umojannguvu.blogspot.com

Wednesday, 4 November 2015

RAIS KIKWETE AKUTANA NA MAALIM SHARIFF SEIF HAMAD

 Rais Jakaya Kikwete ateta na makamu wa Kwanza  wa Rais  wa Zanzibar Maalim Shariff Seif Hamad kuhusu hali ya kisiasa Visiwani leo  asubuhi  Ikulu jijini dar es SalaamWakiwa katika picha ya pamoja.

RAIS KIKWETE AKUTANA NA MAALIM SEIF IKULU JIJINI DAR

Rais Dkt.Jakaya Mrisho Kikwete akifanya mazungumzo na Makamu wa Kwanza wa Rais wa Zanzibar, Maalim Seif Shariff Hamad aliyemtembelea Ikulu jijini Dar es Salaam leo. Rais Dkt. Jakaya Mrisho Kikwete akisalimiana na Makamu wa Kwanza wa Rais wa Zanzibar, Maalim Seif Shariff Hamad aliyemtembelea Ikulu jijini Dar es Salaam kwa mazungumzo leo. (Picha na Freddy Maro /รข€¦ ...

 

MAKAMU WA KWANZA WA RAIS ZANZIBAR, MAALIM SEIF AKUTANA NA KUZUNGUMZA NA VIONGOZI WA TAMWA

Makamu wa Kwanza wa Rais wa Zanzibar Mhe. Maalim Seif Sharif Hamad, akisalimiana na baadhi ya viongozi Jumuiya ya Waandishi wa Habari Wanawake Zanzibar (TAMWA Zanzibar), walipofika nyumbani kwake Mbweni kwa ajili ya mazungumzo.Makamu wa Kwanza wa Rais wa Zanzibar Mhe. Maalim Seif Sharif Hamad, akisisitiza jambo wakati akizungumza na Mratibu wa TAMWA Zanzibar bi Mzuri Issa nyumbani kwake Mbweni.
Mratibu wa TAMWA Zanzibar bi Mzuri Issa akizungumza na Makamu wa Kwanza wa Rais wa Zanzibar Mhe....


Rais Kikwete akutana na Maalim Seif Ikulu jijini Dar es Salaam

Rais Dkt.Jakaya Mrisho Kikwete akisalimiana na Makamu wa Kwanza wa Rais wa Zanzibar, Maalim Seif Shariff Hamad aliemtembelea Ikulu jijini Dar es Salaam kwa mazungumzo. (picha na Freddy Maro) Rais Dkt.Jakaya Mrisho Kikwete akifanya mazungumzo na Makamu wa Kwanza wa Rais wa Zanzibar, Maalim Seif Shariff Hamad aliemtembelea Ikulu jijini Dar es Salaam leo. 

Museveni asema ana imani atashinda urais



Rais wa Uganda Yoweri Museveni amesema wagombea urais wanaoshindana naye kwenye uchaguzi mkuu mwaka ujao si tishio kwake.

“Hiki hakitakuwa kinyang’anyiro kikali,” ameambia kikao cha wanahabari mjini Kampala.
Wapinzani wakuu wa Bw Museveni wanatarajiwa kuwa Amama Mbabazi na Kizza Besigye, ambao walikuwa marafiki wake wakuu wakati mmoja.

"Nasikia watu wakizungumza kuhusu kupiga vita ufisadi. Utawezaje kukabiliana na ufisadi ilhali twasikia ukiomba huyu na yule wajiunge nawe?” amesema.
"Lazima uwe na uwezo,” ameongeza Bw Museveni.

Hii ni mara ya kwanza kwa Bw Mbabazi, aliyekuwa waziri mkuu wakati mmoja, kuwania urais.
Bw Museveni ameongoza Uganda tangu 1986.
 
Tume ya uchaguzi ya Uganda imeidhinisha watu wanane kuwania urais mwaka ujao wakiwemo Bw Museveni, Bw Besigye, Bw Mbabazi na Venansius Baryamureba.
Kampeni zitaanza Novemba 9 (BBC swahili)

Kikwete akutana na Maalim Seif wa Zanzibar


Kikwete akutana na Maalim Seif wa Zanzibar


Rais Jakaya Mrisho Kikwete wa Tanzania amefanya mazungumzo na makamu wa rais wa kwanza kisiwani Zanzibar ambaye ndiye mgombea Urais kupitia tiketi ya chama cha upinzani (CUF) Maalim Seif katika Ikulu Jijini Dar es Salaam.

Hatua hiyo inajiri wakati ambapo kuna mkwamo wa kisiasa kisiwani humo baada ya Tume ya Uchaguzi(ZEC) kufuta matokeo ya uchaguzi uliofanyika .

