facebook twitter instagram
  • Home
  • News
  • Cyber Security
  • Suggest Us
    • Via Telegram
    • Via Email
  • Site Info
    • About Us
    • Contact Us
    • Privacy Policies

Vedant Nathani's Blog

This blog is all about your capacity to gain the knowledge. This blog will provide you the information about recent news in tech field. This blog will help you to boost up your knowledge.

 

What is The Social Dilemma?

Well, this word got famous by a Netflix web series named "The Social Dilemma". This web series was about How social media is affecting our society. And how they use your emotion and sentiments for their business. In this blog I'll share my experience about the Dilemma of the social media.


What make this blog different from others?

Well, I assure you that if you are interested in puzzles and games. This will be your best blog you have ever seen. Other things, let it be secret.


Jump to summary to view in short

Is someone watching you over the Internet??

Do you really think that you are not being watched by someone else. Well actually not, every action you take is monitored and indirectly used for their business. For example: You are chatting to your friend on Instagram, and you are talking about getting a new phone. After sometime you will notice that Ads of phones are displaying to you. It is not because of you, but because of the algorithm which find out the keywords from your chats and displays you Ad. Remember this possible in the services which don't support end-to-end encryption. But taking the example of Whatsapp, It is end-to-end encrypted still by there new policy they can use your status, about and the profile picture of there interest. 

How it actually works?

It is so simple as you all know that people are so addicted to there social sites. We will talk about it also. So taking your emotions and sentiments as there interest they show you ads, not one time but more then 100 times with different sources and somewhere made you to force to buy certain product.

You know fake news spread 6 times faster then the original one and that's how they use fake news too from spreading their ideology it can be used in the politics or anything. Have you ever thought why YouTube suggestions never end just because they have so much information about you that they can use it for years. 

What are threats with this?

There can be also a existential threat by this dilemma. Think that you are rightist in ideology but one day you see a video which was leftist, you skip, the next day you got two other leftist videos , you skipped again, but in the next few weeks you gonna see some of the leftist videos, understanding their logic slowly and gradually you will see that you are becoming centrist and thereafter you also become leftist this is how it changes your mind. Think for while what you love before the social media and after it. You will be shocked!

Well these were the interpretation which was based on the series "The Social Dilemma"
I was so interested in this , so I take in more further level. So now whatever you gonna read will be my interpretation.

Addication of Social Media

Its being a lot since I saw lot of people addicted to the social media and to the computer. Even I was one of the person who was so much addicted to the social media. So what's the solution? Do you think will it be vanished in few days. Well, I think the same, so in the next you will read what actually happen when you try it vanish it once and what I'd done to scrap addiction.

People says to leave the social media and enjoy with yourself. So in this blog I wanna share my experience after leaving the social media for a week.

 My Experience with dilemma & addiction 

So, to know the facts and reality about this. I decided few things for a week I decided that I'll not talk about love and affection and believe it or not, my suggestions were of solitude the songs were of breakup. I changed by mobile and logged in with different account and there I talked about love and affection and the results were shocking the suggestions were completely different and realised that it actually happens. The algorithm has power to change the mindset. and can affect you adversely. The suggestions were full of love related songs. Even my youtube feed was filled up this. The ads were about gifting things. It really happened!

Experience with Addiction-

As a teenager I was on every social media site for ex, facebook, twitter, instagram, whatsapp, telegram, etc. So I decided to leave all the sites at once, but actually it was not so easy, I started leaving the sites one by one and the countdown begins with the Telegram. I left telegram on 27 May 2021 12:10am. And I just logged out with full josh that I will not open it till 7 June. The next day when I wake up , I was  freaking out that I left telegram and so I created a new account for the materials and to stalk my groups, but with a promise that I'll not use it more then 30min. 

On May 29, I decided to quit whatsapp, so I just changed my about and notified one of my friend and left the whatsapp too. It wasn't so easy. I was in the think that I'll read the message from the notification. But then I found no its not worthy. So I just uninstalled it too.

