{"id":2320,"date":"2018-04-18T07:00:23","date_gmt":"2018-04-18T01:30:23","guid":{"rendered":"http:\/\/www.upnxtblog.com\/?p=2320"},"modified":"2019-05-29T19:24:59","modified_gmt":"2019-05-29T13:54:59","slug":"how-to-wipe-your-pc-mobile-data-before-selling-it","status":"publish","type":"post","link":"https:\/\/www.upnxtblog.com\/index.php\/2018\/04\/18\/how-to-wipe-your-pc-mobile-data-before-selling-it\/","title":{"rendered":"How to wipe your personal data before selling it (For PC\/Mobile\/Router\/eBook reader)"},"content":{"rendered":"<div class='booster-block booster-read-block'><\/div><p>Whether you&#8217;re selling a computer \/ mobile or just want to reinstall an OS from scratch,you would definitely want to make sure all of your personal data, including your photos, messages, and files are wiped before sending it to new owner.In this post,we&#8217;ll learn how to wipe your personal data before selling it.<\/p>\n\n<h2>#1.Personal Computers<\/h2>\n<h3><strong>Step #1.<\/strong>\u00a0Download DBAN Utility<\/h3>\n<p>Download the <a title=\"Click to download dban-2.3.0_i586.iso\" href=\"https:\/\/sourceforge.net\/projects\/dban\/files\/dban\/dban-2.3.0\/dban-2.3.0_i586.iso\/download\" target=\"_blank\" rel=\"noopener\"><span class=\"name\">dban-2.3.0_i586.iso<\/span><\/a> file to your desktop and burn the ISO file to blank CD-R or DVD-R media and make it as bootable.<\/p>\n<p>You can also use <a href=\"http:\/\/www.winimage.com\/wimushlp\/wini2l4o.htm\" target=\"_blank\" rel=\"noopener\">WinImage self extractor<\/a>\u00a0to install DBAN on to USB flash device.<\/p>\n<figure style=\"width: 456px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_01.jpg?resize=456%2C391&#038;ssl=1\" alt=\"Use WinImage to install DBAN on to USB device\" width=\"456\" height=\"391\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 456px; --smush-placeholder-aspect-ratio: 456\/391;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; Use WinImage to install DBAN on to USB device<\/figcaption><\/figure>\n<h3><strong>Step #2:<\/strong>\u00a0Make DBAN Bootable disc<\/h3>\n<p>Run the BIOS setup program and put the USB drive or ROM drive first in the boot order. Do this by pushing ESC, Delete, F1 or F2 when you power-on the computer. Check for a prompt when you power-on the computer or you can consult the motherboard documentation for the key combinations.<\/p>\n<h3><strong>Step #3:Start DBAN<\/strong><\/h3>\n<p>Here you can choose autonuke to start DBAN in automatic mode or there is an option for Interactive mode which lets you customize exactly how DBAN will erase files, as well as which hard drives it will erase.<\/p>\n<figure style=\"width: 640px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_02.jpg?resize=640%2C356&#038;ssl=1\" alt=\"DBAN home screen\" width=\"640\" height=\"356\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; DBAN home screen<\/figcaption><\/figure>\n<p><em><strong>WARNING:\u00a0<\/strong>DBAN is about to\u00a0irreversibly erase all the files on all your hard drives, so be sure to choose appropriate options this step and the following ones.<\/em><\/p>\n<h3><strong>Step #4:<\/strong> Choose drive to wipe the data.<\/h3>\n<figure style=\"width: 640px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_03.jpg?resize=640%2C356&#038;ssl=1\" alt=\"Choose drive to wipe data\" width=\"640\" height=\"356\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; Choose drive to wipe data<\/figcaption><\/figure>\n<h3><strong>Step #5:<\/strong> Choose Wipe method.<\/h3>\n<p>Wipe method is all about the pattern to be used to erase the files, as well as how many times to repeat that pattern.<\/p>\n<p>DBAN supports following wipe methods<\/p>\n<ol>\n<li><strong>dod\u00a0<\/strong><\/li>\n<li><strong>dodshort\u00a0<\/strong><\/li>\n<li><strong>ops2\u00a0<\/strong><\/li>\n<li><strong>gutmann<\/strong><\/li>\n<li><strong>prng<\/strong><\/li>\n<li><strong>quick<\/strong><\/li>\n<\/ol>\n<p>DBAN recommends using the\u00a0<strong>dodshort\u00a0<\/strong>command but you can use any of them that you think is appropriate. Usually <strong>quick<\/strong> method would be the best option to choose when you&#8217;re not sure on what to choose.