The UK's Prime Minister, Mr Borris Johnson, said that face-covering in public places and Covid passports will not be mandatory in England from next Thursday or from 27 January 2022.
The UK's Prime Minister also said the government would immediately drop its advice for people to work from home.
He said the scientists believed the Covid wave had peaked in England. They said they have done an infection survey recently.
What's the Situation in the UK Today?
The UK has a population of about 67 million. The COVID-19 pandemic had a major impact on the UK in 2020 and 2021.
Here are some statistics about Covid-19 in the UK
1) Confirmed cases
There were 108,069 new cases on 19 January 2022, and 652,469 people in the last 7 days. This shows a decrease of 386,031 compared to the previous 7 days.
2) Death
There were 359 new deaths within 28 days of a positive test for coronavirus reported on 19 January 2022, and 1,865 people in the last 7 days. This shows an increase of 141 compared to the previous 7 days.
3) Admission to Hospital
There were 1,752 new hospital admission on 15 January 2022, and 14,927 people in the last 7 days. This shows a decrease of 770 compared to the previous 7 days.
How do these compare?
The UK's infection rate has begun to reduce about 2 weeks ago. But this rate is not that low when compared to other selected countries which were attacked by Covid in 2020 as shown in the following chart. The chart shows that UK's 7-day rolling average rate is now about 1,500 infections per million people lately. This is about 50% down from the peak of about 1,600 infections per million on 5 January.
As for the death rate, UK's death rate has increased 4 times. It is not low either when compared to other countries. The death rate was 1.08 per million people on December 29. It was about 4.0 on 18 January 2022 as shown in the following chart.
Now, what made the UK Government thinks that the Covid situation will not be serious and why did they suddenly relax its Covid control measures?
Why?
The one reason that we can justify the UK's view is that Covid is no longer considered to be a serious and life-threatening disease as compared to other diseases in the country.
If we study the following chart carefully, we will find that the UK has the lowest "Excess Mortality rate" among the selected countries. This rate is about 100% lesser than what they have gone through in early 2020 when the rate was about 107% as shown in the following chart.
Then, the UK could have experienced the worse, and the present excess mortality rate of 5% is nothing compared to those dreadful days. This is like one has seen the big devil before, one is no longer afraid of the smaller devil which is "100%" smaller.
The UK presently also has the lowest case fatality rates (CFR) compared to other countries. The case fatality rate measures the number of deaths against the Covid Infection cases. If CFR is low and the infection is still high, people would be lesser worried about the spread of the disease.
Conclusion
The UK will be taking a very bold step forward. They assumed that Covid is no longer as dangerous as it used to be; also, it is not more serious than other diseases now prevailing in the country.
Quite sure many countries will be watching closely what will happen in the UK in the future; they might want to follow suit if the UK's did not experience any conditions worse than before.
In lesson 1, we listed and showed the various components to be used to assemble a PC. If we have already in our hands all the required components, we can start assembling them together. Lesson 2 will show how we could do that.
The PC Casing
The casing is usually made of metal. It has side panels that can be opened to fix the components such as motherboard, hard disk and other peripheral cards such as video cards etc. It has also a casing fan for additional cooling. There are also a bunch of wires for connection to the front panel control switches such as the on/off and reset switches, etc. Here are the pictures of where are these wires and where one can install what PC components
a) The Casing
Front and Back
Inside
Step By Step
1. Installing Power Supply
The power supply has 4 screws for mounting to the casing. It has 5 bunches of wires for various components as shown in the picture. They must be connected to the respective sockets of the components. The connectors are usually "keyed" such that there should be no wrong connection problem to be expected.
The close up view of the 5 types of power supply connection is as shown
2) Installing the CPU
If the motherboard has not been installed, it will be much easier to install the CPU when the motherboard is outside the casing
Here is a good video on how the CPU could be fixed onto the Motherboard. Note that there is always a dummy CPU or some sort of protection to prevent accidentally damage of the very delicate and flimsy pins located inside the CPU socket. Any bent pins in the CPU socket will make the motherboard unusable.
3) Installing the motherboard
The motherboard usually have about 6 to 7 screw holes for mounting to the casing, some of which has been marked in this motherboard. The picture shown below has been labelled to show where the various PC components should be installed. It would be good to check the manufacturer's manual to find out how to install the motherboard as different motherboards might have different installation requirements.
Lately, there is a lot of reports about people losing their bank money. These people have something in common.
1. They are from the certain bank;
2. They lost the money due to phishing;
3. Sum involved is pretty large; in terms of tens of thousands and in some cases, more than SGD$100,000;
4. They all receive an SMS that is using the bank's ID; and
5. They are unaware that they have been phished;
What is phishing?
