About Cristian Cismaru

I love everything related to IT & C, I like to share the experience and information that we accumulate every day.
Learn as you learn!

Review router Tenda AC10 - pleasant surprises

Review router Tenda AC10 - pleasant surprises
3.9 (9) 77.78%

Review router Tenda AC10

How did this router get to me?

First of all I have to tell you that it is not a sponsored tutorial. Tenda AC10 Router I bought it personally.

My brother asked me a few days ago to find a router that can be stopped at night, wireless on the button.

On many routers, it is possible to program wireless switching off and on, but he (my brother) wanted a router to turn off the wireless signal from the button.

I have cast an eye on the market but have found such a function (wifi switch on the button) only on expensive routers.

When I was beaten, I found in an Altex this router, and I said to try. I knew from the box that he had this button (wifi switch on the button), otherwise we would not take it. The router is called the AC10 Tenda and also has a brother named AC10U, which also has a USB port (AC10 does not have a USB port).

Now [...]

Encrypt Whatsapp and Messenger conversations

Encrypt Whatsapp and Messenger conversations
4.1 (9) 82.22%

Encrypt Whatsapp and Messenger conversations

Status of conversation encryption in applications.

Nowadays all chat services such as Whatsapp, Messenger, Hangouts, provide us with encryption methods that make our conversations free from third-party eyes.

What does this encryption mean?

Encryption and decryption are techniques by which a text or data is hidden under inconspicuous characters using encryption keys that use different text or data streaming methods.

Silent Encryption Example:

Let's say we want to encrypt and send the text "SALUT". By using some keys, we make the word "SALUT" replace with "Hi7 = FwU-23" which is a meaningless string.

This meaningless character string can be decrypted using a key, and the person receiving the message will see "SALUT" instead of "Hi7 = FwU-23".

What's the problem with encrypting applications such as Whatsapp, Messenger, etc.

The basic encryption of Whatsapp, Messenger, Hangouts will only keep you from the eyes of a [...]

How to add bokeh balls to the background in pictures

How to add bokeh balls to the background in pictures
3.9 (9) 77.78%

How to add bokeh balls to the background in pictures for a perfect portrait

The effect of blur or bokeh in pictures

Normally, the effect of blur or bokeh is obtained when we use a camera with large sensor and quick lens (wide open diaphragm).

How to make blur or bokeh without a pro camera?

Today I will show you how to get bokeh in the background in pictures using software exclusively.

We'll overlap two pictures, one of which is a portrait, and the other is a bokeh effect that we can find online.

Why is it sometimes good to blur the background of the photos?

If you put two pictures side by side, one with a bokeh, another without, you will notice that the one with the blurred background is much more attractive. I refer to the fact that the main subject in the picture is better put in the picture and bokeh in the background.

Android app for editing portraits

Snapseed is the perfect choice, [...]

Launch Chrome directly into Incognito and Youtube directly on subscriptions

Launch Chrome directly into Incognito and Youtube directly on subscriptions
3.8 (5) 76%

Launch Chrome directly into Incognito and Youtube directly on subscriptions

Incognito mode

When it comes to privacy, to the eyes of friends, using incognito mode in the browser is the best choice.

Even though incognito mode does not keep you from the curiosity of the big tech companies, it even protects you from the curiosity of those who are close, who sometimes like to nose in the history of others.

What is incognito mode?

Incognito mode is how the browser does not save history, work sessions, cache, cookies, and more.

You must know that incognito mode is not a special wave that will make you invisible. For service providers, you are just as visible and sometimes even provide more data with your browser in incognito mode (see tutorial "How Safe is Incognito Mode")

How can I launch Chrome for Android in Incognito mode?

Normally, to launch an incognito page on Google Chrome on Android, you need to do some 3 steps.

By using a [...]

2019 Affordable Gaming Calculator

2019 Affordable Gaming Calculator
4.6 (9) 91.11%

2019 Affordable Gaming Calculator
Today we will set up a gaming system. This PC will work very well with all existing games, even with a large framerate, suitable for fast-panel monitors (120hz, 144hz, etc.).
processor
Intel i3 8100 Processor.
The choice is a strange thing for many who have not found out that from Coffee Lake i3 has 4 cores, the number of perfect gaming kernels.
Additionally, the frequency of this processor is fixed to 3,6 Ghz, which makes it very agile.
Motherboard
Gigabyte B360M DS3H motherboard.
It is compatible with the Coffee Lake processors, which is strictly necessary, and we also have a M2 NVMe slot for extremely fast SSDs.
Video card
Nvidia GTX 1060 video card made by KFA
Choosing a GTX 1060 is natural, because the board has a decent price for the performance it offers.
Even now, with the emergence of the RTX series, GTX 1060 remains a [...]

