Forwarded from Lifehack of the day
Extract favorite scenes from YouTube videos
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
YTCutter is a single tool with multiple purposes. Perhaps you don't want to download a full YouTube video; you might only need a small clip. With it, you can select the portion that you need and just download that.
Copy and paste a YouTube URL and it will immediately start playing. Use the Start field for when you want the clip to begin and the End field for your big finish.
The trimmed clip can be downloaded as a video file (MP4), a GIF file, or as an audio file (MP3).
#service #youtube
π13π₯13
Forwarded from Lifehack of the day
Peergos
Peergos is building the next web - the private web, where end users are in control.
The foundation of Peergos is a peer-to-peer encrypted global filesystem with fine-grained access control designed to be resistant to surveillance of data content or friendship graphs. It has a secure messenger, an encrypted email client and bridge, and a totally private and secure social network, where users are in control of who sees what (executed cryptographically).
https://github.com/Peergos/Peergos
Website: https://peergos.org/
#privacy #github
Peergos is building the next web - the private web, where end users are in control.
The foundation of Peergos is a peer-to-peer encrypted global filesystem with fine-grained access control designed to be resistant to surveillance of data content or friendship graphs. It has a secure messenger, an encrypted email client and bridge, and a totally private and secure social network, where users are in control of who sees what (executed cryptographically).
https://github.com/Peergos/Peergos
Website: https://peergos.org/
#privacy #github
π17π₯2
Forwarded from Lifehack of the day
Wristkey
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
Wristkey is an open-source 2FA client for Wear OS (but it works on any Android-based smartwatch!).
Features:
β Can be used without pairing your watch to a phone.
β Imports (and exports) from Aegis Authenticator, andOTP and Bitwarden using ADB, WiFi or file imports.
β Screen locking via PIN, pattern and password.
β Local storage encrypted using 256-bit AES-GCM.
β WiFi transfers encrypted using XSalsa20-Poly1305 and X25519.
β Time and counter mode OTPs, up to SHA512 and 4-8 digits.
β Supports round and square devices.
https://github.com/0x4f53/Wristkey
#app #android
π15β€2π2
Forwarded from Lifehack of the day
How to Protect Yourself from Online Shopping Security Threats
Here are easy actions which will reduce your risks during online shopping.
βοΈ Update Your Browser and OS. These updates protect devices from vulnerabilities and online attacks.
βοΈ Use Powerful Antivirus/Anti-Malware Software. Built with an advanced algorithm, the software detects malicious activities. It even prevents you from unknowingly logging into a malicious website.
βοΈ Avoid Using Debit Cards. Using a credit π³ to shop online is much safer than using a debit π³. That's because a credit card has more consumer protection.
βοΈ Implement Script Blockers (an extension that provides an extra layer of security for browsers). It blocks unnecessary and harmful scripts like JavaScript and iframes on retail stores you visit. You can use this free script blocker.
βοΈ Use secured Websites. Avoid websites that don't have HTTPS in their URL or a padlock icon π beside the URL. π means your personal information is encrypted.
βοΈ Use a VPN.
#security
Here are easy actions which will reduce your risks during online shopping.
βοΈ Update Your Browser and OS. These updates protect devices from vulnerabilities and online attacks.
βοΈ Use Powerful Antivirus/Anti-Malware Software. Built with an advanced algorithm, the software detects malicious activities. It even prevents you from unknowingly logging into a malicious website.
βοΈ Avoid Using Debit Cards. Using a credit π³ to shop online is much safer than using a debit π³. That's because a credit card has more consumer protection.
βοΈ Implement Script Blockers (an extension that provides an extra layer of security for browsers). It blocks unnecessary and harmful scripts like JavaScript and iframes on retail stores you visit. You can use this free script blocker.
βοΈ Use secured Websites. Avoid websites that don't have HTTPS in their URL or a padlock icon π beside the URL. π means your personal information is encrypted.
βοΈ Use a VPN.
#security
π16β€8
Find out who's watching you through camera
Both huge companies and ordinary hackers can try to get access to your camera for their own purposes. In both cases, you probably won't even know it's there.
One of the few ways to know if your camera is being tracked is with the help of Procesed Explorer utility. The software was created by Microsoft Corporation, so it's effective.
β Press Win + R to open "Device Manager", run
β In the list select "Physical Device Object Name" -
β Copy this name, download it and run it as administrator.
