How to Connect Your PC to TV

Here are all the solutions to connect your computer with your TV and start watching movies and TV series on a bigger screen.

November 24, 2017-nowadays there are several programs for streaming video that we can use on our devices, from smartphones to notebooks. Why insist on watching our favorite series on small displays when we can connect the PC to the TV and watch movies and TV shows on the bigger screen?

If we have a smart TV we will not need cables or accessories, we can connect to the Internet and start various services on demand, such as Netflix, SkyGo or RaiPlay, directly from the TV. But if we do not have one with access to the network we just connect the computer to the TV to solve all kinds of problems. In order to do this we will have to buy some cheap wires or devices. It is important to know that there are also wireless solutions to connect your PC to your home TV. This way we won’t have any pesky cables scattered around our apartment.

Wireless Solutions

To connect our computer to the TV without using cables the solution is to buy a smart box. These are small accessories that basically turn our television into a Smart TV. We can connect the screen of the computer or that of the smartphone to see every program that requires the use of the network also on TV. Among the most popular smart boxes are Apple TV 4k. It allows us to transmit the PC screen to the TV and to play any multimedia content. On other TVs and on computers running Windows or Linux the most convenient solution is the Google Chromecast.

Cables for connecting PC and TV

The most famous cable ever for the connection between PC and TV is the HDMI. The HDMI cables are easily found on the market, sometimes even in supermarkets, and cost very little. The cheapest can have a price even less than 10 euros. If we have an Apple notebook in addition to the HDMI cable we will need a C-type USB adapter to connect the cable to the laptop computer. And this can happen also on some models of laptops of other manufacturers.

S-Video Cable

If we have a slightly older computer that does not have an HDMI port we can solve the problem using an S-Video cable. This is the famous cable present in almost all the old-generation consoles, the one marked with the three pins (red, white and yellow). This system will allow us to connect a TV to a computer but we will not be able to see the movies in HD. They are cables that cost very little but we take one long and make sure that the television has the appropriate connections for S-Video or at least a SCART socket.

VGA Cable

In case of No S-Video support on our computer we can use another solution, that is a VGA wire. Before buying one, however, we check that our TV has a compatible port. Old TVs don’t have this connection. With the VGA cable we can also see HD-quality movies.


Facebook Under Attack, A Virus Steals Passwords

A software promises to steal the Facebook Passsword of your contacts, but actually installs a trojan that takes possession of your credentials.

August 14, 2017-talk of Dante’s retaliation, in cases like these, is almost an obligation. As noted by some security researchers from the Australian company LMNTRIX Labs, a Facebook malware allows hackers who have created it to steal the credentials of access to the social network of unwitting victims.

Up here there would be nothing new or exceptional: of viruses on Facebook are counted to dozens every day and are able, who more who less, to endanger the data of users enrolled in the social network of Mark Zuckerberg. The peculiarity of the discovery of Australian researchers is another and lies in the “form” with which the virus is rapidly spreading. To deceive users, the malware promises (in disguise, of course) to help steal the Facebook password of their contacts. Instead, the exact opposite happens: once installed, it steals the credentials of the infected computer. Retaliation Dante, in fact.

The virus that promises to steal Facebook password

Behind what might look like a “simple” hacker attack lurks, instead, a complex social engineering operation. The cyber criminals who created it, explain the Australian computer security researchers, have well understood that some “poorly licit” operations could attract the attention of many Internet users around the world. They have decided to “disguise” the Facebook virus from software that allows you to steal Facebook passwords and access, so, to the profile of your friends or acquaintances.

As said, instead, Facebook Password stealer – This is the name chosen for malware – installs a Trojan inside the computer that allows hackers to get hold of the credentials of the unsuspecting victim. In addition, they also put on an online marketing campaign, with advertisements on sites and forums of various kinds.

How does the virus Facebook Password stealer

Although the stratagem devised to promote the spread of the Facebook virus is rather complex, its operation is elementary (or almost). In the software screen there are three fields to fill: two dedicated to their credentials to access the social network, while the third one is used to know the URL of the profile “objective”. The truth, however, is that as soon as you click on the button “hack”, the data entered in the first two fields will be “taken over” by the Trojan Horse installed on the PC and sent to the server managed by hackers.
How to defend yourself from the Facebook virus that steals passwords

Real defense tools against this particular Facebook virus don’t seem to be there. At least for the moment. The only thing to do is to avoid downloading “abnormal” software that promise to obtain impossible results: to be able to steal Facebook password knowing only the user name of the profile “objective” is actually not possible. If you run into one of these programs – which promise to recover or steal Facebook passwords – keep yourself well away: behind it hides something unclear.

