#How to see wifi password on Android 13/12/11/10/9/8
Explore tagged Tumblr posts
Link
#Recover WiFi Password On Android#How to view saved wifi password on Android without root#How to see wifi password on Android 13/12/11/10/9/8#How to view saved wifi passwords on Samsung phone#How to find wifi password on phone when connected
0 notes
Text
How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
Resource of the article: How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
This tutorial, How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone, is updated in May 2018. This tutorial is meant for the CCTV / IP Camera solutions from the brand of Dahua. The similar guide for Hikvision is here: Setup guide of iVMS-4500 for Hikvision CCTV, IP Camera, NVR, DVR.
What are iDMSS and gDMSS
How to use Dahua iDMSS and gDMSS
iDMSS and gDMSS are a mobile phone surveillance applications from Dahua, which are available on iPhone and Android phones respectively, supporting Dahua CCTV Camera, XVR, NVR, HDCVI CCTV Camera, IP Cameras, etc. both iDMSS and gDMSS have two versions each: lite and plus; all the Apps are free and can be downloaded from Apple App Store and Google Play Store.
The key features of Dahua iDMSS and gDMSS Mobile Surveillance Applications include:
Support real-time live/playback
Support view and control live video streams from cameras and video encoders
Support Push Alarm, Video Playback, Task wheel, Finger Gesture, Windows Slide and so on.
Task Wheel to change Favorites Group
Support H.265/H.264/MPEG-4/JPEG decoding
Support Easy4IP – Dahua’s own P2P solution
How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
If you have installed the Dahua CCTV Camera, XVR, NVR, or IP Camera system from us, and would like to find out how to use Dahua iDMSS on iPhone & Dahua gDMSS on Android phones, you can refer to the below tutorial as the step-by-step guide. In this tutorial, we use iDMSS on iPhone as the illustration, rest assured that the logic is the same for gDMSS on Android phones.
1. Go to the “App Store”, download the app: iDMSS Lite / iDMSS Plus; or gDMSS Lite / gDMSS Plus from “Google Play Market”. These are the links: iDMSS Lite on App Store, gDMSS Lite on Google Play Store
2. After downloading the app, click to open it. You will see the step that is asking you to choose the “Country or Area”. Please choose the country of your current residence. The purpose is to facilitate the P2P connection of Dahua’s Easy4IP. The country or area you choose can be changed later, so don’t worry if you will move to other countries in the future.
3. Click the Top Left Corner as shown below to enable the menu choices.
4. The first thing you need to do now is to add the Dahua IP Camera, XVR, NVR, etc to the iDMSS or gDMSS. So please click Device Manager now.
5. Now you will have multiple choices to add the Dahua devices, such as WiFi Devices, Wired Device, etc. Choose the option that is suitable for your case. If you are not sure, please contact your Dahua device supplier; or if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us.
6. Now, you have two options to add the Dahua device to the app: P2P or IP/Domain. Choose the option that is suitable for your installation, or follows our or your device supplier’s advice. Again, if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us
7. Refer to this step if you have chosen to add via P2P. Click the barcode icon as follows to launch the barcode scanner camera. Scan the barcode on the Dahua IP Camera, XVR or NVR (on the device itself, on the packaging box, or on the web interface) to add the device. After that, please enter the device name, username and password. If you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us. After you have entered all the required information correctly, click Start Live View to watch the live video footage.
8. Refer to this step if you have chosen to add via IP/Domain. Enter the information of Device Name, Address, User Name, Password. You should have created the information, or been given the information by your device supplier. Again, if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us. After you have entered all the required information correctly, click Start Live View to watch the live video footage.
9. Another way to watch the Live View is to click the Live View as follows.
10. Upon clicking Live View, choose and click the IP camera / NVR / XVR you want to watch, then you will see the live view after that.
11. Referring the image below, clicking the icon circled will enable the switch between mainstream and substream – a way to switch between fluent transmission and clear image.
