admin

Delete-Uninstall-Open-Mac-Application

How to Completely UnInstall & Open an App Using Mac Terminal

When using a Mac computer, you can use the Terminal to open an app, as well as uninstall & deleting the app.

This article will show you how to;

  • Use Mac Terminal to Uninstall and Delete an App
  • Use Mac Terminal to Open an App

How to Uninstall and Delete an App using Mac Terminal?

To open the Mac Terminal app, go to Spotlight Search (magnifying glass icon on the top-right) and type <Terminal>.

Use the following command to uninstall and delete an app.

sudo uninstall VLC.app

Replace <VLC.app> with the application that you want to uninstall.

  • Always use a .app extension at the end of the app name
  • To know the exact name of the app before typing it into Terminal, you can go to Finder > Applications

Alternative Methods

Here are the other different ways you can delete an app from a Mac computer

S/noMethodComments
1Use CleanMyMac or MacKeeper to uninstall and delete an app from your Mac completely.Cleanest Method
2Drop the App into the TrashSimplest Method

How to Open an App using Mac Terminal?

Here are the three (3) steps to do so.


Step 1. Navigate to the /Applications folder

mac-terminal-navigate-applications-folder-open-uninstall-apps

Open the Terminal app, type the following command and hit <Enter>;

cd /Applications

You will be in the main Applications folder, where all your apps are installed.

Step 2. List all the names of the apps

list-apps-ls-command-mac-terminal-open-uninstall-applications-folder

Before you open an app, you may want to know the exact name.

List down all the apps on your Mac using the following command and hit <Enter>;

ls

Step 3. Open the app you want

Now you know the exact name of the app, to open it, use the following command;

open VLC.app

Your app will now be launched. You can check for it on your dock.

Note that apps are all case-sensitive. So, for example, a capital “V” is not the same as a small letter “v”.

mac-terminal-open-vlc-application

How to Completely UnInstall & Open an App Using Mac Terminal Read More »

WhatsApp-View-Once-Privacy-Self-Destruct-Disappearing-Photo-Video-Media-File

3 Steps to Send WhatsApp Disappearing Photo [View Once]

Since 2021, Whatsapp has rolled out its privacy feature, “View Once”, to all iOS and Android users.

View Once is a new feature where you can send self-destructing media (only photo and video files) to your WhatsApp contact. However, the recipient can only view it once and can’t take a screenshot, save or view it for a second time.

This privacy feature is similar to Telegram (Secret Chat mode), Snapchat, etc.

| Related Posts |
How to Bypass WhatsApp View-Once Screenshot Restriction

How will the Media File Disappear?

Once the recipient opens the media file and exits it after viewing it, it is automatically deleted from both the Sender’s and recipient’s devices.

Also, if the media file is unopened after 14 days of being sent, it will be automatically deleted as well.


Can You Know If the Receiver Viewed the Media File?

This is what you see as a Sender.

When you send the view-once file, you will see it as <Photo> or <Video>, depending on which file type you are sending.

whatsapp-view-once-photo-file-name

When the recipient opens your file, it will be changed to <Opened>.

whatsapp-view-once-changed-to-opened

How to Send “View-Once” Disappearing Media File in WhatsApp?

Here are the three (3) easy steps to do so.


Step 1. Attach the media file

whatsapp-attach-file-view-once-feature
  • Click the attachment icon below and select <Gallery> to choose either a photo or video to send.

Step 2. Tap the View-Once icon

  • Click on the view-once icon 1
whatsapp-view-once-icon
  • The icon will turn green to confirm that the media file is now a view-once attachment.
whatsapp-view-once-icon-turned-green

Step 3. Tap Send

  • Click <Send>
  • Double blue ticks beside the attachment mean that the recipient has opened WhatsApp but has not yet viewed the photo.
  • When the attachment is renamed <Opened>, the recipient has already viewed the media file.

Is it possible to save the media file or take a screenshot before it disappears?

Yes, it is possible to bypass the WhatsApp view-once restriction using several methods if you intend to do so.

WhatsApp does not allow the recipient to take a screenshot of the view-once media file. In addition, the recipients cannot save a copy of it, copy it, share it, or forward it to anyone.

When opening the view-once attachment, the recipient can only perform the following;

  • Delete it
  • Report the media file as Spam
  • Block the contact

3 Steps to Send WhatsApp Disappearing Photo [View Once] Read More »

best-fastest-web-browsers-for-macOS

7 BEST Web Browsers for macOS Monterey: [Fastest Speed Test]

We installed several popular web browsers on a MacBook, running the latest macOS Monterey, and put them into three (3) different benchmark speed tests to find out which is the fastest and lightest web browser for Mac devices.

