Skip to content

hACkErS.NG

  • TESTS
  • SOCIAL
    • Site Activity
    • TRAIN.I.NG
      • Course 1
      • Student Registration
      • Instructor Registration
    • Social Log In
    • ANSWERS SEARCH ENGINE
    • Questions
      • POSTS
    • Social Site Registration
    • FREE NET
      • SECURITY NEWS
      • FORENSICS ACCOUNTING
      • accounting
  • QUIZ
  • Portal
  • IMAGES
  • CHATGPT

Covid NineTeen – Why Did the Nigerian President Delay So long To address Nation – & When He Did , Did he Fail To Do it Well ?

Mar 23, 2020
http://www.start.i.ng/buharicorona.mp4

 

 

 

why did buhari not address the nation sooner

1 . he cant pronounce the name which actually turned out to be not so untrue !

2. he does not want the nation to panic ?

3.he is just plain incomeptentent and does not care

4. he was waiting for his daugthter to come back first before shutting airports and border

any one you choose

note that previously

When will President Muhammadu Buhari address Nigerians on the coronavirus pandemic has become the topic of a passionate debate across the nation.

The concerns were especially triggered by live television broadcasts of several African leaders to their people on the pandemic, including Cyril Ramaphosa of South-Africa and President Yoweni Museveni of Uganda.

The Nigerian government has been taking drastic steps towards reducing the spread – banning international flights, closing down schools and restricting religious and public events to the barest minimum.

But what has remained constant is Mr Buhari’s silence even as cases soared to 27 across five states, including the nation’s capital Abuja and its commercial nerve centre, Lagos.

While leaders of African countries with far fewer cases have been speaking up, President Buhari has remained silent 24 days after Nigeria recorded its first case of the disease on February 28 in an Italian national who has now fully recovered.

African Leaders speaking up

President Museveni of Uganda is billed to address his Northeastern African nation again on Sunday.

This will be the third time in less than a week the president will make a public speech on the coronavirus pandemic even though the country only recorded its first case on Saturday, unlike Nigeria where the tally rose to 27 Sunday morning.

The first was last Wednesday when he banned all public gatherings, including closing down schools, local news – Soft Power – reported.

Mr Museveni’s Sunday address will be on the country’s first confirmed case, a 36-year-old Ugandan male who arrived from Dubai on Saturday.

President Nana Akufo-Addo of Ghana has also made three national addresses. On Saturday, being the third, he announced the closure of all borders to human traffic in the West African nation.

President Akufo-Addo made his first and second addresses on March 11 and 15.

Presidents of other African countries like South Africa, Rwanda, Zimbabwe, Egypt, and Morocco have all addressed their nations at least twice.

Presidency’s Defence

The presidency and government officials have been defending President Buhari’s silence in the face of the grave health situation.

The Minister of Information, Lai Mohammed, said the time is not yet appropriate for the president to address the nation.

The Senate which earlier called on the president to address Nigerians later said it is too early to question Mr Buhari’s silence.

Criticism

But Nigerians have increasingly become uncomfortable with the posture of their president. Other prominent leaders in the country, including governors and religious leaders have been speaking to encourage citizens.

Nigeria’s biggest opposition party, the Peoples Democratic Party (PDP), which has repeatedly berated the presidency’s handling of the outbreak, said Mr Buhari’s silence shows he has failed as a leader.

“PDP is worried at President Muhammadu Buhari’s delay in standing up to the responsibilities of his office to address heightening national anxieties since the detection of the deadly COVID-19 in our country,” the party said in a statement by its spokesperson, Kola Ologbondiyan.

