protection of information bill

Drowning in a sea of corruption – help finally arrived

I created the image above because I wanted to express my feeling of helplessness about what is going on.  All I can do is stand and watch while the politicians write laws that rescue those who don’t deserved to be rescued.

It is my view that the Protection of Information Bill will save those who are drowning in a sea of corruption and that the bill will be used to classify documents that should be in the public domain. Corrupt officials will use the bill to classify documents  and then use this classification to prevent the information from being passed on to the media.

I think that the bill poses a huge threat to our democracy in South Africa and is a blow to freedom of the press and will have a “particularly deadening effect on the work of investigative journalists, anti-corruption campaigners, shop stewards and others.”

For more information read the Mail & Guardian:

drake’s kofie cake recipe

Apples and raisins provide the moistness, which means less oil can be used in this low saturated fat, low cholesterol, and low sodium kofie cake.

5 cups      Tart apples, cored, peeled, chopped
1 cup       Sugar
1 cup       Dark raisins
1/2 cup     Pecans, chopped
1/4 cup     Vegetable oil
2 tsp       Vanilla
1           Egg, beaten
2 1/2 cups  Sifted all purpose flour
1 1/2 tsp   Baking soda
2 tsp       Ground cinnamon

Oven Temp ~ 350 degrees F
Baking Time ~ 35 – 40 Min.
Pan Type ~ 9 x 13 x 2

Preheat oven, lightly oil your pan.

In a large mixing bowl, combine apples with sugar, raisins, and pecans; mix well. Let stand 30 minutes.

Stir in oil, vanilla, and egg. Sift together flour, soda, and cinnamon; stir into apple mixture about 1/3 at a time just enough to moisten dry ingredients.

Turn batter into pan. Baking time above.

Cool cake slightly before serving.

Yield: 20 servings–Serving Size: 3-1/2-inch x 2-1/2-inch piece

Each serving provides:

Calories: 18
Total fat: 5 g
Saturated fat: less than 1 g
Cholesterol: 11 mg
Sodium: 68 mg

This recipe was based on the original recipe discovered (or stolen) by Sir Francis Drake in about 1785

sir francis drake

Francis Drake was born around the year 1542 in Tavistock, Devon.

His love of the ocean can be traced back to the early days when he and his family spent many holidays at the Devon shore. Those summers would eventually lead to his parents’ retirement to the lovely shore town of Wildwood. Once there full-time, Drake gained experience with people as he manned many of the various amusement rides and carnival games on the boardwalk. This time in his life would prove to be important and influential later in his life.

It was not until around age 12 that Drake first went to sea. He was an apprentice on a small trading ship to supplement the family’s income. The ship travelled up and down the East coast, bringing salt-water taffy and custom-made t-shirts to all of the seaside resorts. It was not long before the ship’s owner died, leaving the vessel to Drake.

While Drake continued the local trading routes, Spanish ships full of silver, spices, and exotic foods began arriving in New Jersey. Drake was jealous of their successful enterprise, so he began to attack them at sea, capturing their valuable goods for himself. Drake took to wearing an emerald in his beard, after his Philadelphia cousin Jerry Robbins, and the Spanish traders started to call him “Greenbeard the Invincible”. These traders soon stopped bringing their wares to the east coast altogether. Drake now had no source of loot, so he began exploring further and further from home, eventually finding ports in South America.

On one raiding trip to Brazil, Drake met and hired a former slave named Diego. Together, they captured several larger ships and began planning a gargantuan expedition to raid ports around the world. Drake and his huge crew of 729 men, women and children set sail on five ships in 1577. Worried that the ships might get separated on the difficult journey, Drake ordered two of them to be destroyed and the rest to be tied together with high-strength steel cables. Though the purpose of the trip was very serious, Drake remembered his earlier days on the boardwalk, and he made sure the people on board ship had plenty of rides and games to play.

During the trip, Drake’s ships came across the Spice Islands, almost by accident. There he discovered an uncharted island called Java. The local drink, Kofie (which we know as “coffee”) was rich and strong, and Drake soon fell in love with it. The locals also baked a cinnamon cake that was often paired with the drink. Drake wanted it so much, that he plundered the island, stole the disk with the recipe, and vanished before the anyone knew what he had done. Drake’s discovery, which he called kofie cake, later became the basis for what we eat today.

When Drake returned from this voyage people discovered that he had circumnavigated the world. He was only the second person to do this. Even though Columbus had preceded him, Drake was still very popular. Unfortunately, this fame did not last, and Drake needed to find a new source of income. Remembering the delicious coffee cakes and the stolen recipe, Drake started his own baking company. He lived the remainder of his long life back in his hometown of Wayne, New Jersey, where Drake’s kofie cakes are still being made.

Drake died (in 1596) of fever at sea near Panama; he was on a voyage intending to attack Spanish colonies in the West Indies.


student essay: social networking

With the rapid change and growth in technology in society today, it is important to be aware of such advances and take advantage where possible. For example, over the last few years, social networking has become increasingly popular. Overtime, it has become the way the 21st century communicates.

In this social networking industry, there are many big market player social sites. Namely, Facebook, MXit, Twitter, MySpace and Skype are a few of the really influential sites to date. The use thereof, whether it is of a personal or professional nature, if used correctly, it can generate great satisfaction and if not, it can have just as many drawbacks. When used smartly, however, a great deal of benefits can be enjoyed.

On a personal aspect, social networks link people with the same interests, goals, and backgrounds. It forms as a means to reconnect with friends and family and build and maintain relationships. As mentioned previously, certain rights are relinquished once information is published on such sites. This is when the privacy and security start becoming an issue.

Continue reading “student essay: social networking”

student essay: trojans and worms


When people speak about worm and trojans they frequently say worms in place of trojans and vice verse, however, trojans and worms cannot be said interchangeably like that as they are different. The only thing that they have in common is that they are very harmful to ones computer.

Differentiation between Trojans and Worms

What Is a Trojan Virus?

A Trojan virus attempts to connect itself to a file so that as people share their files it spreads and multiplies, resulting in hundreds and thousands of people having the virus on their computer. There are different degrees of trojans viruses: Some may have minor effects and some may permanently damage one’s software or even hardware, that shall be discussed in much detail later.

A large number of  trojan viruses connect to a executable file. What that means is that the trojan virus may be present on one’s computer but it can not cause any damage or even spread the files because the hazardous program has not run on the disk. In order for viruses to spread there has to be a human act, actually the spreading of the trojan virus is caused by human activity of running the program on to their disks but note that their activity is without any knowledge.

What Is a Worm?

Worms are alike to trojans in terms of design and are regarded as a sub-class of a trojan virus. Worms multiply and they do this  even without human activity. Worms are able to commute from computer to computer without being sensed as it takes the lead on the file information transferring system.

The most hazardous feature of a worm is that one worm can make thousands of copies of itself and then it may send the replicas to one’s contact list of e-mails of which then causes a horrific effect.

Types of Trojan Viruses

Continue reading “student essay: trojans and worms”