The environment for the benchmark speed tests is as follows;

  • Laptop used: Macbook Pro (16-inch, 2021 model), running Apple M1 Max chip with a memory RAM of 64GB.
  • Condition: No other running applications present except the web browser and no other browser tabs except the speed test site

The benchmark sites used for the web browser speed tests are;

S/noBenchmark siteTest Measurements
1JetStream2Measures the browser’s ability to start up quickly, execute code speedily and run smoothly
2SpeedometerMeasures the browser’s Web app responsiveness
3Speed BattleMeasure the speed of Javascript in the browser

Web Browsers Speed Test Results

The table below shows the results for the seven (7) web browsers used in the MacBook.

The higher the score number, the better the results for all the benchmark tests.

S/noWeb BrowserJetStream2SpeedometerSpeed Battle
1Safari267.916375 runs/minute2423.48
2Vivaldi256.582282 runs/minute1448.09
3Brave221.081313 runs/minute1151.98
4Microsoft Edge219.203291 runs/minute1125.83
5Google Chrome214.344286 runs/minute1151.67
6Opera210.087270 runs/minute1124.16
7Firefox156.219222 runs/minute1233.83

Which Web Browser is the Fastest & Lightest for macOS Monterey?

Our speed test results showed that Safari is the fastest and most lightweight web browser when you are using a macOS computer, e.g. a MacBook, iPhone, iPad, etc.

1. Safari

The Fastest and the BEST Web Browser to run on any macOS device.

safari-web-browser

Safari scored the highest in all three (3) speed tests.

Safari is the fastest to start up quickly based on the JetStream2 results, scoring 267.916.

safari-web-browser-jetstream2-speed-test-results

The web browser clocks a high 375 runs/minute on measuring the web app’s responsiveness using the Speedometer’s speed test.

safari-web-browser-speedometer-speed-test-results

It also has the fastest speed of running Javascript in its browser, scoring 2423.48 using Speed Battle’s test.


2. Vivaldi

Ranked 2nd in the JetStream2 (fast startup) and Speed Battle (Javascript speed) speed tests

vivaldi-web-browser

Vivaldi’s newest update supports Apple’s M1 computers, giving itself a significant boost in speed and performance.

The web browser has several efficient features, such as the

  • Built-in calendar, mail client, translator, ad blocker and many more
  • Intelligent resource management for a faster browsing experience
  • Tab management for users to unlimited group tabs into 2-level stacks
  • Privacy browser as it does not track users’ behaviour
  • Syncing across different devices from different operating systems

3. Brave

Ranked 2nd in the Speedometer test, which measures the browser’s web app responsiveness

brave-web-browser

Started in 2015, the privacy-focused Brave web browser has hit 50 million monthly active users since January 2022.

The web browser, by default, blocks trackers and ads on every website you visit while allowing users to opt-in to earn their cryptocurrency token, called the Basic Attention Token (BAT), by watching privacy-respecting ads.

BAT tokens can be stored in the browser’s built-in Brave wallet, sold in exchanges or used to swap for other crypto tokens.

Some of Brave’s features are;

  • Block cross-site trackers and invasive ads
  • Block cookies
  • Block Fingerprinting
  • Malware and phishing protection
  • Anonymized Network Routing (TOR mode)

4. Microsoft Edge

microsoft-edge-web-browser

Starting in 2015, Microsoft Edge is the web browser created to replace the old Internet Explorer.

The web browser works with various operating systems, e.g. Windows, macOS, iOS, Android devices, Windows Servers and even Linux machines.

Some of Microsoft Edge’s features are;

  • Kids Mode – For kids with built-in protection and custom designs
  • Personalized gaming homepage with exclusive XBOX content
  • Productivity features like vertical tabs and immersive reading mode
  • Security features like password breach monitor and inPrivate tab for privacy surfing

5. Google Chrome

google-chrome-web-browser

If you are running on Windows or Linux machines, you should probably get a Google Chrome web browser.

The web browser is engineered for speed and security with automatic updates to keep your surfing safe and secure.

Some of the useful features of Chrome as;

  • Built-in Safety Checks notify users if passwords are compromised and if browser extensions are a security risk
  • Built-in Privacy controls allow users to set their privacy level, e.g. clear browsing history, control website access permissions like webcam, etc
  • Password syncing across devices when users sign in to their Chrome account
  • Plenty of Chrome extensions add-ons

6. Opera

opera-web-browser

The Opera project started in 1994 and was considered one of the pioneers in web browsing.

The Opera browser supports Windows, macOS, Linux, Chromebook, Android and iOS. Besides the main browser, the company offers Opera GX for gamers and Opera Mini for a light data-saving browser.

Some of Opera’s features include;

  • Built-in Ad Blocker, which is customizable
  • Built-in Integrated Messengers. e.g. Facebook messenger, Whatsapp, Telegram
  • Secure encrypted file-sharing between connected devices
  • Optional VPN feature

7. Firefox

firefox-web-browser

Started in 2004, the Mozilla Firefox web browser was created to achieve a faster and more privacy-focused surfing experience for users.

In fact, users of Firefox stick by their browsers due to the fact that it is highly configurable in its settings. You can set and customize almost any aspect of the web browser.

