Tuesday, 12 May 2015

"You Are God Alone"

[Verse 1:]
You're not a God created by human hands
You're not a God dependent on any mortal man
You're not a God in need of
Anything we can give
By Your plan, that's just the way it is
[2x]

[Chorus:]
You are God alone, from before time began
You were on Your throne, You are God alone.
And right now, in the good times and bad
You are on Your throne, You are God alone.

[Verse 2:]
You're the only God whose power none can contend
You're the only God whose name and
Praise will never end
You're the only God who's worthy
Of everything we can give
You are God, that's just the way it is

[Chorus]

[Bridge:]
You're unchangeable (Unchangeable)
Unshakable (Unshakable)
Unstoppable (Unstoppable)
That's who you are (That's who you are)
[2x]

[Chorus: Key change from G to Ab]

[Repeat Bridge several times, then Chorus several times]

Saturday, 18 April 2015

Developing a Positive and Willing attitude by Bro- sam (Classmate)

Positive attitude
Attitude-A mental position with regard to a fact or state or emotion towards a fact or a state
Willing- Disposal or inclined towards something
Willingness - quality of being prepared to do something
Positive attitude - Assurance of ones confidence in God. By having faith in God and being optimistic.

Negative attitude
Low self esteem, intimidation, speaking defeat over your time, mediocrity, not knowing who you are, am not going to manage, discouraged.
Negative words stop God promise

Instances in our lives
Do not condemn yourself
Forces that are for you are stronger than those that are aganst you.

Moses Distressed: Numbers 11:14-15
1 Chronicles 29:10
Numbers 11 and 14:8-12

Developing a positive attitude
Knowing your identity
Being happy
Galatians 5:10
For there is no condemnation for those who are in Christ Jesus Romans
2 Corinthians 10:5
Reading the Word of God Joshua 1:8-9
Reading inspirational stories
Have confidence
Avoid negative words
Find many reasons to smile every moment
Have faith in yourself and believe that God is working every good for ourselves
Associate yourself with people who have the right mindset
Have patience in life

Benefits of having a positive attitude
Achievements of success
Brings happiness to your life
Look for solutions instead of dwelling on problem
Increases your faith in your abilities
Gives you the strength not to give up
Life smiles at you

Declarations
I have what it takes
Am the Best
All is well
Am anointed
Am qualified
Am blessed
Am stronger in the Lord
Am more than congerer
Am full of wisdom

Conclusion
God has predestined us so we dont have any reason to have a negative attitude
Negative words stop God's Promises

Sunday, 12 April 2015

Christian wealth and prosperity

3 John 1:2
Mark 8:36-37
Ecclesiates 9:10
Proverbs 10:22
God's desire is for us to acquire wealth
When God gives us wealth, this comes with some conditions, principle and demands
God wants actually whatever he gives us to be used to enhance his Kingdom
God will give us wealth if we are obedience to other requirements in Christian lives e.g walking in Holiness, Righteousness,


Ways of acquiring wealth
Inheritance
Stealing (Matthew 19:18, Ephesians 4:28)
Working hard

How to acquire wealth in a Godly way
Inheritance (Be careful what we are inheriting)
Do not make money or wealth your ambitions 1 Timothy 6:9. make sure whatever you do Christ is Glorified
When you are getting wealth in a Godly way, make sure the virtual of patience is built in you.
It is dangerous as a christian to be involved in a business that God is not pleased so we should invest in the right places

Where is the place of God in the idea or the investment that i want to start?
Ensure that Christ is at the center of your business
Be a man of Faith and courage - Faith is the only hand that is received from God
Proverb 3:9 Honor the Lord with your wealth

The Heart of God is us prospering and causing an impact in the World



Sunday, 29 March 2015

Password secrets: Your Passwords Aren’t As Secure As You Think!

There is one thing that make us so vulnerable is ignorance. Today, everything is going to be depended on the internet. Yes, and you know it better! and a concept that we use to secure our internet accounts and all is our passwords. but is it enough to set password and feel that we are secure? are you really aware about of how to use passwords?
Our lack of understanding about passwords is allowing crooks to spy on us, steal from us, and deceive us into thinking nothing ever happened. Despite the volumes of texts that have already been written about them, how many of us have ever read a single chapter paragraph about the nitty-gritty of passwords?
That’s why i have compiled the following three short lists which outline the most common misconceptions about passwords; the ways in which our passwords can be stolen; and the tools you need to make sure it doesn’t happen to you.

