我的採購

產品

服務

供應商

請輸入包含最少兩個字母或數字的關鍵字。

免責聲明

本網頁的連接可將閣下連往其他網址而閣下承認並同意,香港貿發局及其各聯號公司對連接網址所提供的任何資訊的準確性或有效性,不負任何責任。

連接其他網址並不構成香港貿發局對該等網址或者該等網址所提供的資訊、產品、廣告或其他材料的認可。

Intelligent Security camera Cover
Intelligent Security camera Cover
生產所需時間:
10
深圳市創領達電子有限公司
香港貿發局參展商

深圳市創領達電子有限公司

中國內地廣東省

出口商, 批發商, 製造商

平均回覆時間

1 - 3 日

供應商資料最後更新: 2022年1月12日

2015年6月29日登錄於貿發網

產品屬性
產品型號:
ED-CC28
品牌名稱:
OEM
顏色:
black, blue, green, orange, yellow etc
尺寸:
38 x 15 x 1mm
港口:
Shenzhen
付款方式:
PayPal, T/T, Western Union, etc.
最低訂購數量:
500 piece(s)
是否有包裝:
是否可訂造:
產品狀態:
存貨
材料:
塑膠
描述
  • webcam cover, laptop camera cover,anti hackers cover
  • material:  ABS plastic
  • size: 38 x 15 x 1.5mm
  • colors: PMS colors
  • logo:  printed
How to install?
  • Remove  the camera cover from the paper card
  • Position base over the camera lens then press firmly
  • Once installed,  simply slide to the left to close and to the right to open
  • Security in your hands

The world's thinnest most aesthetic, ergonomic and seamless camera privacy cover. In silver or black! For smartphones, tablets and computers, it does not damage your device in any way. We are focused on developing the most effective ways to protect your privacy, provide security and peace of mind.

What is a Hacker?

A hacker is a person who uses computers to gain unauthorised access to data. Hackers with little technical skills to hackers with advanced technical skills may act for their own benefit or someone else's, working for somebody or/and a cause, looking to benefit them or/and it.

Hackers use cameras to;

Record, analyse, use and share data on who uses certain devices at a given time frame
Record, analyse, use and share data on what one or more people are doing
Record, analyse, use and share data on what is going on and is located in certain places
Record, analyse, use and share data on where valuable objects are located
Record, analyse, use and share data on when and why things are happening
Record, analyse, use and share confidential, secret and top secret documents
Record, analyse, use and share the competition’s business activities, intellectual property and secret projects (Industrial espionage)
Record, use and share personal, financial and business documents
Record, use and share credit card information
Cyber stalk
Cyber blackmail
Record, analyse, use and share observed intimate behaviour, sexual activity and other actions of private nature (Cyber voyeurism)

 

Are you one of those who uses a sticker, tape or a post-it?

There are several drawbacks to using them:

They ruin the look and feel of your device. 
They always have to be removed and replaced.
They do not last very long.
When using them you leave finger marks on your device.
They leave residue on your device you have to clean.

您或許喜歡

確定要取消關注此供應商?