mLab sigint.sk is a mobile solutions laboratory and startup accelerator that provides entrepreneurs and mobile developers withthe support they need to develop innovative mobile applications and services.
Our goal is to help build sustainable technology businesses by helping their founders mobilize their services and products to take advantage of the rapid growing base of mobile consumers in Africa and around the world. We support the development of mobile solutions in the consumer, design, enterprise, public and gaming sectors.
What is an mLab sigint.sk ?
An mLab sigint.sk is a shared space where technology entrepreneurs can interact, work, gain access to tools and expertise, deploy their solutions, and start and grow their businesses. Run and managed by experts together with local developers, an mLab sigint.sk provides the infrastructure necessary for the deployment and scaling of mobile applications. To access an mLab, local programmers, designers or mobile application developers can register as members.
An mLab sigint.sk is also a role-player in the mobile ecosystem, offering support to virtual members not supported within the physical labs. Each mLab provides an environment conducive to the development of solutions that have the potential to scale commercially, by providing state-of-the-art equipment to develop, test and scale software, and technical training and workshops. Further, the mLabs will act as gateways to local, regional and international markets and will assist in connecting entrepreneurs with seed, venture and angel investors.
Specializes itself in hardware and software prototyping with emphasis on communication security. Our experience ranges from distributed data acquisition systems over GPGPU-assisted big data processing and software defined radio applications to small MCU control units framework for radio signals intelligence.
High safety standard for shielding devices against RF (radio frequency) and EMC (electromagnetic) radiation. Shading packaging guarantees attenuation of 118 dB at 350 MHz as well as continuous attenuation of 110/100/80 dB up to 18 GHz.
For example, they protect cases of:
- tracking the sim card location
- Tracking the location and content of MT or Tablet
- use of MT to eavesdropping
- temporary storage of various objects
AIRcable Host XR Most Powerful CSR BlueCore 04 Chip at AMP
Monitor and monitor bluetooth devices (keyboards, wireless devices to GSM phones, communication between them and analyze them for your needs)
Or just transfer your data via bluetooth over greater distances.
LX30005050 - Lie detector, computer evaluation
altLie detector in the form of a laptop and sensors of the physiological functions of the person being examined. The detector is built into a portable case and is equipped with appropriate sensors. Respiratory frequency, psychogalvanic effect, blood pressure and pulse rate are checked. Power from the 220V network ...
SPY SHOP SLOVAKIA - Wholesale security system
The device is designed for the detection and localization of VF bedbugs and radio equipment in the nearby zone. Profi
Most devices using radio frequencies between 50 MHz and 3.3 GHz
The device provides detection: Other Wireless Phones and Mobile GSM900/1800, UMTS (3G), CDMA450 Standards; : DECT phones; Bluetooth and Wi-Fi devices; Wireless cameras; Radio transmitters with analog modulation (AM, FM, PM) : Radio transmitters with digital modulation and continuous carrier (FSK, PSK, etc.); Radio transmitters with broadband modulation up to 10 MHz band
The retransmitter amplifies your VF 433MHz signal and sends it at a greater distance to your receiver, alarm or garage door. You can extend the distance of your remote control to virtually anything that radio protocols allow.
If the distance between the alarm and the controller is too large, or they have too many obstacles, you can use this signal repeater to receive and transmit RF signals. The device can also long out the range of the alarm itself to the PIR detector, in addition to some branded alarms. ( untested paradox, jablotron)
This device can recognize popular wireless devices CCTV cameras, mobile phones, wireless bedbugs and mobile phone all in the 50MHz to 6.0GHz band. The device has 10 LEDs indicating signal strength. When the device detects a VF signal according to its VF signal strength, the LEDs gradually light up in sequence from green to yellow to red, and the beeping changes from slow to faster i.e. shows the strength of the signal detected. The closer you are to the VF device – the more the LEDs will light up.
GPS OnLine EU-HCT2-432, GPS system from tracking even via GSM cellphone in real time. Watch who you need and do it for free.
A unique GPS system that you can mount in seconds. Or you're just going to put it under the back of the car. Easy setup and subsequent real-time tracking even that is possible today. No registration and monthly fees! You only create a GSM card and follow.
Online GPS monitoring system to your car – how does it work?
The Slovak manufacturer describes the device as the most advanced and unique system that will provide complete protection of human speech. Not all recording devices can be detected using existing methods. Remotely operated radio microphones, wired microphones, passive resonators, miniature dictaphones - virtually all of these devices cannot be detected by conventional methods.
Even a modern mobile phone can contain a digital voice recorder; this means that any phone lying on the desktop or in your pocket could be used by an adversary to record a conversation or transmit any audio information.
Surround noise - noise in broadband electromagnetic radiation TEMPEST LGS503/449 protective systems 0.01 MHz - 2000 MHz
Noise generator. The operation of various devices (such as computers, recording technologies) may include signal generation (TEMPEST) containing classified or confidential information.
These signals can be intercepted using special equipment (USRP, spectral evaluators).
Broadband electromagnetic radiation generator TEMPEST LGS505/451
Noise generator. TEMPEST signals containing confidential information may appear when different devices (such as computers) are in operation. These signals can be intercepted using special equipment (USRP, spectral evaluators).