12. Referring to the image below. Click the icons circled will allow you to do the screenshot, keep the video clips, or close the live view.
13. To replay the old records, click the Playback as follows.
14. Upon clicking Playback, select the start and end time for the recorded video, also remember to select the Dahua device of which you want to replay the video.
Final Words on Dahua iDMSS on iPhone and Dahua gDMSS on Android Phones
Dahua iDMSS and gDMSS allow you to watch and control Dahua IP Camera, XVR, NVR, HDCVI Camera on-the-go. You can enjoy the user-friendliness and robustness that Dahua has brought for you. Dahua iDMSS and gDMSS are just client software, so what you do on the iDMSS and gDMSS will not affect the Dahua CCTV Camera you have installed: recording works on the server-side independently. So, please feel free to try it!
Contributed By CCTV Camera, CCTV Camera Singapore, and Safe Box Singapore
The post How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone appeared first on CCTV Camera, IP Camera, CCTV Singapore.
source https://cctvcamera.com.sg/how-to-use-dahua-idmss-gdmss/
0 notes
Text
How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
Resource of the article: How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
This tutorial, How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone, is updated in May 2018. This tutorial is meant for the CCTV / IP Camera solutions from the brand of Dahua. The similar guide for Hikvision is here: Setup guide of iVMS-4500 for Hikvision CCTV, IP Camera, NVR, DVR.
What are iDMSS and gDMSS
How to use Dahua iDMSS and gDMSS
iDMSS and gDMSS are a mobile phone surveillance applications from Dahua, which are available on iPhone and Android phones respectively, supporting Dahua CCTV Camera, XVR, NVR, HDCVI CCTV Camera, IP Cameras, etc. both iDMSS and gDMSS have two versions each: lite and plus; all the Apps are free and can be downloaded from Apple App Store and Google Play Store.
The key features of Dahua iDMSS and gDMSS Mobile Surveillance Applications include:
Support real-time live/playback
Support view and control live video streams from cameras and video encoders
Support Push Alarm, Video Playback, Task wheel, Finger Gesture, Windows Slide and so on.
Task Wheel to change Favorites Group
Support H.265/H.264/MPEG-4/JPEG decoding
Support Easy4IP – Dahua’s own P2P solution
How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone
If you have installed the Dahua CCTV Camera, XVR, NVR, or IP Camera system from us, and would like to find out how to use Dahua iDMSS on iPhone & Dahua gDMSS on Android phones, you can refer to the below tutorial as the step-by-step guide. In this tutorial, we use iDMSS on iPhone as the illustration, rest assured that the logic is the same for gDMSS on Android phones.
1. Go to the “App Store”, download the app: iDMSS Lite / iDMSS Plus; or gDMSS Lite / gDMSS Plus from “Google Play Market”. These are the links: iDMSS Lite on App Store, gDMSS Lite on Google Play Store
2. After downloading the app, click to open it. You will see the step that is asking you to choose the “Country or Area”. Please choose the country of your current residence. The purpose is to facilitate the P2P connection of Dahua’s Easy4IP. The country or area you choose can be changed later, so don’t worry if you will move to other countries in the future.
3. Click the Top Left Corner as shown below to enable the menu choices.
4. The first thing you need to do now is to add the Dahua IP Camera, XVR, NVR, etc to the iDMSS or gDMSS. So please click Device Manager now.
5. Now you will have multiple choices to add the Dahua devices, such as WiFi Devices, Wired Device, etc. Choose the option that is suitable for your case. If you are not sure, please contact your Dahua device supplier; or if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us.
6. Now, you have two options to add the Dahua device to the app: P2P or IP/Domain. Choose the option that is suitable for your installation, or follows our or your device supplier’s advice. Again, if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us
7. Refer to this step if you have chosen to add via P2P. Click the barcode icon as follows to launch the barcode scanner camera. Scan the barcode on the Dahua IP Camera, XVR or NVR (on the device itself, on the packaging box, or on the web interface) to add the device. After that, please enter the device name, username and password. If you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us. After you have entered all the required information correctly, click Start Live View to watch the live video footage.
