How to be sure an account in Telegram is deleted
In Telegram you can easily make an account look exactly like a deleted account.
Such accounts have a deleted photo, username is removed, name is as "Deleted Account" and privacy options are restricted (last online time, forwarding messages, showing phone number, etc.).
There are a couple of points that can help you recognize a fake π
β A really deleted account shows "last seen a long time ago" instead of the last activity time.
β There is no message entry field.
β When you change the interface language, the account name changes.
#lifehack
In Telegram you can easily make an account look exactly like a deleted account.
Such accounts have a deleted photo, username is removed, name is as "Deleted Account" and privacy options are restricted (last online time, forwarding messages, showing phone number, etc.).
There are a couple of points that can help you recognize a fake π
β A really deleted account shows "last seen a long time ago" instead of the last activity time.
β There is no message entry field.
β When you change the interface language, the account name changes.
#lifehack
π35π3β€2
Forwarded from Lifehack of the day
View Hidden Passwords Behind Asterisks in Chrome and Firefox
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
Almost all browsers hide the password field with asterisks for security purposes. If your password wasnβt saved for some reason, and you have a complex passcode, itβs nice to be able to see whatβs behind the curtain π.
In Google Chrome:
β Open a website where you have your password saved, right-click on the password field and go to Inspect Element.
β When the HTML Editor opens, look for input type = βpasswordβ field and change βpasswordβ to βtextβ and press Enter to save.
β An easy way to find that line of code is to hit Ctrl + F and type: password in the search field and arrow to it.
In Firefox:
β Right-click the password field and click Inspect Element.
β A gray bar will appear with the password field highlighted. Press Alt+M or click on the icon shown below to open the Markup Panel.
β It will show you the code for the password field. Just look at the highlighted line and change type=βpasswordβ to βtextβ.
Use it!
#lifehack
π32π₯4β€1
Forwarded from Lifehack of the day
π’ @Best Channels
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
π19
Forwarded from Lifehack of the day
Is TikTok Dangerous To Personal Privacy and Security?
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
Similar to most proprietary social media networks, TikTok collects user data and information. What Are the Dangers of TikTok?
βοΈ TikTok collects a lot of data. TikTok takes advantage of every access permission you give it, collecting info about your π± model, screen resolution, current OS, phone number, email address, location, and even contact list.
βοΈ Multiple security vulnerabilities within the app. TikTok uses an insecure HTTP connection to deliver videos instead of the more secure option, HTTPS.
βοΈ The hundreds of hours of video that individuals upload themselves are a goldmine for artificial intelligence and machine learning development.
βοΈ Using TikTok regularly, either as a consumer or content creator, increases your digital footprint.
Be careful what you share on TikTok βοΈ
Do you use TikTok? Do you like it?
#security
π₯27π17π5β€4
Forwarded from Lifehack of the day
How to Analyze Laptop Battery Health
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
Not sure how healthy your π» battery is? Here is π the best tool to analyze your laptop's battery life and health.
The powercfg command is a hidden tool on Windows. To generate a battery report, press Windows Key + X and select Command Prompt. β‘οΈ type in
powercfg /batteryreport. This command saves a battery report in HTML format on your π» (the address will be written).Open the file and check the following parameters:
βοΈThe difference between Design Capacity and Full Charge Capacity. As batteries wear over time, the full charge capacity will be less than the design capacity.
βοΈ Battery capacity drained over the last few days in different power states. Also, check out the battery usage graph.
βοΈCompare the battery life from the time you purchased the π» and see the trends of Full Charge Capacity in relation to Design Capacity.
βοΈCheck the batteryβs usage and duration.
With this test you can identify problems that affect your battery life.
Use it!
#pc
β€34π22
Forwarded from Lifehack of the day
Make your phone private
If you're a Google user, you know that the company watches almost every click you make and will provide all the data to services on the first request. Doesn't sound very appealing, does it?
Fortunately, you can get rid of it by installing CalyxOS firmware, which focuses on security and privacy.