Some of the features of the Firefox web browser include;

  • Picture-in-picture mode for easy streaming and multitasking
  • DNS over HTTPS (DoH) prevents internet service providers from selling your data
  • Fingerprinting and crypto mining blocking
  • Plenty of browser extensions add-ons
  • Sync across devices

7 BEST Web Browsers for macOS Monterey: [Fastest Speed Test] Read More »

digital-forensics-tool-software

7 BEST Digital Forensics Tools [Mobile, Mac, Cloud, Window]

The field of digital forensics is used by law enforcement agencies when it comes to criminal investigations to extract evidence, as well as in the private sector, where incidents such as data breaches, litigation, inside threats, fraud, etc., require the need for forensics investigations to find out the truth.

The sub-discipline of digital forensics includes mobile forensics, cloud forensics, memory forensics and many more.

Every digital forensics tool has its own strengths when it comes to examining the different types of devices. There are always specific forensic tools that cater for a specific operating system.

Not to be confused with data recovery, the four (4) steps involved in a digital forensics scientific methodology begin with;

StepsStage/sComments
1CollectionThe proper seizure procedure of devices to prevent physical damage and/or file contamination
2PreservationThe forensic process of acquiring (imaging) a forensic image of the device
3AnalysisThe examination stage to uncover any inculpatory or exculpatory digital evidence using digital forensic tools
4PresentationExplaining the forensic findings, typically presented in a court of law when used by law enforcement agencies

List of the Best Digital Forensics software

Depending on the type of device and operating system you are acquiring, we can choose the best digital forensics tools for each sub-discipline of digital forensics.


1. EnCase Forensic

Court-proven computer forensic tool used by law enforcement around the world

opentext-encase-forensic-software-tool

Starting in the early days of 1998, EnCase is the pioneer in the field of computer forensics when it comes to criminal investigations and analysis.

Used by the majority of law enforcement agencies in the world, the strength of EnCase Forensic software lies in its competency in acquiring forensic images from a wide array of computer systems. It is especially good at analysing Windows operating systems and commonly-used file systems such as NTFS, FAT/FAT32/exFAT/, ext4 and many more.

EnCase Forensic – Key Features

  • Analyze data from multiple platforms—Windows, Linux, AIX, OS X, Solaris, and more
  • Uncover suspicious files, e.g. hiding, cloaking, or deletion
  • Manage large data volume, including deleted files, unallocated space and file slack.
  • Indexing, keyword searching and automated evidence-processing features
  • Create exact forensic duplicates through verifiable hash values and Cyclic Redundancy Check (CRC) values
  • Easy transfer of evidence files to external parties, such as legal representatives

2. Cellebrite UFED

cellebrite-ufed-mobile-digital-forensics

Since entering the mobile forensics industry in 2007, Cellebrite UFED has been the leading market leader in this space for many years.

Cellebrite is an Israeli digital intelligence company focusing mainly on extracting data from mobile devices. The company has several offices across the world, including Washington D.C, Germany and Singapore.

The UFED capability is available on platforms such as desktop computers (UFED4PC) and a standalone handheld console (UFED Touch2).

Cellebrite UFED – Key Features

  • Unlocking of mobile devices via pattern bypass and PIN locks
  • Perform logical, file system and physical extractions
  • Use of bootloaders, automatic EDL capability, smart ADB connection and more
  • Wide range of supported mobile devices across many different brands
  • Extract evidence from mobile phones, SIM cards, drones, SD cards, GPS devices and more

3. SIFT Workstation

sans-sift-workstation-forensics

Created in 2007 by Rob Lee from SANS Institute, the SIFT Workstation is a free Linux Ubuntu distro that is packed with open-source digital forensics and incident response tools.

SIFT is designed to perform detailed digital forensic examinations and incident response capabilities, typically on computer systems. Most of the forensic tools installed onto SIFT requires some form of command-line knowledge, although there are other tools with GUI interface as well, e.g. Sleuthkit.

SIFT Workstation – Key Features

  • File system support for NTFS, raw, HFS+, FAT/exFAT, swap, RAM data and more
  • Evidence image support for E01, raw, dd, ewf, aff, vmdk, vhd, etc
  • Forensic tools installed, such as Volatility, bulk_extractor, imagemounter, libewf, Sleuthkit, RegRipper, etc

4. Sumuri Recon Lab

sumuri-recon

Sumuri’s flagship forensic suite is the Recon Lab. The digital forensics software can take in forensic images, mounted volumes, optical disk images, RAM images and its own RECON FS block image.

Recon is to be installed on a macOS machine, and it has several useful features such as skin tone detection, face analysis, RAM memory analysis, indexing and keyword searching.

Sumuri – Key Features

  • Parse and recover thousands of artefacts with Automated Analysis of macOS, Windows, Android, iOS and Google Takeout files.
  • Advanced forensic viewers for macOS plist, SQLite databases, HEX and Window’s Registry
  • Timeline support for placing events in chronological order
  • Advanced-Data Correlation feature
  • Include Paragon’s Mac Toolbox and Linux drivers
  • Integrated Report Editor
  • Support over 270 unique timestamps

5. Oxygen Forensics

oxygen-forensics

Similar to Cellebrite UFED, Oxygen Forensics is a Russian company headquartered in Alexandria, Virginia and provides mobile forensics capabilities to law enforcement, federal agencies and enterprises.