8. Refer to this step if you have chosen to add via IP/Domain. Enter the information of Device Name, Address, User Name, Password. You should have created the information, or been given the information by your device supplier. Again, if you have purchased the Dahua IP Camera, XVR, NVR, HDCVI Camera from us and not sure what to do, please contact us. After you have entered all the required information correctly, click Start Live View to watch the live video footage.
9. Another way to watch the Live View is to click the Live View as follows.
10. Upon clicking Live View, choose and click the IP camera / NVR / XVR you want to watch, then you will see the live view after that.
11. Referring the image below, clicking the icon circled will enable the switch between mainstream and substream – a way to switch between fluent transmission and clear image.
12. Referring to the image below. Click the icons circled will allow you to do the screenshot, keep the video clips, or close the live view.
13. To replay the old records, click the Playback as follows.
14. Upon clicking Playback, select the start and end time for the recorded video, also remember to select the Dahua device of which you want to replay the video.
Final Words on Dahua iDMSS on iPhone and Dahua gDMSS on Android Phones
Dahua iDMSS and gDMSS allow you to watch and control Dahua IP Camera, XVR, NVR, HDCVI Camera on-the-go. You can enjoy the user-friendliness and robustness that Dahua has brought for you. Dahua iDMSS and gDMSS are just client software, so what you do on the iDMSS and gDMSS will not affect the Dahua CCTV Camera you have installed: recording works on the server-side independently. So, please feel free to try it!
Contributed By CCTV Camera, CCTV Camera Singapore, and Safe Box Singapore
The post How to Use Dahua iDMSS on iPhone & Dahua gDMSS on Android Phone appeared first on CCTV Camera, IP Camera, CCTV Singapore.
Source: https://cctvcamera.com.sg/how-to-use-dahua-idmss-gdmss/
0 notes
Text
Creating a personal VPN
The Razzer is ideal ideal as a personal VPN server. No more censored web as you travel, no more insecure connections from your local cafe WiFi. It’s free and easy. Why would you not do it?
To begin with, this tutorial assumes you’ve already learned about the security issues around installing a VPN. If not, go and do this now! Essentially, you will be opeining up a new port from your local wifi to the internet - a new back door for any hacker to see your network and personal files. Make sure your firewall is well configured and your passwords for your router, network shares and RaspberryPi administrator accounts are highly sophisticated and un-guess-able. What you do here is your choice and I cannot be held responsible for someone finding out your bank account details. Or worse, your secret recipe for gluten free banana loaf bread.
Ok, with that out of the way, it’s all yours.
The first step is to update your RaspberryPi with the latest Linux disto. Details are in an earlier entry.
The second step is to ensure you can access your Pi from outside your private network from the internet. The instructions presented here are not a detailed explanation of this - you will need, for example, a fixed address for you RaspberryPi on your network, a port forwarding capability to this address from your router and either a fixed address for your router on the internet, or one of the free online DNS services (try https://www.noip.com/free).
Step 3:
sudo apt-get install openvpn
Step 4:
sudo -s
Step 5:
cp -r /usr/share/doc/openvpn/examples/easy-rsa/2.0 /etc/openvpn/easy-rsa
Make sure you have spaces in the right places (before /usr and /etc). This instruction copies all of the files from the easy-rsa 2.0 directory into a directory in your openvpn installation.
Step 6:
cd /etc/openvpn/easy-rsa
Step 7:
nano /etc/openvpn/easy-rsa/vars
Step 8:
In the text that opens find the line that begins: export EASY_RSA=
You need to move the cursor down to edit this line to read:
export EASY_RSA="/etc/openvpn/easy-rsa"
Step 9:
Next move your cursor down until you see the line: export KEY_SIZE=1024
This line can be left as is, but if you are extra paranoid and have time to make a coffee, then change 1024 to 2048.