How to Find Out Who Is Hiding Behind an Unknown or Private Number

Finding out who is hiding behind private numbers can be easier than expected thanks to some services and applications on the Internet.

The nightmare of the private numbers behind the call centers, in the ranking of the most hated people while you are on the phone, there are them: private numbers and unknown. Usually behind private numbers lurk people who are trying to promote some new product or a new paid service and hope that someone will helmet us. Very often, however, private and unknown numbers are used by people to make jokes or to intimidate someone. In such cases it is necessary to alert the police immediately and to file a complaint against the unknown so that they can be traced back to the owner of the telephone number. But, thanks to some applications and services available for free on the network, you can find out in advance who owns the phone number trying to understand why these calls. Some services require registration, while for others it is enough to download the app on your smartphone.

Who calls

If you receive the call from an unknown number, one of the solutions to be taken to find out who phoned you is the online service who calls. The site allows you to find the person who called you through the comments of the users who have had your same experience. In order to use the service you must access the home of the site and then use the white space in the middle of the page to search for the phone number indicted. After entering the number from which you received the call you must press the search button: If the search is successful will appear on the screen of your PC or smartphone (the service can also be used through a mobile device using One of the many browsers available on the online store) a card with the name and surname of the owner of the card, while otherwise you will need to put your heart in peace and find another solution. The caller still allows you to fill out a card with all the information on the number in the hope that even some other user receives a call from the same number.


Service very similar to the previous one, Tellows allows users to use their own phone numbers database to find out who is hiding behind calls with an unknown number. In order to take advantage of the services provided by Tellows you must access the site and use the empty space located in the upper right corner to enter the phone number to search. In the event that the search will give a match, a map is shown with the city of origin of the phone calls and the comments of other users, otherwise you can leave your comment and wait for other users to receive the same call. The services offered by Tellows do not stop here and also include a photo map to control what numbers of phones are most searched for and an application available on the Google Play store and the App Store that allows you to know in advance whether The number from which you are receiving a call is a call center or a paid advertising service.

Whooming, the service to find out who is hiding behind the private numbers

Whooming is one of the best services to find out who is the owner that lurks behind the private number that calls you every day and each time pretends not to talk. The activation of the service requires a little ‘ patience, but once you make the registration will be easier. Whooming is free and works with any telephone operator. The operation of Whooming is particular and obliges the user to activate on the smartphone the call deviation, otherwise it will be impossible to trace the person who hides behind the private number. The first step is to sign up for free to the service through the official website: the registration can be done either by filling out the appropriate form or by using the credentials of Facebook to speed up the practice. After completing the subscription, Whooming will send an email to your email address to complete the activation of your account. Once this step has been completed, you can finally follow the procedure to activate the call diversion on your smartphone, so that anonymous phone calls are directly diverted to Whooming and you can find out who is behind the number Private.

Whooming, the application for the smartphone and the paid services

After activating the call diversion you will need to make a test call to test the operation of the service: If this step will also be successful, then it means that Whooming is ready to find out the number that is hidden behind the Private calls. When you receive an anonymous phone call simply refuse the call and after a few minutes Whooming will send on your email address the number that has tried to contact you. This way you can go back to the owner and find out the reason for the anonymous phone calls. In the event that the person continues with the anonymous calls you can turn to the police and file a complaint for stalking. Whooming is a very useful service especially for women who are continually harassed by the ex-boyfriend and the ex-husband. The service also provides an application developed for Android and IOS that allows you to always have under control the register of calls received. In addition, by charging a charge of 10 euros to Whooming will be possible to activate services for a fee: talk to a stalker, will make the line clear to the phone call anonymous but in the meantime Whooming will have already traced the number, records the call with the Stalker allows you to store the phone call, while SMS notifications, will send a message to your smartphone to find out who called you.


Another service that you can activate to understand who lurks behind the anonymous calls is Override that is offered directly by the telephone operators. In order to activate it is necessary to make a written request through a form that can be downloaded online from the website of your manager. Override, however, is not a free service, but expects to pay a fairly high monthly subscription. The service is certainly very effective, but to be able to activate it is necessary to have made a complaint for stalking to the competent authorities, because they are the only ones who can access the phone records.


