NewStats: 3,260,838 , 8,172,754 topics. Date: Tuesday, 27 May 2025 at 07:32 PM 4e64k6z3e3g |
(1) (10) (of 18 pages)
![]() |
franchasng: I already reviewed the product sold on the official Nigerian website, There is no product being sold with 72h protection. The original one being sold is 48h. You can my claim by checking the site yourself. Please feel free to correct me if I’m mistaken. https://www.nivea.com.ng/products/nivea-men-deep-antiperspirant-roll-on-40059006638630272.html |
![]() |
The fake one's in the pictures below are the one's with 72h instead of 48h. Someone should correct if I'm wrong. The same applies to the body lotion; if you compare it with what's sold in their official Nigerian store, some of the products are completely different. 3 Likes 3 Shares |
![]() |
Hmm ... Out of curiosity, I decided to check the one I use (Nivea Men Deep Black Carbon) and just discovered it's the fake one I bought. Funny enough, the fake one is being sold all over e-commerce store like jumia and supermarket 3 Likes 2 Shares |
![]() |
Have you been able to get someone? I got mine from a supplier in Ibadan if you're interested, I will drop his .
|
![]() |
.
1 Like |
![]() |
Malcolm21: Just use it in an equation A B C D (A + D) / C = B EXAMPLE 4 [9] 1 5 (4 + 5) / (1) = 9 3 [7] 1 4 (3 + 4) / (1) = 7 3 [3] 2 3 (3 + 3) / (2) = 3 2 [3] 3 7 (2 + 7) / 3 = 3 22 Likes 1 Share |
![]() |
It's a historically inaccurate meme that's been circulating for the past few years, there is no evidence to suggest that 13 men killed themselves because of her just like the op stated. It was likely made by an internet troll just to trend. https://abitofhistoryblog.com/2017/12/12/princess-qajar-and-the-problem-with-history-memes/ |
![]() |
The Year 2028 problem is a problem caused by how electronics and computer devices store dates. When these dates reach 1 second after 03:14:07 UTC on January 2038 they will have an error and incorrectly store the wrong date (in some cases 20:45:52 on Friday, 13 December 1901). To understand why this happens, we need to understand the background on how these dates are stored. ![]() |
![]() |
Thales01: Check if a session ID was generated and share it with zenith bank staff onsite or via call, they'll be a able track the transaction with it. 2 Likes |
![]() |
I think I have watched a movie before based on this scenario before. The kid was suffering from a condition related to dyslexia and dysgraphia . They both fall under specific learning disorder, maybe you might need to see a therapist to find out if she's suffering from this issue. Her brain might be having difficulty decoding them, an example is not being able to tell O, P and D apart. You need to teach her in a much more slower detailed manner. if possible see a therapist to carefully evaluate the problem. You need to also go to her school to find out more about how she behaves in class, like if she has issues reading out loud from a book in front of the whole class, evaluate her test notes and exam paper to observe her writing style just to have a much more detailed overview of the issue is facing. Also be careful with the beating, she might be trying her best to actually memorize those words. It'll instead demoralize her, making her confused as to why she's having difficulty ing, which might not be her fault. 8 Likes |
![]() |
immortalcrown: I don't quite get you, even if she did forget to of her , Op discovered she was still logged in. He could have simply logged out but he decided to read her private message and discuss them here. At this point he is maintaining unauthorized access to her . |
![]() |
immortalcrown: Sorry for beating around the bush, I didn't properly read how he initially got access to her . More correctly, this is just a case of unauthorized access since the owner already logged in to his device. 1 Like |
![]() |
immortalcrown: The school does not need to disclose the source code, You could access the compiled source code of any website by pressing the F12 key and selecting "View Source Code." Through this, He decoded the encoded employee data, revealing their details. All the information seen was already publicly accessible. It's just like me clicking your name and viewing your via the compiled source code which can be accessed publicly but it was still considered as "hacking" by the authorities in power, which was considered foolish by experts. When individuals lacking understanding in certain fields hold positions of authority, you encounter nonsensical decisions like this becoming law. This is why the term hacking can vary based on country laws |
![]() |
immortalcrown: Countries have different laws as to what is considered hacking. He did access her without her authorization and it can considered hacking based on some other country laws. Even if she did on his phone, he was not given permission to have access to her private messages. It might sound stupid, but people can get you sued for something as little as this in another country. For example, A journalist in missouri faced potential hacking charges due to the fact he pressed the f12 key on his keyboard and viewing a school website source code which revealed sensitive employee details. https://www.the.com/2022/02/15/missouri_html_hacking/ |