On May 29 (Midnight) I think it was around 11:50 pm I decided to quit the Instagram too, so after a short convo with my friends I logged out insta too, but the actual time when I left was 12:38am May 30. I was having 2 IDs on the insta , I decided to log out from the both , but later I give the charge of 2nd ID (which was a page for my quotes) to my friend and told her to change the password so that I can't login back.

May 30 : I was really thinking what to do. Because without any sites I was kinda blank, soon I decided to cover my backlogs. But believe me or not this has really disturb my sleep cycle. Most of my time was wasted in sleep, thinking that I have no work. And that day I decided that I'll share my experience to everyone so that they can also understand how strong the addiction is of, And I decided that I'll not use any sites till 7 June and 1 - 7 June will be the days in which I'll write my blogs daily.

May 31 : I was very serious about these things so I left the telegram too, which I was using with the 2nd ID.

The Week (The Social Dilemma)

June 1 : I was so regular in uploading the quotes. I just invest the nights to think and write the quotes the next day. And want to complete my streak hola! on YourQuote. I was in search of alternatives , covering my backlogs. and then I decided to install few games, so I installed few games and played it for more then 1hours. It has being 3-4 days already leaving my top used sites. My usages of phone was also declined. Some people were still in the contact with the mails and sms.

June 2 : I decided that playing games is not best alternative so I started new things, and this is the day when I actually started to write blogs. My sleep cycle was brutally affected with this. I don't want it to happen. But it was happening. The addiction was like drugs, from which I can't live without. It was becoming harder and harder for me, Everyday I think to join back. 

June 3 : I have to see a very very important information on my phone which was in whatsapp. I first think I should do it later but it was very important so I decided to login back to whatsapp and see it. When I go back , it was around 250+ messages in my inbox and I don't want to reply them but still I'd replied few of the messages revert back to see that important information. Some people were still in my connect with mails and sms, I was deciding to quit these also. But finally I decided not to quit the mails.

June 4 : This day, the person whom I given my 2nd ID decided to log out and added the story.. but later we conclude that there will someone who will monitor the 2nd ID on insta. Well the usage has drastically fallen to 1 h 23min. And I was so happy with this.

June 5: This become the worst day for the week, I was finishing some things of this blog for which I have to go on instagram, but by mistake , I logged in with my original ID. And the "last seen" message restored to online. So I finally decided to quit on this week . As already the 1 week passed. But it was not a good news for me. So I'll conclude my self here!

June 6 : Well , I thought I will not the write the blog, But then the change come in me I'd to share. when I logged in to every site. My mobile was bombing out with the notification crashed multiple times. The major thing was that my phone usage up surged from 2 hour to 8 hours. Well most of my time went preparing the things for this blog notifying everyone and other things. 
 

Summary , Results and My Conclusion

Most of you come here to read this blog because I said it takes 42 days to create this. And even I ramped you up by telling this will be your best blog you read till now. And this is how you are again trapped in the Dilemma. I used your sympathy sentiment for my blog. Well , If you will notice, you will start finding logic behind everything happening on the internet. Every suggestion which came , Every ad which came is just the business of the company which uses you. It happens because you are addicted to social media even I was damn addicted to social media it was like a drugs for me So, I tried to spent 1 week without the social media.. believe me or not it is so hard to do so. Every time you just want to go and see how many likes you got, how many people have texted you.. what is happening around your account. Every damn thing you want to know. I'll say that the addiction of these so worst. You just gonna trap in this. And you can just do anything. Even I tried my best to not to open but I failed. But leaving these all, have a great advantage I got new ideas and puzzle to include in this. and I enjoyed the time with my family. I'll say try one day to be out of the social media, You will enjoy your own company.

Conclusively I'll say you can't just immediately get out off these till you don't have a strong reason. So the best trick you can adopt is to decreasing it day by day.. I use YourHour and set time limit to use certain apps. Use a time limit for 1 week then week by week it will be degraded. And you will love to live in the real life instead of virtual. That's it ! If you find it relatable please do comment.



Its great that you have you read the full blog. So now lets talk about the major thing which I'd made in this blog which is a puzzle. So will you like to play that puzzle??


What is Phishing ?

