Blog Archive

ccl

ccl
ict Equipments

Thursday, 23 February 2017

FG Urged to establish state ICT Regulatory Agencies...

FG Urged to establish state ICT Regulatory Agencies...

Sounds like good news for us all in Nigeria. I hope the FG will consider and support growing entrepreneurs who have the brains and desire to move the country forward in ict field. Most of them don't have the financial capacity to advance, but the burning desire and determination to stand out has kept them going despite different obstacles. I will advice that all registered ICT companies/professionals (Nigerian based) should be carefully selected to carry out ICT Regulatory Agencies roles. (we know what the country needs to move forward, we've got what it takes).

Contacts Us: 08088498890, Email: info@crosscablescartel.com
www.crosscablescartel.com

Free Blog Posting for ICT info/companies - Contact: 08088498890 for further details. Only non ict Adverts will attract N15,000.00 fee for two months.

All ICT companies are welcome to post on this blog free of charge. You may forward all new Developments, Events, Jobs, Programs, Business, News etc. to this
Email: blogspot@crosscablescartel.com, Subject; ''Post on CCL BlogSpot'', 
to be uploaded same day.
Contact: 08088498890 for further details. Only non ict Adverts will attract N15,000.00 fee for two months.

FEDERAL AIRPORTS AUTHORITY OF NIGERIA - ICT TENDER

 
FEDERAL AIRPORTS AUTHORITY OF NIGERIA
GENERAL PROCUREMENT NOTICE IN RESPECT OF PROCUREMENTS UNDER FAAN 2017 IGR BUDGET (WORKS)
 
1. INTRODUCTION
In compliance with the Public Procurement Act 2007, the Federal Airports Authority of Nigeria (FAAN) intends to undertake the under listed projects under its 2017 financial year (IGR) budget. Consequently, the Authority wishes to invite competent and reputable companies to submit bid under its General Procurement Notice (GPN) in the following under listed projects:
LIST OF PROJECTS:
LOT A/FAAN/CB – Renovation of FAAN Staff Quarters, Offices, and dilapidated buildings at Headquarters and various Airports.
LOT B/FAAN/DAO – Bush Clearing and Landscaping at various Airports.
LOT C/FAAN/DAO – Supply and Installation of Operational accessories (e.g. Windsocks etc.)
LOT D/FAAN/DAO – Cleaning of rubber deposits and Degreasing of Runways, Taxiways, Aprons etc at the Airports
LOT E/FAAN/DAO – Supply and Installation of Automated Programmable Wild Life Deterrent Acoustic Equipment at various Airports
LOT F/FAAN/ICT – Supply and Installation of Communication Equipment
LOT G/FAAN/ICT – Supply and Installation of Computers and Accessories
LOT H/FAAN/ICT – Supply and Installation of Business Softwares and Applications (e.g. Medical Software, Engineering Maintenance Software, Audit Management Software, Enterprise Resources Planning etc.)
LOT I/FAAN/ICT – Provision of ICT Network Infrastructure for Airports (e.g. LAN [Local Area Network], AMS [Airport Management System] etc.), FIDS [Flight Infrastructure Display System
LOT J/FAAN/DSS – Supply and Installation of Security Equipment.
LOT K/FAAN/L,W&S – Supply and Installation of Water Engineering Equipment.
LOTL/FAAN/MECH – Supply and Installation of Generators.
LOT M/FAAN/ELECT – Supply and Installation of Electrical Equipment
LOT N/FAAN/MECH – Supply and Installation of Mechanical Heavy Duty Equipment.
LOT O/FAAN/ – Maintenance of Physical Assets at various Airports
• i (EE) – Electrical
• ii (MECH) – Mechanical
• iii (CB) – Civil & Building
• iv(L,W&S) -Land, Water & Survey
• v(ICT) – Scanning Machines, Photocopying Machines etc.
• vb(ICT) – Baggage and Body Scanning machines at the various Airports
LOT P/FAAN/DAO – Waste Management at Murtala Muhammed International Airport (MMIA), FAAN Headquarters and Zone A,B,C & D of Staff quarters at HQ. Lagos
2. GENERAL PROCUREMENT NOTICE REQUIREMENTS
• Evidence of company registration [Certificate of Incorporation of the Company] • Certified true copy of memorandum and article of association with CAC forms CAC02 & CAC07 inclusive (where applicable).
• Pencom Clearance Certificate and evidence of remittance.
• Evidence of Tax payments (Current Tax Clearance Certificate) for the last three years – (2014, 2015 & 2016).
• Copy of VAT Certificate or Registration and evidence of remittances.
• Corporate Profile with Curriculum Vitae and credentials of the key personnel.
• Evidence of financial capability to execute the project (Bank Reference Letter/Bank guarantee will form part of the evaluation criteria).
• Copies of the Audited Account of the company for the last three (3) years – (2014, 2015 & 2016).
• Verifiable evidence of similar works successfully completed/on-going (e.g. Letter of Award, Certificate of Completion, Contract Agreement and Payment Certificate)
• Certificate of compliance with Industrial Training Fund (ITF) regulation and evidence of payment.
• Evidence of current registration on the National Database of Contractors, Consultants and Service Providers; by submission of Certificate or Interim Registration Report & issued by Bureau of Public Procurement(BPP).
• Additional requirements for (Lot P/FAAN/DAO) only, should include verifiable evidence of Current Registration with Lagos State Waste Management Authority (LAWMA).
• Evidence of Ownership of Compactors for Waste Evacuation
• The Sworn Affidavit from Federal or State High Court disclosing as follows:
• That all documents submitted are not only correct but genuine.
• That the Directors) has /have never been convicted by any court of law.
• That the firm’s Director or company is not bankrupt.
• Whether or not any of the officers of FAAN or BPP is a former or present director of the compan.
3. SUBMISSION OF DOCUMENTS.
• The documents are to be submitted in four (4) copies in A4 paper size and neatly bound The document should be arranged in the order listed under General Procurement Notice requirements and clearly separated by dividers.
• The documents must be sealed in an envelope and the Project Name and Lot number clearly written at the top left comer of the envelope.
• All documents must be submitted to the office of “The General Manager (Procurement)”, FAAN Headquarters, Ikeja – Lagos.
• Contacts: – Phone No. 08033075384, E-mail Address: procurement@faannigeria.org
4. CLOSING AND OPENING OF SUBMISSIONS.
Submission of tender document shall close at exactly 11.30 am on “Monday, 3rd of April 2017“. All submissions will be opened on the same day immediately after closing at the FAAN Training School Annex, Transit Camp, Murtala Muhammed International Airport, Ikeja Lagos.
5. IMPORTANT INFORMATION.
• The FAAN reserves the right to verify the authenticity of any claims made on the General Procurement Notice documents submitted by companies.
• Failure to comply with the instruction(s) and provide any required document(s) may automatically result in disqualification.
• FAAN reserves the right to reject any or all the General Procurement Notice documents.
• Original of all documents above must be produced for sighting at the opening and any other time requested.
• Tender documents submitted late shall be rejected.
• All submissions must be in English language.
• Submission should be very clear on the areas of specification and Lot(s) of interest.
• This advert shall not be construed to be a commitment on the part of FAAN, nor shall it entail the applicant to make any claim(s) whatsoever and/ or seek any indemnity from FAAN, by virtue of such applicant having responded to this publication.