Search Results

Top stories

Uche Jombo says
President Buhari’s
media team should
be sacked after his grammatical error
Pulse.ng
2 hours ago
COVID-19: Do your
broadcast in Hausa,
we’ll translate –
Aisha mocks Buhari
Daily Post Nigeria
3 hours ago
How Buhari’s
Minister Spent Four
Days On Nigerian
Roads
Leadership Newspaper
5 hours ago
Buhari’s strange
leadership in
COVID-19
crisisOpinion
The Guardian Nigeria
5 hours ago
How Buhari’s
Intervention Saved
Oshiomhole’s Skin
THISDAYLIVE
9 hours ago
Buhari finally
addresses
Nigerians on
coronavirus
Pulse.ng
15 hours ago
Coronavirus:
Outrage as
churches, mosques,
Buhari’s aides flout ban
Punch
17 hours ago
Coronavirus: While
Buhari keeps mum,
other African
leaders are speaking up
Premium Times Nigeria
18 hours ago
COVID-19 fund:
SERAP asks Buhari
to instruct EFCC,
ICPC to track, monitor spending
Vanguard
21 hours ago
Buhari’s daughter in
isolation as
Nigeria’s
coronavirus cases rise
The Guardian Nigeria
3 days ago
More for buhari

Twitter results

https://twitter.com/search/buhari

buhari on Twitter

Muhammadu Buhari
(@MBuhari)
Protecting Nigerians from the Coronavirus is a key priority for us as a Government. We have the Ministry of Health and the Nigeria Center for Disease Control (NCDC) working round-the-clock with several other agencies, as well as State Governments, to ensure this.
Twitter · 3 days ago
?????ℝ????ℂ
(@Gidi_Traffic)
“@iefamharris: President Buhari addresses Nigerians and tells the world that Nigerians can handle the “COVIK – 1 9” virus. It was a pleasure being a Nigerian ? ” #COVID19 @Gidi_Traffic pic.twitter.com/U2CLMtY…
Twitter · 2 hours ago
Uche Jombo Rodriguez
(@uchejombo)
The whole of president Buhari social media team needs to be replaced over COVIK ONE NINE video for not correcting him ,watched it and shared it ? now even ghana people on my TL are having fun with it. I hope the “baba must speak to us” WhatsApp group people are happy.
Twitter · 12 hours ago

Post navigation

I can go 20 years more till I get justice — Adebo, man who sued Fanta, Sprite
Covid 19 Statistics 24th March … www.corona.virus.com.ng

Related Post

Dot dotifi dotifi.com swordpress

WHATSAPP 6 Useful Methods To Fix “Sorry, This Media File Doesn’t Exist ” … www.dotifi.com

Aug 25, 2023
canada Dot dotifi dotifi.com swordpress

Africa: Internet Did NOT start in Nigeria – How Africa’s Regional Internet Network Started With One Driven Intern On a Quest for a LAN dotifi.com

Aug 25, 2023
Dot dotifi dotifi.com swordpress

How To Become A Web Developer in 2023 – A Complete Guide You cant Miss From Dotifi.com

Aug 17, 2023
ANAKYST SEARCH
BUY 1 Million UK US EMAILS AND START RESELLING ON ADVERTIS.I.NG
CISSP Exam emulation practice test #1 – Hard difficulty – Results

