STIR education network meetings ever held at Iganga High school

As one of the new strategies that the ministry of education, sports and technology brought in, Iganga high school has been one of the strong instrumental schools in Eastern and the whole Uganda in implementing the program of STIR education network meetings.

At Iganga High school, a lot is always shared whereby the Deputy headteacher in charge of Academics mr.Nabongho Simon Peterkin takes a central stage. Mr.Nabongho Simon PeterKin,Mr.Tigawalana Eriot, Mr. Muwayi Abdul under the guidance of the Strong man Mr.Waiswa BenGodfrey always drive the the entire school staff. New strategies have been laid down as far as improving the teaching and learning environment is concerned.Encouragement to the teaching and support staff has been done to have all this effectively implemented.

Our school motto: We struggle for progress

This article has 5 Comments

  1. Stage 1: Scan nearby machine for Malware:

    This is an apparent prevention, but usually neglected by most people.
    A majority of customers we discuss to that have been target to a hack, formerly have had no safety solutions set up on their
    machines and these that do additional frequently than not, are installed out of
    the box, barely configured, overlooked about and rarely current.

    If you never have a decent virus/malware product put in on your
    desktop. Make an informed obtain by discussing your unique requires with several distributors.

    Make certain that it’s set to routinely scan your machine
    each working day. Guarantee that at least each week it connects to the vendor’s web-site and updates alone
    with new libraries of virus and malware definitions.

    If you want to get reward factors, put in computer software that
    enables you to keep an eye on your community targeted traffic and
    in which you see odd outgoing requests, examine.

    Your device should by no means be getting in touch with the outside planet without you either expressly taking an motion, or
    environment up one thing like a typical download of new virus definitions.
    If your equipment is randomly connecting to addresses or websites you know nothing
    about, then “Houston we have a problem!”

    Stage two: Rotate FTP passwords:

    File Transfer Protocol (FTP) supplies full accessibility to your information on the server.
    Like all passwords, you should not set these and overlook about them.
    They should be updated frequently. We advise regular
    if you obtain your FTP routinely but if you accessibility it
    fewer routinely it should really be alright. If you’ve got hardly ever adjusted passwords,
    we advise that you update it now! You need to also
    have a acceptable password plan.

    This consists of:

    • DO NOT use the same passwords for everything

    • DO NOT use dictionary words and phrases,
    or folks names

    • DO NOT re-use the exact same passwords. Once used
    and rolled, discard!

    • DO use a random password generator

    • DO use minimum amount of 8 characters

    • DO use a combination of uppercase, lowercase, numbers
    and symbols.

    Stage 3: Rotate databases passwords:

    Your database password is what lets your website to accessibility your databases.
    It’s not as significant as rolling the admin password for your software or FTP facts, but it is really however an essential component of
    a nicely-managed password policy. We endorse bi-month to month Password alterations on this, even though you
    may well want to appear far more or less dependent on specific

    The most most likely state of affairs if databases access is compromised, is that a negative man could create a new admin consumer for
    your web site, delete your database fully, or modify content material
    that is saved and served from the databases. If you do modify this password by using a administration interface like the Webgyan Console or
    c Panel you require to recall that your web-site has to have the new password configured into it.

    Normally you may have an interface for this, or some applications
    require you to edit a text dependent Configuration file on the server.
    It seems sophisticated, but when you know your way close to, it can be a 5
    minute activity.

    Step four: Eliminate entry aspects:

    If you took your car to the mechanic and still left the spare keys so
    they can work on it, you wouldn’t depart them the keys soon after you choose it up.

    Why would you go away entire obtain to your web site the
    moment perform or alterations are accomplished?

    You ought to hand entry specifics out strictly on a necessary use basis.
    At the time the perform is carried out go by way of Steps two,
    3 and 14. If you have presented area level console accessibility,
    also go by means of Action 5.

    Some of you really don’t outsource your enhancement work
    and have focused IT workers. Any time a workers member with a certain degree of access leaves, you really should reset
    individuals aspects instantly. Don’t forget, you are executing
    this not because they could intentionally do a thing unpleasant,
    in point which is usually not likely, but as a precaution in scenario at some
    place in the foreseeable future their laptop was exploited
    or compromised.

