29 December, 2023

Free Online OCR

Free Online OCR service is a service of an online optical recognition program (converter), we support more than 46+ languages. OCR is an optical recognition of text on images

Convert Image or PDF to Text
Using the service, you can extract text from a PDF document or image: JPG, BMP, TIFF, GIF for further editing or use.

Online OCR - Free convert Image to Text or PDF

27 December, 2023

Online OCR

Picture to text converter allows you to extract text from image or convert PDF to Word, Excel or Text formats
using Optical Character Recognition software online

Image to text converter – what is this?

Online OCR tool is the Image to text converter based on Optical character recognition technology. Use our service to extract text and characters from scanned PDF documents (including multipage files), photos and digital camera captured images.

If you need to extract text from a photo, use our image to text converter. If you have a scanned book in PDF format and want to create a searchable PDF, our service is the best solution to convert PDF to Word or Excel!

You don't need to waste time rewriting a scanned lecture - just upload the file and convert image to text.

Using advanced image pre-processing algorithms and OCR technology, our service scans text from your images and extracts it to any editable format.

25 December, 2023

Udgam: Thousands of crores of unclaimed deposits in banks.. How to check our money?

Udgam: The Center has said that there are crores of unclaimed deposits in banks. 
And do you know if it includes your or your relatives' money? Let's see how to check!

Union Minister of State for Finance Bhagwat Karad recently revealed in the Rajya Sabha that unclaimed deposits have increased by 28 percent on an annual basis to Rs 42,270 crore in the financial year ending March 2023. He said that there are deposits of Rs.36,185 crore in public sector banks and Rs.6,087 crore in private sector banks. However, RBI has launched a centralized web portal called Udgam specifically to know the details of such deposits. With some basic details one can find out if there are unclaimed deposits in their name.
Banks classify unclaimed deposits for ten or more years under unclaimed deposits. Banks transfer them to the 'Depositor Education and Awareness (DEA)' fund of the Reserve Bank of India. However.. they can be retrieved by contacting the banks with the relevant credentials. 29 banks are registered in Udgam portal. You can see if there are any unclaimed deposits in your or your relatives' accounts. Nominees or heirs can know the details of unclaimed deposits in case of death of the account holders. If they find that they have it, they can contact the bank with the relevant documents and claim it.

Check this..

Register by mobile number.

Complete the OTP verification and login to the account.

Select your bank along with the name of the account holder. You can also select the option 'All Banks' if you want.

Then in the following line one of the details like Aadhaar, PAN, date of birth of the account holder should be entered. There is an option to give the address as well.

After entering all the details click on search and the information will be in front of you.

However, it is mentioned on the site that the details of some banks may not be available immediately. 
The site suggests trying for them later.

21 December, 2023

Digital Break | Has smartphone become an addiction.. check this!

Alcohol destroys the liver and smoking destroys the lungs. 
But smartphone addiction. 
It sacrifices life as a whole. 
The bond is aimed at the bonds. 
It will hurt the career. 
It creates a virtual chasm between us and the world. 
So beat that addiction. 
Make life win. 
The same is the warning of the latest statistics.

We spend six hours and twenty-six minutes a day on the Internet. More than ninety-six percent of the more than ten billion net users watch online videos. Eighty-two percent are addicted to online streaming. Fifty two percent people listen to FM radio. Fifty percent fell in love with the podcast. Eighty-six percent of people use smartphones for all these activities. Got it yet? How smartphone is taking over our lives. Spending at least a third of those six-hour days with the family will strengthen bonds. If you give something to your friends, your relationships will blossom. Reading any book will give you new ideas. Many psychologists have already warned to get rid of smartphone traces. Studies have emphasized that. Not only our time.. It is sad that life is being marketed. Photos and personal details on social media are becoming a boon for hackers. We can avoid this threat only when we think smarter than the smartphone. Can live comfortably.

Self check..
A smartphone should not bother you, it should not be a hindrance to your work. Not to impair your concentration, not to spoil your sleep, not to swallow your morning time. We must listen to it as it is told, but we must not play as it is played. Through a small self-check, you can check how addicted you are to your smartphone. These are the characteristics..

☞ Getting stressed and extremely anxious even if the cell phone is not seen for ten minutes.
☞ Checking the phone every five minutes.
☞ Frequent posting, commenting, resharing, liking. Others want to respond just as quickly.
☞ Waking up till midnight and waking up early in the morning just for social media.
☞ Losing concentration on the work and focusing on the smartphone.
☞ Responding to every incoming notification and checking it immediately.

Crimes.. Atrocities
The more time you spend with your smartphone, the more likely you are to be exposed to cybercriminals. Your personal details and photos will go into their hands. Fear of loss of reputation if known to all four, fear of becoming a scumbag in the society, negligence of huge sums, ignorance of not knowing where to complain.. all together give new strength to cyber criminals. If smartphone pastime is controlled, cyber crime can be controlled too. The photos you receive may be deep fake. The emails you receive may be part of a conspiracy. Respond carefully. Do not forget to complain to the concerned department in case of any doubt.

These are precautions
It started as a habit and turned into an addiction.. It has become a severe addiction.. Our life is no longer in our hands. Our thoughts are not within us. Digital addiction is more intoxicating than alcohol and addictive like a drug. So, it should be prevented in the first place.

☞ Remove unnecessary alerts and notifications. Due to this, there is no sleep disturbance at home. There is no difficulty in working in the office.
☞ Make the bedroom a smartphone free zone. This provision is applicable to both Alumagas.
☞ It is not possible to charge electronic items in the bedroom.
☞ Instead of smartphone.. use desktop for social media. As it is difficult to sit still for long periods of time, they log out quickly.
☞ Keep only important tools on the smartphone home screen.
☞ Ban cell phone intrusion during meal time, meeting with relatives.
☞ Apps like Screen Time will tell you how much time you spend on your smartphone. It acts as a warning. Download from play store.
☞ Control the time allotted for the smartphone.. and divert it to green time. Switch from online games to field sports.
☞ If you keep the smartphone in gray scale mode.. you can't stare for a long time.
☞ On special occasions such as wedding day, birthday, etc., do not limit yourself to social media posts and say good wishes together in person. Make bonds stronger.
☞ Spending time with social media updates and WhatsApp chats in the office is a career risk.

