Scholarships and Tech Hub

Scholarships and Tech Hub Cyber Security professional, ethical hacking and project management.

30/05/2025

SARKIN AREWA NUPE SYMPATHIZES WITH THE PEOPLE OF MOKWA OVER TRAGIC FLOOD INCIDENT

Alhaji Ismail Usman Sarki, MNSE, the Sarkin Arewa Nupe, extends his heartfelt condolences to the government and good people of Mokwa Local Government Area following the devastating flood incident caused by heavy rainfall from last night until this morning.

The tragic occurrence has sadly led to the loss of approximately 60 lives and the destruction of homes, properties, and livelihoods. In this moment of deep sorrow, the Sarkin Arewa Nupe shares in the grief of the affected families and prays for Allah’s mercy upon the departed souls, strength for the bereaved, and quick recovery for those injured.

He describes the incident as a painful and unfortunate natural disaster that has brought sorrow to not just Mokwa but the entire Nupe Kingdom and beyond. He urges the people to remain strong and united during this period of grief and to continue to offer support to one another.

Sarkin Arewa Nupe also appeals to local, state, and federal authorities—as well as non-governmental organizations and well-meaning individuals—to come to the aid of the victims through relief efforts, shelter, and long-term recovery assistance to help rebuild their lives.

May Allah (SWT) grant eternal rest to those who lost their lives in this tragic event. May He grant their families the strength and patience to bear the loss, heal the injured, and restore what has been lost. May this kind of calamity never befall us again. Ameen.

Muhammad Kudu Muhammad
General Secretary,
Nma Yaramatu Memorial Foundation
29th May, 2025

14/08/2024

All expenses covered fellowship to the United States for youths 25 - 35yrs.
👇🏽👇🏽

13/08/2024

Get financial assistance to study in America

Apply if you have

-A high school diploma
-Bachelors degree
-Or Masters degree
-Jobs available for Masters and PhD students.

Application link in comments. 👇🏽👇🏽

Hong Kong PhD fellowship is the most generous scholarship I know.There could be others, maybe I didn't pay attention.Thi...
12/08/2024

Hong Kong PhD fellowship is the most generous scholarship I know.

There could be others, maybe I didn't pay attention.

This year they increased the slots to 400 from 300.

It is available Sciences, Medicine, Engineering and Technology
Humanities, Social Sciences and Business Studies

Link in the comment.

12/08/2024

Let us all win 🏆

Here are 50 Afriacn Union Internship positions:
⤵️

06/08/2024

Protest in Nigeria is taking another turn... 🥺💔

30/05/2024

Shout out to my newest followers! Excited to have you onboard! Fatima Adamu, Yahaya Saidu Bida

20/10/2023

Tech Series (episode six)

Today we are continuing with our Cyber letters P. We treated Cyber letter D earlier.

What is PGP?

PGP stands for pretty good privacy, an encryption system used for sending and managing encrypted emails and files.

Encrypting the data and content of emails makes this method of communication more private, which is why PGP is used by those dealing with sensitive information.

PGP is also used for decrypting emails, which ensures only the recipient can interpret the message sent directly to them.

Pe*******on testing
Pe*******on testers, or pen testers for short, perform simulated cyberattacks on a company’s computer systems and networks. These authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them.

Phishing
Phishing is a form of fraud that involves contacting victims through email, telephone, or text to trick them into sharing personal information. Typically, phishing scams aim to persuade victims to transfer money, reveal financial information, or share system credentials.

Programming
Programming refers to a technological process for telling a computer which tasks to perform in order to solve problems. You can think of programming as a collaboration between humans and computers, in which humans create instructions for a computer to follow (code) in a language computers can understand.

Go ahead and Smash that LIKES button, feel free to SHARE and 👉FOLLOW ME👈 for more!!!

16/10/2023

Tech Series (episode five)

Today we shall be treating Cyber letters D

Dark web
The dark web or darknet is a part of the World Wide Web only accessible through special software or tools. This keeps its users and visitors hidden because they often exchange illegal and stolen information, such as people’s personally identifiable information. This information may include Social Security numbers, phone numbers, and credit card numbers.

Decryption
Decryption is the process of converting coded or encrypted data to its original form. Decryption allows information to be understood without an encryption key.

Defense-in-depth
Defense-in-depth is the concept of stacking several layers of security, so backup protection is available if one fails.

Detection deficit
A detection deficit is a gap between the time an attack occurs and the time it is discovered. This term refers to the severity of attacks and how long they can cause harm undetected.

Distributed denial of service (DDoS) attack
DDoS, or distributed denial of service, occurs when a cybercriminal floods a server with traffic to prevent users from accessing a network, site, or system.

Domain
In cybersecurity terms, a domain is a group of connected computers. They typically share account information and security policies. A domain controller handles relevant administrative tasks

Go ahead and Smash that likes button, Share and Follow Me for more!!!

Address

Bida

Telephone

+2347061632826

Website

Alerts

Be the first to know and let us send you an email when Scholarships and Tech Hub posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Scholarships and Tech Hub:

Share