β Type the name of the webcam in the search box and click on "Search" with the binoculars icon.
That's it: you'll see the processes and applications that use the camera. See the details or complete them, if you want.
#security #pc
Both huge companies and ordinary hackers can try to get access to your camera for their own purposes. In both cases, you probably won't even know it's there.
One of the few ways to know if your camera is being tracked is with the help of Procesed Explorer utility. The software was created by Microsoft Corporation, so it's effective.
β Press Win + R to open "Device Manager", run
devmgmt.msc and tap "Details". β In the list select "Physical Device Object Name" -
\Device\0000009c. β Copy this name, download it and run it as administrator.
β Type the name of the webcam in the search box and click on "Search" with the binoculars icon.
That's it: you'll see the processes and applications that use the camera. See the details or complete them, if you want.
#security #pc
π21β€5
Forwarded from Lifehack of the day
How To Hide Personal Photos and Videos
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
For Android:
To natively hide your photos on an Android device, open up your File Manager. Add a new folder, but start the name with a period. Example: .Secrets.
When you move your photos and videos into this folder, they won't appear in your gallery or albums. βοΈYou can only access them through your file manager. π
For iPhone:
Just select the photo you want to conceal, and tap "Hide" at the bottom of the screen. This will move the image to your Hidden" folder, and it'll stay out of any Moments, Collections, or Albums.
These device-native hiding techniques aren't password protected or encrypted, though, so using them is more risky. If someone knows your phone passcode, they can still access it.
Also there are apps for this task (password protected or encrypted). Would it be interesting for you to know about them?
#security
π29β€4
Forwarded from Lifehack of the day
Musicat
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
A sleek desktop music player and tagger for offline music πͺ With experimental features like map view, GPT analysis, artist toolkit.
Features:
π΅ supports MP3, FLAC, WAV, AAC, OGG
π linked library, using original files on disk
π auto-watch and re-scan folders
π· with metadata tagging support (read and write ID3v2, Vorbis)
πΌ download album art, origin country from Wikipedia
π€ fetch lyrics for current song
πΊ World Map view - see your library on a map
πΏ a neat mini-player
πΈ U2's latest album automatically added to your library
π Stats, album timeline
π€ Dive deeper with ChatGPT or local Ollama model for additional insights.
https://github.com/basharovV/musicat
#app #github #music #mac
π13β€5π2π₯1
Forwarded from Lifehack of the day
Find and track the IP address of any person
Grabify IP Logger can give you advanced and detailed statistical data and metadata for all clicks on your links. Your IP Logger link can access information about userβs IP address, location tracker (country, city) and so on.
The service works with just 3 simple steps:
βοΈ Shorten long link.
βοΈ Share the short link with another user.
βοΈ Grab IP address after the user clicks on your short link.
Be attantive: you can also be a target of such actions βοΈBe careful opening links!
#service #security
Grabify IP Logger can give you advanced and detailed statistical data and metadata for all clicks on your links. Your IP Logger link can access information about userβs IP address, location tracker (country, city) and so on.
The service works with just 3 simple steps:
βοΈ Shorten long link.
βοΈ Share the short link with another user.
βοΈ Grab IP address after the user clicks on your short link.
Be attantive: you can also be a target of such actions βοΈBe careful opening links!
#service #security
π₯15π8π1
Forwarded from Lifehack of the day
How to store text messages safely?
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
We store most of our valuable information in text form, and if fraudsters gain access, the situation will be very unpleasant.
Paranoia Text Encryption protects your notes, cryptocurrency keys, emails, social media posts and any other text from spies, hackers and prying eyes.
The app provides real security because data is encrypted using strong encryption algorithms: Blowfish 448bit, AES 256bit, RC6 256bit, Serpent 256bit, Twofish 256bit, GOST 256bit +.
Simply copy and paste to and from your favorite apps or save to a file for later use. Available on Android, iOS, Windows, Linux.
#security #lifehack #android #windows #linux
π17β€2
Forwarded from Lifehack of the day
How to copy text from a photo or a document
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
Sometimes you need some text from an image, don't you? Brandfolder is a text extractor that allow you to extract text from any image.
You may upload an image or document (.pdf) and the tool will pull text from the image. Once extracted, you can copy to your clipboard with one click.
