How to play PlayStation on your Android smartphone
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
Everyone has probably at least once in his life played Sony PlayStation and other consoles, which have become a great option for a pleasant pastime with friends.
DuckStation is an emulator of Sony PlayStation, thanks to which you can again plunge into the atmosphere of video games of the first console series. The developers have tried to work on anti-aliasing for comfortable use, and added the ability to connect a controller.
So far supported only DualShoΡk and a couple of Chinese counterparts, and the controller from xbox connects, configures, but does not work. The emulator plays games in .iso format, a big catalog of which can be found on this site.
Save and try it!
#android
π8β€4π₯1
How to encrypt a short message into audio πΌ
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
How to send a message without network access? We talk about offline messengers that work over a P2P network. With this kind of software, it doesn't matter if there is a connection or not, the recipient will get the message. Of course, if Bluetooth "reaches".
π But r2t2 is a special thing. Here you can encrypt the message into audio, and then it plays back on the motherboard - through the computer speaker. Most π» are equipped with such speakers. AND! It's all without a network connection!
R2t2 is taken out of the deep web.
Save and try it!
#lifehack #service
π4π2π₯2
How to create an invisible folder on Windows?
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
There is the way that can help you hide data. You can not hide the folder, but just make its icon invisible and put it in the corner of the desktop.
β Create a folder, right-click on it and choose Rename.
β Hold down Alt, on the sidebar type 255 (Alt + 255).
β Right-click on the folder, go to "Properties".
β Open the Settings window, select Change icon.
β From the proposed list of icons, select the transparent icon, click "OK".
#security #privacy #windows
π13β€8π₯1
Inline Telegram bots save your time
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
Inline Telegram bots are omnipresent and can be used in any of your channels, chats, or groups without even adding them as members. To see them in action, type in some keywords β and the bot will offer you relevant content:
β @gif will send you a gif from Giphy;
β @vid will send you a video from youtube;
β @pic and @bing will send you images;
β @wiki will send a related article;
β @imdb will provide you with a link to films in its catalog.
There is no need to leave the messenger to get the content you need π.
Use it!
#lifehack #telegram
π17π8π₯2β€1
Things You Need to Do Before Deleting an App
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
Here are multiple steps making sure an app is fully disconnected from your π± and other accounts:
β Delete all your data on the app. You can usually find an option to delete stored data under menu titles like βprivacy,β βaccount settings,β or βsecurity".
β Log in to your account through a web browser, if possible. Sometimes youβll find additional settings available through the desktop version of the app.
β Unlink or revoke any Facebook or Google integrations, finding the βlinked accountsβ option and removing the app or link. You can also remove integrations through the linked account instead. Just sign in to it, check your settings to see which apps they share data with, and then delete what you no longer use.
β If you canβt find any information about deleting your data on an app, contact the appβs customer service team and request in writing that your data be completely deleted.
#security
π26π₯3π1
How to search for other people's files in Google Drive?
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
Cloud storage stores billions of user files, and all information uploaded to the drive can be private or public.
Dedigger is a specialized site for searching inside the Google Drive cloud. It allows you to search for files by format. On other people's clouds, you can find everything from Photoshop files to various application sources.
Use it!
#service
π15π₯5β€2
View Hidden Passwords Behind Asterisks in Chrome and Firefox
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
π14β€3
How to view threats detected by Windows Defender?
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
The list of threats detected in Windows is available on the internal page of the system application after a few clicks and is not ideal for getting a quick overview of the latest threats.
WinDefLogView offers a more convenient and less cluttered alternative. This tool reads the Windows Defender event log and displays a log of the threats detected on your system.
Each line shows a file name, time of detection, threat name, threat level, category, action, source, process name and more. Clicking on a column header sorts the list accordingly, such as by date or threat level.
You can view a log of detected threats on your local computer, on remote computers on your network and on an external drive connected to your π». Individual lines or the entire list can be exported in multiple formats, including CSV, JSON and XML.
Use it!
#security #pc
π16β€1
Create password-protected notes in your browser
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
When your π± is discharged and you need some information from notes or phone number, you can use MySecureNote, password-protected notes service directly in your browser.
Simply upload the information to a public (but secure) URL and access it from any device.
Setup process:
β Choose a username and pin code to get a URL.
β Upload text and photos.
β Access data from any location!
You've written down the information you want - you've saved the note. Now to get there again, you just need to go to that address and enter your pin code.
Use it!