The forensic software is an all-in-one platform that can extract mobile forensic images, decode them and parse them in its interface for investigators to analyse easily. Multiple extractions can be investigated in a single Oxygen Forensic interface to have a complete picture of all the acquired data.

Oxygen Forensics – Key Features

  • File system-level extraction on most mobile devices
  • Drone forensics possible
  • Bypass screen lock on popular Android devices
  • Cloud extraction – Acquire data from cloud services and storage
  • Support import of call data records

6. Magnet Axiom

magnet-axiom-forensics

Magnet AXIOM is a forensic platform that can take in different types of forensic images (mobile, computer and cloud data), process them and present them in an analytical interface for examiners to find key evidence quickly.

The forensic tool supports the analysis of Android, iOS, Windows, macOS, Linux and extraction dumps of over 50+ cloud services.

Magnet AXIOM – Key Features

  • Analyze vehicle data with support for Berla iVE extractions
  • Dedicated artefacts support for most popular and relevant sources
  • Built-in support for GrayKey (mobile acquisition)
  • Analytics tools, such as visualizing connections between people and devices
  • Reporting and Case Sharing feature

7. FTK® Forensic Toolkit

FTK-Forensic-Toolkit

Similar to EnCase Forensic, FTK is a digital investigation solution frequently used by law enforcement and in civil cases. it is primarily used in computer forensics and is well-regarded in terms of its fast processing speed and intuitive interface. It uses distributed processing and true multi-threaded/multi-core support to ingest large amounts of digital data.

FTK Forensic Toolkit is a full disk image collection, processing and analysis solution that parses data in a forensically-sound manner. This allows investigators to preserve the integrity of the data while utilizing time to analyze files and perform advanced deep dives in areas such as data craving and file decryption.

FTK – Key Features

  • Email Analysis
  • Customizable data views
  • Indexing upfront so searching and filtering are faster subsequently
  • Ability to train FTK for facial and image recognition
  • Ability to create custom Python scripts

Bonus

Mac Target Disk Mode

apple-target-disk-mode-two-mac-file-transfer-forensics

Apple has a built-in “Target Disk Mode” feature for all their Mac series of computers. Mac users can boot into this unique startup mode that enables them to perform data transfers from one Mac to another.

The condition here is you must have two (2) Mac computers.

The Mac you initiated in the target disk mode will act as an external hard drive for the other Mac.

To begin target disk mode, do the following steps;

  • Connect the two (2) Macs with the same cable (e.g. USB C or Thunderbolt)
  • Decide on the Mac that you want to act as an external drive
  • If the Mac is Off, start it up and long-press the T key
  • If the Mac is On, click the Apple icon on the top-left > System Preferences > click Startup Disk > Click Target Disk Mode
  • You can start to transfer files by dragging them once you see the disk icon
  • Once done with the file transfer, eject the disk by dragging its icon to the Trash

7 BEST Digital Forensics Tools [Mobile, Mac, Cloud, Window] Read More »

How-to-Word-Count-on-Website

3 Ways to Count Exact Number of Words on a Website URL

In order to count the number of words on a website, there are a variety of tools you can use. This technique is called “Word Count”.

Depending on the word count you need on selected paragraphs, sentences or the entire page of a website, you will use the appropriate method stated in this article.

How to Count the Total Number of Words on a Website?

The following three (3) methods are all very easy to use and reliable as they are word count automation tools.


1. Use a Chrome browser extension

This is the most accurate way of counting words because you have to highlight the exact length of words for the tool to calculate.

Use the Chrome (or Brave) web browser and install the Word Counter Plus extension.

chrome-extension-word-counter-plus

Once installed, do the following steps;

  • Go to the webpage you want to count the words
  • Highlight the paragraph(s) you want to count
  • Right-click and select “Word Counter Plus

You will be able to see the word count instantly.

word-counter-plus-tool

2. Using other Web browsers

If you do not intend to use the Chrome browser, you can still use your favourite web browsers to highlight the selected paragraphs and do a word count using WordCounterTool or WordCounter.

wordcountertool

Using this method, you do not need to use the Chrome web browser, and you do not need to install any extensions. Instead, you can stick to your web browsers such as Firefox, Edge, Safari, etc.


3. Use online Website Word Counters

This method is the most convenient as you only need to input the URL website address, and it will automatically count the total number of words on that page.

Note that these online word counters count the entire webpage (and not selected paragraphs). It will also include the sidebars (if any), advertisements (if any), menu bar and page footers. In short, it counts everything on that page.

Note that this is not counting the entire website (i.e. all the web pages inside the website).

If this is what you want to count, use any of the below;

sitechecker-count-words-on-webpage

What’s more

If you are looking for more than just word count, you can try text analytics.