#service
π26β€1
Forwarded from Lifehack of the day
Encrypt your data
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
You need to securely protect your data. One of the best tools for it is VeraCrypt. It's simple, easy to install, you just have to come up with a strong password and not store it digitally.
My laptop hard drive has been encrypted for years: I enter a password every time that can neither be recovered nor reset.
VeraCrypt is used by hackers, investigators, journalists and anyone else who deals with important data. So far, not a single intelligence agency in the world has managed to decipher VeraCrypt algorithms.
#security #windows #linux #mac
π6π5
Forwarded from Lifehack of the day
Save your data from a stolen smartphone
You should be warned in advance that you may have your π± stolen and tried to unlock it - it's not uncommon. To save important data from falling into the wrong hands, there is this app and smarthack π:
βοΈ If you have an iPhone, open the settings and in the section "Face ID and password code" turn on the option "Erase data". After the tenth attempt to enter the wrong password, the π± will delete all data.
βοΈ Wasted is an app (for Android) which completely locks π and wipes the device in an emergency situation. For example, if it has not been turned on for several days: this number of days can be adjusted.
#security #privacy
You should be warned in advance that you may have your π± stolen and tried to unlock it - it's not uncommon. To save important data from falling into the wrong hands, there is this app and smarthack π:
βοΈ If you have an iPhone, open the settings and in the section "Face ID and password code" turn on the option "Erase data". After the tenth attempt to enter the wrong password, the π± will delete all data.
βοΈ Wasted is an app (for Android) which completely locks π and wipes the device in an emergency situation. For example, if it has not been turned on for several days: this number of days can be adjusted.
#security #privacy
π15β€4π4
Forwarded from Lifehack of the day
Tips for working with Microsoft
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
Word
β To quickly insert the current date, press SHIFT + ALT + D, and to insert the time, SHIFT + ALT + T.
β If you accidentally typed a text with the CAPS LOCK key enabled, then select the text in uppercase and press SHIFT + F3.
β To speed up the cursor movement through the text, hold down CTRL and use the arrows.
β By holding CTRL, you can select all the parts of the text you are interested in, even if they are not arranged in a row.
β The F4 key repeats the last command used.
β Place the cursor at the beginning of the text selection and click at the end of the desired text segment with the SHIFT key held down for quick selection.
β Press CTRL + ENTER to quickly create a new sheet.
#lifehack #windows
π27π₯7β€1
Forwarded from Lifehack of the day
Π‘heck if your data is leaking through a VPN
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
Do I Leak is a tool to check for data leaks through VPNs. It is designed to detect most leaks that could reveal your real identity.
To test, go to the link, select "VPN Leak Test" and click on "Begin test". Then follow the simple instruction and the service will check everything for you. Use only verified VPN services.
#security #privacy
π25β€2
Forwarded from Lifehack of the day
How to be sure an account in Telegram is deleted
In Telegram you can easily make an account look exactly like a deleted account.
Such accounts have a deleted photo, username is removed, name is as "Deleted Account" and privacy options are restricted (last online time, forwarding messages, showing phone number, etc.).
There are a couple of points that can help you recognize a fake π
β A really deleted account shows "last seen a long time ago" instead of the last activity time.
β There is no message entry field.
β When you change the interface language, the account name changes.
#lifehack
In Telegram you can easily make an account look exactly like a deleted account.
Such accounts have a deleted photo, username is removed, name is as "Deleted Account" and privacy options are restricted (last online time, forwarding messages, showing phone number, etc.).
There are a couple of points that can help you recognize a fake π
β A really deleted account shows "last seen a long time ago" instead of the last activity time.
β There is no message entry field.
β When you change the interface language, the account name changes.
#lifehack
π16π₯8
Forwarded from Lifehack of the day
Share files conveniently!
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
Send Anywhere is a file sharing application that takes an easy, quick, and unlimited approach to file sharing. It is for anyone wanting to share quality content quickly, from any device to anyone in the world π.
The service uses p2p networking, making the transfer process safer and faster. In addition, the service requires no login or registration - all that's required is a one-time 6-digit code that syncs the sending and receiving devices.
Sending:
1. Select a file and click Send.
2. The service will generate a 6-digit one-time key that you will share with the person you want to send the file to.
Obtaining: enter the 6-digit one-time key on the receiving device.
