Monday, 13 March 2017

The Ultimate Guide for Online Privacy

Thanks to Edward Snowden releasing the documents regarding NSA spying activity, we now have an idea of just how vulnerable we are when we are online. The worst part is that it is not only the NSA that is spying on people. There are many governments working to enact laws that would allow them to watch and store information from their citizen’s online activity, as well as what they say over phone calls and write in text messages. While it seems like a dystopian world described by George Orwell is, in fact, upon us, there are still ways that you can protect yourself from the all-seeing eyes of Big Brother.
Encryption is one best ways to protect your online behavior, data, and communication. While this method is very effective, it usually flags you to the NSA and other organizations, inviting them to monitor you more closely.
There have been changes to the guidelines surrounding data collection by the NSA. However, the rules and guidelines still allow the NSA to collect and examine the data. The encrypted data is stored until the NSA decrypts it and discards any uninteresting data. For non-US citizens, all of the collected data is allowed to be kept permanently, but for practical reasons, the data that is encrypted will be processed first.
The reality is that if more people used encryption for day-to-day browsing, encrypted data would be less of a red flag. This would make the NSA’s and other surveillance organizations around the world job much harder, as it would take an exorbitant amount of time to decrypt all the data.

Is Encryption Secure?

Since more people started using encryption, the NSA has been working to decrypt the data in a shorter amount of time. At the same time, there are new encryption types that are being worked on to protect data. Encryption is never going to be perfectly secure, but lengthening the amount of time it takes to decrypt the data can help to protect it for a longer time. Let’s look at what is affecting the security of encrypted code.

NIST

National Institute of Standards and Technology (NIST) works with the NSA to develop new ciphers. They have also developed and/or certified RSA, SHA-1, SHA-2, and AES.
Knowing that the NSA has worked to weaken and leave backdoors into many of the international encryption standards, you should question the integrity and strength of the cipher algorithms that NIST creates or certifies.
NIST denies that they have done anything wrong, as well as invited the public to participate in many upcoming events about encryption related standards. However, both of these moves are just ploys to raise public confidence in their work.
Combination Padlock
Nearly all trust in NIST was destroyed when news was released that the NSA weakened the Dual Elliptic Curve algorithm, which was NIST’s certified standard for cryptographic programs, twice.
There could also have been a deliberate back door in the Dual Elliptic Curve algorithm. In 2006, at Eindhoven University of Technology, researchers noted that it was simple to launch an attack from any ordinary computer.
While there are many concerns with NIST, many of the industry leaders still have these algorithms in their cryptographic libraries. One major reason for this is that they have to be compliant with NIST standards to obtain contracts from the US government.
With just about every industry in the world using NIST-certified standards, it is rather chilling to think about all the data that is at risk. There is the possibility that the reason we rely so heavily on these standards is that most cryptographic experts are not willing to face the problems in their field.

Key Length of the Encryption

The key length of a cipher is the simplest and crudest way of calculating how long the cipher would take to decrypt. Most times, the cipher is made up of zeros and ones. At the same time, the simplest and crudest way of breaking ciphers is the exhaustive key searches method or brute force attacks. This method tries every combination of the cipher until the right combination is found.Computer Chip
Anyone can break ciphers, but modern ciphers are more complex than traditional ones. The NSA still has problems decrypting data by just using the method of exhaustive key search. In the past, before the leaks from Edward Snowden, it was assumed that decrypting a 128-bit encryption was nearly impossible to do with brute force. Further to this, that it would be at least another 100 years before it was possible using Moore’s Law.
This theory still holds some truth; however, the amount of resources that the NSA puts into cracking all types of encryption has shaken many encryption expert’s faith of this prediction. This has also lead to system administrators scrambling to update and upgrade the key lengths of their ciphers.
With the reality of quantum computing becoming available in the near future, we also have to face the reality that encrypted data could be a thing of the past. The reason for this is that quantum computers will be exponentially faster and more powerful compared to any other computer in existence. In just a few hours or days after the release of quantum computers, all the suites and ciphers will become redundant.
There is a theory that posits that the issue will be fixed by the creation of quantum encryption. This is not going to be the case for some time, however, since quantum computers will be very expensive when they are released. This price tag means that only well-funded businesses and wealthy governments will have this technology. Therefore, at the current time, having strong encryption can still protect your data.
We should note that both the NSA and the United States government use 265-bit for sensitive data, along with 128-bit for all other data. This method uses AES, which we will discuss later because it has many problems of its own

