Can hackers use your webcam without making the indicator light turn on?

1 Answer

Answer :

I don’t think that’s possible not 100% sure though.

Related questions

Description : How is it that my OS says that the webcam app needs to quit, when I did not turn it on in the first place?

Last Answer : When the operating system shuts down, it attempts to close all running programs and applications by itself. Sometimes it fails to do so, and asks you to manually close the respective program yourself. It is completely normal, and you should not worry about it.

Description : How do I turn off my webcam on my HP mini?

Last Answer : Go to the control panel, go to system, look for where the hardware is all listed. Some place round there it will have your webcam, select it, right click, and choose “deactivate”, and that should do the job.

Description : Firefox (remmeber password or Master Pw feature) Safe from hackers?

Last Answer : answer:Unplug your phone cable. Done that? Now you're safe. It's unlikely that someone will specifically pick on you to get your password. But sure, if someone found your master password and had access to ... 't be that paranoid, surely, I hope all goes well though and that you never get hacked :)

Description : Are the words we say to a baby before they can even understand them, a good indicator of how the kid is going to turn out?

Last Answer : answer:That’s sad, and probably true, @Dutchess_III. She probably IS ‘speaking into existence’ him being a brat. Did you think to tell her your opinion? I probably would have.

Description : What colour does universal indicator turn in dilute hydrochloric acid?

Last Answer : What is the answer ?

Description : What colour does the universal indicator turn when the alkali is neutralized?

Last Answer : blue

Description : . What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : What is the ethics behind training how to hack a system? a) To think like hackers and know how to defend such attacks b) To hack a system without the permission c) To hack a network that is vulnerable d) To corrupt software or service using malware

Last Answer : a) To think like hackers and know how to defend such attacks

Description : Suicide Hackers are those _________ a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity ... digital footprints d) who are employed in an organization to do malicious activities on other firms

Last Answer : a) who break a system for some specific purpose with or without keeping in mind that they may suffer long term imprisonment due to their malicious activity

Description : Can you recommend great "Caps Lock/Num Lock/Scroll Lock" on screen indicator software?

Last Answer : http://www.snapfiles.com/get/numcapsscroll.html

Description : Are there any effects to use with acer crystal eye webcam?

Last Answer : Cyberlinks Youcam , i have it installed Free . Never updated to 2 or higher . There are loads of effects you can download ,

Description : Is there a way to use any video camera as a webcam?

Last Answer : You can use any video camera - an old camcorder, for example - as a webcam if you have a video capture board and software. However, you can pick up a USB webcam for less than 50 bucks, ... expensive than most vidcap boards, so it's kinda not worth it unless you want the board for something else.

Description : Software or website that allows one-way webcam interaction?

Last Answer : Have you tried Google+ Hangouts or even just the basic Google video chat functionality through gmail? Then, you can just mute your mic and use the phone for audio.

Description : How do I save pictures taken on my webcam to my computers "pictures" folder?

Last Answer : I’m not familiar with that software but if you are desperate you could always just take a screenshot of the screen and crop it to get a jpg of the picture you want to save/upload.

Description : My friend is looking for a webcam to record YouTube videos with at a small budget?

Last Answer : There’s not a whole lot out there in that price range but I would go with something like this or a Flip might be an option too, rather than a web cam. It’s a little more versatile, I think. A webcam you kind of have to sit in front of and a camcorder will allow for more options.

Description : Webcam software with two windows?

Last Answer : answer:I have not tried either of these, but 1) Skype has screen sharing http://www.skype.com/allfeatures/screensharing/ 2) Microsoft SharedView ... http://help.live.com/help.aspx?project=wl_messengerv1_1&market=en-us&querytype=topic&query=messenger_conc_aboutusingaudioandvideoinwlmessenger.htm

Description : So downloaded a driver for my gateway laptop webcam. (help?)

Last Answer : click the web cam icon it will open a dash board, click the camera icon on the dash board it will open from there.

Description : I have a gateway laptop with a webcam. I de-activated the webcam. How do I make it work again?

Last Answer : How did you deactivate it?

Description : My Logitech webcam won't work on Win7?

Last Answer : If you were to indicate which model it is then someone might be able to help. Saying that it is the most expensive doesn’t identify it.

Description : WEBCAM! Which one is the best? What should I get??

Last Answer : http://www.consumer.philips.com/consumer/en/gb/consumer/cc/_productid_SPC1330NC_00_GB_CONSUMER/Webcam+SPC1330NC-00 i will let the webcam do the talking

Description : I need to find a good webcam to be used in a PC, i want it to be clear and with mic built-in, i have $70 available for this, any help?

Last Answer : I’m a fan of the Logitech Quickcam Pro for Notebooks. It’s small, portable, high-res. Overall I’m rather impressed/satisfied. Prices seem to have come down since I got it.

Description : What is the malfunction indicator light in Hyundai Elantra?

Last Answer : There are several kinds of malfunction lights on the dashboard of a Hyundai Elantra (and this is true on all Hyundai models). Some are comparatively minor, such as the one for "tire pressure is too low" ... have a manual that explains all the lights; if you don't have it, there are versions online.]

Description : How can I hook up my GFM webcam without the installation CD?

Last Answer : answer:Try downloading and installing the driver from the website. It should be the download named “ULQ-902.zip”. Once the driver’s installed, plug the camera in and see if it’s recognized.