It is a fraudulent practice of attackers sending emails or SMS using the name of reputable companies in order to get the victims to reveal their personal information, such as passwords and credit card or bank account numbers.
How do they get phished?
In the present context, the attackers were sending SMS messages under the name of the bank. This led to the victims believing that the message was sent by the bank. Usually, these phishing messages will require the victims to click a web address. For example, in this SMS message shown attached, the victims must be very surprised to receive the SMS that said a payee account of an unknown person has been added. And if the victims never knew who is Mr Jones, they would normally click the link "ocbc-help.com" to find out. That site listed is actually the phishing website.
Once the user is at that phishing webpage that will look exactly like the bank's webpage, the victim will unsuspectedly enter their user name & password like usual in order to find out what went wrong.
How does the attacker send SMS under the Bank's IDs?
All the attacker needs to do is to change the sender's ID in the SMS to the one that matches the bank's ID. Normally, this is not possible using handphones as many countries disallowed such practices. If we open our SMS, we will find that there is no way to change the sender's ID.
But, the attacker can always use other means to send SMS to the victims' phones. This is because phones today are using digital signals to send and receive voice & messages. There are many service providers in the market that can send SMS using other means such as a PC. One of them available in many countries is called "Exotel". This service is using iCloud. It is believed this kind of service has not been regularised. For some reason, the service provider allows users to change the sender's ID.
Why Can't the Government Block the Service?
There is no reason why Government cannot issue directives to cellular partners and providers to block this kind of service. But it is believed that this will not help much as attackers will always come up with other means to negate the block and carry out their phishing business in other ways. Also, there will be many difficulties trying to track down and get rid of these attackers because they are likely to be overseas.
Whatever the Government can do will be rather limited. But one thing is for sure, no matter how much the Government could do to stamp out bank phishing, it will not solve the root problem of people being greedy & curious and can be easily lurked to reveal their personal information.
How does the attacker transfer the money out of the bank?
No one really knows how the attacker transferred the money out of the bank. One possible scenario could be as follows:-
Take the above SMS about MR C. JONES, for example, the attacker would have expected the victim to key in the user name and the password and click the "login" button when he lurked the victim to the phishing page. This might have established a network link.
When the attacker requested a bank transfer using the user ID and the passwords (given earlier by the victim), the bank would, as usual, send out an OTP message to the victim for which the attacker would have also received at the same time. Once the attacker is inside the victim's digital account, they will be able to do many things including silencing the subsequent SMS notifications. By the time, the victim noticed there were something wrong and contacted the bank to find out what had happened, the attacker must have already transferred the money out of the victim's account.
How does the Attacker Withdraw Above the set Limits?
This is one other question that most people would like to know. Usually, there is always withdrawal limits set either by the bank or the users. Once the limit is breached, the users will get at least an SMS prompt or the bank will intercept and stop the transaction.
One possible answer is that since the attacker already has full access to the victim's digital account, he can always change the withdrawal limits. He could also change the limits that will require the token confirmation or SMS notification as shown inside the apps of this bank.
Why Can't the Bank Strengthen their Systems?
There is also no reason why the banks cannot strengthen their checking, verification and messaging system for large sums of money to be transferred out of an account. This was one of many points that many victims have raised. They blamed the banks for the loss of their money.
Usually, the banks would have multiple checking & verification systems in place. Maybe all these safeguards are still not 100% foolproof. The banks should therefore carry out throughout investigation and find out whether they could further strengthen their checking & verification systems.
The banks are relying on an SMS system which is not very secure. They should consider using a better messaging system.
What the users could do to prevent future happening?
There are a few good suggestions thrown around in the forums.
Recommended
1) Never trust any SMS or email messages and do not click any links in the SMS or email, especially those from the banks. Always use only the Bank's Apps for inputs and entries;
2) Always check if the web address is correct; If one must access the internet banking site, always use the one saved in the bookmark & never the one in banking SMS site or in the email;
3) Always log out using the apps and clear the cache after use;
Other Suggestions
1) Use 2 devices, one for banking transactions which could be the iPad or PC and use the phone only for receiving OTP SMS. But this method will not help if the attacker already has the victim's user ID and passwords;
2) Always test the site first by entering a false password and user ID. Phishing webpage will never be able to correct any wrong entries. But this method will allow also the attacker to upload their spyware into one's phone;
3) Never be lured to fake pages that offer attractive rewards, like lucky draws, job offerings or the like or any news about new notes or otherwise. This is easy said than done. Some people will find it difficult to resist such temptations.
Conventional spyware will require phone users to click a button on a webpage for the spyware to be uploaded to the phone. This Pegasus spyware only needs to place a WhatsApp call to the target device for the spyware to be installed. Once it has been installed, the spyware will be able to copy messages, photos and record one's call on a 24/7 basis. It might even turn on the phone's camera, activate the microphone to record conversations. report where we are and who we have just met etc.
