Detector fraudulent use of microphone and camera on Android phones

What is the Fraud Microphone and Camera Use Detector tutorial about? In this video tutorial I present a detector for fraudulent use of microphone and camera, ie an application that detects and notes when the camera and microphone are used on Android phones. Why would we want to know when the camera and microphone on the phone are used… [Read more...]

Simple maximum security setting on Windows - the basis of a protected PC

Setting up simple maximum security on Windows What is the "Setting up maximum security on Windows" tutorial about? In this video tutorial you will see how to set up accounts on Windows so that your operating system is safe. Simple setup of maximum security on Windows. The mistake many Windows users make. At the time of installation… [Read more...]

How not to infect infected sites and viruses - sandboxie

How not to get infected on infected sites and virus applications - sandboxie How not to get infected on infected sites and virus applications - sandboxie In recent years people are increasingly dealing with viruses, spyware and other malicious programs of a new type that have become increasingly sophisticated, and which can be difficult to intercept by a… [Read more...]

How can you find out if someone has been on the computer and what he did

How to find out if someone walked into your computer and what they did Find out who walked your computer and what they did Certainly we all know that we need to put the password on the computer, but most of the time we need to to admit that it is up to us to enter the password every time, so we leave the computer without the password and of course anyone can… [Read more...]

How to find out if your email and password are hackers

How do you know if your email and password are hacked How do you know if your email and password are hacked Nowadays it is more and more difficult to keep our data safe; especially the email address and password, which we use everywhere. When we create an account, we have blind trust Every time you create an account you have to "legitimize" yourself… [Read more...]

How do you stop collecting Windows 10 data - it's like a shredder

How do you stop collecting Windows 10 data, which ended up like a Swiss. Data is collected by any method. Data collection has become a global sport, competing with the largest internet service providers. On the 1st place is Google, followed by Facebook and Microsoft, after which, the ones from Apple, Twitter, Amazon, etc are more shy ... eee, let it recover… [Read more...]

WEAKER PCS OVERNIGHT - SOLUTION update Meltdown

Why are PCs weaker overnight - SOLVING meltdown update How are Meltdown, Specter and PC performance? A few days ago I told you about the Meltdown and Specter vulnerabilities, as a result of which Windows and Linux updates were released. System updates can only resolve the Meltdown vulnerability, with manufacturers… [Read more...]

Infection live with WANNA CRY Ransomware and methods of protection

Live infection with WANNA CRY Ransomware and methods of protection The most destructive computer infection in recent years is a ransomware called WannaCry. Where did WannaCry come from? It is not known exactly where it came from, but it is known that it was built on the phase of spyware stolen from the NSA (American SRI), which the NSA used for… [Read more...]

Fixing the screen in an application on Android - the antidote for curious

Fixing the screen in an Android application is a function that allows us to fix our screen, to stay in a single application and not be able to exit until we enter a password or fingerprint. On which phones can you fix the screen? This feature should be available on any phone with android 5.0 or higher. Now it also depends on the developer, if he decided to… [Read more...]

As you enter the account to someone else and read WhatsApp conversations

How to log in to someone else's WhatsApp account to read their conversations Hello friends, in today's tutorial we will see how we can read or spy on WhatsApp conversations of children, wife, friends, loved ones. How to access someone else's WhatsApp account Maybe we don't necessarily want to spy on someone but just monitor our children or grandchildren. [Read more...]