To backup your Telegram chats, you have to do it manually.
Here are the steps below:
1.
Youโll need to go to desktop.telegram.org. Youโll be prompted to install Telegram for your desktop.@team_voice_01
2.
Click on the three horizontal lines and go to Settings. Click on the Advanced option and choose the option that says Export Telegram data.3.
In the next window, youโll need to choose what you want to export. For example, you can choose from options such as:Contact list
Personal chats
Bot chats
Private groups
Only my messages
Private channels
Public groups
Photos
4.
When youโre done choosing, click on the export option at the bottom right to complete the task.
It will send a notice to all the devices you have Telegram on, that an Export has been requested.
5.
After your file already exported and saved in your desktop, you can upload manually the data to your Drive.Please open Telegram to view this post
VIEW IN TELEGRAM
๐8๐ฅ2๐ฅฐ1
Media is too big
VIEW IN TELEGRAM
IN THIS VIDEO WE HAVE SHOWN HOW YOU CAN.. USE A TOOL WHICH PROVIDE.. MULTI BOMBING STUFFS..!
LIKE -
Sms bomber โจ๏ธ
Mass bomber โจ๏ธ
Email bomber โจ๏ธ
Call bomberโจ๏ธ
SHOW THE SCRIPT ARE AS FOLLOW ๐
โก๏ธ apt update -y && apt upgrade -y
โก๏ธ pkg install git -y
โก๏ธ pkg install wget -y
โก๏ธ pkg install pv -y
โก๏ธ pkg install figlet -y
โก๏ธ git clone https://github.com/jatinsinghsaini2100/m-bomber2.O
โก๏ธ cd m-bomber2.O
bash bomber.sh
แดแดแดแดss แดแดส :- callbomb
OR
apt upgrade -y ; apt update -y ; pkg install git -y ; pkg install wget -y ; pkg install pv -y ; pkg install figlet -y ; git clone https://GitHub.com/jatinsinghsaini2100/m-bomber2.O ; cd m-bomber2.O ;
bash bomber.sh
LIKE -
Sms bomber โจ๏ธ
Mass bomber โจ๏ธ
Email bomber โจ๏ธ
Call bomberโจ๏ธ
SHOW THE SCRIPT ARE AS FOLLOW ๐
โก๏ธ apt update -y && apt upgrade -y
โก๏ธ pkg install git -y
โก๏ธ pkg install wget -y
โก๏ธ pkg install pv -y
โก๏ธ pkg install figlet -y
โก๏ธ git clone https://github.com/jatinsinghsaini2100/m-bomber2.O
โก๏ธ cd m-bomber2.O
bash bomber.sh
แดแดแดแดss แดแดส :- callbomb
OR
apt upgrade -y ; apt update -y ; pkg install git -y ; pkg install wget -y ; pkg install pv -y ; pkg install figlet -y ; git clone https://GitHub.com/jatinsinghsaini2100/m-bomber2.O ; cd m-bomber2.O ;
bash bomber.sh
๐1๐1
Media is too big
VIEW IN TELEGRAM
Introducing Virtual Girlfriend
Using a Python Project called "GirlFriend GPT" , you can now create your own AI GirlFriend, your personal AI companion.
Its better than your real girl friend because it won't fight with you and neither would cheat on you
So NO Heart breaks :)
But its just an AI so don't get horny with it
Features:
โข Custom Voice: unique voice for your AI model
โข Connects to Telegram !
โข Unique Personality according to whatever you want in your GirlFriend
โข Can generate Selfies when you ask her too
Website: https://gptgirlfriend.online/
GitHub Source
#TECHNEWS
Using a Python Project called "GirlFriend GPT" , you can now create your own AI GirlFriend, your personal AI companion.
Its better than your real girl friend because it won't fight with you and neither would cheat on you
So NO Heart breaks :)
But its just an AI so don't get horny with it
Features:
โข Custom Voice: unique voice for your AI model
โข Connects to Telegram !
