Reference

Tuesday, November 27, 2018

ALL ABOUT SPEED GOVERNORS - KENYA LEGAL MATTERS

Kenya legal requirements
According to the law, speed limits in Kenya depend on type of settlement, road and vehicle. In trading centers, towns, municipalities and cities, the limit is 50km/h, elsewhere; it is 80km/h on single carriageway highways and 110km/h on dual carriageways. The limit is 30km/h near schools.

What is a Speed Governor/Speed Limiter.
speed limiter is a governor used to limit the top speed of a vehicle. For some classes of vehicles and in some jurisdictions they are a statutory requirement, for some other vehicles the manufacturer provides a non-statutory system which may be fixed or programmable by the driver.
Vehicle Speed limiter or Speed governor is a device used to restrict the top speed of the vehicle for security reasons, widely used in public service vehicles (buses, school buses) and heavy goods vehicles. Normally speaking, the vehicle is already equipped with an onboard speed limit system prevent the vehicle exceeding certain speed. 
 
However in reality usage, the traffic might get dangerous with the pre-controlled speed, especially for school buses, public buses, and heavy construction trucks. Then external speed limiter (speed governor) is needed to ensure the public security.
The throttle is a mechanism used to control the inlet gases so as to increase or decrease vehicle speed. Typically, the throttle is a butterfly value placed on the entrance of the intake manifold in a fuel-injected engine or in the carburetor in a carbureted engine. Usually the throttle valve is connected and controlled with a throttle pedal in vehicles.



Types of Governors
The type of governor used on diesel engines is dependent upon the application required. The six basic types of governors are as follows:
1.      Mechanical centrifugal flyweight style that relies on a set of rotating flyweights and a control spring; used since the inception of the diesel engine to control its speed.
2.      Power-assisted servo mechanical style that operates similar to the mechanical centrifugal flyweight but uses engine oil under pressure to move the operating linkage.
3.      Hydraulic governor that relies on the movement of a pilot valve plunger to control pressurized oil flow to a power piston, which, in turn, moves the fuel control mechanism.
4.      Pneumatic governor that is responsive to the air flow (vacuum) in the intake manifold of an engine. A diaphragm within the governor housing is connected to the fuel control linkage that changes its setting with increases or decreases in the vacuum.
5.      Electromechanical governor uses a magnetic speed pickup sensor on an engine-driven component to monitor the rpm of the engine. The sensor sends a voltage signal to an electronic control unit that controls the current flow to a mechanical actuator connected to the fuel linkage.
6.      Electronic governor uses magnetic speed sensor to monitor the rpm of the engine. The sensor continuously feeds information back to the ECM (electronic control module). The ECM then computes all the information sent from all other engine sensors, such as the throttle position sensor, turbocharger-boost sensor, engine oil pressure and temperature sensor, engine coolant sensor, and fuel temperature to limit engine speed.




Thursday, November 22, 2018

Top four Security Threats to Windows 10


Top four Security Threats to Windows 10
                                                                               
After its release in July 2015, Windows 10 has earned its stripes as being more secure than its predecessors. With the new browser Edge and Windows Defender under its wings, the new Microsoft Operating System (OS) became an instant hit among the Windows connoisseurs.
But beyond the hype there lies a sad truth; nothing is 100% secure in the savage world of internet and over time people have discovered that Windows 10 comes with its own share of security flaws. In this article, we address the security loopholes that cripple the popularity of Windows 10, and offer tips on how to overcome them.

Phishing Business
No matter what sophisticated security tools your computer is equipped with, criminals will always be able to make inroads to a network through the weakest security link – the user. Using manipulative tactics to coax users into succumbing to security breach is the easiest way for hackers and cyber-criminals to make profits. Dubbed as a social engineering method, phishing emails exploit the human vulnerability to spread malwares or spy on people’s data.
No technology is above human intelligence, so Windows 10 users can’t really count on their trusty workhorse for anything better. Soon after the release of Windows 10, scammers started circulating emails disguising them as official updates from Microsoft. But as an aware netizen, you should know that Microsoft rarely sends out updates through email, but pushes them through the Windows Updates program. The only way users can curtail well-devised social engineering attempts is by not clicking on dubious email links and attachments.