As the name suggest that phishing (Fishing = Capturing of Fish) here fish means the victim or you can say the person on which this attack has done. Means you get the confidential data of someone by pretending a legal source. For example you get a phishing link of Facebook pretending that the link is verified. But still the link is very dangerous. As you tap on it and give the details your data can be easily hacked. So phishing is all about pretending a legal source but not.

Is Phishing Legal?

Well, any type of hacking which exceeds the ethics limit is illegal, talking about phishing if you are performing this attack for educational purpose (means not for any illegal cause) it can be classify as legal but if you are doing it for a very wrong cause it is illegal. This type of attack is very famous between the teenager as they mostly do pranks on their friends and family. But sometimes this prank take a wrong turn. People use third party hosting for the phishing attack and they actually loose there data instead of getting someone's data.

Can You Perform Phishing?

As I said if it's for just for knowledge purpose you can perform this attack. But you should well aware about the ethics related to it. Because you will actually disturbing someone's privacy by performing this attack. The needs for this attacks are very simple and can be easily done. 

How Hackers Perform This?

There is very few and simple steps which hackers do to perform a phishing attack. 
They generally follow these steps:-
  • They create a webpage through html or from third party hosting. (They try there best to make look original)
  • Then , they add a backdoor it that page. (In simple way you can say they add a messenger type service which would send the data if some enters.)
  • They mostly create a sense of victory to victim so that victim could add there details. (For example:- "You had won a Lottery of 100$ tap on this link to continue." and most people tap on it.)
  • Hackers mostly shorts the links to look more original.

  • And by following this steps perfectly hackers get access to your account.


How to be safe from Phishing?

There are some general techniques which you can use to be safe form the phishing attacks.
  • Don't trust on any link
Do not trust any link whether it sent by your best friends or from your relatives. Think about the link before clicking on that.
  • Always try to open SSL certified websites
To know that whether the site is SSL certified or not you just need to see the padlock icon on the address bar or simply see the "https" remember the "s" is important because many links start with "http"
  • Analyze the webpage
If you had opened any link firstly analyze the page , analyze the web address and also see the little things. For example the original site name is "www.original.com" and the link which you got is "www.original..com" So, you can clearly see there's a extra '.' in the fake link. 


These were the three general steps by which you can be safe form phishing.

How Phishing sites looks like?

So let's take example of Facebook here to understand. There are the some images of fake sites

 



What you see in the image is actually a fake link pretending be of facebook. But you can clearly analyze the site and get to know that it's fake.


So these were some tips and information about the phishing attack. Stay Safe from this types of attacks.





 

Recently the government of India has banned 59 chinese apps in the India. The ban is interim, and apps got a chance to do appeal. This ban is done to counter the threat posed by these apps to country's "sovereignty and security." This ban 
include 59 apps including very big platform like Tik Tok, Shein, Shareit, Helo, WeChat etc. 

As we also see the growing border tensions between India and China. It give a bounce to Boycott Chinese Products movement and recently the "Tik Tok Vs Youtube" controversy already given a bounce to removal of Tik Tok from play store and app store. 
The government says that it is done for the "National Security".
As the servers of these apps were not loacted in the India, creating a threat of the data piracy.

Why only Chinese app?

We can connect these all with the border tensions and all. But the main the reason is that the government of China has full right to check the data of the apps build in China. As the China is so called "Democratic" but it is not democartic. The government has full right to intrupt in the market. Also, there are lots of cyber attacks in last weeks, which could also be reason. But what the government has said the applications are engaged in activities "prejudicial to sovereignty and integrity of India, defence of India. security of state and public order." This ban is imposed under Section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009, it said The government also cited complaints about data on Indian users being transferred abroad without permission.


Can these apps back in the market?

Yes, as the government stated the ban is interim and the apps got a chance to prove that they are not a threat to sovereignty and security to India. If the apps successfully prove themselves they can be back.

Can you use it after the ban also?

No, you can't access these apps after the ban. If you had apps still installed in your phone than also you can't use it. Because this ban is at the ISP level also. There is no legal chance to access these sites.


List of the Apps which get banned.