#service #security
π10β€1
Back up any operating system
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
A backup protects you from losing your data if your operating system fails. If you haven't done it before, now is the time to take care of it!
Restic is an advanced backup program that can back up your files from Linux, BSD, Mac and Windows.
It is very easy to do, as the application requires no complicated setup, runs serverless with a single executable file. Works efficiently by transferring only the parts that have actually changed in the files you back up
To install, follow the instructions on the installation page in the manual or download the latest custom binary on the GitHub download page.
Use it!
#security
π9β€1
Draw on and Annotate the Web & PDFs
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
While searching for the right products in online stores, performing work tasks, or making a list of ideas for a project, it would be convenient to leave notes directly on the sites you browse.
Spade is a Chrome extension that offers users a set of tools that can be used to sign and label web page content. This add-on also comes in handy when checking papers and documents. There is even a separate section with a blank white paper for those who just like to draw.
There is a button to generate a link to the site with your markings. You can copy it and send it via messenger or e-mail. In addition, you can export the page with your notes as a PDF file.
Use it!
#service
π10β€1
Turn YouTube videos into GIFs
Gifrun is the service where you can turn any YouTube video into a GIF. Go to the site, provide a link and an editing panel will appear.
You can specify the duration of the gif, the format, the number of FPS, add text, and make the gif infinite or repetitive.
You can download the video directly from here and you can add filters to your GIF: Sepia, Vignette, Silver etc.
Use it!
#service
Gifrun is the service where you can turn any YouTube video into a GIF. Go to the site, provide a link and an editing panel will appear.
You can specify the duration of the gif, the format, the number of FPS, add text, and make the gif infinite or repetitive.
You can download the video directly from here and you can add filters to your GIF: Sepia, Vignette, Silver etc.
Use it!
#service
π10
How to test your phone for water resistance
There is an application that checks actual water protection of your π± - Water Resistance Tester. You can also check on the Internet whether your device is protected from water, but the protection over time may become worse, for example, after a fall.
To use it you need to go to π link and install, put the phone on a flat surface and press two fingers on the prints, later you will need to press faster and harder.
Note: for the application to work there must be a barometer in a π±. With it, the application measures the pressure inside the device and shows whether your device is protected from water.
Try it!
#service
There is an application that checks actual water protection of your π± - Water Resistance Tester. You can also check on the Internet whether your device is protected from water, but the protection over time may become worse, for example, after a fall.
To use it you need to go to π link and install, put the phone on a flat surface and press two fingers on the prints, later you will need to press faster and harder.
Note: for the application to work there must be a barometer in a π±. With it, the application measures the pressure inside the device and shows whether your device is protected from water.
Try it!
#service
π12π₯2β€1π1
Is TikTok Dangerous To Personal Privacy and Security?
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
π24β€3π3π₯2
Move your stuff from iOS!
iOS users can now switch to Android with a helpful Google-made iPhone app - Switch to Android.
Essentially, the app moves integral pieces of data from the iPhone to a Google Drive account. Then, once you get your Android π± up and running, it pulls the data from Drive and syncs it. This allows you to transfer all the things you need without a cable or even having 2 phones in the same place at the same time.
Hereβs what it moves π:
βοΈContacts;
βοΈCalendar;
βοΈPhotos and videos;
βοΈText messages.
The app will ask you for a series of permissions so that your iPhoneβs data can be moved to your Android device.
Save and use it when necessary!
#service #android
iOS users can now switch to Android with a helpful Google-made iPhone app - Switch to Android.
Essentially, the app moves integral pieces of data from the iPhone to a Google Drive account. Then, once you get your Android π± up and running, it pulls the data from Drive and syncs it. This allows you to transfer all the things you need without a cable or even having 2 phones in the same place at the same time.
Hereβs what it moves π:
βοΈContacts;
βοΈCalendar;
βοΈPhotos and videos;
βοΈText messages.
The app will ask you for a series of permissions so that your iPhoneβs data can be moved to your Android device.
Save and use it when necessary!
#service #android
π15β€1
How to Analyze Laptop Battery Health
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
powercfg /batteryreport. This command saves a battery report in HTML format on your π» (the address will be written).Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
π22β€4π₯1
How to encrypt SMS-messages
Although we rarely correspond via SMS, they are very helpful when there is no internet - SMS can be sent even without a network. But this method has its problems - intercepting SMS is much easier than hacking messenger.
