Forwarded from Lifehack of the day
π£ GodMode - the smol AI Chat Browser
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
GodMode is a dedicated chat browser that only does one thing: help you quickly access the full webapps of ChatGPT, Claude 2, Perplexity, Bing and more with a single keyboard shortcut (Cmd+Shift+G).
As a result, content is generated much faster, and there can be several times more options for creating it along the way. At the same time, you donβt need to depend on the patterns of one specific neuronal networks
https://github.com/smol-ai/GodMode
#github #ai
π28β€3
Forwarded from Lifehack of the day
How To Hide Personal Photos and Videos
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
π41π₯5π5
Forwarded from Lifehack of the day
Musicat
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
π19β€5π₯4
Forwarded from Lifehack of the day
How to store text messages safely?
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
π24β€13
Forwarded from Lifehack of the day
How to copy text from a photo or a document
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
π35β€10
Forwarded from Lifehack of the day
Encrypt your data
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
π22π₯7
Forwarded from Lifehack of the day
Tips for working with Microsoft
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
π33β€7π₯6
Forwarded from Lifehack of the day
Π‘heck if your data is leaking through a VPN
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
π30β€6
Signs Your Social Media Accounts Have Been Hacked
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
π17π₯15β€4
Send Messages, Not Metadata
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
π27β€5
How to Beat Social Media Algorithms
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
π37π10β€3
Forwarded from Lifehack of the day
How to remove watermarks from an image
We all love to share pictures from the Internet, especially if we find something we've been looking for a long time. But unfortunately, many of them are drowned in annoying watermarks, spoiling the whole atmosphere, and sometimes overlapping half of the image.
To avoid wasting time looking for a replacement or working in a photo editor, you can ask for help from Watermark Remover, whose artificial intelligence will get rid of unnecessary elements of any image in a matter of seconds.
It will cope not only with semi-transparent watermarks, but also with invisible marks which only special software can spot.
#service #lifehack
We all love to share pictures from the Internet, especially if we find something we've been looking for a long time. But unfortunately, many of them are drowned in annoying watermarks, spoiling the whole atmosphere, and sometimes overlapping half of the image.
To avoid wasting time looking for a replacement or working in a photo editor, you can ask for help from Watermark Remover, whose artificial intelligence will get rid of unnecessary elements of any image in a matter of seconds.
It will cope not only with semi-transparent watermarks, but also with invisible marks which only special software can spot.
#service #lifehack
π24β€11π₯5π2
How to search on Google from another region
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
π37β€6
Forwarded from Lifehack of the day
π Stake Properties
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 200 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
Digitally invest in prime rental properties in Dubai from only AED 500 (USD 136), no matter where you are in the world!
Stake is available to savvy investors all over the world.
π° Join now and you will get AED 200 as bonus!π€
π€ How it works:
1. Browse: Sign up in less than 3 minutes and browse collection of properties.
2. Purchase: Buy a piece of the ones you love, starting from only AED 500.
3. Own: Sit back and track your income and investments online.
4. Exit: Hold, exit or resell your stake in a way that suits your financial goals.
Stake is regulated by the DFSA.
π13β€5π₯4
How to Copy More Than One Thing to Your Clipboard at a Time
If you ever need to copy multiple things from one place to another or have a habit of misplacing the link you copied but forgot to paste, you need a clipboard manager.
Windows 10 and 11 come with their own basic clipboard history too. Enable the feature from Settings > System > Clipboard > Clipboard History. Then, use the Windows + V keyboard shortcut to bring up a floating panel where youβll see a list of text that you have recently copied to the clipboard. You can click on an entry to paste it into the text, and the Pin button to pin that entry to the top.
The Windows clipboard history tool is nice to have. But itβs no clipboard manager π.
Ditto is a lightweight, free, and open-source clipboard manager.
1Clipboard is another great option for a free, universal app built on open source tech. It works on both Windows and Mac.
#lifehack #pc
If you ever need to copy multiple things from one place to another or have a habit of misplacing the link you copied but forgot to paste, you need a clipboard manager.
Windows 10 and 11 come with their own basic clipboard history too. Enable the feature from Settings > System > Clipboard > Clipboard History. Then, use the Windows + V keyboard shortcut to bring up a floating panel where youβll see a list of text that you have recently copied to the clipboard. You can click on an entry to paste it into the text, and the Pin button to pin that entry to the top.
The Windows clipboard history tool is nice to have. But itβs no clipboard manager π.
Ditto is a lightweight, free, and open-source clipboard manager.
