Tag Archives: key hunter

The betrayal is online

tradimenti-latina-divorzi-4897446

A research has focused on meeting situations and betrayal. In particular, it was asked to a large group of singles which are the most appropriate places to meet new people: internet is second only to the friends in common and before respect to another great myth, the work place. The confidence in internet is higher among males, which compared to the fairer sex seem more comfortable with the tools provided by the network.

A lot of single women surveyed have set their first date with a man, known on the internet, even in their cars. Despite this, 61.3% of online adventurers are men, 96.2% the men takes the contacts and as much as 20% of the relationships was born in online.

According to one of the major opinion companies of Germany, already in 2012, the internet was in third place among the main places to meet, preceded only by work place and friends in common. So we can say that arise most marital relationships in dating sites on the internet that in bars and hangouts. Of the approximately 4,000 enrolled in dating sites, 26% have found a stable or casual partner.

So internet is also the favorite place for those seeking an adventure, for those who want to get away from the routine bed. And for this, they are spreading the tiny devices that allow you to find out what the partner is doing with the PC. Capturing passwords and discovering infidelity is very simple with key loggers and key hunters proposed by Endoacustica Europe. And if the relationship become telephonic? In this case runs in our help the spy software that allows you to listen in real time the calls, controlling text messages and much more. So even online traitors will have to contend with the Endoacustica Europe’s technology.

Advertisements

Rachel: history of cyberbullying

cyberbullyRachel’s mother had tried to take off her cell phone. She had also closed her Facebook profile and had changed her school. She understood that there was something wrong. But she had no idea that her daughter, a girl of 12 years old, had become the target of a group of cyberbullies. She couldn’t imagine that every day on her pc arrived terrible messages; the kindest was “You must die”.

So when Rachel decided to don’t go out more from the house and don’t open her mouth, her parents didn’t know what to do. Surfing the web and reading the comments of other parents about similar stories, they realized that it could be cyberbullying. They searched for a solution. They found it, answering to the technology with technology. They contacted Endoacustica Europe, leader company in security and surveillance field, and they bought small tools that, connected to the pc, have allowed them to discover everything that was happening, passwords, typed text, chat…What Rachel’s parents were found blackmail, harassment, photos stolen and then made ​​public, insults and hatespeech, anonymous message that no one can trace.

These phenomena to date have concerned mostly United States and UK. But it also happens in every part in the world. A few days ago a group of boys in Bologna (Italy) used the social network Ask.fm to organize a mega fight. Through the same social, Hannah, a teenager from Leicestershire, received hundreds of messages every day in which she was invited to commit suicide. Hannah hanged herself in the bathroom, while the parents were down in the living room. She was a member of Ask.fm because she wanted to be popular. Then she said no to a boy and the trolls, the provocateurs of the network, became crazies. “Why do not you drink bleach so you die?”. They wrote. And for Hannah they weren’t just words.

The buttons for the reporting of abuses introduced by Ask.fm and by Twitter, after the controversy in the newspapers,  aren’t useful . And also are useless petitions, such as the one carried out by the father of Hannah who asked the Ask.fm closure. If you close it, tomorrow is born another. And you can not even pretend to delegate the safety of adolescents with policies of enrollment. So parents have just a road. Be careful. Check what happens when the kids are using the PC or smartphone and other devices. There are tools to enhance the safety of their children and they are also very reliable.

One in three people spying on partner’s emails

spiarepcpartnerFailure log-out, weak passwords, but above all small monitoring tools. This is what facilitates the control of e-mail of the partner. According to a Google search, carried out on a sample of 2,000 people, one in three people have peeked at least once in the e-mail of the partner. Mail, documents and informations are often under the magnifying glass of partners suspicious.

The lack of password security is one of the “help” to get access to the partner’s cyber world. It appears that 10% of users choose the name of his dog or cat for password, while 8% use the word “password”. 6% of people leave the password pinned on a post-it next to the PC, 13% claim to be entered in an account of others, guessing the password, taking advantage of the failure to log out from a session or with monitoring tools. Among these, a third (33%) entered into the partner’s, mostly men, and almost one-fifth that of ex (17%), mainly women. One in ten has, however, tried to guess the password of a work colleague.

