AdsUnit2

29 November, 2023

Jetico Free Security Tools

Free Security Tools
Get introduced to data protection with some free tools by Jetico.

Use BestCrypt Data Shelter to protect your data even when it’s in use.
Create protection policies for individual folders to keep data secure when it’s accessible and being used. Gain protection from malware and ransomware. Keep track of your encrypted drives and receive reminders about non-encrypted volumes.  

Use BCWipe Privacy Guard to turn off Windows 10 & 11 tracking features with one click.  
Easily access Microsoft’s privacy settings. Disable default tracking features or select the settings recommended by Jetico’s data protection specialists. 

Use BCArchive to encrypt and compress files and folders into a single archive file.
The archive file can be transformed into a self-extracted executable. The program supports public/private encryption and is compatible with keys created by other software according to PKCS #12 and X.509 format specifications for public/secret key pairs.

Use BCTextEncoder to encrypt part or all of your messages.
Plain text data is encrypted and converted into disguised, compressed text -  which can then be easily copied to the clipboard or saved as a text file.

Free Add-On for Licensed Users of BestCrypt:
Use BestCrypt Traveller to access your encrypted files while using another computer.
The program runs without installation and provides access to BestCrypt container files encrypted by any algorithm supported by BestCrypt.


27 November, 2023

VeraCrypt

Disk encryption with strong security based on TrueCrypt.

VeraCrypt is a software for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data is automatically encrypted right before it is saved and decrypted right after it is loaded, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).
Files can be copied to and from a mounted VeraCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on the fly (in memory/RAM) while they are being read or copied from an encrypted VeraCrypt volume. Similarly, files that are being written or copied to the VeraCrypt volume are automatically being encrypted on the fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for VeraCrypt. 

Let's suppose that there is an .avi video file stored on a VeraCrypt volume (therefore, the video file is entirely encrypted). The user provides the correct password (and/or keyfile) and mounts (opens) the VeraCrypt volume. When the user double clicks the icon of the video file, the operating system launches the application associated with the file type – typically a media player. The media player then begins loading a small initial portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) in order to play it. While the portion is being loaded, VeraCrypt is automatically decrypting it (in RAM). The decrypted portion of the video (stored in RAM) is then played by the media player. While this portion is being played, the media player begins loading another small portion of the video file from the VeraCrypt-encrypted volume to RAM (memory) and the process repeats. This process is called on-the-fly encryption/decryption and it works for all file types (not only for video files).
Note that VeraCrypt never saves any decrypted data to a disk – it only stores them temporarily in RAM (memory). Even when the volume is mounted, data stored in the volume is still encrypted. When you restart Windows or turn off your computer, the volume will be dismounted and files stored in it will be inaccessible (and encrypted). Even when power supply is suddenly interrupted (without proper system shut down), files stored in the volume are inaccessible (and encrypted). To make them accessible again, you have to mount the volume (and provide the correct password and/or keyfile). 


25 November, 2023

Don't fall into such a trap..

Nitin Kamat's tips on 'pig butchering scams'..!

Zeroda CEO Nithin Kamath said that pig butchering scams have increased in the country. 
Some precautions should be taken to avoid falling victim to these scams.

Online fraud is no exception in the digital age. It is difficult to determine who casts the net in what form and when. Once you get caught in such a trap, that's it.. Life turns upside down. Generally jobs and high return on investment attract more everyone. This is exactly what is happening to criminals. They hope for this and act like a fool and commit fraud. This type of fraud is called pig butchering. Nitin Kamath, founder and CEO of Jiroda, shared some ideas on his X account about how these frauds are happening.

Nitin Kamat stated that 'pig butchering' frauds have reached the level of tens of crores in India. He said that these frauds are being done in the form of fake job offers, high rewards and investments in crypto. Those who perpetrate this type of fraud are said to first try to win the other person's trust. For this purpose, they pretend love and friendship with fake profiles. He said that after that, they cheat by hoping for jobs and high rewards. He said that this type of fraud is happening all over the world.

Nitin Kamath cited an example that the people who commit such frauds are victims of similar frauds in the past. It is said that those who went for jobs are cheated abroad and then they are forced to cheat people from India through social media with fake profiles. He said that quick money and job abroad naturally attract Indians and these are turning into a boon for fraudsters. So it is advised to follow some tips to avoid falling victim to this type of fraud.

DO NOT:

Do not reply to messages from unknown people whether on WhatsApp or any other social media.

If someone asks you to download a new app or open a link, do not do it under any circumstances.

Fraudsters play with emotions like trust, fear, dreams and greed. So don't give up on anything so quickly.

Don't take any decision without thinking. Those who make hasty decisions are likely to fall prey to such scams.