Ciphers

The key length is the amount of numbers that are involved in an encryption, whereas the cipher is the mathematic algorithm that is used. The strength, or lack thereof, of the cipher’s algorithms is what allows the encryption to be broken.
The most commonly used ciphers that you are likely to have encountered are AES and Blowfish. There is also RSA, which is used to decrypt and encrypt ciphers’ keys. There is also SHA-1 and SHA-2, which are used to authenticate encrypted data and connections.
AES is considered to be the most secure cipher for use in VPNs and is used by the United States government. While AES seems reliable and secure, you should be using more than just AES to protect yourself.

What Can You Do To Improve Your Privacy?

Knowing that nearly all types of encryption can be broken if someone was motivated enough, we can better protect our privacy. Even though not all the recommendations will work perfectly every time, they will improve your online privacy overall.

Anonymizing Internet Use

There are two popular ways in which you can anonymize your use of the internet: using a VPN or using the Tor network. Both hide your internet use from your Internet Service Provider (ISP) and the government. They also hide your location and identity from the websites and services that you visit and use.
While these technologies sound like they serve similar purposes, there is only a tiny amount of overlap. They are used for very different purposes and are coded very differently.

VPNsGirl Using Computer

Most people use VPNs to hide their internet usage from their ISP and the government. They can also be used to avoid censorship, to “geo-spoof” in order to access the websites of other countries, as well to protect you from hackers when using public Wi-Fi  hotspots.
Depending on the VPN that you are using, you may have to sign up and pay for the service, most setting you back about $5 to $10 per month. While a VPN provides you with a high level of internet privacy, they do not provide any level of anonymity, reason being that the VPN provider knows what you are doing online.

Tor Network

If you require a high degree of anonymity online, the Tor network is a great option. However, you lose a lot of the usability of the internet that we use daily. The Tor Network is free to use and is a useful system, as you do not provide your information to anyone. This has made it a popular anti-censorship tool. There are governments that have tried to block the Tor Network, but they have not always been successful.

Using VPN and Tor Together

If you are willing to do some work, you can use Tor and a VPN at the same time. You will need to find a VPN that supports Tor and install the VPN using their guide.
 Tor

More Ways to Stay Anonymous Online

Tor and VPNs are the most known and popular ways to stay anonymous and avoid censorship, but there are many other ways to do this. The use of proxy servers has become a popular option, but they provide about the same level of anonymity as a VPN.
Psiphon, 12P, Lahana, and JonDonym are all services that could be of interest. Most of these can be used with a VPN and/or Tor for higher levels of security.

Stop Using Search Engines That Track You

Many of the most widely used search engines store information about you. This is especially true for Google. The information that is stored includes your IP address, the time and date you use the website, the search terms, and your computer’s Cookie ID.
The gathered information is then transmitted to the web page owner and the owners of any advertising on the website. This allows these advertisers to collect data on you while you surf the internet. The collected data is then used to create a profile about you, which they use to create targeted advertisements based on your internet history..
Along with giving this data to the website and advertising owners, search engines have to hand over the collected information to courts and governments. This is only done if the information is requested, but these requests are becoming more often.
However, some search engines do not collect data on their users. One of the most popular is DuckDuckGo. Along with not collecting your data, this non-tracking search engine avoids the ‘filter bubble’. Many search engines will use your past search terms and other information, like your social media, to profile you. They do this to order the results in a way that puts the websites that are most likely to interest you first. In some cases, this produces search results based on your believed point of view, known as a ‘filter bubble’.  Therefore, the alternative options and viewpoints are downgraded, which makes them hard to find. Filter bubbles are dangerous as they limit knowledge and confirm prejudices.

Clearing Your Google Search History

If you are worried about the information that Google is keeping about you, you can clear your Google search history, if you have a Google account. This is not going to stop anyone from spying on you or gathering information on you, but it limits Google’s ability to profile you. Regardless of whether you plan to switch to a non-tracking search engine or stay with Google, you should clear your search history from time to time.
This is simple to do; you simply need to sign into your Google account on www.google.com/history. After logging in, you will find a list of your previous searches. From here, you can select the items that you would like to remove and click the ‘Remove Items’ button.