<\/p>\n<figure style=\"width: 640px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_04.jpg?resize=640%2C356&#038;ssl=1\" alt=\"Choose Wipe Method\" width=\"640\" height=\"356\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; Choose Wipe Method<\/figcaption><\/figure>\n<h3><strong>Step # 6:<\/strong>\u00a0Erase the disc<\/h3>\n<p>Based on Wipe Method,DBAN erases the data on the disc.<\/p>\n<figure style=\"width: 640px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_05.jpg?resize=640%2C356&#038;ssl=1\" alt=\"DBAN Progress\" width=\"640\" height=\"356\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; DBAN Progress<\/figcaption><\/figure>\n<h3><strong>Step #7:<\/strong>\u00a0Wait for DBAN Succeeded Message<\/h3>\n<p>Once DBAN has completely finished the data wipe of the selected hard drive(s), you would see this &#8220;DBAN succeeded&#8221; message.<\/p>\n<figure style=\"width: 640px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" class=\"size-full lazyload\" data-src=\"https:\/\/i0.wp.com\/dban.org\/wp-content\/uploads\/2016\/11\/dban-screenshot_06.jpg?resize=640%2C356&#038;ssl=1\" alt=\"DBAN Verification\" width=\"640\" height=\"356\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/356;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; DBAN Verification<\/figcaption><\/figure>\n<p>At this point, you can safely remove the disc or USB device that you&#8217;ve installed DBAN to, and then shut down or restart your computer.<\/p>\n<h2>#2.iPad,iPhone or iPod touch<\/h2>\n<p>Before you move ahead with the below steps, make sure you have an up-to-date backup of your iPhone\/iPod.<\/p>\n<ol>\n<li>Launch the\u00a0<strong>Settings app<\/strong>\u00a0from the\u00a0<strong>Home screen<\/strong>\u00a0of your iPhone or iPad.<\/li>\n<li>Now tap on\u00a0<strong>General<\/strong>.<\/li>\n<li>Scroll all the way to the bottom and tap on\u00a0<strong>Reset<\/strong>.<\/li>\n<li>Tap on\u00a0<strong>Erase All Content and Settings<\/strong>.\n<p><figure style=\"width: 302px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/support.apple.com\/library\/content\/dam\/edam\/applecare\/images\/en_US\/iOS\/iphone7-ios11-settings-general-reset-erase-all-selected-step-crop.png?resize=302%2C263&#038;ssl=1\" alt=\"iPhone Erase All Content and Settings option\" width=\"302\" height=\"263\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 302px; --smush-placeholder-aspect-ratio: 302\/263;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; iPhone Erase All Content and Settings option<\/figcaption><\/figure><\/li>\n<li>Tap on\u00a0<strong>Erase iPhone<\/strong>.<\/li>\n<li>Tap on\u00a0<strong>Erase iPhone<\/strong>\u00a0again to confirm.<\/li>\n<li>Enter your\u00a0<strong>Passcode<\/strong>.<\/li>\n<li>Enter your Apple ID\u00a0<strong>password<\/strong>\u00a0to turn off Activate Lock and remove the device from Find my iPhone.<\/li>\n<\/ol>\n<figure style=\"width: 515px\" class=\"wp-caption aligncenter\"><img data-recalc-dims=\"1\" decoding=\"async\" data-src=\"https:\/\/i0.wp.com\/support.apple.com\/library\/content\/dam\/edam\/applecare\/images\/en_US\/iOS\/iphone7-ipad-ios11-erase-device-hero.jpg?resize=515%2C330&#038;ssl=1\" alt=\"Erase iPhone, iPad, or iPod touch\" width=\"515\" height=\"330\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 515px; --smush-placeholder-aspect-ratio: 515\/330;\" \/><figcaption class=\"wp-caption-text\">Image &#8211; Erase iPhone, iPad, or iPod touch<\/figcaption><\/figure>\n<h2>#3.Android Phone\/Tablet<\/h2>\n<p>For Android phone\/tablet devices you can perform Factory reset\u00a0but it doesn\u2019t actually overwrite the data. There are possibilities that someone can employ off-the-shelf recovery software and get some of that data back.<\/p>\n<p>To avoid this kind of scenario,you can encrypt the data. This is built in option and requires you to enter\u00a0a PIN or password every time you turn your\u00a0phone on. For anyone to recover data from your phone they would need key to decrypt it.<\/p>\n<h3>Step#1.Encrypt Data<\/h3>\n<p>From\u00a0<em>Settings &gt; Security &gt; Encrypt phone\u00a0<\/em>or it could be located at\u00a0<em>Settings &gt; Lock screen &amp; security &gt; Protect encrypted data<\/em>.<\/p>\n<p>On an encrypted device, all personal data gets encrypted. This includes things like\u00a0your email, texts, contacts, Google Account data, app\u00a0data, photos, media, and downloads.