Step 10:
Keep scrolling to the end of the file and you will see a bunch of export parameters such as Country, Province and City etc. You can choose to change these to set new defaults (this will potentially save you some typing in various later stages), but doing so will not affect the workings of your VPN.
Type CTRL and X then Y then ENTER to save this file.
Step 11:
Build the certificates your VPN will use to grant authority to devices you want to connect with. Open the easy-rsa directory with the command prompt type:
cd /etc/openvpn/easy-rsa
Next type:
source ./vars
./clean-all
./build-ca
This final line builds your certificate authority. The Raspberry Pi will now ask you to complete some additional export values, like Country, Province, City, Organisation etc. (if you changed these in the previous stage you will see your own choices already set as default).
Step 12: Name the server
./build-key-server [ServerName]
… replacing [ServerName] with your choice of name. Call it whatever you like but do not forget it.
You will now be given some more fields to enter values. You can change these or leave them as the defaults, but pay attention to three fields:
Common Name MUST be the server name you picked.
A challenge password? MUST be left blank.
Sign the certificate? [y/n] Obviously, you must type "y."
Finally when prompted with the question:
1 out of 1 certificate requests certified, commit? [y/n]
Type "y"
Your server is now set up and you need to build keys for all the devices you want to be able to connect.
Step 13:
To assign a user a key type:
./build-key-pass [UserName]
… substituting the [UserName] with your desired text - for example to make a key to connect my android to the VPN I chose the name KateAndroid
You will get some more prompts now:
Enter PEM pass phrase
… choose a password you will remember! It asks you to input this twice to eliminate errors.
A challenge password? MUST be left blank.
Sign the certificate? [y/n]
Hit "y"
Step 14:
Type
cd keys
then (using my example username, which you should change for your own):
openssl rsa -in KateAndroid.key -des3 -out KateAndroid.3des.key
This last line adds an extra layer of encryption to make it harder for hackers to break in.
You will be asked to enter pass phrase for KateAndroid.key - this is the phrase you entered in the previous step.
You will then be asked to enter and repeat a new PEM pass phrase for the des3 key. I used the same pass phrase for both so you only have one to remember. You will need the 3des.key pass phrase at the end of this process when you import your files to your devices.
Repeat these steps for all the usernames you want to build a key for.
You have now created your "client certificates".
Step 15: Generate the Diffie-Hellman key exchange:
This is the code that lets two entities with no prior knowledge of one another share secret keys over a public server. Type:
Type:
cd ..
./build-dh
This is where you go and make a coffee. And feed the dog. Then clean out the chicken coop. Have a hair cut. Book a holiday. Call that long lost Aunt you’ve been meaning to speak with. Make another coffee.
Step 16: Denial of Service (DoS) attack protection
OpenVPN protects against this kind of attack by generating a static pre-shared hash-based message authentication code (HMAC) key. This means the server will not try to authenticate an access request if it does not detect this key. To generate the static HMAC key type:
openvpn --genkey --secret keys/ta.key
Step 17
nano /etc/openvpn/server.conf
This opens an empty file. Fill it with this text, taking care to change the details where indicated with a comment in # CAPS LOCK. (Placing a "#" in front of a sentence in the code like this tells the system it is a comment and to ignore it when building the program). Also when changing the YOUR SERVER NAME sections I refer to the server name that was given to the 'build-key-server' command earlier on.
