Cyberattacks/ Unethical Hacking

most of us would know about the term ‘hacking’. when we think about hacking, the first thing that usually comes to mind would be exploiting breaching defences and gaining unauthorized access to a system. they would then use that power to gain profit, introduce Trojan or similar malware into cybersecurity network.

But actually, there are different types of hacking and hackers. there is good hacking that is used to prevent and secure companies and find vulnerabilities and weaknesses to patch them up, which is done legally under speculation and authorization. there are also different types of hackers with different intentions. white hat hackers and black hat hackers have been mentioned above, and the white does ethical hacking while the black has malicious intent. another hat hacker is the grey hat, which is in between white and black.

Usually, grey-hat hackers surf the net and hack into computer systems to notify the administrator or the owner that their system/network contains one or more vulnerabilities that must be fixed immediately. Grey hats may also extort the hacked, offering to correct the defect for a nominal fee.

common types of cyberattacks

1.phising attacks on servers

phishing attacks may impersonate other users, and send fraudulent links or trick people into revealing their usernames and passwords with phishing messages, and they can be sent by email, text or other channels. or if a site is hacked and the hackers gain access and control of the site, then they might be able to steal all the data and credentials on the website.

2.different types of attacks(unethical hacks)

DDOS attack(denial of service attack)

-this attack sends and floods a system resources with false traffic so that it cannot respond to service requests. it launches from a large number of other hosts machines that are infected with malicious software which is controlled by the attacker.

a DDOS attack sends heavy and false traffic through the internet to the victims

-cookie theft

Cookies, which are stored on websites caches or on your system when you visit certain websites, holds a wealth of information about you, passwords, creditentials, and personal and finanical data.

once stolen, cookies may be decrypted to reveal your information, or to impersonate you online.

Avoiding public networks or unprotected networks with security lesser than WPA2 is your safest bet, and using a VPN(virtual private network) to encrpyt and tunnel the connection on your phone or mobile device is also advised, and you should also clear the browser and system caches in your history, block third party cookies, so that you will have less cookies to steal.

-MITM(man in the middle attack)

unsecured network connections are exposed to this tactic, and it involves intercepting data stream between the sender and recipient. They are then able to read or modify the data being passed through the proxy connection.

th objective may be to eavesdrop and record a confidential transmission such as an exchange of login/ financial credentials, or the attacker may want to disrupt the flow of traffic by sending malicious malware to both of the systems.

tips to avoid MITM or cookie theft:

  • use a reliable and escure VPN
  • avoid the use of free Wi-fi hotspots
  • avoid going to insecure websites, malicious websites
  • avoid using apps from untrusted sources

-Trojan horse

a trojan horse is a type of malware often disguised as legitimate software. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. a trojan horse acts like a legit application or file to deceive you to loading and executing the malware on your device.

trojan attacks can be from emails, downloads, mails, messages

once downloaded or installed, it can perform the action it was designed for. for example, when you open an email from someone, you might think its from a reowned company or someone you know, but the file you opened has gone to install malware unknowingly on your device.

-drive-by attack

in a drive-by attack, hackers look for insecure websites and plant malicious scripts into HTTP or PHP code on the pages. When the victim visits the website,, the script may install malware directly onto the computer of someone on the site, or it redirects them to a site controlled by the hackers. apps, operating systems or web browser that has security flaws or unsuccessful updates are more vulnerable to these attacks.

Solutions and how to stay safe from cyberattacks

1.avoid opening suspicious emails, suspicious files or links

if you receive an email or message telling you that you have won the lottery, or you can receive a free gift, do not open the email or attachment. as mentioned above, these emails may look like they are from a renowned company or someone you know, but they are malicious and fraudulent and it could be a phishing attack or the file could be a trojan horse.

example of a phishing email all software from authentic sources, avoid downloading files from torrent sites

when downloading applications, plugins, files, try your best to download them from the original sites or authentic sites. fishy and torrent websites may not be up to date and hackers may be able to run a drive-by attack, MITM attack, or cookie theft. and it’s also best to try not to download paid apps from third-party software, such as trying to download Minecraft for free on fraudulent or third-party websites.

