Sunday, October 17, 2021

HIDDEN INSTAGRAM TRICKS



 AUTOMATICALLY POST


With the help of Facebook creators studio you can easily schedule your Instagram posts/videos to post on any day at any time.


SEE MESSAGE WITHOUT SEEN


Easily see message sent by anyone to you without that seen. So to do it simply restrict them and they will be in your requests.


DOWNLOAD REELS WITH INSTAGRAM


You don't need any third party app to download Instagram reels simply share any reel to your story, fit it to the screen, download the story and boom.

                         

You're done!


MESSAGE PRIVATE ACCOUNTS


You can easily message any private Instagram profile without following them by simply clicking on top 3 dots on their profile and sending messages.



GET RID OF ANYOING COMMENTS


Annoyed by spam comments? Instead of blocking someone or Turning off comments try restrict option on anyone to ignore them without letting them know.



Saturday, October 16, 2021

BE AWARE

                     BE AWARE💀💭

You must have come across reports about mobile phones and WhatsApp Accounts being compromised or hacked via links in a harmless looking WhatsApp message.

Hence, we are providing below the tips to spot suspicious looking links in a WhatsApp Message and the steps to check if a Link in a WhatsApp Message is Safe to open.

1. Take Security Precautions

In general, it is good security practice not to open any attachment or link in a WhatsApp Message received from anyone that you cannot or do not recognize.

In case of known Contacts, any URL that contains special characters or a shortened URL is to be regarded as suspicious.

While URL shortening services are provided by reputed sources, they can be used by spammers and hackers to redirect users to suspicious or dangerous websites.

Also, it is known fact that banks, government and other legitimate sources do not shorten their URL.

2. Check WhatsApp Link Using Google Transparency Report

Google routinely examines billions of URLs per day looking for unsafe websites and makes this information available to public on its website (Google Transparency Report).

1. Open WhatsApp Message containing suspicious link and copy the link.

2. Go to Google Transparency Report website > paste the link in the search bar and tap on the Search icon.

Check URL Using Google Transparency Report

The link is safe to open if Google comes up with a Green check mark reading “No unsafe Content found” and potentially harmful or dangerous to open, if it comes up with Red check mark.

       Maximum please don't share all such kinds of unwanted links. It may leave you in trouble and it also affects to those whom your sharing with. All these are unnecessary trouble which we put off into our head. So please be aware and make your family and friends aware of it.

Friday, October 15, 2021

Artificial intelligence and machine learning tools

 

Artificial intelligence and machine learning tools:

Artificial intelligence and machine learning once represented the cutting edge of computer science.When these technologies were created in the last 20th century they hardly had any applications and were in fact,mostly academic.However these technologies have gained applications over the years and reached ordinary people’s hands through their mobile phone.


Amazon web services:

According to amazon AWS offers the broadest and deepest set of tools for your business to create impactful machine learning solutions faster.Ultimately ,AWS offers AI stages that customers can use to stay away from overhead connected with the in house generation of AI situations.Amazon Machine Learning and Apache Spark on Amazon Elastic MapReduce are possibilities for utilizing AWS to start AI ventures.


AI-ONE:

The Analyst Toolbox is powered by Nathan ICE ,our proprietary biologically inspired core technology for language.The engine of the Analyst Toolbox is the BrainDocs application which provides the platform for processing document libraries,building agents and analysing results.

Deeplearning4J:

Deeplearning  for java is a leading open source deep learning library written for java and java virtual machine.Its specifically designed to run  on enterprise application such as Apache spark and Hadoop.


Open Neural Network library:

OpenNN is a software library written in the c++ programming language which implements neural networks,a main area of deep learning research.The library is open source licensed under the GNU Lesser General Public License.

APACHE MAHOUT:

Apache Mahout is a distributed linear algebra framework and mathematically expressive scala DSL designed to let mathematicians ,statisticians and data scientists quickly implement their own algorithms.Apache Spark is the recommended out of the box distributed back end or can be extended to other distributed backends.


Thursday, October 14, 2021

UNKNOWN APP (PART-1)

 1. Fotogenic



This is one of the best photo editing app I have ever used. This app has hundreds of features, like you can add digital signature, you can

 put a tattoo on your body that looks cool, hand paint, transform the atmosphere of your picture, dozens of picture frames and so on. Just

 look at the app rating.



2. Cinema HD



Here's another app that allows you to watch movies amd tv shows for free. Cinema APK is an Android app that also works seamlessly on your 

FireStick, FireStick 4K and Fire TV devices. Cinema APK boasts of a huge collection of movies and TV shows. The content is updated so 

regularly that sometimes I find the new content within minutes of release. Download link


https://www.malavida.com/en/soft/cinema/android/download


3. Copy Text On Screen



With this app you can copy any text on the mobile screen to your clipboard. Extract text from any image, just share the image with this 

app to extract words on picture.


You can copy text from any application: Facebook, Twitter, Instagram, Youtube, Tumblr etc. And most importantly this app can translate text 

to over 100+ languages


4. Study Tips




Best collection of Study Tips and Tricks to help you develop a learning strategy.


Study isn't just for the night before an assignment's due or the night before an exam.


It's never too early - or too late to develop good - study habits.


For fast and effective study tips install this app now.


Wednesday, October 13, 2021

TOP 10

                                                 TOP 10💬

 1. Connectify – This is the easiest application to use on Android that helps to turn a 3G or 4G enabled 

phone or Tablet into a Wi-Fi hotspot which is secured with password protection.