Each of these sections can be read in less than two minutes. But once you’re done, you will have acquired enough information to deal safely and confidently with your passwords.
Password Myths You Should Stop Believing
1. A file, folder, computer, or account protected by a password is safe.
Read the rest of the article and learn why that statement is no longer true.
2. Your passwords are secure as long as you only deal with reputable online businesses.
Major online businesses that serve tens of millions of customers worldwide are expected to hold a treasure trove of personal information – the favorite diet of identity thieves. Therefore, these companies are always in the crosshairs of the world’s most highly-skilled hackers.
Take these recent examples, for instance:
LinkedIn – A file with 6.5 million passwords from LinkedIn accounts appeared in an online forum based in Russia.
Yahoo – 450,000 usernames and passwords from Yahoo! were posted online
Sony (Playstation) – This massive breach involved 77 million Sony Playstation user accounts containing passwords and other personal information.
Reputable businesses like LinkedIn, Yahoo! and Sony should be implementing the strongest security countermeasures available. But even these are not strong enough to withstand attacks all the time…
3. A password input box that obscures characters as you type hides your password from prying eyes.
Password input box
The dots or asterisks displayed on a password input box are just meant to prevent people near you from seeing what you’re entering in there. How the password is actually stored or sent is a different story.
4. “Strong” passwords are difficult to compromise.
Even if your password is long and complex (e.g. a combination of uppercase and lowercase letters, numbers and other non-alphanumeric characters), if it is stored or sent in plaintext, you’re toast if the hackers get hold of it.
Plaintext means it can be viewed exactly the way it has been entered, using easily accessible tools. For example, if your password is Super$ecretp@Ss, a free downloadable tool like Ettercap enables your password to be viewed exactly in that form: Super$ecretp@Ss.
If, however, your password is encrypted, it means that it has been scrambled; it cannot be viewed using the same tool (Ettercap). It might be displayed something like this: xt%y&1sm^*gt;>2.
Unfortunately, many software applications still store and send passwords in plaintext. That is why hackers still find the first three items in the next section so effective.
5. Hackers use sophisticated tools to steal your password.
Actually, many successful hackers don’t require sophisticated tools to acquire passwords. Some simply use crafty conversational skills. In the highly publicised hacking of Wired Senior Writer Mat Honan, the hackers made extensive use of social engineering, a technique that relies heavily on the art of deception. More about this shortly.
In the meantime, let’s talk about how crooks can get a hold of your passwords.
Commonly Used Techniques for Stealing Passwords
1. Hacking into a server that stores passwords in plaintext
There are many ways to do this. I won’t delve into the technical details but they can range from sophisticated-sounding methods like an ‘SQL injection’ to “manual” methods like stealing the server’s hard disk.
Once the attacker gets into the system, passwords can be easily retrieved from the database because they are all in plaintext (as previously explained).
Considering the risks of storing sensitive data in plaintext, you’d think it would be unimaginable for big companies to store passwords in this manner. Well, think again. That’s exactly what Yahoo! did, which led to that massive data breach referred to earlier.
2. Operating as a man-in-the-middle
Man in the middle

