Home Blog Page 7

Remote Jobs Platforms to Work From Home

Since the global pandemic, working remotely has grown in popularity, and more businesses are now willing to hire remote workers. As a result, there are now several platforms for remote employment that link job seekers with companies looking for remote workers. In this article, we’ll examine some of the most well-known websites for remote employment, such as Freelancer.com, Upwork.com, RemoteOK.com, and many others, and give a summary of their features and advantages. These platforms can assist you in finding your next remote employment opportunity, regardless of your level of expertise.

  1. Freelancer.com: Freelancer.com is a platform that links independent contractors with organizations and people wishing to hire them for a range of activities and projects. Web development, programming, design, and writing are just a few of the many categories it covers. It also enables freelancers to bid on jobs and collaborate with clients from across the globe. Visit this link to get started.
  2. Upwork.com: Another website that links independent contractors with clients is Upwork. It provides a wide range of categories, including web development, programming, design, and writing. It also provides a range of tools to facilitate collaboration, communication, and project management between freelancers and customers. Visit this link to get started.
  3. RemoteOK.com: A platform called RemoteOK specializes only in remote employment opportunities. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level. Visit this link to get started.
  4. WorkingNomads.co: A program called WorkingNomads connects remote employees and digital nomads with employment possibilities. Job seekers can filter job listings by region, experience level, and other factors. They provide a wide range of employment categories, such as web development, programming, design, and customer support. Visit this link to get started.
  5. Showwcase.com: Companies can advertise their remote jobs and teams on the platform Showwcase in order to entice top talent from across the world. Job seekers can use Showwcase to search for remote employment possibilities by region, industry, and firm size. Visit this link to get started.
  6. Crossover: Crossover is a platform that only focuses on remote employment options for software engineers; it employs a stringent hiring procedure to find the best remote employment opportunities for each candidate.
  7. Arc: Arc is a platform that links remote employees with employment opportunities and services to help them flourish in a remote work environment. It offers a wide range of job categories, including web development, programming, design, and customer care.
  8. Remote.co: The platform Remote.co enables job seekers to explore for remote employment possibilities by location, industry, and firm size. It also provides a number of tools for remote workers and businesses wishing to hire remote workers.
  9. Remotive.io: Remotive is a platform that provides a range of services for remote employees. These resources include a job board, a community forum, and a newsletter. It also enables job seekers to look for remote job opportunities by area, industry, and firm size.
  10. Skipthedrive: The platform Skipthedrive enables job searchers to look for remote employment possibilities by location, industry, and firm size. It also provides a variety of remote job options and information for remote workers.
  11. Jobspresso: This website enables job seekers to look for remote employment possibilities by location, industry, and firm size. It also provides a variety of remote job opportunities and information for remote workers.
  12. EuropeRemotely: It offers a wide range of job categories, such as web development, programming, design, and customer service, and allows job seekers to filter job listings by region, experience level, and other criteria. Remotely is a platform that concentrates solely on remote job prospects for workers in Europe.
  13. Outsourcely: It offers a wide range of categories, including web development, programming, design, and writing, and allows remote workers to bid on projects and work with clients from all over the world. Outsourcely is a platform that connects businesses and individuals with remote workers for various projects and tasks.
  14. PowerToFly: is a platform that links women in technology with employment opportunities and tools to support their professional success. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  15. RemoteGlobal.com: In order to assist them flourish in a remote work environment, RemoteGlobal is a platform that connects remote workers with job opportunities and services. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  16. Devsnap.io: To help remote developers thrive in their professions, Devsnap is a platform that connects them with job opportunities and resources. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  17. Nodes.co: A platform called Nodes connects remote developers with employment opportunities and resources to advance their careers. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  18. JustRemote is a site that specializes solely in remote employment opportunities. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  19. Virtual Vocations: A platform that specializes in remote employment prospects for professionals in a range of industries and job functions is called Virtual Vocations. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  20. Pangian is a platform that links remote employees with employment opportunities and tools to support their success in a remote working setting. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  21. Remotive is a platform that gives remote employees access to a range of tools, such as a job board, a community forum, and a newsletter. Additionally, it enables job seekers to look for remote employment opportunities by region, sector, and size of the organization.
  22. PicJobs.co: To help remote workers succeed in a remote work environment, PicJobs is a platform that connects them with job opportunities and tools. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  23. RemoteHunt.com: To help remote workers succeed in a remote work environment, RemoteHunt is a platform that connects them with job opportunities and tools. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  24. WeWorkRemotely.com is a platform that links remote employees with employment opportunities and tools to support their success in a remote work setting. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level.
  25. Flexjobs.com: Flexjobs is a platform that provides professionals in a wide range of industries and job functions with a wide selection of remote and flexible job possibilities. Job searchers can use it to search a variety of job categories, including web development, programming, design, and customer service, and to filter job ads based on factors like geography and experience level. Additionally, it offers a membership-based structure that gives job seekers access to more employment options and tools. Because it personally screens and verifies each job listing before it is posted, Flexjobs is particularly well-known for providing high-quality and legitimate employment options.