3.go incognito mode when on third-party computers(or computers that aren’t yours)

if you are using a shared computer or other’s people computer, you should go incognito mode so that your browsing history, cookies, user credentials would not be saved when another person comes to use it, as Google Chrome tends to save your credentials, cookies when you browse in a normal window.

4.use a good anti-virus software, and a good VPN

antivirus software can provide protection agaiinst viruses, malware, internet threats. and each time a usb stick is inserted into a computer, make sure to scan it. turn on the safe browsing feature of anti-virus to prevent yourself from accidentally browsing malicious sites.

you may also want to use a vpn to hide your ip address, access geographically blocked websites, change your ip address to and appear as though you’re in a different country.

some good vpns that i recommend

5.Do not re-use passwords on important accounts

Ensure that your passwords are different for emails, credentials, and logins. That way, if hackers manage to crack your password for one account, they only can get access to that account, and the others will still be secure. Try to change your passwords regularly to make it tougher for hackers to crack your password, and use 2 factor-authentication(or 2 step verification) whenever possible.

summary and points


As the internet advances with higher technology, it becomes vaster, and more cybercriminals are looking to steal the information on the internet. Hence, we need to stay safe when browsing and ensure that we help to do our part to protect ourselves and others to make the internet a trustworthy place for everyone to work, study, and play.


Tagged : / /

technology abuse/technology problems

the rapid advancements in technology in recent years have brought about numerous changes in fields such as education, communication, and medicine. many processes that used to be done manually by humans can now be undertaken effectively by computers and other devices which are supported by strong technological infrastructure and networks. we are not just active users of technology, we are dependent on it. however, as glamorous as technology may sound, there are some cons with it, and unfortunately, any people misuse and abuse it to benefit themselves. today, I will be blogging about how technology is abused in certain ways and the flaws of it.

how technology can affect us

  1. social skills/social disconnect

the use of technology and communicating online may result in a lack of social and communication skills. With technology so advanced nowadays, you can just pick up your phone to message or call someone to socialise.this reduces the need for communicating face to face. social and communication skills are needed in our daily lives, in school, and at work. despite vast advancements in technology, we still need to learn to communicate despite how advanced technology might be.

When we replace real-life interaction with online communication, we lose the ability to read social cues like tone of voice, facial expression, body language, and direct wording. social skills are needed to present, in interviews, meetings, and in school, oral examinations, class presentations and maybe even giving talks as prefects or leaders in the hall. Thus we can see that technology cannot replace communication and social skills, and they are still necessary for our daily lives.

2. education

The internet has become a great tool for learning. Many schools and teachers are incorporating online learning and e-learning into their lessons. If you wanted to find information, you can just google it up instead of having to go to the library to find related materials or have to scan through the dictionary to find the meaning. With face to face interactive apps, courses and lessons can now even be conducted online. Yet, technology involvement dosent always guarantee the quality of education, Plagiarism and cheating have increased while analysis and critical thinking have declined. This puts young generation thinking abilities in jeopardy.

3.physical effects on our health

Among the most dangerous physical effects is addiction.Once you started, you cant stop. Adolescents and teenagers are glued to their mobile devices, be it in public, on transport, while eating, or even in the toilet. As a result, they move less as they stay at one spot constantly. And while they are playing games or scrolling through their mobile devices, it can be tempting to snack. Being absorbed by a laptop or a tablet, people tend to snack a lot, keep late hours and exercise less. The more time you sit in front of the PC, the lesser is the blood circulation in your body, not to speak of the neck and head pain. Moreover, sedentary life is the reason why many people have a curved backbone and bad posture as a result, as many like to lie down or sit in a relaxed position. This can lead to long term health issues such as eyesight problems, headaches, and long term health issues.

4.Cyberbullying and cybercrime

with the internet being so big with countless information and things out there, there is always a misuse of technology.