\u00a0Some non-personal data, like file sizes, aren&#8217;t encrypted.<\/p>\n<p>To learn more about Full Disk encryption,please check out <a href=\"https:\/\/source.android.com\/security\/encryption\/\" target=\"_blank\" rel=\"noopener\">here<\/a>.<\/p>\n<h3>Step#2.Factory Reset<\/h3>\n<p>Go to\u00a0<em>Settings &gt; Backup &amp; reset &gt; Factory data reset<\/em>\u00a0and then tap\u00a0<em>Reset phone<\/em>\u00a0or\u00a0<em>Reset device<\/em>.In the some of the phones,options could vary,please consult user manual for the same.<\/p>\n<p>When the Reset is done, your phone will be wiped and any data that could be recovered will be encrypted and should be impossible to decrypt the same. It\u2019s now safe to sell or pass it along to someone else.<\/p>\n<p>Below is video on how to reset your Android Phone :<\/p>\n<p><iframe data-src=\"\/\/www.youtube.com\/embed\/q8DGk7X5NG4\" width=\"560\" height=\"314\" allowfullscreen=\"allowfullscreen\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><\/p>\n<h2>#4.Routers\/Switches<\/h2>\n<p>Most of the broadband routers used for home networking provides a reset switch on the back or at the bottom of the unit. This button allows you to override the current state of the device and restore it to the default settings it had when it was first manufactured.Here are steps on how to do 3 x 30 or 30-30-30 hard reset<\/p>\n<ol>\n<li>Make sure your router plugged in and powered on, hold down the reset button for\u00a0<em>30 seconds<\/em>.<\/li>\n<li>While still holding down the button, unplug the router from the power source for another\u00a0<em>30 seconds<\/em>.<\/li>\n<li>Continue to hold reset button, turn the power back on and hold for yet another\u00a0<em>30 seconds<\/em>.<\/li>\n<\/ol>\n<p>Post the above steps,your router should be restored to its factory default\u00a0state. Post reset, you can log in to it with the default IP address and username\/password combination that it was configured with when it was first purchased.<\/p>\n<p>There are also options provided in Router admin panel,once you login &amp; in the Advanced settings page you would be able to delete the log or reset the router.<\/p>\n<h2>#5.eBook Readers<\/h2>\n<p>Most of the eBook Reader provides options for Factory reset.A factory reset will restore your eReader&#8217;s factory defaults, and erases any settings and books on your eReader. Resetting will remove your personal information, including your lock screen passcode and parental controls, account information, Wi-Fi settings, and downloaded content etc.,<em>If you have any content that is not saved to your content library, be sure to transfer that content from your device to your computer via USB before resetting.<\/em><\/p>\n<p>For example, To perform reset on Kobo Reader follow below steps :<\/p>\n<ol>\n<li>Turn on your eReader.<\/li>\n<li>Press the\u00a0<strong>Menu<\/strong>\u00a0button.<\/li>\n<li>Press the centre of the Navigation pad.<\/li>\n<li>Select\u00a0<strong>Settings<\/strong>.<\/li>\n<li>Press the centre of the Navigation pad.<\/li>\n<li>Select\u00a0<strong>Advanced<\/strong>.<\/li>\n<li>Press the centre of the Navigation pad.<\/li>\n<li>Select\u00a0<strong>Reset Device Now<\/strong>.<\/li>\n<li>Press the centre of the Navigation pad.<\/li>\n<li>Once the eReader is powered up again, set the date and time.<\/li>\n<\/ol>\n<p>For Kindle reader,follow below steps :<\/p>\n<ol>\n<li><span class=\"a-list-item\">From\u00a0<strong>Home<\/strong>, tap the\u00a0<strong>Menu<\/strong>\u00a0icon, and then tap\u00a0<strong>Settings<\/strong>.<\/span><\/li>\n<li><span class=\"a-list-item\">Tap the\u00a0<strong>Menu<\/strong>\u00a0icon again, and then tap\u00a0<strong>Reset Device<\/strong>.\u00a0<\/span><\/li>\n<\/ol>\n<p>Hope I have covered most of the key items in securing your personal data before selling it.If I have missed out anything,please do post it comments section.<\/p>\n<p><em><strong>Like this post? Don\u2019t forget to share it!