Got a spare old android phone? read on and you're gonna know how to put it to good use; turning it into a security camera. Great to be used as a baby monitor✌

Is it really possible to use a smartphone as a monitoring device without any knowledge of I.T? The short answer is YES. You don't need any sort of Cyber training to use your smartphone as a spy device.

How is this practicable? By installing necessary security applications and using them in the manner I'll show you as you scroll down the page.

How to use your android phone as a security camera

What you're about to read further is common sense for some experienced individuals, but alien to many. For the experienced ones, I'll gladly welcome any form of contribution to the methods I'm gonna use here. For the not-so-experienced, read on!

Breaking it down in these steps;
  1. Get IP Webcam
  2. Setting it up
  3. Streaming
  4. Positioning your camera
  5. Mounting

1. How to use android phone as a security camera

Let's dive in to the topic at hand;

Step 1: Get a security camera app for android

To kick this off, you need an app used as a security camera. Most such app offers the same features as; cloud streaming, motion detection and alerts. local streaming and recording/storing footage locally or remotely.

Despite lots of options online, the best for me is IP webcam. Now the pro version cost $3.99 to unlock all features, but there's also a free-to-use version. Though this version can't be compared to the paid one, it still got some cool features.

IP Webcam broadcasts both over the cloud and locally with the help of a service called Ivideon, so you can watch your stream, live from anywhere. Get the Ivideon app for android on Playstore.

In short, IP Webcam is used for videoing and Ivideon for streaming.

Step 2. To set up your Android phone as a security camera:

After you must have downloaded and installed IP webcam, follow the below procedures to set it up:

  • Open IP Webcam

  • Set your video preference, effects, power management settings, and motion and sound detecting.

How to use your android or ios phone as a security camera

  • Go to Local broadcasting>>login/password to set up your unique login details when streaming locally. Streaming locally is public. Reason why you should have a password. That way only you can stream your video.

  • Now, to broadcast the stream remotely, you have to register or log in to Ivideon(if already registered).
How to use your android or ios phone as a security camera
Ivideon on PC after sign in

How to use your android or ios phone as a security camera
Ivideon on Android after sign in

  • Locate cloud streaming from your IP Webcam app, then select Ivideon and log in to connect your Ivideon account to the IP Webcam.

  • To begin streaming, select Start server at the very bottom of the app of your IP Webcam.

Step 3. Streaming your video from anywhere

Now to the fun part;

  • To view the stream locally:

you'll see an IP at the bottom of the video like type it in the web address bar of your pc or phone. It'll tell you insecure url but don't worry since you have your own dedicated password. Continue with the login.

A pop up will show asking for your username and password. After successful login, you'll be directed to your dashboard.

How to use your android or ios phone as a security camera
Streaming locally from PC

Locate Video renderer and select Browser to start streaming.

Note: make sure that your android phone is currently videoing on IP Webcam

  • To view the stream using Ivideon

Alternatively, you can stream directly from your Ivideon account. This is even better because it increases privacy(private not public)

To do this is very simple. Start the server in your IP Webcam(you must have linked your Ivideon account to IP Webcam by now), then login to your Ivideon account from your pc/desktop/android. You'll see a thumbnail of the current stream. Click on it and watch.

Step 4: Choosing a spot to position your camera

Choosing the best spot to place your phone is very challenging as you'll be careful to make sure it won't fall off or get seen. You may wanna position it at the main entrance to your home or wherever you think might be particularly vulnerable.

You can also set up an IP camera as a baby monitor.

If you have multiple old phones lying around, you can set up multiple cameras for fairly robust video coverage if you have multiple old phones lying around.

Step 5: Mounting and powering up your camera(s)

To mount the camera, a little smartphone tripod or suction car mount works perfectly and helps you fix the android in an inconspicuous place.

smartphone tripod
Loha smartphone tripod
Joby mini tripod
Best tripod for height

To broaden the view, you might consider purchasing a wide angle lens for your phone. These ones below are my top pick:

How to use your android or ios phone as a security camera

Note that streaming takes a lot of power since the phone will be turned on for a long time. To solve this issue, you might wanna position the phone close to a power source. A long Micro-USB or lightning cable will add some flexibility to your camera positioning.

