How to be Led by the Spirit of God

Christ is Coming, Prepare to Meet the Lord

We see in the Book of Acts the LORD places much importance on being led by the Spirit of God in ministry and for guidance in all situations in life. If we learn how to truly hear from God we can: navigate through all deceptions & confusion and walk in truth; discern between true & false prophecy or predictions; make right life choices; be alert to either dangers or opportunities before us; and know what ministries areas to be involved in or help support.

Even for Internet sites, the media, churches or the many claims made in some You Tube videos that could be true or complete falsehood, He is here to lead us into all truth. There are other important issues in doing this such as correct bible doctrine, following the word of God, prayer, obedience etc, however this teaching is purely about the aspect of being led by…

View original post 1,581 more words

A High School Teacher’s List of 50 “wisest” words.

My Elusojian


So i found this list on tumblr and i couldn’t help but smile at some of the things mentioned on the list. I don’t know if i would go as far as calling them “wise words”, but truth is, they actually do make sense. Go through the list. you’ll find it quite useful. feel free to drop yours too if you have any!

1. There are plenty of ways to enter a pool. The stairs is not one of them.

2. Never cancel dinner plans by text message.

3. Don’t knock it ‘til you try it.

4.If you’ve made your point, stop talking

5. Know at least one good joke

6. When entrusted with a secret, keep it.

7. Don’t underestimate free throws in a game of ‘horse’.

8. Just because you can doesn’t mean you should.

9. Don’t dumb it down.

10. You only get one chance to notice…

View original post 387 more words


When I say “Ethical Hacking”

In computer security, a hacker is termed as someone who performs a thorough search and seeks to exploit weaknesses and loop-holes in a computer network. A lot of reasons has been known to motivate this kind of act, some of which are:

–          Profit making, e.g. hacking financial institutions or accounts,

–          Protest, e.g. a disgruntled or unhappy worker could hack into his/her organization’s network just to destabilize the system and

–          Challenge, which could rise up among geeky friends.

Recently in the society, the work of hackers has been viewed as providing a “public service”, as it now reveals and exposes some lies that have been believed to be the truth, and establishes ways to verify them.

However, there are hackers who perform hacking, not to destroy, but to create and attempt to achieve only good ends, they are known as “White Hat Hackers”, and this category is what this write-up is about: Ethical Hacking.

Ethical Hacking is a term that was coined by IBM. It is term that describes hacking performed to assist an organization or a person in identifying possible threats, security risks and exposures on the computer or network. An ethical hacker attempts to bypass the system security panel, seeking weak points in the security that could be exploited by other hackers (Black Hat Hackers). The company or client that employed the services of the ethical hacker uses what the ethical hacker finds to improve on security architecture of their systems and networks, in an effort to minimize, and possibly eliminate, any potential hacker attacks.

Rules guiding Ethical Hacking

In order for hacking to be deemed ethical, the hacker must obey the below rules.

  1. The ethical hacker must have permission to probe the network and attempt to seek and identify potential security risks and threats. It is recommended that he/she gets written consent.
  2. The hacker must respect the individual’s or company’s privacy and only go looking for security issues.
  3. He/she must report all security vulnerabilities detected to the company, not leaving anything open for himself/herself or someone else to come in at a later time.
  4. The software developer or hardware manufacturer must be made aware of any security vulnerabilities located in their software or hardware if not already known by the company.


Computer Hope: Ethical Hacking ( Accessed May 13, 2014.

Wikipedia: Hacker (computer security) ( Accessed May 13, 2014.

Wikipedia: White hat (computer security) ( Accessed May 13, 2014.


An overview of the Object-Oriented Data Model

An Object-Oriented Data Model (OODM) has been defined for logical database design and database access. The OODM accommodates three types of relationship – aggregation, generalization and particularization – and provides four types of data operations for defining schema, creating database, retrieving objects and expanding objects.

Why Object-Oriented Database Management System?

In today’s world, Client-Server applications that rely on a database on the server as a data store while servicing requests from multiple clients are quite commonplace. Most of these applications use a Relational Database Management System (RDBMS) as their data store while using an object oriented programming language for development. This causes a certain inefficiency; this is because objects must be mapped to tuples in the database and vice versa instead of the data being stored in a way that is consistent with the programming model.