Signed
Management

Monday, 28 November 2016

POISONTAP: A NEW INTRUDER ON THE BLOCK. WATCHOUT!



     The essence of creating a hack tool is to explore and exploit right? This one is open source... SO #GetYourFreakOn HACKERS.
 
Security researcher Samy Kamkar recently managed to take down a locked, password-protected computer armed with only a US$5 Raspberry Pi. The low-tech cookie-siphoning intrusion is one of Kamkar's simplest hacks ever
 Kamkar's latest hack, PoisonTap, uses a Raspberry Pi Zero, a micro SD card, and a micro USB cable or other USB emulator devices, including USB Armory or LAN Turtle.
Windows, OS X and Linux recognize PoisonTap as an Ethernet device, load it as a low-priority network device, and perform a DHCP request across it, even if the computer is locked or password-protected.
PoisonTap provides the computer with an IP address. However, the DHCP response tells the machine that the IPv4 space is part of PoisonTap's local network, rather than a small subnet.
If a Web browser is running in the background, one of the open pages will perform an HTTP request in the background. PoisonTap responds with a spoof, returning its own address, and the HTTP request hits the PoisonTap Web server.
When the node Web server gets the request, PoisonTap's response is interpreted as HTML or JavaScript.
The attacker is then able to hijack all Internet traffic from the machine and siphon and store HTTP cookies from the Web browser or websites.
"The PoisonTap project is said to be an extremely clever and creative attack that can have serious consequences"
The code is open source (public), and hardware required to run it is only a few dollars, which increases the risk to average users. "However, it still takes some effort for an attacker to steal the user's data."
For the device to work, the attacker needs physical access to the machine while a Web browser is running in the background.
The risk is lower when a machine has restricted physical access. And higher when a machine is in the public domain, where anyone potentially has access to it.
It might be easier to build a solution to the hack, given that Kamkar's attack was conducted over an open source language, suggested a Symantec researcher. "If someone slips a secret backdoor into an open source project, chances are someone will find it quickly. Often open source is quicker to address vulnerabilities as an open source community can be very large."
In addition, if someone creates a tool and the source code is publicly available, anyone can read the code and develop proper protection for the future, the Symantec researcher pointed out.
"It's certainly very creative work, and it shows just how many attack vectors exist that we've yet to really consider," remarked Troy Hunt, Microsoft MVP-Developer Security.
"However, it also requires physical access -- and once you get to that point, there's a lot of avenues available to an attacker,".
The use of HyperText Transfer Protocol Secured (HTTPS) could cripple this particular attack.

Source; TechNewsWorld.com