Skip to main content

Posts

Showing posts from July, 2021

How to be more Confident?

Here are 11-Tips for being  Confident... 1. Don't listen to self-limiting beliefs Whether they were instilled in us by parents or other adult figures in our lives, our limiting beliefs might have convinced us to focus on what we can’t do or what might never be possible. Remember, though, that at one time we were enthusiastic children who believed we could be or do anything! Wherever possible, it's important to quiet those negative thoughts that are providing reasons why you can't do something. Instead, take on an uncomfortable situation or try something new and see what happens. Should you succeed at it, you can permanently shut down many self-limiting beliefs. 2. Don't always rely on your memory for accurate information Our memory does serve us well in certain situations. However, it can also be our own worst enemy. That's because it comes with confirmation bias already built-in. Our brain’s memory does not store information in the same way it was originally presen

What is Pegasus?

The Pegasus spyware, developed by Israeli software company NSO Group, has targeted globally more than 50,000 phone numbers, including 300 in India, for surveillance  Notes What is it? How does it work? What can it do? A brief history of Pegasus The Pegasus Project, an investigation by an international media consortium, has revealed that more than 50,000 phone numbers were targeted by spyware created by NSO Group, an Israeli software company. On the list were 300 verified phone numbers in India, including those of ministers, opposition leaders, a sitting judge, more than 40 journalists, and several activists and business persons. But what is Pegasus, who is it for, how does it infect devices, and what can it do? What is it? Spyware is any malicious software designed to enter your computer device, gather your data, and forward it to a third party without your consent. Pegasus, developed by NSO Group, is perhaps the most powerful spyware ever created. It is designed to infiltrate smartpho

Top NEWS of the Week 19th July to 25 July.

Top NEWS of the Week 19th July to 25 July  1. Snapchat reaches 293 mn daily users: Snapchat has announced that it now has 293 million daily active users in the second quarter this year, an increase of 55 million year-over-year. Snap, the parent company of Snapchat, said that its revenue increased 116 percent to $982 million in Q2 2021 compared to the prior year. The company said... 2. LG adds mic, speakers, to face mask for smooth conversations: Tired of wearing a face mask that hinders your conversation, fogs up eyeglasses, and restricts airflow? LG Electronics has unveiled a high-tech, air-purifying face mask with a built-in mic and speaker that gently amplifies your voice while keeping proper airflow. Named LG PuriCare Wearable Air Purifier, the face mask delivers... 3. Microsoft in talks with Telangana for setting up $2 Bn data center: Global tech giant Microsoft Is in discussions with the Telangana government on a proposal for setting up one of its largest data centers with an inv

15+1 Ways to Hack-Proof your Smartphone

If you’re wondering “how to block hackers from my phone,” or what you’ve come to the right place. In this article, we’ll cover seven easy-to-follow tips that will help you to protect your phone from hackers. Key Notes Keep up to date – and don’t open up holes yourself. Be careful of what you install. Review what’s already on your phone. Make it hard for intruders to get in. Be prepared to track and lock your phone. Don’t leave online services unlocked. Adopt an alter ego. Beware of open wifi. Lock individual apps. Get a warning when your phone goes walkies. Keep an eye on things behind the scenes. Keep Your Tracking and Remote Locking Settings On. Install Security Software Tools on Your Mobile Device. Be Judicious About What You Download and Install on Your Phone. Protect Yourself from SIM Swapping. Additional Tips on How to Protect Your Phone from Hackers. 1. Keep up to date – and don’t open up holes yourself: When it comes to protecting yourself against hackers, step one is always to

20 Magical life Lessons we Learned from 'Harry Potter'

Yes, it's hard to believe the big-screen adventure started so long ago, but it's true. On Nov. 16, 2001, "Harry Potter and the Sorcerer's Stone" first brought the beloved storybook characters off the page. We've learned a lot from Harry and the gang since those early days. From the first film to the last, Daniel Radcliffe, Emma Watson, and Rupert Grint made the Wizarding World magical. Warner Bros. 1. Choose your friends wisely: An unlikely trio, to begin with, Harry, Ron, and Hermione proved time and time again that real friendship forges an unbreakable bond. Together they managed to face Dementors and Death Eaters, Dolores Umbridge and Horcruxes. Not to mention the truly horrifying pitfalls of teenage life: relationship problems, jealousy, and school exams. With true friends, it doesn’t matter if you argue over a possibly jinxed new broomstick or accidentally swallow a love potion because, at the end of the day, they’ll always have your back. 2. A good teach

Here’s how to check if your phone is Hacked or Not

1. Too Much Fast Battery Draining. If your phone battery is draining too faster or suddenly then there might be chances that your device got hacked or been used remotely. because if tasks are running in the background then the battery starts Draining. 2. Unusual Photos & Videos In Gallery. if notice photos or videos in your Gallery which you didn't take or recorded then this is the clear single that you got hacked. when any spyware gets installed on your device then the owner of the spyware can access your camera to take photos & videos through your Smartphone. 3. Phone Acts/ Works Very Slow. If your phone is working fine & suddenly gets slow or Hang, then it might have the chance of getting hacked. 4. Too Much Data/ Internet Usage. if you notice that your Device is consuming much more data than you actually use. it happens because your device might be sending the data or receiving the data. in this case, your device consumes more Data. 5. Unusual Entries in Call Logs &