An OODBMS is the result of combining object oriented programming principles with database management principles. Object oriented programming concepts such as encapsulation, polymorphism and inheritance are enforced as well as database management concepts such as the ACID properties (Atomicity, Consistency, Isolation and Durability) which lead to system integrity, support for an ad hoc query language and secondary storage management systems which allow for managing very large amounts of data. The Object Oriented Database Manifesto [Atk 89] specifically lists the following features as mandatory for a system to support before it can be called an OODBMS; Complex objects, Object identity, Encapsulation , Types and Classes , Class or Type Hierarchies, Overriding, overloading and late binding, Computational completeness , Extensibility, Persistence , Secondary storage management, Concurrency, Recovery and an Ad Hoc Query Facility.

From the aforementioned description, an OODBMS should be able to store objects that are nearly indistinguishable from the kind of objects supported by the target programming language with as little limitation as possible. Persistent objects should belong to a class and can have one or more atomic types or other objects as attributes. The normal rules of inheritance should apply with all their benefits including polymorphism, overriding inherited methods and dynamic binding. Each object has an object identifier (OID) which used as a way of uniquely identifying a particular object. OIDs are permanent, system generated and not based on any of the member data within the object.

An OODBMS is thus a full scale object oriented development environment as well as a database management system. Features that are common in the RDBMS world such as transactions, the ability to handle large amounts of data, indexes, deadlock detection, backup and restoration features and data recovery mechanisms also exist in the OODBMS world.

A primary feature of an OODBMS is that, accessing objects in the database is done in a transparent manner such that interaction with persistent objects is no different from interacting with in-memory objects. This is very different from using a RDBMSs in that there is no need to interact via a query sub-language like SQL nor is there a reason to use a Call Level Interface such as ODBC, ADO or JDBC. Database operations typically involve obtaining a database root from the OODBMS which is usually a data structure like a graph, vector, hash table, or set and traversing it to obtain objects to create, update or delete from the database. When a client requests an object from the database, the object is transferred from the database into the application’s cache where it can be used either as a transient value that is disconnected from its representation in the database (updates to the cached object do not affect the object in the database) or it can be used as a mirror of the version in the database in that updates to the object are reflected in the database and changes to object in the database require that the object is re-fetched from the OODBMS.



  1. Dare Obasanjo (2001):   An Exploration of Object Oriented Database Management Systems.
  2. L. Zhao and S. A. Roberts (1987): An Object-Oriented Data Model for Database Modelling, Implementation and Access.

Socialist and Capitalist :the difference

Read this : The difference between a capitalist and a socialist

One day, a socialist knocks on a farmer’s door and asked him to join the local socialist party. Not knowing what a socialist was, the farmer asked for an example of socialist behavior. The socialist said,
“If you have a cow, then everyone in the village can have some of the milk from your cow. It’s called sharing the wealth”.

“That sounds good, “said the farmer.

” And if you have a sheep, ” the socialist said,” then everyone shares in the wool. ”

” Very nice, ” said the farmer,” This socialism sounds good. ”

” That’s great, ” said the socialist, believing that he had a convert to socialism.” And if you have a chicken, then everyone shares in the eggs. ”

” What? ” the farmer screamed angrily.” That’s terrible. Get out of here and take your socialist ideas with you. ”

” But, but, but, ” stammered the socialist,” I don’t understand. You were happy with the idea of sharing milk and wool. Why do you object to sharing eggs? ”

” Because I don’t have a cow or a sheep, ” snarled the farmer.” But I do have a chicken “.

And this is why financial IQ #2 (Protecting your money) is very important. Everyone agrees that we need to share the wealth, as long as it’s YOUR wealth, not THEIR wealth.


My favourite sporting farewell


‘Chelsea are champions of Europe, and Drogba, always the big man for the big occasion has won it’. These words delivered with such passion on BBC radio Five Live by Alan Green will forever be etched in my memory. In the days after Chelsea’s historic win I could not stop re-watching the game, highlights and listening to the radio commentary (sad I know, but the way I stumbled across this wonderful moment). With Brian O’Driscoll recently retiring from international rugby, and indeed on such a high by winning the Six Nations, it made me think of my favourite sporting farewell. I say ‘think’ but I did not have to ponder for long as Didier Drogba’s final moments in a Chelsea shirt instantly sprang to mind. This was the ultimate exit.

