About Mwendwa Kivuva

Do you want to change your life? Successfully create happiness, prosperity, abundance, fulfillment, and all your heart desires?

Psychologists say it takes 21 days to form a habit, including a new belief system, with repetition being key. I call this how to brainwash yourself.

Your mind is extremely powerful. It records what you are hearing or saying. It records all your life memories and events as mental movies. It does not hear NOT or NO. If you say I will not procrastinate, it hears “procrastinate“. It cannot comprehend the future. It only knows the present. That is why you should always see your goals as accomplished. It does not know the difference between imagination and reality. That is why we get scared at the movies.

You will draw to yourself the situations, circumstances, people, and events that match your dominant feelings, thoughts, and words. You usually think the same thoughts over and over again, and that is why you get the same results over and over again. It’s no wonder Albert Einstein said “Insanity is doing the same things over and over again and expecting different results”. So, how do we brainwash ourselves? I find the following four steps effective in brainwashing yourself.
1. Make a list of what you want in full details. This may be things about Lifestyle, education, adventure, or public speaking, whatever it is.
2. Visualize having already attained your heart’s desire. Maybe see yourself speaking at Engage. Begin to talk about what you desire as if it’s already a fact. Use your imagination as a child and pretend. For example, talk about your new found love. Talk about that residence in a top address. Talk about how you are a great public speaker. Stay away from any influence that contradicts your wishes. This can be negative people, negative movies, or even news.
3. Create an affirmation for your needs. For example, “I am”, or “I have” then add your need. For example, “I am a great public speaker”. Every day, recite the affirmation over and over again. Do this for a minimum of 21 days. Make sure it does not feel like work. “I am a great public speaker. I am a great public speaker”.
4. Repeat, Repeat, Repeat, until you believe it. Repetition creates new beliefs in the subconscious mind. For example positive affirmations work even if you don’t belief them at the beginning. You attract the things that you think about most often.

To recap, make a list of your desires, visualise having achieved your desire, recite your affirmation, and Repeat.

Remember, it takes a minimum of 21 days to create a new belief system.


A Toastmasters CC2 Organise your speech, delivered on 1st November 2017, at United Kenya Club, Nairobi, Kenya. NB. Most of the actual speech was paraphrased, and did not follow the script written here

I was having a conversation with @MercyMutemi, and it came to the elected representatives in Kenya who have got into power despite being implicated in grant corruption. “Yaani. We love thieves. Love them. Love them!”, Mercy exclaimed. This led to this social explanation on why we love our looters.

The Tragedy of the Commons.

The tragedy of the commons is an economic problem in which every individual tries to reap the greatest benefit from a given resource. As the demand for the resource overwhelms the supply, every individual who consumes an additional unit directly harms others who can no longer enjoy the benefits. Generally, the resource of interest is easily available to all individuals; the tragedy of the commons occurs when individuals neglect the well-being of society in the pursuit of personal gain. (Source: Investopedia).

Ok, let me now put the Tragedy of Commons into context where the normal villager can understand. This is if you have ever been to a grazing field. In most African societies, we have common grazing fields. All villagers graze on common grazing fields. This is what we call community land. But because the land has no ownership, we overstock livestock, deplete the pasture, until there is no enough for our livestock, and our animals die. On the other hand, if you have your own land, say 10 acres, you will be careful not to overgraze or overstock. So you will partition your land into paddocks, and ensure your animals graze in the paddocks using a pre-determined timetable not to deplete the pasture. That is the perfect example of the tragedy of the commons.

The tragedy of the commons: We only care if our MCA, MP, or Governor stealing from us. But if our Minister or President is stealing, he is our tribal hero. He is increasing the size of our paddocks.

What is the political relevance?

If a politician from our tribe is stealing, we have some untold pride. They are grazing on the community land of other communities thus not affecting us. We are sad if a politician from the other tribe is stealing from the common basket of all communities. We are sad when our governor steals because we are all from the same tribe in a county. The governor is grazing alone in our communal land, and denying us opportunity also to graze. All this translates into the convoluted book by Michela Wrong of 2010 who quoted whistle blower John Githongo philosophy of “it’s our time to eat”.

