Skip to content

Instantly share code, notes, and snippets.

View Prajwal-Koirala's full-sized avatar
😀
Pushing code like it's nobody's business 💻🚀 #CodingLife #OpenSource #GitHub

Prajwal Koirala Prajwal-Koirala

😀
Pushing code like it's nobody's business 💻🚀 #CodingLife #OpenSource #GitHub
  • 03:30 (UTC -04:00)
View GitHub Profile
Preventing a phone from being tracked by the government or any other entity can be a challenging task, as modern smartphones are designed to have various built-in tracking mechanisms. However, here are a few measures you can take to enhance your privacy and reduce tracking:
1. **Use encrypted messaging apps**: Utilize end-to-end encrypted messaging apps such as Signal, WhatsApp, or Telegram to secure your conversations. These apps protect the content of your messages from being intercepted or accessed by third parties.
2. **Disable location services**: Turn off location services or restrict them only to specific apps that require them. This prevents your phone from constantly transmitting your location data to various apps and services.
3. **Avoid using public Wi-Fi networks**: Public Wi-Fi networks can be vulnerable to tracking and surveillance. Whenever possible, use secure and private networks, such as your mobile data plan or trusted Wi-Fi networks with strong passwords.
4. **Use a Virtual Private Net
Preventing a laptop from being monitored by government entities can be challenging, as it often requires advanced technical knowledge and ongoing diligence. While it's not possible to guarantee complete protection, here are some general steps you can take to enhance your privacy and security:
1. Use encryption: Enable full-disk encryption on your laptop to protect your data in case it falls into the wrong hands. Most modern operating systems offer built-in encryption features. Additionally, consider using encryption tools for sensitive files and communications, such as VeraCrypt or GPG (GNU Privacy Guard).
2. Secure your internet connection: Utilize a Virtual Private Network (VPN) to encrypt your internet traffic and mask your IP address. This can help protect your online activities from being easily monitored. Choose a reputable VPN service with a strict no-logs policy.
3. Keep software updated: Regularly update your operating system, web browsers, and other software installed on your laptop. These update
@Prajwal-Koirala
Prajwal-Koirala / duti-command-macos.md
Last active July 22, 2024 01:13
Using `duti` to Open .json Files with VSCode

Using duti to Open .json Files with VSCode

This guide shows you how to use the duti command on macOS to associate the .json file extension with Visual Studio Code (VSCode).

Prerequisites:

  • macOS
  • duti command-line tool (pre-installed)
  • VSCode installed

File Extensions for Different File Types

File Type File Extension
Batch .bat
C .c
C# .cs
C++ .cpp, .h
CSS .css
Clojure .clj, .cljs

Here's a terminal guide to pull the Docker Ubuntu image and run it from the terminal in macOS:

1. Install Docker Desktop:

2. Pull the Ubuntu image:

  • Open a terminal window (Applications > Utilities > Terminal).
@Prajwal-Koirala
Prajwal-Koirala / Remove Incompatible-Drivers-in-Windows-11.md
Created June 15, 2024 10:38
How to Remove Incompatible Drivers in Windows 11 Using PowerShell to Enable Core Isolation

How to Remove Incompatible Drivers in Windows 11 Using PowerShell to Enable Core Isolation

When enabling Core Isolation in Windows 11, you may encounter the need to remove incompatible drivers that prevent the feature from being activated. Here's a guide on how to use PowerShell to remove these drivers effectively:

  1. Identify the Incompatible Driver:
    • Start by identifying the driver causing compatibility issues. You can list all installed drivers on your system using PowerShell:
      Get-WindowsDriver -Online -All
    • Look for the driver that needs removal, noting down its PublishedName and ProviderName.

Discover Google Fi - Your Flexible Phone Plan

Welcome to Google Fi, where connectivity meets flexibility! Whether you're a frequent traveler, a digital nomad, or simply looking for a reliable phone plan, Google Fi offers seamless coverage and competitive rates.

Why Choose Google Fi?

1. Flexible Plans

Google Fi adapts to your usage. You pay for the data you use, with no contracts or hidden fees. Whether you need unlimited data or prefer a pay-as-you-go approach, Google Fi has a plan that suits your lifestyle.

2. Nationwide and International Coverage

To view the progress of BitLocker encryption or decryption on Windows using Command Prompt (cmd), you can follow these steps:

  1. Open Command Prompt as Administrator:

    • Press Win + X on your keyboard.
    • Select "Command Prompt (Admin)" or "Windows Terminal (Admin)".
  2. Run BitLocker Status Command:

    • In the Command Prompt window, type the following command and press Enter:

manage-bde -status

To force Windows to synchronize its time with a time server on boot, you can use either Command Prompt (cmd) or PowerShell to set it up. Here’s how you can do it:

Using Command Prompt (cmd)

  1. Open Command Prompt as Administrator:

    • Press Win + X and choose "Command Prompt (Admin)" from the menu.
  2. Configure Windows Time Service:

    • Use the following command to configure the Windows Time service to start automatically and synchronize time on boot:

How to force Linux to sync time on boot using NTP (Network Time Protocol). Here's a comprehensive guide:

Synchronizing Time on Boot using NTP in Linux

Overview

In Linux, it's essential to keep accurate time for various system operations and applications. Network Time Protocol (NTP) is the standard protocol used to synchronize the time on Linux systems with time servers over the Internet or local network. This guide will show you how to configure your Linux system to sync time on every boot using NTP.

Prerequisites