Forwarded from Lifehack of the day
Cracked Apps Can Be Harmful To Your Android Phone!
Are you the type to circumvent the Google Play Store to get a free copy of a paid app? Downloading cracked Android apps from a shady website or untrustworthy third-party app store is how most Android devices get infected.
Don't risk everything just to get hold of one appβοΈ These are why you should avoid cracked apps on your π±.
βοΈ Cracked apps are one of the biggest sources of malware and viruses.
βοΈThe download sources for cracked apps are often malicious.
βοΈThere is no guarantee that the APK file will actually work. The websites offering cracked apps have another benefit to gain from your visit to their site. They clickbait you to visit their website to improve the site's traffic in the process.
βοΈYour account might get banned along with potential legal issues.
Stay safe and avoid cracked apps!
#security
Are you the type to circumvent the Google Play Store to get a free copy of a paid app? Downloading cracked Android apps from a shady website or untrustworthy third-party app store is how most Android devices get infected.
Don't risk everything just to get hold of one appβοΈ These are why you should avoid cracked apps on your π±.
βοΈ Cracked apps are one of the biggest sources of malware and viruses.
βοΈThe download sources for cracked apps are often malicious.
βοΈThere is no guarantee that the APK file will actually work. The websites offering cracked apps have another benefit to gain from your visit to their site. They clickbait you to visit their website to improve the site's traffic in the process.
βοΈYour account might get banned along with potential legal issues.
Stay safe and avoid cracked apps!
#security
π38β€10π₯9
Share files conveniently!
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
π37β€3
Forwarded from Lifehack of the day
π’ @Best Channels
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
β‘οΈ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπ
π17β€5π₯3
Forwarded from Lifehack of the day
YT Channel Downloader
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
π29
Forwarded from Lifehack of the day
Wi-Fi from a PC π» without a router!
If you have a device π» with a Windows 10 version, you can activate the Internet distribution directly from your PC.
β Click "Start" - "Settings" - "Network and Internet" β "Mobile Hotspot". The network name and password will already be registered here. If desired, you can change them using the "Edit" button.
β Switch the button to "On" mode (Share your internet connection with other devices).
#lifehack #windows
If you have a device π» with a Windows 10 version, you can activate the Internet distribution directly from your PC.
β Click "Start" - "Settings" - "Network and Internet" β "Mobile Hotspot". The network name and password will already be registered here. If desired, you can change them using the "Edit" button.
β Switch the button to "On" mode (Share your internet connection with other devices).
#lifehack #windows
π25β€18
Forwarded from Lifehack of the day
Extract favorite scenes from YouTube videos
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
π26β€7
Forwarded from Lifehack of the day
Wristkey
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
π28
Forwarded from Lifehack of the day
How to Prevent a USB Attack
There are dozens of ways a cyberattacker could use a USB drive to install an exploit on your π». It can be via thumb drive devices and public USB charging ports, a practice known as juice jacking.
How to Avoid USB Attacks
β Don't Plug In Unknown Drives. One common tactic is sending USB drives to people in the mail and making them look like promo offers from big box tech stores. Do not use it βοΈ
β Work-Life Balance. If you use a USB drive for work, keep it separate from anything personal. Regularly scan your USB devices with an antivirus or anti-malware program.
β Disable Autorun. On Windows: open Control Panel and find the AutoPlay setting. Uncheck Use AutoPlay for all media and devices.
β Keep your systems updated, especially if youβre running Windows.
#security
There are dozens of ways a cyberattacker could use a USB drive to install an exploit on your π». It can be via thumb drive devices and public USB charging ports, a practice known as juice jacking.
How to Avoid USB Attacks
β Don't Plug In Unknown Drives. One common tactic is sending USB drives to people in the mail and making them look like promo offers from big box tech stores. Do not use it βοΈ
β Work-Life Balance. If you use a USB drive for work, keep it separate from anything personal. Regularly scan your USB devices with an antivirus or anti-malware program.
β Disable Autorun. On Windows: open Control Panel and find the AutoPlay setting. Uncheck Use AutoPlay for all media and devices.
β Keep your systems updated, especially if youβre running Windows.
#security
π24β€7π₯3
Forwarded from Lifehack of the day
π£ GodMode - the smol AI Chat Browser
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
π28β€3
Forwarded from Lifehack of the day
How To Hide Personal Photos and Videos
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
π41π₯5π5
Forwarded from Lifehack of the day
Musicat
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
π19β€5π₯4
Forwarded from Lifehack of the day
How to store text messages safely?
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
π24β€13
Forwarded from Lifehack of the day
How to copy text from a photo or a document
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
π35β€10
Forwarded from Lifehack of the day
Encrypt your data
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
π22π₯7
Forwarded from Lifehack of the day
Tips for working with Microsoft
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
π33β€7π₯6
Forwarded from Lifehack of the day
Π‘heck if your data is leaking through a VPN
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
π30β€6
Signs Your Social Media Accounts Have Been Hacked
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
π17π₯15β€4
Send Messages, Not Metadata
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
π27β€5
How to Beat Social Media Algorithms
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
π37π10β€3
Forwarded from Lifehack of the day
How to remove watermarks from an image
We all love to share pictures from the Internet, especially if we find something we've been looking for a long time. But unfortunately, many of them are drowned in annoying watermarks, spoiling the whole atmosphere, and sometimes overlapping half of the image.
To avoid wasting time looking for a replacement or working in a photo editor, you can ask for help from Watermark Remover, whose artificial intelligence will get rid of unnecessary elements of any image in a matter of seconds.
It will cope not only with semi-transparent watermarks, but also with invisible marks which only special software can spot.
#service #lifehack
We all love to share pictures from the Internet, especially if we find something we've been looking for a long time. But unfortunately, many of them are drowned in annoying watermarks, spoiling the whole atmosphere, and sometimes overlapping half of the image.
To avoid wasting time looking for a replacement or working in a photo editor, you can ask for help from Watermark Remover, whose artificial intelligence will get rid of unnecessary elements of any image in a matter of seconds.
It will cope not only with semi-transparent watermarks, but also with invisible marks which only special software can spot.
#service #lifehack
π24β€11π₯5π2
How to search on Google from another region
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
π37β€6