How To Safeguard Your Phone Against Spyware

Safeguarding Your Phone Against Spying Apps

That prevention is better than cure is a maxim that holds true in everything. If you want to protect your phone against spy apps, you have to engage your protective gear and do what you should to keep off the spying. But how do you protect your phone from an illegal phone tracker intended to spy on your movements and activities? You can find all the answers to this question in the remaining sections of this post.

Don’t Trust Strangers With Your Phone

Unless you downloaded a spy program accidentally, another way of malicious people installing spyware on your smartphone is physical contact. If you want to safeguard your phone, don’t allow people you don’t trust to hang around with your device or else you will be caught off guard.

Be Careful With Your Download Sources

If you want to keep your phone safe from spyware, be extra cautious where you download your apps from. The reason is that if you download software from insecure sources or un-certified developers, you risk exposing your phone to spyware. To keep safe, you should ensure that the apps are available from reputable marketplaces such as Play Store or Apple’s App Store. The reason is that these platforms have strict security measures in place that ensure users download secure apps that do not compromise their privacy or security.

Use Strong Passwords

To keep your phone safe from an illegal phone tracker, you ought to use strong passwords to safeguard your screen login. The reason is that if someone wants to download a spy program on your phone, they need access. By using a password, you make it difficult for them to do so. In addition, you should keep your passwords secret and only reveal them to a person you trust, for example, your spouse. Lastly, it is necessary to use complex passwords that someone cannot hack easily. For instance, it is prudent to mix lower and upper case letters in your password as well as digits to make it safer.

Set Download Passwords

To keep your phone safer, you should also set passwords for downloading applications.  This measure will ensure that anyone who accesses your phone with your permission cannot go further and install any application without your permission. The reason is that most of the spy apps people have on their smartphones were installed by people who were using their phones without ever suspecting that they could go this far. So, if you allow someone to use your phone, this extra layer of caution will protect you.

Use Anti-malware

Another way of keeping your smartphone safe is installing an antispyware. You can go for paid versions on App Store or Google Play to get maximum protection. The reason why paid versions are better is that they offer features that developers intentionally exclude in their free versions. In addition, you ought to keep updating the software and use it to scan your phone daily.

Be Careful With Bluetooth and WIFI Connections

If you want to keep your phone safe from an illegal phone tracker, be careful how you access WIFI and Bluetooth connections. You have to maintain your Bluetooth and WIFI connections to a secure mode and never access or accept connections to the network you are not sure of.

Be Careful With App Agreements

Another measure that will keep your phone safe from spyware is being careful with the terms and conditions of every app you install on your smartphone. For instance, you have to read the terms and conditions, privacy policies, and legal disclaimers behind every application you download.  You will have to read through every detail of the agreement since some of the agreements indicate that the developer has authority to track your whereabouts.

Know How to Read the Signs

The quest for safety also has a preventive angle to it. You need to be on the alert against any symptoms of an infection in the phone. For example, if you notice the phone is restarting itself quite often, its battery level is decreasing abnormally, the brightness is decreasing, or the performance of the phone has deteriorated, take action. All these are signs of a spy app working in the background.

Keep Your Confidential Information Safe

To keep your phone safe from the infiltration of an illegal phone tracker, you have to keep your confidential information safe. You should avoid giving your confidential details to any thirdparty application or website you do not trust. If you get an app that requests for personal information, it is better to keep off.

Install Original Apps Only

Another easy way that could expose your phone to spyware is downloading pirated versions of applications. When downloading apps, be careful of such “free” apps outside developers’ official websites since some of them are laced with malware, including spy ones. The people who peddle these apps usually take original paid versions, corrupt them, and then offer them out as free downloads. If you want any free app, it is better to go for the developer’s trial or free version until you are ready to purchase the paid version.

The threat of someone installing an illegal phone tracker on your phone is real, and you need to be careful so that you do not fall prey to these schemes. You have to take preventive measures to safeguard your phone against threats that result from physical contact with your phone and when downloading apps from uncertified sources. For instance, you can protect your phone by downloading your apps from credible developers and sources like mspy. In addition, you can use secure passwords for your login and app download permission. Lastly, you can protect your smartphone by paying attention to the terms and conditions behind every app you download. By abiding by these insights we have share, we believe you will take your safety to the next level and keep your smartphone free from illegal and snoopy tracking.