Dive3000 is a real online phone directory that allows you to discover the owner of the unknown number who called you. The service is only usable by browser, since no application has been developed. The first step to be able to take advantage of the functionality of Dive3000 is to subscribe to the service and wait for the activation of your account. Once you have completed the registration you can use the special form to discover the owner of the unknown number that calls you every day. If the search will be successful, Dive3000 will show a card with all the information about the number, otherwise you’ll need to use another service.

In the event that the calls received are not of a number with an Italian prefix, it is necessary to use a service that collects the foreign telephone directories. One of the best present on the net is, which can create some difficulties for the problem of the language, but after a couple of minutes you get used to the interface and each user can use it very easily. By choosing the country of origin of the phone number, the website directs you to the reference phone list and you don’t have to do anything else but enter the number to find out who has been looking for you. A very simple and especially fast service to use.

How to Defend Against Unwanted Calls and Phone Scams

A complete and intuitive guide to block unwanted calls for ever on both your home phone number and your smartphone

For lunch, dinner and even at work. Our day is marked by phone calls. Both the home and the smartphone. In most cases they are not good news but the usual call centers that try to sell us everything. Let us see then, with this complete guide, how to defend ourselves from unwanted calls.

There are a number of ways to defend yourself on the fixed line from unwanted call center calls, but also and especially to avoid unpleasant phone scams. To stop the continuous promotional calls we can decide to subscribe to the public register of the opposition. But it’s not the only way to defend ourselves from the insistent calls of telemarketing. In fact, now even smartphones have become a target of promotional calls, and you need to install the right applications to be able to block unwanted phone calls.

How to register for the opposition

It is a service made available to the citizens that allows you to exclude your number from those available to the various call centers. To register the first thing to do is go online to the site Here we select the Subscriber Area that we find in green on the top left of our monitor.

Once entered the Subscriber Area we will notice a series of icons, five for accuracy. We have to click on the one with the word “Web”, which is also the first on the list. This way we’ll open a pop-up menu, and select the entry. Below we will read the words: “Dear subscriber, to subscribe via web your number in the public register of the opposition, you will have to fill out and send the electronic form at the following Link”. Clicking on the link we will be transported on a new page where we will fill in the necessary form. To complete the operation we will need our phone number, the VAT in case of company phone, our birth and residence data and an e-mail address. Once you have filled out the form click on the Send entry, in the lower left. At the end of the inscription display a summary page, remember to print it because it might come in handy in the future. If, in fact, after our registration continue to receive calls from the call center we can contact the guarantor for the protection of personal data and denounce the fact. To do so we download, always from the site of the register of oppositions, the file with the words “signalling receiving unwanted advertising calls – for private telephone users”. Fill it in and send it by registered mail to the address on the top right hand side of the form. Let us remember that the activation of the registration in the register of oppositions takes about 15 days.

Limitations of the Opposition Register

Registration to the register of oppositions will avoid us having to respond to different promotional and unwanted calls. But it may not solve the solution in a definitive way. Legally, in fact, even if we are enrolled in the opposition register, the companies that we have enabled to receive promotional communications can still call us. This is something that happens often when you sign up for an Internet site, participate in an online contest or subscribe to services of various kinds. We are always careful so when we release our number on the net and when we click “I agree” at the time of registration to sites, forums or social networks of various kinds.

How to block unwanted calls on smartphones

As we said the promotional calls, the unwanted and the attempts to scam now are no longer an exclusive phenomenon of landlines, but are also recurring on smartphones. To do this, especially on Android devices we can decide whether to use the default settings on our devices or whether to rely on third-party applications. In most cases, apps provide more protection from pressing business calls.

Smartphone Samsung

Let’s see how to block unwanted calls on some Android smartphones. If, for example, we have a Samsung phone with Android Lollipop, or a Galaxy S5 or S6 or a Note 4, we can adopt a simple method to block incoming calls. This is a default phone option very easy to set up. To do this we go to the call log, in the upper right we will find the icon for advanced settings. We enter and select the item add number to Automatic reject list. A drastic but still effective choice could also be to select the word “Block all unknown numbers”.

HTC Smartphone

How about Samsung even HTC made it easy to block calls to its users, thanks to a default setting. To do this, on the various one M7, one M8 and one M9, we will simply open the call history and then touch the search icon, the one with the magnifying glass, to find the number that we want to stop. We press on the unwanted number and a popup menu will appear, then we option the add to call barring entry. We can also manage blocked contacts because HTC smartphones create a folder with all the numbers blacklisted.