In a nutshell, the idea is this, if the politicians are stealing from the National coffers, then they are stealing for us, and denying other communities [enlarging our paddocks]. Which is good for us. That is the narrative some politicians use in their campaigns. They tell the electorate they stole from government to bring to them. Perfect psychology that sells to the majority simpletons in our midst. When one of our own steals, we say “wacha ajisaidie na pesa ya serikali”. We never see it as our money. Its on a bigger budget pool that we cannot comprehend. We don’t even know how it is distributed. That is the main reason we love our thieves. We love our thieves, that is in no doubt. Check the results of your last elections, and see how many politicians who looted public resources are back in positions of power and influence.


Tesla Model 3 now on roads

Tesla unveiled the Model 3 in 2016, with Elon Musk promising a cheaper electric car than the Tesla Roadster and Model S.

In July 28 2017, Tesla hosted its delivery event for the first batch of 30 Model 3s pre-ordered in 2016. During this event, they released a bunch of information regarding the price, options, features, and specs of the Model 3.

David Imai, Senior Manager, Exterior and Interior Design at Tesla described the Tesla  as designed in a way where  “form can follow function without sacrificing comfort, performance, or styling”, because the cars have been build from the ground up.

The Model 3 starts at $35,000, but with options the price can get as high as $59,500. This dies not include taxes for your final destination, or country.

Standard Model 3

  • Unit price: $35,000,
  • 220 miles range (354 Kilometers range),
  • 5.6 sec 0-60mph (96kph),
  • 130 mph top speed (209kph top speed)
  • Full self-driving hardware
  • Wi-Fi and LTE connectivity
  • Free over-the-air software updates
  • Full LED lighting
  • Eight year, 100,000-mile battery warranty

Long range model 3

  • Unit Price: $44,000,
  • 310 miles range (499 Kilometers range),
  • 5.1 sec 0-60 mph (96kph),
  • 140 mph top speed (225kph top speed)
  • Rear wheel drive (the beginning configuration)
  • Premium upgrades
  • Three customization options: wheel size, exterior color, autopilot features

Options for Model 3

  • Long range battery – $9,000
  • Paint: Black, midnight silver metallic, deep blue metallic, silver metallic, pearl white multi-coat, red multi-coat (all colors but black cost $1,000 extra)
  • Wheels: 18″ aero or 19″ sport for an additional $1,500
  • Upgrade interior for $5,500 – Heated seating, two rear USBs, wood decor, 12-way power adjustable seats, premium audio system, tinted glass roof, auto dimming and heated side mirrors, LED fog lamps, center console with storage for docking two smartphones
  • Enhanced autopilot – $5,000 – Match traffic conditions, keep in lane, automatically change lanes, transition from one freeway to another, exit freeway and self park
  • Full self driving capability – $3,000 plus Enhanced Autopilot – This isn’t available now

For a while now, there have been rumors of Bitcoin war. The two camps have been sparing for over a year, and the fight is scheduled on 31st July 2017 Midnight. The winner will be announced on August 2017. That whole month will be used to evaluate the winner.

The War

This fight has been necessitated by a number of proposals for technical changes to Bitcoin – that is User Activated Hard Fork (UAHF) vs User Activated Soft Fork (UASF)

The User Activated Hard Fork (UAHF) is a proposal to increase the Bitcoin block size scheduled to activate on August 1. The UAHF is incompatible with the current Bitcoin ruleset and will create a separate blockchain. Should UAHF activate on August 1, there will be a new blockchain spewing out new coin associated with that Fork.

The User Activated Soft Fork (UASF) is a proposal to adopt Segregated Witness on the Bitcoin blockchain and could result in network instability. It is scheduled to activate at the same time as the UAHF on August 1.

If you have your bitcoins in any BTC wallet, be sure to find out which side your wallet is cheering, because that will decide the value of what you will be holding after the war is over.

Why have 2 different forks?


The problem that the Bitcoin platform is facing is that as more and more transactions are being conducted, more blocks have to be added to the chain. Blocks are generated every 10 minutes and are constrained to a maximum size of 1 megabyte (MB). Due to this constraint, only a certain number of transactions can be added to a block. The weight of the transactions, represented by the blocks, is weighing down the network and causing delays in processing and verifying transactions, in some cases, taking hours to confirm a transaction as valid. Imagine all Bitcoin transactions that have been carried out since the inception of Bitcoin in 2009 sitting on the blockchain and still piling up. Long term, the system would not be sustainable if a radical change is not made.

