Email temporarily to avoid spam

Email temporarily to avoid spam
4.9 (17) 97.65%

Temporary Email, permanent email saver

Anyone using an email address knows that at some point, after a while of use, the email box is filled with spam (unsolicited email) with all kinds of offers or who knows what products.

We come to this situation because, over time, we've used our email address too lightly and left it on all sites, and now the email box sinks into spam.

Why is spam coming to our email address?

Even if you left your email address on just a few sites, apparently trusted, after a while you notice that spam comes from many more sources.

Spam has several causes:

Websites exchange email addresses between them.Sites sell email addresses to marketing companiesSites can be broken by hackers who steal email addressesApplications installed on phones that have access to contacts

Temporary email, the best weapon in the fight with [...]

Encrypt Whatsapp and Messenger conversations

Encrypt Whatsapp and Messenger conversations
4.1 (9) 82.22%

Encrypt Whatsapp and Messenger conversations

Status of conversation encryption in applications.

Nowadays all chat services such as Whatsapp, Messenger, Hangouts, provide us with encryption methods that make our conversations free from third-party eyes.

What does this encryption mean?

Encryption and decryption are techniques by which a text or data is hidden under inconspicuous characters using encryption keys that use different text or data streaming methods.

Silent Encryption Example:

Let's say we want to encrypt and send the text "SALUT". By using some keys, we make the word "SALUT" replace with "Hi7 = FwU-23" which is a meaningless string.

This meaningless character string can be decrypted using a key, and the person receiving the message will see "SALUT" instead of "Hi7 = FwU-23".

What's the problem with encrypting applications such as Whatsapp, Messenger, etc.

The basic encryption of Whatsapp, Messenger, Hangouts will only keep you from the eyes of a [...]

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
4.2 (14) 84.29%

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
In the last few years, people have to do with viruses, spyware and other malicious new programs that have become more and more sophisticated and can hardly be intercepted by an antivirus.
Antivirus programs treat us like sheep!
I do not know if you have any idea how an antivirus program works. If you do not know, I will tell you, because it is quite interesting the method that large IT security companies apply.
First of all we are treated like a flock of sheep, and the wolf is the virus.
We are collateral victims.
From a few flocks, the virus will attack one computer at a time. Infected computers will report to the base, and the specialists there will try to find solutions for the annihilation of the virus as soon as possible. More exactly […]

USB stick password - portable safety

USB stick password - portable safety
4.5 (12) 90%

Password on USB stick

USB stick password - portable safety

The need to keep data safe is becoming increasingly important, especially in the context of data leaks, the collection of unlimited data or computer attacks of any kind.

Our data is almost 100% in digital format

People begin to realize (very late) that the data they generate every second goes into the property of other entities every passing day.
From files stored locally on the PC, I migrated to the "unconscious" in the cloud. Now almost all of our data is on Facebook, Google, Microsoft, Apple, Amazon, etc.

Local files - what's in your hand is not a lie!

I think we still need to keep some files locally, and to be as safe as possible, we need to use encryption methods. The problem is that these encryption systems are either too free and complicated, or simple but expensive. What the […]

How to find out if your email and password are hackers

How to find out if your email and password are hackers
4.4 (11) 87.27%

How to find out if your email and password are hackers

How to find out if your email and password are hackers

Today it is increasingly difficult to keep our data safe; especially email and password, which we use more everywhere.

When we make an account, we have a blind trust

Every time you make an account, you must "legitimate" with something, either with your phone number, or with your email address, or with your Google, Facebook, Twitter, etc. account.
All would be good if the site you account for would be 100% focused on the security of the data in their possession.

The worst thing is, all accounts are based on an email address

If you now want to log on to a site, you automatically log in with Facebook, but this Facebook is also based on an email address, [...]

Digital Model Publishers School Scheduler - School Time Editor

Digital Model Publishers School Scheduler - School Time Editor
4 (8) 80%

Schedule Digital Model Editor

Schedule editable digital editing editor.
Old school timetable (analog)
It's easy to make a schedule, you only need a sheet of paper and write course hours and entry hours in a few minutes. This is the analogy!
Digital Timetable (for wallpaper or share)
I'm going to show you today how to make a digital and even editable schedule, all very simple in a friendly interface that helps us finish the job in minutes.
School timetable editor
Merit is not mine, but the person who made the schedule, from https://www.diana-ionescu.ro/orar/. Everything is simple and extremely friendly, even for those who have no experience in the field.
How does the school timer use it?
From the beginning I have to tell you that you do not have any software to install. This is a web application running from a site in your browser.
To make a model of school timetable, [...]

How to change the basic application to open files on Android

How to change the basic application to open files on Android
2.4 (18) 47.78%

How to change the basic application to open files on Android

How to change the basic application to open files on Android
A computer does not know what we want to do when we click on a file to open it.
Let's say we have a video file that we want to open with VLC media player. Your computer or mobile phone needs to know the basic path of opening files, that is, a rule the user requires and the PC or the phone must follow.
How do I open a file with another app?
If on Windows is simple, than right click / open with / and choose from list; on Android we can not do this so easily; it can but is more complicated.
How do I choose the basic path for opening different file types?
On Android, like this is the operating system in question, we will notice that every time we open [...]

Transforming digital books into some kind of audio books (in the car, in the headphones)

Transforming digital books into some kind of audio books (in the car, in the headphones)
4 (12) 80%

Transforming digital books into some kind of audio books

Many say that nothing compares with reading a true book. I would say the experience is somewhat similar to an ebook reader, except perhaps the smell and the rustle of paper. I think the scribes at the time of the printing press were so. Regardless, the book, but not any book, makes you something more "unprotected," and that's good, I say.
Now, in these agitated times, we are dealing with something else; Man has no time for anything and if he wants to read a book, he has to do it in the dead times between service, school, home, etc. Here comes the "book" in the audio format, or the audio book, which helps you put in hands free hands and eyes free, a lot of information.

The problem is that we do not have too many audio books in Romanian.

How is it about us, things [...]

How to download pictures, videos and other data from Apple iCloud

How to download pictures, videos and other data from Apple iCloud
3.9 (12) 78.33%

How to download pictures, videos and other data from Apple iCloud

Joy for everyone who has an iPhone or iPad. Apple lets us download the data we have collected over time on their servers in Apple iCloud.

Good parts of the GDPR

In keeping with the new European regulations, Apple provides us with a page from where we can download our data that we have collected over time on their servers. It's a normal thing if we take into account that most of the giants have made such options available to users.

Downloading data from servers ...

If you want to download data from different internet service providers, you can watch our tutorials on this topic.
Deleting Facebook data safely - likes, posts, friends, etc
How can you download your photos and videos from Instagram?
Download YouTube channel with all the original files
Yahoo is dying, transferring data from Yahoo to Gmail
Unlimited online storage on Google Drive

How do I download Apple iCloud data?

1. Go to [...]

Orange Privacy Settings

Orange Privacy Settings
5 (7) 100%

Orange Privacy Settings

New settings appeared in Orange account.

Orange Privacy Settings. Settings that allow us to agree or not to process personal data. This is a good thing, especially for those who do not want to receive all sorts of calls and SMS from the "partners" of the provider.

Last time, we showed you the settings in your Telekom account.

In the tutorial How do you stop calls and SMS messages on Telekom, we showed you that we can accept or deny certain settings related to processing your personal data.

What about these settings?

Until now, companies could use your personal data as they please. They could use the data in different studies, surveys, offers, etc. They could make available to your other companies your data (these are the "partners"), companies that were usually advertising companies, marketing departments, etc.
That's why you got calls and [...]