19 December, 2023

LPG e-KYC: e-KYC for Gas Cylinder Subsidy.. can be done from your home.. simple process!

LPG E-KYC: Those who want to get gas cylinder subsidy must complete e-KYC. 
Users should remember that e-KYC is mandatory. 
Those who give their details risk getting the subsidy stopped. 
There are many reports that December 31, 2023 is the date for completion of e-KYC. 
In this order, the newly formed Congress government in Telangana has promised to give a gas cylinder for Rs.500. Planning to implement soon. 
In this order, the news is doing rounds on social media that only those who have completed e-KYC will be given a cylinder for Rs.500 and those who have not will have to pay the full amount. 
As a result, they are all hanging in front of service centers and offices of gas agencies. 
They are facing difficulties due to this. However, cooking gas e-KYC can be done from home. 

Now let's find out how to get nowhere.

How to complete Gas e-KYC online?
First go to LPG Gas official website
There you will see the option Bharat Gas/HPgas/Indane Cylinder on the right side. 
Click on the option you want.

If already registered then sign in with phone number. Otherwise select New User option.
After login, your gas connection details will appear on the screen.
Select the Aadhaar Authentication option that appears on the left side.
After entering your Aadhaar number click on Get OTP.
Enter the OTP received on your registered mobile number and click on authentication option. After that you will get a message saying authentication completed successfully.
If you want to know the status once again click on Aadhaar Authentication option. 
Then you will get a message that E-KYC is already completed.

In case of offline.. the relevant form has to be filled and given at the gas agency. 
After that your KYC process will be completed in four to five days. 
After that there is an opportunity to get the cylinder at a subsidized price. 
If KYC is already done then no problem.

17 December, 2023

JioTV Premium plans

Reliance Jio introduces premium version of JioTV with new prepaid plans priced at Rs 398, Rs 1198, and Rs 4498. Plans offer 2GB data per day, unlimited voice calling, 100 SMS/day, JioTV Premium with up to 14 OTT subscriptions, including Disney+ Hotstar, ZEE5, Prime Video, and more. Users can recharge with monthly, quarterly, or annual plans, sign in to JioTV app using their mobile number, and enjoy premium OTT content. Activation of JioCinema Premium and access to Prime Video and Disney+ Hotstar are also explained.

15 December, 2023

Explained: How You Can Make UPI Payments Without Using The Internet

Are you tired of getting stuck in the middle of an online UPI transaction due to poor internet connectivity? Well, fret not. You can even make UPI payments without internet connectivity. 

Eager to know how? Read on as we explain how you can do UPI transactions even in the absence of the internet.

13 December, 2023

Screen Task

Share Your Screen with Local Devices Offline
Experience fast and secure screen sharing both offline and on the go. Offering seamless experience to share your screen with others, anytime and anywhere!

No internet connection needed, ScreenTask works best with local networks over WiFi or Cable.

No installation required, the server app is a single executable file, clients can connect from any Web Browser.

No soft or hard limits on any feature, your server hardware and the network capacity are the only limits.

Completely FREE! and always will be, Since 2015 and still counting.

Protect your sessions with password, so only certain viewers can your screen.

All configurations are stored in a simple JSON file, Imagine the possibilities!

11 December, 2023

Deep Fake | If you want to get out of the deep fake that is affecting even the Bollywood stars, you have to follow these precautions!

Deep fake.. is something that is in the news every day. 
Sensational technology. A cell phone in hand.. Apps on the phone are enough. Anyone can create a deepfake. Can be left on social media. 
Even if it's for laughs, it's a crime! Let's not forget that what we are playing with is the other person's self-esteem. If there is a difference.

Bollywood stars, politicians, athletes... no one is an exception. It is a situation where common people cannot live peacefully. As soon as the social media account is opened.. nude or semi-naked photos may be seen. Otherwise, it could be our relatives. Sometimes we ourselves keep forwarding those deep lies, deep lies, perverted artificiality under the guise of technology... to those who know and to those who do not know. Keeping morals aside. We get addicted to comments. Take the example of actress Rashmika Mandanna. He has more morale. There is also the mental maturity to not care about fakes. Which intermediate sell the same? If she hangs herself from a fan before dawn or drinks insecticide... she looks dead. Disturbing relatives. What if this happened to any middle class housewife? Capuras would collapse. The affair led to divorce. The fear of what to answer to a society that does not understand what is real and what is fiction is causing many problems. By putting that perverse technology in the way.. those who ask for lots of money, those who ask for livestock, those who seek pleasure in anonymity.. this is the mind of man. The enemy may be right next door. May be living in a neighboring country or another continent. A pastime for some. An illegal means of income for some.

Many ways...
You don't need to be a technical genius to create a deep fake. A little technology is enough. All we have to do is type what we want. Technology will do its job. It brings a look on the screen that matches our expectations. In 'FaceApp' one can create a person's face in various gestures. There is an artificial world called 'Deepfake Web'. All these are platforms that provide the image of the other person. With the help of these it is very easy to create nude scenes and cheap dialogues. They can be held and harassed and threatened. Can be blackmailed. Can be defamed. When that happens.

Sharp Laws:
Deepfaking with any intention is wrong. Legal offense. Socially immoral. Apart from various sections of the Indian Penal Code, cases can also be filed under the provisions of the Information Act. According to Section 66D of the Information Technology Act-2000.. Infringement of personality comes under. Imprisonment up to three years. A fine of up to one lakh rupees can be imposed. Section 66 E of the same Act provides for a more severe punishment. Violating a person's privacy, taking a photo or video of a person's body parts without their permission, and sharing them with others are serious crimes. Imprisonment up to three years or fine up to two lakhs is possible. Imprisonment and fine can be imposed simultaneously. If the bodies of children are shown indecently, the first offense will be punishable with imprisonment of up to five years and a fine of up to ten lakhs. For subsequent offences, the punishment will be more severe and the amount of the fine will be higher. Section 499 of the Indian Penal Code is also applicable here. This carries a jail term of up to two years and a fine. There are severe penalties under the Copyright Act as well.