Double Edged Sword
Granted, Microsoft swanky new browser Edge is way ahead of its ailing predecessor Internet Explorer in terms of performance and security. Yet, Windows power users have raised their eyebrows to the fact that the Edge has Flash and PDF Reader as its built-in plug-ins, both Adobe products known for having a past of being hackers’ delight to exploit. From our recent memory, Adobe Systems in July last year hastily issued patch updates for its Flash media player to get rid of two critical zero-day vulnerabilities users found it the program.
Likewise, a report by Secunia software company, Adobe Reader’s versions 10 and 11 were found to have 39 and 40 vulnerabilities and – because the patch updates were so frequent – they left 65% and 18% of PCs prone to new attacks respectively.
Drive-by Attacks
Windows Defender is not capable enough (on its own) to fend off all malware attacks that seeps into your system, and especially not the sneaky ones that stealthily transfer from dodgy websites to your PC through drive-by attacks. Microsoft has a self-touted anti-malware product that is dissed by independent lab tests as incompetent. And again, the problem only worsens if you count on using Edge for your internet excursions. On the other hand, Google’s Chrome is pretty adept at blocking drive-by attacks through its malicious website blocking system. But that is just a secondary layer of protection, and applies only to Chrome fanatics. What you should be aiming at is to have a powerful anti-malware product to run a crusade against malware threats.
There are many free anti-malware software’s that are as good as the paid ones, and do a wonderful job of combating malware attacks.

Virus Threats
One of the good things about Windows Defender is that it replaces an out-of-date security products and replaces itself by default to consolidate the security gates. Additionally, it automatically uninstalls outdated programs that can be used as a possible link by viruses to infiltrate a PC. But despite the best of intentions, Windows Defender falls short in performance and can only do so much – as confirmed by the below average reviews it received in independent lab tests.
To reiterate, there are third-party antivirus anti-malware software’s that come at no cost and yet go a long way in virus protection.


Saturday, August 25, 2018

How to Fix Bluetooth problems in Windows 10

Fixing Bluetooth problems in Windows 10

Connecting your Windows 10 PC to different Bluetooth devices lets you do a lot of things on your PC. For example, you can:

ü  Use a Bluetooth mouse or keyboard.

ü  Share files over Bluetooth with other tablets, laptops, PCs, and phones. 

ü  Play music over Bluetooth speakers or headphones.  

ü  Use Speech on your PC.

ü  Track your fitness by using a fitness sensor.

If you’re having problems with Bluetooth on your PC, check out some of the questions and answers below to try to fix things.

To check it, click the Windows notification icon on your taskbar in the bottom-right corner of your screen. If you don’t see a “Bluetooth” tile, click the “Expand” button. If the “Bluetooth” tile is grayed-out, your Bluetooth radio is turned off. Click it to turn it back on—the tile will turn blue to show the change.



Ø  You can also head to Start Menu>Settings > Devices > Bluetooth and Other Devices and toggle the “Bluetooth” switch until it turns blue – if it does not there are chances that either the computer does not have the Bluetooth hardware or you need to do windows update

 


If already connected but not working, right click/remove the device and try reconnecting again.

Ø  NB: Over 3 years we have been experiencing failure in Bluetooth after either windows updates or corruption in specifically win 7 and windows 8, but for windows 10, just an update is enough.

Ø  Restart your PC; This helps to clear any clogged settings.

Ø  Ensure the receiver is powered on and in the right distance. Shortest Distance during testing not more than two meters, one can extend after connection. This will help to overcome the interferences. physical obstacles (like thick walls), and devices like microwaves can all block or degrade a Bluetooth connection.

Ø  Windows 10 automatically installs drivers for devices that connect to it, but only when those drivers are available on your PC or through Windows Update. In most cases, though, Bluetooth devices (especially keyboards and mice) should work fine right out of the box.

Ø  If Windows can’t find the correct drivers for your Bluetooth device, however, it won’t work. If this happens, check the device manufacturer’s website to see if it offers a driver for your device. If so, download and install it, and that should resolve the problem.

Ø  This also applies to the Bluetooth radio itself. If the drivers for your Bluetooth chipset aren’t installed automatically, Bluetooth won’t work on your PC. Visit the PC manufacturer’s website or, if you built the PC yourself, check the motherboard manufacturer’s website for supported drivers.

Ø  You might also find that a new Windows update has impacted your device, requiring updated drivers. In most cases, Windows will look for and install updated drivers automatically. If it doesn’t, though, visit the device manufacturer’s website and install the latest drivers.

Ø  To see whether your Bluetooth device is installed, you have to check the Windows Device Manager. 



To do this, right-click the Windows Start button and click “Device Manager.”-Update automatically for the updated drivers.