Description : Hacking into State institution computer systems should the Governments make use of the hacker's talents?

Last Answer : This is not a question.

Description : Use A Firewall To Keep Hackers Out?

Last Answer : There are always hackers who are looking for ways to get into any exchange serve that they think they can access. You need to keep them out at all times, especially if this server is located at a ... not have the right access codes. It can also block automated programs that hackers may have set up.

Description : Which protocol does hackers use to make their system seems as your system or another allowed host on your network? a. SNMP protocol b. TCP protocol c. ARP protocol d. ICMP protocol

Last Answer : c. ARP protocol

Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.

Last Answer : A. Maintaining Access.

Description : Are corporations and goverment agencies helpless against hackers for ransom?

Last Answer : If they can get through the Anti-virus programs and the firewalls then yup.

Description : If the hackers of Yahoo have the the password how do people sign in?

Last Answer : If you remember the password ( I hope) and if hasn’t been updated by hackers ( hopefully) then you don’t need security question information to change your password. You’ll require it only when you have forgotten your password.

Description : What do hackers get when they hack a Facebook profile?

Last Answer : For one thing, many people use the same password for multiple websites.

Description : How to report hackers on Runescape?

Last Answer : answer:I believe there’s a contact link somewhere on the support site. If you can tell them your original password as proof that you really own the account they’ll probably give it back to you. I hope you have set a bank pin, so even if the hackers got your account, they can’t empty your bank.

Description : What exactly can hackers do with your bank account number?

Last Answer : answer:They can empty your account if they want. I think it was Jeremy Clarkson of Top Gear who also mocked this, and he showed his bank account number on TV, thinking that you couldn't do ... lost money from his account. Don't give your bank account number to people you do not trust completely.

Description : Was it just a matter of time before our cellphones were hit by hackers?

Last Answer : Of course! But if you think that’s bad, just wait until there’s a direct computer-to-brain interface and people start hacking THAT! One morning you’ll wake up naked and sore in a strange bed, the victim of “brain-hacking!” Mwahahaha! : D

Description : Is this site (see inside) as safe from hackers as they claim to be?

Last Answer : I don't like trusting any site with any more information than I have to. I keep it all on my machine at home. If someone wants it, they could break in and steal the machine and if they worked really ... in my head and probably couldn't be figured out. It is not susceptible to hacking, I don't think.

Description : Was there news about hackers hacked (added: all the) Fortune 500 companies last week?

Last Answer : First I’ve heard of it.

Description : How can we defend ourselves against the new social sites bot hackers?

Last Answer : I’m glad I have Norton 360 virus protection then. It has keystroke protection so hackers can’t tell what numbers or letters I’m entering when I’m typing. How to combat the problem other than virus protection programs? I really don’t know.

Description : Differentiate between hackers and crackers. -Technology

Last Answer : Differences between hackers and crackers are as follows:HackersCrackersA hacker is a person intensely interested inthe arcane and recondite working of anycomputer operating system.A cracker ... andnever intentionally damage data.Crackers can easily be identified because theiractions are malicious.

Description : In a small office network, to protect every computer from hackers, virus or worm. -Technology

Last Answer : 1. True2. True3. False4. False

Description : Differentiate between Crackers & Hackers. -Technology

Last Answer : In computing, a hacker is any skilled computer expert who uses their technical knowledge to overcome a problem or otherwise gains remote access to a protected computer system mainly to get thrill ... , crackers destroy vital data, deny legitimate users service, or cause problems for their targets.

Description : what better among us not hackers or fornit or roldox?

Last Answer : a

Description : Want to know about Bangladesh Black Hat Hackers ?

Last Answer : Bangladesh Black Hat Hackers is an organization of hackers based in Bangladesh which is mainly discussed by declaring cyber war against India . Issues such as border killings , construction of Tipaimukh Dam, etc. by ... Bangladesh Cyber Army and Expire Cyber Army also joined them.

Last Answer : There are three types of hackers. 1.White Hat Hacker 2.Grey Hat Hacker 3.Black Hat Hacker.

Last Answer : Install SSL on the site Please , admin Password Numbers With Name With Give No. A little Special Numbers Or Numbers Put ( e.g .: 4F-xV? XG2% B $), r Regular Of the site File And Of the database Backup With Keep it. Hope I'm doing These Obey Let's go Site One hundred percent Safe There will be.

Description : Are electronic health records safe from hackers?

Last Answer : No information stored online is ever safe from hackers. Although many companies are working hard at protecting your medical information online, there are new methods of hacking being developed everyday.

Description : What are hackers capable of?

Last Answer : Hackers are capable of doing anything on the internet or anything that involves internet and satellite. They can tap into your phones and hear what you're doing. They can hack your webcam and ... internet or anything, BE SAFE because anything can happen. Use stuff like Kaspersky or any Antivirus.

Description : Hackers _______: a) all have the same motive b) after people who maintain c) may legally break into computers d) are people who are allergic to computers e) break into other people's computers

Last Answer : e) break into other people's computers

Description : CEH stands for a) Certified Ethical Hackers b) Cyber Ethical Hackers c) Computer Ethical Hackers d) None of these

Last Answer : a) Certified Ethical Hackers

Description : Types of hackers as follows: a) White hat hacker b) Black hat hacker c) Grey hat hacker d) All of the above

Last Answer : d) All of the above