Voyant-text-analytics

Input the URL of the webpage into Voyant Tools, and you can see dashboard visualisation such as;

  • Word Cloud
  • Word Terms – frequently used words by count
  • Readability Index
  • Average words per paragraph
  • Word Links (which words are linked to each other)
  • and many more

3 Ways to Count Exact Number of Words on a Website URL Read More »

cloaking-affiliate-links-manually-without-wordpress-plugins

Cloaking Affiliate Links Without WordPress Plugin (Load Faster)

When you manually cloak your affiliate links without installing and using any WordPress plugins, your website performance will improve and load faster.

All you need to do is a few simple, easy steps, explained here in this article.

How to Cloak Your Affiliate Links Without Installing Any WordPress Plugin (Manual Way)

You can do so by quickly editing your .htaccess file. This is found inside your web hosting account, and you should use its File Manager to access it.

Here are the five (5) simple steps to do so.


Step 1: Decide on the URL Slug / Prefix

URL slug/prefix is the word you chose to distinguish easily that it is a link to an external website, typically an affiliate website.

Here are some of the URL slug/prefix examples;

https://www.ticktechtold.com/visit/affiliatesite
https://www.ticktechtold.com/go/affiliatesite
https://www.ticktechtold.com/goto/affiliatesite
https://www.ticktechtold.com/recommends/affiliatesite

You can choose your own URL slug/prefix.


Step 2: Use the File Manager from your Web Hosting

file-manager-from-wpx-hosting

Log in to your web hosting account and navigate your File Manager menu.

If you are using WPX hosting, you can go to <My Services>, <WordPress Hosting>, click on your domain name and select <File Manager> on the left-hand menu. Then, confirm by clicking on <Open File Manager>.


Step 3. Go to the .htaccess file

Now you need to find the .htaccess file inside your web hosting account. In this example, we will be using a WPX hosting account.

wpx-hosting-domains-file-manager

If you have multiple domains (websites), click on <domains>, and you need to select the right one.

If you only have one (1) domain (website), then click on <public-html).

wpx-hosting-using-file-manager-htaccess

Double-click the <.htaccess> file to open it up.


Step 4: Edit the .htaccess file

You need to insert new codes into this .htaccess file.

## refers to comments I have written, and these words will not affect the file in any way. For example, I use ## to include the words AFFILIATE LINK URLs because it is easier for me to understand the next time I need to edit this file again.

The real codes start with <Redirect 302 ……. >

## AFFILIATE LINK URLs ##

Redirect 302 /go/bluehost http://www.bluehost.com/track/affiliateuserid
Redirect 302 /go/wpxhosting http://www.wpx.net/track/affiliateuserid
Redirect 302 /go/dreamhost http://www.dreamhost.com/track/affiliateuserid

/go refers to the URL slug/prefix I have chosen, followed by the name of the affiliate brand/company. You can enter a short-form name or abbreviation if you wish.

Lastly, you need to provide the full (unique) affiliate link.


Step 5: Edit the robots.txt file

You need to disallow the rule on your robots.txt file to prevent Google from crawling, indexing, and following all your Redirects.

In Step 3, you will see the file <robots.txt>; double-click to access it.

Insert the disallow code as shown below.

User-agent: *
Disallow: /go/

Enter the URL slug/prefix of your own. /go/ is just an example here.


What are the Benefits of Affiliate Link Cloaking?

Here are reasons why cloaking affiliate links is better;

1. Easier to understand for visitors

In reality, the actual affiliate links are unique and lengthy URLs. This may confuse the visitors on where exactly the external link is heading. By cloaking it nicely, you can let your visitors see and understand them quickly.

2. Protect yourself from link theft

There are malicious malware and hacking activities out there that can steal bloggers’ affiliate commissions. The few unique ID characters in the URL are necessary to uniquely identify you as an affiliate marketer. If your webpage is compromised, the hacker can replace your affiliate ID with their own.

3. Easier to maintain when affiliate links get more

As content creators, your content may increase as time goes by. Having a neat and consistent naming for all your affiliate links is important for tracking and preventing errors. Affiliate links are very lengthy and are easier to misspell and mis-type.

4. Easier to share with others

Not all social media platforms can accommodate a lengthy URL. Twitter, for example, only accepts a maximum of 280 characters. When sharing your affiliate links in a neat cloaked URL, your links will not appear spammy and messy to others.

5. Easier Link Tracking

Using link tracking tools to analyse where your visitors are coming from, going out, session times, etc. It is very useful if you have a neat and organised affiliate link-cloaking process.


What’s more

Always use a “nofollow” attribute for all your affiliate links, as stated by Google’s guidelines.

In WordPress, when you insert a new link, you can right-click on it and select <Edit as HTML>.

edit-html-affiliate-link-wordpress

Now you can insert the “nofollow” attribute into the raw HTML code.

See the example below. The bold text is the “nofollow” attribute.