 


Ø  If the following ways fails, you can opt to incorporate an external Bluetooth-adapter (picture below), that goes for $6.5 or KSH.650.

It does not require any configurations. This card is able to support all external Bluetooth requirement. For example, you can connect with external Bluetooth speaker. If the problem is not solved,

buy







Friday, August 10, 2018

CCTV CAMERAS INSTALLATION AND DVRS IN EMBU,THIKA,KIRINYAGA,NAIROBI

Why do I need CCTV CAMERAS?
Accessing your residence and organization’s possible risk elements is one of the important steps in creating a security program. In the wake of illicit happenings, providing security to the business and home environment is extremely important. Have you ever thought about the implementation of CCTV security surveillance at your home or office premises? Definitely, it’s one of the finest systems that extend an additional line of protection to your important assets and premises. The challenge of the surveillance is perfectly benign in the hands of CCTV systems. Once you have clearly identified the risks and vulnerabilities, now that it’s time to install the latest CCTV security systems. CCTV security surveillance will not just increase the protection, but will also enhance the employee productivity as well.

How do CCTV Cameras Work?
CCTV stands for closed circuit television and it is used in buildings and homes for security purposes. The good thing about CCTV system is that it can use two or more cameras. How do these cameras work? Well, they are just like the ordinary video cameras although they have several unique features. For instance, they come with monitors that help them to operate on their own. They can also use wireless transmission to send images to monitors. Once the monitor has received the images, it sends them to the video tape or DVR. These cameras also have the ability to zoom in and out depending on the type of lenses they have.

As Kenya computer Technicians co-operation, we are committed to serve our customers in the best way possible to their satisfaction.



Tuesday, August 7, 2018

Top up your Safaricom, Airtel or Telkom airtime and buy internet bundles with mobile money or your debit/ credit card.

  1. HOW TO BUY AIRTEL CREDIT FROM  MPESA.
  2. Click on the safaricom toolkit to open your Mpesa.
  3. select  Lipa na M-PESA
  4. Select paybill.
  5. click Enter busineess number '220220' and click ok
  6. Enter your Airtel/Telkom number as the account number and click ok
  7. Enter amount(credit/airtime) of your choice and click ok
  8. Enter your pin number and click ok
  9. Confirm the transaction and wait a few minutes.You will receive your airtel/Telkom-airtime text sms.
  10. You have successfully carried out the transaction.


NOTE:The confirmation text will read CODE confirmed ksh.... sent to pesapal for account.(your Airtel/Telkom number)....
The transaction is free









Wednesday, August 1, 2018

HOW TO GET WIFI PASSWORD FROM MY PC IN ALL WINDOWS


Password tricks .
If you forgot your Wi-Fi network password, you can find it if you have another Windows PC already connected to your Wi-Fi network. After you find your password, you can use it on another PC or device to connect to your Wi-Fi network.
1.       On a Windows PC that’s connected to your Wi-Fi network, do one of the following, depending on which version of Windows is running on your PC:
·         On Windows 10, select the Start  button, then select Settings  > Network & Internet  > Status  > Network and Sharing Center.
·         On Windows 8.1 or 7, search for Network and, then select Network and Sharing Center from the list of results.
To learn how to find out which version of Windows you have, see 
Which Windows operating system am I running?
2.       In Network and Sharing Center, next to Connections, select your Wi-Fi network name.
3.       In Wi-Fi Status, select Wireless Properties.
4.       In Wireless Network Properties, select the Security tab, then select the Show characters check box.
Your Wi-Fi network password is displayed in the Network security key box.

Sunday, June 24, 2018

How to recover your KRA-ITAX password (forgot/change password)

Requirements.
Valid email in the Kra systems: The email you used during Kra registration.
If your email is not active please try to recover it with your mail server if it fails

How to recover your KRA-ITAX password (forgot/change password)
  • Open the Kra portal
  • On the menu bar click Kra online services tab.
  • Enter your Kra pin.
  • Click forgotten password below Password textbox.
  • The new page will require you to enter some mathematics answer ie(2+34).
  • After filling the details. Submit.
  • Open your Mail and refresh your inbox.
  • You will find your new password as a new inbox mail.
  • Use it to Login in the Kra portal. Note don’t copy paste.
  • Login should be successful where at the beginning you will be required to set new password.
By now you will have finished the setting.
The best password should be like this:  mhgD23.uJ  as required by Kra system.