How To Create A Strong Password That’s Hard To Crack?

Short Bytes: One of the most important things to keep yourself safe online is having strong passwords. Created by using various methods, a hard to crack password should include everything from numbers to alphabets and special characters arranged in such a way that it’s simple for you but unimaginable for others.

Keeping strong passwords wasn’t a thing if we would go back a decade or more. Back then, few people had the internet access and even fewer had online accounts on various portals. Even if we consider offline passwords, cracking it required physical access to the machine. In most cases, it was an opportunity with very fewer chances of success.

Flash forward to 2017, someone with an idea of your online password could damage you in unimaginable ways. We have seen people losing tons of cash from their bank accounts, getting embarrassed on social media platforms, and whatnot!

Various hacking and social engineering techniques have allowed crackers to trick people into giving their passwords, and eventually, a pass to harm their digital self. Still, 123456 was the most popular password for the year 2016.

Creating a secure password that’s hard to crack is a necessity in today’s time. You might have realized it by now because various online services don’t allow people to use simple passwords including PII (Personally Identifiable Information) and general dictionary terms which are easily discernable for password cracking tools.

Here is the recipe to create secure password

strong password 1
Image: Pixabay

As always, let’s start with the basic things we need to create a strong password that has enough length, which is hard to guess for others, and above all, it should be super easy to remember.

Start with the alphabets

The first thing you require for your password is its basic structure. Start by writing a set of letters. I have already mentioned that it shouldn’t constitute any word from the dictionary or some other known word, like the name of some family member.

You can try to merge two words and create something unrecognizable. For instance, take sarcasm and opportunity and make it sarcasinity.

Now, add the numbers

Don’t include your birth date or phone numbers. For every person, there could be a sequence of numbers he or she can easily recall without putting much pressure on their brain. Try to mix the alphabets and numbers, instead of putting them side by side.

Add a pinch of special characters

Putting special characters like $,#,&, etc. in your password would be a wise move. If efficiently used, it could make your password almost impossible to crack, unless, you have the habit of telling your passwords to your friends.

Uppercase and lowercase

Don’t forget to make at least one of the letters uppercase while thinking about your super strong password. The same goes for lowercase, in case, your password is all uppercase. Other than making it tougher to crack, it also fulfills the password requirements of various online services.

What should be the ideal length?

Well, it’s totally up to you. But it’s advised to keep the length between 12 to 20 characters. I am suggesting a maximum of 20 characters because some websites have an upper limit on the number of characters.

Extra tip – random password generator

It might be possible that some people would find it hard to come up with unique passwords. You can head over to the web and use some random password generator. A reliable one might be able to give you a robust (but hard to remember) password.

If you want some trusted names, there is Norton Identity Safe Password Generator, Password Generator from LastPass, Password Generator Tool by DashLane, etc.

Don’t be predictable

strong password 2

Many of the best practices and strong password tips have been derived from a “NIST Special Publication 800-63. Appendix A,” authored by Bill Burr in 2003. His document became a one-stop password guide for governmental bodies and academic institutions.

Years down the line, recently, talking to WSJ (via The Verge), Burr said that his suggestion for making special character replacements might have misguided people actually to create simpler passwords than expected.

It’s not the case that his tips are wrong in any sense, after all, they have managed to survive for almost 15 years. But it’s the password creation habits developed by many people which lead to easier passwords that are too hard for humans but not for the hackers.

For instance, if one has to change the word “password” into its tougher version, one of most replacements in many cases would be P@$$W0rd1!

People who commit cyber crimes have also become advanced and tried to analyze the patterns used by individuals. In contrast, if you use a combination of multiple random words, it would take hundreds of years to guess such a password in comparison to something that’s used widely. So, the goal here is to be as random as possible and stay aside from the common herd.

