Turns the phone into the surveillance camera

Turns the phone into the surveillance camera
5 (1) 100%

Turn the phone into the surveillance room for where it is not worth installing rooms.

Surveillance cameras do not keep us from thieves, but at least we keep in touch with what happens when we're not where the camera is mounted.

As we all know, even if cameras have been cheap in recent times, it's still costing you money to install a room and that's why it's not worth installing rooms anywhere.

Maybe we do not want to watch for a long time.

Sometimes you want to supervise a place, rather than for a short period of time. It is tempting to use a phone as a surveillance camera.

The advantages of using a phone as a surveillance camera

The phone has a battery, which allows us to put it almost anywhereProbably anyone who has an old home phone that can recyclePortability and configuration options The ability to stream on different platformsThe phone already has it, you do not have to [...]

Different IP cameras in an app on Android

Different IP cameras in an app on Android
5 (3) 100%

Different IP cameras in an application

Each watch camera manufacturer has its application to watch live images transmitted by that camera or surveillance cameras.

Problems arise when we have surveillance cameras from different manufacturers. Then you need to open an application for each room.

Surveillance cameras must be able to be seen in a single application.

TinyCam Monitor is an application with which we can see all the cameras at the same time on the screen, and the application settings allow us to choose faster or clearer video streams.

The initial setting of TinyCam Monitor is not too complicated, especially if you follow this tutorial. All you have to do is scan the network and the cameras will appear immediately. Those who are more obstinate will introduce them manually, which is not a very complicated process.

Why do you have to make sure you?

Install TinyCam Monitor FreeAvailable IP / port / user and password [...]

Encrypt Whatsapp and Messenger conversations

Encrypt Whatsapp and Messenger conversations
4.1 (9) 82.22%

Encrypt Whatsapp and Messenger conversations

Status of conversation encryption in applications.

Nowadays all chat services such as Whatsapp, Messenger, Hangouts, provide us with encryption methods that make our conversations free from third-party eyes.

What does this encryption mean?

Encryption and decryption are techniques by which a text or data is hidden under inconspicuous characters using encryption keys that use different text or data streaming methods.

Silent Encryption Example:

Let's say we want to encrypt and send the text "SALUT". By using some keys, we make the word "SALUT" replace with "Hi7 = FwU-23" which is a meaningless string.

This meaningless character string can be decrypted using a key, and the person receiving the message will see "SALUT" instead of "Hi7 = FwU-23".

What's the problem with encrypting applications such as Whatsapp, Messenger, etc.

The basic encryption of Whatsapp, Messenger, Hangouts will only keep you from the eyes of a [...]

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
4.8 (10) 96%

How not to infect infected sites and viruses - sandboxie

How not to infect infected sites and viruses - sandboxie
In the last few years, people have to do with viruses, spyware and other malicious new programs that have become more and more sophisticated and can hardly be intercepted by an antivirus.
Antivirus programs treat us like sheep!
I do not know if you have any idea how an antivirus program works. If you do not know, I will tell you, because it is quite interesting the method that large IT security companies apply.
First of all we are treated like a flock of sheep, and the wolf is the virus.
We are collateral victims.
From a few flocks, the virus will attack one computer at a time. Infected computers will report to the base, and the specialists there will try to find solutions for the annihilation of the virus as soon as possible. More exactly […]

USB stick password - portable safety

USB stick password - portable safety
4.5 (12) 90%

Password on USB stick

USB stick password - portable safety

The need to keep data safe is becoming increasingly important, especially in the context of data leaks, the collection of unlimited data or computer attacks of any kind.

Our data is almost 100% in digital format

People begin to realize (very late) that the data they generate every second goes into the property of other entities every passing day.
From files stored locally on the PC, I migrated to the "unconscious" in the cloud. Now almost all of our data is on Facebook, Google, Microsoft, Apple, Amazon, etc.

Local files - what's in your hand is not a lie!