SegWit is the process by which the block size limit on a blockchain is increased by removing signature data from Bitcoin transactions. When certain parts of a transaction are removed, this frees up space or capacity to add more transactions to the chain.

Segregate means to separate, and Witnesses are the transaction signatures. Hence, Segregated Witness in short, means to separate transaction signatures.

Read more: SegWit (Segregated Witness) Definition | Investopedia http://www.investopedia.com/terms/s/segwit-segregated-witness.asp#ixzz4nTOn151q
Follow us: Investopedia on Facebook

SegWit is an update for Bitcoin Core. It is assumed that this update will solve the problems. But some users, mining firms, i.e. Bitmain, and companies, i.e. Bitcoin Unlimited, do not support this idea. So, the realization of SegWit can split the whole system of Bitcoin. Some users and miners will accept new standards, but others can use the older version of Bitcoin code. So, different variants are considered to avoid this and save the one Blockchain of transactions.

Kenya does not have a data protection law. But there is a data protection bill [1] pending somewhere in the corridors of power.

Police in Eldoret arrested a man suspected of stealing over Sh180,000 from mobile money agents in Nandi using dozens of stolen SIM cards and ID cards, which were used to register M-Pesa lines

This is an election year in Kenya. As part of the requirements to vote, the Independent Electoral and Boundaries Commission (IEBC), the electoral body mandated to conduct elections, registered voters who will participate in the 2017 plebiscite. Just like most countries, to qualify to vote in Kenya[2], the voter has to be over 18 years, a citizen of Kenya, and hold an identification document which is either a National ID card, or a Kenyan passport.

This year, 19.6 million [3] people registered as voters. That is just about half of all Kenyan citizens of 48 million [4]. The beauty of the new revamped IEBC is that they released publickly all the datasets of registered voters [5]. Voter registration is only by physically going to a registration center. There is nothing like online registration. Registration entails capturing the biometric data of the vote. The biometrics are finger prints of both hands and facial features. They also capture all the details available at the registrar of person (full name, ID/passport number, and date of birth). Finally they capture your phone number, address, and voting location. To prove you are a registered voter, you are given a laminated card, which serves no purpose apart from bragging rights in the village pub. This whole process is called Biometric Voter Registration.

The author undergoes Biometric Voter Registration. Photo credit Mariana Mulinge.

Verification of voters
For some strange reasons, Kenyans feel a need to confirm their voter registration details. In this part of the world, elections are a high stake game, and the level of mistrust with the system is at it’s highest. According to the Constitution, the Electoral body has to provide a mechanism for the electorate to verify their voter data. Section 6 of the Election Laws 2011 was updated by The Election Laws (Amendment) Act, 2017 where “The Commission shall cause the Register of Voters to be opened for inspection by members of the public at all times for the purpose of rectifying the particulars therein, except for such period of time as the Commission may consider appropriate [6].

According to IEBC, there are two ways of identifying voters; through finger print scan, or though the ID document by either searching the ID number or scanning the machine-readable part of the ID. This process and tools are called Biometric Voter Identification (BVID).

In their wisdom, the IEBC provided a two week windows for voters to verify and correct any registration anomaly by physically going to a verification center. After the correction, the voter register is supposed to be accessible to the general public for auditing. IEBC has a provision to give the entire voter register to any entity for Ksh20,000 [7] (US$200). The law requires IEBC to provide the register for free or at a reasonable cost.

Not every Kenyan would require the entire register. Individual voters want to confirm their details on ongoing basis. IEBC has an SMS system where the voter sends an ID number to the phone number 70000 [8], and the system returns the registration details of that number if it’s registered. The cost of that SMS is Ksh7 (Us¢7). These are the parameters that the SMS returns; name, county, name, constituency, polling station code, polling station, ward. It does not matter who queries the database, the information returned is the same. One phone number can query as many registered voters as the amount of Ksh7 they are ready to spend. The system will return the full list of all those parameters. You don’t even need to send a challenge code like a date of birth to get that information.