Cyberbullying has become even more common and bullies make use of social media apps to shame and bully people through the internet. And what is worse is that those bullies are able to create an anonymous account without the victim knowing who it is. The offenders either use text messages, social media or forums to reach out to the victim. The offenders may threaten to shame and post things that may not be true on the internet about the victims.
The internet is also a place where cyber crimes can take place. Many are unaware of fishy and suspicious sites that try to access our personal information. cams, hackers, phishing, have all become common on the internet. The suspects tried to phish and get access to our personal information by threatening us or giving a false excuse to give our personal and banking details to them. hey often target our user data,
including login credentials and credit card numbers. thus, when we are using the internet, we need to be vigilant and cautious about who we leak our personal information to. creates dependencies

The evolution of technology in today’s world has created dependencies on our devices, tools, appliances. We have become so dependent on technology that sometimes it even reduces the need to learn skills. technology is incorporated into many aspects of our lives, in work, play, eat, and maybe even sleep. We always look for the fastest and most convenient ways to do things, and thus we rely on technology to get our tasks done fast and in an easy way. technology has made everything so convenient and easier. For example, teenagers nowadays might not even learn the skill to cook, as with a tap on our mobile devices we can get food delivered right to our doorstep.

Because of this new reliance, we are losing the ability to perform tasks in an organic and all-natural way.

how to be safe on the internet

with so many suspicious sites, websites, cyber-crimes, and cyberbullying online, it is hard to avoid all these especially when the internet is such a big site. thus, we will learn what we need to avoid and be precarious against through the internet, and what we need to be wary of. false information is everywhere, and we might not even know what we are reading is truthful or not. this is because this piece of information or news can be posted so easily on the internet, either on social media or fraudulent websites. we will learn how to identify these sites, and how to stay safe from them.

1. phishing and online scams

phising is a way to obtain private or personal sensitive information data, passwords, login details and banking credit details, by disgusing oneself as a truthsworthy entity. they might want to obtain this information for their own usage, to be able to gain access to your banking details,or to gain acesss to your other accounts, which is usually for your money . here are some examples of phishing and tactics they might use.

Phishing websites, emails, or messages may look like they’re from a corporation or company that you would know and trust. They may look like they’re from a bank, a credit card company, a social networking site, an online payment website or app, or an online store.this is to usually gain your trust first, as you would know they’re from a trustable company.

Phishing emails and texts often give you a reason to trick you into opening a link or opening an attachment. this is done to get your attention to the email and so that you wouldn’t just ignore it. the emails and texts are often free offers or free stuff, or they might say that you have some problems with your banking details. they usually threaten you by saying that it is only for a limited time, so this would get you anxious to get it done faster. here are some common examples and tactics that scammers use:

  • say they’ve noticed some suspicious activity or log-in attempts
  • claim there’s a problem with your account or your payment information
  • say you must confirm some personal information
  • include a fake invoice
  • want you to click on a link to make a payment
  • say you’re eligible to register for a government refund
  • offer a coupon for free stuff

here is an example of another email:

-they will use the names of trustable websites(sometimes even the logo)

-they will urge you to hurry and do it(this will expire in 24 hours)

-says that your password will expire in a limited time(trustable sites will usually give you time to change your password and it wont expire)

While, at a glance, this email might look real, it’s not. The scammers who send emails like this one do not have anything to do with the companies they pretend to be. Phishing emails can have real consequences for people who give scammers their information. And they can harm the reputation of the companies they’re spoofing.

2.false and fraudelent news

fake news, also known as junk news, hoax news, is a form of deliberate news spread through digital media, or through traditional media. the internet and the digital media has brought back and increased the usage of fake news. these news can be about what is going on in the world, or something that might be threatening, and cause a lot of commotion and anxiousness in the community. these news may be often posted on social media, or on frauldent sites that may be imposting other truthful news sites.Propaganda has been around for centuries, and the internet is only the latest means of communication to be abused to spread lies and misinformation rapidly to many other groups of people.

What Is Fake News?
There are two kinds of fake news:

Stories that aren’t true. These are entirely invented stories designed to make people believe something false, to buy a certain product, or to visit a certain website.

