Followers

Contact Form

Name

Email *

Message *

Thursday, July 11

THE NAKED FACE BY SIDNEY SHELDON REVIEW

BY ANTONY MAINA


 The Naked Face” by Sidney Sheldon took me on a thrilling journey through the dark and twisted world of murder and deception. From the very first page, I was captivated by the masterful storytelling and the clever plot twists that kept me on the edge of my seat.

The story revolves around Dr. Judd Stevens, a brilliant psychoanalyst whose life takes an unexpected turn when he becomes entangled in a series of mysterious deaths linked to his patients. As the body count rises, Dr. Stevens finds himself as the prime suspect, and the race against time begins as he fights to uncover the true identity of the killer and prove his innocence.

Sidney Sheldon’s writing style is fast-paced and engaging, immediately drawing me into the story. With each chapter, the suspense builds, and I found it nearly impossible to put the  book down. The constant cliffhangers at the end of every chapter only fueled my desire to unravel the intricate mystery.

The characters in “ The Naked Face” are skillfully developed and multi-dimensional. Dr. Judd Stevens, in particular, stood out as a flawed yet compelling protagonist. I couldn’t help but empathize with him as he navigated through a treacherous web of danger and betrayal. The supporting cast added further layers of intrigue, each with its own motives and secrets that added to the complexity of the story.

One of the aspects that I truly appreciated about the  book was Sheldon’s exploration of the human psyche. As a psychoanalyst himself, he brings authenticity and depth to the psychological elements of the story. This aspect made the narrative all the more fascinating and thought-provoking, as I found myself contemplating the complexities of trust, manipulation, and the darkness that can reside within seemingly ordinary individuals.

Check out our Latest Book Reviews

Although the  book’s setting and some cultural references may feel slightly dated, the core mystery and the psychological depth of the story remain timeless. Sheldon’s mastery of suspense and his ability to craft compelling characters make “ The Naked Face” a must-read for fans of the mystery and thriller genres.

In conclusion, “ The Naked Face” is a riveting and captivating novel that showcases Sidney Sheldon’s storytelling prowess. From its intricate plot to its well-drawn characters, it kept me hooked until the final reveal. If you enjoy gripping mysteries that delve into the complexities of the human mind, this  book is a perfect choice. Be prepared to be enthralled and surprised at every turn of the page.

How to become an ethical hacker: A blueprint

 

article by Antony maina

In this guide

This guide is all about how to become an ethical hacker. It includes detailed information on the role an ethical hacker plays, some of the skills and experience necessary to become an ethical hacker, and strategies for landing a job as an ethical hacker. 

Historically, defensive and offensive cybersecurity pursuits have been described using the monikers of whitehat hackers and blackhat hackers respectively. These nicknames were used to distinguish the good guys from the bad guys.

While both of these terms are still commonly used, at least one of them may not be adequately descriptive of the various roles found in today’s modern cybersecurity ecosystem. 

Although a blackhat hacker is still just the bad guy, the good guys are now better described using expressions such as red team, blue team, purple team, ethical hacker, and penetration tester.

More specifically, red teams provide offensive security services and blue teams provide defensive services. Purple, being the combination of red and blue, identifies those teams that provide some of each flavor of security service. 

We Found These Schools With Ethical Hacker Courses
Sponsored Listings

The term ethical hacker includes all security professionals that provide offensive services, whether red team, pentester, or freelance offensive consultant. Security analysts or engineers are also job titles that may include offensive elements. Often these offensive security services will be rolled up under a threat and vulnerability management group within a company. 

While there are some subtle technical differences, say between the services provided by an independent offensive cybersecurity consultant and an in-house pentester, for this guide, these various names for ethical hackers are used interchangeably.  

An ethical hacker’s primary purpose is to view security from the adversary’s perspective in an effort to find vulnerabilities that bad actors could exploit. This provides defensive teams the opportunity to mitigate by devising a patch before a real attack can occur.

This objective is served by executing simulated cyberattacks in a controlled environment. While much of the value that an ethical hacker provides is related to testing security controls and devices for perimeter penetration vulnerabilities, they also look more broadly for weaknesses that can be exploited deep within a network or application such as data exfiltration vulnerabilities. 

Role of an ethical hacker

Ethical hackers can be independent freelance consultants, employed by a firm that specializes in simulated offensive cybersecurity services, or they can be an in-house employee protecting a company’s website or apps.