Precautions are usual:
Whether it is a deep fake or another online fraud.. in many cases we provide the raw material to the social criminals. We upload countless photos and videos on social media for praise or consolation. Where we are, what we are doing, who we are with.. we share every information with four people. We will show our possessions and wealth to everyone. In the end we get caught like fish. We will face many difficulties to get out. This is what Coricori means by buying trouble. Remember that social media is a def fake world. Don't believe anything.

Insurgent forces do not hesitate to create havoc in the society. Before reacting to those shady pictures and videos.. you should think for a moment. Step forward with discretion. Moreover, that aggravation should not be fueled further. It is our responsibility as citizens.

– Anil Rachamalla, Founder EndNow Foundation

09 December, 2023

Slides Go

Finding it hard to make good presentations? 
Is it pushing the impossible? 
But SlidesGo ( can help. 
This is an AI presentation maker. Totally free. 
Just say what you want the presentation to be based on. Choosing the style and tone creates the presentation itself. If desired, changes and additions can be made to make it look more attractive. 
It also includes trending presentation searches, latest themes and popular themes. 
Those who can't decide how to make a presentation can choose these and get ready. 
If necessary, you can browse by tags. 
Kids, Foods, Technology, Travel, Animal... 
There are many sections. 
Not only this.. You can try different tools like SlidesCarnival, Padlet, Keynote, SlideEgg.

07 December, 2023

Custom GPT: How to build your own GPT without any coding knowledge

OpenAI has surpassed its rivals by introducing custom GPTs. Here’s how it is changing the way we interact with AI.

05 December, 2023

AI Resume Writer: Write a resume.. with an AI tool!

A good resume is like a foundation for a good career. 
Creating an attractive CV is not an easy task! This is why AI tools (AI Resume Writer) are available. Candidates just need to provide their details.. and make comprehensive resumes in a pinch. 
Let's see how to use it.

In order to stand the best chance in today's competition, you have to take care of every little thing. 
It is very necessary in the case of resume which helps to make the first impression on the candidate. 
It is important to be able to present our qualifications, strengths, skills, experiences, and all in an interesting way. 
A good resume reflects the candidate's professionalism. It has a level that can indicate his persistence towards the career. Artificial intelligence tools are now helping to prepare the all-important resume. 
One estimate is that only 2 percent of resumes pass the initial filter in large-scale hiring. And if we want to be in that two percent.. we should use these tools!
This is important among resume writers today. With this, professional CVs can be made in just minutes. Users can use any of the templates from here. Cover letters are also available for free. There are special templates for these too. The resume can be prepared as desired and downloaded as a Word or PDF document. In this, spelling check and summary preparation are done automatically.
Many people who got jobs in famous companies like Amazon, Walmart, Tesla, Levi's said that they used this tool. There are many professional resume templates available. One can make nice CVs using these. It has data encryption facility. This arrangement has been made so that no one can use the information we give in any bad way.

Millions of people worldwide are already using it. Reg Open AI is working with GPT. It is useful for writing, editing, and organizing resumes. Even those who have no knowledge of software usage can easily use it. Breaks down content into bullet points. It has already tied up with some universities and colleges to provide resume building software and services and is performing well.

It has an autopilot built in setup. It has more than 20 thousand pre-written sentences. We can use them according to our need. AI writer, templates, etc. are available for many candidates. This tool is powered by GPT-4. It is useful for candidates to write correct resumes without errors.

In this, you can work with many tools like copy writers, video makers, design makers, graphic maker and color matcher tools. There are over a thousand resume templates available. Any job seeker in any industry will find the resumes they need. Should there be only one page, if the letters are readable.. All such details can also be known.

Canva Resume Maker:
From the hundreds of templates in this, we can take the one we like according to our industry and requirement. It can be changed as per requirement. You can change the color, font, layout, etc. and add graphics as well. According to an estimate.. Recruiters can judge whether the candidate likes them or not within the first six seconds of seeing the resume! It is very helpful to hone our skills beforehand. We can save and re-edit our design.

The ready-made content is prepared by certified professional resume writers. Apart from using these it automatically converts our old resumes into new formats if we upload them. That is, once the required details are decided and provided, then the format can be changed and used as many times without wasting time.

03 December, 2023

Top 5 types of cyber financial frauds that you should be wary of

With the rapid growth in digital transactions, fraudsters have devised sophisticated methods
to exploit vulnerabilities in financial systems. Here are the top 5 types of cyber financial
Fraudsters often masquerade as legitimate entities through emails, messages, or websites,
leading unsuspecting victims to disclose their personal data.

01 December, 2023

Dall-E 3 Now Available For Free

In a move that’s set to revolutionize the AI landscape, Microsoft’s Bing has integrated OpenAI’s Dall-E 3 as well as ChatGPT, making it accessible to everyone. This cutting-edge AI image generator, known for its prowess in creating unique images from textual descriptions, is now just a chat away.

What is Dall-E?
For those unfamiliar, Dall-E 3 is the brainchild of OpenAI, a research organization that’s been at the forefront of AI innovations. Dall-E, a generative AI model that creates images using text prompts. Dall-E is a neural network that generates images in various styles.

As it stands, Dall-E 3 is up against rivals like Midjourney and Stable Diffusion, while Google’s new Search Generative Experience, available in select countries, is also making waves in the image creation domain.

Its integration with Bing and ChatGPT is a significant step, in bridging the gap between complex AI tools and everyday internet users. So, if you’re itching to unleash your creativity, Bing’s chatbot as well as ChatGPT await your command!

29 November, 2023

Jetico Free Security Tools

Free Security Tools
Get introduced to data protection with some free tools by Jetico.