Make sure you put your phone on silent. Putting it on airplane mode is advisable. Don't forget to on your wifi right back in order to access the internet.

If you really want to use your phone as a security camera, mostly for photographers, then a tripod(very important) and a lens(less important) will be useful. You can check them out from the below links:


Hopefully, by now you should know all you need to know on how to use your android phone as a security camera. You can go ahead and monitor your household when you're not at home.

With numerous scams, hacks and malware, the Internet can somehow feel as dangerous as a battleground these days

Top Internet Safety Tips to Stay Safe Online

No one can deny that the Internet is a massive and vast part of so many people’s everyday lives as it is quite useful, fun and informative. Be noted – no matter how safe you feel when using it, you gotta secure your safety.

Good news is that you can protect your identity and information for years to come by getting into a habit of using good Internet safety practices.

In order to be safe on the Internet, keep your social media credentials private so that no one can easily find your details online. Let’s make it short, we’ve compiled a list of 7 Internet Safety tips which might help you learn how to stay safe while using the Internet;

  1. Create Secure internet Passwords
  2. Keep Your  Software Updated
  3. Use Two-Factor Authentication
  4. Boost your network security
  5. Use Antivirus Software to increase safety
  6. Click smartly
  7. Only visit secure URLs

 Start scrolling down!

Always Create Secure internet Passwords

According to the survey in 2016, around 4% of people used “123456” as their password, making it the most common and easy to crack password of 2016. 

Creating a secure and strong password is one of the easiest and most effective things you can do to prevent brute force password hacks. Simply, the more bulletproof password, the more difficult it is for hackers to infect your system. 

8 Top Internet Safety Tips to Stay Secure Online

Tips for creating a secure password are;

  • The password shouldn’t be less than 10 characters
  •  Do include a mix of numbers, special characters and lower case and upper case characters
  • Words from the dictionary shouldn’t be used
  • Don’t create a similar password for different websites

Having a strong password is very essential especially now we're living in an era of widespread hacks. One database breach on a website can reveal thousands if not millions of user passwords.

If in such scenario, you use the same password in another website, a hacker can easily trace it and log in to your account.

Keep Your  Software Updated

Software security is a battle which doesn’t end and never will be. As susceptibilities arise and security errors are oppressed, whereas developers always patches updating their software and deliver users with better protection. In short, enabling automatic updates means great peace of mind as delaying these updates leaves your operating system more susceptible to an attack.

Latest Technology Updates don’t harm your computer or smartphone but keep your operating system, web browser, and other software up to date to reduce the overall risk of a security breach.

Use Two-Factor Authentication

Taking a two-factor authentication takes your e-safety to the next level, without a doubt. 

Several well-reputed websites that contain vital financial or personal information such as LinkedIn, Gmail, PayPal, and banking websites has already adopted this measure of extra security. 

Most of the websites text verification code, while others may send a link in the email for authentication. Whether you like or not, but 2FA is indeed an effective way of preventing fraudulent activities.

Boost your network security

When at home or in your workplace, you probably make use of a strong password protected router, thereby encrypting your data. When not at home. I bet you love connecting your devices to public Wi-Fi as it doesn’t charge even a penny? Keep in mind that it poses some significant security risks.

An example is; Man-In-The-Middle attack is quite common on public Wi-Fi through which hackers get access to your personal emails, and passwords with less hassle.

Now that you've read the first two tips before this one and you're about working on keeping your logins safe, also make sure your connections are secure.

Tip: While using public Wi-Fi, assume someone is watching you. Never enter login details or banking information when connecting but if you do need to send some sort of important information, use  a VPN (Virtual Private Network) to create a more secure connection.

Use Well-reputed Antivirus Software to increase safety

Antivirus software plays a vital role in helping you stay secure on the Internet. A well-known and leading IT security solution prevents malicious software from entering into your operating system and clean up any issues which might slip past your system’s defences. 

All you have to do is, enable auto updates and ensure your antivirus settings are suited to your browsing habits and needs.