<a href="https://google.com" rel="nofollow">Google</a>

Cloaking Affiliate Links Without WordPress Plugin (Load Faster) Read More »

move-access-delete-trash-mac-using-terminal-app

How to Move, Access and Delete Trash using the Mac Terminal

You can use the Mac Terminal app for performing various daily tasks, especially deleting and emptying files.

This article will show you how to use the terminal app to move files and folders into the Trash folder and permanently delete them.

To open the Mac Terminal app, go to Spotlight search and type in <Terminal>.

mac-spotlight-search-terminal-app

Click on the Terminal.app to launch it.

How to Move Files to Trash and Empty Trash using the Mac Terminal?

Here are the three (3) ways to do so.

1. Moving Files and Folder to Trash

Using the Mac Terminal, you can quickly move files and folders to the Trash folder.

Type the following command into Terminal.

mv file.jpg ~/.Trash

Replace <file.jpg> with the actual file you want to delete.


2. Accessing the Trash

To open and view the contents of your Trash folder, you need to first grant full disk access to the terminal app.

Go to System Settings > Privacy & Security > Full Disk Access > Toggle ON the Terminal app.

mac-full-disk-access-terminal

Now, navigate to the Trash folder

cd ~/.Trash

List down all the deleted files to be emptied.

ls -l
mac-listing-ls-command-trash-folder-files

3. Emptying the Trash

To permanently delete a single file, use the following command.

rm -r file.jpg

To empty the entire trash folder, use this.

rm -rf ~/.Trash/*

If the Terminal asks for higher permissions, you can add a sudo in front. So the command will be like this.

sudo rm -rf ~/.Trash/*

How to Quickly Delete Files and Empty the Mac Trash Instantly?

Use the following command in Terminal.

rm file.jpg

This action will permanently delete the file.jpg without emptying it in the Trash can.

This is an irreversible action, so use it with caution.


How to Move, Access and Delete Trash using the Mac Terminal Read More »

cover-blog-html-add-code-wordpress-theme

Manually Add Code to WordPress Header & Footer [No Plugins]

When setting up your Google Analytics, Google Search Console, Cloudflare, or even participating in ad networks, you will often be asked to insert HTML code into your WordPress header or footer files to authenticate and verify yourself as the rightful owner of the domain.

There are only three (3) ways to do this.

Firstly, ask your web hosting service to do this for you. The downside is that you will need to give the technical support staff your WordPress (WP) login credentials. This is not entirely secure.

Secondly, install a third-party WordPress plugin. This will slow down your site, depending on how many plugins you already have. The more plugins you have on your site, the more resource-heavy your site becomes in terms of speed and performance. As a rule of thumb, three (3) plugins are generally all you need for your WP site.

Thirdly, manually insert the HTML code. You can easily add or remove code in this way. It is much cleaner than installing a plugin that inserts codes the same way but requires installation.

This article will focus on how to manually insert HTML code into your WordPress site.

How to Manually Add Code to Header and Footer in WordPress Without Using Any Plugins

Here are the four (4) easy steps to do so.

Step 1: Log into your WordPress admin site.

Login to your WordPress admin for the domain (website) you want to verify.


Step 2: Go into Theme File Editor

wordpress-appearance-theme-file-editor

Go to <Appearance> and select <Theme File Editor>.

In this example, I will be using the Astra theme, one of the fastest WordPress themes. Most WP themes will be similar, and you need to look for the Theme Editor option.


Step 3: Edit header.php or footer.php

example-google-analytics-add-tracking-code-wordpress
An example of Google analytics asking to insert tracking code into the HEAD section of the website.

Look at the right-hand side of the screen, and you will see all the theme files for your WordPress theme.

Choose header.php if you want to insert code into the header.

Choose footer.php if you want to insert code into the footer.


Step 4: Manually insert the code

Take, for example, Google Analytics, where you must insert code into the <head> section.

Open the header.php file, and look out for the opening <head> tag and the closing </head> tag.

An example is shown below. The <head> and </head> are bolded below. so you can see them easily.

?><!DOCTYPE html>
<?php astra_html_before(); ?>
<html <?php language_attributes(); ?>>
<head>
<?php astra_head_top(); ?>
<meta charset="<?php bloginfo( 'charset' ); ?>">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="profile" href="https://gmpg.org/xfn/11">


<?php wp_head(); ?>
<?php astra_head_bottom(); ?>
	
	
</head>

You will insert the Google Analytics tracking code JUST BEFORE the closing </head> tag.

This is how you paste the code below.

?><!DOCTYPE html>
<?php astra_html_before(); ?>
<html <?php language_attributes(); ?>>
<head>
<?php astra_head_top(); ?>
<meta charset="<?php bloginfo( 'charset' ); ?>">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="profile" href="https://gmpg.org/xfn/11">


<?php wp_head(); ?>
<?php astra_head_bottom(); ?>
	

<!-- Global Site Tag (gtag.js) - Google Analytics -->
<script async src="https://www.googletagmanager.com/gtag/js?id=TRACKING_ID"></script>

<script>
  window.dataLayer = window.dataLayer || [];
  function gtag(){dataLayer.push(arguments);}
  gtag('js', new Date());
  gtag('config', 'TRACKING_ID');
</script>

	
</head>

The Google Analytics tracking code is bolded above and pasted before the closing </head> tag.