Use BestCrypt Data Shelter to protect your data even when it’s in use.
Create protection policies for individual folders to keep data secure when it’s accessible and being used. Gain protection from malware and ransomware. Keep track of your encrypted drives and receive reminders about non-encrypted volumes.  

Use BCWipe Privacy Guard to turn off Windows 10 & 11 tracking features with one click.  
Easily access Microsoft’s privacy settings. Disable default tracking features or select the settings recommended by Jetico’s data protection specialists. 

Use BCArchive to encrypt and compress files and folders into a single archive file.
The archive file can be transformed into a self-extracted executable. The program supports public/private encryption and is compatible with keys created by other software according to PKCS #12 and X.509 format specifications for public/secret key pairs.

Use BCTextEncoder to encrypt part or all of your messages.
Plain text data is encrypted and converted into disguised, compressed text -  which can then be easily copied to the clipboard or saved as a text file.

Free Add-On for Licensed Users of BestCrypt:
Use BestCrypt Traveller to access your encrypted files while using another computer.
The program runs without installation and provides access to BestCrypt container files encrypted by any algorithm supported by BestCrypt.

27 November, 2023


Disk encryption with strong security based on TrueCrypt.

VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Files can be copied to and from a mounted VeraCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted VeraCrypt volume. Similarly, files that are being written or copied to the VeraCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for VeraCrypt. 

Let's suppose that there is an .avi video file stored on a VeraCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the VeraCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, VeraCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading another small portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types (not only for video files).
Note that VeraCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile). 

25 November, 2023

Don't fall into such a trap..

Nitin Kamat's tips on 'pig butchering scams'..!

Zeroda CEO Nithin Kamath said that pig butchering scams have increased in the country. 
Some precautions should be taken to avoid falling victim to these scams.

Online fraud is no exception in the digital age. It is difficult to determine who casts the net in what form and when. Once you get caught in such a trap, that's it.. Life turns upside down. Generally jobs and high return on investment attract more everyone. This is exactly what is happening to criminals. They hope for this and act like a fool and commit fraud. This type of fraud is called pig butchering. Nitin Kamath, founder and CEO of Jiroda, shared some ideas on his X account about how these frauds are happening.

Nitin Kamat stated that 'pig butchering' frauds have reached the level of tens of crores in India. He said that these frauds are being done in the form of fake job offers, high rewards and investments in crypto. Those who perpetrate this type of fraud are said to first try to win the other person's trust. For this purpose, they pretend love and friendship with fake profiles. He said that after that, they cheat by hoping for jobs and high rewards. He said that this type of fraud is happening all over the world.

Nitin Kamath cited an example that the people who commit such frauds are victims of similar frauds in the past. It is said that those who went for jobs are cheated abroad and then they are forced to cheat people from India through social media with fake profiles. He said that quick money and job abroad naturally attract Indians and these are turning into a boon for fraudsters. So it is advised to follow some tips to avoid falling victim to this type of fraud.


Do not reply to messages from unknown people whether on WhatsApp or any other social media.

If someone asks you to download a new app or open a link, do not do it under any circumstances.

Fraudsters play with emotions like trust, fear, dreams and greed. So don't give up on anything so quickly.

Don't take any decision without thinking. Those who make hasty decisions are likely to fall prey to such scams.

If you have any suspicion, go to the police station immediately. Otherwise consult a lawyer.

Anyone claiming to be a job or expecting a high reward should be suspicious.

Do not share Aadhaar, Passport, Bank, Investment details with any new person.

23 November, 2023

Morning Habits for a Productive Start

Elevate your mornings with these essential habits for a productive start. From a consistent wakeup schedule to embracing natural light, discover the keys to streamlined tasks and a more energized day. Craft your ideal morning routine with these actionable tips.

21 November, 2023

Premature Hair Graying: Causes and how to take care of it

Premature greying of the hair is a common concern that can affect individuals across various age groups. A study published in Cell Biology in June 2021 by researchers at Columbia University Vagelos College of Physicians and Surgeons discovered evidence associating psychological stress with greying hair in people. Experiencing premature greying also referred to as premature canities, can be quite disturbing for many people.

By the time they reach 30, approximately 10% of men exhibit signs of grey hair, while this figure rises to around 25% by the age of 35. Conversely, women tend to undergo the greying process later in life, with roughly 10% displaying some grey hair at the age of 30, and about 50% having substantial grey hair by the age of 50.

According to the National Centre of Biotechnology Information, an equal number of males and females were recruited for the study, and it was discovered that 37% of males had greying hair compared to 17.7% of girls. Here's all you need to know from the expert Dr Akshay Batra, Vice-Chairman and Managing Director at Dr Batra's Healthcare and, The first Indian President of the Trichological Society of London (UK).

19 November, 2023

TRAI issues alert on mobile disconnection scam calls, says these calls are illegal do not pick

TRAI has recently been alerted about a new scam involving fraudsters posing as government representatives. The fraudsters are falsely claiming that the mobile numbers of individuals are being disconnected due to misuse and urging them to join Skype calls.

In Short:
TRAI has alerted the public about a scam involving fraudsters posing as its representatives.
These scammers are falsely claiming that customer's mobile numbers will be disconnected.
Scammers also falsely claim that the public's Aadhaar numbers were used to obtain SIM cards.

17 November, 2023


An AI-powered code editor based on VSCode 

The AI-first Code Editor
Build software faster in an editor designed for pair-programming with AI

It's early days, but right now Cursor can help you with a few things...

Chat: Talk with a bot that understands your entire code base
Edit: Ask the AI to change a block of code, see an inline diff of the edits
Debug: Hover over linter errors or stack traces to auto-fix them

15 November, 2023

How to prevent hearing loss from headphones and take care of the ears

Damage to your ears can be caused by headphones the same way as other loud noises do. It can result in what is referred to as “noise-induced hearing loss”. The tiny hair cells in the inner earDamage to your ears can be caused by which are the sensory receptors to hearing, get bent down too much or too severely when exposed to loud sounds from headphones over a period of time. If enough time is provided after listening to loud sounds these hair cells can recover, if not, it can result in permanent damage.

