Friday, February 28, 2014

IP Webcam - Turns your Android Device into a CCTV Camera

0 comments

       IP Webcam


Description
Turns your phone into a network camera with multiple viewing options. View your camera on any platform with VLC player or web browser. Stream video inside WiFi network without internet access.
Use IP Webcam with tinyCam Monitor on another android device or with third-party MJPG software, including video surveillance software, security monitors and most audio players.
Video chat support (e.g. Skype, Chat roulette, only video stream for Windows only via an universal MJPG video streaming driver)
Email me if you have questions after reading the FAQ.

IP Webcam - screenshot



THINGS U NEED

..android phone above 2.3
..computer or laptop (laptop recommended)
..wifi router of one more phone to make wifi hot spot

step-1
download ip webcam app on your android

step-2
now start ip webcam app on your phone, your camera will also open select start server (option).it will give a assigned ip address to your phone by wifi router or hotspot whatever you are using 

step -3
open web browser chrome is the best it has in built flash player helps in stream videos from the phone enter the assigned ip in the new tab a menu will appear select the broadcast option which is the 5 option .. and its done 


NOTE
ALL YOUR DEVICES PC LAPTOP OR PHONE WILL BE CONNECTED TO SAME WIFI ROUTER 

DONT HAVE WIFI USE WIFI HOTSPOT FROM ANOTHER PHONE AND THE BEST THING NO NEED OF INTERNET CONNECTION USE WIFI JUST LIKE BLUE TOOTH...

enjoy....comment if didn't understand ..


Wednesday, February 26, 2014

Silent-Sense technology allows smartphones to recognize its owner

0 comments

Silent-Sense technology allows smartphones to recognize its owner
Silent-Sense technology allows smartphones to recognize its owner

Gone are the days of the passwords! US-based scientists from Illinois University have developed a software which recognizes you by your touch. Believe it or not, but the software allows the touchscreen of the device to recognize the user by his way of tapping or swiping the screen of the device. Developer Cheng Bo and his colleagues have named it Silent-Sense. The software is said to have a 99% accuracy rate and would be further worked upon, to unleash its full potential.
So how does it work? Well, the software uses the built-in sensors to monitor the fingertip size, pressure patterns, pressure duration and many similar things. These are stored in the device memory as user signature, which helps it recognize its original user. According to the developers, they would further enhance it by allowing the accelerometer and the gyro sensor to work in tandem with the software.
In the initial stage, Silent-Sense was tested on a group of 100 users. Developers reveal that within 10 taps, the software showed 99% accuracy rate. There is more to the software! It does not check for the user’s identity while running games or apps. It only powers itself while running personal stuff like mails, texts and other sensitive data.


TinEye Reverse Image Search

0 comments

Posted Image




TinEye is a reverse image search engine.

TinEye is a reverse image search engine. It finds out where an image came from, how it is being used, if modified versions of the image exist, or if there is a higher resolution version.



TinEye

TinEye is a reverse image search engine. You can submit an image to TinEye to find out where it came from, how it is being used, if modified versions of the image exist, or to find higher resolution versions.
TinEye is the first image search engine on the web to use image identification technology rather than keywords, metadata or watermarks. It is free to use for non-commercial searching.
TinEye regularly crawls the web for new images, and we also accept contributions of complete online image collections. To date, TinEye has indexed 4,592,041,551 images from the web to help you find what you're looking for. For more information, please see our FAQ, and for some actual TinEye search examples, check out our Cool Searches page.


Get Here


Jpg+FileBinder - software utility to hide files in a picture!

0 comments

Posted Image


Protecting private information against unauthorized access is one of the problems that computer users encounter. In order to solve this issue, you can use various encryption methods, but there are also applications such as Jpg+FileBinder that can help you.

This lightweight tool is simple, yet useful, as it allows you to hide important information in a picture carrier file. Practically, it merges an archive file with a picture, making the output look like an image, when actually it contains the compressed file.

The main advantage it brings you is the ease of use, as you have to follow just a few steps to hide your files. The first one is to choose the image file. JPG and JPEG are the two supported formats.


Posted Image  Posted Image


Then, you have to select the archive file that you want to hide, whether it is ZIP, RAR or 7Z. Just like the input picture file, the output one has to be in JPEG or JPG format.

After you choose all the files, all you have to do is press the 'OK' button and let the program do its magic. A notification message appears when the binding process is done.

The output file acts just like a ordinary picture: it uses the default image viewer to open, it can be previewed and has an image file extension. On the other hand, when you open it with a compression utility, you can view the hidden archive contents.

Jpg+FileBinder is a simple application designed to enhance file security. However, this tool does not encrypt your files and does not restrict the access to them. Anyone can view the archive content if they know the hiding method. Thus, if you want to make sure that your files and folders are secure, you have to consider an encryption utility.



Download the Software Here



LAlarm - Free Laptop Alarm Security Software

0 comments

LAlarm

• Protects laptops and data
• Protects laptop users
Posted Image


How to lock down a laptop to a table

The following procedure locks down a laptop to a table or other immobile object. It requires 1) a USB flash drive and 2) a neck strap (or similar one), which will be used to fasten to the flash drive one end and ties around a table leg or other immobile object the other end. It is useful when you do not have access to a power outlet.
  1. Fasten the strap to the flash drive. (see photo below)
  2. Fasten the other end of the strap to a table or other immobile object.
  3. Plug in the flash drive into a USB port of a laptop.
  4. Lock the laptop by pressing the Windows logo key and L key together.
When a thief removes the laptop from the table, the laptop will be disconnected from the flash drive and then an alarm will go off.
Tips: Instead of using an ordinary neck strap, a USB extension cable can be used to fasten to a table. An advantage is that when the cable is cut off, the theft alarm will also go off.
Fasten the strap to the USB flash drive
Step 1: Fasten the strap to the USB flash drive
Fasten the strap to a table
step 2: Fasten the strap to a table
Plug in the USB flash drive into a USB port of a laptop.
Step 3: Plug in the USB flash drive into a USB port of a laptop.