local 192.168.2.0 # SWAP THIS NUMBER WITH YOUR RASPBERRY PI IP ADDRESS
dev tun
proto udp
port 1194
ca /etc/openvpn/easy-rsa/keys/ca.crt
cert /etc/openvpn/easy-rsa/keys/XX.crt # SWAP XX WITH YOUR SERVER NAME
key /etc/openvpn/easy-rsa/keys/XX.key # SWAP XX WITH YOUR SERVER NAME
dh /etc/openvpn/easy-rsa/keys/dh1024.pem # IF YOU CHANGED YOUR ENCRYPTION TO 2048, CHANGE THAT HERE
server 10.8.0.0 255.255.255.0
# server and remote endpoints
ifconfig 10.8.0.1 10.8.0.2
# Add route to Client routing table for the OpenVPN Server
push "route 10.8.0.1 255.255.255.255"
# Add route to Client routing table for the OpenVPN Subnet
push "route 10.8.0.0 255.255.255.0"
# your local subnet
push "route 192.168.0.10 255.255.255.0" # SWAP THE IP NUMBER WITH YOUR RASPBERRY PI IP ADDRESS
# Set primary domain name server address to the SOHO Router
# If your router does not do DNS, you can use Google DNS 8.8.8.8
push "dhcp-option DNS 192.168.0.1" # THIS SHOULD ALREADY MATCH YOUR OWN ROUTER ADDRESS AND SHOULD NOT NEED TO BE CHANGED
# Override the Client default gateway by using 0.0.0.0/1 and
# 128.0.0.0/1 rather than 0.0.0.0/0. This has the benefit of
# overriding but not wiping out the original default gateway.
push "redirect-gateway def1"
client-to-client
duplicate-cn
keepalive 10 120
tls-auth /etc/openvpn/easy-rsa/keys/ta.key 0
cipher AES-128-CBC
comp-lzo
user nobody
group nogroup
persist-key
persist-tun
status /var/log/openvpn-status.log 20
log /var/log/openvpn.log
verb 1
Hit CTRL and X then Y and ENTER to save.
Step 17
There is one last edit to make in the server configuration files to make sure your Raspberry Pi knows you want it to forward Internet traffic through our new network.
Type:
nano /etc/sysctl.conf
Near the top it says, "Uncomment the next line to enable packet forwarding for IPv4."
Uncomment this line by removing the hash at the beginning.
Hit CTRL and X, then Y and ENTER to save.
Step 18
Finally you need to action the change you just made in the sysctl.conf file. To do this type:
sysctl -p
You have now made a functioning server that can access the internet.
Step 19 Pass through the firewall
Raspbian has a built-in firewall that will block incoming connections, so we need to tell it to allow traffic from OpenVPN to pass through.
To create a file that will run each time you start up your Raspberry Pi issuing this permission type:
nano /etc/firewall-openvpn-rules.sh
Inside this new file type:
#!/bin/sh
iptables -t nat -A POSTROUTING -s 10.8.0.0/24 -o eth0 -j SNAT --to-source 192.168.0.10
# SWAP THE IP NUMBER WITH YOUR RASPBERRY PI IP ADDRESS
CTRL and X then Y and ENTER to save.
Newly created files are not executable by default, so we will need to change the permissions and ownership of this file you just created. To do this type:
chmod 700 /etc/firewall-openvpn-rules.sh
then:
chown root /etc/firewall-openvpn-rules.sh
This script gives OpenVPN permission to breach the firewall.
Step 20
Now need to add it into the interfaces setup code so it runs on boot. Type:
nano /etc/network/interfaces
Find the line that says: "iface eth0 inet static." We want to add a line below the list of numbers that follow it. This line needs to be added at an indent so hit TAB first:
pre-up /etc/firewall-openvpn-rules.sh
CTRL and X then Y and ENTER to save.
Finally, reboot your Raspberry Pi by typing:
Reboot
Step 21: Create profile scripts for the devices you want to connect
We have created keys for clients (computers and devices) to use to connect to your VPN, but we have not told the clients where to find the server, how to connect, or which key to use.
If you created several different client keys for each of the devices you want to grant access, it would be a lot of trouble to generate a new configuration file for each client from scratch.
Luckily Eric Jodoin of the SANS institute has written a script to generate them automatically.