13 November, 2023

Worried about your images, videos being used as a deepfake? Here's how to keep media safe

Deep fakes have been around for some time but the technology has significantly improved over the years

Deep fakes have been around for some time but the technology has significantly improved over the years
Besides protecting your images and videos from being used for deep fakes, as a consumer of media there are a few tips and tricks to spot fake videos
Any unusual action or sound can often give away a fake video

11 November, 2023

Indians receive 12 scam messages daily says survey, exposes 5 common tricks

Arecent survey reveals that Indians receive almost 12 scam texts or emails daily. These, often disguised as "legitimate communication," lead to considerable stress and financial strain, as consumers spend an average of 1.8 hours each week verifying message authenticity, News18 reported.

According to McAfee 2023 Scam report, Surveying over 7,000 adults across seven countries, including India, the study delves into the escalating sophistication of scam messages driven by artificial intelligence (AI). The findings underscore the urgent need for AI-driven defence solutions to combat the rising wave of AI-powered scams.

09 November, 2023

OpenAI has released a new tool that will let you build your own ChatGPT

OpenAI conducted its first-ever developer conference on Monday. Along with many new announcements in and around its language model, OpenAi has unveiled a new platform that allows users to create customised versions of its popular AI chatbot, ChatGPT. This development was announced at the DevDay conference held in San Francisco. Sam Altman took to the stage even to build a custom GPT in real-time using the GPT builder. The interesting bit is that developers will not have to code these changes, the prompts were given in simple language. The new GPT builder tool is exclusively available to ChatGPT Plus subscribers.

07 November, 2023

Clean Your System and Free Disk Space

When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Adobe Flash, Google Chrome, Opera, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.

BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy.

Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy.
Simple operation: read the descriptions, check the boxes you want, click preview, and click delete.
Multi-platform: Linux and Windows
Free of charge and no money trail
Free to share, learn, and modify (open source)
No adware, spyware, malware, backdoors, browser toolbars, or "value-added software"
Translated to 65 languages besides American English
Shred files to hide their contents and prevent data recovery
Shred any file (such as a spreadsheet on your desktop)
Overwrite free disk space to hide previously deleted files
Portable app for Windows: run without installation
Command line interface for scripting and automation
Write your own cleaners using CleanerML , a XML-based markup language
Automatically import and update winapp2.ini cleaner files (a separate download) giving Windows users access to 2500+ additional cleaners
Frequent software updates with new features

05 November, 2023

The 18 mistakes you're making online, according to an 'ethical' hacker

A hacker shares their secrets to help you stay safe

With more of us doing our banking and other financial transactions online we need to make sure we're doing all we can to prevent our personal information from being stolen. We spoke to a professional "ethical" hacker, who hacks into clients’ websites, networks, and phone applications for a living. He gave us his top tips to make sure you don't fall victim to theft. Read on to find out the mistakes you might be making and how to best protect yourself and your personal information.

03 November, 2023

Data Breach Of 81 Crore Indians: What Has Been Leaked?

In a massive data breach, personally identifiable information of 81.5 crore Indians has been up on the dark web for sale, according to areport by US-based cybersecurity firm Resecurity. The stolen data includes Aadhaar and passport details, names, phone numbers, and both temporary and permanent addresses of crores of Indians.

As reported by Resecurity, on October 9, an individual using the pseudonym "pwn0001" made a post on Breach Forums, a darknet crime forum, where they offered access to a dataset containing 81.5 crore records with information related to "Indian Citizen Aadhaar and Passport." When Resecurity reached out to the hacker, they were open to selling the complete Aadhaar and Indian passport dataset for $80,000 (Rs 66,60,000).

Decode spoke to two cybersecurity experts who told us what this could mean.

01 November, 2023

Is your name in the voter list?

Generally after the declaration of the final voter list the names of voters are required to be checked.
However.. in the current situation of lack of leisure, many people are not looking into it.
The list is not available in some places.
On the day of polling, we go to vote, complain that there is no vote, and argue with the officials.
It is better to check now to avoid such a situation.
If not, the officials say that voters should check the names in the list immediately as the registration is open till November 31.
The list can be checked through a handheld device without having to go anywhere.
If you open the web page in Google, select the state, district, constituency and enter your name or mobile number or voter epic number, it will be known whether your name is there or not.
Officials say that alloting 5 minutes is enough. Better check it out anyway.

30 October, 2023

Cyber fraudsters on prowl, house owners targeted

28 October, 2023

How to protect yourself against identity theft

Identity theft is an enormous problem. While the ever-growing use of modern technology to make purchases, bookings, and fast payments is highly convenient, the downside is that this leaves many opportunities for scammers and fraudsters to take advantage.

26 October, 2023

Arc browser

Launched in 2022 by the Browser Company, a company founded by former Facebook employees Josh Miller and Hursh Agrawal, Arc Browser is a Chromium-based web browser that aims to change how a traditional browser works. 
Since it is based on Google's open-source code, users can import all their existing bookmarks, extensions, login information, and more, from other browsers. But that's just a basic understanding of it. 
It is not until you take a look at its features, that you realize just how interesting it is.

Arc browser features
Arc Browser has a wholly different UI compared to its peers. 
It features a vertical tab bar that allows users to see a large number of tabs comfortably. 
It transforms your bookmarks and tabs and brings them into an app launcher-like UI. 
There is also an option to create Spaces for various categories or tasks where you can store related tabs. You can also have different accounts, 6 pinned pages, and more in each Space. 
Arc browser also allows you to save up to 8 tabs as favorites.

The Arc Browser allows you to view multiple tabs at once in a split-screen which can increase productivity, and come in handy in situations where you need to access the contents of two different web pages simultaneously. 
Interestingly, it comes with built-in tools like whiteboard and notes, something which you can only access with extensions on traditional Chromium-based browsers.