<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whether you&#8217;re selling a computer \/ mobile or just want to reinstall an OS from scratch,you would definitely want to make sure all of your personal data, including your photos, messages, and files are wiped before sending it to new owner.In this post,we&#8217;ll learn how to wipe your personal data before selling it. #1.Personal Computers [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2471,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"nf_dc_page":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[3,37,314],"tags":[247],"class_list":["post-2320","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-new-tools","category-how-to-guides","category-privacy","tag-wipe-data"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/05\/freeware-2265044_1920.png?fit=1920%2C1465&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9fbQS-Bq","jetpack-related-posts":[{"id":2468,"url":"https:\/\/www.upnxtblog.com\/index.php\/2018\/05\/09\/5-best-and-the-most-popular-reads-for-april-2018\/","url_meta":{"origin":2320,"position":0},"title":"6 best and the most popular reads for April 2018","author":"Karthik","date":"May 9, 2018","format":false,"excerpt":"Here are 6 best and the most popular reads for April 2018. We hope you enjoy reading and treasure them. #1.Kubernetes tutorial - Create Kubernetes cluster on AWS with kops kops\u00a0(Kubernetes Operations) helps you create, destroy, upgrade and maintain production-grade, highly available, Kubernetes clusters from the command line.In this post,we\u2026","rel":"","context":"In &quot;Trending&quot;","block_context":{"text":"Trending","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/trending\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1990,"url":"https:\/\/www.upnxtblog.com\/index.php\/2018\/02\/23\/lost-your-android-devicehere-is-how-to-findtrack-download-your-data-remotely\/","url_meta":{"origin":2320,"position":1},"title":"Lost your Android device,here is how to find,track &#038; download your data remotely","author":"Karthik","date":"February 23, 2018","format":false,"excerpt":"OK, now you realize that your phone is lost & if you've already attempted or tried below steps to recover the device with the Google Find My Device, then it's time to contact the police and your operator to report the situation. Your operator may require a police report to\u2026","rel":"","context":"In &quot;How-To guides&quot;","block_context":{"text":"How-To guides","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/how-to-guides\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/02\/mobile-phone-2957610_1920.jpg?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/02\/mobile-phone-2957610_1920.jpg?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/02\/mobile-phone-2957610_1920.jpg?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/02\/mobile-phone-2957610_1920.jpg?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/02\/mobile-phone-2957610_1920.jpg?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":201,"url":"https:\/\/www.upnxtblog.com\/index.php\/2017\/08\/20\/7-points-personal-data-collected-facebook\/","url_meta":{"origin":2320,"position":2},"title":"7 points about what personal data is collected by Facebook","author":"Karthik","date":"August 20, 2017","format":false,"excerpt":"Today Facebook has about 1.32 billion users daily active visitors. As we speak, Facebook is collecting and analyzing data about millions of user interactions every second\u200a\u200aabout our friends, our interests, and our everyday behavior. Many of us knowingly\/unknowingly share information on social media, this post will make you aware of\u2026","rel":"","context":"In &quot;Regain Your Privacy&quot;","block_context":{"text":"Regain Your Privacy","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/privacy\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/07\/facebook-02.jpg?fit=690%2C453&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/07\/facebook-02.jpg?fit=690%2C453&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2017\/07\/facebook-02.jpg?fit=690%2C453&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":2795,"url":"https:\/\/www.upnxtblog.com\/index.php\/2018\/08\/07\/how-to-enable-2-step-verification-on-your-gmail-account\/","url_meta":{"origin":2320,"position":3},"title":"How to enable 2-Step Verification on your Gmail account","author":"Karthik","date":"August 7, 2018","format":false,"excerpt":"Two-factor authentication(2FA) or 2-Step verification is an extra layer of security for your online account, it's designed to ensure that you're