Step 5: Finalize and Update the File

update-file-header-php-theme-file-editor

Once the tracking code is pasted correctly, click <Update File>, and you are done.

If you are doing this for Google Analytics, you will need to refresh the GA page, and the new changes will usually come within a few hours.


Recommendations (Tested & Proven)

For ease of use, simplicity and having the most competitive prices, only BUY your favourite crypto from;

Binance
Coinbase
Crypto.com
Bitfinex

Regardless of the country, you reside in, either of the above-tested exchanges will work for you.
All the above accept payment methods such as credit/debit cards, bank transfers, Apple Pay, Google Pay, etc.


Earn (automated) passive income by sharing your residential WiFi or mobile data. Data Configurable.

Install the Honeygain app on the desktop, mobile or both to maximise earnings.
Payout in USD or Bitcoin (BTC).
Start earning with an upfront USD $5 balance in your app now.
The payout threshold is USD $20.


Manually Add Code to WordPress Header & Footer [No Plugins] Read More »

blog-profile-puic-convert-images-into-webp-format

6 Ways to Convert & Save Images [PNG, JPG) into WebP Format

Google’s WebP format was developed in the year 2010 and has proven itself over the years that it has significant advantages over its JPEG and PNG counterparts.

Not only does it offers an average compression rate of between 20% – 30% (reduction in image file size), WebP also offers both lossless and lossy compression methods.

Web content creators like bloggers, social media influencers, video editors and graphic designers are all beginning to explore and adopt the WebP format in their digital content.

Here are all the ways available for you to convert and save your images to the new WebP format.

How to convert and save images (PNG, JPEG) into the new WebP format?

Here are the six (6) different ways you can do so.


Method 1. Using Online Image Conversion

The easiest and fastest way is to upload your images online and let the conversion website converts them into WebP format for you.

Some online services can allow you to perform batch conversion by uploading multiple images at once.

The downside of this method is the sensitivity of your image files. Be sure to consider if it is acceptable for you to do so.

Here are the current image conversion sites that we tested to be useful;


Method 2. Using WordPress Plugins

For WordPress users like bloggers, these are the image compression plugins that can both compress & convert your images into WebP format;


Method 3. Installing 3rd party applications

Sometimes, installing applications on your laptop can be easier, especially when the graphical user interface (GUI) is clean looking, easy to navigate, and you can find what you are looking for.

It is mostly about the GUI appearance here and their support for various operating systems (OS).

The basic functionality should include the ability to encode and decode images (i.e. original image format vs WebP format).

Here are some of the applications you can consider installing based on your OS.

batch-convert-webp-converter-mac

Batch converts PNG, JPG files and more into WebP format by simply using its drag-and-drop interface. Ability to add your custom-made watermark if you want (optional).

xnconvert-batch-convert-webp

XnConvert supports all 3 major operating systems, and it is free for private and educational use. It is a batch image converter that allows you to compress and convert images to WebP and other different formats. It also has several image editing tools, such as resizing, colour adjustments and filters.

ifanview-save-as-webp-format

A fast, compact and freeware tool for Windows users, IrfanView has been around for several years. Once installed, you can perform image editing and optimisation, with its being a complete graphic viewer. To get the new WebP updates, you must download and apply the additional plugins in order to use them.


Method 4. Installing cwebp on Windows

Find the latest version of WebP for Windows here.

Download, unzip it into a new folder and navigate into the Bin folder where the cwebp and dwebp tools are.

To convert an image into WebP format, use the sample command below.

cwebp -q 65 "original.jpg" -o "converted.webp"

-q 65 refers to the compression rate you can configure to your liking.

-o refers to your desired output file, which in this case, is the “converted.webp” file.

Change the “original.jpg” into your own image file and rename the “converted.webp” into your own preferred filename, but leave the .webp extension at the end intact.


Method 5. Installing cwebp on Mac

For Macbook users, we wrote a detailed blog post on how to install cwebp and how to convert images into WebP formats on Mac.

If you prefer to see the instructional video on how to do so, you can watch it on Youtube.


Method 6. Installing cwebp on Linux

If you are using Ubuntu, the webp package is available in its official repositories; you only need to use this command to install webp.

$ sudo apt install webp

If you are using other Linux flavours, you need to download the latest webp package from the Google repository.

Visit the repository link, take note of the latest filename version, and use this example command below.

$ wget -c https://storage.googleapis.com/downloads.webmproject.org/releases/webp/libwebp-0.4.1-linux-x86-64.tar.gz

Unpack and list out all the files within.

$ tar -zxvf libwebp-0.4.1-linux-x86-64.tar.gz
$ cd libwebp-0.4.1-linux-x86-64/
$ cd bin/
$ ls -l

The important ones are cwebp (for converting images into WebP format and dwebp (for converting WebP files into other image formats).