Anonymity While Making Online Purchases

The first step towards improving your online privacy is paying anonymously. You will still need to provide an address for physical items, so you will not perfectly anonymous online. Even if you are going to switch to just buying local goods, and pay for the items with cash, you are not fully anonymous.
Luckily, the use of Bitcoin and other online services is becoming more common.

Bitcoin

Bitcoin is the largest opBitcoinen source and decentralized virtual currency at the moment. It operates using a type of peer-to-peer technology, which is conducive to online anonymity since no middle man is involved. There are many debates about if investing in Bitcoins is wise or not. Bitcoin acts like any other currency (meaning it has the potential to lose or gain value at any time) and can be used to buy items and traded as normal currency online. It is not yet ubiquitous, but more businesses are starting to accept it as a valid form of payment.

Other Forms of Anonymous Payment

If buying Bitcoins is not for you, another option is to use pre-paid credit cards from one of many online stores. There are also many options for crypto-currencies other than Bitcoin, but Bitcoin is the most stable as well as the most popular.

Securing Your Browser

The NSA is not the only entity that wants your information; there are also advertisers. They often use sneaky methods to track you, putting a profile together so they can advertise their items to you, or even sell the information that they have on you.
Many people who use the internet know about HTTP cookies. Clearing HTTP cookies is very simple, and most browsers have a Private Browsing mode, such as Chrome’s Incognito Mode. Using this mode stops the browser from saving the internet history and blocks the HTTP cookies. Using this tactic is a good idea when you are browsing the internet, and a step in the right direction, but it is not enough to fully stop the tracking.

Clear Your DNS cache

To speed up your browsing, browsers cache website IP addresses that are received from your DNS server. It is very simple to clean the DNS cache. Windows uses the command: ipconfig /flushdns in the command prompt. OSX 10.5 and above uses the command: dscacheuitl –flushcache in the Terminal. OSX 10.4 and below uses the command: lookup –flushcache in the Terminal.

Flash Cookies

Flash Cookies are used for some insidious purposes and are sometimes not blocked by disabling cookies. Flash Cookies track in a similar manner to regular cookies. Flash Cookies can be located and manually deleted. CCleaner is one of the best options of removing Flash Cookies, along with other trash that is on your computer.
Since most people now know about Flash Cookies and Zombie Cookies, the use of these cookies is on the decline. There are also many browsers that block them when you choose to block cookies. However, they are still a threat even with their lower numbers.

More Internet Tracking Technologies

Due to the amount of money that can be made on the internet by companies tracking their users, more sophisticated and devious methods have been developed in the last few years.

ETags

ETags are markers used by browsers to track the changes in resources at specific URLs. Comparing the changes in the markets allows a website to track you and create a fingerprint. ETags have also been used create respawning HTML and HTTP cookies, which will also track your browsing.
ETags are nearly impossible to detect, so there is no reliable method of prevention. Cache clearing after every website and turning off your cache can work. However, these methods are time-consuming and have negative effects on browsing experience. Firefox has an add-on called Secret Agent that prevents ETag tracking.

History StealingStealing

This is where truly scary form of tracking comes in. History stealing exploits the way that the internet is designed, allowing any website to find out  your whole browsing history. This is done using a very complicated method and is very bad news since it is nearly impossible to prevent. The information that is found can be used with profiles on social networks to create a profile about you.
There is some good news, however, in that it that while it can be very effective, it is not reliable. Using a VPN or Tor to mask your IP address makes it much harder to find your identity using just web behavior.

Browser Fingerprinting

Brower Fingerprinting looks at the configuration of your browser by accessing your operating system to track and uniquely identify the user. The major problem with this is that the more measures you use to avoiding tracking, the more unique you become for browser fingerprinting.
To avoid browser fingerprinting, you should use the most common operating system and browser that you can. This will, however, leave you open for other types of attacks, as well as limit the functionally of the computer. For mos, this is not very practical.

HTML Web Storage

Web Storage is built into HTML5, which is used for most websites. The problem with web storage is that it is much better at storing information than cookies. The stored information is not allowed to be monitored or selectively removed, as cookies are.
For all internet browsers, web storage is enabled by default. If you are using Internet Explorer or Firefox, you can simply turn off web storage. You can also use the add-on Better Privacy for Firefox, which removes the web storage information automatically. The Click and Clean extension and Google NotScripts can be used for Google Chrome.