LG Smartphone

Some LG smartphones, especially those that are still running with Lollipop, adopt quick and ingenious solutions to avoid commercial calls. Setting it is easy, indeed to tell the truth you should not set anything, we will decide at the time of the call whether to add the number to the black list or not. To do this, when we receive the unwanted call, instead of swiping the finger from the center towards the red handset to the left to close, we bring the red handset to the center. This operation will automatically send the number between the blocked contacts. Or we can set automatic rejection for all unknown or private numbers.

Should I answer?

If our smartphone does not have effective settings present by default and you are wondering how to block unwanted calls you can ask for help from third party applications. One of the best is: Should I answer? The name is explanatory and allows you to understand immediately the main purpose of the application. Should I answer? It allows you to block incoming calls of any number and to preview the judgement of the users on that contact. For example, if you receive a call from a call center, the application will allow you to find out in advance and you may not respond while saving valuable time. The app uses a constantly updated internal database from other users. It also works offline.

Calls Blacklist

Another very useful application to block the calls of the nuisances on Android is called Blacklist that allows you to create a personal list with all the contacts to be rejected. The user can add a number to the blacklist or add it directly to one of the following categories: “Private Numbers”, “Unknown Numbers” or “all calls”. In addition to the possibility of blocking calls, the user will have the option to put a block even when receiving the SMS. Blacklist is a very complete application: on the Google Play Store is available both a free version and a fee without advertising.

Google Dialer

Google offers a service to block commercial calls and in general all unwanted ones. It’s called Google Dialer. Obviously to make it work you have to install the relevant application that is in the Play Store. Just a few minutes to do that. Downloaded the app, we need to start it. Once done we go to the menu and click on the icon with three dots on the top right. We then go to Settings and select the item blocked numbers. At this point we choose the Word add a number and insert all the contacts we intend to block.

True Caller

If you are looking for free apps to block incoming calls True caller is one of the most used applications by Android users. This is because it offers two different services: on the one hand you can block calls from people who are not welcome, on the other you can reject the call centers. In order to make the most of the features offered by True caller, you need to sign up for the platform and you can start using the database, how should I respond?, with all call center numbers reported by the community. Each user can add new contacts and put in their personal black list those who will not want to hear.

How to Properly Charge Your Smartphone’s Battery

To properly charge a battery, you must follow some suggestions: Do not go below 30% autonomy and activate the airplane mode.

Nowadays one of the biggest worries of people is: how much battery does my phone still have? It is not uncommon to see users running with the loader always at hand or with a power bank. At times, however, we are committing mistakes during the charging phase that may impair the battery.

There are some recommendations to follow when reloading our smartphone. It may seem a hassle yet having a proper routine will help the battery stay efficient for as long as possible. One of the most useful tips is to have more cables for charging. It represents a small additional expense but will allow us never to be without a magazine. Obviously it is necessary to buy only official cables to avoid damaging the autonomy of the phone battery.

The charging time

To increase the average battery life it is necessary to pay attention to the charging cycles. It is usually advisable to avoid charging times too long. Although it must be said that in the new smartphones leave the phone attached to the socket even after it reaches 100% is not a big problem. Given that thanks to a sensor like the smartphone is loaded does not receive additional energy. The real question is: Should we get up to 100% or is it better to disconnect the smartphone a little earlier? Some experts, and among them those of the Argonne collaborative Center for Energy Storage Science (ACCESS), advise to keep the device always between 30% and 80%. In practice we will have to charge the smartphone when it reaches 30% and disconnect it from the current to 80%. Always arrive at 100%, or 10%, according to the scientists creates imbalances to the battery that could cause problems.

Save Energy

If we notice that our battery is going to run out but we are unable to recharge it, the board is to activate the energy saving mode. Almost all smartphones now have this feature. Once the function is turned on, the brightness will be stopped, automatic app updates will be halted and the screen lock will be set between 15 and 30 seconds. Some phones also have super-energy saving mode, which pretty much blocks each connection. If we had very little time to make a recharge the board is to perform this operation with the active airplane mode. This way the charging time will be lower.

Just Five Dollars and a Minute to Hack Your PC

It’s called PoisonTrap and it’s a system that in seconds will infect your device and allow cyber criminals to manage your computer remotely.

Do you remember the movie a few years ago with Nicolas Cage, out in 60 seconds? Now let’s lose the theme fast cars and think about your computer. There is a new virus that can completely infect your device in less than a minute. And it only costs five bucks.

PoisonTrap infects your computer in a minute. This new device was designed by one of the most famous hardware hack designers in the world, Samy Kamkar. It manages to evade most of the device’s security systems as a password or two-step authentication. The cyber criminal is about 30 to 60 seconds alone with the computer to infect your device. Be very careful when leaving your PC unattended at work or in the library. To infect your computer The hacker will use a tool defined PoisonTrap inserted inside a small Raspberry Pi Zero, which costs about 5 dollars, and that will connect via USB to your device.