IEBC SMS verification output. Image source twitter @OwenKims [9]

To make the system more intuitive, IEBC development a Web portal where voters can query the same voter information at http://voterstatus.iebc.or.ke/voter. Here at no cost, the voter uses their ID number to query and get their registration status. The query returns all these parameters; ID number, name, date of birth, gender, poling station, county, constituency, and ward. It does not matter which ID number you query, you will be able to get the voter data. Here too, more data than required for verification is displayed, and there is no challenge code asked by the system. Any automated bot can harvest the entire database. And that is the problem.

more data than required for verification is displayed, and there is no challenge code asked by the system. Any automated bot can harvest the entire database. And that is the problem.

The problem

For the privacy conscious, IEBC is doing poorly with how they are exposing raw data of nearly 20 million Kenyans to the world. Anybody with basic programing skills would be able to harvest the raw data through an automated search. If you search any random number with the format of Kenya ID numbers, say hypothetically 12345678, you will realize you can pull up citizen’s details, at least ID number, and name, and locality they live. Basic security tips would require the system to have a captcha to prevent automated harvest of the information, and also output just the required information for verification, and nothing more. A captcha is defined as program or system intended to distinguish human from machine input, typically as a way of thwarting spam and automated extraction of data from websites.

Screenshot IEBC website returning more information than necessary, and without requiring a captcha


To test this problem, I Googled one of the top Presidential candidate Raila Odinga’s ID number, which was readily available online [10]. I then went ahead to retrieve his registration details as shown in the screenshot below.

Screenshot of Raila Odinga’s Voter details. Image source @lordmwesh [11]

The technical solution

This data breech was discussed at length at the KICTANET mailing list [12], where the community provided several solution;

  • Have a captcha to prevent automated harvest of the information, and have a challenge questions like date of birth to supplement the ID number, therefore only have the data owner have access their information (suggestion by yours truly)
  • Limit requests per IP address (suggestion by Emmanuel Chebukati)
  • Implement a two factor authentication (suggestion by Denis G. Wahome)
  • A government backed smart card which would offer appropriate level of authentication without locking out access to a section of users (suggestion by Mark Kipyegon)
  • Use ID Serial Number as a check to match the ID number (suggestion by Ngigi Waithaka), which he thought could be central to Kenya’s citizen data authentication, where Citizens are made to keep their ID Serial number as their ‘private key’ for all authentication in government platforms. This suggestion was backed by Odhiambo Washington.
  • Integrate the IEBC system with the ecitizen platform [13].  (Suggestion by Victor Kapiyo)

The policy, legal, and procedural solution

Still on the mailing list, Grace Githaiga supported an idea of legitimate implementable solution, which could be sent to IEBC, mooted by Emmanuel Chebukati. Ali Hussein suggested the whole verification exercise be suspended until the rookie mistake by IEBC is rectified. He continued,  “This is a serious breach. In the dark web there are vendors of stolen identities. What IEBC has done is to basically leave the bank vaults open and invite every identity theft vendor in the world into this treasure trove.” Victor Kapiyo added that the implementation by IEBC showed that in the absence of guidelines on how citizens data is managed, then anything is possible, and it wouldn’t be so hard to mine this data from IEBC servers for whatever purpose.

Grace Mutung’u provided a legal interpretation quoting the provision of the elections act on the inspection of the register by the public. She said the idea of the elections act was not only for voters to verify their details but also for the public to inspect the register. Inspection serves an important role in assuring the integrity of the vote by weeding out errors, and non existent voters. The register is also available in physical form at constituency offices for public inspection. It should therefore be possible for members of the public to view other people’s voter registration details. The question should only be what details are made public and also how to prevent harvesting of the data. She objected the justification for serial numbers or SMS [two factor] verification.

From the problem statement, only two of these implementations seem feasible, and still comply with the elections law of allowing a public audit of the register. The solution is have a captcha, and output just enough information to verify a voter, and nothing more.

From the problem statement, only two of these implementations seem feasible, and still comply with the elections law of allowing a public audit of the register. The solution is have a captcha, and output just enough information to verify a voter, and nothing more.

