Tag Archives: pc control

“Pink” bullying, the solution of Julia’s parents

If they are victims or perpetrators it’s not important. Parents need to know it. They have the duty as well as the right, to inform themselves. Bullying is more and more at the center of public attention. According to a survey of the Society of Pediatrics, 46% of the kids saw bullying episodes, and more than one in three, 34% of them has suffered it directly or through a friend victim. The news is the emerging female bullying.
“Pink” bullying is less direct, prefers subtle behaviors, even sharper: innuendo, gossip, public ridicule, provocative text messages. The victims are girls with “something less” for bully and her court. It’s a persecutory behavior less evident that usually lasts a long time before being discovered. It’s no coincidence that cyberbullying, spreading on the web, (persecution of the victim through his/her profile on a social network, dissemination of images disparaging or intimate…), doubly interests the girls than their peers, both as victims and as authors. There is also female actions with direct physical aggression, as recently has appeared many times on TV.

The signals that lead to the suspicion that their child is being bullied are already known: isolation, apathy, anger, depression. But these behaviours can really provide the answers? Are not of this opinion, the parents of Julia, 13 year old girl, dismayed before the convocation of the school principal because her daughter would have led repeated abuse against a classmate, Aurora, “guilty” of having asked to take part of the club of friends, led by Julia, who has put in place “evidences of initiation” for Aurora: use her as a slave-girl, force her to eat candy already licked, obligate her to do their homework, force her to lie to teachers and parents…Aurora, destroyed by this situation, confessed everything to the teacher and so began another story that involves families and the school.
In addition to the wonder and the inability to devise punishments, Julia’s parents decided to leave no more escape to the little bully. They installed a spy software on her cell phone with which they can control everything she makes: phone conversations and text messages, environmental listening and monitoring her position real time. They also put under control her online movements through monitoring tools for PC.

These measures are essential alongside to the dialogue and the search for an intimate relationship with the teenagers, often difficult. The interventions are needed both for victims and for the bullies that risk of being given a social label as well as to degenerate over time. But they are even more necessary in the context of prevention and protection of their children.


A warning about teenagers photos sharing. They end up in child pornography sites

pedopornografia-3We have repeatedly stressed the great importance of parental controls on the PC used by their children and the every day news give us ample confirmation.
Everything starts for playing: a mischievous photo of themselves sent to a person of whom you trust, that you know well or for which perhaps you’re in love. From there the picture take a path that teenagers cannot even imagine, and it’s not infrequent to reach dangerous virtual destinations: abuse of minors. The young users don’t have sufficient awareness of the network and its risks. The world data of virtual child pornography are alarming. That’s why making sexting can be very dangerous.

Usually the messages following this process: the girl sends them with a naughty photo. The boy receives them on the phone and forwards them to a friend or this subtracts them to him without his knowledge, or even, once the relationship ends, the ex-boyfriend spreads them purposely on social networks. Already at that point the way to that photo is at risk and the picture protagonist will no longer be able to manage it, to recover it or control it. Sucked from the network, the snapshot becomes viral, it discloses with the speed of a virus, and especially likely to be noticed by experts of child pornography.

The Internet Watch Foundation, a British charity expert in tracking and tracing of pedo-pornographic contents, said that this adolescents mode of sending self-portraits is widespread. The organization has tried to count how many risqué snapshots are taken and spread almost as a game that is collected from hard sites, reporting that the numbers are exorbitant and that the vast majority of hardcore videos and pictures generated by the young are taken from the original location to be published on adult sites. Even innocent shooting now constitute the main source of supply of sites for adults, with psychological, social and emotional damages uncountable for the teenagers. But the teenagers aren’t fully aware.

Needless to say to teenagers that it would be better not to release photos of themselves on the net: already in the first sharing you lose control of the image. In the event, however, it’s a mistake and you want to stop the process of that picture you can contact the police, which control everything that is broadcast on the network, especially protecting minors subject to all kinds of abuse. But it isn’t always enough to remove a photo from the websites and it’s good to know that, once posted on the web, a content may also reside there forever. The only solution may be control in real time from a distance what the kids commit to the computer. By inserting small monitoring tools, invisible to the user and therefore not limiting for those who are using your computer, you can control what is typed or is going to be posted and shared before it’s too late.

Kidnappers gang luring girls through Facebook


A group of people has kidnapped a thirteen year old student. The girl was carried several miles away from home by an adult known via Facebook and affected by sexual disorders. At the unsettling plan was attended by many people, a group organized to lure young girls through social networks.

The episode began in September when the girl has established a friendship through Facebook with a twenty-six years old. He tried to approach the little girl giving her a smartphone and they have also had the opportunity to meet. Then, he thought to the plan, a romantic getaway: just before she enters to the school, he take and carry her away. The absence of the pupil at school is immediately noticed, the didactic direction had already warned the family of frequent absences. Meanwhile, the car of the pair reached a youth hostel. It’s midday, there aren’t places available. According to the initial reports the girl is left alone in the hall and at that point she realizes that she ended up in a dangerous game. She calls home in tears and says: “I’m with a friend known via Facebook, I don’t even know where…”. The investigations intersect, the police goes to the hostel, waits for the arrival of twenty-six, arrest him and rescues the victim.

