This blog provides free expert advice on personal development, productivity, digital marketing and more. Access actionable insights to boost your career, enhance skills, and simplify life today!

Showing posts with label tech tips. Show all posts
Showing posts with label tech tips. Show all posts

Steps To Fix Water Damaged Phone

🎁 Steps To Fix Water Damaged Phone 


➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖

1 Firstly turn it off immediately

2  Now remove all the accessories like battery, Sim card, Memory card and cover

3  Use a cotton cloth, toilet paper or napkin to soak water from your phone and soak as much as possible

4 Now wrap your phone in a tissue paper and remain it for some time

5 Bury the phone in a ziplock bag full of uncooked rice. Rice is great for absorbing liquid and this is actually a common method for drying smartphones and tablets.

6 Now let the phone dry for one or two days and don’t try to insert battery or switch it on before 2 days

7 You can also you silica gel pack instead of rice as silica gel pack has more power to absorb water as compared to rice.These gel packs are mainly used in shoe boxes

8 After a couple of days, you can remove the phone from the rice back, insert the battery into the phone and switch the phone on.

9 If your phone doesn’t turn on, try charging it. If it doesn’t charge, the battery may be damaged. You could try a replacement battery, or consider taking your smartphone to a repair shop to be checked by a professional.

🔟 If your phone has turned on and it is running as it should, you should still keep a close eye on it for the next few days, to see if you notice anything out of the ordinary. Play some music to check the speakers and ensure the touch screen still responds as it should.

 
➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖➖
Thank for read my post.

Disable Any Pre-Installed System App On Android Without Root

🔰 Disable Any Pre-Installed System App On Android Without Root 🔰


 💢Follow this tutorial to get ADB up and running on your Windows, Mac, or Linux PC. ADB, or Android Debug Bridge, is a developer tool that lets you issue some powerful commands to control your device. We use it a lot in our tutorials to do things that you otherwise can’t do without a rooted device.

❗️Download an app like App Inspector from the Google Play Store.
❗️Get the package name of the app you want to disable using App Inspector.

❗️Launch a Command Prompt/PowerShell (Windows) or Terminal (Mac/Linux) in the directory where you stored the ADB binary. For Windows users, this can be done by holding shift then right-clicking in the folder. In the menu, select the “open command window here” or “open PowerShell window here” option.

❗️Opening command window on Windows 10


❗️Once you’re in the command prompt or terminal, enter the following command depending on your OS:
Windows Command Prompt: adb shell pm disable-user --user 0<package_to_disable>
Windows PowerShell: .\adb shell pm disable-user --user 0<package_to_disable>
Mac/Linux Terminal: ./adb shell pm disable-user --user 0<package_to_disable>For example, here’s what it looks like if you wanted to remove Cleanmaster (com.miui.cleanmaster) which comes preinstalled as part of MIUI on the Xiaomi Mi Mix 2S:
Windows Command Prompt: adb shell pm disable-user --user 0com.miui.cleanmaster
Windows PowerShell: .\adb shell pm disable-user --user 0com.miui.cleanmaster
Mac/Linux Terminal: ./adb shell pm disable-user --user 0com.miui.cleanmaster

And we’re done! The app should immediately become disabled and will disappear from your launcher. Do note that on rare occasions, some apps may automatically be re-enabled if the system has a function to re-enable it. For example, disabling the stock EMUI 9 launcher on Chinese Huawei or Honor devices will result in the stock launcher become automatically re-enabled after some time. If that bothers you, try the “uninstall” methodⓂ️


Thanks for read my post

How to backup registry - tips free mai

How to backup registry

 
Before you edit the registry, export the keys in the registry that you plan to edit, or back up the whole registry.

If a problem occurs, you can then follow the steps how-to restore the registry to its previous 
state.

How to Export Registry Keys
Click Start, and then click Run.

In the Open box, type regedit, and then click OK.

On the File menu, click Export.

In the Save in box, select the boxs at the bottom the bottom according to weather you want to export all or only selected branches of the registry.

Next select a location in which to save the backup .reg file. In the File name box, type a file name, and then
click Saved.

How to Restore the Registry
To restore registry keys that you exported, double-click the .reg file that you saved.


Thanks for read my post...

HOW TO SAVE A WEB PAGE TO PDF File




   🔰 HOW  TO  SAVE  A  WEB  PAGE  TO  PDF  File 🔰

💢1.Open any browser (GoogleChrome or Mozilla Firefox)on your PC or MAC.

2.Then go to the web page or website that you want to convert .

3.Now press Ctrl+P on Windows PC or Command+P if you are on a Mac to Open the the Print dialog on Chrome Browser (orgo to Settings and click on Print).

4.Now Change the destination to “Save As PDF” and hit the save button.

5.The current web page will instantly be downloaded as a PDF document.

Ⓜ️ If you follow the given steps correctly,then you can also convert those webpages into PDF format within minutes.

Thanks for read my post...

How to Protect Yourself from Keylogger Attacks

 🔰 How to Protect Yourself from Keylogger Attacks 🔰


And that's how easy it is for hackers to see and record every keystroke you press on your computer. When a hacker has an unnoticed backdoor on your computer, anything is possible, but there are a few things you can do to minimize the risk of having your keys captured:

🔸Use antivirus software. While there's not a catch-all solution, and antivirus software won't protect against sophisticated and cutting-edge keyloggers, there's still no excuse for not using antivirus software which protects against most known keylogger software.

🔸Use on-screen keyboards when entering passwords.One of the limitations of most keyloggers is that they only capture actual keystrokes being pressed on the keyboard. The Windows on-screen keyboard will provide a virtual keyboard that may help circumvent keyloggers.

🔸Use a firewall. It's possible lazy attackers won't go through the effort of disguising their payloads to appear as being normal DNS (port 53) or HTTP (port 80) transmissions. A firewall might catch suspicious packets leaving your computer on port 35357.

🔸Protect your computer against backdoors. While all of the above is helpful when you're already backdoored, the best thing to do is make sure you're not exploited in the first place.

Thanks for read my post...

📌 Share to help us 📌