Email

Securing Emails

While most of the email providers’ use SSL encryption for the connection between your computer, the email servers and the other person’s computer, Google has worked to fix the weaknesses that SSL has.
The problem is that many email providers are handing over information to the NSA, especially Microsoft and Google. At the moment, it looks like the smaller email providers are not doing this as of yet. However, with the NSA and other government surveillance extending their reach, this will most likely change in the near future.
The simplest solution to this growing problem of email encryptions is to encrypt email in a way that enables only the sender and the recipient to decrypt. This can be hard to implement since all of your contacts would have to be willing to implement this. It is simply not a feasible option at this point.
Another problem with encrypted emails is not everything is encrypted. The email address of the sender and recipient, the time and date when the email was sent, and the subject line are all not encrypted. The only data that is encrypted are the attachments and the message body. This information can be very damaging in the wrong hands..
If you are worried about the NSA spying on you, encrypting your email more than it already is not a good idea. The NSA is most likely going to store that email and your other emails until they have the time to decrypt and read them.

Encrypting Your Emails with GNU Privacy Guard

If you want to encrypt your emails, there are many programs that can help you do so. The most famous is Pretty Good Privacy or PGP; however, GNU Privacy Guard or GPG is recommended, as Symantec now owns PGP.
GPG is open source and is compatible with PGP. It is available on Linux, OSX, and Windows. While the program uses a command line interface, there are versions that are more sophisticated for Mac called GTGtools and Windows called Gpg4win. There is also EnigMail, which adds the functions of GPG to SeaMonkey and Thunderbird email clients.

Encrypting Webmail

Hushmail was, for a long time, considered the best service for encrypted webmail as it used PGP encryption in it’s web-based email service. The problem is that during 2007, the owners used a backdoor to gather emails from three accounts. The data was then sent to the Canadian Courts.
All the web-based services can be modified to capture their user’s decryption key. It is recommended that you use desktop services like GPG.

Encrypting Gmail

If you are using Gmail, you can use Encrypted Communication, which is a Firefox extension. This extension provides 265-bit AES encryption. After the extension is installed, you can just write the email. Once you have finished the email, you can simply right-click on the text and select “Encrypted Communication.” You will need to input a password that the recipient knows, so the message can be decrypted. You should be transmitting the password using a communication method other than email.
A more secure option is Mailvelope. This service provides full OpenPGP encryption on email services like Hotmail, Gmail, GMX, and Yahoo!, using Chrome and Firefox.

Cloud

Cloud Storage

With internet speeds becoming faster, the price of cloud-based storage have become cheaper. This has also led to reduced memory requirements for most devices, and more devices using cloud storage. While cloud storage has been a great move, the question is still how secure the cloud is. Most of the big providers of cloud storage have worked with the NSA in the past. This includes Dropbox, Amazon, Apple, Google, and Microsoft. Most also state in their ToCs that they reserve the right to investigate all uploaded files, and will hand over the files to authorities if they receive a court order. While this is not going to affect most people, the idea of someone looking through our files is creepy, to say the least.
If you want to make sure that your files in the cloud are secure, there are some basic approaches that you can use.

Manually Encrypt the Files before Uploading

The most secure and simple method is to manually encrypt the files, and there are many programs that you can use to do so. The major advantage of this method is that you can use all Cloud storage services without having to worry about your files. As long as you do not upload your encryption keys, your files are safe.
The downside comes in with some of the encryption software needing to be online to decrypt your files. This is the case with Wuala and SpiderOak.
There is also the option to use a less mainstream cloud base. There are many cloud storage providers, and with the technology getting cheaper, there will be more in the future.

Use Cloud Services that Automatic Encrypts

There are some Cloud services that will automatically encrypt the files before they are uploaded to the Cloud. The changes that are made to folders or files are synced with the local versions, then secured and uploaded to the Cloud. There is the chance that the provider has the decryption key, so your data is still at risk; however, this risk is not as high as other Cloud service providers.
Wuala and SpiderOak have apps for Android and iOS. This allows for easy syncing of files to all your mobile devices and computers. There is a small security issue due to the fact that both store your password to authenticate you and direct your files. Wuala uses the same password to decrypt and encrypt files when you are using your mobile device. However, both services delete your password after your session is completed.
There is also Mega, which is been high-profile since it is owned by by Kin Dotcom. The service offers 50GB of free encrypted space. Mega uses whatever web browser you have to encrypt your files before they are uploaded, then decrypts the files after they are downloaded. This is one of the most convenient options, but Mega is not as secure as the other methods that we have covered.

