Skip to main content

G318 Wireless Camera Detector

G318 Anti Wireless Camera Detector Gps Rf Mobile Phone Signal Detector Device Tracer Finder.

G318 Wireless camera detector.

Features

  1. Detects wireless bugs or location tracking.
  2. Check whether there is the base station radiation around your working environment and residential buildings.
  3. Check whether there is a suspicious wireless signals in the environment.
  4. Detect hidden camera in bathroom, hotel, locker room, changing room etc.

Specification

Frequency Range : 1MHz-8000MHz
Detecting the dynamic range: <73Db
Detection sensitivity: ≤0.03mw (main frequency)

Detect range:
2.4GHz wireless camera: 15㎡ (standard 10mW camera)
1.2GHz wireless camera: 10 ㎡ (standard 10mW camera)
Moblie: 2G,3G,4G: 10 ㎡

Indicating : 9 level LED Luminous instructions/modulation sound instructions
Power : built-in 3.7 V800mAH lithium polymer battery
Working current : 60mA 
Working time : 10-15 hours
Material: aluminum alloy     
Weight:160g
Volume : 102x52.5x21.5mm

Package contains

1 X Signal Detector
1 X Use Manual
1 x Power adapter (US/EU)

Reviews

I highly recommend this product for you. G318 camera detector is not made of cheap plastics. It really works well as an anti spy gadget.

G318 camera detector reviews

5 star from User 1
Very sensitive
"Works well."

5 star from electronicsnmore
Well made detector!
"Not made of cheap plastics and does an excellent job of detecting radio waves."

Comments

Popular posts from this blog

Must Read This Before Renting

Please buy spy camera detector before renting any room or house. Please use it before going into any rented room or house.  Did I say please?
It's for your own good in privacy matters. You should read this recent article related to privacy issues.
Man arrested for allegedly filming tenants in bathroom with hidden camera A 38-year-old Jackson man spent the weekend in jail after police said they found a hidden camera in the bathroom of an apartment he manages.
"There were multiple videos of several different victims in a nude state,” said Jackson Police Lt. Roger Schultz.
The victims called police on Riley Sills after Sills sent them a picture of one of his tenants in the bathroom.
He threatened to send the photo to police, claiming he had caught one of them snorting drugs in his house.
Jackson police received a search warrant and found a hidden camera in the bathroom, disguised as a digital clock.
"The pin hole lens was almost invisible,” Schultz said. The camera mostly …

Tutorial How to Install IP Camera

Before you start installing your own IP camera, you need the right tools to do it. Another important thing you need to know is the location you want to put your IP camera. You may need  to buy some or all of the item in the list to install IP camera.
9 items to install IP Camera 1) IP Camera Of course you need IP camera to install IP camera.
2) RJ45 Cable You can use cable Cat 5 or Cat 5e or Cat 6.
3) Cable connector If you need to cut RJ45 cable, you need cable connector to connect it back with the cable.
4) EZ RJ45 Crimper You need this tool if you want to cut and connect the RJ45 cable.

5) Network LAN Hub Adapter If you have more than one IP camera, you shall use this to connect it to your computer.

6) Desktop computer
You need a desktop computer with internet connection so you can download the software to install IP camera.

7) Pencil Use it to mark on the wall, ceiling or any place you need to make hole on it.
8) Impact drill Be careful with this thing. Try to avoid using it unless you hav…

Identity Theft and Invasion of Privacy

What is spy? Spy is secretly obtaining information about certain individuals, groups, countries or any organization. Identity Theft or Invasion of Privacy? Spying could be both. Even stolen credit card information can be used to alter an individual's identity. Skip this part if you don't have a credit card.
How they steal your identity from your credit card? Firstly, they might use the credit card information to run up huge bills, forcing the credit card firms to suffer large losses or they might sell the information to other who is interested to do the same thing. Secondly, they might create new identities. For example, a criminal might contact the issuing bank of a stolen credit card and change the mailing address on the account.
Next, the criminal may get a passport or drivers license with his own picture but with the victim's name. With a driver's license, the criminal can easily acquire a new Social Security card. It is then possible to open bank accounts and rece…