Two-phase locking technique in DBMS concurrency control – An Introduction

Two-phase locking is a concurrency control technique used in database management systems (DBMS) to ensure the serializability of transactions. Serializability is the property that ensures that the concurrent execution of transactions produces the same result as if the transactions were executed one at a time.

Two-phase locking is based on the idea of acquiring locks on data items before reading or modifying them, and releasing locks after the data has been read or modified. There are two phases in the two-phase locking protocol:

  1. Growing phase: During this phase, a transaction can acquire locks on data items, but cannot release any locks.
  2. Shrinking phase: During this phase, a transaction can release locks, but cannot acquire any new locks.

Here is an example of how two-phase locking works:

  • Transaction 1 begins and acquires a lock on data item D1.
  • Transaction 2 begins and tries to acquire a lock on D1, but is blocked because Transaction 1 has a lock on D1.
  • Transaction 1 releases its lock on D1 and acquires a lock on D2.
  • Transaction 2 acquires the lock on D1 and begins executing.

In this example, Transaction 2 is executed after Transaction 1, even though they were running concurrently. This ensures that the integrity of the database is preserved as if the transactions were executed one at a time.

Here is an algorithm for two-phase locking:

  1. Begin the transaction and enter the growing phase.
  2. Acquire locks on any data items that need to be accessed or modified.
  3. Execute the transaction.
  4. Release all locks and enter the shrinking phase.
  5. Commit the transaction.

Two-phase locking is a simple and effective concurrency control technique, but it can suffer from performance issues due to lock contention (when multiple transactions are trying to acquire the same lock).

Serializable schedule in DBMS transaction processing

In a database management system (DBMS), a serializable schedule is a way of executing concurrent transactions in a way that produces the same result as if the transactions were executed serially (one after the other). In other words, a serializable schedule ensures that the concurrent execution of transactions preserves the integrity of the database, as if the transactions were executed one at a time.

A serializable schedule is achieved through the use of locks, which are used to prevent multiple transactions from accessing and modifying the same data simultaneously. When a transaction acquires a lock on a piece of data, no other transaction can access or modify that data until the lock is released. This ensures that the transactions are executed in a serial fashion, even though they are running concurrently.

Here is an example of how a serializable schedule might work in a DBMS:

  • Transaction 1 begins and acquires a lock on data D.
  • Transaction 2 begins and tries to acquire a lock on data D, but is blocked because Transaction 1 has a lock on D.
  • Transaction 1 completes and releases the lock on D.
  • Transaction 2 acquires the lock on D and begins executing.

In this example, Transaction 2 is executed after Transaction 1, even though they were running concurrently. This ensures that the integrity of the database is preserved, as if the transactions were executed one at a time.

Search Engines to track for Cybersecurity Research

Hi everyone, welcome to yet another article on cyber security at DataSagar. Today, I’m trying to list as many platforms as possible for cybersecurity researchers. The cybersecurity search engines listed below can be helpful in gathering threat intelligence, identifying vulnerabilities and attack surfaces, and exploring various data sources related to cybersecurity. Each website offers unique features and can help you achieve different goals, depending on your specific needs.

DeHashed (https://dehashed.com)
Access to numerous leaked credentials, such as passwords, usernames, email addresses, and more, is made possible through the search engine DeHashed. It enables users to look up their own data and receive an in-depth report on the data that is readily accessible to the general public. DeHashed is helpful for both individuals who wish to safeguard themselves against potential data breaches and for companies who want to determine whether the information of their employees is secure.

