Use Offline Maps when there is no Internet
It's very useful to have offline maps app in your π± to be sure you'll not be lost in different situations. Here are the best offline maps.
β MAPS.ME is a real map app for pedestrians, with markings of paths and routes that are often ignored by "big brothers," in which most park areas look like one big green spot. There's no need for a permanent Internet connection - the map of your region is downloaded once at the first opportunity, and then you can use it whenever you want.
β Osmand is a similar application, also based on OpenStreetMap maps (a web-project where participants create a detailed and free map of the world).
#service #lifehack
It's very useful to have offline maps app in your π± to be sure you'll not be lost in different situations. Here are the best offline maps.
β MAPS.ME is a real map app for pedestrians, with markings of paths and routes that are often ignored by "big brothers," in which most park areas look like one big green spot. There's no need for a permanent Internet connection - the map of your region is downloaded once at the first opportunity, and then you can use it whenever you want.
β Osmand is a similar application, also based on OpenStreetMap maps (a web-project where participants create a detailed and free map of the world).
#service #lifehack
π19π3
How to Share Google Calendar with Others
There can be times when you want to share Google Calendar with others to let them know about your availability. Let's do it!
1οΈβ£ ADD CALENDAR IN GOOGLE CALENDAR:
βοΈ Go to Google Calendar , click on the Settings.
βοΈ Select Add calendar and click on Create new calendar.
βοΈGive it a name, description and click on Create calendar.
2οΈβ£ SHARE GOOGLE CALENDAR:
βοΈ Visit Google Calendar, click on the three-dot menu and select Settings and sharing.
βοΈ Scroll down to share with specific people and select Add people.
βοΈYou have many permission options to choose from when you add other peopleβs Gmail ID (see only, make changes).
3οΈβ£ GENERATE SHAREABLE GOOGLE CALENDAR LINK:
βοΈ Open Google Calendar, click on the three-dot menu, select Settings and sharing.
βοΈ From the Access permissions for events menu, find the Get shareable link. Click on it.
βοΈCopy the link and share it with others.
#service #lifehack
There can be times when you want to share Google Calendar with others to let them know about your availability. Let's do it!
1οΈβ£ ADD CALENDAR IN GOOGLE CALENDAR:
βοΈ Go to Google Calendar , click on the Settings.
βοΈ Select Add calendar and click on Create new calendar.
βοΈGive it a name, description and click on Create calendar.
2οΈβ£ SHARE GOOGLE CALENDAR:
βοΈ Visit Google Calendar, click on the three-dot menu and select Settings and sharing.
βοΈ Scroll down to share with specific people and select Add people.
βοΈYou have many permission options to choose from when you add other peopleβs Gmail ID (see only, make changes).
3οΈβ£ GENERATE SHAREABLE GOOGLE CALENDAR LINK:
βοΈ Open Google Calendar, click on the three-dot menu, select Settings and sharing.
βοΈ From the Access permissions for events menu, find the Get shareable link. Click on it.
βοΈCopy the link and share it with others.
#service #lifehack
π9β€5π₯1
The free app that makes your Internet safer and faster
WARP is a free VPN for everyone. This application has become analogue to a VPN.
VPN hides the original IP address (where and who you are), WARP does not. But it encrypts traffic because it uses the Cloudflare DNS service. WARP is designed to protect information while transmitting data over the network. It protects against leaks on public networks, sniffers, tracking by ISPs or ad networks. Basically, WARP is basically a VPN.
Why are VPNs worse? They slow down devices, reduce traffic speeds, and kill the battery. WARP is not. Yes, it's not designed to access blocked resources, but it does the job! It speeds your internet up!
#security
WARP is a free VPN for everyone. This application has become analogue to a VPN.
VPN hides the original IP address (where and who you are), WARP does not. But it encrypts traffic because it uses the Cloudflare DNS service. WARP is designed to protect information while transmitting data over the network. It protects against leaks on public networks, sniffers, tracking by ISPs or ad networks. Basically, WARP is basically a VPN.
Why are VPNs worse? They slow down devices, reduce traffic speeds, and kill the battery. WARP is not. Yes, it's not designed to access blocked resources, but it does the job! It speeds your internet up!
#security
π22π₯5β€2
Fix your speaker! π±
Fix My Speaker is a free service for cleaning your phone speaker.
It will help fix your π± speaker by playing an ultra-low 165 Hz sound to remove water. A smart way to remove water and dust from the speakers of your iPhone or Android π±.
You'll also find up-to-date and useful instructions for breakdowns on the site. You can also get the necessary set of services for self-repair of iPhone and iOS system restoration.
Try it!
#service #android #ios
Fix My Speaker is a free service for cleaning your phone speaker.
It will help fix your π± speaker by playing an ultra-low 165 Hz sound to remove water. A smart way to remove water and dust from the speakers of your iPhone or Android π±.
You'll also find up-to-date and useful instructions for breakdowns on the site. You can also get the necessary set of services for self-repair of iPhone and iOS system restoration.
Try it!
#service #android #ios
π20β€2
Recover deleted photos on your phone!
DiskDigger can undelete and recover lost photos and images from your memory card or internal memory.
β Download DiskDigger Photo Recovery, launch it and click "Start a simple image search".
β Mark the pictures you want to get back. Next, you need to choose where to save the data.
Save and use it!
#service #android
DiskDigger can undelete and recover lost photos and images from your memory card or internal memory.