“Through 20 years of effort, we have correctly trained everyone to use passwords that are hard for humans to remember, but easy for computers to guess,” says the comic xkcd published by Randall Munroe in 2011. The illustration takes a dig at the shortcomings of substitution habits while choosing passwords.

strong password
Image: xkcd

As confirmed by security experts, it would take around 500 years to guess the phrase correct horse battery staple. What’s more is that it is quite easy to remember.

Further, Burr suggests that people should change their passwords every 90 days. But wait, isn’t it more than a year ago since we last changed our digital keys? What’s more important is how to modify the password. Changing P@$$W0rd1! to P@$$W0rd2! won’t do the job. Also, we are too lazy to come up with entirely new options.

In June 2017, Paul Grassi published new NIST standards which take a different approach than the one advised by Burr. However, according to Gracci, Burr is downplaying his password tips. “He wrote a security document that held up for 10 to 15 years. I only hope to be able to have a document hold up that long.”

The new standards emphasize that random long easy-to-remember phrases are more complex to decode than easily guessable characters. Also, it suggests changing passwords only if there is a possibility that they are compromised.

What do the experts say?

Several years ago, a method was proposed by Bruce Schneier, a security researcher, which involves turning general sentences into passwords. His method can still get a password strong enough for most password cracking systems.

Sentences shouldn’t be much general, Schneier has warned that hackers tend to use a combination of dictionary words and they might end up getting yours. The twist here is to cut the sentences short, so they aren’t recognizable after adding stuff like numbers and symbols.

Here are some examples:

My secret Santa is hiding in the closet: MSecSta@H1dinCL$

Oh! My God, John, Did you try to steal my dog?: O#!MyGJhn…..D!DuTr2$tlMDogo?

PAO Nemonics

PAO (Person-Action-Object) is a memorization technique primarily used to remember decks of cards and long random number strings. The researchers at the Carnegie Mellon University concluded that the same could be used to create strong passwords and remember them.

iron man
Image: Stick Kim/Flickr

The method goes as follows: take the photo of a person, a place you like, and think of an action that person is doing at that location. For instance, let the person be Tony Stark, the place is Central Park, and action is flying the suit.

So, the sentence would become: Tony Stark is flying his suit over the Central Park.

Shrink the sentence down by including initial characters of every word.

TsIFlyHSutOvrTCP

Now, this is a 16 character strong password that you can further improve by adding numbers and special characters if you want.

Remembering these visual scenarios can help you create secure passwords than only using random letters and figures. Moreover, it would be hard for other people to make rough guesses.

You can also combine multiple scenarios in one password. The whole point of this method is that humans tend to remember visual references better.

The Passphrase

Another recipe to prepare a hard to guess password is to create a phrase out of unrelated words – it’s commonly known as a Passphrase.

For instance, you can pick up some random words, like:

Sam dakota scarcity glued numbers might fortune sprinkle some poor mud night

Make sure that the word arrangement is total nonsense, not picked up from an existing piece of text. Modern password crackers do consider dictionary words, but a pass phrase of this length, maybe 12 or more words, would take ages to break down.

How to deal with tons of passwords I have?

Practically speaking, remembering all the passwords is a bigger problem than creating a strong and uncrackable password. Because, in the age of the internet, one doesn’t even know how many accounts he or she has opened.

There can be a couple of ways which can help you manage passwords for dozens of accounts and apps you have.

Use a password manager

Password management apps like LastPass, DashLane, TrueKey, iCloud Keychain, etc. could be the easiest ways to remember passwords. Because you don’t have to remember all of them but one master password, the software does the rest.

The login credentials you give to such apps are cryptographically signed before getting saved in the app’s database. You can throw almost any type of password, it doesn’t matter, how tough it is.

Many web browsers have an option to save passwords and credit card details. For instance, in the case of Google Chrome, the details are encrypted and tied to your Google account. So, your passwords go along if you set up Chrome on a new device.

Tip: Don’t use password management apps for the passwords you want to remember. Type the passwords whenever required so that you get the same by heart and recall it even while you’re asleep.

Split your passwords into levels

You might be overwhelmed with the ease offered by the password managers. But the hard truth is that you tend to depend on these apps, and it’s pretty hard to recall password on a new device, in case, you don’t have access to your password manager.