SSCP Systems Security Certified Practitioner Exam Cissp Practice Test 1 125 Questions
  • Cryptography vs. Encryption
  • Encryption Symmetric & Asymmetric – AES RSA All you need to know about Encryption using this methods .
  • An Email in the Daily Life of a Agile Project manager
  • ISC2 doesn’t like to share much about their exam questions. So, here’s a candid description of what you can expect:
  • The Best Bulk Mail Sending software (for cold emailing newsletters, promos, spam etc).
  • UEBA (User and Entity Behavior Analytics) and UBA (User Behavior Analytics)
  • Question 19 – When using the formal approval process, what is required to access data? CISSP and Formal Approval Process for Data Access
  • Top CRMs for Sending Emails to your Clients
  • Chief Information Officer (CIO), Chief Technology Officer (CTO), aand more recently a Chief Information Security Officer (CISO)
  • Identification vs Authentication, and Authorization
OWASP TOP !0
Injection. Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization. Broken Authentication. Application functions related to authentication and session management are often implemented incorrectly, allowing attackers to compromise passwords, keys, or session tokens, or to exploit other implementation flaws to assume other users’ identities temporarily or permanently. Sensitive Data Exposure. Many web applications and APIs do not properly protect sensitive data, such as financial, healthcare, and PII. Attackers may steal or modify such weakly protected data to conduct credit card fraud, identity theft, or other crimes. Sensitive data may be compromised without extra protection, such as encryption at rest or in transit, and requires special precautions when exchanged with the browser. XML External Entities (XXE). Many older or poorly configured XML processors evaluate external entity references within XML documents. External entities can be used to disclose internal files using the file URI handler, internal file shares, internal port scanning, remote code execution, and denial of service attacks. Broken Access Control. Restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorized functionality and/or data, such as access other users’ accounts, view sensitive files, modify other users’ data, change access rights, etc. Security Misconfiguration. Security misconfiguration is the most commonly seen issue. This is commonly a result of insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information. Not only must all operating systems, frameworks, libraries, and applications be securely configured, but they must be patched/upgraded in a timely fashion. Cross-Site Scripting XSS. XSS flaws occur whenever an application includes untrusted data in a new web page without proper validation or escaping, or updates an existing web page with user-supplied data using a browser API that can create HTML or JavaScript. XSS allows attackers to execute scripts in the victim’s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites. Insecure Deserialization. Insecure deserialization often leads to remote code execution. Even if deserialization flaws do not result in remote code execution, they can be used to perform attacks, including replay attacks, injection attacks, and privilege escalation attacks. Using Components with Known Vulnerabilities. Components, such as libraries, frameworks, and other software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover. Applications and APIs using components with known vulnerabilities may undermine application defenses and enable various attacks and impacts. Insufficient Logging & Monitoring. Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Most breach studies show time to detect a breach is over 200 days, typically detected by external parties rather than internal processes or monitoring.

You missed

anakyst

Protected: Rotary VI EAST

February 28, 2026 admin
anakyst

Protected: BetterCyberCareer Group

February 28, 2026 admin
anakyst

Protected: Benin Club 1931 – Official

February 28, 2026 admin
anakyst

Protected: Whatsapp AI Automation Group

February 28, 2026 admin

hACkErS.NG

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About us
  • Account
  • All Courses
  • All Groups
  • Apply To Job
  • Ask Question
  • Become A Teacher
  • Blog
  • Cart
  • Cart
  • Change Password
  • Checkout
  • Checkout
  • Checkout
    • Confirmation
    • Purchase Confirmation
    • Purchase History
    • Transaction Failed
  • Checkout
  • Complete Registration
  • Contact
  • Dashboard
  • Dashboard
  • Default User Group
  • Department
  • Facility
  • Forgot Password
  • Forgot Password
  • Forgot Password?
  • Groups
  • Helpie FAQ
  • Home
  • Home
  • homer
  • Instructor Registration
  • Login
  • Login
  • Login
  • Members
  • Messages
  • My account
  • My AI Account
  • My Profile
  • Notifications
  • Password Reset
  • photos
  • Photos
  • post
  • Professionals
  • Profile
  • Profile
  • Questions
    • Activities
    • Ask a question
    • Categories
    • Profile
    • Tags
  • QUIZ
  • Recent Activity
  • Register
  • Registration
  • Reset Password
  • Reset Password
  • SEARCH
  • search
  • Search Users
  • Secifi.com jobboard
  • Secifi.com Security By Dotifi – Our Services
  • Shop
  • Student Registration
  • Submit New Blog Post
  • Term Conditions
  • Testimonial
  • TESTS
  • User Blogs
  • User Profile
  • Users
  • Users List Item
  • Vendor Registration
  • Wishlist
  • You are about to be redirected