β Download DiskDigger Photo Recovery, launch it and click "Start a simple image search".
β Mark the pictures you want to get back. Next, you need to choose where to save the data.
Save and use it!
#service #android
π7β€4
How to clone apps and use multiple accounts at once
To be able to switch between multiple accounts in the same application quickly and conveniently, there is a function of cloning apps. This is especially useful for messengers - you can combine work and private life on the same π±.
On some Android devices, the cloning function is already built in: "Settings" - "Applications" - "Clone apps". Also some users have the option to add a second space, it can be found in the settings.
If there is no built-in app duplication, there is a Clone App for you. It allows you to create clones of apps and use them for different purposes. Download the app, create a duplicate of the applications you need, bring them to the main screen.
Privacy functions:
βοΈ"Clone App" provides special protection for your privacy!
βοΈYou can customize the icon and application name.
βοΈYou can set up a private space that only you know.
Try it!
#security #app #android
To be able to switch between multiple accounts in the same application quickly and conveniently, there is a function of cloning apps. This is especially useful for messengers - you can combine work and private life on the same π±.
On some Android devices, the cloning function is already built in: "Settings" - "Applications" - "Clone apps". Also some users have the option to add a second space, it can be found in the settings.
If there is no built-in app duplication, there is a Clone App for you. It allows you to create clones of apps and use them for different purposes. Download the app, create a duplicate of the applications you need, bring them to the main screen.
Privacy functions:
βοΈ"Clone App" provides special protection for your privacy!
βοΈYou can customize the icon and application name.
βοΈYou can set up a private space that only you know.
Try it!
#security #app #android
π10β€2
How to know how anonymous on the Internet you are
All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity.
Proxy6 collects and checks all your data, and shows you the results of the check after a few seconds.
You'll know what your conditional online profile looks like - whether you have VPN, proxy, Tor, Turbo mode and two-way pings enabled. And Proxy6 will also check you in leak databases: for example, if your DNS, IP address via WebRTC and other data is leaked.
Try and check yourself!
#privacy #security
All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity.
Proxy6 collects and checks all your data, and shows you the results of the check after a few seconds.
You'll know what your conditional online profile looks like - whether you have VPN, proxy, Tor, Turbo mode and two-way pings enabled. And Proxy6 will also check you in leak databases: for example, if your DNS, IP address via WebRTC and other data is leaked.
Try and check yourself!
#privacy #security
π19β€2π2π₯1
Forwarded from Lifehack of the day
ββποΈ Stake Properties
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 250 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
#service
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 250 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
#service
π8π₯1
The social network that won't be blocked
The developers of the decentralized social network Bastyon.com have created a blockchain-based platform that is immune to blocking and censorship. Bastyon combines the most useful things from YouTube, Twitter, Torrent, and Bitcoin.
Android owners can use the application, which does not depend on Google, and the messenger itself is protected by end-to-end encryption. It is also important that you do not need to leave any personal information when registering, which constitutes a high level of user privacy.
#security
The developers of the decentralized social network Bastyon.com have created a blockchain-based platform that is immune to blocking and censorship. Bastyon combines the most useful things from YouTube, Twitter, Torrent, and Bitcoin.
Android owners can use the application, which does not depend on Google, and the messenger itself is protected by end-to-end encryption. It is also important that you do not need to leave any personal information when registering, which constitutes a high level of user privacy.
#security
π12β€2
Turning your smartphone into a surveillance camera
Usually you have to buy a camera. However, if you have an unnecessary π±, you can not spend money and use it.
βοΈ Download the program IP Webcam, and then adjust the video capture quality. If you have any questions, the application has a FAQ guide with answers.
βοΈ Click "Run" - "How to connect".
βοΈ Choose the type of connection: mobile internet or Wi-Fi. You will be given the ip-address and port of the camera - enter it in your browser. Example: http://127.0.0.1:8080.
βοΈ In the browser, select the way to watch the video.
The application does not work in the background, so it must be open on your π± all the time, as well as the device must be connected to a charger.
#service #android
Usually you have to buy a camera. However, if you have an unnecessary π±, you can not spend money and use it.
βοΈ Download the program IP Webcam, and then adjust the video capture quality. If you have any questions, the application has a FAQ guide with answers.
βοΈ Click "Run" - "How to connect".
βοΈ Choose the type of connection: mobile internet or Wi-Fi. You will be given the ip-address and port of the camera - enter it in your browser. Example: http://127.0.0.1:8080.
βοΈ In the browser, select the way to watch the video.
The application does not work in the background, so it must be open on your π± all the time, as well as the device must be connected to a charger.
#service #android
π9β€6π₯2π2
How to play PlayStation on your Android smartphone
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
π8β€4π₯1
How to encrypt a short message into audio πΌ
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
π4π2π₯2
How to create an invisible folder on Windows?
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
π13β€8π₯1
Inline Telegram bots save your time
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
π17π8π₯2β€1
Things You Need to Do Before Deleting an App
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
π26π₯3π1
How to search for other people's files in Google Drive?
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
π15π₯5β€2
View Hidden Passwords Behind Asterisks in Chrome and Firefox
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
π14β€3
How to view threats detected by Windows Defender?
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
π16β€1
Create password-protected notes in your browser
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
π10β€1
Back up any operating system
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
π9β€1
Draw on and Annotate the Web & PDFs
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
π10β€1