With a new feature called Boost, you can even change the way websites look. 
You can change elements from websites such as layout, background, colour, font, and brightness of web pages. you can even remove items using the Zap tool. It is basically ?editing the internet?, according to the Browser Company.

If you're used to opening a plethora of tabs at once, closing them becomes a hassle. 
Arc Browser does this work for you as it automatically closes tabs every 12 hours. 
You can choose to save tabs by pinning them. 
It also features a built-in command bar through which you can execute multiple commands such as toggling extensions, opening/closing tabs, and more by just pressing the command key along with the designated number key.

Due to its vastly different UI from other Chromium-based browsers, Arc Browser requires a bit of learning, but it can become an organizer's dream once you get accustomed to it.

22 October, 2023

Freedom GPT

Artificial intelligence (AI) is developing rapidly.
Many chatbots are emerging based on this.
The catch with these is the reliance on internet and data systems.
Age of AI, LLC has created an innovative GPT to solve this problem.
Its name is Freedom GPT.
It is totally censor free and personal.
With this software, generative AI engines can be run on computers anywhere.
It does not compromise privacy offline.
Hence it is expected to boost the freedom of individuals. To use freedomget..go to the website and select either the Internet, Windows, or Mac versions depending on the PC.
Just set the software and install one of the LLAM and Alphasa chatbots.
You can chat on your device without internet.

Creating Powerful, Uncensored, Unbiased, Private, Powerful AI for everyone
FreedomGPT 2.0 is your launchpad for AI. 
No technical knowledge should be required to use the latest AI models in both a private and secure manner. 
Unlike ChatGPT, the Liberty model included in FreedomGPT will answer any question without censorship, judgement, or risk of ‘being reported.’

When a lot of users try to use the website at the same time, it can be slow. When you download and run it offline, it will always be as fast as your machine allows.

Ask AI any questions without fear of judgement because the data never leaves your device. Nothing is more private than running Al locally on your own device.

On an airplane, mountain or deserted island, space ship? No problem! You can use FreedomGPT to access the world's knowledge even if you are completely offline.

20 October, 2023

Scan Transfer

No Need to Install any New App on the Phone!
Wirelessly transfer photos and videos from your Phone to the PC WITHOUT the USB Wire & Cable by simply scanning a QR Code.

Without USB Wire & Cable
Transferring files in WiFi doesn't require the USB wires and cables and other apps like iTunes etc.

Multiple Devices
ScanTransfer enables you to transfer files from multiple devices at the same time.

Transfer in Bulk
Transfer hundreds of photos and videos from your phone to the PC at a time.

Privacy Safe
Transferring files in Local Area Network(LAN) makes your privacy and files safe.

Transfer Photos from iPhone & Android Phone to PC without the USB Wire / Cable

ScanTransfer is a free Windows desktop software program which enables you to transfer photos and videos from your smart phone to your computer or laptop without the USB wire / cables. The best part of ScanTransfer is the program DOESN'T REQUIRE you to install any app into your phone. If you use iPhone or iPad, you even do not need to install the iTunes program. All you need to do is to use your Camera, Twitter or QR Scanner App to scan the QR code on the ScanTransfer, and then you will be able to start transferring instantly. The program also allows you to transfer hundreds of files at a time, and it will finish the task within just a few seconds through the transfer speed acceleration technology.

ScanTransfer supports multiple devices transferring which enables you to transfer files from more than one smart device at the same time. In addition, your personal files and privacy will be protected well due to ScanTransfer is a LAN(Local Area Network) application that will never leak your data out.

Compatible Smart Devices List

Apple/iOS: iPhone, iPad and all latest iOS devices. (iOS 9.0+)
Android: Android Smart Phone (Samsung, Nexus, LG, Motorola, HUAWEI etc.), Android Pad (Nexus, Galaxy Tab, Lenovo TAB etc.)

18 October, 2023

E-Epic Download: Get Voter ID Card in seconds

The Central Election Commission has made it easy to download e-Voter Identity Card (e-Epic) in the wake of Assembly elections.
For that, key changes have been made in the website.
In this system, the Central Election Commission announced that by registering the mobile number, one can get the e-Voter ID card in moments and it will be valid for exercising the right to vote.

Form-8 designed for changes and additions to the voter list should be used for this purpose.
A separate column is available for mobile number entry in that application.
Click on it and submit the application after entering.
After that go to "E-Epic" section and enter the voter ID card number in the specified field.
As soon as you enter the mobile number, the OTP will be sent to that phone.
After registering it, the e-voter ID card will be downloaded.
That document is valid like all certificates.
There is no need to wait for the voter identity card sent by the Election Commission.
Although this facility existed in the past, it took a long time to get approved.
Once the registered details are approved by the concerned Assembly Constituency Election Officer, the process will be completed.
Recently the Central Election Commission has simplified this process.

16 October, 2023

Cyber Crime Volunteers

Cyber Crime Volunteers Concept

Indian Cyber Crime Coordination Centre (I4C) has been established under Ministry of Home affairs (MHA) to act as a nodal point at National level in the fight against cybercrime. It aims to provide a platform to deal with cybercrimes in a coordinated and comprehensive manner. One of the important objectives of I4C is to create ecosystem that brings together academia, industry, public and government in prevention, detection, investigation and prosecution of cybercrimes.

I4C has envisaged the Cyber Crime Volunteers Program to bring together citizens with passion to serve the nation on a single platform and contribute in fight against cybercrime in the country.

Good Samaritans are welcome to register as Cyber Crime Volunteers in the role of Unlawful Content Flaggers for facilitating law enforcement agencies in identifying, reporting and removal of illegal / unlawful online content.

We also welcome individuals who are willing to volunteer in any other area that can help in fighting cybercrime. The applications shall be received directly by the State Nodal and they shall contact the applicants on an as-needed basis.

Terms & Conditions
• This is purely volunteer program and volunteer shall not use this program for any commercial gain.

• Volunteer shall not be entitled for any monetary benefits or Identity Cards/Designation etc., at present or in future.

• Volunteer shall not issue any public statement about his/her association with this program.