1. TikTok
2. Shareit
3. Kwai
4. UC Browser
5. Baidu map
6. Shein
7. Clash of Kings
8. DU battery saver
9. Helo


10. Likee
11. YouCam makeup
12. Mi Community
13. CM Browers
14. Virus Cleaner
15. APUS Browser
16. ROMWE
17. Club Factory
18. Newsdog
19. Beutry Plus
20. WeChat
21. UC News
22. QQ Mail
23. Weibo
24. Xender
25. QQ Music
26. QQ Newsfeed
27. Bigo Live
28. SelfieCity
29. Mail Mast ..

30. Parallel Space
31. Mi Video Call – Xiaomi
32. WeSync
33. ES File Explorer
34. Viva Video – QU Video Inc
35. Meitu
36. Vigo Video
37. New Video Status
38. DU Recorder
39. Vault- Hide


40. Cache Cleaner DU App studio
41. DU Cleaner
42. DU Browser
43. Hago Play With New Friends
44. Cam Scanner
45. Clean Master – Cheetah Mobile
46. Wonder Camera
47. Photo Wonder
48. QQ Player
49. We Meet
50. Sweet Selfie
51. Baidu Translate

52. Vmate
53. QQ International
54. QQ Security Center
55. QQ Launcher
56. U Video
57. V fly Status Video
58. Mobile Legends
59. DU Privacy



We all use to surf on the internet. But some of us sometimes get scammed on the internet. There private information gets leaked. So you need to be well aware about searching safely on the internet because safety should be our first priority while surfing on the internet
.











When you are not safe on the internet?

There are a lot of conditions in which you are not on the internet some of them are as follows.

~When you surf sites which had not get the SSL Certificate.

What is SSL Certificate?
Ans:- SSL Certificates are small data files that digitally bind a cryptographic key to an organization’s details. When installed on a web server, it activates the padlock and the https protocol and allows secure connections from a web server to a browser.

~When you trust on all links.

We all get lot of links on the whatsapp, facebook, twitter, telegram, etc. And some of us open all the links which we get. But sometimes it make easy to hacker to hack your phone.
How Hacker Will Hack?

Hacker will just insert a backdoor inside the link. And when you tap on that particular link. It will install small software of very small Kb(s). And that software will steal all the information and send it to hacker. 

~When you upload everything on Social Media

Well…. This is becoming trend in everyone to upload everything on social media. Like uploading current location etc. But it is very dangerous. It make bad person to get track about you.

So these were the certain condition in which you are not safe on the internet.

How to know that your device is infected with the virus?

There are a lot of signs by which you can get to know that your device is affected by the virus.
Some of them are as follows:-
1.   Your device will be started to hang.
2.   You will see many of the files which are not downloaded by you.
3.   You may get some spam mails rapidly.
4.   Your device performance will be degraded by day-to-day.
5.   Battery will get discharge rapidly.

Is antivirus software is the only solution to be safe on the internet?

Sometimes people think that if they are using antivirus than they are safe to surf internet. It’s somewhat correct. But antivirus is not only solution to be safe on the internet.
They are a lot of people who have antivirus but still they get hacked by the hackers.
So, it means that antivirus soft wares can partially save you but not totally.

Most common ways by which your device get infected with virus.

~Spamming

Spamming means you will get a bulk of fake call or message. For example:- The message will state that you had won a lottery and when you will give your bank details. They will just withdraw all your money from the bank.

 ~Phishing Attack

This is the most common way which hacker uses to hack your email and password while you are searching on the internet. Learn More about phishing


How to be safe from phishing?
There are many ways by which you can be safe from the phishing attack. The best ways are as follows.
Just use two-step-verification
This two-step-verification will help you a lot from being safe from phishing. Because when hacker will enter your username and password. You will get an OTP (One Time Password). And the correct OTP can only open your ID.

How to search safely?
As we had got a lot about how you are not safe on the internet while searching.
So let’s see what are the following ways by which you are safe on the internet.

1.   By Checking all the Links.

You should check all the links weather it is good or not. Weather the site has SSL Certificate or not. If it is trusted than only you should open otherwise you should not open it.

2.   You should take an immediate action.

As we see above that how to know that virus has entered in your system. When you get the signs of virus. You should immediately take an action on it.
·   You should remove all the files which are taking space.
·   If you see unsudden files which you have not downloaded, than uninstall those files.
·   Don’t reply to any type of spam mails.
·   These are the three top ways to take immediate action.