Antiviruses aren't really used by those who are experienced in IT as their are better advanced ways of protecting yourself from online hacks. Notwithstanding, this measure is a great way for the ordinary persons with no knowledge of IT to secure from malitious apps and programmes downloaded on the internet.

Click Smartly

Now that you’re about putting great tech measures into place, also make sure you don’t invite danger to your system or revealing your details through clicking of suspicious links. 

Have you ever somehow been on and required to put your login details on a webpage resembling a popular social network or website like facebook? Maybe you've received a spam email saying something like "click here to get blah blah". Ignore such request.

This type of attack is known as phishing attack or social engineering, where you're tricked into revealing personal or sensitive information for fraudulent purposes.

Another reason you should click smartly while online is the risk of infecting your system with malware. Don't respond to that suspicious message urging you to "click here" or "download this" by reciprocating to the request. 

Doing such exposes your system to great risk.\

Only release your personal info on secure URLs

When shopping online, or doing sensitive transactions on the internet, always be on the lookout to see if the site’s address begins with “https”, instead of “http”, and has a padlock icon in the URL field saying Secure

This shows that the website uses encryption to scramble your information so it can’t be intercepted by hackers.

Also, be on watch for website URLs having bad grammar or misspellings in their web addresses. They're likely to be copycats of legitimate websites created to trick you into thinking it is the actual site you have in mind(like what I talked about on the previous tip). 

Use this safe search tool  McAfee to stay miles clear of risky sites.


The internet is never a fully safe nor secure place. Plenty people discovered this the hard way every day and seem not to know how it all happened.

Hopefully, these above tips will go a long way in making sure your safety is guaranteed while online.

You need to check out the concepts of a Man in the middle attack to better understand this topic.

Written by
Top Internet Safety Tips to Stay Secure Online

Gohar Abbas from

Internet safety guidelines are aside for a short second, we’ve also got you covered if you’re in a search of Cool Gadgets Reviews as well as Latest Updates about Hackers Lounge and Life Hacks.

As a new guy in the hacking world, I bet you'd want to know how to create a virtual hacking lab. If you don't know what this is or you just don't care enough to create one, I suggest you read this post thoroughly because it is highly essential.

How to Create a Virtual Hacking Lab

The hacking lab creates a safe environment to practice your hacks. This way you won't have to worry about the risk of failure when trying a hack in the real world because any slip off can be devastating.

Hacking isn't like most professions. In most, you fail and dust yourself off. But in this, you fail and probably spend some time behind bars. This makes practising very important, and this is where the virtual hacking lab comes in.

Many newbies find it pretty difficult to set up a dedicated lab to practice hacks. This article does justice to this problem.

I'll be breaking the tutorial down in 6 steps to make it easier to comprehend;

  1. Download VMware Workstation or Player
  2. Download Kali VMware Images
  3. Unzip Images
  4. Open VMware Image
  5. Download & Install Targets
  6. Download Old Applications

Let's go!

Step 1: Download VMware Workstation or Player

You should practice hacking within a virtual environment. You set up a hacking system like Kali Linux, and some victims to exploit. Essentially, you'll likely want multiple OS and software to enable you try out a variety of hacks.

How to Create a Virtual Hacking Lab

Virtual machines and a virtual network offer the safest way to set up a hacking lab. 

There are numerous virtualization systems available, including Oracle's VirtualBox, KVM, Microsoft's Virtual PC and Hyper-V, Citrix, and VMware's Workstation, VMware Player and ESXi.

In a case of a lab environment, I recommend VMware's Workstation or Player. The workstation is a purchasable product that costs as high as $200 after the free 30-day trial, while the Player is free-to-use.

The difference between these two is that the Workstation can both create and play, while the Player is used to just play VMs.

Download VMware's Workstation or Player here.

Step 2; Download Kali VMware Images

After you must have installed the virtualization system, your next step is to download the VMware images of Linux(provided by offensive language). These images help you to run from Workstation or player instead of creating a virtual machine. 

These images have already been created by Offensive Security. This basically means that you can then use it in either Workstation or Player once you download the VM of Kali.

Step 3; Unzip Images

You need to unzip the downloaded files using one of the several free available zip utilities like WinZip, WinArchiver, etc. 

