Skip to main content

How To Make Personal Diary And Notes On WhatsApp, Learn These Special Tips

 


In today’s era, the use of smartphones is constantly increasing, WhatsApp is the most special app on smartphones and it has become a special part of people’s lives as well. It is being used for personal and office work. Constantly new updates have been coming on WhatsApp, but in this report, we have been giving you some special tips with the help of which you can make a personal diary or notes on WhatsApp. Let’s know.

We do most of our work from our smartphone only. In such a situation, when we have to note some important things or make a list, we share it on phone notes or WhatsApp. Many times, from office to personal work, we also share on WhatsApp.

We write our important thing or any message and send it to any of our family members or friends on WhatsApp. Doing this can sometimes result in frontal confusion, so today we are telling you the trick of such a big work of WhatsApp which you can use to save your important work or any document. You can also use your WhatsApp like a personal diary or notes. Let us know what to do to create a personal diary on WhatsApp



How to create a personal diary on WhatsApp

  • First of all, go to your WhatsApp and create a new group.
  • To create a group, click on the three dot in the right side in the top of WhatsApp, here you will get an option to create a new group.
  • Now while creating a group, add one of your family members or friends.
  • According to your own name, ‘Draft’, ‘Diary’ or some other group name.
  • After forming a group, there will be only two members, one you and the other you have added.
  • Now you remove the other member from the group. After doing this, the group will remain and you will be the only member in it.
  • Now whenever you want to note something, you can message in this group.
  • By doing this, no one will be able to see your message nor will you disturb anyone with your message.
  • You can use this group as your personal diary. In this, you can write anything and see it later.
  • You can also send office or any personal document to this group.
If you came till here.please subscribe GAMEON WARRIOR on youtube:
: https://www.youtube.com/channel/UC8cmX4GCdgLDiywJljurDlg

.

Comments

Post a Comment

Popular posts from this blog

What is Bug Bounty in Cyber Security 2022?

Task 1 | What is Penetration Testing? Before teaching you the technical hands-on aspects of ethical hacking, you'll need to understand more about what a penetration tester's job responsibilities are and what processes are followed in performing pentests (finding vulnerabilities in a client's application or system).   The importance and relevancy of cybersecurity are ever-increasing and can be in every walk of life. News headlines fill our screens, reporting yet another hack or data leak.   Cybersecurity is relevant to all people in the modern world, including a strong password policy to protect your emails or to businesses and other organizations needing to protect both devices and data from damages.   A Penetration test or pentest is an ethically-driven attempt to test and analyze the security defenses to protect these assets and pieces of information. A penetration test involves using the same tools, techniques, and methodologies that someone with malicio...

WHAT IS SESSION HIJACKING?

  What is Session Hijacking? A session is the period of time when you as a user are actively accessing an application, website, or other online service. Each user session begins when you log into a website or app and ends when you log out of it. For example, when you type your username and password into a banking application, that begins your session on that online application. When you log into an online application, for example, amzon.com, their server typically generates a temporary session cookie in your browser. This cookie tells your browser that you are logged in and have been authenticated on the server by Amazon. Each temporary session cookie is marked by a unique session ID, or key. If a hacker is able to access your unique session ID, they can access your session. Let us take the example of Facebook. For example, when you log into Facebook, a session begins. This allows you to keep using Facebook (even if you close and reopen the web browser) until you click on ‘log out’...