It will completely remove all traces of Google from Android so that the company knows nothing about you. All that remains is to download alternatives to Google apps (we talked about it some days ago).
Also you will be able to encrypt all calls by default and add a "red button" for emergency data cleaning.
Try it!
#security
If you're a Google user, you know that the company watches almost every click you make and will provide all the data to services on the first request. Doesn't sound very appealing, does it?
Fortunately, you can get rid of it by installing CalyxOS firmware, which focuses on security and privacy.
It will completely remove all traces of Google from Android so that the company knows nothing about you. All that remains is to download alternatives to Google apps (we talked about it some days ago).
Also you will be able to encrypt all calls by default and add a "red button" for emergency data cleaning.
Try it!
#security
π33β€9π3
Forwarded from Lifehack of the day
This media is not supported in your browser
VIEW IN TELEGRAM
Awesome
A huge database of free courses, books and lectures to start a career in IT! All materials are in lists and are valuable knowledge that can be easily turned into a profit.
Contents:
β’ Artificial Intelligence (AI)
β’ Prompt Engineering Guide
β’ Machine Learning
β’ Quantum Computing
β’ NLP
β’ Deep Learning
β’ Data Science
β’ Computer Vision
β’ Big Data
β’ Python
A database of collections on any topic is here. You will find absolutely everything from Linux guides to courses for game development.
#lifehack #AI
A huge database of free courses, books and lectures to start a career in IT! All materials are in lists and are valuable knowledge that can be easily turned into a profit.
Contents:
β’ Artificial Intelligence (AI)
β’ Prompt Engineering Guide
β’ Machine Learning
β’ Quantum Computing
β’ NLP
β’ Deep Learning
β’ Data Science
β’ Computer Vision
β’ Big Data
β’ Python
A database of collections on any topic is here. You will find absolutely everything from Linux guides to courses for game development.
#lifehack #AI
π41β€16π₯5
Forwarded from Lifehack of the day
nxs-backup
nxs-backup is a tool for creating and delivery backups, rotating it locally and on remote storages, compatible with GNU/Linux distributions.
Features:
βοΈFull data backup;
βοΈUpload and manage backups to the remote storages (S3, SSH (SFTP), FTP, CIFS (SMB), NFS, WebDAV);
βοΈFine-tune the database backup process with additional options for optimization purposes;
βοΈNotifications about events of the backup process via email and webhooks;
βοΈBuilt-in generator of the configuration files to expedite initial setup;
βοΈEasy to read and maintain configuration files with clear transparent structure;
βοΈPossibility to restore backups by standard file/database tools
https://nxs-backup.io/
#linux #github #backup
nxs-backup is a tool for creating and delivery backups, rotating it locally and on remote storages, compatible with GNU/Linux distributions.
Features:
βοΈFull data backup;
βοΈUpload and manage backups to the remote storages (S3, SSH (SFTP), FTP, CIFS (SMB), NFS, WebDAV);
βοΈFine-tune the database backup process with additional options for optimization purposes;
βοΈNotifications about events of the backup process via email and webhooks;
βοΈBuilt-in generator of the configuration files to expedite initial setup;
βοΈEasy to read and maintain configuration files with clear transparent structure;
βοΈPossibility to restore backups by standard file/database tools
https://nxs-backup.io/
#linux #github #backup
π21β€1
Forwarded from Lifehack of the day
π Stake Properties
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 200 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 200 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
π16π₯2
Forwarded from Lifehack of the day
Cracked Apps Can Be Harmful To Your Android Phone!
Are you the type to circumvent the Google Play Store to get a free copy of a paid app? Downloading cracked Android apps from a shady website or untrustworthy third-party app store is how most Android devices get infected.
Don't risk everything just to get hold of one appβοΈ These are why you should avoid cracked apps on your π±.
βοΈ Cracked apps are one of the biggest sources of malware and viruses.
βοΈThe download sources for cracked apps are often malicious.