The Silence app for Android comes to the rescue. It looks like an ordinary messenger, but with it you will be able to send SMS messages and share media files with as much privacy as possible. But! The recipient must also install the utility βοΈ
It uses the reliable Signal encryption protocol, so you can be sure the program is secure. You can install it on Google Play.
Protect your privacy during communication!
#security #android
Although we rarely correspond via SMS, they are very helpful when there is no internet - SMS can be sent even without a network. But this method has its problems - intercepting SMS is much easier than hacking messenger.
The Silence app for Android comes to the rescue. It looks like an ordinary messenger, but with it you will be able to send SMS messages and share media files with as much privacy as possible. But! The recipient must also install the utility βοΈ
It uses the reliable Signal encryption protocol, so you can be sure the program is secure. You can install it on Google Play.
Protect your privacy during communication!
#security #android
π14π5β€3
Find music from TV shows, movies and games!
Watching a movie or playing a game, you can listen to cool songs πΆ. But how do you find them if you don't know the title?
You can try Shazam, but it doesn't always recognize a song and takes much time. It's much more convenient to use Tunefind. This site will find any music in a TV series, movie or game. Tracks are added to the site by users themselves, so there are already hundreds of thousands of them.
Just select a specific season and episode of a show, and the service will show all the music from it. Under the song, there are links to Spotify, Apple Music, and YouTube.
Try it!
#service
Watching a movie or playing a game, you can listen to cool songs πΆ. But how do you find them if you don't know the title?
You can try Shazam, but it doesn't always recognize a song and takes much time. It's much more convenient to use Tunefind. This site will find any music in a TV series, movie or game. Tracks are added to the site by users themselves, so there are already hundreds of thousands of them.
Just select a specific season and episode of a show, and the service will show all the music from it. Under the song, there are links to Spotify, Apple Music, and YouTube.
Try it!
#service
π15β€3
Make your phone private
If you're a Google user, you know that the company watches almost every click you make and will provide all the data to services on the first request. Doesn't sound very appealing, does it?
Fortunately, you can get rid of it by installing CalyxOS firmware, which focuses on security and privacy.
It will completely remove all traces of Google from Android so that the company knows nothing about you. All that remains is to download alternatives to Google apps (we talked about it some days ago).
Also you will be able to encrypt all calls by default and add a "red button" for emergency data cleaning.
Try it!
#security
If you're a Google user, you know that the company watches almost every click you make and will provide all the data to services on the first request. Doesn't sound very appealing, does it?
Fortunately, you can get rid of it by installing CalyxOS firmware, which focuses on security and privacy.
It will completely remove all traces of Google from Android so that the company knows nothing about you. All that remains is to download alternatives to Google apps (we talked about it some days ago).
Also you will be able to encrypt all calls by default and add a "red button" for emergency data cleaning.
Try it!
#security
π21β€9π₯6
demo.gif
10.7 MB
Youtube to GIF Converter
Bash script to convert a YouTube video to a high-quality GIF file with a specified resolution, frame rate, start time, and duration.
It utilizes yt-dlp, ffmpeg, and gifsicle to accomplish this task.
https://github.com/Gords/GIFtube
Bash script to convert a YouTube video to a high-quality GIF file with a specified resolution, frame rate, start time, and duration.
It utilizes yt-dlp, ffmpeg, and gifsicle to accomplish this task.
https://github.com/Gords/GIFtube
π3β€2π₯2
This media is not supported in your browser
VIEW IN TELEGRAM
Awesome
A huge database of free courses, books and lectures to start a career in IT! All materials are in lists and are valuable knowledge that can be easily turned into a profit.
Contents:
β’ Artificial Intelligence (AI)
β’ Prompt Engineering Guide
β’ Machine Learning
β’ Quantum Computing
β’ NLP
β’ Deep Learning
β’ Data Science
β’ Computer Vision
β’ Big Data
β’ Python
A database of collections on any topic is here. You will find absolutely everything from Linux guides to courses for game development.
#lifehack #AI
A huge database of free courses, books and lectures to start a career in IT! All materials are in lists and are valuable knowledge that can be easily turned into a profit.
Contents:
β’ Artificial Intelligence (AI)
β’ Prompt Engineering Guide
β’ Machine Learning
β’ Quantum Computing
β’ NLP
β’ Deep Learning
β’ Data Science
β’ Computer Vision
β’ Big Data
β’ Python
A database of collections on any topic is here. You will find absolutely everything from Linux guides to courses for game development.
#lifehack #AI
π27π₯14β€5