Cloudless Syncing With BitTorrent Sync

BitTorrent Sync is free, and was released to the public after a long public testing phase. It is designed to be a replacement for Dropbox. However, BitTorrent Sync does not store files in the Cloud to sync them.
It is very simple to use, you just need to select the files that you want to share, then BitTorrent Sync will give you a password for them. After you have the password, you can link that folder to another device’s folder as long as BitTorrent Sync is installed. You can do this with any number of folders using the same method. The encryption protocol that is used is P2P 256-bit AES.
While BitTorrent Sync is easy to use and free, its limitations mean that it is not a true Cloud-based service, and cannot be used to store data for long periods of time. Depending on your ISP, you could be charged for the extra bandwidth that you are using.

Anti-Malware, Antivirus and Firewall Software

Anti-Malware

There is a huge amount of malicious code on the internet; this commonly known as Malware. If you are a not Windows user, you do not really need to worry about Malware. However, if you do use Windows, it is advisable to have anti-malware software installed. Bitdefender comes installed on all versions of Windows that are newer than Vista. There is also Malwarebytes and Spybot Search and Destroy, both of which are free.
Virus

Antivirus

This is the first program that you should install on a new computer, or after a clean install of an Operating System. Viruses can not only mess up your computer, but also have to potential to allow hackers into your computer and give them access to everything that is on your computer. They can also install keyloggers, which can record all your keypresses, enabling your banking information to be stolen.
While most people believe that hackers work for themselves, most of the best hackers in the world work for their country’s government. The Syrian government had a virus created and launched called Blackshade to spy on the people of Syria.
Most people have antivirus software on their computers, but most do not have antiviruses on their phones. At the moment, there are far fewer viruses on mobile devices than on computer. However, with smartphones and tablets becoming more powerful, we could see more attacks in the future. Phones with open-source systems, such as Android phones, are more susceptible than those with closed-source systems, such as iOS (Apple) phones.

FirewallFirewall

A firewall on a personal computer monitors the network traffic and can be configured to allow or disallow traffic to your computer. Firewalls can be a pain from time to time, but they are important because they work to ensure that no program or other software is accessing your computer. The problem is that firewalls have a hard time determining what programs are safe, and which ones are malicious. However, once you have them set up, they are simple to use.

Securing Your Voice Conversations

Before we talk about anything else, we should make it clear that all regular phone calls are not secure, and there is no way to make them secure. Governments around the world are working to record all their citizen’s phone conversations. Unlike using the internet and sending emails, which can usually can be protected to at least some extent, phone calls cannot be protected in any way.
There are disposable and anonymous ‘burner phones’ on the market; the problem is that unless you are only calling other ‘burner phones, data will be collected, which makes those phones very suspicious.

Encryption of VoIP

If you want privacy during a voice conversation, you will need to use an encrypted VoIP. A VoIP allows you to make phone calls using the Internet. In the last few years, VoIPs have become popular, due to the fact that they provide free or cheap calling to anywhere in the world. Skype is the largest VoIP provider in the world. However, Skype is a perfect example of the problem that most of these services have, because there is a middleman that can hand over the conversations to the government. This has happened in the past with Skype, as Microsoft owns Skype and gives the NSA a backdoor into Skype conversations.
Like with email, a VoIP needs end-to-end encryption. This does not allow outside sources into the conversation, meaning that the conversation is private. Many popular VoIP services like Jitsi have built-in chat features, and many are designed to offer most of the features of Skype, making them a great replacement.

Do Not Have a Cellphone

While most people cannot bear to be without their cellphones for more than a few minutes, if you do not want to tracked, you need get rid of your cellphone. Unless you have an early-era cell phone, your cell phone is tracking you, and it’s not just Google Now and GPS tracking your cell phone. It’s also the phone providers and the cellular towers. If you really do not want to be tracked, you will need to leave your cell phone at home, or you can buy a RFID signal-blocking bag. You can also stop Google Now from tracking by turning off your Google History.
Lock

How Much Is Privacy Worth?