Knowledge of current attack methods and tools is a requirement across these employment options, however, the in-house ethical hacker may be required to have an intimate knowledge of only a single software or digital asset type. 

While relatively new to the security industry, one advantage that an in-house red team may provide is that the team will necessarily have a more intimate understanding of how their own systems and applications are constructed than would an independent consultant.

This insider knowledge provides the red team an advantage, as long as they can avoid becoming myopic in their view. It would take real attackers years to replicate this advantage. In-house teams are largely thought to be less expensive than the continuous use of a consulting firm as well.

Conversely, a benefit that an external ethical hacker may provide is a fresh set of eyes to identify vulnerabilities that may be overlooked by the internal team. Even organizations that employ an internal red team may occasionally contract an external ethical hacker to provide this fresh look at their defenses. 

For any external offensive security service provider, it is especially important to obtain written permission from the client before beginning any offensive activities.

This permission should detail the systems, networks, applications, and websites that will be included in the simulated attack. Do not increase the scope of the service without additional written permission to do so.

In keeping with the industry’s use of colors to delineate between various cybersecurity roles and functions, there are white-box, black-box, and gray-box ethical hacker engagements.

A white-box engagement is when the security professional is given as much information about the target system and application as possible. This allows the simulated attack to go wide and deep very quickly looking for vulnerabilities that it would take a really bad actor a very long time to uncover. 

Conversely, a black-box engagement is when no insider information is given to the ethical hacker. This more closely reflects the circumstances of a real attack and can provide valuable insight into what a real attack vector may look like.

As the name implies, a gray-box engagement then denotes the simulation of an attack where the attacker has already penetrated the perimeter and may have spent some time inside the system or application. 

Many firms enlist the help of all three engagement types in conjunction with both in-house and external ethical hackers. This variation of applied knowledge can provide the best view of what protections must be deployed but is also much more expensive to undertake. 

Possessing ethical hacker skills and knowledge is helpful for many other security roles. These skills are vital to network security analysts and network engineers. Purple teams need people with offensive skills. Application security developers benefit from an understanding of offensive methods and tools.

Security researchers, commonly known as bug hunters, depend highly on their knowledge of offensive tactics. Many successful bug hunters display an understanding that reaches deeper than the application layer to the network layer and other areas that can be exploited. 

The skills required to become an ethical hacker 

While there are plenty of anecdotal stories of blackhat hackers being converted to white in a bygone era, the most important requirement for becoming a successful ethical hacker today is having high ethical standards, as is found in the name.

Ethics are what separate the good guys from the bad guys. There are plenty of blackhat hackers who have adequate technical skills to be ethical hackers, but they lack the discipline of character to do the right thing regardless of the perceived benefits of doing otherwise. 

A history of cybercrime poses an unacceptable risk for a member of a cybersecurity team. For a large organization with an astute legal team, this type of risk would represent a nonstarter.

A word to the wise then is, when looking for work as an ethical hacker, a resume that includes any work that even smells of unauthorized work or unethical behavior is a fast way to be disqualified.

While people can certainly change over time, most employers accept that developing a set of ethical life-guiding standards is much more involved than just desiring a career change. 

Second to having the “ethical” part of this colloquial nickname covered is the need to have the “hacker” part covered as well. A candidate for an ethical hacker job must be able to demonstrate advanced cybersecurity technical skills. The ability to recommend mitigation and remediation strategies is a part of the desired experience. 

To become an ethical hacker a candidate must understand networks, both wired and wireless. They must be proficient with operating systems, especially Windows and Linux. They need to understand firewalls and file systems. They must know how file permissions work and be familiar with servers, workstations, and computer science generally. 

Strong coding skills are essential and direct, manual, and hands-on attack methods must be clearly understood and demonstrated. In short, an ethical hacker should have defended so many assets over their career that imitating and then thinking a few steps ahead of the adversary comes almost as second nature. 

Above and beyond good ethics and strong technical skills is a special mix of creative and analytical thinking. Ethical hackers need to be able to think like the adversary.

They must understand what motivates the bad actors and be able to estimate how much time and effort the blackhat may be willing to apply toward any specific target. To do this, the pentester must understand the value of the data and systems they protect.

Ethical hacker certifications and education 

The two certifications that are specific to ethical hacking are Certified Ethical Hacker (CEH) and Offensive Security Certified Professional (OSCP). 

