Lifehack of the day
22.4K subscribers
218 photos
4 videos
2 files
461 links
Useful lifehacks of your devices, social networks and hidden OS features, best apps for your smartphone.

Contact admin for all questions.

Buy ads: https://telega.io/c/lifehackandbug
Download Telegram
Share files conveniently!

Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world 🌍.

The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.

Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.

Obtaining: enter the 6-digit one-time key on the receiving device.

#service
πŸ‘37❀3
Forwarded from Lifehack of the day
πŸ“’  @Best Channels

⚑️ Step into the epicenter of the finest Telegram Channels - A tailor-made collection designed just for you! Discover a world curated to match your interests, and stay ahead with the best content, right on your fingertipsπŸ‘
πŸ‘17❀5πŸ”₯3
Forwarded from Lifehack of the day
YT Channel Downloader

YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.

Features:

βœ”οΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βœ”οΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βœ”οΈQuality Control: Specify video/audio quality or opt to download only the audio;
βœ”οΈDownload Marking: Keeps track of downloaded files for easier management;

https://github.com/hyperfield/yt-channel-downloader

#app #youtube #video #github
πŸ‘29
Forwarded from Lifehack of the day
Wi-Fi from a PC πŸ’» without a router!

If you have a device πŸ’» with a Windows 10 version, you can activate the Internet distribution directly from your PC.

βœ… Click "Start" - "Settings" - "Network and Internet" β€” "Mobile Hotspot". The network name and password will already be registered here. If desired, you can change them using the "Edit" button.

βœ… Switch the button to "On" mode (Share your internet connection with other devices).

#lifehack #windows
πŸ‘25❀18
Forwarded from Lifehack of the day
Extract favorite scenes from YouTube videos

YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.

Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.

The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).

#service #youtube
πŸ‘26❀7
Forwarded from Lifehack of the day
Wristkey

Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).

Features:

βœ… Can be used without pairing your watch to a phone.
βœ… Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
βœ… Screen locking via PIN, pattern and password.
βœ… Local storage encrypted using 256-bit AES-GCM.
βœ… WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
βœ… Time and counter mode OTPs, up to SHA512 and 4-8 digits.
βœ… Supports round and square devices.

https://github.com/0x4f53/Wristkey

#app #android
πŸ‘28
Forwarded from Lifehack of the day
How to Prevent a USB Attack

There are dozens of ways a cyberattacker could use a USB drive to install an exploit on your πŸ’». It can be via thumb drive devices and public USB charging ports, a practice known as juice jacking.

How to Avoid USB Attacks

βœ… Don't Plug In Unknown Drives. One common tactic is sending USB drives to people in the mail and making them look like promo offers from big box tech stores. Do not use it ❗️

βœ… Work-Life Balance. If you use a USB drive for work, keep it separate from anything personal. Regularly scan your USB devices with an antivirus or anti-malware program.

βœ… Disable Autorun. On Windows: open Control Panel and find the AutoPlay setting. Uncheck Use AutoPlay for all media and devices.

βœ… Keep your systems updated, especially if you’re running Windows.

#security
πŸ‘24❀7πŸ”₯3
Forwarded from Lifehack of the day
🐣 GodMode - the smol AI Chat Browser

GodMode
is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).

As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you don’t need to depend on the patterns of one specific neuronal networks

https://github.com/smol-ai/GodMode

#github #ai
πŸ‘28❀3
Forwarded from Lifehack of the day
How To Hide Personal Photos and Videos

For Android:

To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.

When you move your photos and videos into this folder, they won't appear in your gallery or albums. ❗️You can only access them through your file manager. πŸ‘Œ

For iPhone:

Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.

These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.

Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?

#security
πŸ‘41πŸ”₯5πŸ‘5
Forwarded from Lifehack of the day
Musicat

A sleek desktop music player and tagger for offline music πŸͺ• With experimental features like map view, GPT analysis, artist toolkit. 