11% say that they use a significant date as password, such as wedding anniversary, while 11% use the date of birth of a close relative. 62% change the password only when it becomes necessary, only 24% do it regularly, while 16% say they always use the same password.

Generally, women are more inclined to share their password with partners. More than half of respondents write their passwords somewhere: a diary, a file on the PC, the phone, a post-it.

If all this doesn’t happen, no fear. The partners more smart bought small devices such as key hunters and key records that, in discreet manner, allow you to monitor everything that is typed on the PC keyboard, including passwords and email.

Often who decide to control the partner, already has a strong motivation to do it: suspicion of betrayal or some unclear affair. So it becomes strictly necessary to check out some doubt and uncertainties, better do it with reliable tools.

13-year-old victim beaten outside school for stealing the boyfriend of a peer

bullismo_2Someone claims that it’s better that teenagers are in total freedom of thought and action, others emphasize strong controls. As often happens, the truth lies in the middle. If it’s true that the identity creation requires autonomy, is also true that “some advices” are necessary.

In recent years, most of the relationships between the teenagers happens via internet and social networks, so it’s necessary to control the use of the pc. It would be optimal to monitor the behaviors of their sons “at distance”, so to know what they do and who they interact with, without they know it, leaving them free to express themselves, but away from dangers. Very used tools are key logger or key hunter, small devices by Endoacustica, that allow you to know every detail typed on the computer keyboard.

With the use of this type of tools, many “accidents” would have been avoided. Few weeks ago it appears the news of a young girl violently beaten out of school for having “stolen the boyfriend” of a peer. The incident occurred near to the school and wasn’t unexpected by the victim. Months of threats and harassments via Facebook led to the beating of the adolescent.

Before the aggression, three girls, two thirteen and one fifteen, have snatched the phone to the victim with whom they have sent a text message to her mother to tell her to don’t pick her up from the school. Then, the thirteen year old was dragged into a nearby car park, thrown to the ground, kicked and punched. To save her, the father of another pupil, that has stopped the beating. The girl was brought over to the ER and parents have complained.

Probably take preventive action is the best form of justice that we can be expected.

Web threats

bambini-pc

The web is one of the primary sources of knowledge especially for young people and teenagers. Unfortunately, the same is also a large container of violent images and hard contents that children often meet while surfing.

On this subject has intervened the Safer Internet Programme of the European Commission, who wanted to give voice directly to the young people with regard to the dangers of the web. From what results, Italians are more frightened by the violence that circulates in the network. In fact, among the dangers of the web, they have put in the first place this kind of contents, while European peers have placed the porn in top of the list.

To answer the question “What things on the internet could annoy your peers?” were approximately 25,000 children between 9-16 years from 25 different European countries.

44% of the Italian respondents think that, on the internet, are present contents that upset their peers. 27% gives top priority to violent content (18% of the EU average), 21% pornographic ones (22 percent of the EU average), and 10% other potentially dangerous contents. To convey this material are especially video sites. While social networks, particularly Facebook, are associated, as we have seen numerous times, to behavior risks (such as bullying) or contact (priming). Fear is the prevailing sentiment among children aged 9 and 10 years, while the boys of 11 and 12 years show more often revulsion and annoyance.

Starting from these results we heard Lucy, a mother who told us about her personal experience with his 12 year old son. “Henry is a guy very sunny and helpful. Use, like all his peers, the pc mainly for study and recreation for about an hour a day, a little more during the weekend. One night I heard some moaning in sleep by my son. I stood up and I realized that I was very upset and cried. I woke him up from the nightmare and he, evidently frightened, calmed down after a few minutes. This episode was repeated for about 6 days, but I couldn’t explain the reason. He told me that he always dreamed of being chased, just as he had seen in a video shown by a older friend. I didn’t want to betray the trust towards him, but I had to understand. I bought from the site www.endoacustica.com a key hunter which allowed me to know every detail of the chat with this guy. I realized that he was using these videos with the intention to scare Henry and there was nothing funny. It seemed to me just a principle of bullying. I contacted the boy’s parents who were very helpful in taking action. In a few days the situation returned to normal and Henry found peaceful dreams”.