                    (Video) Theft alarm demo with flash drive



Important:
  • System requirements: Windows 7, Windows Vista, Windows XP,SP2, or SP3. Windows 8 is not supported.
  • Please learn how to properly disarm the theft alarm before installing.
  • For non-English Windows users: LAlarm account lockout function will not work if you are using LAlarm in a non-English Windows. See workaround.
  • Get an alert when a new version is available via RSS feed.


Posted Image



Download the Software Here




DiskPatch - Partition Recovery , Partition Repair and Disk Repair

0 comments

DiskPatch is a professional data recovery utility that recovers data by repairing corrupt disk structures, like the partition tables, 'in-place'.

DiskPatch is designed to tackle the most common issues that prevent you from accessing your data: a corrupt MBR (Master Boot Record), corrupt partition tables, accidentally deleted partitions, corrupt boot sectors, and 'bad' sectors.

Corruption of the MBR, partition tables and boot sectors account for the majority of the problems that lead to 'mass data loss'; situations where an entire drive or partition can't be accessed. 

You can fix these problems yourself by running DiskPatch!
DiskPatch automatically repairs damaged, corrupt or missing partition tables and boot sectors. Fast. Simple. Safe.







DIY DataRecovery DiskPatch: screenshots
The DiskPatch setup includes boot disk builders, so getting started with running DiskPatch is quite easy.

Simply follow the wizard to create a bootable USB disk or a bootable diskette.
Select the appropriate boot disk builder from the DiskPatch program group.
 
The DiskPatch physical disk selection dialog.

Before you can scan, copy or wipe a disk, you always need to select a physical disk first.

For each physical disk the size in sectors, the size in GigaBytes (GB) and the geometry details are displayed.

If a disk was scanned earlier a state file can be loaded.
 
To simplify the selection process DiskPatch will lend you a hand:
> For each partition start positions and sizes are displayed.
> Through a context menu, additional information like the partition's Volume label can be displayed.
> Once you have selected a partition DiskPatch will mark the partitions that can co-exist with that partition, to help you determine what the most likely partition layout was.
 
For each partition found, DiskPatch can display additional properties:
> Which components have been found for that particular partition. The more, the better the chance for recovery;
> A recovery prognosis is determined based on what components were found;
> The partition type and details are automatically determined;
> The Volume Label is particularly useful for identifying partitions.
 
Additional tools are available for power users. These tools may also be employed by the user to perform specific repairs:
> The built-in disk editor allows you to view, edit and patch any disk sector anywhere on your hard disk.
> For partition tables and FAT, FAT32, NTFS boot sectors, templates are available for easy viewing and editing.
 
The partition table editor template simplifies editing partition tables and minimizes the risk of making mistakes.
 
Templates for editing boot sectors (FAT, FAT32 and NTFS) can be used to simplify viewing and editing.
 
All the power you need to get your hands dirty!
View, edit and patch any sector anywhere on the hard disk in raw Hex or ASCII format.
 
Read and/or write errors are a common cause for all kinds of problems, ranging from not being able to open a file to entire disks becoming inaccessible.
Using the surface scan you can detect problem areas and even repair them (sector reallocation).
By running the non-destructive surface scan you can verify that all sectors of the disk can be read from and written to, without losing your data!
You can run surface scans per partition or for the entire disk.
 
Use DiskPatch to do simple boot management:
you can set partitions active/inactive and hide/unhide them.




Download Here



Talkatone - make and receive FREE calls and texts to US , Canada phone numbers

0 comments

     
Talkatone





Description
Turn your Android device into a phone: get a FREE U.S. phone number, make and receive FREE texts and calls to U.S. phone numbers.
Traveling overseas? Take your device with you and call and text US numbers for FREE on WiFi without paying outrageous roaming costs. Call and text for FREE using a WiFi connection or cellular data (3G/4G/LTE).


Product features:
• Get a FREE unique, local U.S. phone number for your Android device
• Get FREE texting with your device to U.S. phone numbers
• Get FREE inbound calls with your device
• Get up to 20 FREE outbound call minutes per month to U.S. phone numbers (with the option to purchase more minutes as needed)
• Get UNLIMITED, FREE Talkatone-to-Talkatone calls and texts anywhere in the world
• Call and text for FREE using WiFi when you don't have cell coverage
• Stop paying too much for cell minutes and text messages
SPECIAL NOTE TO EXISTING TALKATONE FOR GOOGLE VOICE USERS: Talkatone will continue to support Google Voice users until May 15, 2014. After May 15, 2014 Talkatone users will no longer be able to access Google Voice through Talkatone because Google is discontinuing third party access to Google Voice on that date. We encourage all existing Talkatone for Google Voice users to consider switching to the new Talkatone service, the features of which are described above, prior to May 15, 2014 to ensure a seamless and uninterrupted transition. Happy Talking!
More info: www.talkatone.com


iPhone Screenshot 1iPhone Screenshot 2

  • Stop paying for cell minutes, texts & landlines
  • Turn your iPad or iPod touch into a phone
  • Call/Text even in areas with bad cell coverage
  • Call/Text when travelling without paying for expensive international minutes



Get the Site Here