This question is worth considering. All the measures described above take time and effort to use every day, and some can bring special attention from the NSA. Additionally, some of the precautions we suggested taking could cause you to lose some of the cooler functions from web-based services that need cookies and other data to perform well.
Google Now is one of the best examples of information being used for good. Google Now is software that can anticipate the information that you need, effectively acting as a “personal assistant” of sorts. Google Glass was designed to use the Google Now software, so it could store information to provide you with better recommendations in the future.
At the moment, interesting and exciting developments of how we interact with computers are reliant upon on allowing all your data to be stored and researched by a company. By using privacy protection when we are online, we turn off this technology.
The question of ‘how much is privacy worth?’ is going to be an ongoing discussion as more powerful technology is developed. There will always be a cost for privacy, so you need to know what compromises you are willing to make, as well as which you are not. While privacy is a basic human right, technology has made it harder to maintain it. Businesses and governments are always gathering data to learn more about you. In summation, even taking basic security measures can help protect you, and could force change in the future.
https://www.vpnmentor.com/blog/ultimate-guide-online-privacy/

Thursday, 23 July 2015

We May Soon Be Driving On Roads Made Of Recycled Plastic

VolkerWessels-Dutch-Plastic-Road1-537x398
Remember when you were setting up your Hot Wheels track and imagining it were a real thing? Well, you may have been on to something.
Thanks to VolkerWessels, we may all soon be driving on plastic roads. The company is working on roads that will be made of recycled plastic and would consist of snap-together parts, much like toy construction blocks.
VolkerWessels-Dutch-Plastic-Road-Hollow-Interior-537x447
Naturally, one of the biggest benefits of having plastic roads is that laying them down will be much quicker and easier. Thanks to the Lego-type construction and hollow space “inside” the road, the installation of cables and pipes, as well as making repairs will also be significantly simplified.
Will a plastic road stand up to the task of having heavy vehicles pressing down on it, different weather conditions and temperature changes?
According to VolkerWessels, absolutely yes.
Reusing the material will actually make a plastic road more durable to harsh conditions, allowing it to last longer and withstand greater temperature ranges. Plastic roads are also able to survive the strain from vehicles and weather with a much weaker chance of cracking and corrosion. Thus, the new roads promise to live three times as long as their traditional counterparts.
True, at this stage, this type of road is just a concept. However, the future may not be too far ahead. We have already seen a solar powered bike lane near Amsterdam and it appears the Dutch are pioneers in new road technology as Rotterdam is eager to try out the plastic road and report back. According to VolkerWessels, this may all happen within the next 3 years.

VolkerWessels is a Dutch group of companies with over 15, 000 employees and offices in the Netherlands, Belgium, UK and Canada. The company is involved in construction, building and property development, infrastructure, technology and telecoms, as well as supplies and marine services.
Previous major projects completed by VolkerWessels include the Gateshead Millennium Bridge and Euroborg Soccer Stadium

www.electroshopworld.com

Friday, 10 July 2015

Latest ElectroShopWorld Electronics: Conquest S6 Plus Rugged Smartphone, Smart Wireless IP Camera & more

Conquest S6 Plus Rugged Smartphone

Latest ElectroShopWorld Electronics

Some exciting and fun-packed products have been launched today, which include Conquest S6 Plus Rugged Smartphone. More details are available below!
Conquest S6 Plus Rugged Smartphone: In addition to the incredible design, this model offers an impressive capacity of onboard memory, a large bright display, fantastic cameras and of course that IP68 waterproof and dust proof rating. It is equipped with a bright and convenient 5 inch display with 720p resolutions. When it comes to battery life the 4000mAh battery brings a long life and plenty of usage time. It has one of the most fascinating cameras in its arsenal making it stand out from other rugged smartphones, an rear facing 8 megapixel camera can achive 13Mp images with interpolation that allows you to always capture every memorable moment. This rugged Android 4.4 smartphone not only supports 2G and 3G bandwidths, but also 4G FDD-LTE, which makes it one of the most advanced rugged smartphone available today.
Smart Wireless IP Camera: The ASDIBUY 1100 XX MP IP camera with door alarm, will let you connect and see you home no matter where you are. This smart IP camera can has support for 2262/2264 chipset wireless detectors and comes with a wireless door alarm but could easily be used with a smoke alarm or infrared detector. Geared towards those wanting basic monitoring systems and not for protecting Fort Knox this system has Wi-Fi support for the camera. It can record content to a micro SD card and the video feed can be seen on your mobile as the system ahs Smartphone support. The motion detection can be set to auto capture footage. Switch on the lights to surprise anyone who enters and even communicate with them through the smart IP camera system that includes a built in microphone and speaker. The touch panel light switch will also let you adjust the lighting mood and timings throughout the day.