In a man-in-the-middle (MITM) attack, an attacker hijacks communications between two machines (e.g. a server and a client, two clients, a router and a client, or a router and a server). He then sets up his computer to impersonate both legitimate machines and then makes it appear they are still communicating with one another.
As a result, all of their messages would pass through his computer, allowing him to view any information that is sent in plaintext; including usernames and passwords.
3. Luring gullible victims using trojans
Trojans are malware, disguised as downloadable programs, that hackers make available through harmless-looking emails or websites. That interesting downloadable freebie online, for example, might be a trojan…
Once downloaded, a trojan can stealthily perform whatever nefarious activity it is programmed to do. One common activity is recording keyboard strokes (keylogging), whenever the victim logs in to a “secure” site; another is scanning the memory and extracting what it suspects to be passwords (“memory dumping”). When done, the malware transmits this information to the attacker.
4. Employing social engineering
As mentioned earlier, this technique does not require any sophisticated hacking tool.
A commonly used social engineering trick (known as “phishing”) involves sending out fake notification emails informing users of a data breach at a legitimate website where the users have accounts. The email would then instruct the users to reset their passwords by clicking on a link that takes them to a spoofed website, closely resembling the real one.
The fake page asks the users to enter their username, old password, and new password. Those falling for that then pass their login credentials into the wrong hands.
Another example of social engineering is simply calling a company’s tech support, convincing them you’re someone else, asking for a password reset, and then requesting that the temporary password be sent to an email address you control.
5. Using brute force
Do you know what the crudest way of cracking a password is? Simple. You just make an educated guess.
You can base your guess on the user’s name and a bunch of dates important to him (e.g. his birthday or wedding day). If your first guess doesn’t work, you guess again. And again. And again. Until you get it correctly. Some systems don’t put a limit to the number of times you can enter a password.
Of course, this can take forever… unless you can automate the process.
Brute force attack programs like John the Ripper, Cain & Abel, or TCH Hydra, enable you to do just that. These programs can make a large number of rapid intelligent guesses…which is great for hackers, but not so great for the security of your passwords.
Now that you’re familiar with the common techniques used for stealing passwords, let’s take a look at what tools you can use to foil them.
Must-Have Tools for Maintaining Password Security
If hackers use tools to simplify and automate their exploits, then you should have your own tools to make it more difficult for them.
One thing to keep in mind when choosing a security tool, especially if you’re going to let other people use it, is that it should be easy to use, as well as providing the necessary level of security.
Once a security mechanism or tool is too sophisticated, end users will tend to avoid it. This will make you vulnerable again, and the time and money you invested into it will essentially go to waste.
Keeping that in mind, consider acquiring these tools:
A Password Generator – this helps you create passwords; especially handy if you’re tired of composing your own, and if you need very strong passwords. Here’s a tool that allows you to generate both simple and strong passwords: makeagoodpassword.com
A Password Strength Tester – If you really want to compose your own passwords, you should make sure they’re strong enough. Tools likehowsecureismypassword.net can help you determine whether your password is difficult to crack.
A Password Manager – This tool helps you securely manage all your passwords in one location and means you don’t have to remember multiple, complicated passwords. You can centralise all your passwords from your email accounts, blogs, social networking sites, online banks, and so on. Here’s a popular one that’s also free: KeePass
A Built-in Volume or Hard Disk Encryption – If you prefer to keep your passwords in files and save them in your desktop or laptop, the easiest way to secure them is to use your operating system’s built-in volume or hard disk encryption programs. Using them is pretty straightforward. In Windows, use BitLocker. And in Mac OS X, use FileVault.
An Encryption-Enabled Password Sharing Tool – When people send passwords to work colleagues they usually email them. However, many email services are vulnerable to man-in-the-middle attacks. Use a free tool like Firepass, which encrypts your password and sends it so that only the intended recipient can access it.
Just employing the above five tools will put you way ahead of the crowd; most people do not put enough thought into creating, storing or sending their passwords; it’s never too late to start getting serious about protecting your most confidential and sensitive information.
Thanks for reading this article carefully. If you did not read it well then my advice is read it again and Please comment your valuable feedback thanks smile emoticon