Features:
🎡 supports MP3, FLAC, WAV, AAC, OGG
πŸ”— linked library, using original files on disk
πŸ‘€ auto-watch and re-scan folders
🏷 with metadata tagging support (read and write ID3v2, Vorbis)
πŸ–Ό download album art, origin country from Wikipedia
🎀 fetch lyrics for current song
πŸ—Ί World Map view - see your library on a map
πŸ’Ώ a neat mini-player
🎸 U2's latest album automatically added to your library
πŸ“Š Stats, album timeline
πŸ€– Dive deeper with ChatGPT or local Ollama model for additional insights.

https://github.com/basharovV/musicat

#app #github #music #mac
πŸ‘19❀5πŸ”₯4
Forwarded from Lifehack of the day
How to store text messages safely?

We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.

Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.

The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.

Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.

#security #lifehack #android #windows #linux
πŸ‘24❀13
Forwarded from Lifehack of the day
How to copy text from a photo or a document

Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.

You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.

#service
πŸ‘35❀10
Forwarded from Lifehack of the day
Encrypt your data 

You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.

My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.

VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.

#security #windows #linux #mac
πŸ‘22πŸ”₯7
Forwarded from Lifehack of the day
Tips for working with Microsoft
Word


βœ… To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.

βœ… If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.

βœ… To speed up the cursor movement through the text, hold down CTRL and use the arrows.

βœ… By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.

βœ… The F4 key repeats the last command used.

βœ… Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.

βœ… Press CTRL + ENTER to quickly create a new sheet.

#lifehack #windows
πŸ‘33❀7πŸ”₯6
Forwarded from Lifehack of the day
Π‘heck if your data is leaking through a VPN

Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.

To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.

#security #privacy
πŸ‘30❀6
Signs Your Social Media Accounts Have Been Hacked

Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these πŸ‘‡ signs.

βœ… Your password has been changed.

βœ… Random posts from your profile.

βœ… Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.

βœ… Logins from remote locations.

βœ… Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.

βœ… Receiving emails notifying about unauthorized access.

βœ… Signed up for subscriptions and unusual purchases.

βœ… Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).

Protect your social media accounts!

#security
πŸ‘17πŸ”₯15❀4
Send Messages, Not Metadata

Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.

Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or πŸ“± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.

The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.

Available on iPhone, Android and PC.

Use it!

#security
πŸ‘27❀5
How to Beat Social Media Algorithms

Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.❗️Don’t make their data harvesting easier β€”skirt the algorithms whenever you can.

βœ… Don’t confirm the algorithm’s assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.

βœ… Eliminate suggested feeds when possible. Change your feeds to sort chronologically ➑️ don’t train the platform’s algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but it’s coming. TikTok - watch content from the β€œFollowing” (would show you videos only from accounts you follow).

βœ… Use platforms without your account when possible (YouTube, Reddit).

βœ… Use a burner account, with none of your real info.

#security
πŸ‘37πŸ‘10❀3
Forwarded from Lifehack of the day
How to remove watermarks from an image

We all love to share pictures from the Internet, especially if we find something we've been looking for a long time. But unfortunately, many of them are drowned in annoying watermarks, spoiling the whole atmosphere, and sometimes overlapping half of the image.

To avoid wasting time looking for a replacement or working in a photo editor, you can ask for help from Watermark Remover, whose artificial intelligence will get rid of unnecessary elements of any image in a matter of seconds.

It will cope not only with semi-transparent watermarks, but also with invisible marks which only special software can spot.

#service #lifehack
πŸ‘24❀11πŸ”₯5πŸ‘2
How to search on Google from another region

I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.

The site allows you to build your search query so that Google searches by the territorial data you specify.

You can choose from search region and device type to city.

#lifehack #security
πŸ‘37❀6
Forwarded from Lifehack of the day
πŸ™ Stake Properties

Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.

πŸ’° Join now and you will get AED 200 as bonus!πŸ€‘

πŸ€” How it works:

1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.

Stake is regulated by the DFSA.
πŸ‘13❀5πŸ”₯4