EC-Council describes their CEH certification in these terms: “A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.”

Any number of other cybersecurity professional certifications offered by the EC-Council will lend themselves toward becoming more hireable as an ethical hacker. 

Offensive Security describes its OSCP certification, saying “The OSCP examination consists of a virtual network containing targets of varying configurations and operating systems. At the start of the exam, the student receives the exam and connectivity instructions for an isolated exam network that they have no prior knowledge or exposure to.

The successful examinee will demonstrate their ability to research the network (information gathering), identify any vulnerabilities, and successfully execute attacks. This often includes modifying exploit code with the goal of compromising the systems and gaining administrative access.

The candidate is expected to submit a comprehensive penetration test report, containing in-depth notes and screenshots detailing their findings. Points are awarded for each compromised host, based on their difficulty and level of access obtained.”

A bachelor’s degree in a computer-related field is a good place to start your career. Computer science or network engineering education provides a recommended foundation for work in the security field. When considering a bachelor’s program in the field of cybersecurity give priority to programs with a strong interdisciplinary focus. 

Good programs will emphasize computer engineering, computer science, and business management skills. Look for programs that include courses in technical writing and legal issues surrounding technology and ethics. The best cybersecurity professionals are well-rounded individuals who can see their field through a wide-angle lens.

Even with a degree and a professional certification or two, self-study is needed to keep up with current attack methods and offensive strategies. A home lab can be very useful. YouTube videos, internet groups and forums, and social media posts and exchanges are all methods used by successful ethical hackers to keep their edge over blackhat hackers.

How to get experience as an ethical hacker

Experience with vulnerability testing tools, such as MetasploitInvicti, formerly Netsparker, and OpenVAS, is very helpful for ethical hackers. These tools and there are many more of them, are designed to save time when searching for known vulnerabilities.

These or similar tools may provide a useful framework for vulnerability scanning and management but should represent only the starting point for an experienced ethical hacker.

Manual simulated attacks must be directed toward the target as well. Knowledge and experience related to how these attacks are performed are essential. 

The path to finding work as an ethical hacker will almost invariably pass through many years as a member of a security team providing defensive security services. Assignment to an elite offensive team is most commonly a progression through the ranks of the department.

Often beginning with work as a security specialistsecurity administrator, or security software developer, additional experience and education will qualify a candidate for a place on one of the security specialty teams or work as a freelance consultant. 

Helpful experience extends beyond past IT security work. Social engineering and physical penetration tests are also applicable skills. Many attacks begin with intel gathered using an extended social engineering campaign. Knowledge of social engineering strategies and tactics can be very helpful in understanding the entire threat landscape. 

Physical breaches to a server room or data center sometimes precede a digital attack. Understanding what physical assets are vulnerable will help an ethical hacker identify the types and methods likely to be used in a real event. 

Cybercriminals must become evermore innovative as security professionals deny them the use of their previous methods and tactics. Physical attacks, including the use of drones to sniff out unprotected networks, are becoming more frequently employed to gather intel and initiate cyberattacks.

An ethical hacker must anticipate and simulate the use of traditional and non-traditional attack vectors to provide the most comprehensive threat analysis possible.

Typical ethical hacking assignments

Typical work assignments for an ethical hacker include threat modeling, security assessments, vulnerability threat assessments (VTA), and report writing.

Assuredly the responsibilities of this role will vary from company to company but these staples will nearly always be included in the job description. 

Threat modeling

Threat modeling is a process used to optimize network security by identifying vulnerabilities and then determining countermeasures to prevent an attack or mitigate the effects of an attack against the system.

In the context of threat modeling, a threat is a potential or actual adverse event that may be malicious (such as a denial-of-service attack) or incidental (such as the failure of computer hardware), and that can compromise the assets of the enterprise.

An ethical hacker would contribute to this process by providing a comprehensive view of the possible malicious attacks and their resultant consequences for the organization. 

The objective of effective threat modeling is to conclude where the greatest focus should be to keep a system secure. This can change as new circumstances develop and become known, applications are added, removed, or improved, and user demands unfold.

Threat modeling is an iterative process that consists of defining assets, recognizing what each application does with respect to these assets, creating a security profile for each application, identifying potential threats, prioritizing potential threats, and documenting adverse events and the actions taken in each case.

The ethical hacker’s role is imperative in that it allows the threat modeling to remain theoretical rather than post-mortem after an actual attack.