![]() |
MTN selling this same product for 30k, with extra 5k, you get atleast 120gb free data on activation and some added bonuses. https://shop.mtn.ng/4g-router-.html 2 Likes |
![]() |
Zlibrary - It has one of the largest ebook library which can be accessed for free with over 13.5 millions books and over 85 million articles. Most of the books and articles you'll ever need can be found here. You're limited to 10 books/articles per day. You can access them via single.se or single.rs or single.re or z-library.se or zlibrary-global.se (and their redirects). |
![]() |
You should try Indian food too, It is a bit expensive but when i tasted it, I just don't know but it tasted so good and they have lots of different dishes to choose from. |
![]() |
Doctors in Australia are sharing information about a first-ever medical discovery. They pulled a live, wriggling three-inch worm from a woman's brain! A 64-year-old woman was experiencing forgetfulness and worsening depression when doctors found a lump in her brain. 1 Share |
![]() |
Hmm, from what i'm able to see here, the twitter is linked to [email protected] Seems he had another on twitter with this name but got suspended @Abiodun08811318 5 Likes |
![]() |
If the EU didn't force apple to start making iPhone compatible with the USB-C model, I don't think apple will be willing to migrate to this model. Just that they'll loose lots of customer base in the EU which isn't worth it for them.
14 Likes |
![]() |
Hate to bust your bubbles but know that volte/5g is disabled on pixel phones by Google for regions that don't have an official market and Nigeria is part of that list. The only way to by these is via root, but you miss out on getting regular software updates from Google. |
![]() |
youngtee5: What's the name of the course? Do you consider ing the course for free if it's available?. |
![]() |
dopedan: Quickly call their customer care and explain the issue to them. |
![]() |
DyingFetus: Are you also the same owner of this 3 Likes |
![]() |
These portable, low-battery operated devices are available all over the internet ranging from about 10$ -to 500$, with a beam power of maybe up to a few hundred milliwatts. These devices when used against aircraft are harmful and can blind or disorient the pilot and jeopardized the safety of the craft and everyone aboard. 2 Likes |
![]() |
2.4GHz provides more coverage but less transmission speed, 5GHz provides more transmission speed but less coverage. 2.4 will be able to go through walls better than 5ghz. 5Ghz will do the same but it will require more power. 2.4 also has the same range as your Bluetooth, microwave and other devices, so it's prone to interference. 1 Like |
![]() |
iSense247: A less payment does not require you to swipe your card though a POS machine or make interactive with your device to do a transfer before you make payment. With less payment, you just hover your card or a device next to a ed machine and it's much more secure. Any phone that is NFC [Near-Field Communication] enabled will also be able to utilize this feature, also you can use your credit or debit card if it has a RFID chip embedded in it. Here's how a less payment typically works 1. The customer presents his less card or NFC enable phone over a POS terminal that accepts such payments 2. The wireless chip transmits card information 3. The payment terminal the bank 4. The card issuer transmits an approval or a denial. Here is a small video explaining graphically what all this mean https://www.youtube.com/watch?v=2nldPwska-8 YOU ALSO HAVE TO BE CAREFUL BECAUSE ANYBODY CAN SCAN YOUR CARD AND EASILY MAKE FRAUDULENT TRANSACTIONS https://www.youtube.com/shorts/3C2wK7TFP0c cc. Sablexxxtoons yaki84 PHIPEX 209 Likes 17 Shares |
![]() |
airsaylongcome: They posted just enough for you to search and to the credentials as proof, and this is the same with other Nigerian websites i searched. Most of them know their data has been breached but they don't bother to let 's know these details or prefer to just deny it. 1 Like |
![]() |
Every Nairalander should be mandate to update their . Most of our names and are being sold on the dark web. A link got shared in an OSINT group to if our data had been compromised, and I noticed many Nigerian websites, including Nairaland, were identified as compromised Upon investigating the extent of the data breach on Nairaland, I discovered many names and s displayed were still functional with active s still utilizing them. What makes the situation even more concerning is that our s are not even encrypted, the compromised also includes social media s and email addresses of each s. Most of us use a single to to our email and social media s which makes it even more dangerous. We need start taking the privacy and security of our data much more seriously, most people don't care because they don't have anything to hide which is very bad. |
(1) (10) (of 18 pages)
(Go Up)
Sections: How To . 81 Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or s on Nairaland. |