It is possible that you might like a favicon (yes the logo icon that is displayed in the browser tab) of a certain website. Now, normally most of the websites store it in the form of favicon.ico in the root directory of any website. So, you can just type in: http://domain.com/favicon.ico and download it when it appears in the browser.
But, not all the websites store it this way. If you find it hard – let it be done by Google. Just type in the following link in the web browser – and it will show you the favicon.ico:
To get the favicon for a domain, use
To get the favicon for an URL, use
Replace domain.com with the actual domain from which you’d like to download the favicon from.
Want to check what your website rank is for some certain keywords?
Here is the link where you can check your website rank in SERP (Search Engine Result Pages):
If you are writing blog posts and actually copying content from other sites – you’ll not be doing any good (if not bad) to your blog from SEO perspective. The math is simple – if the content is not yours – do not put it in your website.
Now the question is how are you going to get unique contents? Simple – write your content yourself. To make sure your content is not matching that with someone else’s – you may check your content with Plagiarism checker. While there are standalone system for plagiarism check – there is a plugin for WordPress – which does it right from the wordpress editor. Moreover, it is FREE.
However, if you are not working with WordPress and would like to use something like this – here is a link where you can do so: http://smallseotools.com/plagiarism-checker/
If you are a tech savvy person – you probably know how phishing works. However, this time attackers tried to use optical illusion to trap people into a new phishing scam targeting the GMail users. Here’s how it looks like:
Scammers attach an image which looks like it is an attachment. When you click on it – it takes you to the scammers destination – to the phishing link. And if you ignore the login URL – you are DONE!!
The phishing login page has been tricked as well to look like it is from Google. So even the most savviest person may fall for the trick. Here is how the phishing page URL will look like:
Img credit: The Hacker News
So, next time you are forwarded to any login page – double – triple check.
You may find more about it in this link.
YOU WANT TO KNOW THE WINDOWS SERIAL KEY – WHICH WAS USED TO ACTIVATE YOUR WINDOWS.
- You may be planning to re-install the windows. You may have lost the key.
- You may be selling your computer and buying a new one – but want to retain your copy of windows.
No Worries. You can retrieve your key from the computer. In this case you’ll need a running windows to get the key.
Copy and paste the following into a Notepad, save the text file and rename the file to “productkey.vbs”:
Set WshShell = CreateObject("WScript.Shell")
MsgBox ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))
Const KeyOffset = 52
i = 28
Chars = "BCDFGHJKMPQRTVWXY2346789"
Cur = 0
x = 14
Cur = Cur * 256
Cur = Key(x + KeyOffset) + Cur
Key(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
Loop While i >= 0
ConvertToKey = KeyOutput
Now run the file “productkey.vbs”. You should see something like this:
Note it down and save it somewhere. Good luck.
To compress in tar.gz format:
tar -cv /directory | gzip > archive.tar.gz
To decompress the tar.gz file:
tar -zxvf archive.tar.gz
Commuters from Uttara to Motijheel know what it takes for them to reach their destination in rush hours. It is hard to believe that our urban planners couldn’t make a parallel lane to the Uttara – Motijheel road. Yes there are branch roads one through Kuril Bishwaroad and another one through Mohakhali Tejgaon – but still – Uttara to Kuril – ONLY ONE CONNECTING ROAD.
There was probably no need to write this article – but one recent incident on 14th & 15th October – Chinese President’s visit to Bangladesh is an eye opener for our urban planners. Chinese President was staying at Le Méridien Dhaka – which is located on this road. It is understandable that to ensure security for this VVIP – the security agencies needed blocking this road. But what is not understandable is that – this road is the only road through the city which connects the Northern and Southern part of the city. Not only that – the road is vital as Country’s largest Airport is located by this road. This road also connects few other Highways – such as:
- Dhaka – Mymensingh Highway
- Dhaka – Sylhet Highway
- Dhaka – Jamuna Bridge Highway
Blocking this road entirely – means blocking these highways and blocking the way of Airport goers as well as blocking the commute from Uttara to Southern part of the city. This is insane!! The whole city had to suffer on those two days (14, 15 October 2016). Please have a look at the following map:
The problem on those two days were not only for North to South commuters. Since this road divides the city in two parts – East and West and people from both side needs to use this road to go to other sides – blocking this road means blocking East West crisscrossing too.
What on our policy makers’ minds go through when they plan to reside Chinese President Le Méridien Dhaka??? Couldn’t they imagine the consequences?? The VVIP not only stayed on that hotel – he had to use the road to attend all the programs and most of them were in the middle of the city.
Now this incident is an eye opener for our Urban planners to think seriously about the issue. It is understandable that not every day VVIPs will stay in Le Méridien Dhaka – but some other incidents may take place (For example, PM or VVIP Leaders are welcomed when they return from foreign trip) which can cause the road block. Moreover, in few years time twice the number of people will start living at Purbachol – so add those people in the number who will be using this road!!
It is time Government should take this issue seriously and try to build more roads connecting North to South. We have seen building flyovers are not even working since those do not have enough connecting roads which will make room for the transportation. There are still some less occupied areas through which roads can be built. These roads will definitely help reduce the pressure on the Airport road and moreover act as redundant connectivity from north to south.
– Hasibul Islam
Internet connected Linux servers are always vulnerable to exploitation by the hackers/intruders. One of their common attack is through SSH. By default SSH servers are configured to listen to port 22 for SSH connection. Changing the port to something else will definitely add an additional measure in securing the server.
How to Change Default SSH port 22 to something else:
- Connect to your server via SSH (your ssh port is still 22) as the root user.
- Run this command: # vi /etc/ssh/sshd_config
- Find out this line: # port 22
- Delete the hash “#” sign from the beginning of the line and change the port to something else. Note down this new port very carefully. You’ll need to use this port for the SSH connection from the next login.
- Save the file and exit.
- Restart the SSH service by executing this command: # service sshd restart
Now disconnect and try reconnecting with the new SSH port. Make sure you memorize the new port number or note it down somewhere.
People all around the globe are posting their photos with cool effects applied through a cool application named Prisma. The app was initially released for IOS – which means iPhone users were the ones to use it. Well – although late but Android users can use the app too.
You may find it hard finding the real Prisma app (By Prisma Labs, Inc.) in Google play – as there are a lot of fake Prisma apps there. Here is the official download link of Prisma: https://goo.gl/JqAoUC