Skip to main content

How to use phone as Webcam

In this step-by-step tutorial,  you will learn how to use your iPhone or Android phone as a webcam for your Windows, Mac, or Linux PC or laptop. For this to work, you need to install an application on your PC and mobile device.
The app we will use is called the Iriun app.
The application we are going to use allows you to use your phone's camera as a wireless webcam in your PC or Mac.
This app is available on windows, Linux, mac, android and iPhone.
You can install the iriun app on your PC from www.iriun.com and on your mobile device via the App Store or the PlayStore by searching for Iriun.

Installation on Ubuntu
The app is available as a .deb package on Ubuntu Linux and works on ubuntu 18.04 and later.
The iriun app can be installed with the following steps.
Download the .deb package from the website at www.iriun.com.
After a successful download, open your terminal using Ctrl Alt T or form the applications menu.
Type in the following command:
sudo dpkg -i /path/to/deb/file
Replace the section after -i with the location path where your downloaded deb package was downloaded to. For example:
sudo dpkg -i /home/irene/Downloads/Programs/iriunwebcam.deb
press enter on your keyboard for installation to begin.
Afterwards, type in this command in your terminal.
sudo apt-get install -f
Why use sudo apt-get install -f after sudo dpkg -i /path/to/deb/file?
From man apt-get
-f, --fix-broken
     Fix; attempt to correct a system with broken dependencies in place.
The reason for running this second command is because when dpkg installs a package and the package dependency is not satisfied, it leaves the package in an "unconfigured" state and that package is considered broken.
The sudo apt-get install -f command tries to fix this broken package by installing the missing dependency.

The following window will appear. Press Tab to select Yes and hit enter on your keyboard.
 

Comments

Popular posts from this blog

Fun Terminal Commands Every Linux User Should Try

Accessing Maps from the terminal with MapSCII Requirements Telnet installed Internet Connection Firewall is disabled You can do this on Linux, Unix, Mac OS X or Windows with an app like PuTTY or the Windows 10 Linux bash shell or any Os that supports telnet. Open terminal and write the command below. telnet mapscii.me Hit enter and you're ready to browse and enjoy MapSCII. Navigate using the keyboard or mouse. Use the following keys on your keyboard Arrow keys: up, down, right, left A to zoom in Z to zoom out C toggles ASCII mode on/off You can also click and drag and hold on the map with your cursor. If your connection dropped without a reason, reconnect with telnet -E mapscii.me and use only cursors, A and Z to navigate. The Mapscii project is open source and you can install it locally if you'd like. Check out their project here on GitHub . The Dancing ASCII Party Parrot Requirements Curl installed Internet

SQL for Data Analysis - Udacity

  Entity Relationship Diagrams An  entity relationship diagram  (ERD) is a common way to view data in a database. Below is the ERD for the database we will use from Parch & Posey. These diagrams help you visualize the data you are analyzing including: The names of the tables. The columns in each table. The way the tables work together. You can think of each of the boxes below as a spreadsheet. What to Notice In the Parch & Posey database there are five tables (essentially 5 spreadsheets): web_events accounts orders sales_reps region You can think of each of these tables as an individual spreadsheet. Then the columns in each spreadsheet are listed below the table name. For example, the  region  table has two columns:  id  and  name . Alternatively the  web_events  table has four columns. The "crow's foot" that connects the tables together shows us how the columns in one table relate to the columns in another table. In this first lesson, you will be learning the bas

Impressive - Check if Your Email Address Has Been Hacked - Free,Easy Tutorial

haveibeenpwned.com Data breaches are rampant and many people don't appreciate the scale or frequency with which they occur. A "breach" is an incident where data is inadvertently exposed in a vulnerable system, usually due to insufficient access controls or security weaknesses in the software. How is the legitimacy of a data breach established? Attackers often give "breach" announcements, which are later revealed to be hoaxes. There is a delicate balance to be struck between making data searchable as soon as possible and conducting proper due diligence to confirm the breach's validity. In order to verify the authenticity of a violation, the following steps are normally taken: Has the affected provider made a public statement about the security breach? Does the information stolen in the breach show up in a Google search (i.e., it was simply copied from another source)? Is the structure of the data consistent with what you'd expect to see in a breach? Have