10 Ways to Boost your Productivity in Windows 10 (2019 Guide)

In this guide, 10 ways to boost your productivity on Windows 10 operating system. Either by taking advantage of Windows ergonomics or by downloading and installing software that can boost your productivity.

#1 Take the Advantage of Multi desktop Feature in Windows 10

Windows 10 Task View Icon

Windows 10 support the multi-desktop environment. Like the macOS operating system. You can easily switch between two desktops with nice transitions.

Switching back and forth animation in Windows 10

Pro Tip: In your keyboard, press CTRL+WINDOWS Key+Left Arrow to switch to the next desktop. You can alternate easily with CTRL+WINDOWS Key+Right to go back the first Desktop.

#2 Use Shortcuts in Windows 10

Notepad editor in Windows 10 using cut-copy-paste shortcuts

Keyboard shortcuts can increase your productivity dramatically and stop depending on your mouse and trackpad. Cut-copy-paste keyboard shortcuts are very easy to use.

  1. Copy: CTRL+C
  2. Cut:    CTRL+X
  3. Paste: CTRL+V

Combine them with your keyboard arrows to reduce time.

If you type something and then make a mistake, You can easily undo it.

  1. Undo:  CTRL+Z

3# Menu Bar shortcuts in Windows 10

Uisng menu bar in Windows 10

Menu bar shortcut is an effective way to increase your productivity in Windows 10 without the need of using your mouse. In the figure above, I opened the notepad program, then press ALT key, you will see File instead of File in the menu bar, then I pressed F. The file sub menu appeared. Then I pressed “A” because in the sub menu the “A” letter was underlined (Save As…), then the Save As box appeared.

4# Windows 10 Transitions

Window transition in Windows 10

Switching between two windows using the mouse or the trackpad is a bad idea. It will take you more times especially if you deal with two windows at the same time. You can do it easily in Windows 10 with ALT+Tab in your keyboard. Also, you can check other tabs by press ALT+Tab then release the Tab button.


5# Reorder your apps easily in Windows 10

You can reorder your opened windows easily by right click in the Windows 10 Taskbar and chose either “Cascade Windows” or “Show Windows Side by Side” easily.


6# Software: Everything

You can install the software from voidtools website. The software collects all your files from disk in few seconds and can watch all files and directory changes. It is very light and very productive if you went to find a file as fast as possible. It also provides Windows Explorer menu.

7# Software: Notepad++

Notepad++ is a very popular and alternative to the tradition Windows notepad. It is opensource and has a very active community. It supports plugins, themes, open unknown files, and many more features. You can download the software from https://notepad-plus-plus.org/.

8# Software: 7zip

7-Zip is a file archiver with a high compression ratio. This software is opensource and has a nice GUI. You can download the software from https://www.7-zip.org/. Also, the software can open a variety of files including ZIP and RAR files.

9# Software: ShareX

ShareX capture image from your desktop, upload your files into the cloud or local server and generate for you the sharing link. The software can reduce your time and effort in uploading files. The software is opensource and you can download the software from https://getsharex.com/.

10# Service: Ninite

Last but not least is Ninite. Ninite features install or update multiple software in one time. You can pick your favorite software from https://ninite.com/ and download the installer. It is very useful and blazing fast and it is recommended by trusted by millions of peoples globally.

What is SSH Attack and How to Protect Your Website

Cmatrix software for Linux

In this post. I will demonstrate how SSH attack works and how to prevent your server from it.

SSH attack by definition is to try to access an internal server in the local or wide network. The person who went to access the server have many intentions to do, like stealing vital data, destroying server and demanding money to restore all the data on it.

The term SSH brute-force is one of many types of SSH attacks. SSH brute force is a username and password guessing mechanism to gain access to enabled secure shell users. In the internet, servers expose their default SSH port number (22) to the public and use a common usernames and passwords for either access convenience or lack of expertise in the information technology. If the attack is successful, the hacker may gain root access to the machine, harvest data and destroy the machine and/or inject SSH brute-force bot to attack other local servers or online servers.

How to Protect Your server from SSH attack?

Here is a list of how to protect your server from SSH attack.

Update Your server.

Yes updating your server to the latest version is one of the key factor to prevent SSH attack. Espcecially if you are dealing with an out of date server operating system. You need to update the SSH server.

