smartphones around the world will be equipped with the near-field communications (NFC) chips needed for mobile payments this year. Juniper also predicts global NFC transactions will total nearly $50 billion.



Airtel Nigeria completes LTE trial In Lagos?

airtelNews coming in suggests that Airtel Nigeria has successfully completed LTE trials in Lagos. Long Term Evolution (LTE), widely accepted as the true 4G, is a standard for wireless communication of high-speed data for mobile phones and data terminals.

Download speed, under ideal conditions was 37 Megabits per Second (Mbps), while under non ideal conditions, was 32 Mbps; Upload speed was – 10.6 Mbps.

Many in Nigeria take such news from our mobile networks with a pinch of salt. I have always had a problem with Nigerian mobile networks and their quest to be seen as pioneers of latest telecommunication technologies in the country. Most times, it comes at a big cost to subscribers. The funny thing is, these networks can not even boast of successfully deploying 3G services to all parts of the country. Worst still, locations that boasts of 3G services have very epileptic services at best.

At the moment, the Nigerian Communication Commission (NCC), the regulatory body for the telecommunication sector in Nigeria decided to place a ban on all promos and lotteries in the Telecoms industry in a bid to improve the quality of the offerings from these networks by curtailing their excessive drive to increase their customer base. However, the ban appears to have created little impact, as service quality remain poor across networks, five weeks after the ban.

As it is, we can only watch and pray for improved services because as with most things in Nigeria, the customers have very little say.


Perception Is Reality

In financial circles, there is something called the “true interest rate”. This is the actual interest rate charged by your bank or financial institution  – as opposed to the interest rate you perceive you are being charged – which is, often, far removed from reality.

Mobile phones are getting bigger. It is rare for a high end mobile phone to have a screen size less that 3.5″ these days. The iPhone 5 comes to mind as one of the few high end phones with such a tiny screen size. Lots of these devices have crossed the 4-inch diagonal over into the 5-inch+ territory.

The idea of this “bigger is better mindset” smartphones is that they furnish us with a more satisfying user experience. Browsing, watching videos and reading documents are enjoyable in the same proportion as the size of the screen.

For a device meant to slip into the trouser pocket, or lift to the ears to make and receive calls, there is a conflict as regards how big that phone should be. Beyond a certain size, it may be difficult, inconvenient or ridiculous, to use.

What is the REAL screen size?

Of course, screen size is the length of the diagonal of the screen.

But, wait!

This is where our perception can be our reality.

Let us take a 3.7″ smartphone. By today’s standards, this is a medium sized phone. While lusting after that giant screened 4.5″ Lg Optimus L7 phone, we may already have in that 3.7″ phone, a phone that gives us close to the same experience as the 4.5″ incher!


By making more use of the landscape mode – more.

Supposing our 3.7″ diagonal screen gives us 3.2″ (length)’ by 2.7″ (breadth). Using the phone is a landscape mode effectively gives us a reversal in dimension : a 3.2″ (width) by a 2.7″ (length).

When we use our phone in landscape mode, we are able to see more when:

Browsing – There is little or no need to pan left and right
Reading eBooks – Our eyes work far less because there are more words accommodated per line
Watching video – the modern practice now is to display video clips in the landscape format, even on television sets.

In effect, due to modern smartphones having screen rotational facility, we have a phone that is small when we need it to be (portrait – making / receiving a call), and BIG whenever occasion demands it (e-reading, browsing, videos).

Auto rotation is a nuisance!

There are some inconveniences associated with landscaping

1)    When a mobile device has its auto rotate mode set, it uses its accelerometer sensor, to detect the way the device is held, and adjusts the display contents accordingly. It thus consumes more power, depleting the battery faster than if auto rotate is disabled.

2)    While lying in a supine position on the bed, and occasionally tossing and turning about, that phone being held tends to flip flop between landscape and portrait orientation.

A rotation lock software to the rescue.

What we need is a means of locking the screen in a particular orientation (in this case – landscape)

An app that can do that will also be beneficial when using a tablet as well. While reading your bible, you do not want your display switching orientation while you aim a deadly swipe at that annoying mosquito that will not leave you in peace!

On the Android system, I use a third party Android app called Display Orientator to lock the phone orientation to landscape when I need to browse, read an eBook, or watch that occasional video clip.

The app can lock the display into either portrait or landscape. Hold in your preferred mode. Tap. Done. Sweet!

That way, I avoid the headaches highlighted in Points 1 and 2 above.

In conclusion, I have tried to highlight how I get to enjoy the benefits of a bigger screened smartphone, while sticking to a physically smaller dimensioned one.

It is all about our “orientation”, where our perception is often more important than the reality!