    We backup details so that in the situation of a catastrophe we
    are in a position to get all shoppers again on the net.

    Phase 5: Rotate ‘TheConsole’ (or cPanel) passwords:

    This is a extremely quick phase. Merely follow the instructions to reset your manage panel passwords.

    Use the similar common sense as explained in Action 2 to
    established a far more tough password.

    Stage 6: Subscribe to exterior checking:

    This is like an insurance coverage policy. Corporations like Safe do a
    Range of truly neat factors for you. They are going to scan your internet site each day, and right away inform you if
    you’ve been compromised. They offer products and services wherever they will clear your site if you
    do get Compromised and you require instant support. If you are employing WordPress, they’ll do preventative checking for you, so you are alerted to updates in the software, plug-ins,
    themes and the like.

    Step seven: Backup of website data files:

    There is a idea that your hosting provider will have backups completely ready and ready for you to
    accessibility and can immediately get well all your misplaced facts, with out any
    cost. Usually talking internet hosting providers do not
    do backups for the rationale you consider. We backup info so that in the situation of a disaster we are able to get all buyers back again on-line.
    The backup dimensions we offer with are in the a lot of quite a few Terra bytes.
    So I advise in the strongest doable conditions to BACKUP!

    It can be a easy endeavor, that will save you from a ton of head aches later on. There are even apps accessible that are capable to backup.
    Backing up doesn’t have to occur every day,
    but with a chaotic website, weekly backups really should be aspect of your strategy.
    For internet websites that are static and adjustments incredibly hardly ever,
    month to month backups are extra correct. No matter what routine you determine to adhere
    to, if terrible matters occur, you will at least have a duplicate of your website and you can very easily re-publish immediately,
    without having problem and at no charge. So
    what are you waiting for? If you’ve got never ever backed
    up, do it now, then come back again!

    Stage 8:Backup of database:

    This is basically an extension of Stage 7.
    If you have a website that indicators up new consumers, for example an e-commerce internet site that necessitates consumers to sign-up
    just before purchase you most possible market place to them, run a loyalty program or have some kind of reward
    scheme. What would materialize if all that information was
    deleted? If you have a chaotic website, you may possibly determine weekly is much too infrequent and choose to archive a duplicate
    of your databases daily.

    Yet again there are several equipment available that will do this for
    you mechanically, specifically if you are applying pretty widespread database engineering like MySQL.
    Restoring from a self-produced backup is a 5
    minute task. Having your hosting service provider to trawl by
    way of archives and do a restoration for you will depart you off the air for many hours in a
    finest-scenario situation.

    Step nine:Evaluation software for patches:

    You should pro-actively hold your website up to day as very
    best as is feasible. This a person would seem to be self-explanatory but
    it can be probably the most typical way for a web-site to get
    exploited and is mostly dismissed. It truly is protected to say that
    most men and women are inclined to neglect to update their site, with the typical system of
    possessing your web site constructed be a developer,
    which they then handover to you and that would be the past time the web page is
    up-to-date. Ever.

    We routinely see CMS or e-Commerce internet sites that have not been up to date for 3+ yrs, and typically five yrs.
    So by the time a piece of program is 3 several years previous, it can be usually
    historical. If it is really then compromised, correcting it gets to be
    10x a lot more complicated, as there is just not
    a straight-forward upgrade route from the variation you are on, to the newest.
    It is thus, not just a uncomplicated patch install in its place attempting to re-engineer the full factor, even though your web

    is offline, and you are getting rid of money. This gets to be a incredibly bad point.
    Most software program businesses have mailing lists that you can subscribe to and they
    notify you every single time stability vulnerabilities are uncovered,
    new patches and new variations and the like
    are available.

  2. I would like to use the ability of thanking you for the professional advice I have
    continually enjoyed browsing your site. I’m looking
    forward to the particular commencement of my
    school research and the whole prep would never
    have been complete without visiting this site. If
    I could be of any assistance to others, I would be
    ready to help by what I have learned from here.

Leave a Reply

Your email address will not be published. Required fields are marked *