Security assessment

An ethical hacker, whether a pentester or a red team leader, will often be assigned the task of providing a security assessment. Simply put, an information security assessment is a risk-based measurement of the security posture of a system or enterprise.

Security assessments are periodic exercises that test an organization’s security preparedness. They include checks for vulnerabilities related to the IT systems and business processes, as well as recommending steps to lower the risk of future attacks. 

Security assessments are also useful for determining how well security-related policies are adhered to. They help to shore up policies designed to prevent social engineering and can identify the need for additional or enhanced security training.

Culminating in a report that identifies weaknesses and makes recommendations, the security assessment is an invaluable risk management tool. 

Vulnerability threat assessment

A vulnerability threat assessment is a process used to identify, quantify, and rank the vulnerabilities relevant to a system along with the threats that could possibly exploit those vulnerabilities. While closely related to a security assessment, the VTA is conducted to identify and correlate specific threats and vulnerabilities.

The basic security assessment, described above, is used to identify vulnerabilities and evaluate the security posture of the enterprise independent of any specific threat. The VTA is a more threat-based assessment.

Examples of systems for which vulnerability threat assessments should be performed include but are not limited to, information technology systems, energy supply systems, water supply systems, transportation systems, and communication systems.

Such assessments may be conducted on behalf of a range of different organizations, from small businesses to large regional or national infrastructure entities. Each of these system types and/or enterprises will require someone in an ethical hacker role to perform the VTA.

Report writing 

A crucial element for carrying out the assignments of an ethical hacker is the ability to write clear and concise professional reports. Gathering data, identifying vulnerabilities, and correlating threats are of little value if the appropriate information can not be articulated to risk management leaders.

Reports submitted from the red team are often the impetus for significant security resource expenditures. Risk management professionals need to have total confidence in the findings of ethical hackers in their organization.

In some cases, an ethical hacker will be an outside consultant retained by a firm to provide the information needed to justify security expenditures for upper management or the board of directors. In the world of security consulting, the report is the primary deliverable and is of the utmost importance.

When considering possible professional certifications and educational opportunities to elevate a career to include ethical hacking, do not underestimate the importance of business writing expertise.

The ability to produce a well-written report will boost an individual’s career over an otherwise equally qualified peer.

Ethical hacking in review

Being a member of an in-house red team or working as a freelance whitehat hacker are exciting vocations. As far as operations-level positions go, they are highly sought-after positions that can engender a level of respect and provide a degree of prestige within the cybersecurity community.

Ethical hacker jobs are necessary for the effective protection of networks, systems, and applications. This expertise is required throughout national infrastructure entities and to secure critical or sensitive data across all industries. 

For many, the term ethical hacker is an oxymoron. It indicates two opposing notions. One is that of high ethical standards and the other is that of “hacking” which is usually associated with nefarious activity.

An offensive security professional may be a better description, but ethical hacker is often used to describe this genre of security professionals because let’s face it, ethical hacker is more mysterious sounding. 

Regardless of whether or not the word hacker is used in the job description, these jobs are not for the morally questionable and certainly not for anyone who has a history of being a bad actor.

Ethical hackers are necessarily privy to sensitive information, the divulging of which could be catastrophic for the enterprise.

security clearance is often required for government employees and government contractors. Obtaining a security clearance will include a background investigation and an examination of financial and social media data.

With the relatively rare exception of the independent freelance offensive cybersecurity consultant, ethical hackers normally work as part of a team. If on a red team, the other team members will be like-skilled ethical hackers or pen-testers and the team will be part of the overall security department.

In a smaller organization, the ethical hacker may be the only person with an offensive role, but will invariably be a part of a larger security team. The ability to work well with other team members and to communicate effectively is critical to success.

An ethical hacker is not the stereotypical hoodie-wearing young person working out of his parent’s basement – who decided to trade their black hat in for a white one. She is more often an educated, experienced, skilled, and articulate professional who is dedicated to making the world a safer place to live and work. 

While history may provide examples of self-taught gritty individualists pulling themselves up by their digital bootstraps to the pinnacle of cybersecurity ops, an education with a minimum of a bachelor’s degree, combined with one or more specialized professional certifications, is the standard for ethical hackers.

Years of mettle-proving experience in software development and/or more traditional defensive security roles is not at all unusual for successful ethical hackers.

Frequently asked questions

What is an ethical hacker?