How the PoisonTrap works

Once connected to the computer the PoisonTrap does not advertise itself as a USB device but as an Ethernet interface. At this point, even if the PC is connected to Wi-Fi the PoisonTrap will convince the system to support you as a priority line for the connection. This will work in a similar way to a hacker man in the middle attack. From here on the cyber criminal, without us noticing anything, will be able to steal all our data, our credentials on bank accounts and know all the information about our presence on the net.

Our device will be remotely managed

If we fall victim to an attack like this, the bad guy will be able to manage a large part of the local network and the browser remotely, thanks to a backdoor that a person without experience in the field could not recognize. Obviously you do not need the Raspberry Pi Zero with PoisonTrap remains connected to do all this. Kamkar has also made it known that this type of virus is incredibly resilient and manages to evade most of the security systems. On all also two-pass authentication of bank accounts.

How to defend yourself from PoisonTrap

At this point the question that will be arisen to many is: how can I defend myself from this new hacker attack? Kamkar says that there is no simple solution, especially for users who do not have great knowledge about it. But there are some tricks that will make it harder for the hacker to infect our device. First we choose, when we leave the PC even for minutes, the hibernation function rather than suspend. Because so we’ll suspend every process. We never leave a page of an open browser when we are not close to the computer. With patience and frequency we empty the browser caches. Or simply disable the USB ports. Although it is a little practical solution.

Who is Samy Kamkar?

Samy Kamkar is an engineer and as we said one of the most famous hack designers in the world, especially with regard to the creation of low cost viruses. He’s a researcher and he doesn’t do it as a criminal activity. Among his inventions there is, for example, MagSpoof a system that is able to guess all the details of a credit card starting from only some account data. Then he created RollJam which is able to unlock virtually any car or garage. And finally among the most famous there is also KeySweeper, a program that steals password disguised as a USB loader.

What is 5G?

The 5g is the new standard for mobile communication: It ensures a very high download and upload speed and allows you to interact with IoT (Internet of Things) devices.

An ever faster connection and at everyone’s fingertips. This is the goal of the Next Generation mobile Networks Alliance, the association of Operators, Sellers, manufacturers and research institutes operating in the mobile telephony sector. and the new standard for 5g communication goes precisely in this direction: increase the speed of users and improve the quality of service.

Although in many still do not have the ability to use 4G LTE connection, operators are already working on the next standard. According to the road map envisaged by the operators, the 5g should officially enter into operation by 2020, but there are many who are accelerating the work on the architectures to offer a super fast connection a few months before the established date. Thanks to 5g users can have at any moment an extremely high download speed and a very low latency, or the response time of the system to the user’s requests, in this case, for example, the opening of the Web sites.

What will change with the 5g

The characteristic of 5G that differentiate from previous communicative standards is the speed of connection. According to operators the 5G should be between 100 and 1000 times faster than the 4G LTE. But to be sure it is necessary to establish standards common to all companies and for the time being these rules are still embryonic. The Next Generation Mobile Networks Alliance has only established certain requirements that the 5G connection must have: data throughput of tens of megabits per second for thousands of users, people working on the same floor must have the connection to at least A gigabit per second, improved spectral efficiency over 4G, more extensive coverage and reduced latency.

If the speed predictions of 5G were confirmed, to download a movie in 4k from a streaming video platform it would take only a few seconds. A dream for users all over the world.

Because it’s called 5G

5G is very simply for fifth generation and is meant the set of requirements for a certain communicative standard. The history of communicative standards starts in 1991 with 2G, developed to improve the quality of mobile telephony. With the 3G also came the mobile data connectivity, with the possibility to see also the television programs. The 4g has been developed to improve telephony via IP (VoIP) and cloud computing. 5G, on the other hand, is the communicative standard designed for the Internet of things. With more and more IoT devices present inside our homes, you need to have a much faster connection to interact with these new tools. 5G is especially designed for the smart home and for the 4.0 industry.

How the 5G works

To achieve such high speeds it is necessary to use a frequency spectrum hitherto never used. The 5g uses millimetre waves, that is to say radio waves between 30 and 300 GHz, the highest frequency spectrum possible, so much that no state has yet assigned it. Until a few years ago it was unthinkable to use this for communication, while thanks to scientific research it has been shown that millimeter waves can also be used for connection.