Changes by IEBC

On being notified of the glaring data breaches, IEBC put of the online system for 2 weeks as they were implementing the security mechanisms. The SMS platform remained firmly online.

Computer screenshot of IEBC verification page temporarily down


Now, the new, robust system according to IEBC is live. With only one change, captcha.

A mobile screenshot of IEBC website voter identification form screenshot with the captcha


From the query, the system is still spewing out more information than required. From a data protection perspective, a clean implementation should maybe just show the initials of the voter, in the case for Raila Odinda, show RO, and his polling station. The query should certainly not show his date of birth, and gender.

A mobile screenshot query from the IEBC system still with more private information relayed to the public than necessary.


This sort of rookie mistakes makes you feel there are no competent programmers, cyber security analysts , legal professions, and policy experts remaining in Kenya. But we are here :-). This serves as an indictment to the community who develop applications without proper system analysis.

Kenya does not have any data protection law. But there is a draft data protection bill. This should be a priority for us in lobbying the next Parliament. Data protection is envisioned in the constitution [14]. Article 31(c) of the Constitution outlines the right of every person not to have “information relating to their family or private affairs unnecessarily required or revealed” and Article 31(d), the right not to have “the privacy of their communications infringed”. It would also regulate the collection, retrieval, processing, storing, use and disclosure of personal data.

The Access to Information Act 31 of 2016 confers the Commission on Administrative Justice the oversight and enforcement functions to ensure citizen’s privacy is maintained. in section 21 of the Act, the Commission on Administrative Justice has the Functions [15]; (b) request for and receive reports from public entities with respect to the implementation of this Act and of the Act relating to data protection and to assess and act on those reports with a view to assessing and evaluating the use and disclosure of information and the protection of personal data; (d) work with public entities to promote the right to access to information and work with other regulatory bodies on promotion and compliance with data protection measures in terms of legislation; (h) perform such other functions as the Commission may consider necessary for the promotion of access to information and promotion of data protection.

Why is all this important?

The Business Daily newspaper has case in point of citizen data breach. In 2011, a convicted criminal serving time at the Kamiti Maximum Prison, forged an ID card belonging to retired Chief of the Kenya Defense Forces (KDF), General Jeremiah Kianga. The fraudster conned Kenyans off thousands of shillings via mobile money with the promise of enrolling them in the army. Last March, police in Eldoret arrested a man suspected of stealing over Sh180,000 from mobile money agents in Nandi using dozens of stolen SIM cards and ID cards, which were used to register M-Pesa lines [16].

Who else is mishandling citizen data in Kenya? Reach out to me if you have such case studies at @lordmwesh

The next debate on information confidentiality is usually centered around the question, “Why should I care if I have nothing to hide?” The next article will try to answer that question. Do you have anything to hide?


  1. Data protection bill 2013 http://icta.go.ke/data-protection-bill-2012/
  2. Elections Act No: No. 24 of 2011 http://www.kenyalaw.org/lex//actview.xql?actid=No.%2024%20of%202011
  3. Registered Voters Per Constituency For 2017 General Elections https://www.iebc.or.ke/docs/Registered%20Voters%20Per%20Contituency%20For%202017%20General%20Elections.pdf
  4. Kenya Population http://www.worldometers.info/world-population/kenya-population/
  5. Statistics of 2017 voters https://www.iebc.or.ke/registration/?stats
  6. Election Laws Amendment Act 2017 http://kenyalaw.org/kl/fileadmin/pdfdownloads/AmendmentActs/2016/ElectionLaws_Amendment_Act_No1of2017.pdf
  7. IEBC register Sh20,000 price tag questioned www.businessdailyafrica.com/news/IEBC-register-Sh20-000-price-tag-questioned/539546-4002054-fdm6p9/index.html
  8. Check registration status by texting ID or passport number to 70000 – IEBC www.the-star.co.ke/news/2017/06/29/check-registration-status-by-texting-id-or-passport-number-to-70000_c1588008
  9. SMS verification output https://twitter.com/OwenKims/status/880376549920448512
  10. Raila shares ID number with another voter https://citizentv.co.ke/news/raila-shares-id-number-with-another-voter-155443/
  11. Screenshot without captcha https://twitter.com/LORDMWESH/status/880554515832782855
  12. [kictanet] Poor show by IEBC: Data Protection in year 2017 and the case of raw voter registration datahttps://lists.kictanet.or.ke/pipermail/kictanet/2017-June/052096.html
  13. Kenya E-citizen portal https://www.ecitizen.go.ke/ecitizen-services.html
  14. Constitution of Kenya http://www.kenyalaw.org:8181/exist/kenyalex/actview.xql?actid=Const2010
  15. Access to Information Act No. 31 of 2016 http://www.kenyalaw.org/lex//actview.xql?actid=No.%2031%20of%202016
  16. Safaricom goes for photo IDs to block M-Pesa fraud http://www.businessdailyafrica.com/corporate/companies/Safaricom-photo-ID-agents-M-Pesa-fraud/4003102-4008158-1sep6kz/index.html retrieved 10 July 2017