Download and install the one that suits your fancy and unzip the files. The screenshot below shows the unzipped Kali files using the free trial of WinZip.

Step 4; Open VMware Image

When you must have unzipped all the files, your next step is to open up the virtual machine. Be sure to know the location you unzipped the VM image.

Next is to open the Player or the VMware Workstation. Go to file and open like in the below image.

How to Create a Virtual Hacking Lab

This opens a window like in the below image.

This shows the VMware VM file that you're gonna load into VMware. Note that I'm using the "amd64" which is simply the 64-bit version. The 32-bit version will work though, but a lil bit slower.

Next, after you do so, VMware starts your VM and displays the below image.

Now, hit the little green button in your screen that says "Power on this virtual machine." It will now display a Kali screen.

How to Create a Virtual Hacking Lab

Use "root" as User and "toor" as Password to get started hacking!

Step 5; Download & Install Targets

Now, download and install your target system. You could use your own host Windows system since this is merely a practice, you might wanna use an older and easier to hack system. 

I recommend installing a Windows Vista, XP, Server 2003, or an older version of Linux. You can use these systems to practice hacking since they have known security vulnerabilities. Later, when you think you're climbing up the ladder, you can now install and use Windows 7 and 8 for your hacks.

If you don't have a copy of these older OS, you can easily purchase them on the internet. At last check, it was sold for as low as $9.66 on Amazon, but that can change anytime.

Alternatively, you can get these OS for free on torrent sites, but BEWARE!'ll likely be downloading more than you bargained for.

These free downloads often come with rootkits that embed in your system when you open the file.

You can get older versions of Linux from the distribution.


Step 6; Download Old Applications

Now that you have your operating system, you're gonna be needing apps and software to run on these older versions. These older versions have plenty known security flaws that you can check your hacking skills.

You can use the website "Old Apps" to download many of these.

How to Create a Virtual Hacking Lab

Hit me up in the comment section if you got stuff to say or add on how to create a virtual hacking lab.

Subscribe to my mailing list

* indicates required

Hi there✋. 

Have you ever wondered how easy or possible it is to hack into your pal's computer? Or maybe you know it's possible but do not know the steps to follow. 

I say to you; bring out your note if you ain't with your computer. Keep reading lad.

I've always been asked by viewers on how to hack a computer. I'll be showing you one of my tricks. This trick is done in 4 steps;

  1. Getting started
  2. Trial and error
  3. Gathering necessary information
  4. Getting in

Before you keep reading though, i'll suggest you take a look at our disclaimer page.
Let's get to work!

How to hack into A Computer connected to the same network(Lan)

This trick is perfect for those working in an office where everyone is connected to the same network. It can also be carried out in a College.

What you need

  • Windows OS
  • Cain and Abel

The obvious first thing to do is find a Computer to hack into. You can begin if you're connected to the WAN or plugged into the LAN.

Open up your Cain and Abel. Get it here if you don't have it installed,

This hacking program has a built-in sniffer feature that looks for all available IP addresses in a local subnet. 

Now pay attention!

Step 1

Getting started!

Click on the sniffer tab after the software opens. Click the Start/Stop sniffer, and click the blue cross.

5 Easy steps to Hack Into a Computer

Another window will pop up after this, select “All host in my subnet” and click ok.

It'll now begin to scan

5 Easy steps to Hack Into a Computer

The Computer names, IP's and mac addresses will display. Write them down and try to remember the IP address you wish to hack into. It's okay if you can't tell whether the IP address belongs to a Computer, modem, router etc.

The next step will tell you what to do.

Step 2

Trial and error

This stage is here in case you don't know if what you have is a Computer, printer, router or whatever else is connected to the WAN.

If you did get the IP address of the target though, I still recommend you read through this

Click on the start menu, type in cmd, and click ok.

This will bring up the command prompt which is where you'll be doing most of the hacking.

Next, you'll be reading certain commands in quotes that you'll need to be input into the command prompt. Do not by any way put these commands in quotes. It won't work. I put quotes only to avoid confusing you.

Type in “ping (IP address of the target).” For example in this tutorial, “ping”

This lets you know if the target is online or not

It will look something like this if the target is online.