Friday, 20 March 2015

Yu Hai Jehovah

Jehovah yu hai, Jehovah yu hai, mataifa tumsifu Haleluya, Jehova yu hai.
Jehovah yu hai, Jehovah yu hai, watu wote tumsifu, Haleluya Jehova yu hai.
Jehovah yu hai.
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Jehovah yu hai.
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaa,
Haleluya, Jehovah yu hai
Eeeh Jehovah yu hai.
Jehovah yu hai,
Yu hai siku ya leo,
Jehovah yu hai,
Eeh mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Eeeeeh Jehovah yu hai.
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaa,
Haleluya, Jehovah yu hai
Avunjavunja uta wa adui zetu eeh, Jehovah yu hai,
Wanadamu tumwimbie eeh, Haleluya, Jehovah Yu hai,
Aliyeshika makanwa ya simba, kamwokoa Daniel, leo yu hai,
Makabila tumwimbie ee, Haleluya, Jehovah yu hai
Jehovah yu hai.
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Eeeh Jehovah yu hai.
Jehovah yu hai,
Yu hai Tanzania,
Jehovah yu hai
Eeh watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaa,
Haleluya, Jehovah yu hai
Aliwasikizisha washami, kishindo cha wakoma, wakakimbia, yu hai
Makabila tumwimbie eh, Haleluya, Jehovah yu hai.
Aliyeifanya mifupa mikavu kuishi, wakati wa Ezekiel, leo yu hai,
Watu wote tumwimbie eh, Haleluya, Jehovah yu hai
Jehovah yu hai,
Jehovah yu hai,
eh,
Yu hai milele,
Jehovah yu hai
Mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehova yu hai
Eeeh Jehova yu hai.
Jehova yu hai,
Yu hai siku ya leo,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaa,
Haleluya, Jehovah yu hai
Aliyegawa bahari ya sham, yeye eh, leo yu hai,
wanadamu tumwimbie, Haleluya, Jehovah yu hai,
Aliangusha kuta za Jeriko, leo, yeye yu hai,
Makabila tumwimbie, Haleluyah, Jehovah yu hai.
Jehovah yu hai,
Jehovah yu hai,
eh,
Yu hai milele,
Jehovah yu hai
Eeh Mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Eeeh Jehovah yu hai.
Jehovah yu hai,
Yu hai siku ya leo,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaa,
Haleluya, Jehovah yu hai
Eeeh Jehovah yu hai,
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Eeh Jehovah yu hai,
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Wajane msilie tena, maana, Jehovah yu hai
Atawafanya adui zenu kusujudu miguuni penu ninyii, Jehovah yu hai
Aliyemfufua Lazaro kutoka kwa wafu, nasema yu hai,
Mataifa tumwimbie eh, Haleluya, Jehovah yu hai
Jehovah yu hai,
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh Mataifa tumsifu eeeh,
Mataifa tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Eeeeh Jehovah yu hai,
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Aliyesimamisha jua wakati wa Joshua, nasema yu hai,
Tanzania tumwimbie eh, Haleluya, Jehovah yu hai.
Aliyemwangusha Dagon, mungu wa wafilisti, nasema yu hai
Dunia yote tumwimbie eh, Haleluya, Jehovah yu hai.
Jehovah yu hai,
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeh Mataifa tumsifu eeeh,
Mataifa tumsifu,
Haleluya, Jehovah yu hai
Aliyerejesha nguvu zake Samson yu hai
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Atakushindia yeye yu hai
Jehovah yu hai,
Yu hai milele,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Aliyegawa bahari yu hai
Jehovah yu hai,
Tuimbe Yu hai milele,
Jehovah yu hai
Eeeh Watu wote tumsifu eeeh,
Watu wote tumsifu, Aaaah,
Haleluya, Jehovah yu hai
Jehovah yu hai, yu hai mileleee.

Saturday, 14 March 2015

Baba wa Mbinguni

Baba wetu wa mbinguni tunaleta sifa kwako,
Wewe hulinganishwi, na yeyote duniani.

Baba, baba wetu eeehhh, tunaleta sifa kwako,
Wewe hulinganishwi, na yeyote duniani.


Makerubi na maserafi, wainama mbele zako.
Sisi wana wako, tunakupa sifa leo

Friday, 27 February 2015

Worship Night Practice

Naliinua jina lako Yesu, Pokea sifa Nakuabudu (Repeat)
Nafsi yakuhimidi Ewe Bwana Mungu wangu (Repeat)


Wewe ni Bwana Juu ya mabwana ufalme wako wadumu milele....

nimesikia ukitajwa mitaani
nakanisani waziimba sifa zako
yasemekana wewe ni muweza yote
hakuna jambo lolote likushindalo
na shida zetu (unatatuaa)
na wagonjwa (wewe waponyaaa)
ata na wafu (umewafufuaaa)

nashangaaaaaa.....