Humans have been traveling across the globe even before borders were drawn for reasons ranging from business, exploration, social, medical, education, and migration. After 9/11, traveling became more complex with tight Visa rules, military grade screening of passengers, and increased surveillance. The latest casualty of these tight measures are ICT savvy travelers.

In March 2017, The US and Britain introduced new regulations for flights from Middle East, and Africa. The regulations ban passengers from carrying large electronic devices citing security concerns. The countries affected were Jordan, Egypt, Turkey, Saudi Arabia, Qatar, Kuwait, Morocco and the United Arab Emirates. The circular from the US homeland security read:

“These enhancements apply to 10 specific airports. The affected overseas airports are: Queen Alia International Airport (AMM), Cairo International Airport (CAI), Ataturk International Airport (IST), King Abdul-Aziz International Airport (JED), King Khalid International Airport (RUH), Kuwait International Airport (KWI), Mohammed V Airport (CMN), Hamad International Airport (DOH), Dubai International Airport (DXB), and Abu Dhabi International Airport (AUH).”

With the new regulations, any device bigger than a hand help phone should be put in the checked-in luggage, and not carried onboard by the passenger. The listed devices are laptops, tablets, e-Readers
cameras, Portable DVD players, electronic game units larger than a smartphone, travel printers, and scanners.

In the age of Snowden and Wikileaks, these regulations pose a cyber security risk. It gives a window of opportunity for anybody targeting data in the devices to get access to the checked-in devices, usually a laptop. The checked-in laptops of persons of interests will either be cloned, or disappear altogether. A federal agent will mark the luggage of the person of interest, and along the several luggage transfer chain, locate it and remove the laptop and clone the hard disk getting away with a wealth of data. This process can be done by either physically removing the hard disk, using a live CD like Tails to copy the contents of the laptop, or just crack the user account and gaining access to the laptop. This may sound far fetched, but federal agents have been known to go to great lengths to access information they deem necessary in their work.

Airlines have started being creative to help their clients experience the same convenience they are used to. For example, Emirates Airlines has introduced two services to it’s clients, a laptop handling service that lets clients use their devices until before boarding, and complimentary laptops for business and first class customers, where the customers are given Microsoft Surface 3 tablets to work onboard. Although this does not remove the security concerns mentioned above, it gives those who can afford a window to be productive while flying.

How do you secure your data while traveling?
The Electronic Frontier Foundation, an international non-profit digital rights group based in San Francisco, California, gives some suggestions on traveling with data, especially after the U.S. government reported an increase in the number of electronic media searches at the US border.

  • Store all sensitive data on a secure cloud offering like Dropbox or SpiderOak, or better still on a private hosted server.
  • Use a Chromebook as your travel laptop, which by default store all data on the cloud
  • If you must travel with your data, have two hard drives which you swap on convenience. One with a clean operating system install without any data, and another with the operating system and data, but only swapped when the laptop is in use.
  • Always use full strong disk encryption for all your data.
  • The next debate on information confidentiality is usually centered around the question, Why should I care if I have nothing to hide? The next article will try to answer that question. Do you have anything to hide?

    Sometimes you find yourselve facing spammers on the server. How do you handle them?