2. Wunderlist – This app is the coolest freely downloadable app for your iPhone, iPad, Android, Windows & Mac; that helps in task management such as adding tasks, adding notes and reminders, changing the settings, etc.

3. Google Notebook – It is a free online application from Google that one can make use of storage and organizing all the information that has been collected online. It helps one to make any type of web search even while it is only an extension of Firefox and not an entire program. It is similar to storing your notebook in a Google account.

4. Education Pack – This is a must-have no charge app from Microsoft that helps students and teachers alike with all the study material to type, draw and add graphics while learning.

pendrive-reminder

5. Pen Drive Reminder– As the name suggests, this app helps a person remember to remove the pen drive from the system. One can make use of options such as silent mode, alarm mode, or countdown mode. This is ideal for all those that use a pen drive at maybe a friend’s place or a browsing center and usually forget to take it back.

6. Microsoft OneNote – This program helps in collecting information of audio, video, graphics etc; that can be readily shared on the internet with other similar users. One can organize all kinds of notes with highlighting, coding, and color.

7. Microsoft 2010 Math addin – This program helps to plot 2D and 3D diagrams and math equations in word documents very easily.

anki

8. Anki – This is another great program that helps to remember things such as words, equations, pictures, faces,and a lot more easily on the basis of the flashcard system.

9. Panda USB Vaccine – This is free software that helps to protect one’s system from malware that might attack during a autorun feature enabled in Windows OS.

10. Tor Bundle – This software gives one’s system the highest protection by not allowing anyone on the internet to get to know about your location, websites visited, and all such sensitive information. There is no need to download any software and can be used comfortably on windows, USB flash drives Mac OS X, or Linux as well. It helps one to browse anonymously.


Tuesday, October 12, 2021

How to stay safe online??

 

How to stay safe online???

Social media platforms have become an integral part of online lives. Social networks are a great way to stay connected with others,but you should worry about how much personal information you post.



Use privacy and security settings to protect your information from social media phishing and scams:

Social media accounts offer a few forms of security and privacy settings to help users two-factor aunthenciate their accounts and secure who can see information to tighten social media safety measures

Two factor aunthentication provides a way of double checking that you really are the person you are claiming to be when you’re using online services,such as social media,banking or email. Even if a criminal knows your password they wont be able to access any of your account that are protected using 2FA.



Stay safe on social media with strong passwords and secure accounts:

Strong password will protect online accounts from being hacked which help a great deal in terms of identity theft,social media scams and account takeovers by hackers.

Most people can benefit from using a password manager which will automatically handle this type of security for you,so you don’t have to remember passwords.

It also important to use a different password on each of your accounts to ensure that someone gets into one,they don’t have access to all of them.This will maximize the ability to be safe on social media across any application.

Be selective with friend requests.if you don’t know the person ,don’t accept their request.it could be a fake account.

Click link with caution .Social media accounts are regulary hacked.Look out for language or content that does not sound like something your friend would post.

Be careful about what you share .Don’t  reveal sensitive personal information.Be familiar with the privacy policies of the social media channels you use and customize your privacy settings to control who sees what.

Unique account unique passphrase:

Having separate passphrases for every account to thwart cybercriminals.At a minimum separate your work and personal accounts and make sure that your critical accounts have strongest passphrases.

Keep security software current:

Having the latest security software,web browsers and operating system is the best defense against viruses,malware and other online threats.

Use good netiquette:

Netiquette is a set of guidelines for communicating online.Using good netiquette helps to ensure that the things you say aren’t misinterpreted.

Monday, October 11, 2021

6 THINGS TO KEEP IN MIND WHILE SURFING THE D@RK WEB

 1. DON'T USE YOUR MOBILE PHONE FOR 2-STEP VERIFICATION ON TOR


• Most websites provide a 2-Step verification using a mobile number in which an OTP

• If you provide your mobile number to a website, it will only hamper your anonymity status online as it will be easier to track you

 down with your number.




2. DON'T OPERATE USER ACCOUNTS

OUTSIDE TOR


• If you use TOR browser for checking your Facebook, Twitter or email accounts, don't ever use those accounts outside the TOR browser as

 it will expose your online identity to the website Using your account in the open internet


even once will be enough to get your IP


address logged and eventually reveal


your identity.




3. DON'T POST YOUR PERSONAL

INFORMATION


• You must engrave this point in your heart, do not post any sort of information like name, address, birthday, credit card number while

 using TOR.

• It will uncover your identity and there will no point using the TOR, hope you can understand.




4. DON'T SEND UNENCRYPTED DATA OVER TOR


• TOR encrypts your connection not your data and TOR's exit nodes are vulnerable.

• So, it is highly advisable not send unencrypted data over the TOR network, as someone might access your information while the data is 

on the last node.



5. DON'T FORGET TO DELETE COOKIES AND LOCAL WEBSITE DATA


It is strongly recommended that you delete cookie files and local website data after every browsing session you perform on TOR as these 

things may allow the website to gather information about you and track your location and IP address.




6. DON'T USE TOR FOR GOOGLE SEARCH


• If you really want to be anonymous while using TOR, don't use Google to search your queries.

Though it sounds weird, but this is because Google collects information like your search requests, stores cookie files on your computer 

and tracks your browsing habits to power its advertisement services.




How to know if your phone has virus and how to remove it??

 How to know if your phone has virus and how to remove it?? These 8 signs are an indication that your phone may have a virus: Excessive da...