How to enter in yahoo messenger mobile phone network - video tutorial HD

How to enter in yahoo messenger mobile phone network - video tutorial HD
4.6 (7) 91.43%

In this tutorial I will show you how we can connect to Yahoo Messenger via computer using the orange wap connection through a phone that has a modem role. We need to activate the data service on the phone, the 7 version of Yahoo Messenger and pay little attention to follow the tutorial presented below. At the same time we can connect to the messenger directly with the phone in various ways, some of them will be detailed in the tutorial. If you are passionate about mobile phones and want to put these devices more and more clever at work, I invite you to watch the whole series of video tutorials on mobile phones that I have made for videotuorial.ro or to comment on the comments box, we are waiting for you with your suggestions regarding mobile phones and not only. I wish you pleasant viewing .... by Busuioc Lucian ... [Read more...]

How to spy on or control a computer with your mobile phone - HD video tutorial

How to spy on or control a computer with your mobile phone - HD video tutorial
4.4 (16) 88.75%

Hi, in the following video tutorial I will show you how we can make a remote control or remote assistance connection between a phone and a computer. As you know, you can control a computer very easily from another computer through programs that have to be installed on both computers or just one and the other one will be installed java runing enviroment, provided that the internet connection is active on both PCs. , but now this is also valid through a simple mobile phone that has java. We need a bluetooth or internet connection to run the application that I will present successfully. We can use this type of remote from any type of phone provided the phone supports MIDP2.0 java, in the tutorial I show an example to check this possibility. This tutorial can also help someone who has to spy on a computer to find out what programs are running on it or simply to help ... [Read more...]

No one protects us from phishing, we must defend ourselves! - HD video tutorial

No one protects us from phishing, we must defend ourselves! - HD video tutorial
5 (4) 100%

In this video tutorial we will introduce you once again how we can defend ourselves against phishig. First of all for those who do not know or have not heard of phishing in the following lines we will tell you if it is and how we can fight this phenomenon In the field of computer security, Phishing is a form of illegal activity that consists of obtaining confidential data, such as access trusts for banking applications, trading applications (E-bay or PayPal) or credit or debit card information, using techniques to manipulate the identity of a person or even an institution A phishing attack normally consists of sending by the attacker an electronic message using instant messaging programs or telephone, in which the user is advised to give himself confidential data to win certain prizes or is informed that these are necessary due to technical errors that led to the loss of the original data. In the … [Read more...]

How to protect ourselves against unwanted incidents by backup data - HD video tutorial

How to protect ourselves against unwanted incidents by backup data - HD video tutorial
4.3 (6) 86.67%

In this video tutorial it is about backup, I will use two solutions, the first backup solution is a very simple tool to use at anyone's disposal, namely the System Restore application from Windows either xp or vista, which we find at this "address" : Start / All Programs / Accessories / System Tools / System Restore. The number two solution is Acronis True Image 11, a software that does not need any presentation among those who know what data security means, I chose Acronis True Image 11 because I previously made a tutorial about Acronis True Image 2009 (and on the site) and it would probably be boring to talk about the same software. Although I have done backup tutorials, I decided to return to this topic because you are becoming more aware of the need for data protection, the data can no longer be recovered in case of hardware defects or this operation is too expensive for that you can ... [Read more...]

Using the telephone broadcast by remote computer using software controlfreak - HD video tutorial

Using the telephone broadcast by remote computer using software controlfreak - HD video tutorial
4.9 (12) 98.33%

Hi, in this video tutorial I present a way to use the phone as a remote control to remotely control a player, this is true for phones in the symbian range S60 v1 and v2 this is the only free possibility to have the most Quick access to remote computer control. In the tutorial I present: how the connection is made, what we need to do this and how the whole assembly works. Many of us have the opportunity to use a phone to control a computer, which is one of the methods. If you have a phone compatible with the ControlFreak application and a computer that can make bluetooth connections you can always use this mode of connectivity to bring you comfort in different situations. You will need the winamp player to run the ControlFreak application on your phone and a Windows 2000 or Windows XP operating system. Telephone models ... [Read more...]

How to make a correct partitioning the hard drive - HD video tutorial

How to make a correct partitioning the hard drive - HD video tutorial
4.2 (32) 83.75%

How to execute the partitioning operation and how to create a partition correctly? In this video tutorial I will explain how to do a correct partitioning of a hard disk considering how it was made by the manufacturer, each hard drive is different and yet many people disregard this. Partitioning a hard disk is not an operation that must be done in a hurry, we must take into account the number of magnetic disks that are present on that hard disk, we must also take into account the read-write ends and not lastly the capacity. hard drive. A hard disk that has two magnetic disks can have 3 or 4 read-write heads, 3 if one surface of a disk is not active and 4 when the hard disk has two active read surfaces on each plate -writing. Hard drives have remained the slowest components on our computer due to the fact that depending on the mechanics, the mechanics can never be compared with ... [Read more...]

How to use a mobile phone station wwigo web camera - video tutorial HD

How to use a mobile phone station wwigo web camera - video tutorial HD
3.9 (20) 77%

In this video tutorial Luci recaps with a very interesting tutorial in which it is about using a mobile phone as a webcam. Whether we don't have a webcam or it has to be broken we must have an alternative, this alternative is to use the mobile phone instead of the webcam, this is an idea that many of us have at least thought of once, but we have not found the answer then I gave up. The use of the phone instead of the webcam is made using a free software called WWIGO, which Luci has found for us and which he presents in the smallest details. I personally like the idea of ​​turning a mobile phone, or a PC component into a multipurpose tool, many phones or accessories have come to do things that even its manufacturer did not think about when launching on the market. Let's follow this interesting tutorial, and if you are passionate about mobile phones I invite you to follow the other ones ... [Read more...]

Remote control software free and easy to use TightVNC - HD video tutorial

Remote control software free and easy to use TightVNC - HD video tutorial
4.7 (12) 93.33%

In this video tutorial we present a free remote control application of the computer, the software is called Tightvnc and is highly appreciated because it is easy to use and especially free. This software is composed of two applications, the first application is Tightvnc server and must be launched on the controlled PC, the second application is Tightvnc viewer which is launched on the computer of the controller. These components are installed at the same time, but only when we need them we launch them, either one at a time or simultaneously, also at the installation we have an option to install Tightvnc as a service in windows at every boot of the PC, this option guarantees us that we can have access to a computer whenever it is turned on and has a connection to the net, of course that does not mean that it will have anyone access, there are some security options that make it almost impossible to sneak malicious people onto the server. Tightvnc is very ... [Read more...]

Adobe Photoshop interface CS3 presentation tools and some secret - video tutorial HD

Adobe Photoshop interface CS3 presentation tools and some secret - video tutorial HD
4.3 (15) 85.33%

Adobe Photoshop is a program that can do many interesting things, but most of the time it is not used to its true value, many users use this professional program for some trivial things that can be done with Windows Paint. In this video tutorial we present the basic tools that work in Adobe Photohop cs3 (creative suite 3), after which we will also have a brief demonstration on how we can eliminate certain defects of the image or how we can modify some photos in which we do not like how we look, of course, most tools and settings can be found in Adobe Photoshop CS4 but with small differences in placement. Also in this video tutorial, Alex will show us little tricks, for example how we can remove the red-eye effect from the photos or how we can easily modify images, photos, etc., during the tutorial Alex will show us how to use them most tools, all this ... [Read more...]