This 3-chart enables one to compare the infection and death rates of various countries in the World. They are enlarged charts linked to the following webpage
1. 2 top buttons are for adding and selecting countries. The right button is for adding countries to pre-selected countries. It will be displayed when the region and type buttons are selected. The left button is for selecting & building up countries;
2. Use dropdown boxes provided to select the menu for charts;
3. Use <ctl><click> to select on country or <shift><click> to select several countries in <select countries>;
4. Use [Call/Save Chart] to call and save the existing chart. The data saved can be erased by browser memory clearances;
5. Use the [Expand] button to expand/contract and examine each chart.
6. To go to Our-World-in-Data page, just click the "full screen" symbols. It is located at the bottom right of every chart.
The death rate is usually more reliable than the infection rate; a lower testing rate will often give false readings in the infection rate
Case Fatality Rate of Various Countries
% of Population Vaccinated According to Vaccination Status
Share of the population partly or fully vaccinated against COVID-19
This is an animated bar chart showing the progress of vaccination in various countries. Click the play button at the bottom to play.
Vaccines Used in Some Countries
One can check from here the various brand of vaccines used by various countries. Unfortunately, not all countries are here
"Sticking keys" is a common problem in some keyboards. The keys become not sensitive to the finger pressure last time, causing missing characters while typing.
The conventional wisdom is to remove the keycap of the key and take out the key hinge to clean them. But this kind of repair will often break the very flimsy clips on the keycap. The recommendation is to replace the cap and maybe the key hinge. But these keycaps are not easy to find. They are also quite expensive.
This article will not only introduce an easy way to clean the stuck key but also provide an alternate solution to fix the keycaps if they were broken.
The Components of the KeyPad
The keypad consists of the 3 components. The first component is the base. It is made of metal. The second component is the keycap hinge which consists of 2 small plastic pieces; one of the pieces is pivoted and allowed to move freely and the other is a fixed piece that will be clipped onto the metal base. The last component is the keycap. It has very few flimsy and easily broken hooks and clips as shown in the following pictures.
Why the keys can get stuck?
The key hinge can get stuck at times due to a lack of lubrication. This will prevent the keycap from moving up and down. When this happens, the keycap will no longer be sensitive to the finger pressure; therefore, users will experience a stuck key. Removing the keycap & key hinge will usually free the stuck key but soon, the stuck key will reappear in the future.
Knowing this to be the problem, one could use some lubricants such as WD40 or an electronic switch cleaner to clean and lubricate the keys. One can do this without having to remove the keycap and key hinge. The electronic switch cleaner is a better choice because the fluid will evaporate quickly whereas WD40 will leave some oil behind the keyboard.
Why the KeyCap can be Broken?
Usually, the keycap is broken by the wrong way of removing the keycap. If one has the chance to open up a keycap and look at the back, one will see this picture
For this Logitech MX keyboard, the keycap has a pair of plastic clips at the top, and a pair of hooks at the bottom. Therefore, one should always remove the keycap by prying open the keycap from the top right-hand and the left-hand corner. One should never try to pry open the keycap from the bottom as this will break the hooks of the keycap. After the clips at the top are free, the keycap should be "slide" forward to unhook the keycap before removing it.
The keycap clips at the top can be easily broken if one were to force-fit the keycap when it is not in the correct position. To re-assemble back the keycap, the correct way is to place the keycap such that the bottom hooks can be "slide" in first, and when there is a feeling that the hooks are in the correct place, press the top part down, one corner at a time.
Why the Key Hinge can be Broken?
As for the key hinge, one should always remove it from the top right-hand and left-hand clips. Prying the hinge from the centre might break the hinge.
What to do when they were Broken?
One can search the web and buy them online but they are pretty expensive. The pairs of the keycap and the hinge might cost around USD15/=.
If the keycap clip is broken, one can still use it by applying a small bit of strong rubber glue on the top of the moving hinge (as shown brown in the yellow moving hinge). After that, secure the keycap with adhesive tape until the glue is dry. Try not to apply too much glue as the spilling of the glue might glue up the moving hinge. It is not wise to use "super glue" for the job as there might be a need to break the glue in future to do some repair underneath the keycap.
If the keycap hook at the bottom is broken, looks like the repair will need a replacement. This is because the keycap is using the hook as a pivot for the up and down "floating" movement.
However, it might be worth the while to investigate if one can glue a hook made of copper wires and glue it onto the keycap as suggested by the following picture. One can also try to use the keycap with the missing hooks though the key might not be so sensitive as before.