REPLACE OR CHANGE MY EMAIL IN THE KRA PORTAL -KENYA


It’s very frustrating to know that one has an invalid email in the Kra portal,yet he is required to recover the Kra account through the same email.
Follow these steps.
  • Create a valid gmail account, I prefer Gmail to other mail account.
  • Ensure that it working with ease
  •  Send your ID copies coloured to callcentre@kra.go.ke. 
OR


  • With your valid National ID and Pin Number (optional) visit the nearest Huduma center where the will replace for you.Then you can be able to file your returns.

KRA PENALTIES AND OBLIGATIONS

Did you know you may be in a risk of penalties.
Check yourself against the following list of kra Obligations.

Offenses and Penalties
All registered taxpayers are required by Law to adhere to the above-mentioned obligations but as a measure to enforce and enhance compliance, the VAT Act spells out certain offences and respective penalties.

These include: -
1. Failure to register – fine not exceeding Kshs.20, 000 or imprisonment for a term   not exceeding six months or both
2. Enforced registration – default penalty of Kshs. 100,000
3. Failure to submit a return on or before the due date or submitting a payment return without paying the tax due – default penalty of Kshs.10, 000 or five percent of the tax due whichever is the higher and additional interest of 2% per month compounded.
4. Failure to keep proper records – a default penalty of between Kshs.10, 000 to Kshs.200, 000
5 Fraudulent Accounting – a fine not exceeding Kshs.400, 000 or double the tax evaded whichever is greater or imprisonment for a term not exceeding three (3) years or both.
6. Failure to issue a Tax Invoice – an automatic penalty of not less than Kshs.10, 000 but not exceeding Kshs.100,000/=.
7. Hindrance or obstruction of authorized officers
8. Uttering false statements      
9. Charging tax when not registered – tax shown on such invoice is due to the Commissioner within seven (7) days.
10. Failure to display a certificate of registration – a default penalty of Kshs.20, 000 and a fine not exceeding Kshs.200, 000 or imprisonment for a term not exceeding two (2) years or both.
11. Failure to comply with VAT regulations       
12. Failure to pay tax and late payment
Note: For offences, which no specific penalty is provided, a general penalty of a fine not is exceeding Kshs.500, 000 or imprisonment for a term not exceeding three (3) years or to both is applicable. 

ALL PROBLEMS ENCOUNTERED IN ITAX - KENYA ,CYBER- SOLUTIONS

Embracing digital services has never been just a walk in the pack; it always comes with its challenges. That's why, as Kenya computer Technicians we are out to stand with you in such a time.
It’s a common mistake that most Kenyan citizens just opened an Itax account in a particular cyber, got a Kra Certificate card, left and forgot about it.
We forgot to ask very important questions, like my new Kra password, if the Gmail account is valid, if the cyber guy created a new Gmail for me, where is its password? I have also come across a client who during Pin registration were added a VAT obligation; The worst of all is that I have even encountered clients whom cyber-guy guessed their email, what an awful cyber practice!
How will the customers recover their itax portal credentials without valid email?
However we are out here to help you fix every mistake at at time.




Solutions.
Conclusion. 
It’s therefore important to take note of the following details during registration/filling returns.
A.   Your Kra pin which is in a card
B.   Your new Kra password.
C.   The email used in the Kra registration process and its password.
D.   Ensure that the details displayed in the card match with those in your National Id, especially date of Birth,Id No and Your Name.




Saturday, June 16, 2018

Made a mistake in filling Kra Returns ..Wrong KRA Returns,How to edit KRA returns

How to Amend KRA Return

1.    Login into system with PIN.
2.    Click on File Amended Return under the Declaration tab link from menu for opening Amended Return filing form.
3.    For Taxpayer login Select Type field will be disable with default value Self and for the Agent or IA login value will be enable. Select value from list. 
Select Self for filing self-amended return and select Client for filing the client amended return.
4.    For Taxpayer login Taxpayer PIN field will be read only with default Taxpayer PIN value. For Agent or IA login if the value for Select Type will Self then field will read only with the logged in Taxpayer PIN value while in case of Client filed will be enterable. Enter the correct PIN of client for whom agent want to file amended return.
5.    Select Tax Obligation value from dropdown. Dropdown will show the list of registered obligation for the PIN entered in to the Taxpayer PIN value.
6.    Click on Next button to navigate to next page.
7.    Fill basic Return information.
8.    Click on Download button to download filled Excel/ODS.
9.    Make the required changes in the sheet and generate unloadable
sheet.                   
10.   Fill basic Return information and browse uploadable sheet.
11.   Click on Submit button to submit amended return data.
12.  System will check for the business validation. IF any validation fails then system will shows the File Section and Error Description.
13. Click on Download Returns Receipt to download generated acknowledgement receipt.
14. Click on Click here For Payment button to navigate to payment screen.
NB/ This process can only take place once and therefore one need to have optimum concentration.Otherwise another mistake may lead to locking of your account.