    Here are Sendmail, exim cheatsheets. I’ve found useful

    1. List domains sending most email

    exim -bp | egrep -o "[a-z0-9A-Z\.]+@[a-z0-9A-Z\.]+" | awk -F @ '{if(/'`hostname`'/){print$1}else{print$2}}' | sort | uniq -c | sort -rn | head

    2.Frozen mails are of no use in exim queue. To remove all the frozen mails:

    exim -bpr | grep frozen | awk {'print $3'} | xargs exim -Mrm

    2a. This seems to work for me to delete Mail queue

    exiqgrep -z -i | xargs exim -Mrm

    3. To list the mail queue in sendmail do this:

    sendmail -bp

    4. To remove mails from mail@domain.co.ke

    # exiqgrep -i -f mail@domain.co.ke | xargs exim -Mrm

    5. Change password for an email account

    # pwtemp -d setmail mail@domain.co.ke

    6. Push stuck emails through the mail queue

    exim -q -v

    7. Open the maillog with a text editor and inspect it, just don’t save it.
    You might also need to look at the system logs (/var/log/messages) if a process is failing.

    # tail -n40 /var/log/maillog


    A good source https://www.nixtree.com/blog/mailq-management-exim/


    When you are inspired by some great purpose, some extraordinary project, all of your thoughts break their bonds. Your mind transcends limitations; your consciousness expands in every direction; and you find yourself in a new, great and wonderful world. Dormant forces, faculties and talents become alive and you discover yourself to be a greater person than you ever dreamed yourself to be. – Patañjali the compiler of the Yoga Sutra

    A lion is fully capable of capturing, killing, and eating a field mouse. But it turns out that the energy required to do so exceeds the caloric content of the mouse itself. So a lion that spent its day hunting and eating field mice would slowly starve to death. A lion can’t live on field mice. A lion needs antelope. Antelope are big animals. They take more speed and strength to capture and kill, but once killed, they provide a feast for the lion and her pride… So ask yourself at the end of the day, ‘Did I spend today chasing mice or hunting antelope?’

    — Newt Gingrich

    Nairobi which is famous for having the world’s only game reserve in a large city is the capital city of Kenya, with a population of about 3.5million people as of 2016. The official languages in Kenya to which all Nairobians can converse in are Swahili and English.

    The climate is warm and temperate in Nairobi, but there is a significant amount of rainfall during the year. Winter days, between June and August, are mild with slightly cooler evenings. The drizzliest months are March to May. May and June can have high of 20 degrees Celsius, and lows of 12 degrese Celsius, with rainfall of 16cm.

    In Kenya the power sockets are of “type G” British BS-1363 type. The standard voltage is 240 V and the standard frequency is 50 Hz. See https://www.adaptelec.com/index.php?main_page=document_general_info&products_id=213

    Kenya Shillings (KES) is the currency used. Forex bureau at Nairobi City Center offer the best conversion rates. Major currencies are accepted. If you are coming from outside East Africa, you may have to carry with you any major currency.
    Major credit cards and debit cards branded ATMs can be found everywhere from malls to gas stations. They disburse local Kenya Shillings. This page from the Central Bank of Kenya shows the prevailing exchange rates https://www.centralbank.go.ke/forex/
    You can shop with your Credit Card or Visa/Mastercard branded card in major shopping malls and hotels.
    Mobile Money is a widely used form of payment, with the world famous MPESA from Safaricom being the market leader.

    You will need your Passport to register into any cellular network. Safaricom has the widest coverage of all cellular networks, and is the largest company in East Africa. Airtel and Orange also have good coverage. These three cellular networks offer competitive data packages. You can buy their sim cards from the airport and major malls at between $1 to $2.

    Taxi hailing companies like Uber, Little cab, Mondo ride, and Taxify are established in the city with stiff competition between them. Safaricom owned Little cab, and Uber are the market leaders. Their apps are available on Android and Apple App stores.
    There are many taxis in Nairobi City which you can use to move around. You are advised to inquire the price before starting your journey.
    Public city buses shuttle from the airport to the city center, at a cost of KES100, which is around $1. The buses are in operation from 7am to 8pm. Public transport in the city operates from major terminals, roads, and bus stops. The cost for moving between different parts of the city would range from KES50 to KES150 ($0.5 to $1.5).