Why don’t you divide your passwords into levels? Let’s say you need passwords for 30 different websites, tools, bank accounts, etc. It won’t be the case that all of these passwords should be fool-proof.

Level 1

The account you created on a casual gaming website, online radio portal, or some other thing that doesn’t matter enough can fall into level 1. And if you’re comfortable, you can use the same password across such services and apps. You can give the task of handling less important digital keys to the password management apps.

Level 2

Now, level 2 can include accounts for websites like Facebook, Twitter, Instagram, LinkedIn, etc. Also, services for ordering meals, subscription services, cab services, and others that store your payment details.

The password for the services in level 2 could be similar but with an unpredictable variation, maybe a couple of letters or numbers in such a way that you can remember which password belongs to which service.

Level 3

This level is for the most important passwords you have, mainly the ones related to your internet banking accounts. These passwords shouldn’t resemble with any of your other passwords. And it’s highly recommended not use remembering apps for such passwords or write them somewhere.

So, after all of this, you might end up with around five or six passwords to remember which I guess won’t be a tough job. At least, you don’t depend on some technology to remember the digital keys for you.

There is another thing that could make your life easier. Limit the number of email IDs you use to sign-up for online accounts. On an average, two emails would be enough, one for casual accounts and another for important ones.

How To Enable Speech Recognition on Windows 10; A Step By Step Tutorial

Windows Speech Recognition was introduced in Windows Vista Operating System and allows a user to control a computer through voice commands, without the need of a keyboard or a mouse. With the help of speech recognition, users can dictate text within documents and e-mails, control the operating system user interface, move the mouse cursor, and perform keyboard shortcuts.

The accuracy of speech recognition increases through use, and the feature adapts itself to a user’s grammar, word usage, speech patterns, and vocabulary.

Steps To Enable Speech Recognition On Windows 10

1. Type Speech on the Cortana Search Bar. Click on Windows Speech Recognition on the suggestions shown.

2. A window titled Welcome to Speech Recognition will pop up. Click on Next to proceed.

3. In the next window, you will be asked to select your audio input source. Using a headset microphone will give you more accuracy during speech recognition. If you are on a laptop, you can choose ‘Other‘ to use the inbuilt microphone.

4. Read about proper microphone placement in the next window and click Next.

5. Speak distinctly the contents on-screen to calibrate your microphone and proceed to the next screen by clicking on Next.

6. If it is shown that the microphone is ready to use, proceed to the next screen. If not, go back to the previous screen and speak loud and clearly until calibration is complete.

7. You can choose to enable better accuracy by allowing your computer to review your documents and e-mails.

8. Choose an activation mode in the next window. If you select manual activation mode, speech recognition can be turned by clicking on the microphone icon or pressing the Ctrl+Windows key. In voice activation mode, speech recognition can be started just by saying “Start Listening.”

9. You can print the speech reference sheet to view helpful voice commands quickly.

10. If you don’t want to enable speech recognition after every startup manually, mark Run Speech Recognition at startup and click Next. This option is already selected by default.

11. The next window will show you an option to take a tutorial on speech recognition. Follow through this tutorial instead of skipping it and you will learn a lot of useful commands.

How To Delete WhatsApp Messages For Everyone?

Sooner or later, WhatsApp had to allow users to undo their wrongdoings and delete their WhatsApp messages. Becuase accidents can happen anytime. We have heard stories of drunk employees accidentally messaging their boss.

Until now, it has been possible to delete messages on your side of the conversation. But WhatsApp users can now delete the recipient’s copy of the message. This will give people some window if they realize they have sent the message where it wasn’t meant to be. You can take advantage of the new “Delete for Everyone” in an individual chat or a group to un-send or revoke a Whatsapp message.

whatsapp delete message

How to delete WhatsApp messages?

Keep in mind, you only have 7 minutes to delete a WhatsApp message that has been sent to a person or a group. Also, both the sender and the recipient must be running the latest version of WhatsApp for Android or iOS.

