Skip to main content

Here's what a VPN can't protect you from (but you need to use it)

The abbreviation " VPN " has slowly become established among average Internet users, which is certainly good, but the problem is that people have started to see VPN as the ultimate solution to all problems.

[Windows] How to find out which process uses the camera?

[Windows] How to find out which process uses the camera?

Want to find out if malware is using your camera? Or do you want to know which program prevents you from using the camera while, say, talking via Skype?

Here are instructions on how to find out exactly which process is using the camera and how to turn it off.

1) First install Process Explorer or Explorer Hacker

2) Now open the Devices Manager

Press Win + R, copy this, and type Enter: mmc devmgmt.msc

3) Find the camera

It is usually listed under "Image Processing Devices". It is mostly called a "camera", you will easily find it.

3) Find the camera

4) Find the physical name of the camera

Right-click the camera device and select Properties. Then click the Details tab and find "Physical device object name" or "Physical device object name" in the drop-down menu if the system is in English. Now you will be printed something like "\Device\00000040". That number varies from computer to computer. Right-click on it and copy.

4) Find the physical name of the camera

5) Finding a process

Run one of the two programs you installed in step 1 and press Ctrl + F to start the search. Just paste in the box what you copied with Ctrl + V and click Find (or Enter)

5) Finding a process

6) Shutdown process

It is best to turn it off manually, e.g. if Chrome uses your camera just turn off Chrome (I wrote about how to know which card uses your camera or microphone so you can find your way around), and if you don't know which program/process it is, you can right-click on the process and select "Terminate" (not recommended for less experienced users).

Comments

Popular this month

How to ROOT a phone in 30 seconds

Recently, an application appeared that ROOTs some Android devices in a few seconds! You don't need Odin or anything else, just that app, and in a few seconds, your phone is rooted. An app called  ExynosAbuse can be found on the XDA forum, downloaded, and installed for free on your phone. After starting, all you have to do is press " Root device " and it will do its job in a few seconds. You don't even have to restart your phone, you will only be notified that the ROOT has passed successfully and you will see the SuperSu icon.

How to change IMEI number on Android phone?

IMEI is an abbreviation of "international mobile equipment identity" and each mobile phone should have a unique IMEI number. You cannot change this number with the operator, but you can temporarily change it on your device. It allows the operator to accurately identify your device and thus enable/disable network services. Also, you can use the possibility of changing the IMEI number, at least for a short time, if you know exactly what you want, but I leave those ideas to you because this is an educational article.

Mobile Browsers

The Internet on mobile devices is becoming more popular and has more and more users. As mobile internet expands, so do mobile browsers. Although the devices themselves already have built-in basic internet browsers, new browsers are constantly appearing. The reason is that each of the programs brings something new and useful. For example, Opera Mini is most popular on older phone models that use Java applications, while on Android platforms Chrome , Firefox ,  Dolphin , and xScope are more represented.

Google AI game recognizes and learns what you draw!

Artificial intelligence (AI) is quite popular nowadays and is being used more and more intensively. Google has, I can say, the most developed so far and is available to end-users (at least one part). We had a chance to see how it is integrated into the new Google Assistant that has replaced Google Now.

Self-destructive email

Self-Destructing email is a service that offers a unique email address for a specified period, usually 10 minutes. After the scheduled period of the email address expires, it is automatically destroyed and all messages that arrived at that address. IMPORTANT : These email addresses can be detected! Look at the alternative .