Stories that have some truth, but aren’t 100 percent accurate. For example, a journalist quotes only part of what a politician says, giving a false impression of their meaning. Again, this can be deliberate, to convince readers of a certain viewpoint, or it can be the result of an innocent mistake. this may result in others interpreting it wrongly, thus it is also harmful.

Social media platforms now give everyone the ability and power to post whatever they want, and whenever they want. Thus, this might be dangerous as many might abuse and misuse this ability. Often, many people do not check the source of the websites before forwarding it to people.

3. online privacy

when you sign up for social media platforms or apps, you may be asked to put some personal information about yourself, or you may want to disclose some information about yourself to others. every day, people give away their personal information online, whether it be their name and address, or their payment information. You need to know what’s going to happen to it, and that it’s not going to be used for anything other than the intended purpose.

If you’re relatively new to using the internet or don’t use it very often, then you might not be up to date on how platforms like social media sites work. Basically, when you sign up to a site like this, you have to give a certain amount of personal information, and information that you want to share with people. When you do this, you need to make sure you’re aware of what others can see, and what you don’t want to share isn’t being shared.

Solution and Conclusion

with the internet being so huge, and with tons of information and things posted every day, we cannot possibly wipe out all these false and fraudulent information on the internet. However, we can take precautions and steps to prevent these from happening to others, our friends, or ourselves. We should be aware of what we post, see, find on the internet, and not immediately trust these websites, emails, or texts. we need to remember that not everything on the internet is truthful, since it is so easy to gain access and post something on the internet.

In conclusion, the invention of technology has its pros and cons, good and bad. it is up to us on how we want to use the internet. thus, let us all work together to make the internet a better place, and let us make the internet a truthful, trustable, good place to learn, work, play for everyone.

Global challenges that technology can solve

Technology is constantly evolving and advancing. it has become so advanced and we never thought that it would revolutionise the world.We never thought that it would be so advanced to the point where it can solve global issues.

Today, technology performs a major role in solving a wide range of problems including environmental , social issue, employment, and many more. Here are some major challenges in the world that can be solved by technology.

1.Carbon emissions (solving environmental issues)

Rising of global temperature is a major threat for everyone. Many polices have been setup by the government to reduce greenhouse gas emissions from factories and cars, burning produces carbon dioxide. Carbon dioxide traps heat in the earth atmosphere. Removal of carbon dioxide from the atmosphere can help to reduce the temperature. But, it would be really expensive.

Currently, many startups are searching for ways of recycling carbon dioxide into products. It might be helpful, but we require the cheapest way to be able to store the billons of carbon dioxide in these fuels.

2. Secure driverless cars(accidents and drunk driving)

Today, cars have been used for millions of miles on the roads. Most car are equipped with modern technology e.g allowing the user to open the car doors without a key, a touch screen maps that can guide driver to his destination. However, with technology, driverless cars will be a reality soon and will be mass produce for the market.

However, there are many implications that come with it. They are not working properly in disordered traffic, and in weather conditions like snow and fog.

Car accident is a major issue in the world, millions have been involved in accidents because of either the driver or the pedestrian. If self driving cars are extensively deployed, then it can minimise accidents and car crashes. Drunk driving will no longer be a thing with self driving cars.Without a human physically driving the car, the car can continuously drive without getting tired or being distracted.

3.Earthquake prediction (natural disasters)

Earthquake is one of the devastating natural calamities in which over 100,000 people died in the 2010 Haiti earthquake, and the 2004 Indian Ocean tsunami—prompted by one of the most powerful earthquakes ever recorded and it had killed around a quarter of a million people in Indonesia, Sri Lanka, India, and elsewhere. Most earthquakes occur along the edge of the oceanic and continental plates. We are able to predict hurricanes days much in advance, but we are helpless in predicting earthquakes. Scientists need to analyses past disasters to find patterns in natural phenomena. They study tracking radar systems of seismic waves deep inside the Earth.

We only can predict earthquakes by trends, patterns and by analyzing past disasters. Predicting earthquakes with some self-assurance would let the planners discover some long-lasting solutions. Even a few hours’ before a warning can help people to leave unsafe areas, and millions of lives can be saved.