Follow the steps mentioned below:

  1. Go to WhatsApp.
  2. Open the chat where you want to delete the Whatsapp message.
  3. Tap and hold the message to show further options.
  4. Tap the Delete icon on the top.
  5. Now, to delete the WhatsApp message on both sides, tap “Delete for Everyone“.
    delete whatsapp message everyone

After the WhatsApp message has been successfully removed, a text, “You deleted this message”, will appear in its place. The text “This message was deleted” will appear on the recipient’s side.

There might be a chance the message deletion process doesn’t yield positive results. WhatsApp will notify you in that case. Also, if you want to delete the message only for yourself, follow the steps as they are and tap “Delete for Me”.

How To Delete WhatsApp Messages For Everyone?

 

Sooner or later, WhatsApp had to allow users to undo their wrongdoings and delete their WhatsApp messages. Becuase accidents can happen anytime. We have heard stories of drunk employees accidentally messaging their boss.

Until now, it has been possible to delete messages on your side of the conversation. But WhatsApp users can now delete the recipient’s copy of the message. This will give people some window if they realize they have sent the message where it wasn’t meant to be. You can take advantage of the new “Delete for Everyone” in an individual chat or a group to unsend or revoke a Whatsapp message.

How to delete WhatsApp messages?

Keep in mind, you only have 7 minutes to delete a WhatsApp message that has been sent to a person or a group. Also, both the sender and the recipient must be running the latest version of WhatsApp for Android or iOS.

Follow the steps mentioned below:

  1. Go to WhatsApp.
  2. Open the chat where you want to delete the Whatsapp message.
  3. Tap and hold the message to show further options.
  4. Tap the Delete icon on the top.
  5. Now, to delete the WhatsApp message on both sides, tap “Delete for Everyone“.
    delete whatsapp message everyone

After the WhatsApp message has been successfully removed, a text, “You deleted this message”, will appear in its place. The text “This message was deleted” will appear on the recipient’s side.

There might be a chance the message deletion process doesn’t yield positive results. WhatsApp will notify you in that case. Also, if you want to delete the message only for yourself, follow the steps as they are and tap “Delete for Me”.

How To Block A Program From Accessing The Internet In Windows?

Most of the third-party software that resides on your computer can access the internet and there are few offline-only programs being developed. But there are times when you might not want certain programs installed in your system from gaining access to the internet. Like, for instance, you might not want it to continuously check for updates, you might be annoyed with constant ads that keep showing up, or you might be worried about any sensitive data that is in your software. If the essential features of the application do not rely on internet connectivity, you can just opt for cutting off internet access for that program altogether.

How can I block access to the Internet?

Windows simplifies this for you. Windows Firewall can not only protect your computer from malware and other security threats but can also be configured to block any program from accessing the internet.

How do I block a program in my firewall?

By following just a simple set of steps, you can block any software from accessing the internet. The steps are similar for Windows 7, Windows 8 or Windows 10. You can block both inbound traffic or outbound traffic for any program. Inbound traffic refers to all the data coming to your program from a server elsewhere. Outbound traffic is due to a connection initiated by your program.

Steps To Block A Program From Accessing The Internet In Windows 7, 8, and 10

1. While on the desktop, press Windows+X and select Control Panel from the options. Alternatively, if you are on Windows 10, search for Control Panel in the search bar and click on Control Panel to open it.

2. Click on Windows Firewall in Control Panel.

3. On the left side of the next window, click on Advanced settings.

4. Click on outbound rules. Here you can restrict internet access for a particular app.

5. Under the Actions panel on the right side of the window, click on New Rule.

6. Click on Program and press Next.

7. Type the path where your program is installed or locate it with the Browse option. The application path is generally in the form “C:\Program Files\application.exe” or “C:\Program Files(x86)\application.exe” where ‘application’ is the name of the program you want to block from having internet access.

8. In the Action window, select Block the connection. Press Next.

9. Select when your blocking rules apply on the program. Select all the three options to completely cut off internet access.

10. Give a name to the new rule you just created. In this example, I have created a rule to block internet connection to Mozilla Firefox, so, I have named the rule “Block Firefox”. You can choose any name you desire.

11. Click on finish and your rule gets activated.

You should now see the new rule you created under Outbound Rules.