Before we rush out to buy that giant screened monster, let us examine our realities, and see if we need to change our perception – instead!

Articles Gadgets

Mobile Phone Radiations – How Safe Are We?

Scaremongering could be a cardinal sin. Sure. But this is a controversy that has raged on for so long.

Despite many claims and counter claims , there is no conclusive position by the guys who should know – The Radiologists, Doctors, etc. Mobile phone manufacturers would flaunt the Specific Absorption Rate (SAR) value in your face, claiming their mobile phone’s radiation is well below the prescribed safety limit. I would not even want to talk about the grey market Chinese phones that have nothing on their sales package about this. Patronizing such products could just be similar to playing with one’s health.

There are two issues here – one, the veracity of the figure they put on their package, and two, how much the SAR figure they are touting matters.

My take is this – whenever there is doubt, be on the safe side. We now know smoking is dangerous to your health. A person that has been smoking since his teenage years and lived to a ripe old age may disagree with this assertion.

However, it is better to be safe than to be sorry. Whatever can be done to reduce the radiation level of any electrical or electronic equipment should be encouraged.

It is not mobile phones alone that emit radiation. And it is not just the brain that MAY be affected.

If you use your laptop for extended periods, you could be exposing your gonads to radiation or heat. How about those dirt cheap tablets? Is anybody checking them, since these are also devices designed to be with us almost permanently.

You make use of headsets?. Why – are they not operating on radio frequencies too? Your microwave oven, living under telecommunication masts,  or high tension electricity cables are verifiable sources of radiation. How about those encephalographic X-Rays?

Are you a frequent Flier? What about those scans at Airports? You spend lengthy period in front of a CRT style display unit (Tv, Monitor), etc?

We all respond to irradiative stimuli in different ways. Body constitution, our Medix would tell us. It would seem like commonsense to avoid as many radiation sources as possible. Unfortunately, there are too many sources of potential radiation sources.

A thought – which phones emit more radiation? GSM or CDMA?

The Way Forward

A good place to start would be to minimize calls on our mobile phones (use Instant Messages, sms, e-mail where possible).

To minimize call duration, there are applications on the different mobile_OS platforms that automatically disconnect a call after the specified duration.  For Symbian, there is “Auto HangUp by Igor Dontsov” for Symbian^1 and Symbian^3.

The highest level of radiation is when a call is being initiated. We could also use an app that vibrates the phone when a call connects. This eliminates the need to put the phone to the head when making calls.

We may also make more use of those speakerphones.

What about you? How do you minimize your level of exposure to possible radiation from different devices / sources – particularly mobile?

(* this post was inspired by a recent article by DeolaDoctor *)


The Death Of The Smartphone

Smartphones and tablets might be the current hot technology, but history says it’s all just another fad. Twenty years from now, almost nobody will own either device. Seems unbelievable, but the same technology that makes them hot today will make them not tomorrow. If this sounds ridiculous, consider what happened to another “must-have” technology that almost nobody uses any more: the fax machine.

Back in 1991, the Baby Bells were predicting an explosion of landlines and a corresponding shortage of phone numbers because “everyone will need a fax machine.” Phone companies offered to lease fax machines for “only (US)$60 a month on a three-year contract.” (Sound familiar?) Newspapers were offering early faxes of their main stories to subscribers for a buck a day. Every office supply store had shelf after shelf of fax machines for home and office use.

All those dreams got trashed by the Internet and cheap computers. Email attachments killed the fax machine boom. Today a fax “machine” is a $1 chip in a laptop, and like the modem chip, nobody even bothers to configure it. Faxing the newspaper? Newspapers are dropping like old news, and paywalls are mostly money-losers. Even those cries of “mom, we need a second line for the Internet” are just a dim memory. Instead of two, three or four landlines, many homes now have none. Indeed, many existing “landlines” are actually VoIP phones.

Holding On for Dear Life

The problem facing the telcos is that they’re in the phone business, not the “find the best way for people to communicate and give it to them at a competitive price” business. Their product is access to the telephone network. Worse, their entire business model hinges on an archaism — the 10-digit phone number monopoly. People increasingly don’t use phone numbers to contact each other, and the telcos are at risk of becoming just another data pipe for when you’re not near a WiFi connection.

Fax machines are just one of many examples of the future not turning out the way the telcos envisioned it. “Sure-thing” premium services like video calling never saw beyond limited use — too expensive, and people were not willing to shell out $600 for a videophone, plus the extra monthly charges — not when there was almost nobody to talk to on the phone network. Now it’s too late. You can have your “videophone of the future” experience via Skype, Google Talk or Google+ Hangouts at no extra charge.