How to find the password for RAR or ZIP passwords

How to find the password for RAR or ZIP passwords
4.6 (10) 92%

How do you find the password for RAR or ZIP passwords?

Passwords are those combinations of characters that we either choose or forget. How do you find the password for RAR or ZIP passwords?

Password archives.

For those who do not know, the ZIP, RAR, 7-ZIP archives can be password-protected, but this password is not the safest way to protect the contents of the archive, which is probably a sensitive one, since it is password-protected.

Password archiving is not the safest solution.

Fortunately, for those who have forgotten their passwords or simply found an archive that they will open when it comes to password-protected archives, we have a solution that works very well and finds the RAR archive password relatively quickly or ZIP.

The Best "Password Finder"

The software is called iSunshare RAR password genius, for RAR password archives, and iSunshare ZIP password genius for ZIP archive passwords.

In addition, I have to tell you [...]

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
4.8 (10) 96%

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
In the last few years, people have to do with viruses, spyware and other malicious new programs that have become more and more sophisticated and can hardly be intercepted by an antivirus.
Antivirus programs treat us like sheep!
I do not know if you have any idea how an antivirus program works. If you do not know, I will tell you, because it is quite interesting the method that large IT security companies apply.
First of all we are treated like a flock of sheep, and the wolf is the virus.
We are collateral victims.
From a few flocks, the virus will attack one computer at a time. Infected computers will report to the base, and the specialists there will try to find solutions for the annihilation of the virus as soon as possible. More exactly […]

USB stick password - portable safety

USB stick password - portable safety
4.5 (12) 90%

Password on USB stick

USB stick password - portable safety

The need to keep data safe is becoming increasingly important, especially in the context of data leaks, the collection of unlimited data or computer attacks of any kind.

Our data is almost 100% in digital format

People begin to realize (very late) that the data they generate every second goes into the property of other entities every passing day.
From files stored locally on the PC, I migrated to the "unconscious" in the cloud. Now almost all of our data is on Facebook, Google, Microsoft, Apple, Amazon, etc.

Local files - what's in your hand is not a lie!

I think we still need to keep some files locally, and to be as safe as possible, we need to use encryption methods. The problem is that these encryption systems are either too free and complicated, or simple but expensive. What the […]

Remove baskets or other imperfections in pictures

Remove baskets or other imperfections in pictures
5 (4) 100%

Remove baskets or other imperfections in pictures

Remove baskets or other imperfections in pictures
It was self - pictures - look - perfect - photoshop - filters - insta - fake ...
In a world that is increasingly focusing on physical appearance, many are looking for perfection, and we feel the need to constantly improve something. In order to climb the social pyramid and accumulate the "points", we must be admired and validated. Hence the need for people to be someone else or even to hide the parts that could bring them social "deposition".
Removing imperfections from pictures
I can not help you make physical changes, but I can show you how you can retouch your pictures. I will show you how to remove certain imperfections from the pictures. Let's say to you a kind of virtual esthetician.
The Android and iOS app
In order to eliminate pimples, moles, scars, or other low [...]

How can you find out if someone has been on the computer and what he did

How can you find out if someone has been on the computer and what he did
5 (9) 100%

How can you find out if someone has been on the computer and what he did

Find out who someone's been doing on your computer and what he did

Surely we all know we have to put the password on the computer, but most of the times we have to admit that it is overwhelming to get the password, so I leave the computer without the password and of course whoever can get in.

How do you know if someone has used your PC for you?

We've found three free apps that are also portable (not installable), and help us find traces left in the computer after using it.

We're gonna play our detectives!

These apps that help us find the traces of computer use, show us what applications have been opened, searched for through the PC, searched the web, and history from all web browsers, that is, the list of sites visited.

1. Browsing History View

This application extracts our history from all [...]