Go ahead and block inbound connections too if you want to completely block internet access for the program. Select “inbound rules” in step 4 and rest of the steps are similar. Did you find this guide on blocking a program from accessing the internet in Windows to be helpful?

Doctor uses his iPhone to diagnose himself with cancer

A doctor has managed to diagnose himself with cancer by using his iPhone.

Dr John Martin is a vascular surgeon in Denver, Colorado and chief medical officer of Butterfly Network.

You are probably asking…

Who are Butterfly Network?

They are a company that is developing an ultrasound device that can connect to an iPhone.

The machine is called Butterfly iQ and even before the product had been fully tested, Dr Martin knew it could work.

After feeling a mass in his throat, he used the device to scan the area and the results showed that he had metastatic cancer.

As an expert in the field for 40 years he was sure the diagnostics were not good but sought further confirmation from a technician.

The Daily Mail quote him as saying:

I noticed this mass in my neck.

I realised I was holding the diagnostic study I needed in my hand.

I walked across to a technician, and we looked at each other, and I flew home the next morning.

But the first thing he thought when he saw the image was that he was thankful his team had invented the ultrasound technology.

The cancer had started on his tongue and spread to his throat.

Dr Martin has now undergone successful surgery on the tumour and after six weeks of radiation is now reported to have been cured.

The device will immediately produce a diagnosis of a patient’s condition on the screen of their iPhone.

Butterfly iQ will be used in clinical trials next year and high-risk patients will be able to take the device home with them.

Jonathan Rothberg, the founder of the company believes that the technology could also help people suffering from various illnesses such as diabetes and lung problems.

Dr Martin added, via Technology Review:

To look at this as just an ultrasound device is like looking at an iPhone and saying it’s just a phone.

If you have a window into the body where anyone can afford it, everyone can use it, and everyone can interpret it, it becomes a heck of a lot more than an ultrasound device.

CIA Document Confirms Reality Of Humans With ‘Special Abilities’ Able To Do ‘Impossible’ Things.

 

CIA Document Confirms Reality Of Humans have been studied for thousands of years in all walks of life. Religious ‘miracles’ often with hundreds of witnesses have been said to be due to psychic abilities, but studies in China have overwhelming proof that these stories are more than just speculation.

It is thought that these gifted people have been able to tap into a quantum level, unobservable by the human eye..

To understand properly, you need to be aware of the relationship between our consciousness ans our physical reality.Both things are very real, and they have a very complicated relationship. Inventor of quantum theory Max Planck said we should regard consciousness as “fundamental” and matter as “derivative from consciousness.”

Another physicist Eugene Wigner has said on the matter “it was not possible to formulate the laws of quantum mechanics in a fully consistent way without reference to consciousness.” (source)

The document containing the information about the events in China is called “Chronology of Recent Interest in Exceptional Functions of The Human Body in the People’s Republic of China.” The document talks about the Chinese government and it’s work with parapsychology, that is remote viewing, telepathy, psychokinesis.

The document has only recently become available due to a Freedom of Information Act request (FOIA), and it includes interesting details of individuals who have purported superhuman abilities, and that they have been studies countless times by scientists all over the world. The document is on the CIA website, but can only be accessed by the ‘Internet Archives’.

The CIA document can be read here. A brief outline of the important items in it include:

In 1979, a major Chinese science journal, Ziran Zachi, printed a report on “non-visual pattern recognition” where several accounts of exceptional human body function were confirmed.
In 1980, the Journal and the Chinese Human Body Science Association held a parapsychology conference in Shanghai with participants from over 20 research institutes and universities from around the world.
In 1981, there was a formation of over 100 special places to study children with exceptional abilities with over 100 formally trained scholars.
In 1982, the Chinese Academy of Sciences sponsored a public hearing in Beijing and the sole purpose was to discuss humans with parasychological abilities, there were over 400 scholars in attendance.