• Volunteers are strictly prohibited from using the name of Ministry of Home Affairs or claim to have an association with Ministry of Home Affairs on any social media or public platform.

• Volunteer is strictly prohibited from creating social media account in the name of this program or issue any statement about this program or pursue discussion or share his/her work or express opinions on public platforms on behalf of this program.

• Volunteer shall maintain strict confidentiality of task assigned/carried out by him /her, as a part of this program.

• Volunteer shall not share any information, logo, slogan relating to this program on social media or public platform.

• Volunteer shall furnish his/her true and correct personal information.

• The volunteer would work within the Indian legal framework and rules made there under.

• Volunteer shall sign a declaration of acceptance of terms and conditions of this program. Volunteer shall be de-registered in case of violation/breach of any of the terms and conditions of ‘Cyber Volunteer Program’. The State Nodal Officer of States/UTs also reserves the right to take legal action as the provisions of law against the Volunteer, in case of violation of terms and conditions of Cyber Volunteer Program.

Unveiling the Cybervolunteer Program of The Ministry of Home Affairs, India

The digital age quite literally offers an incredible repository of opportunities, offering new channels to connect and protecting our virtual engagements. Enshrining this idea, the Ministry of Home Affairs (MHA), Government of India has introduced the Cybervolunteer program ( It's a program that invites civilians to participate actively in fortifying the country's cybersecurity framework. This article is an exploration into what this program is all about and how it's becoming a beacon for cybersecurity in India.

### Understanding the Cybervolunteer Program

Launched under the aegis of the Indian Cyber Crime Coordination Centre (I4C), MHA, the Cybervolunteer program is a pioneering step aimed to increase citizen participation in cybercrime awareness, detection, and prevention. Joining the program, as a Cybervolunteer, one can contribute by reporting illegal/unlawful content encountered on the internet.

This citizen-friendly initiative is serving as a bridge between the masses and the cybersecurity world, bringing higher transparency, increasing awareness of cybersecurity, and reducing cyber threats.

### Who can participate?

The Cybervolunteer program invites participation from all across India, from every walk of life, including students, professionals, cybersecurity experts, and anyone interested in contributing to the cybersecurity landscape in India. The program promotes citizens' engagement and paves the way for a safer digitized India.

### How does it work?

On the official website (, interested individuals can join as a Cybervolunteer by registering themselves. Post-registration, a volunteer can report unlawful content on the internet in four defined categories: against national security, against safety of children, against women safety, and other cybercrimes.

The platform maintains a strict privacy policy, keeping the identity of the volunteers absolutely anonymous. Therefore, they can report any illegal activities they come across on the internet without the fear of their identity being disclosed. In addition, the platform ensures all reports are verified by a group of trained professionals before any action is taken.

### Importance of the Program

With the growing reliance on digital mediums, cybersecurity has become an essential concern for nations around the globe. The launch of the Cybervolunteer program is a testament to the commitment of the Government of India to leave no stone unturned in safeguarding the cyber realm.

By facilitating citizens' direct participation in combating cybercrime, this initiative not only strengthens the digital immunity of the country but also empowers the public. It highlights the importance of public participation in maintaining cybersecurity.

### Concluding Thoughts

The Cybervolunteer program from the Ministry of Home Affairs is truly a giant leap forward in incorporating citizens in the national cybersecurity front. This initiative sends out a strong message of unity, underlining the significance of every citizen's role in protecting the nation against the rising tide of cybercrimes.

This platform is a shining example of the government's trust in its people, showing faith in their integrity and their will to make the internet a safer place for one and all. By making every individual a stakeholder, the Cybervolunteer program indeed gears up India in the run to create a safer and secure cyber environment.


Credits: Original information sourced from [Cybervolunteer program]

14 October, 2023


NSDL e-Gov is now Protean:

NSDL e-Governance Infrastructure got rebranded as Protean eGov Technologies. 
The new identity aligns with the company's transformation in its offerings to the businesses and citizens of India. Nothing changes for customers and partners.

12 October, 2023

M-Kavach 2

M-Kavach 2 is a comprehensive mobile device security solution addressing emerging threats related to Android based mobile devices. The major emphasis is on advising the users against security misconfigurations, detection of hidden/ banned apps and scanning the device for potential malicious apps installed on the user's mobile device.

Salient Features:

Threat Analyzer
Threat Analyzer is an attempt to detect malware on Android devices using a machine learning based approach

Security Advisor
This feature gives the users a holistic security status of the device. It checks the status of various critical parameters of the user’s devices such as device root status, Wi-Fi connectivity, USB debugging status, hotspot status etc

Detection of Hidden/Banned Apps
This feature identifies the existence of any such applications on the user’s device and further analyze these applications to identify any potential threat they pose to the device

App Latest Update Statistics
This feature notifies you of the apps not updated for longer durations, apps not being used by you for longer durations and apps having sudden spikes in the data and active time usage

Adware Scanner
This feature scans all the applications installed on the device and notifies the user of the adware installed on the device

App Locker
App locker provides an additional layer of security from unwanted/unauthorized access to critical applications.

10 October, 2023


Telecomtalk is a popular Indian telecom news portal, brings operator news, tariff plans, broadband, 4G updates and analysis on the DTH and Mobile sector.

TelecomTalk is a premier and credible provider of the latest news and analysis on the telecommunication industry. Through our network of reporters across the country, we post breaking news, interviews, analysis, policy developments and in-depth reports on a daily basis. We cover news ranging from device launches, joint ventures, research papers, mergers and acquisitions, the launch of new tariff plans and any other business and market development. We also focus on policy-related events. Our team regularly interacts with the decision makers in telecom companies and policy makers from Government segment to bring forth the major happenings in the telecom industry.

