Soluții

Transformarea text-ului tabbed intr-un tabel in Microsoft Word

Sa prespunem ca am primit un document in care anumite informatii nu sunt intr-un tabel, iar randurile si coloanele sunt formate doar folosind tasta Tab.

Putem transforma foarte usor coloanele si randurile intr-un tabel folosind functia Convert Text to Table din Microsoft Word. Această functie va functiona si daca avem o lista delimitata (de ex. text delimitat de virgule).

[mai mult...]

Generare text random in Microst Word vers. 2

Daca dorim sa vizualizam cum va arata documentul nostru inainte de a-l scrie propriu-zis si sa putem efectua diverse operatiuni de formatare, Microsoft Word vine in ajutorul nostru ajutandu-ne sa il populam foarte rapid cu un text dummy.

Acest text dummy poate fi in limba engleza sau in latina. Versiunea in limba latina am parcurs-o intr-un articol precedent, asadar acum ne vom concentra pe limba engleza.

[mai mult...]

Adaugarea unei linii orizontale in Microsoft Word

Putem adauga foarte usor o linie orizontala in documentul nostru cu ajutorul feature-uluiAutoFormat. Cand introducem anumite caractere de trei ori pe propria lor linie si apoi apasam tasta Enter, aceste caractere devin o linie orizontala care se extinde de la marginea stanga la marginea dreapta.

Caracterele pot fi: ““, “=“, “_“, “*“, “#” si “~“.

[mai mult...]

How to Check if Your Android Device Is Certified

google play protect logo

Android devices vary wildly in features, and the operating system itself can look drastically different depending on the manufacturer. Despite all that variance, there is some important consistency for security’s sake. We’ll show you how to check whether your Android device is certified.

First of all, what does it mean to have a “certified” Android phone or tablet? Google has a list of requirements that must be met in order for a device to pass a compatibility test. Manufacturers submit devices, and if they pass the test, they are certified.

This compatibility test is meant to ensure consistency across Android phones and tablets. These devices get access to the Google Play Store and Google Play Protect, which is a safety check for any apps and games you have. An uncertified device may not get the latest security updates, and there’s no way to verify that the apps installed on it are authentic. Some Google apps are also banned from working on uncertified Android devices.

The vast majority of Android phones and tablets are certified. It’s not something that the average Android user needs to worry about. The most common thing that can cause a device to become uncertified is rooting or using a custom ROM. Regardless, you may want to find out whether your device is certified or not. Thankfully, it’s very easy to check.

First, open the Google Play Store on your Android phone or tablet. Next, tap the hamburger menu icon in the top-left corner to open the sidebar menu.

tap the menu icon

Select “Settings” from the menu.

select settings

Scroll down to the “About” section. Under “Play Protect Certification,” it will say whether your device is certified or uncertified.

certification listing

That’s it! If you find that your device is uncertified and you haven’t modified it, you can check Google’s list of supported Android devices to see whether yours is included.

[mai mult...]

Do VPN Companies Track Your Browsing Data?

An illustration of a smartphone and laptop connected to a VPN.

People use VPNs to protect their privacy from hackers, ISPs, and data thieves. But do VPNs themselves collect your browsing data and sell it to third parties? Here’s what you need to know.Here’s the main point: You’re placing an immense amount of trust in the VPN provider you use. Choose carefully! Do you trust your VPN provider more than your internet service provider?

VPNs Can Track You, and They Might

The main selling point of using Virtual Private Networks, or VPNs, is to protect your privacy. They prevent attacks from malicious hackers, stop your internet service provider (ISP) from peeking at your traffic, and mask your information to websites that may collect your personal data. While these claims are generally true, there is one party that you should still be cautious about: the VPN companies themselves.

Before we get into how a VPN may track your browsing data, we’ll explain how a VPN works. A VPN essentially routes your internet connection, provided by your ISP, through a secure, encrypted network powered by the VPN. This changes the IP address that websites can see while simultaneously obscuring your ISP’s ability to see your traffic. These encrypted networks can simulate different IP addresses and locations, which is how you can trick a streaming service like Netflix into thinking you’re in a different country.

In this process, your traffic is passing through a third party, the VPN company’s server. A VPN company may log all the traffic passing through their system, which essentially gives them a full picture of a user’s online browsing behavior. While most reputable VPNs do not spy on their users and have no incentive to do so, it can happen, and there are several examples of this happening.

VPN Spying Incidents

The most high-profile incident of a VPN spying on its users came to light in 2018, with a controversy surrounding the Facebook-owned Onavo Protect app. Facebook released a VPN that claimed to protect and encrypt user traffic. Still, in reality, it was collecting sensitive information from users, such as websites they browsed and apps they opened on their devices. While Facebook did disclose that the app would forward information to Facebook, people that did not read the fine print may not have noticed.

Facebook would then funnel this data into the Facebook Research program, which powered Facebook ad sales and business development initiatives. It would also give Facebook insight into how users browsed competing apps, like Snapchat. You can read more on what happened in our piece on Onavo Protect.

Besides that, dozens of free VPNs were found to be spying on their users. A piece from Buzzfeed News reported that Sensor Analytics, an analytics platform used by investors and developers, owned multiple free VPN apps that collected user information without their knowledge. These apps had millions of downloads and did not explicitly state who they were owned by. The company would then migrate this browsing data into their analytics platform.

You should be especially cautious of VPNs that are free and do not seem to have a paid version or clear business model. There is a chance that these apps make a profit by harvesting user data and selling them to third parties.

No-Logging Policies & VPNs

So should you use a VPN? If you do your research and select a paid VPN with a good reputation, then the chances are low that your VPN is spying on you.

The best way to avoid incidents like these is to look for VPNs with no-logging policies. These policies are an assurance that these companies will not log user traffic at all. Many top paid VPNs such as NordVPN, ExpressVPN, and Mozilla VPN, have explicit no-logging policies on their websites and inside their apps. Having these on their websites means that they could be held liable if they break their policies.

Before you sign up for a VPN, make sure that you meticulously check its website and read some trustworthy reviews first. Here are some of the questions you should ask before you sign up for even a free trial:

  • Does the VPN have trustworthy ownership?
  • Does it offer paid plans?
  • Does the VPN have many trustworthy user reviews?
  • Is the VPN verified by trustworthy third parties?
  • Does the VPN have an explicit no-logging policy on its website?
Securing Your Privacy

Protecting your privacy does not end with owning a VPN. There are plenty of ways that you can expose yourself if you aren’t careful. Even something as simple as using identical passwords across different websites can compromise your security.

And if you sign in to websites, you can be tracked by that site even if you’re using a VPN. If you’re signed in to Google with bob@gmail.com and you switch on a VPN—well, Google still knows that you are bob@gmail.com. Cookies on your browser stores can also identify you to websites, even after you connect to a VPN.

[mai mult...]