An example of using cwebp to convert a PNG file into WebP format is shown below.

cwebp -q 65 original.png -0 converted.webp

6 Ways to Convert & Save Images [PNG, JPG) into WebP Format Read More »

Bypass-screenshot-telegram-self-destructing-photo-save

5 Ways to Screenshot Self-Destructing Photo in Telegram app

Depending on your device’s make and model and your chosen method, there are several ways to bypass Telegram’s disappearing and self-destructing photo restriction.

This article will list down all the methods you can try to save and capture the screenshot of the self-destructing photo.

What is Self-Destructing Photo in Telegram?

When using the secret chat feature in Telegram, users can send disappearing images and videos to each other within a selected time limit, for example, 15 seconds, 30 seconds, a week, etc.

Due to the app’s design and security policy, this content cannot be screenshot and saved.

How to Bypass and Screenshot Telegram’s Self-Destructing Photo?

Here are the five (5) methods you can use to obtain a screenshot based on your device’s make and model.


Method 1. Use Telegram Web

telegram-web-bypass-screenshot-restricted-content-self-destruct-photo

All the restrictions seem to target the Telegram mobile app on your mobile device. Try using something else instead.

Switch to the Telegram Web version and use your computer for screen recording or capture.

On your computer, go to the official page of Telegram Web and follow the steps to connect to your phone.

Once connected, you can use any screen recording software you prefer.

For Windows, you can use the following;

  • Bandicam (advanced screen recorder for Windows – partial or full screen)
  • Screencast-O-Matic (create screencast videos with editing features)
  • Snagit (Professional Screen Capture with screen drawing, audio recording, and more)

For macOS, you can use the built-in video screen recording feature. Press <Command> + <Shift> + <5>, select <Record Entire Screen> and click <Record>.

To end the recording, press <Esc>. The recordings will be saved to the desktop (default location).


Method 2. Using Screen Mirroring

screenshot-self-destructing-photo-telegram-secret-chat-bypass

This method mirrors your Android phone to a computer, so you can screenshot and save any photo or video you want.

Scrcpy is an open-source Github tool that works on Windows, macOS, and Linux operating systems.

It does not require root access to your Android device and connects via USB or over TCP/IP protocol.

Features of Scrcpy include screen recording, screen mirroring with Android device screen-off, copy and paste in both directions, and many more.

Alternatively, you can use AirDroid Cast to mirror your iOS and Android phone to a Windows or Mac computer.


Method 3. Using Screen Recording Tools (Rooted & Un-Rooted)

Several screen recording apps have found success in capturing Telegram’s protected screen. It would be best if you tried these apps to see which one suits you.

Install Screenshot Touch in the Google Play Store and click <Start capture monitoring service>.

screenshot-touch-app-start-capture-monitoring-service-telegram

Next, the option for <Display over other apps> will appear.

screenshot-touch-display-over-other-apps-telegram

You will choose <Telegram> and toggle ON for the option <Allow display over other apps>.

Once you start recording, there will be a floating record button overlaying your screen. Use it to record your Telegram self-destructing photo.

For rooted Android devices, you can install ScreenCam Screen Recorder via the Google Play Store.

For non-rooted Android devices, you can try using AZ Screen Recorder and XRecorder.


Method 4. Using Another Phone’s Camera

phone-camera-take-another-phone-telelgram-self-destructing-photo

You will use another phone’s camera to take a photo of self-destructing photo.

The upside is this is 100% proven to be working, and you need to prepare your spare phone BEFORE you click on the self-destructing image.

The downside is the low quality of the photographed image.


Method 5. Using Google Assistant

using-google-assistant-screenshot-bypass-restriction-self-destructing-secret-chat-telegram

This method uses the Google Assistant app to take an automated screenshot on your device.

This applies to both iOS and Android users and is ideal for those apps that do not allow you to perform screenshot gestures, like Telegram secret chat.

Make sure you have the correct settings in place.

  • Open Google Assistant and click on your profile picture (top-right corner).
  • Scroll down and click <General> menu
  • Ensure that <Google Assistant> and <Use screen context> are toggled ON.

Open Google Assistant and say, “Take a screenshot“.

The app will automatically take a screengrab of what is on your screen and save it to your photo album.


** Recommendations **

To bypass internet censorship, blocked sites, and yet browsing with online anonymity., only choose the following reliable VPN services;

  • NordVPN (Has the most number of servers, over 5000+, in 60 countries to choose from. Uses a unique Onion Over VPN feature to mask your online traffic for maximum anonymity.)
  • Surfshark VPN (One of the few providers that allow unlimited device connections with just a single subscription. You can connect all your devices with no logs policy)
  • IPVanish (Supports all platforms, routers, and TV. Uses SOCKS5 web proxy feature for faster anonymous connection speed)

5 Ways to Screenshot Self-Destructing Photo in Telegram app Read More »