TRENDING NEWS

POPULAR NEWS

Enable Mini Spy Devices

How do I install a GPS tracking device system in a car?

First Step:When it comes to install a GPS tracking to your vehicle, the first thing you'll need is to find a power source for it. There are two common ways to provide power to a tracking device. You can use dedicated batteries to power it, or can use the battery of your vehicle to make it functional. Usually, choosing a vehicle's battery to power a tracking device requires you to hire a professional for the installation. On the other hand, dedicated power source makes the process much easier to install and everyone can do it. All that you need to have is the GSP device, a magnet-resistant case as well as a weather-proof case to house it.Step 2:After you have decided to go with dedicated batteries to power the GPS tracking device, use the battery cell to feed the power into it. Now place the active device into the case. Choose the area where you want to put the device inside your car in the way that it has no likelihood of being exposed to anyone.Step 3:The third step is to test the installed device. After you've placed the case in a safe and hidden area of your car, take it out for a short drive. Note down the speed, the location, and the stop timings yourself. Now check if the case is safely placed where you had put it. After the test drive, use your computer or mobile phone to check the data collected by the GPS tracking device. Compare the data against the notes you have collected manually. If both the data matches, you've successfully installed a GPS device yourself.

Are the spy bug mini-drones in Eye in the Sky based on real devices? Are there real devices like these?

Yes.The birdlike drone is a direct copy of the Hummingbird Nano-UAV prototype developed by Aerovironment (who make most of the US Army's tactical drones) for the DARPA back in 2011. TIME magazine rated it as one of the top 50 inventions of the year.Nano Air Vehicle (NAV)The insectlike drone could be considered as an extension of the dragonfly drone developed by the CIA in the 1980s and currently displayed in their museum:http://www.engadget.com/2012/07/...Since then there have been many insect-like fliers, some of them classified.As the movie shows, battery life is a big issue for small drones. However, that problem have been solved: the US Air Force has a number of projects for perching drones (like those in the movie) which can draw energy from power lines and recharge themselves. The Micro Munitions program is for armed drones which will be able to loiter in urban areas for weeks at a time, sending back video and waiting for their target. It may be deployed as soon as 2018. Here's a prototype from DII developed for this program but never progressed to production:

How to enable my asus webcam from my laptop?

First go to Control Panel, Hardware, Devices and look for your webcam. If you do not see the webcam in the list, right click on the white space and select Show disabled devices. If you still don't see your webcam then you will need to reload the software drivers, either from disc or the manufacturer's website. Once you think you have it working you may want to reboot your computer, and then try the free webcam test tool (http://mailvu.com/testCamera/TestYourWeb...

How do you detect hidden cameras and microphones?

The short answer is that you will not find a well hidden camera or microphone with your mobile phone. Cameras and microphones are passive devices and do not in themselves produce anything that can be detected.If they are wireless devices with built in transmitters, a signal may be detected, but only if they are using Bluetooth or WiFi that is used by your standard phone. A signal may be present, but it’s exact location and purpose will be very hard to pinpoint with a consumer grade smartphone. This the job of specialist detectors and equipment.That being said, they are very useful in locating infrared (IR) illumination used by many surveillance systems. The imaging sensor in almost all phone cameras will detect IR and makes it easy to spot. All you need to do is scan around the area with your phone, and bingo, any IR will show up as a bright point source that your eyes cannot see. This is almost guaranteed to be part of a surveillance system.Another less nefarious use for this is to check if the batteries in a standard remote control are working. Just point the remote at the camera lens on your phone and press any of the buttons. If the remote is working, you will see the IR LED on the remote light up very brightly on the phone display. You can’t see it with your naked eyes, but the CCD sensor in the phone’s camera will show it very clearly.

I need instructions for the BPR 6 business portable recorder (It's a pen)?

I was given the BPR for Christmas and the the istrucions that came with the pen - STINK

Does anyone know where I might get detailed instructions as to how to operate this thing. I did capture a video but have no idea how I did it. Any sites any knowledgabe people HELP! Any help would be greatly appreciated.

Can hackers turn on the front/back camera of my phone or tablet stealthily without my knowledge?

Yes and no.While currently there are no security bugs in Android or iOs which would permit an attacker to switch on your camera remotely, there are two attack vectors to archive the same result:The classic trojan horse or other, similar malware where an attacker gains full control over your device and thus all attached hardware.The more recent and much more wicked attack is to get the user to allow this to happen.Just recently there was a story about an alleged encryption software for android which:did not encrypt more than the file headertook photos of the user each time.The app demanded the permission to use the camera of the phone, and apparently not many wondered why a crypto app would need access to the camera, so they granted this permission.Since apps are allowed to run as background processes, nothing would stop an attacker from taking pictures periodically and uploading them to a server of his choosing.App in question is NQ Vault.So while it is between difficult to impossible for a hacker to do this stealthily and completely without your knowledge, there still are ways to archive this goal with less direct methods.

TRENDING NEWS