First type:
sudo nano /etc/openvpn/easy-rsa/keys/Default.txt
Fill in the blank text file with the following:
client
dev tun
proto udp
remote [YOUR PUBLIC IP ADDRESS] 1194 #REPLACE YOUR DYNAMIC DNS VALUE FROM CHANGEIP.COM
resolv-retry infinite
nobind
persist-key
persist-tun
mute-replay-warnings
ns-cert-type server
key-direction 1
cipher AES-128-CBC
comp-lzo
verb 1
mute 20
CTRL and X then Y and ENTER to save.
Step 22: Create the script that makes your profile keys
type:
sudo nano /etc/openvpn/easy-rsa/keys/MakeOVPN.sh
In this file you need to add the text that Jodoin wrote to create the script:
#!/bin/bash
# Default Variable Declarations
DEFAULT="Default.txt"
FILEEXT=".ovpn"
CRT=".crt"
KEY=".3des.key"
CA="ca.crt"
TA="ta.key"
#Ask for a Client name
echo "Please enter an existing Client Name:"
read NAME
#1st Verify that client's Public Key Exists
if [ ! -f $NAME$CRT ]; then
echo "[ERROR]: Client Public Key Certificate not found: $NAME$CRT"
exit
fi
echo "Client's cert found: $NAME$CR"
#Then, verify that there is a private key for that client
if [ ! -f $NAME$KEY ]; then
echo "[ERROR]: Client 3des Private Key not found: $NAME$KEY"
exit
fi
echo "Client's Private Key found: $NAME$KEY"
#Confirm the CA public key exists
if [ ! -f $CA ]; then
echo "[ERROR]: CA Public Key not found: $CA"
exit
fi
echo "CA public Key found: $CA"
#Confirm the tls-auth ta key file exists
if [ ! -f $TA ]; then
echo "[ERROR]: tls-auth Key not found: $TA"
exit
fi
echo "tls-auth Private Key found: $TA"
#Ready to make a new .opvn file - Start by populating with the default file
cat $DEFAULT > $NAME$FILEEXT
#Now, append the CA Public Cert
echo "<ca>" >> $NAME$FILEEXT
cat $CA >> $NAME$FILEEXT
echo "</ca>" >> $NAME$FILEEXT
#Next append the client Public Cert
echo "<cert>" >> $NAME$FILEEXT
cat $NAME$CRT | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' >> $NAME$FILEEXT
echo "</cert>" >> $NAME$FILEEXT
#Then, append the client Private Key
echo "<key>" >> $NAME$FILEEXT
cat $NAME$KEY >> $NAME$FILEEXT
echo "</key>" >> $NAME$FILEEXT
#Finally, append the TA Private Key
echo "<tls-auth>" >> $NAME$FILEEXT
cat $TA >> $NAME$FILEEXT
echo "</tls-auth>" >> $NAME$FILEEXT
echo "Done! $NAME$FILEEXT Successfully Created."
#Script written by Eric Jodoin
\ No newline at end of file
CTRL and X then Y and ENTER to save.
Step 23
Next you need to give this script permission to run. Type:
cd /etc/openvpn/easy-rsa/keys/
NB: If you have issues with CD, try sudo chmod go+rx /etc/openvpn/easy-rsa/keys/ first.
The to give it root privileges type:
chmod 700 MakeOVPN.sh
Finally, execute the script with:
./MakeOVPN.sh
As it runs, it will ask you to input the usernames names of the clients for you generated keys for earlier (in my case KateAndroid). Type that when prompted and you should see the line:
Done! KateAndroid.ovpn Successfully Created.
Repeat this step for each additional username you added client.
Client Software Recommendations:
http://www.wikihow.com/Connect-to-an-OpenVPN-Server
Mac
https://tunnelblick.net/downloads.html
http://accc.uic.edu/answer/how-do-i-configure-and-use-openvpn-macos
Windows PC
Windows Mobile
iOS
0 notes