About Cristian Cismaru

I love everything related to IT & C, I like to share the experience and information that we accumulate every day.
Learn as you learn!

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
5 (8) 100%

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
In the last few years, people have to do with viruses, spyware and other malicious new programs that have become more and more sophisticated and can hardly be intercepted by an antivirus.
Antivirus programs treat us like sheep!
I do not know if you have any idea how an antivirus program works. If you do not know, I will tell you, because it is quite interesting the method that large IT security companies apply.
First of all we are treated like a flock of sheep, and the wolf is the virus.
We are collateral victims.
From a few flocks, the virus will attack one computer at a time. Infected computers will report to the base, and the specialists there will try to find solutions for the annihilation of the virus as soon as possible. More exactly […]

USB stick password - portable safety

USB stick password - portable safety
4.5 (11) 89.09%

Password on USB stick

USB stick password - portable safety

The need to keep data safe is becoming increasingly important, especially in the context of data leaks, the collection of unlimited data or computer attacks of any kind.

Our data is almost 100% in digital format

People begin to realize (very late) that the data they generate every second goes into the property of other entities every passing day.
From files stored locally on the PC, I migrated to the "unconscious" in the cloud. Now almost all of our data is on Facebook, Google, Microsoft, Apple, Amazon, etc.

Local files - what's in your hand is not a lie!

I think we still need to keep some files locally, and to be as safe as possible, we need to use encryption methods. The problem is that these encryption systems are either too free and complicated, or simple but expensive. What the […]

Remove baskets or other imperfections in pictures

Remove baskets or other imperfections in pictures
5 (4) 100%

Remove baskets or other imperfections in pictures

Remove baskets or other imperfections in pictures
It was self - pictures - look - perfect - photoshop - filters - insta - fake ...
In a world that is increasingly focusing on physical appearance, many are looking for perfection, and we feel the need to constantly improve something. In order to climb the social pyramid and accumulate the "points", we must be admired and validated. Hence the need for people to be someone else or even to hide the parts that could bring them social "deposition".
Removing imperfections from pictures
I can not help you make physical changes, but I can show you how you can retouch your pictures. I will show you how to remove certain imperfections from the pictures. Let's say to you a kind of virtual esthetician.
The Android and iOS app
In order to eliminate pimples, moles, scars, or other low [...]

How can you find out if someone has been on the computer and what he did

How can you find out if someone has been on the computer and what he did
5 (9) 100%

How can you find out if someone has been on the computer and what he did

Find out who someone's been doing on your computer and what he did

Surely we all know we have to put the password on the computer, but most of the times we have to admit that it is overwhelming to get the password, so I leave the computer without the password and of course whoever can get in.

How do you know if someone has used your PC for you?

We've found three free apps that are also portable (not installable), and help us find traces left in the computer after using it.

We're gonna play our detectives!

These apps that help us find the traces of computer use, show us what applications have been opened, searched for through the PC, searched the web, and history from all web browsers, that is, the list of sites visited.

1. Browsing History View

This application extracts our history from all [...]

Who connects illegally on your WI-FI network

Who connects illegally on your WI-FI network
4.8 (12) 96.67%

Who connects illegally on your WI-FI network

The wireless signal passes through the walls of the house.

When using a Wi-Fi network in the home, we need to be aware that that wireless network can be accessed by other people, neighbors, or people who are nearby.

Better securing Wi-Fi

We also talked about other security issues when logging in to the router, we also talked about breaking a Wi-Fi network with social engineering or using the logon vulnerabilities. Today we will talk about intrusion discovery.

Take the problem of illegal connection seriously!

This is not about connecting your neighbor and spending bandwidth, and that anyone connected to your network can scan your traffic, intercept your data, steal your sessions, as shown in this tutorial.

How can you tell if someone connects illegally on your Wi-Fi?

With Wireless Application [...]

How to find out if your email and password are hackers

How to find out if your email and password are hackers
4.5 (8) 90%

How to find out if your email and password are hackers

How to find out if your email and password are hackers

Today it is increasingly difficult to keep our data safe; especially email and password, which we use more everywhere.

When we make an account, we have a blind trust

Every time you make an account, you must "legitimate" with something, either with your phone number, or with your email address, or with your Google, Facebook, Twitter, etc. account.
All would be good if the site you account for would be 100% focused on the security of the data in their possession.

The worst thing is, all accounts are based on an email address

If you now want to log on to a site, you automatically log in with Facebook, but this Facebook is also based on an email address, [...]

How do we get a phone number from America - legally

How do we get a phone number from America - legally
4.4 (9) 88.89%

How do we get a phone number from America - legally

How do you get a US phone number?
There are users who have not once wanted to use certain online services in America and have hit the issue of the phone number. There are cases in which some people can call only the US, otherwise you can not get in touch with them unless you have a US number. To use services, you need a phone number from America.
What can you use a number of America?
1. To confirm an account on some online stores
2. For registration on certain websites / services online
3. To speak on the phone with relatives on the US territory
4. To be able to talk to people in US custody
How can we get a number of America?
Of course, as I did not have access to US telephone networks to [...]

Simple Backup Soft Backup Software for Windows

Simple Backup Soft Backup Software for Windows
4.9 (8) 97.5%

Simple Backup Soft Backup Software for Windows

Simple Backup Soft Backup Software for Windows - tutorial

What is backup?

Backup is the most important activity in the digital environment. Backup data backup is the operation by which we make a copy of the data we store elsewhere, preferably on another storage medium (when it is very important).

Why backup?

Because the data does not exist in reality, but is just 1 and o, they can be easily lost by accidental deletion.
To make a general backup for Windows is very simple, but today I am going to introduce you a simple program that makes backups of the folders that it shelters for a subsequent restoration, in case things went wrong.

Why Simple Backup?

This application does not back up in the true sense of the word, meaning [...]

How to back up WhatsApp online to change or reset your phone

How to back up WhatsApp online to change or reset your phone
5 (7) 100%

How to back up WhatsApp online to change or reset your phone

How to back up WhatsApp online to change or reset your phone
Backup is the operation by which the user ensures that they have a backup copy of the data stored in a location other than the one on which the data is. In vain, you back up if you keep it in the same place as the original data.
Whatsapp makes backup only locally!
Whatsapp automatically does a local backup, that means conversations, photos, and call list will not be safe if we reset the phone or if we change the phone, we can not have conversations, etc. on the new phone.
Enable backup on Google Drive.
Saving backup on google drive is extremely simple and useful. For example, when you change your phone, backing up in your Google Account will automatically be restored.
Why whatsapp does not automatically save online.
Over time, there have been all sorts of discussions, but it is mainly [...]

Turn on OpenGL Skies for better performance in Android games

Turn on OpenGL Skies for better performance in Android games
5 (3) 100%

Turn on OpenGL Skies for better performance in Android games

Enable OpenGL Skia for better performance in games and the Android interface
Games on mobile platforms (Android and iOS) have seen incredible growth in just a few years. If the games were quite simple at first, like 80 PCs, these games have now become extremely complex.

Games on Android or iOS are almost like those on your PC or consoles.

Because games on the mobile are currently very complex, resource consumption has also increased. If top phones have no problem running the latest titles, the older devices are pretty much scowled with jerky pictures that lead to an unpleasant experience.

Most gamers do not have the hottest phones.

Because not everyone has top phones, Google has found a solution for [...]