Zhang BaoshengIn April of 1982, the Party’s National Committee of Science at Beijing Teacher’s College held a trial to test the abilities of certain students. Most of the results came back negative, apart from Zhang Baosheng. The next year, Zhang was studied again, this time by 19 researchers led by Prof. Lin Shuhang of the physics department of Beijing Teachers college, positive results were recorded for his superhuman powers.
.
Zhang was able to move objects in and out of sealed containers using only the power of his mind. Prof. Shuhang studied Zhang for six months and he was repeatedly able to place small pieces of paper into sealed test tubes, and then take them out again, without touching them. He repeated the tests with other small items like paperclips and insects, and Zhang could move these, too.

A film was made by the Institute of Space-Medico Engineering in 1987 showcasing the results, which showed a medicine pill moving through an irreversibly sealed glass vial, which occurred in three frames of a 400 frame per second film. (source)

Another release from the CIA (Research Into Paranormal Ability To Break Through Spatial Barriers) contains this description of Zhang’s abilities:

A wooden cabinet 120 by 180 by 60 centimeters was used as a sealed container. Sheets of papers and boards with one of a kind markings were used as the target objects and placed inside the cabinet on the upper shelf. Without damaging the cabinet or opening the door, the person with ESP was able to remove the target objects and also was able to put them back inside. This demonstrates that even when using especially large container it is possible to completely break through spacial barriers, however, the success rate was much lower and was exceptionally difficult. (source)(source)

According to Eric Davis, Ph.D, FBIS, there were other children like Zhang. A declassified US Air Force document obtained via the Federation of American Scientists, contained a report from Shuhuang that ‘gifted children’ could teleport small, physical objects from one place to another. Objects like watches, horseflies, other insects, radio micro-transmitters, photosensitive paper , without ever touching the objects beforehand. The research was carried out by the prestigious Department of Defence, and is a noteworthy case because it was deemed necessary that an unclassified Intelligence Information Report be prepared for public viewing. (source)

In a similar study, Dr. Dean Radin, Chief Scientists at the Institute of Noetic Sciences they were able to record pieces of paper being teleported into sealed plastic containers, the report was published in 2010 by retired research chemist Dong Shen. The most fascinating part of this study, is that the teleportation techniques were taught to other students with a success rate of 40%. This information is published in his book, Supernormal.

Dr. Dean Radin, states:
“Evaluating the details and credibility of these studies have been difficult because many of the papers appear only in Chinese. The techniques have not yet been reported outside of China, and the experimental methods employed in conducting such tests do not appear to be as rigorously controlled as compared to typical Western methods…”
Although, Eric Davis has said,
“The results of the Chinese Teleportation experiments can simply be explained as a human consciousness phenomenon that somehow acts to move or rotate test specimens through a 4th spacial dimension, so that specimens are able to penetrate the solid walls/barriers of their containers without physically breaching them.” (source)
The American Journal of Chinese Medicine has evidence of a similar, amazing story of a woman named Chulin Sun.The study in the US National Library of Medicine documents this lady’s ability to speed up the growth of seeds to an amazing rate. The study states:

Chulin Sun is a woman with exceptional powers (Shen and Sun, 1996, 1998; Sun, 1998). A member of the Chinese Somatic Science Research Institute, she is a practitioner of Waiqi. Waiqi is a type of qigong that teaches the practitioner to bring the qi energy of traditional Chinese medicine under the control of the mind. Chulin Sun can induce plant seeds to grow shoots and roots several cm long within 20 min using mentally projected qi energy (Fig. 1).

This has been demonstrated on more than 180 different occasions at universities as well as science and research institutions in China (including Taiwan and Hong Kong) as well as other countries (e.g., Japan, Thailand, Malaysia, etc.) (Ge et al., 1998; Qin et al., 1998; Lee et al., 1999). We took part in and repeated the qi germination experiments seven times, and five of them succeeded (Ge et al., 1998). This remarkable effect on seed development has drawn widespread attention (Tompkins and Bird, 1973; Lee, 1998), but the biological mechanisms that underlie this phenomenon are unknown.(source)

Sun is thought to have been able to do this by tapping into a level of Qi. he abstract states,
“It was thought preliminarily that qi energy changed the structure of a germination-correlated gene site speeding up expression and advancing it in time.”
Qi is described as the ‘oneness’ that is flowing through everything all of the time. It is responsible for every good and bad thing that happens to you, and to harness it and use it for good, you must be free of the constraints of the physical world.