As fate would have it, the Ivorian’s last game (although this was not announced until afterwards) would be in the…

View original post 884 more words

Valentine Special – A Heartfelt Letter to My Future Wife

Dear wife,

It’s not so much a date or an obligation I’m
celebrating, but the deeper meaning and
contribution our relationship brings into my life.
I sometimes can’t believe my luck I’m waking up
next to you today. It’s always a dream come
true. I can feel the chords playing in my heart,
“isn’t she lovely, isn’t she wonderful….” What
more can I ask for, what a gift you are!
While the world around us has thrown the
meaning of true togetherness in the abyss. I
wonder how we found ours. I couldn’t have
created what we have. I believe it’s providence
way of making my life eventful despite the
challenges and adventures of being the man that
I have chosen to be.

I appreciate you above all things that you accept
me and identify with my purpose. I feel strong
because you have always believed in me. I often
wonder if I’ll be able to do most of the things I
do today save for the climate of patient
understanding, thoughtful affection, loving
encouragement and supportive enthusiasm you
create and sustain.

I often think you a better person than I am. I
often wonder how you put up with my quirks, my
boundless energy and drive. I also credit your
ability to lovingly bring me in tune with my true

I like that you challenge me to a better me. With
you, I just want to be the best man that I can be.
I often struggle but you make it worth the fight. I
won’t accept I have given you my best yet even
though you say it. There is a lot more you

Sincerely, I have no felt need for the dishonest
spoil that has indelibly stained the moral fabric
of most men. You deeply satisfy me my woman.
You comfort and encourage me so much that my
heart safely trusts you. I’m secured with you. I
delight in you. You are a reward for my earthly
toil, God’s precious gift to me. All of my wealth
pales in comparison to the goodness with which
you enrich my life.

I fondly remember you said you were going to be
around for the long haul during my days of
obscurity. Those days seemed long but you
taught me to focus on the rewards and not my

So much faith you had, to thrust your ALL
against the tempest storms of my then unseen
realities. Indeed, you confirm to me that
believing is seeing. You helped me see that I can
walk on my waters and still my storms. Such
strong convictions you have about me that I
sometimes think you are crazy.

Again, I want to say thank you like I have always
done for that dashing young man and beautiful
young lady. I won’t forget to mention she is the
prettiest thing in the world. Every bit of her
strong spirit, kindness and beauty she got from

Thank you for being such a model for her. Thank
you for being a mum he can look up to. I was
glad to hear my prince chat with his friend just
recently, how much he wants to be like daddy.
I’m sure he will figure out his path clearly when
he is much older. If he values my character, then
I’m fulfilled.

Darling, I sincerely think marriage is tough. But
the binding cord of our creator’s love in our
heart has proven stronger even when ours
sometimes becomes dry and slack. I’m assured
that he who began the good work in us will
surely bring it to completion.

Above all, I want to thank you for partnering with
God and for being instrumental in the making of
a world renowned speaker, author, business
consultant, peak performance coach and a
leader’s leader. All who I have been a blessing to
all over the world should thank GOD first and
then YOU.

Happy Valentine’s Day My Queen.

You too can write a letter to your future. It’s
nice to let your imagination develop wings once
in a while. “Imagination is the preview of life’s
coming attractions”, said Albert Einstein. Create
your dream life, career or relationship (whether
you are in a relationship or not) in your mind and
document it.
Write as if everything were perfect, regardless of
your current circumstances. You can’t change
your current circumstances until you can imagine
something better. Writing is the first step in the
creation of dreams.
We can have, be or do whatever we permit our
minds to imagine. Please don’t settle for less
than you deserve. Don’t feel guilty for thinking
“I’m more than this” or “I deserve better than

Finally, be courageous and share your dreams
with the world, your friends or spouse.
Again, Happy Valentine’s day.

Abimbola Popoola
World Renowned Coder.
The Kahuna of the billion dollar dynasty,
Follow me on twitter: @_dapope.
Connect with me on facebook:
BBM : 7ADB54E2

How I Lost My $50,000 Twitter Username

Just felt like sharing this story (in case you haven’t heard).  Its really worth learning from.

Note: Naoki Hiroshima is the creator of Cocoyon and a developer for Echofon.