5 Easy steps to Hack Into a Computer

It will look like this if the target is offline:

5 Easy steps to Hack Into a Computer

This hack can only be done if the target is online. So switch to a different target if it's not or wait for it to come online.

You'd wanna know how to crack a wifi password and a website

Step 3

Gathering necessary information.

Input this command “nbtstat –a (IP address of target).” A suitable example would be
“nbtstat –a”

This will display if file sharing is enabled. If it is, it will give you the; currently logged on user,  computer name and workgroup.

5 Easy steps to Hack Into a Computer

Step 4

Getting In

It’s time!.

By now you should know that: your target is online, has file sharing, and the computer name.

Locate the shared drives or printers. Type “net view (IP Address of Target)”
Example for this tutorial would be: “net view”

You just found the share name. In this case, "C" is under the share name signalling that C is the only shared thing on the PC or computer.

To the right, "Disk" is displayed under Type. Meaning that it is the actual C DISK of the computer. The C DISK is most times an entire person’s hard drive.

If you observe carefully, for my hack I already used “K,” so now I use “G” instead. You may do the same for multiple hacks.

It will say “The command completed successfully.” if it worked.

You may have to go retrace your steps if it didn't.

Now open “my computer” under the start menu. There your recently created network
drive will be there.

Note that you won't be able to access this drive if you disconnect from the WAN or LAN. Hence the name Network Drive.

Don't worry though, you won't have to repeat the same procedure all over again since the drive will not be deleted after you disconnect. You can still access it whenever you reconnect.

Congratulations! You’re DONE HACKING!

Commands used;

  • PING
  • NBTSTAT -a (IP Address of Target)
  • NET VIEW (IP Address of Target)
  • NET USE K: (IP Address of Target)(SHARENAME)

Program used;

Cain and Abel.

Pretty easy right? this sums up the steps to hack into a Computer.

Subscribe to my mailing list

* indicates required

This week on the hacker news.

Black markets on the Dark web are not just known for buying illegal drugs, it is an enormous hidden network where you can buy lots of stuff you can imagine—from weapons, counterfeit currencies, pornography to hacking tools, malware, exploits, and zero-days.


the hacker news

If you’re unable to find it on Google, you will certainly find it on the Dark Web.

The RDP(remote desktop protocol) shop, is one of the underground market-place on Dark Web, a platform that enables anyone to purchase RDP access to hundreds and thousands of hacked machines for a small fee.

Security researchers from the McAfee's Advanced Threat Research team learned that an individual is selling remote access linked to security systems at an International airport for $10 while examining plenty underground RDP shops,

Yes, that's $10!\

the hacker news

Researchers decided to use the Shodan search engine to get the exact IP address of the hacked Windows Server, Instead of purchasing RDP credential. It happened that the administrator account was up for sale.

When they found their way on its login screen through Windows RDP, they discovered there were two more accounts which were "linked with two companies specializing in airport security; one in camera surveillance and video analytics, the other in security and building automation."

"We failed to investigate the full level of access of these accounts, but a compromise might offer a great foothold and lateral movement through the network with the use of tools such as Mimikatz," the researchers wrote. 

"We executed the exact same search on the other login account and found that the domain is most likely linked with the airport's automated transit system, the passenger transport system that connects terminals."

Black market traders usually gain access to RDP credentials by simply scanning the Internet for systems that accept RDP connections, according to the researchers. Then after such traders must have found what they are looking for, they go ahead and launch brute-force attack with popular tools like Hydra, NLBrute or RDP Forcer to gain access.

the hacker news

Once the individual successfully logs into the remote system and gains access to the system, they place the connection details up for sale on the Dark Web.

Anyone who purchases access to such machines will be able to move laterally within the network, alter settings, create backdoors, install trojans and steal data.

As a way out of this mess, organizations should consider taking necessary RDP security measures, such as:

  •          Halting access to RDP connections over the open Internet

  •         Using complicated pass and 2-factor authentication to make brute-force RDP attacks much              harder to succeed

  •          blocking users and IPs that have many failed login attempts

     More on the hacker news.