wewe ni yule yule
mungu wa musa yule
na wa jakobo yule
anayeponya yule
anayependa  yule
mungu wa musa yule
na wa yakobo yule
anayeinua yule
anabariki yule
yule,yule,yule lelelele.
lelelelelle
haubadiliki kamwe

Friday, 20 February 2015

Understanding seasons by Bro. Cliff

Season: What is it?
A time characterized by a particular circumstance or feature
Suitable natural time or occasions
A different period of time
One of the four periods (Autumn, winter, summer and spring)

Introduction
Season appear to every human being. Seasons are sometimes confusing. That is we don't understand what season we are in.


Joshua 24:7 New International Version (NIV)

But they cried to the Lord for help, and he put darkness between you and the Egyptians; he brought the sea over them and covered them. You saw with your own eyes what I did to the Egyptians. Then you lived in the wilderness for a long time.
Seasons are subject to change
Daniels 2:1
Ecclesiastes 3:1

A Time for Everything

There is a time for everything,and a season for every activity under the heavens:

Types of seasons:
Season of testing/temptation - a season in darkness. Exodus 5:1-23. In this season there are two part:
Giving in to temptations
Endure hardness
Season of rest

Jeremiah 6:16

New International Version (NIV)

16 This is what the Lord says:
“Stand at the crossroads and look;
    ask for the ancient paths,
ask where the good way is, and walk in it,
    and you will find rest for your souls.
    But you said, ‘We will not walk in it.’
Matthew 11:29
Patience
Getting impatient 
Time can either be long or short
Season of fruitfulness. Your life starts paying off.
Season of laboring
Season of reaping after you've sown(You can only reap where you sowed)
Seasons are normal

How to transit or move from one season to another

  1. Setting up goals. Recognizing ending of the season you are in... whether they have good or bad results it's part of life
  2. Lean on Jesus to help you grow.
  3. Carry the lessons forward to the next season
  4. Embrace the new beginning
  5. Live in the present

Understanding seasons:
  1. Never let the seasons to determine who you are in lufe
  2. Most seasons are followed by opposite seasons
  3. We need to be consistence in every season
  4. Do the work that the season you are in requires
  5. Seasons are not permanent, they are seasonal:
  6. Work through the seasons you are in.
  7. Prepare for the next season
  8. God is above every season

Wednesday, 14 January 2015

English Swahili vocabularies


Resistor-----------kikinzani
Power Saw-------Msumeno oto
Sensor-----------Kisimbuzi
Lap Top---------Kipakatalishi
ICU--------------Kisadaruki
Microwave-----Tanuri ya miyale
Memory Card-----------Kadi sakima
SIM card----------Kadiwia/mkamimo
Scratch card------------Kadi hela
Business card-----Kadikazi
Identity card----Kitambulisho
ATM---------- -Kiotomotela
Nutrients ----- -Virutubisho
Starch---------- ---------Nisha
Stigma--------- ----------Ntwe
Nectar---------------Mbochi
Humus---------------Mboji
Germ cell----------Celizazi
Femur---------------Fupaja
Green house-------Kivungulio
Esophagus--------------Umio
Sunflower---------------Alizeti
Weevil-------------Fukusi/dumuzi
Distillation--------Ukenekaji
Evaporation-------Mvukizo
Dissolve ----------Uyeyushaji
Stagnant----------------Tuame
Synthesis---------Uoanishaji
Monitor-----------Muwazi
Processor---------Kichakato
Computer Virus-----Mtaliga
Floppy Disk-------------Diski tepetevu
Mouse-----------Kipanya/kisakura
Slot----------------Upenyu
Flash Disk--------------Diski mweko
Scanner-----------------Mdaki
Keyboard-------Kicharazio
Force of Gravity-------Kani ya mvutano
Certificate-----Astashahada
Diploma--------Stashahada
Degree------------Shahada
Masters----------------Uzamili
Phd----------------Uzamivu
Sausage---------------Soseji
Kebab-------------Mshakiki
Crisps--------------Kaukau
Chips-------------------Vibanzi
Juice---------------Sharubati
Password--------------Nywila
Zebra Crossing-------Kivuko milia
L