Detector fraudulent use of microphone and camera on Android phones

What is the Fraud Microphone and Camera Use Detector tutorial about? In this video tutorial I present a detector for fraudulent use of microphone and camera, ie an application that detects and notes when the camera and microphone are used on Android phones. Why would we want to know when the camera and microphone on the phone are used… [Read more...]

Simple maximum security setting on Windows - the basis of a protected PC

Setting Simple Maximum Security on Windows What is the "Setting Simple Maximum Security on Windows" tutorial? In this video tutorial you will see how to set up accounts on Windows so that the operating system is secure. Simple simple security setting on Windows. The mistake that many Windows users make. When installing ... [Read more...]

How not to infect infected sites and viruses - sandboxie

How not to get infected on infected sites and viruses - sandboxie How not to get infected on infected sites and viruses - sandboxie In recent years people have been dealing more with viruses, spyware but also other malicious programs of new type that have become more and more sophisticated, and which can hardly be intercepted by a… [Read more...]

How can you find out if someone has been on the computer and what he did

How can you find out if someone walked you in the computer and what they did Find out who someone walked you in the computer and what they did For sure we all know we need to put the password on the computer, but most of the time to recognize that it is up to us every time to enter the password, so we leave the computer without the password and of course anyone can ... [Read more...]

How to find out if your email and password are hackers

How to find out if your email and password are hackers How to find out if your email and password are hackers Nowadays it's increasingly difficult to keep your data safe; especially the email address and password, which we use most everywhere. When we make an account, we trust blind Every time you make an account you must "legitimize" yourself ... [Read more...]

How do you stop collecting Windows 10 data - it's like a shredder

How do you stop collecting Windows 10 data, which came as a swipe. Data are collected by any method. Data collection has become a global sport, competing with the largest internet service providers. In the first place is Google, followed by Facebook and Microsoft, after which, more timid are those from Apple, Twitter, Amazon, etc ... eee, I let them recover ... [Read more...]

PCs Worse Over Nights - Resolve Meltdown Update

Why are PCs Weaker at Night - RESOLVING meltdown update How are things with Meltdown, Specter and PC performance? A few days ago I told you about the Meltdown and Specter vulnerabilities, after which Windows and Linux updates were released. System updates can only resolve the Meltdown vulnerability, following the manufacturers ... [Read more...]

Infection live with WANNA CRY Ransomware and methods of protection

Live infection with WANNA CRY Ransomware and methods of protection The most destructive computer infection in recent years is a Ransomware called WannaCry. Where did WannaCry come from? Where it came from is not known exactly, but it is known to have been built on the stage of spyware tools stolen from the NSA (the SRI of Americans), which the NSA used to ... [Read more...]

Fixing screen in an application in Android - cure for the curious

Fixing the screen in an Android application is a function that allows us to lock the screen, stay in one application and we can not exit until we enter a password or fingerprint. On which phones can you fix the screen? This feature should be available on any phone running Android 5.0 or higher. Now it depends on the developer, if he decided to ... [Read more...]

As you enter the account to someone else and read WhatsApp conversations

How do you log into someone else's WhatsApp account to read their conversations? Hi friends, in today's tutorial we will see how we can read or spy on WhatsApp conversations of children, wife, friends, close friends. How to access someone's WhatsApp account Maybe we don't necessarily want to spy on someone but just monitor our children or ... [Read more...]