Saturday, 9 May 2015

Latest ElectroShopWorld's Electronics: Ulefone Be Touch 4G LTE Phone, 10.1 Inch 3G Tablet PC & more

Ulefone Be Touch 4G LTE Phone

Latest ElectroShopWorld Electronics

Hold your breath for the variety of exciting products we have launched today, one of them is Ulefone Be Touch 4G LTE Phone and many others. So keep on reading to learn about these new products!
Ulefone Be Touch 4G LTE Phone: With some nice dimensions the Be touch from Ulefone sports a 5.5 inch screen with a 720p resolution. The screen is protected by Gorilla Glass 3 and includes IPS and OGS technology for a brighter fresher look that is there to impress. This 5.5 inch screen has around 270ppi that leads to vibrant colors and great viewing angles with nice bright whites and good depth. Under the shell of this new Ulefone is a power house of processors in the form of a 64 Bit MTK6752 CPU that clocks in at 1.7Ghz and sits alongside 3GB of RAM. When it comes to communication there are two SIM card slots in the Be touch, each of which supports quad band 2G, 3G and 4G for a flawless connection no matter where you may be. On the rear of this phone is a Sony IMX214 13MP camera that produces the quality images you would expect from a leading brand lens and let you relive every moment in full beauty.
10.1 Inch 3G Tablet PC: With the 10.1 inch screen on this tablet you wont miss any of the detail and because its implemented IPS technology and displays in 1280×800 resolutions you can easily see all your content in sharp, crystal clear quality. Supporting 3G SIM slots is a major advantage to any device and this large screen tablet has two SIM slots. This lets you answer or make calls as well as providing access to the WCDMA 3G connectivity so you can surf the web no matter where you are. When you combine this function with the MTK8382 Quad Core CPU backed up by 1GB of RAM then streaming videos, playing games and downloading applications on the go are all at your fingertips. An Android 4.4 operating system makes everything easily accessible and there’s loads of customization options to make this tablet your very own. What’s more with OK Google voice commands you can use this hands free so it can double as an in car GPS and keep you connected when on the go.
4 Channel H.264 NVR: With 4 channels the NVR will let you connect up to 4 cameras and provides a 7 inch TFT-LCD touch screen interface that lets you see the output of each camera any time you like. With ONVIF 2.0 compliancy it’s compatible with a wide range of cameras and uses H.264 compression for easy storage of all recorded information. The 2TB HDD support allows you to connect a small HDD directly to the monitor for easy fast recording. his NRV will let you manage record and view the feed of your cameras over the internet as the in a NVR system the video recording are processed by the camera and streamed to the NVR via a network. This reduces the cabling restrictions encountered with DVR systems and makes the NVR more flexible for security cameras spread over a wider area or different location. For easy viewing there is 4 Channel 720p real time playback and you can also use a mobile phone to access the footage remotely by simply logging on to the network.

3500 Lumens Projector: Coming with a 5.8 inch LCD panel, it will project a clear, sharp, color-saturated image with a 1280×768 resolution onto any surface in your home. The 3500 lumens output will ensure a bright and vivid picture, even if your movie room is not completely dark, and with a 1000:1 contrast ratio you will be able to project your images and motion pictures onto a larger screen up to 120 inches without missing out on the details. Thanks to the built-in HDMI port, you can connect the projector to a PC or a game console for an even greater rush when playing your action games. The 3500 lumens projector can prove to be a great asset in the workplace. Connect the projector to your PC and it can become an alternative display, perfect for working on projects in a group, that involve attention to detail, or simply as a way to add variety to your working station.
4 Channel H.264 DVR: A great way to get your security system started is with this 4 channel DVR with built in recording features H.264 video compression and Bi-directional intercom. Make sure you property is safe and secure with this easy to install and mount DVR. Link it into 4 different cameras to cover the entrances into your property and with HDD support and network client port you can easily store your surveillance or connect this DVR to your local network to view the footage remotely. Using H.264 video compression lets this DVR record footage and store it using a minimal amount of space. The H.264 format is the standard video compression choice for recording, compression, and distribution of high definition video without loss of quality. This 4 Channel DVR can be used in conjunction with 4 security cameras and manual, fixed time, alarm and motion detection recording modes. With a built in Bi-directional intercom it makes a great door security system.