We at TelecomTalk strive to bring you the best and the most up-to-date information on

Regulatory news and announcements
Implications of different regulations on the entire communications ecosystem
Smartphones, tablets, and wearable launches around the world
Mergers, acquisitions, and partnerships happening in the telecommunications space
Technology advancements that enable CSPs to serve markets better
Interviews with leading executives in the industry
Tariff announcements and change updates for landline, mobile, data cards and DTH services
Product Reviews for gadgets, accessories, and services
General updates about the telecommunications market

08 October, 2023

India Spectrum Holding Timeline

India Spectrum Holding Timeline:

06 October, 2023


RBI launches उद्गम - UDGAM - Centralised Web Portal for searching Unclaimed Deposits
The Governor, Reserve Bank of India today launched a Centralised Web Portal उद्गम UDGAM (Unclaimed Deposits – Gateway to Access inforMation). 
This portal has been developed by RBI for use by members of public to facilitate and make it easier for them to search their unclaimed deposits across multiple banks at one place.

The Reserve Bank of India had announced the development of a centralised web portal for searching unclaimed deposits as part of the Statement on Developmental and Regulatory Policies dated April 06, 2023. Given the increasing trend in the amount of unclaimed deposits, RBI has been undertaking public awareness campaigns from time to time to sensitise the public on this matter. 
Further, through these initiatives, the RBI has been encouraging members of public to identify and approach their respective banks for claiming unclaimed deposits.

The launch of the web portal will aid users to identify their unclaimed deposits/ accounts and enable them to either claim the deposit amount or make their deposit accounts operative at their respective banks. Reserve Bank Information Technology Pvt Ltd (ReBIT), Indian Financial Technology & Allied Services (IFTAS) and participating banks have collaborated on developing the portal.

To begin with, users would be able to access the details of their unclaimed deposits in respect of major banks presently available on the portal.

UDGAM portal has the search facility for unclaimed deposits of 30 banks from September 28, 2023.

RBI Press Release:

Other References:

04 October, 2023


Veeam Backup & Replication Community Edition
Achieve fast, flexible and reliable backup, recovery and replication for up to 10 workloads in this FREE Community Edition.

Veeam Backup for Microsoft 365
Community Edition
Get FREE backup and recovery (for up to 10 users) of Microsoft 365 (Office 365) data, including Exchange, SharePoint, OneDrive for Business and Teams.

Veeam Backup for AWS Free
Get secure AWS-native backup that you can deploy for FREE. Users can easily recover from any cloud data loss scenario — in just minutes.

Veeam Backup 
for Microsoft Azure Free
Deploy Azure-native backup and recovery for FREE. Users can easily recover from any cloud data loss scenario in just minutes.

Veeam Backup
for Google Cloud Free
Protect your customer’s cloud-native workloads residing in Google Cloud and extend your services reach even further.

Veeam Backup for Salesforce Community Edition
Get FREE Salesforce backup and recovery to protect Salesforce environments of 50 users or less.

Veeam ONE™
Community Edition
Leverage the powerful monitoring and reporting capabilities of Veeam ONE for FREE. Closely monitor and ensure availability of up to 10 workloads.

Veeam Agent
for Microsoft Windows Free
Get Veeam’s FREE backup solution for Windows-based servers, desktops and laptops. Easily back up your data to an external hard drive, NAS share or Veeam repository.

Veeam Agent for Linux Free
Ensure the backup of your Linux workloads with a FREE backup solution for physical servers and workstations — for image-based backups from inside the guest.

Veeam Service Provider Console
Remotely manage and monitor your customers' Veeam-powered services from this easy-to-use web-based interface.

Veeam Management Pack
for Microsoft System Center Free
Veeam MP for Veeam Backup provides FREE real-time monitoring for your Veeam Backup & Replication environments in System Center.

Veeam Stencils
for Microsoft Visio
Veeam Stencils for Microsoft Visio is a FREE set of Microsoft Visio stencils, developed for anyone who uses Visio to create Veeam technical designs, diagrams and reports.

01 October, 2023

Microsoft Math Solver

Get step-by-step explanations
See how to solve problems and show your work—plus get definitions for mathematical concepts

Graph your math problems
Instantly graph any equation to visualize your function and understand the relationship between variables

Practice, practice, practice
Search for additional learning materials, such as related worksheets and video tutorials

Get math help in your language
Works in Spanish, Hindi, German, and more

Free pik

Download Free Videos, Vectors, Photos, and PSD

Millions of Free Graphic Resources. Videos ,Vectors, Photos, PSD, Icons. 
All that you need for your Creative Projects.

29 September, 2023


Introducing JioAirFiber
India's latest home entertainment and Wi-Fi service.

JioAirFiber services
The best-in-class value proposition.

Digital Entertainment
Leading 550+ digital TV channels
Catch-up TV to watch missed episodes later
Subscriptions to the most popular 16+ OTT apps

Broadband Connection
Wi-Fi connectivity and high-speed internet
Strong signal everywhere in your home

Smart Home Services
Powers your surveillance, healthcare, smart home IoT, gaming, and home networking systems
Enables Cloud PC for education and work-from-home

Home devices at no extra cost
Latest Wi-Fi router for coverage everywhere in your home
4K smart set-top box
Voice-active remote

27 September, 2023

Lexica Art

Lexica Art, another Stable Diffusion project, which allows you to search for images and create images from text. 
It’s less customizable than Dream Studio, but it’s easier to use and, above all, it’s free.

It is a recent but very promising project. It was born as a search engine for images generated by Artificial Intelligence but it is something more.

The interface is simple, a search bar, and below the results previews.

25 September, 2023


Explainer Videos
Made Simple.
Just type, drag-and-drop to create a captivating explainer video in minutes.

You can easily create your how-to videos or tutorial videos in minutes without any video editing skills by using explainer video templates with different themes. HeyGen makes end-to-end videos as easily as you would make a PowerPoint presentation.

You can also script your text, HeyGen can turn text into speech in a few seconds and provide you with 80+ AI avatars covering different ethnicities, ages, costumes, and poses to explain.

Add personal and additional embellishments using HeyGen's free element library to customize your explanation video and unlimited sharing of your video on social media.

23 September, 2023

APSRTC Websites

For Seat Reservations:
For Bus pass: