Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      How To Detect A Hidden Camera In A Room.

      Recommended Posts

      Staff

      HOW TO DETECT A HIDDEN CAMERA IN A ROOM.

      When you stay in a hotel, how do you know there is no room secret pinhole camera?

      When you travel to an unfamiliar destination or take a business trip, you stay at a hotel, but what you do not know is that you could unknowingly be photographed or be secretly recorded.

      In this age of smart recording devices and pinhole sized drones, always remember when staying in a hotel, that you can use this method to check your room :

       1.When you have entered into  your room, turn off the lights, and close the curtains,open your phone camera, do not turn the flash light on.

      2.Turn around the room with your cell phone. When a red dot is found on your screen, that means that a hidden web camera is installed.

      # If no red dots, then the room is okay.

      Please forward this message to your friends who travel a lot. And those that make a lot of business trips. 

      My dear friends and sisters kindly note and be aware.

      ‼️Don't be a victim of a nude picture.‼️

      Share this post


      Link to post
      Share on other sites

      Hi, I tested this with two mobile phones. I hid one of the phones while it was filming and searched for it with another phone. Did not answer

      Edited by hacker2019

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. [+] Run from under the user without admin rights;
          [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly;
          [+] Protection against restart, re-installation, if already working;
          [+] After infection, the assembly starts within a minute;
          [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute;
          [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute;
          [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it;
          [+] Autoload;
          [+] "Gluing";
          [+] Icon selection;
          [+] Heavy mining on CPU can be selected:
              50%
              75%
              100%
          [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min)
          [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU.
          [+] For nicehash and dwarfpool, always put a random name for the worker;
          [+] Fake error. (can be turned on);
          [+] Protection against draining on VirusTotal;
          [+] Random name of the worker. (can be turned on);
          [+] Loggers through the service https://2no.co/
          [+] "Build" support of Windows from 7 and above 32\64 bits;
          [+] Support SSL/TLS;
          [+] Auto update miner via Tor. (actual for hard forks);
          [+] Removes other hidden miners;
          [+] Self-destruct installation file;
          *dev donate 10%
          A responsibility: The Developer shall not be liable for any damage, direct or indirect damages (including losses from loss of profit, loss of commercial information, etc.) of property or other nature, associated with the use or impossibility of using the Software Product.

          v1.4.1
              Tips for beginners have been added to the builder.


          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What you'll learn
              Build a successful blog from scratch, or take your existing blog to the next level
              Develop the mindset of a successful blogger
              Discover a blogging niche that is both profitable and interesting
              Build a beautiful website using WordPress
              Develop a system to plan new content, and never run out of ideas again
              Understand the importance of effective writing and how to become a better writer
              Become familiar with some of the most effective types of blog content
              Generate an endless stream of fresh content by repurposing what you've already created
              Optimize your website for search engines to drive a consistent stream of free traffic
              Get your content in front of people using a variety of free promotion strategies
              Grow an email list that allows you to generate traffic and revenue on demand
              Build a profitable business around your content and turn your blog into a revenue-generating asset
          Requirements
              No prior knowledge is necessary. This course starts with the basics before diving into more advanced tips and strategies.
              The main requirement is a willingness to commit to the process and put in the work. This course outlines the steps, but it's up to you to take action and do what it takes to make your blog a success.
              To get your blog up and running, please note you will need to purchase a domain name and a hosting account. This course will show you exactly how to do that, even if you're new to the process.
          Description
          UDEMY'S #1 BESTSELLING BLOGGING COURSE — REDESIGNED WITH ALL NEW CURRICULUM FOR 2021 AND BEYOND
          "Merrill provides invaluable tips and examples for starting a blog and making it into a career." —CNN
          "...the entire process for turning a blog into a bonafide moneymaker." —The Next Web
          "Brad is clearly experienced, accomplished and an expert in this subject. His knowledge will be very helpful for those who are able to absorb & implement all of his suggestions and tips." —Leah, Udemy student
          "Totally AWESOME course!!!!! You have addressed every aspect of getting started with a new blog, but better yet what it takes to make it a success. I can't wait to get started." —Terry, Udemy student
          "Excellent material, well explained, and a talented & experienced instructor who is not afraid to share his opinion on what it does or doesn't work for him." —JP, Udemy student
          Brad Merrill has been building things on the web for well over a decade. In 2010, he started a blog about technology and innovation, and in just a couple of years it grew into a large publication with staff and revenue, serving more than half a million monthly readers. His work has been featured on Techmeme and cited by a number of notable blogs and publications, including the Wall Street Journal.
          In this course, Brad condenses more than ten years of trial and error into a simple blueprint designed to help you build a successful blog.
          You'll learn all the essentials, including:
              The mindset of a successful blogger
              How to build a WordPress site
              How to write amazing blog content that readers will love and share
              How to promote your content to ensure people actually see it
              How to build and leverage an email list to generate traffic and revenue on demand
              How to turn your blog into a business that generates revenue
          Why would you want to build a blog? Well, there are many different motivations, but here are a few of the most common:
              Build a business: A blog can be the center of a low-overhead, location-independent, lucrative business. There has never been a better time to do this—the Internet has made it cheaper and easier than ever before for anyone to start a business.
              Grow an existing business: Content marketing is one of the best ways to drive your business forward, and a blog is a tried and true format. Many of the world's biggest companies and brands are now using digital content to market their products and services, so you'll be in great company if you do the same.
              Showcase your expertise: If you want to position yourself as a thought leader or expert, blogging is an excellent way to do it. A blog can be a powerful asset if you're trying to build a personal brand, get a job, sell services, or launch a career in public speaking.
              Build Relationships: Blogging is a great way to become an active and influential member of your community, which can help you build relationships with people you want to reach.
          If you're thinking of starting a blog this year, there's never been a better time. This course will walk you through the entire process—setting up WordPress, writing stellar content, promoting that content, building an email list, and implementing a revenue model to turn your blog into a business. It's all here.
          Who this course is for:
              This course is designed for students with varying levels of experience. Whether you're just getting started or looking for ways to take your blog to the next level, this course is for you.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Cyrobo Hidden Disk Pro – There are many ways to store your data securely on your PC, and numerous applications designed to aid you in this endeavor. However, complex tools tend not to be very user-friendly, and using them on a daily basis may reduce your productivity.Hidden Disk, on the other hand, provides you with a straightforward method of securing your files. It creates a new drive that can be hidden at any time, together with the contained data, as well as protected with a user-provided password.
          Simple utility designed to help you hide your private files
          Using Hidden Disk could hardly be easier, as you can create a brand new disk drive with a single mouse click. It can then be used like any other drive, so anyone familiar with the File Explorer should be able to get the hang of this program in no time at all.
          Moreover, you can assign a particular letter to the created drive to make it easier to locate. However, it shares its disk space with the system drive, which may limit the amount of data you can store.
          Secure method of storing data
          Of course, you also have the option of encrypting the drive with a password. If you go for this additional security feature, you are required to provide this key every time the application is launched.
          Furthermore, you can take advantage of the application’s e-mail recovery feature to ensure you do not lose access to your files should you forget your password.
          Follow the provided instructions to avoid losing your data
          It is worth noting that you should always move your files from the hidden drive whenever you wish to reinstall the operating system or format the partition. Even though the data is normally inaccessible, it is stored on the system drive, so it can still be deleted when you perform these operations.
          All in all, Hidden Disk is a lightweight, easy-to-use program that enables you to store data on a hidden drive. It can be set up in seconds even by complete novices, and also allows you to encrypt the newly created drive for extra security.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. English | November 4, 2019 | ISBN: 1705492703 | 177 pages | Rar (PDF, AZW3) | 5.10 MB
          Do you want to learn about how to hack using Kali Linux within a short time span? Do you want to learn about how to perform an actual attack and become a professional hacker?
          This handbook will suit your needs, and you will not only learn about Hacking Tools for Computers, but you will also be accorded some guidance on how you can successfully launch your first attack using Kali Linux.
          By gaining some insight into Hacking Tools for Computers through this handbook, you will also realize that you have saved on time and other resources, depending on your learning needs.
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. [+] Run from under the user without admin rights;
          [+] Applying to the process of the miner and selecting "Open storage location of the file" opens the reference windir allocates attrib.exe. Thus, you can not look and find the location of the assembly;
          [+] Protection against restart, re-installation, if already working;
          [+] After infection, the assembly starts within a minute;
          [+] When you open the Task Manager, Process Hacker, Process Explorer, Perfmon, VirusTotal Uploader 2.0, aida64, System Explorer, Open Hardware Monitor, PCHunter64, HWiNFO64, GPU-Z, AnVir, Real Temp, speedfan, Process Lasso, the miner is turned off. Not the 1st process of superfluous does not hang. Runs only after closing the program above for a minute;
          [+] Protection from the consideration of the process. If the processes of the miner are completed in some way by the user, they will restart within a minute;
          [+] If the user finds the assembly, then for him it will not be clear exe file. The assembly does not start by double clicking, only by the special parameters passed to it;
          [+] Autoload;
          [+] "Gluing";
          [+] Icon selection;
          [+] Heavy mining on CPU can be selected:
              50%
              75%
              100%
          [+] GPU mining on RX 460 and higher, GTX 970 and higher. (starts at idle PC 2 min)
          [+] Error tracking at the start of mining on GPU. If there are no actual drivers and etc... And a mining error pops up. The error closes automatically and no longer tries to start mining on GPU.
          [+] For nicehash and dwarfpool, always put a random name for the worker;
          [+] Fake error. (can be turned on);
          [+] Protection against draining on VirusTotal;
          [+] Random name of the worker. (can be turned on);
          [+] Loggers through the service https://2no.co/
          [+] "Build" support of Windows from 7 and above 32\64 bits;
          [+] Support SSL/TLS;
          [+] Auto update miner via Tor. (actual for hard forks);
          [+] Removes other hidden miners;
          [+] Self-destruct installation file;

          v1.4.0
              Now information about RAM is displayed in loggers.
              Now you can use a random worker name at choice, through a period after the wallet, or in the password. Depending on the pool support.

          Hidden Content
          Give reaction to this post to see the hidden content.