4.Energy-efficient desalination(getting more fresh water)

The quantity of salt water on earth is about 50 times as there is fresh water. The increase in the world’s population and climate change increase droughts and the call for fresh water is going to develop more. Israel is getting most of its household water from the sea by making the world’s biggest reverse-osmosis desalination facilities. But however, desalination requires a lot of energy and thus it is not pratical to be used worldwide. New types of membranes used for reverse osmosis, electrochemical techniques may be valuable to make salty water useful for irrigation and farming. Similarly, the use of adaptation technologies to create drinking water from the ocean ought to be the main concern.

(Why can’t we drink seawater?)

Seawater is toxic to humans as your body will not be able to get rid of all the salt that comes from seawater.Your body normally gets rid of salt by having your kidneys produce urine, but it needs to dilute the salt in freshwater to be able to produce urine.So by drinking seawater, you will need to urinate more than you drank, which will make you thirster and eventually you will die out of dehydration.

5.Climate change(environmental issues)

Technology can create more efficient buildings and streets, from smart lightning to non-polluting air conditioners, washing machines, fridges and heating systems.There are applications connected to sensors which can measure your house usage of water and electricity and can improve it.In Barcelona, sensors have been installed to monitor the city’s noise, rain, and air quality, and a smart irrigation system has been used to address drought conditions and improve water conservation during farming.

Right now, transport is a major producer of carbon emissions, and represent 23 percent of global energy related CO2 emissions.Electric cars like Tesla may offer a more promising solution to this issue, once more efficient charging and battery-charging technology becomes avaliable. Sensors embedded into roads can also monitor parking and traffic flow to reduce congestion and pollution.However, once driverless cars become available, cars can always be on the move, and parking will be one less issue to worry about.

6.Disaster relief

After disasters in rural areas, homes will usually be destroyed, and so will buildings and other structures. This means that survivors will have nowhere to live and get necessary supplies.It is hard for the emergency services to know where to drop off the supplies as there is no form of communication between them.However, innovation in technology is providing new and more effective to cope with the aftermath of a disaster, from helping survivors to communicate, and to helping emergency services gain precious time and information.

Drones can be used to drop off much-needed aid packages to isolated areas, and mobile communication applications can help emergency services respond more quickly and effectively by providing crucial information quickly.


Technology can be used in many ways and people are innovating to make use of it. It has become so advanced to the point where we can use it to solve global issues.All in all, it still cannot prevent natural disasters and natural phemenons from occurring, even though we can predict them. In conclusion, technology is very powerful. It can revolutionise the whole world and now is even being used to solve global issues.That is probably why it is the best invention of the 21st century.

credit to these sources:

Technological Disruption

what is technological disruption?

Disruptive technology is an innovation that significantly alters the way that consumers, industries, or businesses operate. Disruptive technology is a newly developed technology that creates much more value than the existing technology and has the potential to drastically change the way to work, live, do the business, and increase the economic output.

How has technology changed the world?

Technology has revolutionized the world and our daily has created amazing tools and resources and has put useful information all at our convenience. it has changed the way we communicate, play, eat, sleep, and study. technology is disrupting us socially, disrupting the economy and business, and even our education system. has technology disruption benefitted us more or has caused more harm?

1.Social disruption(work, play, eat, study)


the way we entertain ourselves has also changed. streaming services like Netflix, Amazon Prime Video, and Hulu have overtaken TV. with your mobile devices, you can watch and stream the tv shows you want, and how you want. these streaming services are overtaking broadcast channels as they provide more convenient and allows the user to choose what they want to watch. you no longer have to anticipate watching the show you want to watch at a certain time. thus, some of these broadcasting channels are also coming up with ways to move their shows to streaming websites.


The advancement of technology has made communication unbelievably fast and convenient. It’s incredible to look back and see how much easier communication has gotten over the years. Communication tools offer one of the most significant examples of how quickly technology has evolved.

in the past, when you wanted to send a message or talk to someone, you would write a letter ,send faxes, or find a wired telephone.To connect with someone in society today, you have many more efficient options at your fingertips. You can send them a message on social media, text them, video chat, email, or put a call through.