An ethical hacker, also known as a “white hat” hacker, is a professional who uses the same techniques as malicious hackers to identify vulnerabilities in computer systems. However, unlike malicious hackers, they do so with permission and work to improve security.

What is the difference between a black hat, white hat, and grey hat hacker?

Black Hat are hackers with malicious intent, often for personal or financial gain. White Hat (Ethical Hackers) are professionals who hack with permission to identify vulnerabilities and improve security. Grey Hat hackers are individuals who might operate without explicit permission but usually with good intentions, such as exposing security flaws for the public good. Their actions are in a moral grey area.

How can I become an ethical hacker?

Gain a strong foundational understanding of IT and networking, learn programming languages like Python, C++, or Java, master operating systems (especially Linux), take specialized courses in ethical hacking or cybersecurity, earn certifications like the Certified Ethical Hacker (CEH), and gain practical experience through internships or entry-level jobs.

What skills are essential for an ethical hacker?

An ethical hacker should have expertise in networking, operating systems, and programming, and a keen understanding of cybersecurity principles. They should also be analytical, detail-oriented, and possess strong problem-solving skills.

Why is ethical hacking important?

Ethical hacking helps organizations identify potential threats and vulnerabilities in their systems, allowing them to fortify their defenses before malicious hackers can exploit them. It plays a crucial role in ensuring data security and system integrity.


Peter Watts – Blindsight (2006) Review


9.5/10

Time for a reread of Peter Watts’ Blindsight. Ever since I discovered this novel a few years ago and rushed through it at a feverish pace within hours, I’ve had a fascination for it. Dense, mind-boggling, cutting-edge, horrifyingly bleak, sharp and intelligent. And it is the kind of book where rereading pays off, because things simply went over my head the first time. I am not convinced that any science fiction novel published since Blindsight has eclipsed it.

Watts is a master at writing those special sentences that make you go: “wait, what?” So that you immediately have to read on to find out what happens next. We begin with an account by a man named Siri, an autistic man who apparently had half his brain removed to cure his epilepsy, but who has a gift of observation. Watts throws in the following nuggets:

Point of view matters: I see that now, blind, talking to myself, trapped in a coffin falling past the edge of the solar system.”

and this one: “But that, that distance—that chronic sense of being an alien among your own kind—it’s not entirely a bad thing. It came in especially handy when the real aliens came calling.”

See what I mean? Now I’ve got to read the next chapter.

And the next chapter is again an overload of information. Watts is very fond of using precise scientific terms. He talks of specific medication running through veins; he talks of AUs when mentioning distances in space; and his character Siri looks at his fellow passengers as a robot looking at the topology of people’s personalities and body language, without much emotional connection. So, when Watts suddenly starts talking about a humanoid vampire race (yes), resurrected Jurassic Park style, he envelops it in such formal scientific terms (and coolness) that it receives an aura of believability.

Blindsight is about a space mission to make first contact with aliens. Siri the autist is on the ship as impartial observer of his fellow crewmates, who are all not baseline humans: either psychopathic, half-robotic or having multiple personalities. The point is that these are all exceptional talents in certain situations, precisely because they are not neurotypical humans. Highest intelligence the planet has to offer. Siri’s autism and powers of observation, for example, makes him more suited for impartial reporting to mission control.



Blindsight starts off much like the film Alien (1979), and in a way feels inspired by it. Why, it is so dark I can just hear the ominous background music while reading. And since the characters are all mentally twisted for a reason, none of the conversations on board the ship feel, well, human. Watts explored this idea earlier in Starfish (1999), which is about a maintenance team at a geothermal energy station, 4 kilometers deep in the ocean. This environment is so extreme that only certain emotionally damaged people were chosen to be part of such teams, because they had higher chances of survival. Blindsight has the same approach. Reading a Watts novel has the same appeal as watching a psychological horror movie.

Watts spits out scientific jargon as if he is some scientist version of Clint Eastwood riding through the solar system, or some hard-nosed military type with PhDs in astronomy and biology. I am not familiar with each and every term and too lazy to look them up, but as long as you can form pictures of trajectories in space, radiation bands and human interaction as clusters of incoming data, you should be OK. It definitely helps that this is the second time reading it, because he can be quite ambiguous in his meanings. It is Watts’ greatest weakness as a writer and he is always in danger of making things too confusing for the story’s own good.