    Tourist Attraction.
    Nairobi National Park, located 7 Km south of the city offers the widest variety of tourism attraction sites.
    1. Safari Walk: With its raised wooden boardwalk that allows for uninterrupted views of the animals, the Safari Walk is a show case for Kenya’s Parks and Reserves, allowing visitors to discover what they can expect to see across the country. Visitors can see a sample of the country’s rich animal life including the rare bongo, white rhino and albino zebra as well as big cats, antelopes and primates. It is also home to some 150 species of local trees. The non-resident fees is $22 for adults and $13 for children.
    2. The Nairobi Animal Orphanage is located in the Nairobi National Park. It serves a treatments and rehabilitation centre for wild animals. The Orphanage hosts lions, cheetahs, hyenas, jackals, serval cats, rare Sokoke cats, warthogs, leopards, various monkeys, baboons and buffalo. Various birds can also be viewed including parrots, guinea fowls, crowned cranes and ostriches. The non-resident fees is $22 for adults and $13 for children.
    3. The David Sheldrick Wildlife Trust is located at the KWS Central Workshop Gate, off, Magadi Rd, Nairobi, Kenya and is open to the public for one hour every day, from 11am to Noon. During this time the orphans arrive for their midday mud bath and feeding. Entrance to the orphanage for the visiting hour requires minimum contribution of $7 US dollars / 500 Kenya shillings per person.
    4. Nairobi National Park: Nairobi National Park established in 1946 is the only natural game park in a city. It is located 7km south of the city center. I. Animals you can see at the park are Zebras, Giraffes, Antelopes, Impala, Wildebeests. There are also several Lions, Cheetas, Hippopotamus, and Rhinos. The park is highly recommended for anyone who loves Safaris. The non-resident fees is $43 for adults and $23 for children.
    5. Nairobi museum located 1km from the city is open all year long from 0830hrs -17300hrs.
    6. Giraffe Center is located in Karen, 5 Km from Nairobi
    7. Panari Sky center along Mombasa road, 7 Km from the airport on the way to the city has a large ice skating rink with hourly skating sessions.
    8. Mamba Village is a crocodile sanctuary Located 12 Km south of the city

    Food, Restaurants and Entertainment
    Nairobi is a cosmopolitan city. It’s cuisine you can be found in any big city anywhere in the world. The staple food for the inhabitants is Ugali, which is stiff porridge, usually accompanied by green vegetables and stewed meat. Past time for many Nairobians would include eating nyama choma (barbecued meat) accompanied by Kenya’s popular beer Tusker over the weekends. Although tap water is generally clean and treated, visitors are advised to take only bottled water. Tipping is not mandatory, but it is between 5% and 10%.
    Popular restaurants and entertainment joints include
    1. Java restaurants – a chain of finest Kenyan coffee located is several locations within the city. Want Kenyan coffee beans? Try them.
    2. Carnivore Restaurant, Fogo Gaucho, and Safaripark hotel which are popular with their “all you can eat barbecue”.
    2. Brew Bistro, and Sierra who brew their own beer.
    3. Klub house (K1) Parklands
    4. Florida Night Club

    Nairobi has several hotels with different ratings from five. AirBnB is also popular among budget travelers.

    Shopping and Antiques
    You can get Kenyan traditional antiques at City Market at the city center. Other places would be the nomadic Maasai market which moves to a different location every day of the week. It operates from 8am to 6pm. Here are the locations.
    Tuesday: Westgate Shopping Mall in Westlands (the upper car park) (relocated to Kijabe street opposite the Norfolk Hotel)
    Wednesday: Capital Centre on Mombasa Road near the airport
    Thursday: Nakumatt Junction Shopping Mall on Ngong Road
    Friday: Village Market in Gigiri (the upper car park)
    Saturday: The High Court parking lot in the city center (behind the Hilton)
    Sunday: Yaya Centre in Hurlingham

    Malls: Nairobi has many huge malls selling all popular brands. You can try Sarit Center in Westlands, the gigantic Two Rivers in Kikisuru, Garden City along Thika road, among many others.

    Like any large city, Nairobi has it’s security challenges, but it’ s nothing out of the ordinary. You should avoid deserted alleys in the city. Also avoid flushing valuables like jewellery and money.

    Is there anything you need to know about Nairobi? Is there any addition to make the blog post more informative? Leave a comment.