In debian distro, use the following command to update your server to the latest version

me@jessy# apt-get update && apt-get upgrade -y

Change OpenSSH port number

Head to /etc/ssh directory

# cd /etc/ssh

Open OpenSSH configuration, but before that, make a backup:-

# cp sshd_config sshd_config.backup

Then open the sshd_config with your desired editor, I prefer Vim:-

# vi sshd_config

Change the following line:-

#Port 22
#AddressFamily any
#ListenAddress ::


Port 842
#AddressFamily any
#ListenAddress ::

Change the port number according to what you need. I chose 842, it depends on you. Then restart the OpenSSH service

me@wheezy# service ssh restart 

Use VPN (Virtual Private Network)

This is one of many solutions available to mitigate any problem against SSH attack, once and for all. Is by using VPN.

Client (YOU) -----> VPN Server (Gateway) <----> (Local Network) <----> ( Your Server )
Local IP | | || | |
Public IP | Something | | Something |

Edit the following configuration to allow local network access. To know the static IP of your local network, use ifconfig command to get your local IPv4 address. 

me@wheezy $ ifconfig
ens4: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1460
inet netmask broadcast
inet6 fe80::4001:aff:fe80:2 prefixlen 64 scopeid 0x20<link>
ether 42:01:0a:80:00:02 txqueuelen 1000 (Ethernet)
RX packets 1841401 bytes 279033542 (279.0 MB)
RX errors 0 dropped 0 overruns 0 frame 551261
TX packets 3925046 bytes 541319731 (541.3 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet netmask
inet6 ::1 prefixlen 128 scopeid 0x10<host>
loop txqueuelen 1000 (Local Loopback)
RX packets 26850 bytes 10265384 (10.2 MB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 26850 bytes 10265384 (10.2 MB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

In sshd config, change the following:-

#Port 22
#AddressFamily any
#ListenAddress ::


#Port 22
#AddressFamily any
#ListenAddress ::

Then restart ssh server.

You can find many VPN solutions, one of them is openvpn-install.

Disable Password login on OpenSSH and Use SSH key Instead

Before disable it. Generate your default SSH key from your computer. It is very simple, if you are using a Linux distribution, write the following code:-

$ ssh-keygen 
Generating public/private rsa key pair.
Enter file in which to save the key (/home/ploto/.ssh/id_rsa): 
Enter passphrase (empty for no passphrase): 
Enter same passphrase again: 
Your identification has been saved in /home/ploto/.ssh/id_rsa.
Your public key has been saved in /home/ploto/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:OCpNlym9v5pnkE3p6SytfagnWzpVQKFq3iw+o/WLXf0 ploto@someserver
The key's randomart image is:
+---[RSA 2048]----+
|       .o.       |
|       ..        |
|      .  o       |
|     o +o .      |
|    = B=So       |
|   = *oo=.       |
|  . * +*o..      |
|   +o=+BO ..     |
|  ..oo@&+o  E    |

If you are using a Windows Operating System, you can use Putty Key generator from the start menu, or download it from Putty Official Website

Then copy that key to your server

$ ssh-copy-id dorango@my-server
dorango@my-server's password:

Number of key(s) added: 1

Now try logging into the machine, with:   "ssh 'dorango@my-server'"
and check to make sure that only the key(s) you wanted were added.

Then open sshd_config and edit the following line

# To disable tunneled clear text passwords, change to no here!
#PasswordAuthentication yes
#PermitEmptyPasswords no


# To disable tunneled clear text passwords, change to no here!
PasswordAuthentication no
#PermitEmptyPasswords no

Then restart your OpenSSH server.

Disable OpenSSH for Internet Wide

YES disable it. No more SSH brute-force. This is the last thing you wanna do right, YES. because many cloud service providers offer a secure tunnel to your server (VPN – Virtual Private Network), you need to know your private subnet. Let’s say your cloud local network is, you can authorize SSH access to this subnet and block internet-wide SSH connection. Change the firewall rule to allow SSH port to certin address

# ufw allow from to any port ssh

Disable OpenSSH forever

This is the last thing to do, I don’t recommend it.

# systemctl stop sshd
# systemctl disable sshd
# systemctl mask sshd