If you have any suspicion, go to the police station immediately. Otherwise consult a lawyer.

Anyone claiming to be a job or expecting a high reward should be suspicious.

Do not share Aadhaar, Passport, Bank, Investment details with any new person.

23 November, 2023

Morning Habits for a Productive Start

Elevate your mornings with these essential habits for a productive start. From a consistent wakeup schedule to embracing natural light, discover the keys to streamlined tasks and a more energized day. Craft your ideal morning routine with these actionable tips.

21 November, 2023

Premature Hair Graying: Causes and how to take care of it

Premature greying of the hair is a common concern that can affect individuals across various age groups. A study published in Cell Biology in June 2021 by researchers at Columbia University Vagelos College of Physicians and Surgeons discovered evidence associating psychological stress with greying hair in people. Experiencing premature greying also referred to as premature canities, can be quite disturbing for many people.

By the time they reach 30, approximately 10% of men exhibit signs of grey hair, while this figure rises to around 25% by the age of 35. Conversely, women tend to undergo the greying process later in life, with roughly 10% displaying some grey hair at the age of 30, and about 50% having substantial grey hair by the age of 50.

According to the National Centre of Biotechnology Information, an equal number of males and females were recruited for the study, and it was discovered that 37% of males had greying hair compared to 17.7% of girls. Here's all you need to know from the expert Dr Akshay Batra, Vice-Chairman and Managing Director at Dr Batra's Healthcare and, The first Indian President of the Trichological Society of London (UK). 

https://www.msn.com/en-in/health/other/premature-hair-graying-causes-and-how-to-take-care-of-it/ar-AA1kaoys

19 November, 2023

TRAI issues alert on mobile disconnection scam calls, says these calls are illegal do not pick

TRAI has recently been alerted about a new scam involving fraudsters posing as government representatives. The fraudsters are falsely claiming that the mobile numbers of individuals are being disconnected due to misuse and urging them to join Skype calls.

In Short:
TRAI has alerted the public about a scam involving fraudsters posing as its representatives.
These scammers are falsely claiming that customer's mobile numbers will be disconnected.
Scammers also falsely claim that the public's Aadhaar numbers were used to obtain SIM cards.

https://www.indiatoday.in/technology/news/story/trai-issues-alert-on-mobile-disconnection-scam-calls-says-these-calls-are-illegal-do-not-pick-2463531-2023-11-16

17 November, 2023

Cursor

An AI-powered code editor based on VSCode 

The AI-first Code Editor
Build software faster in an editor designed for pair-programming with AI

Features:
It's early days, but right now Cursor can help you with a few things...

Chat: Talk with a bot that understands your entire code base
Edit: Ask the AI to change a block of code, see an inline diff of the edits
Debug: Hover over linter errors or stack traces to auto-fix them

https://cursor.sh/

15 November, 2023

How to prevent hearing loss from headphones and take care of the ears

Damage to your ears can be caused by headphones the same way as other loud noises do. It can result in what is referred to as “noise-induced hearing loss”. The tiny hair cells in the inner earDamage to your ears can be caused by which are the sensory receptors to hearing, get bent down too much or too severely when exposed to loud sounds from headphones over a period of time. If enough time is provided after listening to loud sounds these hair cells can recover, if not, it can result in permanent damage.

https://timesofindia.indiatimes.com/life-style/health-fitness/health-news/how-to-prevent-hearing-loss-from-headphones-and-take-care-of-the-ears/articleshow/101517292.cms?from=mdr

13 November, 2023

Worried about your images, videos being used as a deepfake? Here's how to keep media safe

Deep fakes have been around for some time but the technology has significantly improved over the years

SUMMARY:
Deep fakes have been around for some time but the technology has significantly improved over the years
Besides protecting your images and videos from being used for deep fakes, as a consumer of media there are a few tips and tricks to spot fake videos
Any unusual action or sound can often give away a fake video

https://www.businesstoday.in/technology/news/story/worried-about-your-images-videos-being-used-as-a-deepfake-heres-how-to-keep-media-safe-405132-2023-11-09

11 November, 2023

Indians receive 12 scam messages daily says survey, exposes 5 common tricks

Arecent survey reveals that Indians receive almost 12 scam texts or emails daily. These, often disguised as "legitimate communication," lead to considerable stress and financial strain, as consumers spend an average of 1.8 hours each week verifying message authenticity, News18 reported.

According to McAfee 2023 Scam report, Surveying over 7,000 adults across seven countries, including India, the study delves into the escalating sophistication of scam messages driven by artificial intelligence (AI). The findings underscore the urgent need for AI-driven defence solutions to combat the rising wave of AI-powered scams.

