Who's connected to your network? - see everything connected to the network

Who's connected to your network? In this video tutorial you will see how we can find out who was connected to the devices on our network, also we will find out the devices that are connected to the network. Find out who steals your Wi-Fi network Who's connected to your network When is it useful to find out what devices are connected to our network? When you forgot your IP ... [Read more...]

Spy microphone detector GPS trackers and tracking devices

Spy GPS Tracker Microphone Detector What is a Spy GPS Tracker Microphone Detector used for? If you are an important man or you simply have a paranoid life partner, you may be tracked through a spy microphone or GPS tracker, and therefore you need a spy microphone detector and GPS trackers. On what principle does it work ... [Read more...]

How to find a stolen and reset phone - anti-theft applications

How to find a stolen and reset phone - burglary applications Why do we need burglary applications? Now we don't just have to think about theft. It is quite possible that we often forget or lose the phone, when running through the park, on a bench, in the grass after a picnic, etc. Anti-theft applications are also good for locating your phone for various reasons, but I think ... [Read more...]

Recording and interception distance calls from any phone Android

Remote call recording and interception - how to do it? For recording calls on the phone, we will use a program called ACR, which is free. It allows us to automatically record all telephone calls or just certain calls, with contact filtering. ACR call recording application. It's an Android app apparently ... [Read more...]

How to crack any password Wi-Fi, super fast using social engineering

How to crack any Wi-Fi password, using social engineering techniques. Social engineering is the technique by which individuals or groups are manipulated, in order to obtain something. The most recent scheme of social engineering is the "accident method", where the aggressor exploits the care for the victim for the loved ones, in order to obtain undue benefits aka… [Read more...]

Two WhatsApp or Facebook accounts simultaneously on the same phone

Two WhatsApp or Facebook accounts simultaneously, on the same phone Hello friends, in today's tutorial we will see how we can use two WhatsApp accounts or two Facebook accounts simultaneously on the same phone or tablet. As you may already know, WhatsApp allows you to register only one phone number per device (smartphone or tablet). In case of … [Read more...]

Prevention and elimination programs toolbar / adware

Hi friends, some time ago I explained how some strange software (viruses) get to us in PC and especially in browsers. Then I showed you how to get rid of these inconveniences manually and it was left to show you how to do this automatically. Today we have two applications that will help us prevent their installation and eliminate them, if these misfortunes are already installed. Cleaning ... [Read more...]

Elimination of infection that automatically post on our Facebook site

Hi friends, in today's tutorial I decided to intentionally virus to see how we get rid of the infection that automatically posts messages on our Facebook tagging our friends and making spam. How do you get infected with "Update Flash Player"? An already infected friend is posting on the wall or a message with a link to his photo ... [Read more...]

Recording telephone conversations on Android

Hello friends, in today's tutorial we will see how we record a phone call on the phones running the Android operating system. From the beginning I want to tell you that to put into practice what was shown in this tutorial it is necessary that your phone be rooted (to have root). About what root means or how to root a smartphone, we have more ... [Read more...]

Simple measures to secure and encrypt traffic navigation

Hi friends, in today's tutorial we will see some tips for safer browsing and encrypted traffic when using a public wireless network. If yesterday's tutorial on Wireshark, intercepting passwords on free wi-fi networks, my colleague Cristi will show you how easy it can be to intercept the data we enter on a site, today ... [Read more...]