These studies prove that ‘super-humans’ exist but that they are not fully understood by mainstream science, and the unwillingness by the government to allow them to be studied in the public eye means only the secret intelligence services are the ones who really understand the extent of these extraordinary human beings.

Will Robots Take My Job? I Found The Answer On This Website

Will robots take my job? This is the question I have started to ask myself lately, ever since I heard Jack Ma’s warning about our future being very painful and Bill Gates referring to robot taxes.  What’s more, I have been hearing more and more about the increasing degree of automation in various job sectors. Be it a car manufacturing assembly line, a robot kiosk at KFC, autonomous cars, delivery drones, etc.

Thankfully, some researchers have made efforts to statistically analyze the situation and predict which jobs are more likely to face the wrath of the robots in the future.

A report titled The Future of Employment: How susceptible are jobs to computerisation? was published by Carl Benedikt Frey and Michael Osborne in 2013.

The study focused on the susceptibility of the 702 detailed occupations to computerization. They used some hard to grasp mathematical concepts like Gaussian process classifiers and were able to arrive at a conclusion that around 47% of the total US employment is at risk. Now, four years after the study, the figure might have increased a bit further.

According to the report, people working as physicians, surgeons, dentists, community managers, civil engineers, fashion designers, lawyers, hairstylists, chef, and more are still on the safe side. In fact, the report labels these occupations as “not computerizable”. But considering the rapid growth in AI and technology, some of these ‘safe’ jobs might also get compromised.

A website which goes by the domain willrobottakemyjob.com has extracted the figures from the report and added more information from the Bureau of Labor Statistics to present it to the users in an easily understandable way. All you need to do is enter your job designation in the search bar and it’ll show you how likely are computers to take your job in the future.

Thankfully, AIs and bots aren’t very interested in taking my job, at least, till the next decade.

The information available on Will Robots Take My Job? might not set in stone but it can give you a ballpark estimation about a possible automation in your field.

“The Future Of Coding Is No Coding At All” — Did GitHub CEO Predict Traditional Programming’s Death?

GitHub, also called “Facebook for Programmers,” has completed a decade this year. Today, it has become a go-to place for developers to share their code with others, indulge in collaborative approaches, etc. It’s now home to 24 million total users and 1.5 million organization.

At the company’s annual GitHub Universe user conference, company’s CEO Chris Wanstrath made his final keynote address on Wednesday. Earlier in August, he announced that he’d step down as company’s CEO as soon as a worthy replacement is found.

Future Of Coding: End of programming as we know it

The increased innovation in the field automation with the help of AI and machine learning has resulted in increasing tension in the traditional job markets. It’s a common perception that robots will steal our jobs and intelligent machines will ultimately rule the humanity.

Earlier this year, we told you about an artificial intelligence system created by Microsoft and the University of Cambridge researchers. Named DeepCoder, this system can write code after learning from a huge code database. Overall, whatever might be the final outcome, we also need to analyze the impact on programming world in the upcoming years.

Addressing the same issue, during the keynote, Wanstrath said that coding could also become another job for the advanced robots (Via: The Register).

“We think the future of coding is no coding at all,” he said. But how would change take place? Have AI techniques advanced so much?

He outlined the fact that people are writing lesser code as a lot of functionality now comes from libraries. Further down the road, people will write even lesser, thanks to machine learning and community expansion efforts. This will make software development process more mechanized and accessible.

In order to innovate at the same pace, GitHub is taking some steps on its end as well. The company has recently launched Dependency Graph to show packages and apps linked to a particular repository. It’ll tell a developer when the code relies on an insecure package.

In near future, we’ll surely witness more tools from leading organizations to help the developers automate their tasks and change the software development workflow.

Are you a developer? What are your views on future of coding automation? Whatever might be the final outcome, the demand for skilled coders isn’t fading anytime soon. Here are some programming courses for you:

  • JavaScript
  • Python
  • Java
  • Ruby
  • C#
  • PHP
  • SQL
  • Swift
  • AngularJS