How to know how anonymous on the Internet you are
All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity.
Proxy6 collects and checks all your data, and shows you the results of the check after a few seconds.
You'll know what your conditional online profile looks like - whether you have VPN, proxy, Tor, Turbo mode and two-way pings enabled. And Proxy6 will also check you in leak databases: for example, if your DNS, IP address via WebRTC and other data is leaked.
Try and check yourself!
#privacy #security
All the sites you visit can see your address, IP and ISP name. But if you care about your anonymity, you probably use a VPN or Tor to prevent sites from finding out your real identity.
Proxy6 collects and checks all your data, and shows you the results of the check after a few seconds.
You'll know what your conditional online profile looks like - whether you have VPN, proxy, Tor, Turbo mode and two-way pings enabled. And Proxy6 will also check you in leak databases: for example, if your DNS, IP address via WebRTC and other data is leaked.
Try and check yourself!
#privacy #security
π19β€2π2π₯1
Forwarded from Lifehack of the day
ββποΈ Stake Properties
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 250 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
#service
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 250 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
#service
π8π₯1
The social network that won't be blocked
The developers of the decentralized social network Bastyon.com have created a blockchain-based platform that is immune to blocking and censorship. Bastyon combines the most useful things from YouTube, Twitter, Torrent, and Bitcoin.
Android owners can use the application, which does not depend on Google, and the messenger itself is protected by end-to-end encryption. It is also important that you do not need to leave any personal information when registering, which constitutes a high level of user privacy.
#security
The developers of the decentralized social network Bastyon.com have created a blockchain-based platform that is immune to blocking and censorship. Bastyon combines the most useful things from YouTube, Twitter, Torrent, and Bitcoin.
Android owners can use the application, which does not depend on Google, and the messenger itself is protected by end-to-end encryption. It is also important that you do not need to leave any personal information when registering, which constitutes a high level of user privacy.
#security
π12β€2
Turning your smartphone into a surveillance camera
Usually you have to buy a camera. However, if you have an unnecessary π±, you can not spend money and use it.
βοΈ Download the program IP Webcam, and then adjust the video capture quality. If you have any questions, the application has a FAQ guide with answers.
βοΈ Click "Run" - "How to connect".
βοΈ Choose the type of connection: mobile internet or Wi-Fi. You will be given the ip-address and port of the camera - enter it in your browser. Example: http://127.0.0.1:8080.
βοΈ In the browser, select the way to watch the video.
The application does not work in the background, so it must be open on your π± all the time, as well as the device must be connected to a charger.
#service #android
Usually you have to buy a camera. However, if you have an unnecessary π±, you can not spend money and use it.
βοΈ Download the program IP Webcam, and then adjust the video capture quality. If you have any questions, the application has a FAQ guide with answers.
βοΈ Click "Run" - "How to connect".
βοΈ Choose the type of connection: mobile internet or Wi-Fi. You will be given the ip-address and port of the camera - enter it in your browser. Example: http://127.0.0.1:8080.
βοΈ In the browser, select the way to watch the video.
The application does not work in the background, so it must be open on your π± all the time, as well as the device must be connected to a charger.
#service #android
π9β€6π₯2π2
How to play PlayStation on your Android smartphone
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
π8β€4π₯1
How to encrypt a short message into audio πΌ
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
π4π2π₯2
How to create an invisible folder on Windows?
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
π13β€8π₯1
Inline Telegram bots save your time
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
π17π8π₯2β€1
Things You Need to Do Before Deleting an App
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
π26π₯3π1
How to search for other people's files in Google Drive?
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
π15π₯5β€2
View Hidden Passwords Behind Asterisks in Chrome and Firefox
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
π14β€3
How to view threats detected by Windows Defender?
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
π16β€1
Create password-protected notes in your browser
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
π10β€1
Back up any operating system
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
π9β€1
Draw on and Annotate the Web & PDFs
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
π10β€1
Turn YouTube videos into GIFs
Gifrun is the service where you can turn any YouTube video into a GIF. Go to the site, provide a link and an editing panel will appear.