Friday, June 15, 2018

How to file Nil returns in Kra Portal

1.     Open the kraPortal 
2.     Enter your Kra pin in the Textbox and click Continue
3.     If you don’t have an account click Register and follow the steps.
4

5.     Enter your KRA  Password, incase you forgot your password click here for guide on how to reset the password Forgot kra password.
6.     Recently the Kra updated their systems where you are required to send verification as received in your email. For example verification code is :  8210
7.     After verification on the menu bar at the top, click Returns and in the drop-down select File Nil returns.
8.     For Taxpayer login Select Type field will be disable with default value Self and for the Agent or IA login value will be enable. Select value from list. Select Self for filing self return and select Client for filing the client return.

9.     For Taxpayer login Taxpayer PIN field will be read Only with default Taxpayer PIN value. For Agent or IA login if the value for Select Type will Self then field will read only with the logged in Taxpayer PIN value while in case of Client filed will be enterable. Enter the correct PIN of client for whom agent want to file return.
10.    Select Tax Obligation value from drop down. Drop down will show the list of registered obligation for the PIN entered in to the Taxpayer PIN value.
11.    Fill basic Return information as required in the form.
12.   Click on Submit button to submit return the data.
13.Click on Download Returns Receipt to download generated acknowledgement receipt.


Tuesday, May 22, 2018

CAR TRACKING

CAR-TRACKING SERVICES.

What is GPS.

Global Positioning System tracking is a method of working out exactly where something is. A GPS tracking system, for example, may be placed in a vehicle, on a cell phone, or on special GPS devices, which can either be a fixed or portable unit. GPS works by providing information on exact location. For instance, a GPS tracking system can be used by a company to monitor the route and progress of a delivery truck.

Mobile Phone Tracking

The development of communications technology has long since surpassed the sole ability to access others when they are mobile. Today, mobile communication devices are becoming much more advanced and offer more than the ability to just carry on a conversation. Cell phone GPS tracking is one of those advances.

All cell phones constantly broadcast a radio signal, even when not on a call. The cell phone companies have been able to estimate the location of a cell phone for many years using triangulation information from the towers receiving the signal. However, the introduction of GPS technology into cell phones has meant that cell phone GPS tracking now makes this information a lot more accurate.

 CAR-TRACK/MOTORBIKE-TRACKERS

Fleet Management System for Taxis, Car Hire, Commercial Vehicles. Always Know the Location of Each and Every One of Your Fleet Vehicles.

Unique features.

a)      Real-time-tracking.

b)      Geo-fencing control

c)      Use the most dependable network support in your choice.

d)     Fleet Management System.

e)      One month History routes.

f)       Has an in-built battery. Can work without power –source for 72hrs.

g)      Record speed, time and direction.

h)      Give alerts in SMS.

i)        Can stop the vehicle remotely.

j)       Offer 24hrs customer-care.





FORGOT WINDOWS 10 LOCAL ADMINISTRATOR PASSWORD BUT I CAN REMEMBER THE PIN, THUMB PRINT.

HOW TO REMOVE WINDOWS 10 LOCAL ADMINISTRATOR PASSWORD WITH COMMAND PROMPT?

As Kenya Computer Technicians we would like to appreciate your visit to our site.

Solution 1: using command prompt (cmd).

a)    Sign in your win 10 using your thumb print or your pin.

b)    Go to search box in the start button at the bottom-left and type CMD.

c)     In the Command prompt icon, right click and select administrator to get administrative privileges.

d)    Type the following command to prompt new password setting. 

e)    command:  net user Administrator *

f)     Press enter and you be requested to enter your new password.

 


NB/Don’t ignore the asteric * at the end of the line code.

 

After this process you can restart your device and take a cup of tea to allow the

new setting configuration.

MY LAPTOP BLINKING WHITE ON THE CHARGING AND CAPSLOCK. BACK -SCREEN

 Sometime you may experience this problem. It abit disturbing since it has several causes. When a laptop do not even run the fan,it may even...

Contact Form

Name

Email *

Message *