SecurityTrails (https://securitytrails.com)
The cybersecurity search engine SecurityTrails offers a big DNS data collection. It enables users to carry out a wide range of DNS searches, such as reverse DNS lookups, domain IP history, DNS record kinds, and a lot more. Network administrators and security experts that require comprehensive information on the domain name system settings of a website can benefit from SecurityTrails.


DorkSearch (DorkSearch – Speed up your Google Dorking)
Search engine DorkSearch provides quick Google dorking services. By utilizing complex search operators, it enables users to look for hidden content on websites, which can assist them in locating potential security flaws. Hackers, security researchers, and penetration testers who need to locate private information can find it with the help of DorkSearch.

ExploitDB (https://www.exploit-db.com)
An archive of many exploits and vulnerabilities is called ExploitDB. It includes exploit code and tools to help with penetration testing, information on how to exploit various software and operating systems, and both. ExploitDB is helpful for security professionals who need to test their own systems for potential flaws and who want to learn about the most recent exploits and vulnerabilities.

ZoomEye (https://www.zoomeye.org)
ZoomEye is a search engine that allows users to gather information about targets. It can search for various Internet of Things (IoT) devices, servers, websites, and more. ZoomEye is useful for security researchers, penetration testers, and hackers who need to gather information about a specific target to identify potential security vulnerabilities.

Pulsedive (https://pulsedive.com/)
Pulsedive is a search engine that offers a platform to search for threat intelligence. It collects and analyzes data from various sources, including social media, forums, dark web, and more. Pulsedive is useful for security professionals who want to stay up-to-date on the latest threats and vulnerabilities and for those who need to perform threat intelligence analysis.

GrayHatWarfare (https://buckets.grayhatwarfare.com/)
GrayHatWarfare is a search engine that allows users to search for public Amazon S3 buckets. It offers access to various public data that is stored in these buckets. GrayHatWarfare is useful for security researchers, penetration testers, and hackers who need to find sensitive data that is inadvertently exposed on the internet.

PolySwarm (https://polyswarm.io/)
PolySwarm is a platform that allows users to scan files and URLs for threats. It uses various artificial intelligence (AI) and machine learning (ML) technologies to detect malware and other malicious content. PolySwarm is useful for security professionals who need to scan files and URLs for potential threats.

Fofa (https://fofa.so/)
Fofa is a search engine that offers various threat intelligence services. It can search for various Internet-connected devices, services, and software, and provides detailed information about them. Fofa is useful for security professionals who want to gather intelligence on potential targets and for those who need to perform reconnaissance on a specific target. For some reason, I wasn’t able to access the website of fofa so including its company’s GitHub link for your reference.

LeakIX (https://leakix.net/)
LeakIX is a search engine that allows users to search for publicly indexed information. It collects data from various sources, including open databases, web archives, and more. LeakIX is useful for security researchers who need to find information that is publicly available on the internet.

DNSDumpster (https://dnsdumpster.com/)
DNSDumpster is a free web-based tool that provides a quick and easy way to search for DNS records. It allows you to identify subdomains, IP addresses, mail servers, and other information related to a specific domain. This information can be useful for finding potential vulnerabilities and performing reconnaissance.

FullHunt (https://fullhunt.io/)
FullHunt is a search engine that helps you discover and monitor attack surfaces. It allows you to search for subdomains, IP addresses, and other assets related to a specific domain. The tool can also be used to monitor changes to a domain’s attack surface over time.

AlienVault (https://www.alienvault.com/)
AlienVault is a cybersecurity platform that provides extensive threat intelligence feeds. It collects data from a wide range of sources, including its own network of sensors, open-source intelligence, and community contributions. The platform provides real-time threat intelligence and security insights to help organizations protect against cyber threats.

ONYPHE (https://www.onyphe.io/)
ONYPHE is a platform that collects and analyzes cyber threat intelligence data. It provides access to a large database of network data, including IP addresses, domains, and other information related to cybersecurity threats. The platform also offers advanced search capabilities and analytics tools to help organizations identify and mitigate threats.

Grep App (https://grep.app/)
Grep App is a search engine that allows you to search across a half million Git repositories. It provides a quick and easy way to search for code, configurations, and other sensitive information that may have been inadvertently exposed in Git repositories.

URL Scan (https://urlscan.io/)
URL Scan is a free service that allows you to scan and analyze websites. It provides information about a website’s security, including its SSL/TLS certificate, server headers, and potential vulnerabilities. The tool can also be used to identify phishing and malware websites.