Hatahivyo mwandishi wetu aliyezungumza na mkurugenzi wa maswala ya mawasiliano katika chama cha CUF amesema kuwa hakuna lolote la muhimu lililoafikiwa isipokuwa 'mazungumzo ya kawaida'.
Amesema kuwa wamehuzunika baada ya kubaini kuwa rais Jakaya Kikwete anakamilisha muhula wake wa uongozi hapo kesho.

from tanzaniatoday"

What is Computer Security?





The meaning of the term computer security has evolved in recent years. Before the problem of Data security became widely publicized in the media, most people’s idea of computer security focused on the physical machine. Traditionally, computer facilities have been physically

Protected for three reasons:
• To prevent theft of or damage to the hardware
• To prevent theft of or damage to the information
• To prevent disruption of service

Strict procedures for access to the machine room are used by most organizations, and these procedures are often an organization’s only obvious computer security measures.

 Today, however, with pervasive remote terminal access, communications, and networking, physical measures rarely provide meaningful protection for either the information or the service; only the hardware is secure. Nonetheless, most computer facilities continue to protect their physical machine far better than they do their data, even when the value of the data is several times greater than the value of the hardware.

You probably are not reading this book to learn how to padlock your PC. Information security is the subject of this book. Furthermore, we are limiting our study to the insider problem: the security violations perpetrated (perhaps inadvertently) by legitimate users whom padlocks and passwords cannot deter. Most computer crimes are in fact committed by insiders, and most of the research in computer security since 1970 has been directed at the insider problem.

1.1 SECRECY, INTEGRITY, AND DENIAL OF SERVICE
Throughout this book, the discussion of computer security emphasizes the problem of protecting information from unauthorized disclosure, or information secrecy. You may find it disconcerting, as you read this book, that information integrity-protecting information from unauthorized modification or destruction-seems to be receiving no sustained attention.

There are two reasons for this seemingly one-sided point of view, one historic and one technical. First, having been funded primarily by the United States government, most computer security endeavors have concentrated on maintaining the secrecy of classified information.

This tradition has persisted even in commercial applications, where classified information is not the concern and where integrity, not secrecy, is often the primary goal. And second, the information disclosure problem is technically more interesting to computer security researchers, and the literature reflects this bias.

Fortunately, techniques to protect against information modification are almost always the same as (or a subset of) techniques to protect against information disclosure. This fact is consistently borne out in the technical measures we will discuss. In the rare cases where the techniques differ, that fact will be pointed out explicitly.

While the definition of computer security used in this book does, therefore, include both secrecy and integrity, the closely related area termed denial of service is rarely discussed here.

Denial of service can be defined as a temporary reduction in system performance, a system crash requiring manual restart, or a major crash with permanent loss of data. Although reliable operation of the computer is a serious concern in most cases, denial of service has not traditionally been a topic of computer security research. As in the case of data integrity, one reason for the lack of concern is historic: secrecy has been the primary goal of government funded security programs. But there is also an important technical reason. While great strides have been made since the early 1970s toward ensuring secrecy and integrity, little progress has been made in solving denial of service because the problem is fundamentally much harder: preventing denial of service requires ensuring the complete functional correctness of a system— something unlikely to be done in the foreseeable future.

If denial of service is your only concern, you should refer to such topics as structured development, fault tolerance, and software reliability. Most of the techniques for building secure systems, however, also help you build more robust and reliable systems. In addition, some security techniques do address certain denial-of-service problems, especially problems related to data integrity. This book will indicate when those techniques apply.

To sum up, security relates to secrecy first, integrity second, and denial of service a distant third. To help you remember this, memorize the computer security researcher’s favorite (tonguein- cheek) phrase: “I don’t care if it works, as long as it is secure.”

1.2 TRUSTED SYSTEM EVALUATION CRITERIA

The U.S. Department of Defense has developed its own definition of computer security, documented in Trusted Computer System Evaluation Criteria (Department of Defense 1985), also called “the Orange Book” after the color of its cover /and hereafter shortened to “the Criteria”). The document employs the concept of a trusted computing base, a combination of computer hardware and an operating system that supports untrusted applications and users.

The seven levels of trust identified by the Criteria range from systems that have minimal protection features to those that provide the highest level of security modern technology can produce (table
1-1). The Criteria attempts to define objective guidelines on which to base evaluations of both commercial systems and those developed for military applications. The National Computer

Security Center, the official evaluator for the Defense Department, maintains an Evaluated

Products List of commercial systems that it has rated according to the Criteria.