โข Unique Personality according to whatever you want in your GirlFriend
โข Can generate Selfies when you ask her too
Website: https://gptgirlfriend.online/
GitHub Source
#TECHNEWS
๐16๐9๐ฅฐ2๐ข2โค1๐1
*FREE Google Courses for 2023*
Google Project Management
๐https://files.technicalatg.com/Sz0GBPGI1o
Agile Project Management
๐https://files.technicalatg.com/aYiWk
Project Execution: Running the Project
๐https://files.technicalatg.com/L2gnMuBL
Foundations of Project Management
๐https://files.technicalatg.com/O13e
Project Initiation: Starting a Successful Project
๐https://files.technicalatg.com/mZUc5hUUMA
Project Planning: Putting It All Together
๐https://files.technicalatg.com/u3L3
Google Analytics for Power Users
๐https://files.technicalatg.com/0TArraNNm
Fundamentals of digital marketing
๐https://files.technicalatg.com/LTd5GH
Python Basics for Data Analysis
๐https://files.technicalatg.com/YdTexs
Data Science Foundations
๐https://files.technicalatg.com/asm6xrst
Advanced Google Analytics
๐https://files.technicalatg.com/Qjzw2hd8u
Google Cloud Computing Foundations:
๐https://files.technicalatg.com/38uwnx9R
Google Cloud Computing Foundations:
๐https://files.technicalatg.com/nssTVGtg
Data, ML, and AI in Google Cloud
๐https://files.technicalatg.com/TufepgmD
Google Cloud Computing Foundations: Networking and Security in Google Cloud
๐https://files.technicalatg.com/cr5ezQ
Machine Learning Crash Course
๐https://files.technicalatg.com/kGFAJ4h
Basics of Machine Learning
๐https://files.technicalatg.com/dLjbbQD
Data Science with Python
๐https://files.technicalatg.com/T0h0dUrT
Google Project Management
๐https://files.technicalatg.com/Sz0GBPGI1o
Agile Project Management
๐https://files.technicalatg.com/aYiWk
Project Execution: Running the Project
๐https://files.technicalatg.com/L2gnMuBL
Foundations of Project Management
๐https://files.technicalatg.com/O13e
Project Initiation: Starting a Successful Project
๐https://files.technicalatg.com/mZUc5hUUMA
Project Planning: Putting It All Together
๐https://files.technicalatg.com/u3L3
Google Analytics for Power Users
๐https://files.technicalatg.com/0TArraNNm
Fundamentals of digital marketing
๐https://files.technicalatg.com/LTd5GH
Python Basics for Data Analysis
๐https://files.technicalatg.com/YdTexs
Data Science Foundations
๐https://files.technicalatg.com/asm6xrst
Advanced Google Analytics
๐https://files.technicalatg.com/Qjzw2hd8u
Google Cloud Computing Foundations:
๐https://files.technicalatg.com/38uwnx9R
Google Cloud Computing Foundations:
๐https://files.technicalatg.com/nssTVGtg
Data, ML, and AI in Google Cloud
๐https://files.technicalatg.com/TufepgmD
Google Cloud Computing Foundations: Networking and Security in Google Cloud
๐https://files.technicalatg.com/cr5ezQ
Machine Learning Crash Course
๐https://files.technicalatg.com/kGFAJ4h
Basics of Machine Learning
๐https://files.technicalatg.com/dLjbbQD
Data Science with Python
๐https://files.technicalatg.com/T0h0dUrT
๐13โค1๐1๐ข1๐คฉ1
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐33 = ABOUT ICANN
The Internet Corporation for Assigned Names and Numbers is an American multistakeholder group and nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
The Internet Corporation for Assigned Names and Numbers is an American multistakeholder group and nonprofit organization responsible for coordinating the maintenance and procedures of several databases related to the namespaces and numerical spaces of the Internet, ensuring the network's stable and secure operation
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
๐4
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐34 = THREAT PROTECTION
Threat protection (TP) is defined as an array of security solutions that defend against complex malware and cyberattacks that target sensitive data. This technology can help an organization adapt to the ever-changing strategies of cybercriminals and better anticipate and prevent costly security breaches
โค๏ธโ๐ฅ
Threat protection (TP) is defined as an array of security solutions that defend against complex malware and cyberattacks that target sensitive data. This technology can help an organization adapt to the ever-changing strategies of cybercriminals and better anticipate and prevent costly security breaches
โค๏ธโ๐ฅ
๐4
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐35 = GSM SNIFFING
The GSM Sniffing is a process of extracting the complete information regarding the Mobile station dealing from the source port address to destination port address, from the country location to the mobile connected network location, from the amount the packet transmission to the amount of packet received etc.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011สึ ส สึ สษ๐ต
The GSM Sniffing is a process of extracting the complete information regarding the Mobile station dealing from the source port address to destination port address, from the country location to the mobile connected network location, from the amount the packet transmission to the amount of packet received etc.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011สึ ส สึ สษ๐ต
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐36 = IOT HACKING
IoT hacking can be extremely effective, producing DDoS attacks that can cripple our infrastructure, systems, and way of life. We've all heard of cybersecurity concerns when it comes to IoT devices and there's an inherent risk that comes with connecting more and more devices to the internet and to each other.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
IoT hacking can be extremely effective, producing DDoS attacks that can cripple our infrastructure, systems, and way of life. We've all heard of cybersecurity concerns when it comes to IoT devices and there's an inherent risk that comes with connecting more and more devices to the internet and to each other.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐ 37 = INTELLIGENCE AND ITS TYPES
Intelligence has been defined in many ways:higher level abilities (such as abstract reasoning, mental representation, problem solving, and decision making), the ability to learn, emotional knowledge, creativity, and adaptation to meet the demands of the environment effectively.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
Intelligence has been defined in many ways:higher level abilities (such as abstract reasoning, mental representation, problem solving, and decision making), the ability to learn, emotional knowledge, creativity, and adaptation to meet the demands of the environment effectively.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
๐ข๐๐ซ๐ญ๐ข๐๐ฅ๐38 = CyberJacking and it's types
Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
๐ตTิฮฑษณฦส Fฯษพ Rาฝฮฑิฮนษณษ , Jฯฮนษณ @team_voice_011 สึ ส สึ สษ๐ต
๐3โค1
.
https://t.me/addlist/6Iwh5-CXZ59kNDQ1
https://t.me/addlist/6Iwh5-CXZ59kNDQ1
UPSC ALL BATCHES LINK ๐๐๐๐๐
Link valid only 1hr only JOiN FAST โฅ๏ธ
https://t.me/addlist/6Iwh5-CXZ59kNDQ1
https://t.me/addlist/6Iwh5-CXZ59kNDQ1
UPSC ALL BATCHES LINK ๐๐๐๐๐
Link valid only 1hr only JOiN FAST โฅ๏ธ
Telegram
UPSC
Youโve been invited to add the folder โUPSCโ, which includes 16 chats.