Vulners (https://vulners.com/)
Vulners is a search engine that allows you to search for vulnerabilities in a large database. The platform provides access to a wide range of security information, including CVEs, exploits, and security advisories. It also offers a set of tools for analyzing and mitigating security threats.

WayBackMachine (https://web.archive.org/)
WayBackMachine is a digital archive of the World Wide Web. It provides access to over 25 years of archived web pages, including those that may have been deleted or removed from the internet. The platform can be a valuable tool for conducting historical research and forensic investigations.

Shodan (https://www.shodan.io/)
Shodan is a search engine that allows you to search for devices connected to the internet. It provides information about a device’s operating system, software, and other details that can be useful for identifying vulnerabilities and conducting reconnaissance. Shodan is often used by researchers and hackers to discover vulnerable devices and systems.

Netlas (https://netlas.io/)
Netlas is a platform that allows you to search and monitor internet-connected assets. It provides information about domains, IP addresses, and other assets that may be associated with a specific organization or individual. The platform also offers a set of tools for identifying vulnerabilities and mitigating threats.

CRT sh (https://crt.sh/)
CRT sh is a website that allows users to search for SSL/TLS certificates that have been logged by Certificate Transparency (CT) logs. Users can search by domain name, certificate authority, and other criteria to find information about certificates issued for specific domains. This can be useful for identifying potential security issues, such as when a certificate is issued for a domain that is not owned by the entity requesting the certificate.

Wigle (https://wigle.net/)
Wigle is a database of wireless networks that provides statistics on wireless network usage around the world. Users can search for networks by geographic location, SSID, MAC address, and other criteria. Wigle also provides tools for analyzing the data, such as heat maps and signal strength graphs. While Wigle can be used for legitimate purposes, such as network planning and research, it can also be used for nefarious purposes, such as identifying vulnerable networks to exploit.

PublicWWW (https://publicwww.com/)
PublicWWW is a search engine that allows users to search for websites by the code contained in their HTML, CSS, and JavaScript files. This can be useful for marketing and affiliate marketing research, as well as for identifying websites that may contain vulnerabilities or other security issues. PublicWWW provides advanced search options, such as the ability to search for specific keywords or code patterns.

Binary Edge (https://binaryedge.io/)
Binary Edge is a platform that scans the internet for threat intelligence. It provides tools for identifying internet-connected assets, such as IP addresses, domains, and SSL/TLS certificates, as well as for identifying vulnerabilities and other security issues. Binary Edge also provides an API for integrating its data into other tools and platforms.

GreyNoise (https://greynoise.io/)
GreyNoise is a search engine that allows users to search for devices connected to the internet that are generating noise or scanning activity. This can be useful for identifying potential threats, such as when a device is scanning for vulnerable systems to exploit. GreyNoise provides various search filters, such as geographic location and device type, to help users narrow their searches.

Hunter (https://hunter.io/)
Hunter is a search engine that allows users to search for email addresses belonging to a specific domain or company. It can also be used to verify the validity of email addresses and to find email addresses associated with specific individuals. While Hunter can be used for legitimate purposes, such as email marketing, it can also be used for phishing and other nefarious activities.

Censys (https://censys.io/)
Censys is a platform for assessing the attack surface of internet-connected devices. It provides tools for identifying open ports, certificates, and other information about devices connected to the internet. Censys also provides an API for integrating its data into other tools and platforms.

IntelligenceX (https://intelx.io/)
IntelligenceX is a search engine that allows users to search Tor, I2P, data leaks, domains, and emails. It provides tools for identifying and analyzing threat intelligence data, such as malware samples, phishing sites, and compromised credentials. IntelligenceX also provides an API for integrating its data into other tools and platforms.

Packet Storm Security (https://packetstormsecurity.com/)
Packet Storm Security is a website that provides information about the latest vulnerabilities and exploits. It includes a database of vulnerability advisories, exploits, and other security-related information. Users can browse the database by category or search for specific vulnerabilities or exploits.

SearchCode (https://searchcode.com/)
SearchCode is a search engine that allows users to search 75 billion lines of code from 40 million projects. It can be used for legitimate purposes, such as finding code snippets for programming projects or researching open-source software, as well as for security-related purposes such as identifying vulnerabilities in software.