1Clipboard is another great option for a free, universal app built on open source tech. It works on both Windows and Mac.
#lifehack #pc
π21β€6π₯6
How to Turn Off/On All Sensors on Android Phone With a Tap
While Android offers quick toggles to disable location tracking and cellular connectivity, thereβs no direct option to switch off the rest of your phoneβs sensors. For example, gyroscope can use to intercept sensitive information like passwords, account names from your π±. Luckily, Android has a hidden setting that lets you shut off all your phoneβs sensors in a single tap.
β Go to Settings > About phone > and tap build number 7 times to enable Developer Options.
β In Settings, go to System > Advanced > and tap on Developer Options.
β Scroll down and tap on Quick settings developer tiles.
β Now, tap on Sensors off toggle to add the tile on the Quick Settings panel.
β Now, to on and off sensors, pull down the Quick Settings panel, and tap on the Sensors off tile.
#security #android
While Android offers quick toggles to disable location tracking and cellular connectivity, thereβs no direct option to switch off the rest of your phoneβs sensors. For example, gyroscope can use to intercept sensitive information like passwords, account names from your π±. Luckily, Android has a hidden setting that lets you shut off all your phoneβs sensors in a single tap.
β Go to Settings > About phone > and tap build number 7 times to enable Developer Options.
β In Settings, go to System > Advanced > and tap on Developer Options.
β Scroll down and tap on Quick settings developer tiles.
β Now, tap on Sensors off toggle to add the tile on the Quick Settings panel.
β Now, to on and off sensors, pull down the Quick Settings panel, and tap on the Sensors off tile.
#security #android
π42π₯7
Forwarded from Lifehack of the day
Upscayl
Free and Open Source AI Image Upscaler
Upscayl lets you enlarge and enhance low-resolution images using advanced AI algorithms. Enlarge images without losing quality. It's almost like magic! π©πͺ
Upscayl is a cross-platform application built with the Linux-first philosophy. This means that Linux users receive pre-release builds earlier, but Upscayl itself is available on all major desktop operating systems.
https://upscayl.org/
#lifehack #AI
Free and Open Source AI Image Upscaler
Upscayl lets you enlarge and enhance low-resolution images using advanced AI algorithms. Enlarge images without losing quality. It's almost like magic! π©πͺ
Upscayl is a cross-platform application built with the Linux-first philosophy. This means that Linux users receive pre-release builds earlier, but Upscayl itself is available on all major desktop operating systems.
https://upscayl.org/
#lifehack #AI
π32π₯7β€2
Forwarded from Lifehack of the day
Open Video Downloader (youtube-dl-gui)
A cross-platform GUI for youtube-dl made in Electron and node.js
Features:
βοΈDownload from all kind of platforms: YouTube, vimeo, twitter & many more;
βοΈDownload multiple videos/playlists/channels in one go;
βοΈSelect the resolution and format you want to download in;
βοΈDownload private videos (currently only tested on YouTube);
βοΈMultithreaded, up to 32 videos can be downloaded synchronously;
βοΈShows how much size the download will use up on your system;
βοΈThe app automatically keeps ytdl up-to-date
https://jely2002.github.io/youtube-dl-gui/
#app #youtube #video #github
A cross-platform GUI for youtube-dl made in Electron and node.js
Features:
βοΈDownload from all kind of platforms: YouTube, vimeo, twitter & many more;
βοΈDownload multiple videos/playlists/channels in one go;
βοΈSelect the resolution and format you want to download in;
βοΈDownload private videos (currently only tested on YouTube);
βοΈMultithreaded, up to 32 videos can be downloaded synchronously;
βοΈShows how much size the download will use up on your system;
βοΈThe app automatically keeps ytdl up-to-date
https://jely2002.github.io/youtube-dl-gui/
#app #youtube #video #github
π21β€10
Forwarded from Lifehack of the day
YT Channel Downloader
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
YT Channel Downloader is an intuitive desktop application built to simplify the process of downloading YouTube media content.
Features:
βοΈFetch Video Listings: Just input a YouTube video, playlist or channel URL and get a list of the videos;
βοΈSelective Download: Choose exactly which videos you want to download, or select all at once;
βοΈQuality Control: Specify video/audio quality or opt to download only the audio;
βοΈDownload Marking: Keeps track of downloaded files for easier management;
https://github.com/hyperfield/yt-channel-downloader
#app #youtube #video #github
π33β€5π₯2
Forwarded from Lifehack of the day
Extract favorite scenes from YouTube videos
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
π31β€6π₯2
Forwarded from Lifehack of the day
Wristkey
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
β€16π13π4