๐2โค1๐1๐1
๐ฅ 10 Advanced Python Scripts For Everyday Programming
1. SpeedTest with Python
2. Search on Google
3. Make Web Bot
4. Fetch Song Lyrics
5. Get Exif Data of Photos
6. OCR Text from Image
7. Convert Photo into Cartonize
8. Empty Recycle Bin
9. Python Image Enhancement
10. Get Window Version
โค๏ธ If You Want More Content Like This Then Join This Channel ๐
@team_voice_011
Give Reactions ๐โค๏ธ
1. SpeedTest with Python
# pip install pyspeedtest
# pip install speedtest
# pip install speedtest-cli
#method 1
import speedtest
speedTest = speedtest.Speedtest()
print(speedTest.get_best_server())
#Check download speed
print(speedTest.download())
#Check upload speed
print(speedTest.upload())
# Method 2
import pyspeedtest
st = pyspeedtest.SpeedTest()
st.ping()
st.download()
st.upload()
2. Search on Google
# pip install google
from googlesearch import search
query = "Medium.com"
for url in search(query):
print(url)3. Make Web Bot
# pip install selenium
import time
from selenium import webdriver
from selenium.webdriver.common.keys import Keys
bot = webdriver.Chrome("chromedriver.exe")
bot.get('[http://www.google.com'](http://www.google.com'))
search = bot.find_element_by_name('q')
search.send_keys("@codedev101")
search.send_keys(Keys.RETURN)
time.sleep(5)
bot.quit()4. Fetch Song Lyrics
# pip install lyricsgenius
import lyricsgenius
api_key = "xxxxxxxxxxxxxxxxxxxxx"
genius = lyricsgenius.Genius(api_key)
artist = genius.search_artist("Pop Smoke", max_songs=5,sort="title")
song = artist.song("100k On a Coupe")
print(song.lyrics)5. Get Exif Data of Photos
# Get Exif of Photo
# Method 1
# pip install pillow
import PIL.Image
import PIL.ExifTags
img = PIL.Image.open("Img.jpg")
exif_data =
{
PIL.ExifTags.TAGS[i]: j
for i, j in img._getexif().items()
if i in PIL.ExifTags.TAGS
}
print(exif_data)
# Method 2
# pip install ExifRead
import exifread
filename = open(path_name, 'rb')
tags = exifread.process_file(filename)
print(tags)6. OCR Text from Image
# pip install pytesseract
import pytesseract
from PIL import Image
pytesseract.pytesseract.tesseract_cmd = r'C:\Program Files\Tesseract-OCR\tesseract.exe'
t=Image.open("img.png")
text = pytesseract.image_to_string(t, config='')
print(text)7. Convert Photo into Cartonize
# pip install opencv-python
import cv2
img = cv2.imread('img.jpg')
grayimg = cv2.cvtColor(img, cv2.COLOR_BGR2GRAY)
grayimg = cv2.medianBlur(grayimg, 5)
edges = cv2.Laplacian(grayimg , cv2.CV_8U, ksize=5)
r,mask =cv2.threshold(edges,100,255,cv2.THRESH_BINARY_INV)
img2 = cv2.bitwise_and(img, img, mask=mask)
img2 = cv2.medianBlur(img2, 5)
cv2.imwrite("cartooned.jpg", mask)8. Empty Recycle Bin
# pip install winshell
import winshell
try:
winshell.recycle_bin().empty(confirm=False, /show_progress=False, sound=True)
print("Recycle bin is emptied Now")
except:
print("Recycle bin already empty")9. Python Image Enhancement
# pip install pillow
from PIL import Image,ImageFilter
from PIL import ImageEnhance
im = Image.open('img.jpg')
# Choose your filter
# add Hastag at start if you don't want to any filter below
en = ImageEnhance.Color(im)
en = ImageEnhance.Contrast(im)
en = ImageEnhance.Brightness(im)
en = ImageEnhance.Sharpness(im)
# result
en.enhance(1.5).show("enhanced")10. Get Window Version
# Window Version
import wmi
data = wmi.WMI()
for os_name in data.Win32_OperatingSystem():
print(os_name.Caption) # Microsoft Windows 11 Homeโค๏ธ If You Want More Content Like This Then Join This Channel ๐
@team_voice_011
Give Reactions ๐โค๏ธ
๐2๐คฉ2โค1
๐ Top 5 Code Editors ๐จโ๐ป For Beginners & Advanced Coders ๐