The Criteria is a technical document that defines many computer security concepts and provides guidelines for their implementation. It focuses primarily on general-purpose operating systems. To assist in the evaluation of networks, the National Computer Security Center has published the Trusted Network Interpretation (National Computer Security Center 1987) that interprets the Criteria from the point of view of network security. The Trusted Network

Interpretation identifies security features not mentioned in the Criteria that apply to networks and individual components within networks, and shows how they fit into the Criteria ratings.
Class Title Key Features A1 Verified Design Formal top-level specification and verification, formal covert channel analysis, informal code correspondence demonstration B3 Security Domains Reference monitor (security kernel), “highly resistant to penetration” B2 Structured Protection Formal model, covert channels constrained, security-oriented architecture, “relatively resistant to penetration”

B1 Labeled Security Protection
Mandatory access controls, security labeling, removal of security-related flaws

C2 Controlled

Access
Individual accountability, extensive auditing, add-on packages
C1 Discretionary Discretionary access controls, protection against accidents among cooperating users

D Minimal

Protection
Unrated

Table 1-1. Trusted System Evaluation Criteria Ratings. In order for a system to be assigned a rating, it must meet all the technical requirements for its class in the four areas of security policy, accountability, assurance, and documentation. The requirements are cumulative, moving from class D to class A1.

You can be sure that a system rated high according to the Criteria (that is, at class Al or B3) has been subject to intense scrutiny, because such systems are intended to protect classified military information. In order to attain such a high rating, a system has to be designed with security as its most important goal. While systems rarely qualify for any rating without some changes, most commercial operating systems can achieve a C1 or C2 level with a few enhancements or add-on packages. The Evaluated Products List is short because the Criteria is relatively new and evaluations take a long time. Also, many vendors have not yet shown an interest in submitting their products for evaluation.

While most of the technical concepts in the Criteria are covered in this book, we will pay little attention to its rating scale. If your interest is in developing a system for United States government use, the scale is important; for other applications, you will be more interested in specific features than in the ratings.




Why Systems Are Not Secure

Despite significant advances in the state of the art of computer security in recent years, information in computers is more vulnerable than ever. Each major technological advance in computing raises new security threats that require new security solutions, and technology moves faster than the rate at which such solutions can be developed. We would be fighting a losing battle, except that security need not be an isolated effort: there is no reason why a new technology cannot be accompanied by an integrated security strategy, where the effort to protect
against new threats only requires filling in a logical piece of a well-defined architecture.
We probably cannot change the way the world works, but understanding why it works the
way it does can help us avoid the typical pitfalls and choose acceptable security solutions. This
chapter explores some of the classic reasons why the implementation of security lags behind its
theory.
2.1 SECURITY IS FUNDAMENTALLY DIFFICULT
Why are computer systems so bad at protecting information? After all, if it is possible to build a
system containing millions of lines of software (as evidenced by today’s large operating
systems), why is it so hard to make that software operate securely? The task of keeping one user
from getting to another user’s files seems simple enough—especially when the system is already
able to keep track of each user and each file.
In fact, it is far easier to build a secure system than to build a correct system.
Drop Down MenusCSS Drop Down MenuPure CSS Dropdown Menu

CHAT BOX

Post zilizo tumwa

Recent Posts Widget

Tangaza Biashara yako mtandaoni

TANGAZA BIASHARA NAMI HAPA KWA BEI NAFUU KABISA

Unaweza kutangaza biashara yako sasa na hlmservice pia uta pata kujua mambo mengi ambayo mbali na biashara yako unaweza ukatengeneza pesa kwa namna moja ama nyingine kama jinsi nilivo elezea katika Makala za nyuma hapo

Wafanya biashara wengi wanatumia mda mwingi namna gani ya kukuza biashara zao ,Ili uweze kufanikiwa kwa kiasi kikubwa unahitaji kuitangaza biashara yako ili kuwa na mtandao mkubwa na wateja wako ,ni vyema ukatangaza biashara yako katika mitandao ili bidhaa zako zijulikane kwa haraka na upesi .

Pia wewe mfanya biashara ukiitaji kuwa na blog yako wasiliana nami kwa mawasiliano hapo chini , bei ni nafuu kabisa

Pia ukiitaji kuitangaza biashara yako kupitia blog yangu bei ni ndogo kabisa huu ni wakati wako wewe mfanya biashara

+255758061575 & +255684860817

henrylameck@gmail.com

henrylameck90@yahoo.com

Tukuyu Tour & Safari

Vadacom Ni Zaidi

Tembelea g2g.fm upate movie Kali

Tembelea g2g.fm upate movie Kali

Kilimo Kwanza

Hlm servise

Latest movie

Movies

Computer books

Computer books