09 November, 2023

OpenAI has released a new tool that will let you build your own ChatGPT

OpenAI conducted its first-ever developer conference on Monday. Along with many new announcements in and around its language model, OpenAi has unveiled a new platform that allows users to create customised versions of its popular AI chatbot, ChatGPT. This development was announced at the DevDay conference held in San Francisco. Sam Altman took to the stage even to build a custom GPT in real-time using the GPT builder. The interesting bit is that developers will not have to code these changes, the prompts were given in simple language. The new GPT builder tool is exclusively available to ChatGPT Plus subscribers. 

https://www.msn.com/en-in/money/topstories/openai-has-released-a-new-tool-that-will-let-you-build-your-own-chatgpt-see-how-it-works/ar-AA1jv8tR?ocid=finance-verthp-feeds

07 November, 2023

Clean Your System and Free Disk Space

When your computer is getting full, BleachBit quickly frees disk space. When your information is only your business, BleachBit guards your privacy. With BleachBit you can free cache, delete cookies, clear Internet history, shred temporary files, delete logs, and discard junk you didn't know was there. Designed for Linux and Windows systems, it wipes clean thousands of applications including Firefox, Adobe Flash, Google Chrome, Opera, and more. Beyond simply deleting files, BleachBit includes advanced features such as shredding files to prevent recovery, wiping free disk space to hide traces of files deleted by other applications, and vacuuming Firefox to make it faster. Better than free, BleachBit is open source.

Features
BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy.

Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy.
Simple operation: read the descriptions, check the boxes you want, click preview, and click delete.
Multi-platform: Linux and Windows
Free of charge and no money trail
Free to share, learn, and modify (open source)
No adware, spyware, malware, backdoors, browser toolbars, or "value-added software"
Translated to 65 languages besides American English
Shred files to hide their contents and prevent data recovery
Shred any file (such as a spreadsheet on your desktop)
Overwrite free disk space to hide previously deleted files
Portable app for Windows: run without installation
Command line interface for scripting and automation
Write your own cleaners using CleanerML , a XML-based markup language
Automatically import and update winapp2.ini cleaner files (a separate download) giving Windows users access to 2500+ additional cleaners
Frequent software updates with new features

05 November, 2023

The 18 mistakes you're making online, according to an 'ethical' hacker

A hacker shares their secrets to help you stay safe

With more of us doing our banking and other financial transactions online we need to make sure we're doing all we can to prevent our personal information from being stolen. We spoke to a professional "ethical" hacker, who hacks into clients’ websites, networks, and phone applications for a living. He gave us his top tips to make sure you don't fall victim to theft. Read on to find out the mistakes you might be making and how to best protect yourself and your personal information.

https://www.msn.com/en-gb/money/other/the-18-mistakes-you-re-making-online-according-to-an-ethical-hacker/ss-AA1iKBjn?ocid=finance-verthp-feeds

03 November, 2023

Data Breach Of 81 Crore Indians: What Has Been Leaked?

In a massive data breach, personally identifiable information of 81.5 crore Indians has been up on the dark web for sale, according to areport by US-based cybersecurity firm Resecurity. The stolen data includes Aadhaar and passport details, names, phone numbers, and both temporary and permanent addresses of crores of Indians.

As reported by Resecurity, on October 9, an individual using the pseudonym "pwn0001" made a post on Breach Forums, a darknet crime forum, where they offered access to a dataset containing 81.5 crore records with information related to "Indian Citizen Aadhaar and Passport." When Resecurity reached out to the hacker, they were open to selling the complete Aadhaar and Indian passport dataset for $80,000 (Rs 66,60,000).

Decode spoke to two cybersecurity experts who told us what this could mean.

https://www.msn.com/en-in/news/India/data-breach-of-81-crore-indians-what-has-been-leaked/ar-AA1j9363?ocid=msedgntp&pc=EDGEDB&cvid=0a4046c0b6d44fbfb0736f3d0d9485f3&ei=7

01 November, 2023

Is your name in the voter list?

Generally after the declaration of the final voter list the names of voters are required to be checked.
However.. in the current situation of lack of leisure, many people are not looking into it.
The list is not available in some places.
On the day of polling, we go to vote, complain that there is no vote, and argue with the officials.
It is better to check now to avoid such a situation.
If not, the officials say that voters should check the names in the list immediately as the registration is open till November 31.
The list can be checked through a handheld device without having to go anywhere.
If you open the web page https://electoralsearch.eci.gov.in/ in Google, select the state, district, constituency and enter your name or mobile number or voter epic number, it will be known whether your name is there or not.
Officials say that alloting 5 minutes is enough. Better check it out anyway.