βοΈThere is no guarantee that the APK file will actually work. The websites offering cracked apps have another benefit to gain from your visit to their site. They clickbait you to visit their website to improve the site's traffic in the process.
βοΈYour account might get banned along with potential legal issues.
Stay safe and avoid cracked apps!
#security
Are you the type to circumvent the Google Play Store to get a free copy of a paid app? Downloading cracked Android apps from a shady website or untrustworthy third-party app store is how most Android devices get infected.
Don't risk everything just to get hold of one appβοΈ These are why you should avoid cracked apps on your π±.
βοΈ Cracked apps are one of the biggest sources of malware and viruses.
βοΈThe download sources for cracked apps are often malicious.
βοΈThere is no guarantee that the APK file will actually work. The websites offering cracked apps have another benefit to gain from your visit to their site. They clickbait you to visit their website to improve the site's traffic in the process.
βοΈYour account might get banned along with potential legal issues.
Stay safe and avoid cracked apps!
#security
π38β€10π₯9
Share files conveniently!
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
π37β€3
Forwarded from Lifehack of the day
π’ @Best Channels
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
π17β€5π₯3
Forwarded from Lifehack of the day
YT Channel Downloader
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
π29
Forwarded from Lifehack of the day
Wi-Fi from a PC π» without a router!
If you have a device π» with a Windows 10 version, you can activate the Internet distribution directly from your PC.
β Click "Start" - "Settings" - "Network and Internet" β "Mobile Hotspot". The network name and password will already be registered here. If desired, you can change them using the "Edit" button.
β Switch the button to "On" mode (Share your internet connection with other devices).
#lifehack #windows
If you have a device π» with a Windows 10 version, you can activate the Internet distribution directly from your PC.
β Click "Start" - "Settings" - "Network and Internet" β "Mobile Hotspot". The network name and password will already be registered here. If desired, you can change them using the "Edit" button.
β Switch the button to "On" mode (Share your internet connection with other devices).
#lifehack #windows
π25β€18
Forwarded from Lifehack of the day
Extract favorite scenes from YouTube videos
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
π26β€7
Forwarded from Lifehack of the day
Wristkey
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
π28
Forwarded from Lifehack of the day
How to Prevent a USB Attack
There are dozens of ways a cyberattacker could use a USB drive to install an exploit on your π». It can be via thumb drive devices and public USB charging ports, a practice known as juice jacking.
How to Avoid USB Attacks
β Don't Plug In Unknown Drives. One common tactic is sending USB drives to people in the mail and making them look like promo offers from big box tech stores. Do not use it βοΈ
β Work-Life Balance. If you use a USB drive for work, keep it separate from anything personal. Regularly scan your USB devices with an antivirus or anti-malware program.
β Disable Autorun. On Windows: open Control Panel and find the AutoPlay setting. Uncheck Use AutoPlay for all media and devices.
β Keep your systems updated, especially if youβre running Windows.
#security
There are dozens of ways a cyberattacker could use a USB drive to install an exploit on your π». It can be via thumb drive devices and public USB charging ports, a practice known as juice jacking.
How to Avoid USB Attacks
β Don't Plug In Unknown Drives. One common tactic is sending USB drives to people in the mail and making them look like promo offers from big box tech stores. Do not use it βοΈ
β Work-Life Balance. If you use a USB drive for work, keep it separate from anything personal. Regularly scan your USB devices with an antivirus or anti-malware program.
β Disable Autorun. On Windows: open Control Panel and find the AutoPlay setting. Uncheck Use AutoPlay for all media and devices.
β Keep your systems updated, especially if youβre running Windows.
#security
π24β€7π₯3
Forwarded from Lifehack of the day
π£ GodMode - the smol AI Chat Browser
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
π28β€3
Forwarded from Lifehack of the day
How To Hide Personal Photos and Videos
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
π41π₯5π5
Forwarded from Lifehack of the day
Musicat
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
π19β€5π₯4
Forwarded from Lifehack of the day
How to store text messages safely?
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
π24β€13