Thanks for getting up to the end of this article. I hope you tried and enjoyed this amazing list of search engines powered by various search algorithms.

Happy Learning!

Essential Skills to Excel as a Power BI Developer: Beyond DAX and Power Query

Welcome to DataSagar, your ultimate destination for staying updated with the latest technology trends and insights. Today, we’re diving into the world of Power BI development, exploring the essential skills that go beyond mastering DAX and Power Query. As a Power BI developer, your expertise goes beyond formulas and queries; it extends into the realm of data modeling and database management. Let’s explore these crucial skills that can propel your career to new heights.

Mastering Data Modeling and Database Skills

Data modeling and database management are the cornerstones of effective Power BI solutions. To become an advanced Power BI developer, it’s imperative to have a strong grasp of these concepts. Here’s a breakdown of the skills you need to focus on:

Understanding STAR Schema, Dimension, and Fact

Before you dive into the intricacies of Power BI development, make sure you have a solid understanding of the basics. The STAR schema is a fundamental concept in data modeling. It involves creating dimension tables (containing attributes) and a central fact table (containing measures) connected by relationships. These relationships form the basis of building effective solutions.

To get started, check out this comprehensive guide on STAR schema, dimensions, and facts: STAR Schema, Dimension / Fact Basics.

Handling Unique Dimension Tables

Dimension tables might seem static, but they can change over time. Understanding how to handle changes in dimension tables is crucial for designing a robust data model. Familiarize yourself with different types of slowly changing dimensions (Type 0, Type 1, Type 2) and their implications on your model’s design.

Delve into the world of unique dimension tables with this resource: Unique Dimension Tables – Slowly Changing Dimension. Additionally, explore special dimension tables like Degenerative or Junk Dimensions, which play unique roles in certain scenarios.

Navigating Unique Fact Tables

Fact tables come in various forms, each serving different purposes. It’s vital to understand the differences between additive, semi-additive, and non-additive facts. These distinctions influence how you aggregate and analyze data in your Power BI reports.

Dive deeper into fact tables with these resources:

Architecting Advanced Data Models

Once you’ve grasped the fundamental concepts, it’s time to put everything together to create robust solutions. This involves architecting advanced data models that efficiently handle complex scenarios. Learn how to integrate dimensions, facts, and relationships seamlessly to deliver actionable insights.

For a comprehensive exploration of advanced data modeling, check out this 3-part series on PowerBI.tips: Advanced Data Modeling Series.

Staying Updated with Evolving Technologies

As technologies evolve, so does the landscape of data storage methods. Staying current with these changes is essential for staying relevant as a Power BI developer. Concepts like Fabric, Delta, and Data Lakehouses are gaining prominence.

Learning Resources to Get Started

To kickstart your journey toward becoming an advanced Power BI developer, here are some valuable learning resources:

Following is a list of best three books consistently receiving positive reviews for their depth of content, quality of instruction, and relevance to Power BI developers at various skill levels.

  1. “The Definitive Guide to DAX: Business intelligence for Microsoft Power BI, SQL Server Analysis Services, and Excel” by Marco Russo and Alberto Ferrari
    • This book is often hailed as the ultimate guide to DAX, providing deep insights into the language and its applications. The authors are well-respected experts in the field, and the book’s comprehensive coverage and clear explanations make it a must-read for anyone serious about mastering DAX.
  2. “Power Pivot and Power BI: The Excel User’s Guide to DAX, Power Query, Power BI & Power Pivot in Excel 2010-2016” by Rob Collie and Avi Singh
    • This book is highly regarded for its practical approach to teaching Power Pivot, DAX, and Power Query. It’s known for breaking down complex concepts into understandable, actionable steps, making it a favorite among both beginners and experienced users.
  3. “Analyzing Data with Power BI and Power Pivot for Excel” by Alberto Ferrari and Marco Russo
    • Alberto Ferrari and Marco Russo are prominent figures in the Power BI community, and this book is praised for its clear explanations of data modeling and analytics using Power BI and Power Pivot in Excel. Readers appreciate the book’s logical progression and real-world examples.

As a Power BI developer, your skill set extends far beyond writing DAX formulas and Power Queries. Data modeling, database management, and a deep understanding of schema, dimensions, and facts are essential for crafting powerful and insightful Power BI solutions. By mastering these skills and staying current with evolving technologies, you’ll be well-equipped to excel in your career and create impactful data visualizations that drive decision-making.