Watts’ greatest interest lies in human consciousness. Not only did he populate his space ship with all manner of non-baseline humans – psychopath, multiple identity, autist, cybernetically enhanced – but he stresses that what we as humans now have as consciousness, in our current snapshot of evolution, may be an aberration. His strange crew has mental talents beyond our own, and Watts speculates about humanoids in our evolutionary past having different consciousnesses. This is all groundwork for the horror of meeting the aliens. We tend to see our own consciousness as the apex of an evolutionary ladder, and Watts kicks this notion into the ground, along with all that we find holy about it.

Most of the novel is written as a cascade of scientific revelations about the aliens we find. And it is incredibly tense. The way Watts writes it, the crew is constantly hovering on the edge of mortal danger, while using bleeding-edge scientific ideas to stay in the game. We are running to keep up, and all the revelations point towards a horrifying vision of the universe.

Blindsight gained its pedestal as a unique and influential work because Watts was willing to wade through scientific work and engage with stunning ideas that never had been taken up by any other writer. Or, he combined many new ideas, synthesizing something new and scary. This is science directly influencing fiction. It remains a very thrilling work and a personal favorite.

STRONG HEART REVIEW

BY ANTONY MAINA


The book, Strong Heart by Charlie Sheldon, introduces the reader to a riveting tale of the way a family situation is dealt with in a very unusual manner. The setting of Indian people in the Northwest is used to help a troubled young girl who experiences the impact of her heritage on her life while unwittingly leading others to realize the value of listening to tales from the past.

William, Tom, and Myra are family members who take Sarah, a troubled teenager, on a previously planned camping trip into the wilderness of Olympic National Park in Northwest Washington State. The journey involves physical difficulties; they tell stories around the campfire; and, experience some startling events. Sarah turns out to be the one who benefits the most from the family adventures.

Sheldon brilliantly combines the story of a growing teenager with another story about ancient Indian travels and society. I like his descriptions of contemporary and ancient people with their beliefs and frustrations with cultures that are both familiar and unfamiliar. I like the Indian lore and wilderness travel stories. I like the way modern and ancient cultures successfully link together in the storyline. I appreciate the way the plot and subplots work together to produce a desire on the part of the reader to keep turning pages.

There is nothing about this book that I dislike. The writer does everything well and with excitement. The pace moves along at a walking speed since walking takes up a good amount of time in the story.

The perspective of the book includes insights from both young and old about the world in general and the wilderness in particular. The author honors Indian culture by allowing their mores to flow in and out of the character’s actions. The dialogue is crisp and relevant. The writer uses the structure of the story to allow the reader to think as well as participate. Subplots add to the color and tone of the tale. The maps at the beginning of the book help the reader appreciate distances involved in the story. Descriptions of mountains, streams and even storms are vivid and colorful.

I rate this book 4 out of 4 stars. I recommend the book to young readers who wonder what it would be like for a teenager to go on a wilderness journey. I recommend the book to adult readers who will relate well to the way the writer treats grandparents, antagonists, and friends. More than a wilderness adventure, the book is good in bringing out the value of traditional knowledge in a world where scientific facts sometimes overshadow reality itself.
GIAKANJA BOYS ALUMNI CORNER

                                            WRITTEN BY ANTONY MAINA 



Thursday Afternoons Remind Me Of Those Highschool Debates In Highschool. My Friend Dennis Maina Would Be Like, " Mr Speaker I Stand Here Mesmerized, Perplexed And My Feet Rooted To The Ground, Ready To Support The Motion That Highschools Should Have Bars And Restaurants...Moving On To My First Point Mr Speaker..(silence) Mr Speaker (silence)...Mr Speaker I Think If I Explain To You My Point, Your Brains Might Explode...So Let Me Give My Colleague Antony Maina The Chance To Explain It In A Better Way."
When I Was Handed The Mic I Was Like, " Mr Speaker, If I Add Anything More To What dennis Has Said, I Would Be Lying. I Guess What He Has Proposed Is Enough Proof That Bars And Restaurants Should Be Introduced In Highschool..."
Wuueh Am Telling You Everyone Stamped Their Feet Down Because What We Had Said Made Perfect Sense To Them. And We Would Exit Stage With Our Heads High and shoulders wide. Hahaha , We Used To Be Very Good Politicians Back Then.

be curious not judgemental

43 marketing jokes 43 Of The Best SEO Jokes & Digital Marketing Jokes Ryan Hill   |  21st February 2017   Categories:  Digital Marketing...