You can specify the duration of the gif, the format, the number of FPS, add text, and make the gif infinite or repetitive.
You can download the video directly from here and you can add filters to your GIF: Sepia, Vignette, Silver etc.
Use it!
#service
Gifrun is the service where you can turn any YouTube video into a GIF. Go to the site, provide a link and an editing panel will appear.
You can specify the duration of the gif, the format, the number of FPS, add text, and make the gif infinite or repetitive.
You can download the video directly from here and you can add filters to your GIF: Sepia, Vignette, Silver etc.
Use it!
#service
π10
How to test your phone for water resistance
There is an application that checks actual water protection of your π± - Water Resistance Tester. You can also check on the Internet whether your device is protected from water, but the protection over time may become worse, for example, after a fall.
To use it you need to go to π link and install, put the phone on a flat surface and press two fingers on the prints, later you will need to press faster and harder.
Note: for the application to work there must be a barometer in a π±. With it, the application measures the pressure inside the device and shows whether your device is protected from water.
Try it!
#service
There is an application that checks actual water protection of your π± - Water Resistance Tester. You can also check on the Internet whether your device is protected from water, but the protection over time may become worse, for example, after a fall.
To use it you need to go to π link and install, put the phone on a flat surface and press two fingers on the prints, later you will need to press faster and harder.
Note: for the application to work there must be a barometer in a π±. With it, the application measures the pressure inside the device and shows whether your device is protected from water.
Try it!
#service
π12π₯2β€1π1
Is TikTok Dangerous To Personal Privacy and Security?
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
π24β€3π3π₯2
Move your stuff from iOS!
iOS users can now switch to Android with a helpful Google-made iPhone app - Switch to Android.
Essentially, the app moves integral pieces of data from the iPhone to a Google Drive account. Then, once you get your Android π± up and running, it pulls the data from Drive and syncs it. This allows you to transfer all the things you need without a cable or even having 2 phones in the same place at the same time.
Hereβs what it moves π:
βοΈContacts;
βοΈCalendar;
βοΈPhotos and videos;
βοΈText messages.
The app will ask you for a series of permissions so that your iPhoneβs data can be moved to your Android device.
Save and use it when necessary!
#service #android
iOS users can now switch to Android with a helpful Google-made iPhone app - Switch to Android.
Essentially, the app moves integral pieces of data from the iPhone to a Google Drive account. Then, once you get your Android π± up and running, it pulls the data from Drive and syncs it. This allows you to transfer all the things you need without a cable or even having 2 phones in the same place at the same time.
Hereβs what it moves π:
βοΈContacts;
βοΈCalendar;
βοΈPhotos and videos;
βοΈText messages.
The app will ask you for a series of permissions so that your iPhoneβs data can be moved to your Android device.
Save and use it when necessary!
#service #android
π15β€1
How to Analyze Laptop Battery Health
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
powercfg /batteryreport. This command saves a battery report in HTML format on your π» (the address will be written).Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
π22β€4π₯1
How to encrypt SMS-messages
Although we rarely correspond via SMS, they are very helpful when there is no internet - SMS can be sent even without a network. But this method has its problems - intercepting SMS is much easier than hacking messenger.
The Silence app for Android comes to the rescue. It looks like an ordinary messenger, but with it you will be able to send SMS messages and share media files with as much privacy as possible. But! The recipient must also install the utility βοΈ
It uses the reliable Signal encryption protocol, so you can be sure the program is secure. You can install it on Google Play.
Protect your privacy during communication!
#security #android
Although we rarely correspond via SMS, they are very helpful when there is no internet - SMS can be sent even without a network. But this method has its problems - intercepting SMS is much easier than hacking messenger.
The Silence app for Android comes to the rescue. It looks like an ordinary messenger, but with it you will be able to send SMS messages and share media files with as much privacy as possible. But! The recipient must also install the utility βοΈ
It uses the reliable Signal encryption protocol, so you can be sure the program is secure. You can install it on Google Play.
Protect your privacy during communication!
#security #android
π14π5β€3