3.   Don’t upload everything on the social media.

This is the way by which you can be safe a lot.

4.    Try to use VPN

VPN is the best way by which you can search safely. But some VPS(s) are free and some of are paid. Sometimes free VPN(s) leaks your data. Well… You may ask... What is VPN? So

What is VPN?

       VPN stands for Virtual Private Network. VPN act as a mediator between you and the server. This VPN generally hide your location, IP address and other things. VPN does not allow cookies to be store in the servers.

1.   Try to login with different passwords.
 
      You all may search a lot of sites and in many of those sites you had also logged in so try to use different passwords. Show that Hackers could not easily hack your password.

      How hackers hack your passwords?

      There are a lot of ways which hackers use to hack your password some of them we had already discussed.
       But there is one more method by which hackers hack your password which is called as “guessing” . Hackers can easily guess your password and can hack your ID. Hackers also use rainbow table hacking which we further discuss.
       So, to be safe from this guessing attack you should make your password strong.

       Rainbow Table
     This table is mainly used by hackers. This table shows the most used password to most typical password and their Hash code.


Note:- Hash is type of number system. Decimal number system can be converted into hash but hash cannot be converted into decimal number system.]












So, to understand this concept you should understand how the password is encrypted.  To understand this we will take example of facebook. 

       How Password is Encrypted? 
        Password is encrypted by the companies. And companies also don’t know your password. When you enter your password it gets converted in hash code and store on the server of the companions. And the hash cannot reconvert into decimal.

       So, these were the safety tips which you can use while searching on the internet





Well, It is easy to create to free blog nowdays. You can create your blog from many sites but personally I use blogger to create my blogs. The information which your reading now is on blogger only.
Blogger is for free and you can earn some of the money when you qualify adsense. It is offered by the Google this means you get some more feature comparing to other sites.


How To Create Blog Using Blogger?
It's very simple just follow these steps:-
  1. Surf Blogger 
  2. Login or Sign Up with account
  3. You would ask for your website name (example.blogspot.com). Set you blog name or company name.
(Doing this you will be redirected your blogger Dashboard)

      4 . Tap new post
      5 . At top, write your post title
      6 . Write your full blog (main body) in below section.

Blogger also offers you to directly edit through html. But for doing this you need to have information about html.

(You can add heading, link, image, video, etc)

      7 . Tap Publish
(You can also save/preview the blog)
There are a lot more options like Label , Permalink etc you can set up this all option as it improves your site SEO and also make your site more user friendly.
At that's done you had created your blog:)

You can also further link your blogspot site to a custom TLD Domain.





In my previous blog I had told you about how you can upload your quote on Google but many of you told that your quote not ranked on top even you have uploaded more than 30 quotes. So in this article I will tell you that how you can rank your quote on top in google search.

Here are top 3 method by which you can rank your quote on top in Google search results

1. Use unique pen name

Pen name is that which you see in the last of you quote like "-Your name"  so by using a unique pen name helps google to rank your quote on the top of the search result.

2. Use hastags

Using a hastag is very imporatant and useful to rank your quote on the top in the google search so use atleast one or two hastag of your name in the caption of your quote so that google can easily rank your quote on the top of the search result. You can use hastag like "#name".

3. Categorizing your quote

Categorizing your quote is important for the quote ranking as it help google to to find your quote on the servers. Using a common a category is also very useful for your quote ranking but when you are beginner it is taught to google to rank your quote which in the category of inspiration and all.

I hope that your quote will rank on the top result after following these steps.




Older Posts

About Me

My photo
Vedant Nathani
​Even as a young child I was always conjuring up quotes, blogs and filling them with colorful characters, sharing them with anyone and everyone who would listen. I’ve progressed quite a bit since then, formulating longer and more complex quotes, blogs and sharing them with much larger audiences. As a passionate storyteller, I’m adept at using my imaginative thinking and creative flair to create blog posts which entertain and engage with my audience.
View my complete profile

Social Media Handles

Created By SoraTemplates | Distributed by GooyaabiTemplates