I had a rare Twitter username, @N. Yep, just one letter. I’ve been offered as much as $50,000 for it. People have tried to steal it. Password reset instructions are a regular sight in my email inbox. As of today, I no longer control @N. I was extorted into giving it up.

While eating lunch on January 20, 2014, I received a text message from PayPal for one-time validation code. Somebody was trying to steal my PayPal account. I ignored it and continued eating.

Later in the day, I checked my email which uses my personal domain name (registered with GoDaddy) through Google Apps. I found the last message I had received was from GoDaddy with the subject “Account Settings Change Confirmation.” There was a good reason why that was the last one.

From: <> GoDaddy
To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 12:50:02 -0800
Subject: Account Settings Change Confirmation

Dear naoki hiroshima,

You are receiving this email because the Account Settings were modified for the following Customer Account:


There will be a brief period before this request takes effect.

If these modifications were made without your consent, please log in to your account and update your security settings.

If you are unable to log in to your account or if unauthorized changes have been made to domain names associated with the account, please contact our customer support team for assistance: or (480) 505-8877.

Please note that Accounts are subject to our Universal Terms of Service.


I tried to log in to my GoDaddy account, but it didn’t work. I called GoDaddy and explained the situation. The representative asked me the last 6 digits of my credit card number as a method of verification. This didn’t work because the credit card information had already been changed by an attacker. In fact, all of my information had been changed. I had no way to prove I was the real owner of the domain name.

The GoDaddy representative suggested that I fill out a case report on GoDaddy’s website using my government identification. I did that and was told a response could take up to 48 hours. I expected that this would be sufficient to prove my identity and ownership of the account.

Let The Extortion Begin

Most websites use email as a method of verification. If your email account is compromised, an attacker can easily reset your password on many other websites. By taking control of my domain name at GoDaddy, my attacker was able to control my email.

I soon realized, based on my previous experiences being attacked, that my coveted Twitter username was the target. Strangely, someone I don’t know sent me a Facebook message encouraging me to change my Twitter email address. I assumed this was sent from the attacker but I changed it regardless. The Twitter account email address was now one which the attacker could not access.

The attacker tried to reset my Twitter password several times and found he couldn’t receive any of the reset emails because it took time for the change of my domain’s MX record, which controls the email domain server. The attacker opened issue #16134409 at Twitter’s Zendesk support page.

N, Jan 20 01:43 PM:

Twitter username: @n
Your email: *****@*****.***
Last sign in: December
Mobile number (optional): n/a
Anything else? (optional): I’m not receiving the password reset to my email, do you think you could manually send me one?

Twitter required the attacker to provide more information to proceed and the attacker gave up on this route.

I later learned that the attacker had compromised my Facebook account in order to bargain with me. I was horrified to learn what had happened when friends began asking me about strange behavior on my Facebook account.

I received an email from my attacker at last. The attacker attempted to extort me with the following message.

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 15:55:43 -0800
Subject: Hello.

I’ve seen you spoke with an accomplice of mine, I would just like to inform you that you were correct, @N was the target. it appears extremely inactive, I would also like to inform you that your GoDaddy domains are in my possession, one fake purchase and they can be repossessed by godaddy and never seen again D:

I see you run quite a few nice websites so I have left those alone for now, all data on the sites has remained intact. Would you be willing to compromise? access to @N for about 5minutes while I swap the handle in exchange for your godaddy, and help securing your data?

Shortly thereafter, I received a response from GoDaddy.

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 17:49:41 -0800
Subject: Update [Incident ID: 21773161] — XXXXX.XXX

Unfortunately, Domain Services will not be able to assist you with your change request as you are not the current registrant of the domain name. As the registrar we can only make this type of change after verifying the consent of the registrant. You may wish to pursue one or more of the following options should you decide
to pursue this matter further:

1. Visit to locate the Whois record for the domain name and resolve the issue with the registrant directly.

2. Go to to find an ICANN approved arbitration provider.

3. Provide the following link to your legal counsel for information on submitting legal documents to GoDaddy: GoDaddy now considers this matter closed.

My claim was refused because I am not the “current registrant.” GoDaddy asked the attacker if it was ok to change account information, while they didn’t bother asking me if it was ok when the attacker did it. I was infuriated that GoDaddy had put the burden on the true owner.