Payment and transferring funds

you no longer have to go to the bank or atm to pay your bills or transfer funds to someone else.with cell phones and a banking app, you now are able to manage all your necessary bill payments online.there is no longer the need to spend time queueing up to pay your bills or waiting to buy your food.with a few taps and clicks, you can order food right to your doorstep or pay your bills conveniently in a single spot.

2.Economic disruption(the way we do business, e-commerce,e.g)

as technology progresses and is advancing, businesses and companies also have to move along. companies are thus starting to move their businesses online and learning how to do e-commerce, advertise on social media apps and much has changed the way we do business and the way we advertise and sell our products.some companies and businesses are failing as they might still be doing brick and mortar business, and are not changing with the times and moving their business online.

technology has also taken over and replaced many jobs and are threatening many industries. here are a few industries and jobs that have been replaced by technology.

1.Travel websites such as Expedia (EXPE), Kayak, and Travelocity have eliminated the need for human travel agents.

2.Newspapers have seen their circulation numbers decline steadily, replaced by online media and blogs. Increasingly, computer software is actually writing news stories, especially local news and sporting event results.

3.Language translation is becoming more and more accurate, reducing the need for human translators. The same goes for dictation and proof-reading.

3.Online bookstores such as Amazon have forced brick-and-mortar booksellers to close their doors permanently. Additionally, the ability to self-publish and to distribute e-books is negatively affecting publishers and printers.

4.Uber, Grab and other company-owned taxi companies are taking over traditional taxis due to its convenience and allowing its user to be able to call a taxi beforehand to its location to reduce waiting time.

5.Driverless cars, such as those being developed by Google , may prove to replace all sorts of driving jobs, including bus and truck drivers, taxi drivers, and chauffeurs. food companies are also starting to invest in computerized kiosks, where there is no need for a waiter to take the customers orders and the kiosks can take the customers orders without the need of registers are also being replaced by retail cashiers and the customers can check out themselves without the need of a cash register.

7.traditional television broadcasting is being replaced by streaming services such as Netflix, Hulu, and Amazon Prime Video.People are dropping their cable or satellite TV services opting to stream online instead.

As we can see, many industries are making use of technology to do the jobs that involve human labour, as it is much more convenient, saves time and might even be less costly than hiring so many the future, we might have driverless vehicles and technology will be replacing many other jobs. jobs which involve a lot of manual labour and that repeat the same process will be lost to technology advancement.those who can interface with technology will likely succeed than those who can accomplish physical labour.

3.Technological disruption to education system

technology is a powerful tool that can transform education in many ways, from making it easier for teachers to create instruction materials to enabling new ways for people to learn and work together, from making it easier for teachers to create instruction manuals to enabling new ways for people to learn and work together.

  1. finding information

back when you wanted to know the definition of a word or wanted to research more about what you learnt in school, you would usually have to visit the library and find reference materials. that is now a thing of the past. with the internet, you can now find what you are looking for just by typing into the search engine.there are countless blogs and articles out there that can help you discover information that you might have never knew about that subject or information outside the textbook.

2.Online group collaboration

with apps like Zoom and Google Meet, teachers can now host online meetings and lessons without having to be in the classroom.the idea of group study has been improved in the digital world.students now no longer have to get together physically to discuss or collaborate for a group project. with messaging and video conferencing apps, they can now collaborate online and are also able to share files and notes, work together on documents, instant message or email.

3.Fun learning

The utilization of technology has made learning significantly more fun than any other time in recent memory. teachers are posting more lessons and assignments for students to do online. the lessons are usually accompanied with interactive videos that can help the students to understand better.