Stay tuned to DataSagar for more technology updates and insights that empower you on your tech journey. Happy Power BI developing!

Goodbye Internet Explorer

0

It’s time to say goodbye to Internet Explorer as Microsoft is officially terminating its support for good today.

Internet Explorer is a web browser that came in existence since the release of Windows 95 in 1995 AD. It was initially based on Spyglass’s Mosaic and covered over 95% of global browser market share around 2003. Later, with new competitors such as Chrome and Safari, its usage declined as users found faster and responsive alternatives. Though it’s being terminated by Microsoft from June 15, 2022 (today), serious hurdles is hitting thousands of IT Companies around the world.

Shut down of services is arising a serious problem for information systems and applications which are using this legacy browser in their internal services.

It is said that more than 40% of software based on Microsoft stack are using IE in their micro-services with Japan being on the top of the list. Whatever it be, Microsoft is shutting Internet Explorer for the good.

As of now, We’ve Microsoft Edge, Microsoft’s alternative for IE based on Chromium, installed in majority of Windows Operating System as well as Mobile devices. It’s a lesson for everyone that Quality products will always outlive a awesomely branded product. It’s the need of time and technology innovation that’s should be cared and assessed.

As IE helped us to traverse the journey of Web for almost 3 decades, we all have fond of memories associated with early day web browsing. Goodbye Buddy!

Transaction Control in DBMS – An introduction with examples

A transaction in a database management system (DBMS) is a piece of work done on a database. Because a transaction is an atomic unit, it can either be completed entirely or not at all. Desirable properties of Transaction in DBMS are commonly known as ACID properties.

The process known as transaction control enables you to govern how transactions affect your database. It enables you to either roll back the changes made during a transaction in the event of an error or commit the changes made during a transaction to the database.

Here I present you some examples of how transaction control is used in a DBMS:

  1. Transferring money from one bank account to another:

You can think of this as a two-step process:

  • Step 1: Deduct the money from the source account
  • Step 2: Add the money to the destination account

To make sure that the accounts remain in a consistent state, you would want to roll back the transaction if either of these stages fails.

  1. Updating a customer’s address in a database:

Consider updating a database with a customer’s address. There may be numerous tables where the address needs to be updated (e.g., the “customers” table and the “orders” table). To keep the database in a consistent state if one of the updates fails, you would want to roll back the transaction.

  1. Printing a report:

Consider printing a report that requires data queries from several different tables. You may want to roll back the transaction if the query fails for any reason in order to prevent the report from being generated with inaccurate or missing data.

These are just a few instances of how a DBMS uses transaction control.

Happy Learning!

Received “Looks like a lot to you” message in Facebook Messanger? Don’t Click on it!

Hi everyone! I’m here again with a post on viral facebook messanger phishing link spreading accross these days. I’ve received couple of messages in my messanger that says “Looks like a lot to you” along with a clickable link. Message exactly looks like image alongside.

If you’re receiving a video link in facebook messenger saying “This looks like you”, it’s a spam. Many of my friends are sending this spam link and some are clicking on it as well.

You should be aware that it may install malicious software or program(malware) on your device or can even allow an unknown third party to have access to your facebook account. Please be noted that it’s phishing link and do not enter any information or your user name and password asked there.

If you’ve already clicked this link, you need to take the following necessary actions before your account being compromised by hackers.

  1. Change your facebook password immediately
  2. Make sure to remove unknown app that you’ve given permission with or wothout your conscent in Website and Apps Settings
  3. Also, its a good idea to turn permissions off to third party apps and games in facebook

For step 1, Your password might already have been compromised if your have clicked this link. Change your password immediately by going to your security settings to prevent unauthorized access.

For step 2 and 3, Disable unknown app and revoke permission by going to your Facebook Settings followed by Security and Login option there.

Setting screen looks like the following in PC.

You’ll see Apps and Website there where I recommend you to immediately change your third party preferences.

For this, Under “Apps and Website” setting, scrool down to “Preferences” and find “Apps, websites and games” option that says Gives you the ability to use Facebook to log into and interact with third party apps, websites and games as well as connect accounts you have with other apps, websites and games to Facebook.

If you find this helpful and think your friends and family need to stay safe online, please share!

Thanks and stay safe online.

GeekSagar