I think we still need to keep some files locally, and to be as safe as possible, we need to use encryption methods. The problem is that these encryption systems are either too free and complicated, or simple but expensive. What the […]

How can you find out if someone has been on the computer and what he did

How can you find out if someone has been on the computer and what he did
5 (9) 100%

How can you find out if someone has been on the computer and what he did

Find out who someone's been doing on your computer and what he did

Surely we all know we have to put the password on the computer, but most of the times we have to admit that it is overwhelming to get the password, so I leave the computer without the password and of course whoever can get in.

How do you know if someone has used your PC for you?

We've found three free apps that are also portable (not installable), and help us find traces left in the computer after using it.

We're gonna play our detectives!

These apps that help us find the traces of computer use, show us what applications have been opened, searched for through the PC, searched the web, and history from all web browsers, that is, the list of sites visited.

1. Browsing History View

This application extracts our history from all [...]

Who connects illegally on your WI-FI network

Who connects illegally on your WI-FI network
4.7 (14) 94.29%

Who connects illegally on your WI-FI network

The wireless signal passes through the walls of the house.

When using a Wi-Fi network in the home, we need to be aware that that wireless network can be accessed by other people, neighbors, or people who are nearby.

Better securing Wi-Fi

We also talked about other security issues when logging in to the router, we also talked about breaking a Wi-Fi network with social engineering or using the logon vulnerabilities. Today we will talk about intrusion discovery.

Take the problem of illegal connection seriously!

This is not about connecting your neighbor and spending bandwidth, and that anyone connected to your network can scan your traffic, intercept your data, steal your sessions, as shown in this tutorial.

How can you tell if someone connects illegally on your Wi-Fi?

With Wireless Application [...]

How to find out if your email and password are hackers

How to find out if your email and password are hackers
4.6 (10) 92%

How to find out if your email and password are hackers

How to find out if your email and password are hackers

Today it is increasingly difficult to keep our data safe; especially email and password, which we use more everywhere.

When we make an account, we have a blind trust

Every time you make an account, you must "legitimate" with something, either with your phone number, or with your email address, or with your Google, Facebook, Twitter, etc. account.
All would be good if the site you account for would be 100% focused on the security of the data in their possession.

The worst thing is, all accounts are based on an email address

If you now want to log on to a site, you automatically log in with Facebook, but this Facebook is also based on an email address, [...]

How to reset your Windows password if you forget it :-)

How to reset your Windows password if you forget it :-)
4.8 (11) 96.36%

How to reset your Windows password if you forget it

How do I reset my Windows password if you forgot it?
If you forgot your Windows password, you have two options. The first is to reset your password and the second is to reinstall Windows.
On which Windows operating systems does password reset go?
Resetting the Windows password, that is, the method presented in this tutorial, works on any usual Windows version such as Windows 7, Windows 8, Windows 8.1, and Windows 10.
The only condition that the method would work would be to have local accounts.
What is the password reset program?
Today's Windows-based wipe / reset software is called Lazesoft Recovery Suite, and it is a sum of programs that can be used to perform other operations, not just resetting your Windows password.
This is not the only way to cancel the Windows password
We have also presented you on other occasions, [...]

YouTube Kids a special YouTube app for kids

YouTube Kids a special YouTube app for kids
4.3 (17) 85.88%

YouTube Kids a special YouTube app for kids

The children are on the tablet or on the phone, BUT!

The digital world and technology are good when used constructively but can also be bad when not used properly.
For example, kids when they enter YouTube can find very useful information, but also some filming that can "attract attention" in a more inappropriate way. Do not say that on youtube you can find some really odious video that does not help a child.

Why are we so worried?

Developing children in their first years of life is very important. Parents must ensure that the environment in which their child develops is healthy.
After all, we humans are trained by everything that surrounds us. We learned to talk because we hear the words around us, and our behavior is influenced by the behavior of others, towards others and the dream of dreaming [...]