Also dying is the business model of locking customers into long-term contracts by financing expensive mobile phones. Unlocked Android smartphones are going for less than $200 with no contract, and LG makes a nice $60 flip-phone.

Rise of the Smart Network

Today the same technology that lets phone companies move voice calls cheaply over the Internet also directly competes with them. What keeps phone subscribers on the hook are inertia (the “phone number” habit), lower prices, and increasing services — all of which explain why I’m paying less for a phone with unlimited calling across the country today than I was for local service 20 years ago.

The clock is ticking … and IPv6 will be the second-to-last step in our journey to a phone-free future, where every device has its own unique “phone number” and the network has enough smarts to locate you wherever you are, routing all communications to the nearest device, whether it’s a TV, car, public security camera, or the active display on the shopping cart at the mall.

Smartphones and Tablets in 2031?

Let’s go 20 years in the future. Pretty much every electronic device can interact with your video SPEKZ, which can be anything from a pair of plain-jane NokiaSofts to the latest cool shades from Apple. Cars, streetlight surveillance cams, water meters, televisions, and even your clock radio are all talking to each other — and your SPEKZ are piggybacking on their data streams. There’s not a single laptop, desktop, smartphone or tablet computer in sight.

It’s an amazingly seamless experience. The tiny twin cams on your SPEKZ let you share what you see with your friends and stream a copy to your home server. Your watch and charm bracelet contain sensors to detect your wrist movements and the muscles and tendons of your fingers flexing, all descended from Nintendo WiiMote technology.

Of course, since most men would be about as likely to wear a charm bracelet as they would a pink shirt (some things haven’t changed), they can also sub-vocalize emails and use eye-tracking technology to make selections “just like a fighter pilot!” You type on your SPEKZ virtual keypad and pick from menus and icons floating in 3D before your eyes.

Passwords? “What’s a password, mom?” Instead, your watchface contains a small camera that does both facial and fingerprint identification as well as other biometrics, and your SPEKZ do retinal, iris and voice ID.

It’s a safer, more polite world. The latest Amber Alert system allows people to opt in to automatically search the last few minutes of their SPEKZ data stream against a possible match. Road rage is also much less frequent, and not only because most cars are driving themselves. People even stoop and scoop because other fed-up dog owners forward SPEKZ videos of the culprits caught in the act to the city and post them on the Net.

SPEKZ systems are also saving lives. Before SPEKZ, 20 percent of all heart attacks went undetected. Now, biometric watchbands and ubiquitous WiFi detect heart attacks, heat strokes and hypothermia earlier, and your SPEKZ alert medical services even when you can’t.

How Do We Get From Here to There?

The telcos and ISPs will continue to try to oppose ubiquitous free WiFi mesh networks, just like they’re dragging their feet on implementing IPv6, but competition and public safety concerns will trump their increasingly weakened lobby.

With both phones and their phone network monopolies long gone, carriers will have to settle for being sellers of wireless bandwidth in areas without regular WiFi coverage, and operators of commodity infrastructure.

Source – Linux Insider

– Posted using BlogPress from my iPad


Computer Networking

One aspect of computer technology that i have been most fascinated about is Networking. At one time or the other most of us would have come across application of basic or obvious forms of networking, say, connection of multiple computers to a single printer or sharing of a single internet access among different computers.

NetworkingIn basic terms, we could say Networking is the joining of two or more devices to share (limited) resources. Note the use of DEVICES in this definition and not COMPUTERS. A device represents ANY electronic appliance with networking capabilities. These devices include your computers (Linux, Mac, Windows), mobile phones, tablets, surveillance equipment, etc.

Connection of these devices to a network can either be via wired or wireless medium or a mix of the two.

Over the course of the next few weeks, we would delve into the world of networking, learning some basic principles, but most especially, applying such principles to our homes and home/small offices. As usual, our write-ups would be devoid of unnecessary technicalities. It would be presented in an easily understandable, do-it-yourself format.

If you are keen on networking your homes or offices, the following hardware/equipment are important;

Router – This is the most important and the only item you may need. In basic terms, it is referred to as a Router but in reality, they are usually a combination of what is called a switch and a router. They are mostly affordable. The brand that comes highly recommended is the Belkin Wireless N+ 802.11n Router. At only $59.99 (About N7,000.00), you would be killing two birds with a single stone. You get to have a router capable of wired and wireless networking. And as a bonus, you get to have a port on the router that has the capability of sharing your portable drive on the network.

Internet Modem – Some of our discussions would require you to have an internet access to fully participate. I would recommend using the internet modem provided by IPNX. It is relatively fast and best suited for a networking environment.

Please stay tuned!