the only person who can access your account, even if someone knows your password. It significantly decreases the risk of a hacker accessing your online accounts by combining your\u2026","rel":"","context":"In &quot;How-To guides&quot;","block_context":{"text":"How-To guides","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/how-to-guides\/"},"img":{"alt_text":"Gmail","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/08\/1014px-New_Logo_Gmail.svg_.png?fit=1014%2C768&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/08\/1014px-New_Logo_Gmail.svg_.png?fit=1014%2C768&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/08\/1014px-New_Logo_Gmail.svg_.png?fit=1014%2C768&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/08\/1014px-New_Logo_Gmail.svg_.png?fit=1014%2C768&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":2707,"url":"https:\/\/www.upnxtblog.com\/index.php\/2018\/08\/09\/tutorial-visualize-historical-data-with-elk-stack\/","url_meta":{"origin":2320,"position":4},"title":"Tutorial : Visualize historical data with ELK stack","author":"Karthik","date":"August 9, 2018","format":false,"excerpt":"Today we are going to learn about the ELK stack, it consists of 3 powerful open-source tools Elasticsearch, Logstash, and Kibana. Elasticsearch is a highly scalable open-source full-text search and analytics engine. It allows you to store, search, and analyze big volumes of data quickly and in near real-time. Kibana\u2026","rel":"","context":"In &quot;How-To guides&quot;","block_context":{"text":"How-To guides","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/how-to-guides\/"},"img":{"alt_text":"Final Dashboard with 3 visualizations","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/07\/elk19.png?fit=1166%2C631&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/07\/elk19.png?fit=1166%2C631&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/07\/elk19.png?fit=1166%2C631&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/07\/elk19.png?fit=1166%2C631&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2018\/07\/elk19.png?fit=1166%2C631&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":7109,"url":"https:\/\/www.upnxtblog.com\/index.php\/2023\/02\/13\/open-iphone-without-passcode\/","url_meta":{"origin":2320,"position":5},"title":"Open iPhone Without Passcode","author":"Karthik","date":"February 13, 2023","format":false,"excerpt":"As iPhones become more and more popular, Today, there are many ways to unlock the iPhone without entering a passcode. This can be helpful if you need to reset to zero your phone or if you did not remember your passcode. Right now there are programs that can help you\u2026","rel":"","context":"In &quot;Best Tools\/Open Source Libs&quot;","block_context":{"text":"Best Tools\/Open Source Libs","link":"https:\/\/www.upnxtblog.com\/index.php\/category\/new-tools\/"},"img":{"alt_text":"iphone","src":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2020\/07\/save-money-by-buying-refurbished-Iphone.jpg?fit=1100%2C825&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2020\/07\/save-money-by-buying-refurbished-Iphone.jpg?fit=1100%2C825&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2020\/07\/save-money-by-buying-refurbished-Iphone.jpg?fit=1100%2C825&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2020\/07\/save-money-by-buying-refurbished-Iphone.jpg?fit=1100%2C825&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.upnxtblog.com\/wp-content\/uploads\/2020\/07\/save-money-by-buying-refurbished-Iphone.jpg?fit=1100%2C825&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/2320","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/comments?post=2320"}],"version-history":[{"count":12,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/2320\/revisions"}],"predecessor-version":[{"id":3887,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/posts\/2320\/revisions\/3887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/media\/2471"}],"wp:attachment":[{"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/media?parent=2320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/categories?post=2320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.upnxtblog.com\/index.php\/wp-json\/wp\/v2\/tags?post=2320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}