#service
π19π₯1
Forwarded from Lifehack of the day
Signs Your Social Media Accounts Have Been Hacked
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
Hackers can stealthily take control of your social media accounts without your knowledge. So, look out for these π signs.
β Your password has been changed.
β Random posts from your profile.
β Your contacts reporting unusual messages. Check if there have been unusual sharing of links that you did not share or messages that you did not send across your network.
β Logins from remote locations.
β Unusual increase in number of friends or followers. Hackers often spread malicious links and content by adding other people to your network or using your authority to accomplish what they need.
β Receiving emails notifying about unauthorized access.
β Signed up for subscriptions and unusual purchases.
β Suspicious activity in your ad manager (campaigns running for promoting pages or selling products, with random credit cards added as payment methods).
Protect your social media accounts!
#security
π9π7β€2π₯1
Forwarded from Lifehack of the day
Send Messages, Not Metadata
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
Your correspondence can be read in almost all messengers. The exception is Telegram, but it is not completely anonymous - it requires you to enter your phone number to register. If it comes up, you will be easily identified.
Session is an end-to-end encrypted messenger that minimises sensitive metadata, designed and built for people who want absolute privacy and freedom from any form of surveillance. It does not ask for an email or π± number when you register, but assigns you an ID - a set of hundreds of characters. It looks like a long nickname that you can share with your interlocutor to start a chat.
The app looks like a normal messenger - you can send documents, voice messages, there are groups, but it's completely anonymous. The company has no servers, the routing goes through users - it means that leaks of personal data are simply impossible.
Available on iPhone, Android and PC.
Use it!
#security
π₯16π12β€2
Forwarded from Lifehack of the day
How to Beat Social Media Algorithms
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
Social media platforms charge you nothing to use them, except info about you. Their algorithms decide what content to show you.βοΈDonβt make their data harvesting easier βskirt the algorithms whenever you can.
β Donβt confirm the algorithmβs assumptions. Avoid interacting with suggested content if possible. If you find something interesting in suggestions, search for it manually and watch it from there.
β Eliminate suggested feeds when possible. Change your feeds to sort chronologically β‘οΈ donβt train the platformβs algorithm. Not for all social medias! Facebook and Twitter let you sort by recent posts. Instagram might not have a chronological feed at the moment, but itβs coming. TikTok - watch content from the βFollowingβ (would show you videos only from accounts you follow).
β Use platforms without your account when possible (YouTube, Reddit).
β Use a burner account, with none of your real info.
#security
π19β€6π5π₯3
Forwarded from Lifehack of the day
How to search on Google from another region
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
I Search From helps you simulate using a Google search from another location or device, or search with custom search settings.
The site allows you to build your search query so that Google searches by the territorial data you specify.
You can choose from search region and device type to city.
#lifehack #security
π15β€5π₯3
Forwarded from Lifehack of the day
How to Copy More Than One Thing to Your Clipboard at a Time
If you ever need to copy multiple things from one place to another or have a habit of misplacing the link you copied but forgot to paste, you need a clipboard manager.
Windows 10 and 11 come with their own basic clipboard history too. Enable the feature from Settings > System > Clipboard > Clipboard History. Then, use the Windows + V keyboard shortcut to bring up a floating panel where youβll see a list of text that you have recently copied to the clipboard. You can click on an entry to paste it into the text, and the Pin button to pin that entry to the top.
The Windows clipboard history tool is nice to have. But itβs no clipboard manager π.
Ditto is a lightweight, free, and open-source clipboard manager.
1Clipboard is another great option for a free, universal app built on open source tech. It works on both Windows and Mac.
#lifehack #pc
If you ever need to copy multiple things from one place to another or have a habit of misplacing the link you copied but forgot to paste, you need a clipboard manager.
Windows 10 and 11 come with their own basic clipboard history too. Enable the feature from Settings > System > Clipboard > Clipboard History. Then, use the Windows + V keyboard shortcut to bring up a floating panel where youβll see a list of text that you have recently copied to the clipboard. You can click on an entry to paste it into the text, and the Pin button to pin that entry to the top.
The Windows clipboard history tool is nice to have. But itβs no clipboard manager π.
Ditto is a lightweight, free, and open-source clipboard manager.
1Clipboard is another great option for a free, universal app built on open source tech. It works on both Windows and Mac.
#lifehack #pc
π19β€14π₯2π1