Skip to main content

废物利用--旧手机远程监控系统


话说,这手机是一年一换,家里堆了一堆不用的旧安猪手机。
周末闲着无聊,绞尽稀糊糊的脑汁,揪掉了一把头发,终于把旧手机“改装”成无线闭
路监视系统,分别监控前后院,无论走到哪里都能瞟一眼前后院的动静。

首先到 Market 上下载 Ip Webcam for Android, 装到旧手机里。
打开程序,稍稍配置一下,什么 图片大小阿。。。就可以了。
无线 Webcam 就搞定了。

监控软件当然是要装手机上了,去Market 下载 tinyCam Monitor Free
,里面除了支持各种 wireless IP Cam, 也支持 Ip Webcam for Android.
添加新的 Webcam, 类型选 IP Webcam, 然后设置好 webcam 的地址和端口就可以用
了,打开 tinyCam 就可以看到前后院的动静了。

到这里为止,tinyCam Monitor 和 IP webCam 都是连接在家里的无线网络上的,用处
也就是躺在自家床上,看看前后院的动静,要想远程监控,还得想想办法,再掉几根头
发。 很显然,想要远程监控,需要设置自己的 VPN,
在家用公司的VPN Working from home, 在公司就要用自己的VPN Monitoring from
Office. 

Android 手机,基本上都有自带的 PPTP VPN Client, 很容易就能连上家里的 PPTP
Server, 连上了,就可以打开 tinyCam, 在公司看自己前后院了。

要是嫌PPTP安全性不够,可以用openvpn, Market 上有 OpenVPN for Android, 可以
连上家里的 OpenVPN Server, 不过设置Client,Server 有些小复杂。 

PPTP Server, OpenVPN Server 都运行在当年跟风买的老神由 RT-N16, 也算老树发新
芽,焕发第二春了。

最后,有图有真相,上几张手机截图。

Comments


  1. 装VPN 是为了从别的WIFI或者手机网络连接到家里的私人网络。要是不用VPN,楼上有
    人提了,可以用port forwarding。人在外面是不能直接练到家里的 WIFI的。

    ReplyDelete

Post a Comment

https://gengwg.blogspot.com/

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...