Get Mystery Box with random crypto!

ITeach

Logo of telegram channel iteach_worlds — ITeach I
Logo of telegram channel iteach_worlds — ITeach
Channel address: @iteach_worlds
Categories: Technologies
Language: English
Subscribers: 11.36K
Description from channel

Telegram media about cybersecurity and IT technology
Cooperation: @alfiesss
Buy Ads: https://telega.io/c/ITeach_worlds

Ratings & Reviews

4.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

1

2 stars

0

1 stars

0


The latest Messages 13

2022-04-30 17:28:06
How to block access to a smartphone microphone.

You can get rid of wiretapping forever with the Micro Guard FREE app for Android. It securely locks the microphone so that no applications can access it.

To use, you need:

Download the app from Google Play.
Open, move the slider to the "ON" mode and click on "Scan for spies".
Then click on "Fix all problems".
Allow to enable the "Deep detective" function. It will help to record attempts to gain access to the microphone without your knowledge.

#security
1.1K views14:28
Open / Comment
2022-04-30 13:17:00
The biggest orgy
This record was broken by the Japanese. They just found a large empty warehouse, installed cameras for recording and invited them there...
Read on the RECORD channel

The biggest vagina
The owner of the largest vagina is considered to be the Scottish Anna.
Read on the RECORD channel

The longest masturbation in the world
Masanobu Sato from Japan made his country proud that he was able to put himself in the Record Book, and his record cannot be broken for more than 7 years.
Read on the RECORD channel

Subscribe to the RECORD, you will be the first to know about the new crazy records, the craziest and most unusual people on the planet.
1.4K views10:17
Open / Comment
2022-04-29 20:00:14
How to damage your file so that no one can open it.

Actual: you have not done your homework, and the teacher is waiting for the finished work. Or the project is not ready, and the boss is waiting for completion. To make excuses to a person, there is a simple and proven way — to damage the file so that the recipient does not open it.

The free site Corrupt a file is designed with this purpose in mind. Plausibly name any file, send it to the site and wait a couple of seconds — the service will return an already damaged document.

If you try to open the file, a technical error will pop up. Download the received file or instantly send it to the cloud storage — and you're done!

#service
564 views17:00
Open / Comment
2022-04-29 16:00:05
How to protect your Windows 10 PC from password guessing.

For this you need:

Open "Local Group Policy Editor" (Win + R; gpedit.msc),
Go to "Computer Configuration" -> "Windows Settings" -> "Security Settings" -> "Account Policies" -> "Account Lockout Policy".

This section will contain three parameters (set the desired values ​​for them): account lockout duration — the time in minutes for which the account will be blocked after exceeding the limit of attempts; account lockout threshold — the limit of password attempts; reset account lockout counter after — the time in minutes before the number of unsuccessful password entry attempts is reset.

#security
882 views13:00
Open / Comment
2022-04-29 13:00:08
How to check if a site is safe.

Use the Urlscan.io service. In a few seconds, he will completely scan the site in as much detail as possible. You will find out all the useful information — the IP addresse of the page, the number of cookies and dangerous activities, the weight of the site, its screen and protocols.

The most important thing — in the item "urlscan.io verdict" — is the verdict whether the site is safe or not. If everything is green and there are checkmarks everywhere, then feel free to use the site. If not, close the malicious page and scan your computer with an antivirus by changing passwords.

#security
958 views10:00
Open / Comment
2022-04-29 12:01:42
The capital of the United States?
1.0K views09:01
Open / Comment
2022-04-29 09:57:22
How to find out who uploaded your documents or photos to the network.

This will help LeaksID — a service that allows you to mark confidential documents with invisible tags.

How it works:

We go through a quick registration, upload important documents, and the site will mark them with invisible trackers.
Then we calmly send the created copy with tags to a suspicious site or person.

If the interlocutor takes a screenshot of your file, sends it to a third party, or even just prints it out, LeaksID will recognize the source of the leak and inform you.

#security
1.1K views06:57
Open / Comment
2022-04-28 20:00:34
How to hide media files in a double bottom calculator.

You can do this using the Photo Vault Calculator app for Android or Calculator# for iOS. They can be used in many ways: from simple protection of personal photos from prying eyes, to hiding files, for example, when a smartphone is examined by customs officers.

iOS instruction:

Download the application from the App Store.
Go into it and select “Calculator".
Enter the password and click on "%".
Select the type of file you want to hide.
Import the file.

Ready!

#service
1.5K views17:00
Open / Comment
2022-04-28 16:00:11
How to create a hidden Telegram account.

The Postufgram application supports the "double bottom" function: these are independent accounts protected by different passwords.

To use, you need:

Install the app via Testflight on iOS.
Enter the Postufgram program.
Go to "Settings" → "Privacy" and click on "Double Bottom".
Attention: the button will disappear a minute after logging into your account.
Follow further instructions.

#security
1.6K views13:00
Open / Comment
2022-04-28 14:00:10
How to create your own VPN to protect against leaks in a couple of clicks.

Even without programming knowledge, you can do it in a few minutes using the Outline Manager.

Simple instruction:

After launching Outline Manager, click on "Create an account".
Next, we go through registration, you will be asked for standard questions and asked to enter a payment card.
After completing the registration, select the country closest to us.
Next, the setup will take place, then we click on "Add key" and send ourselves a link to access the VPN.

It's all! The control panel has all the information about how much traffic is used and how many devices are using your VPN.

#security
1.6K views11:00
Open / Comment