A coworker of mine was able to connect me to a GoDaddy executive. The executive attempted to get the security team involved, but nothing has happened. Perhaps because of the Martin Luther King Jr. holiday.

Then I received this follow-up from the attacker.

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 18:50:16 -0800
Subject: …hello

Are you going to swap the handle? the godaddy account is ready to go. Password changed and a neutral email is linked to it.

I asked a friend of mine at Twitter what the chances of recovering the Twitter account were if the attacker took ownership. I remembered what had happened to @mat and concluded that giving up the account right away would be the only way to avoid an irreversible disaster. So I told the attacker:

From: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 19:41:17 -0800
Subject: Re: …hello

I released @N. Take it right away.

I changed my username @N to @N_is_stolen for the first time since I registered it in early 2007. Goodbye to my problematic username, for now.

I received this response.

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 19:44:02 -0800
Subject: RE: …hello

Thank you very much, your godaddy password is: V;Mz,3{;!’g&

if you’d like I can go into detail about how I was able to gain access to your godaddy, and how you can secure yourself

The attacker quickly took control of the username and I regained access to my GoDaddy account.

PayPal and GoDaddy Facilitated The Attack

I asked the attacker how my GoDaddy account was compromised and received this response:

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 19:53:52 -0800
Subject: RE: …hello

– I called paypal and used some very simple engineering tactics to obtain the last four of your card (avoid this by calling paypal and asking the agent to add a note to your account to not release any details via phone)

– I called godaddy and told them I had lost the card but I remembered the last four, the agent then allowed me to try a range of numbers (00-09 in your case) I have not found a way to heighten godaddy account security, however if you’d like me to
recommend a more secure registrar i recommend: NameCheap or eNom (not network solutions but

It’s hard to decide what’s more shocking, the fact that PayPal gave the attacker the last four digits of my credit card number over the phone, or that GoDaddy accepted it as verification. When asked about this, the attacker responded with this message:

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 20:00:31 -0800
Subject: RE: …hello

Yes paypal told me them over the phone (I was acting as an employee) and godaddy let me “guess” for the first two digits of the card

But guessing 2 digits correctly isn’t that easy, right?

To: <*****@*****.***> Naoki Hiroshima
Date: Mon, 20 Jan 2014 20:09:21 -0800
Subject: RE: …hello

I got it in the first call, most agents will just keep trying until they get it

He was lucky that he only had to guess two numbers and was able to do it in a single call. The thing is, GoDaddy allowed him to keep trying until he nailed it. Insane. Sounds like I was dealing with a wannabe Kevin Mitnick—it’s as though companies have yet to learn from Mitnick’s exploits circa 1995.

Avoid Custom Domains for Your Login Email Address

With my GoDaddy account restored, I was able to regain access to my email as well. I changed the email address I use at several web services to an address. Using my Google Apps email address with a custom domain feels nice but it has a chance of being stolen if the domain server is compromised. If I were using an email address for my Facebook login, the attacker would not have been able to access my Facebook account.

If you are using your Google Apps email address to log into various websites, I strongly suggest you stop doing so. Use an for logins. You can use the nicer custom domain email for messaging purposes, I still do.

In addition, I also strongly suggest you to use a longer TTL for the MX record, just in case. It was 1 hour TTL in my case and that’s why I didn’t have enough time to keep receiving emails to the compromised domain after losing the DNS control. If it was a week-long TTL for example, I would have had a greater chance to recover the stolen accounts.

Using two-factor authentication is a must. It’s probably what prevented the attacker from logging into my PayPal account. Though this situation illustrates that even two-factor authentication doesn’t help for everything.


Stupid companies may give out your personal information (like part of your credit card number) to the wrong person. Some of those companies are still employing the unacceptable practice of verifying you with the last some digits of your credit card.

To avoid their imprudence from destroying your digital life, don’t let companies such as PayPal and GoDaddy store your credit card information. I just removed mine. I’ll also be leaving GoDaddy and PayPal as soon as possible.




Coding faster with Emmet

And the wheel of coding has taken a new turn!

Emmet, previously known as Zen Coding, is the most productive and time-saving text-editor plugin you will ever see. By instantly expanding simple abbreviations into complex code snippets, Emmet can turn you into a more productive developer. Emmet is a web-developer’s toolkit that can greatly improve your HTML & CSS workflow: write HTML code with CSS-like abbreviations, use different actions to quickly select and modify HTML and CSS code and more!

