If you have given interviews in Ahmedabad / other cities, IT companies ask you to sign bond. When you ask them what is bond they will tell you it is for company safety and your 1 or 2 years commitment. Beware, it really means that they will not pay your 2 months salary and file case to recover money against you if you leave companies before bond period / they throw you out. Also IT companies can give you 2-3 people’s work to save money. And now you are stuck.Continue reading
I will be showing you how to build a wifi robot from scratch. It is a very straight forward project and can easily be handled by a intermediate robot builder. To complete the robot, it will take a couple of hours. I also attached the android phone with this app ip camera with this robo and connected to the wifi to see live video feed. We need to reduce `Beacon Interval` to 40 instead of 100 (default) if we are using wifi router to command robo with pc/laptop to see real time effect.Continue reading
Early this year, the U.S. Congress rolled back Internet privacy rules, giving service providers free reign to track, store and sell browsing data. In July, the U.S. Department of Justice (DoJ) issued a warrant to DreamHost, asking for a list of everyone who visited DisruptJ20.org — a site used to plan protests at President Trump’s inauguration. Both events raise important questions about online privacy, and many consumers are turning to Virtual Private Networks (VPN).
More private than private browsing
Firefox private browsing with tracking protection is great at protecting you from invasive trackers and keeping your browser history secret, but when you surf the web, you leave footprints that Firefox can’t erase — your IP address is logged at the sites you visit and your ISP may keep records. That usually isn’t an issue, but the sites you visit could expose you to unwanted attention from government agencies or even hackers. A VPN can hide those footprints from prying eyes and add an extra layer of security against hackers.
A long time debate ends here. A book or a Computer/Phone screen what should be used for reading. This research says it all and the paper book wins. Read the full article here.
Most common 4 types of personalities stated by Carlo M. Cipolla are as follows.
How would you categorize them if get the chance to describe someone’s personality on first encounter. You should read this interesting article if u want to learn this magic. And I will try to describe this in short.
Lets Take an example, If a person is selling second person a goat, he may act as follows
- Helpless – suffer loss
- Bandit – trying to sell overpriced
- Intelligent – looks where both can get a happy deal
- Stupid – cause lose to both parties.
Now you know what these 4 types of personalities are, hurry and take notes when u negotiate with someone. Thanks for reading here is the link.
Get email address from log file
grep -E -o “\b[a-zA-Z0-9.-][email protected][a-zA-Z0-9.-]+\.[a-zA-Z0-9.-]+\b” emails.log > email.log
People talking on many forums that chrome or firefox like browsers are sending data to their server, and making the service very insecure. In many forums people are talking about building their own browser and services but its very tedious task.Continue reading
You are browsing this post and almost all the websites in the world keep log of your activities and browser information. They can identify who you are and what you are reading/searching.Continue reading
First check if have set up ssh-keygen Or set up with this command
ssh -T [email protected]
Then Check if ssh-Agent is working
If not then start with this command
eval `ssh-agent -s`
Now get you .pub create file in ssh-keygen process and paste content in but bucket