Students that may struggle to understand a certain subject can search for a tutorial video online. Videos or live streaming content can offer an alternate approach to a thought and better understanding of a concept or subject. These videos can allow an interesting and interactive approach to learning that might be more easily digested.


all in all, technology has its good and bad, and technology disruption may be changing the world for the better or for the has disrupted the economy, many industries, and has revolutionised the way we live our life, and carry out our daily activities. things will no longer be the same, as technology is only constantly improvising and technology progresses, we must adapt to the new ways and accept that those traditional methods will soon be left behind and that we have to keep innovating and adapt to the present.

credit to these sources:

The Digital Divide

  1. What is a digital divide?

 It is a term that refers to the gap between demographics and regions that have access to modern information and communications technology, and those that don’t or have restricted access. The technology can include the smart phone, personal computers and the Internet.

It is called a digital divide as the world is divided into two with countries that have easy access to  the internet, and have their own personal technological devices and those who do not even have proper network infrastructure or might not even have computers and internet.

For example, certain countries that blocks a useful search engine and access to social media due to political ideology.

This divide typically exists between those in
– urban cities and those in rural areas.
– between the uneducated and the educated.
– between the more industrially developed countries and less developed countries.
– between ideologist countries and democratic countries.
– between the well off and the unfortunate families.
– between the boomers and millennial.

2. Why is digital divide unfair?

Digital divide is unfair as people in some countries who do not have access to the Internet is unable to learn as fast compared to those with the Internet. For example, if they want to learn about a certain word or want to know more about what they learnt in school, the ones with easy access to the internet can just check the definition of what they want to know on a search engine, whereas those without internet might have to go looking in dictionaries and might have to go to the library to find out which book is relevant to what they want to know.

 There are also countries with sufficient funds and are able to let their community have the internet but they choose to disallow their community from using it because they might not want to disclose information or do not want their community to have too much knowledge about the world and restrict the people to become knowledgeable and thus might be able to overpower the government.

3. The impact of Digital Divide
Digital divide is unfair as in some parts of the world, some people have faster and more convenient methods of learning and some people are not as fortunate and are not able to afford these technological devices, and thus they cannot learn as quick compared to those with internet.

60% on the world are still offline and 6 billion people have no high speed broadband to learn and work online.

4. How can we narrow the bridge the digital divide?

a. Encourage the establishment of cyber clubs

We must set up more cyber clubs in rural areas, and people that have no access to the internet or no computer at home can come to these cyber clubs to use the computer with internet access to learn.

b. Encourage schools to educate students on the importance of digital literacy

Schools should teach their students more about digital literacy. This equip students with technological skills which are essential in todays world. The computer skills is now required in all jobs and applicable in most workplaces in the world, especially in developed countries. It is the norm for employers to expect their workers to know how to use the basics of Microsoft Word, Excel and Powerpoint and even some popular social media sites. School should incorporate information technology as a core module in the curriculum and educator must teach students on technological work that can help them in getting a job.

c. To offer free computer training to the public

Universities and organizations must invest in e-learning platform and knowledge sharing system where they provide free computer training to those who without access to digital literacy, for example, we can create a web portal for the boomer to teach them the basic skill on writing letters on google docs, using the google search engine to find valuable information and to keep in touch with their love ones face to face using google hangout.

d .Give tutorials on social media platforms

The social media is a powerful channel. The people with the knowledge can share and people without the information can learn from the platform. I advocate people to share your skills and knowledge online. With such caring and sharing initiatives from many people, the world is going to be a better place to live, play and work.

Some websites that i like to share for e-learning.

CS50: Introduction to Computer Science
In this course, i learned the basic of programming including C, PHP and Javascript, CSS and HTML.

I highly recommend this online course for anyone who is enthusiastic on how to develop games and websites.

How to Use GarageBand: A Step-By-Step Guide

This guide may be helpful for those who are looking to make a song with GarageBand but are unsure of how to do so, as GarageBand is not so straightforward and thus you may not know how to sync the instruments well together.

In conclusion.

Education is one way out of poverty.

We must work towards on bridging the digital divide to give everyone a equal chance on learning. Economically, a citizen can easily network, learn new business ideas, and transact online globally. The next generation of students will also experience better learning as technology continues developing and changing the gap between the rich and the poor is also likely to be narrowed, and thus this gives the poor a chance to empower themselves.

Credit to sources:

other sources from Google