Lets speak the truth: Writing HTML from scratch everytime sucks, and its annoying with all of those tags, attributes, quotes, braces, etc.  Well you can refer me to all of th\ose text editors like Adobe Dreamweaver and the likes that have code completion, which helps a lot, but you still have to do a lot of typing.  Emmet instantly expands simple abbreviations into complex code snippets.

The 411

1. Initializers: 

Kicking off with a new HTML document takes less than a second now.  Just type ! or html:5, hit “Tab,” and you’ll see an HTML5 doctype with a few tags to jumpstart your application.


  • html:5 or ! for an HTML5 doctype
  • html:xt for an XHTML transitional doctype
  • html:4s for an HTML4 strict doctype

2.  Easily Add Classes, IDs, Text and Attributes:

Because of the similarity between Emmet’s syntax for describing elements and CSS selectors, getting used to it is ABC. Try mixing an element’s name (e.g. p) with an identifier (e.g. p#description).




3.  Nesting:  

By nesting abbreviations, you can build a whole page using just one line of code. First, the child operator, represented by >, allows you to nest elements. The sibling operator, represented by +, lets you place elements near each other, on the same level. Finally, the new climb-up operator, represented by ^, allows you to climb up one level in the tree.




4. Grouping

To effectively take advantage of nesting without turning them into a confusing mess of operators, you’ll need to group some pieces of code. It’s like math — you just need to use parentheses around certain pieces. For example, (.foo>h1)+(.bar>h2) will output this:

<div class="foo">
<div class="bar">


5.  Implicit Tag Names:

To declare a tag with a class, just type div.item, and then it will generate <div></div>.

In the past, you could omit the tag name for a div; so, you just had to type .item and it would generate <div></div>.  Now Emmet is more intelligent. It looks at the parent tag name every time you expand the abbreviation with an implicit name. So, if you declare .item inside of a <ul>, it will generate <li></li> instead of <div></div>.




Here’s a list of virtually all implicit tag names:

  • li for ul and ol
  • tr for table, tbody, thead and tfoot
  • td for tr
  • option for select and optgroup

Diving into the workstation!

You can download the plugin via

From there, you’ll see instructions on how to use it, but I’ll explain a little for ya!

It you’re a Notepad++ addict like me, This plugin is available via

– Plugin Manager:  use Plugins > Plugin Manager > Show Plugin Manager menu action and find and install “Emmet” plugin.

– Manual Installation

  1. Install Python Script plugin (available in Plugin Manager).
  2. Download EmmetNPP plugin and unpack it into C:\Program Files\Notepad++\plugins folder
  3. Start Nodepad++. You should see Plugins > Emmet menu item.

You’re welcome!

Another Project Done!


Started this project back in June (I guess, or late April), came up with the Version 1.0 around June 15th or so, purely PHP.

You know the funny thing about my coding, I’m not a fan of creating too many pages, all in a bid to add more functionality.  This made me to embrace AJAX, and trust me, it was fun.  Apart from that, I learnt a new thing from PHP: using buttons instead of pages. If you know this trick, I bet you your whole website can be just one page (or max. of 2, depends).  It was amazing writing a single function for so many buttons and they end up firing events for you.

Using AJAX + the jQuery library enabled me to bypass a lot of redirects I used to do when I wanted to catch exceptions.  Now, my exceptions are caught right when the user is typing (or when the cursor is on the next field).

I released the Version 2.0 on the 21st of July, 2013, and it was sweet… The look, the feel,… I was proud of it. User-friendly, and a lot.

Talking about the SQL, it was a different matter altogether. Tables performing different functions to complement each other, and writing to external text-files to keep track of record and changes.  The whole project was a bomb!

You know the fulfillment after writing over a thousand lines of codes (PHP, JavaScript, AJAX: my favourites), sleepless nights, mental stress, “coding dehydration” (bet you haven’t heard that before), what about 10 different SQL tables all performing different functions, yet keeping connected data?

A quick one: Learn how to use cool music to accompany you in the unending journey of programming, my secret.Popoola Abimbola

Version 3.0 is on the way, and I’m pretty sure you can’t wait to see “advancement in technology”, I can’t wait also!