The happy ending story isn’t the result of a madness morning, but the exploits of a person with pedophile inclinations and a 23 year old woman, accomplice involved in the kidnapping of thirteen. We wait the interrogation of other people. But now the case is clear: the kidnapping was the work of several people and had a sexual motive.

The prosecutor, meanwhile, has acquired the computer and the smartphone of the student. There are traces of other contacts in the course of this, thankfully short, nightmare. And they are just the devices closer to the teenagers who should be kept under control as do many parents. With the small devices for PC control and invisible software for smartphones you can protect the children and teenagers, acting before the situation gets out of hand.

Rachel: history of cyberbullying

cyberbullyRachel’s mother had tried to take off her cell phone. She had also closed her Facebook profile and had changed her school. She understood that there was something wrong. But she had no idea that her daughter, a girl of 12 years old, had become the target of a group of cyberbullies. She couldn’t imagine that every day on her pc arrived terrible messages; the kindest was “You must die”.

So when Rachel decided to don’t go out more from the house and don’t open her mouth, her parents didn’t know what to do. Surfing the web and reading the comments of other parents about similar stories, they realized that it could be cyberbullying. They searched for a solution. They found it, answering to the technology with technology. They contacted Endoacustica Europe, leader company in security and surveillance field, and they bought small tools that, connected to the pc, have allowed them to discover everything that was happening, passwords, typed text, chat…What Rachel’s parents were found blackmail, harassment, photos stolen and then made ​​public, insults and hatespeech, anonymous message that no one can trace.

These phenomena to date have concerned mostly United States and UK. But it also happens in every part in the world. A few days ago a group of boys in Bologna (Italy) used the social network Ask.fm to organize a mega fight. Through the same social, Hannah, a teenager from Leicestershire, received hundreds of messages every day in which she was invited to commit suicide. Hannah hanged herself in the bathroom, while the parents were down in the living room. She was a member of Ask.fm because she wanted to be popular. Then she said no to a boy and the trolls, the provocateurs of the network, became crazies. “Why do not you drink bleach so you die?”. They wrote. And for Hannah they weren’t just words.

The buttons for the reporting of abuses introduced by Ask.fm and by Twitter, after the controversy in the newspapers,  aren’t useful . And also are useless petitions, such as the one carried out by the father of Hannah who asked the Ask.fm closure. If you close it, tomorrow is born another. And you can not even pretend to delegate the safety of adolescents with policies of enrollment. So parents have just a road. Be careful. Check what happens when the kids are using the PC or smartphone and other devices. There are tools to enhance the safety of their children and they are also very reliable.

1 out of 6 women cheats on her husband

mogliinfedeliThe number of women who cheat on her husband for the past 20 years has risen of 40%, a growth that makes understand that the dynamic man-woman are changing like the marriage too.

A research shows that women are catching the “gap” from men in terms of extramarital affairs. If at one time was the husband that traditionally betrayed his wife, now the roles are equaling, if not reversing. In fact, are still the men to hold the scepter of the unfaithfuls.

According to the study the reasons for this change are simple: women are more independent, they earn more and have for this reason more opportunities to cheat, risking less from the economic point of view in case of divorce.

Women are in short able to deal with the possible consequences of their unfaithfulness. But why the fairer sex cheating more and more frequently? The reason seems to always be the dissatisfaction which unfortunately is common to many couples.

Accomplice of this increase of betrayals is certainly the internet that offer to men and women the opportunity to meet online many people and then maybe see them outside of the virtual world. Although in this case men remain those who visit multiple sites of meetings and so on, the women follow them, using these portals to research small or great adventures out of the marital bed.

Many husbands, but also many wives, have bought small tools that don’t arouse suspicion and let them know what happens inside a PC. Chats, facebook, and dating sites are no longer a mystery, everything is recorded in very small devices available on the site www.endoacustica.com. Similarly there are spy software of the same company that help to know everything that passes through and around the partner’s cell phone. The use of these products doesn’t imply a lack of trust in the partner, but the desire to maintain a relationship that is in a hard period.

Tools to understand if the partner is cheating on you

spiarecellLove and technology, sometimes, go together, above all when they are women to use computing instruments.

According to a study by the East Carolina University in Greenville, North Carolina, ladies, through PCs and mobile phones, live their relationships, so that they arrive to spy on the partner and also to leave him with a simple email.

The technology has entered fully into our days and then we shouldn’t marvel of these data. The important thing isn’t the medium, but the difficult to look in the eyes. According to the survey, 34% of women surveyed said that they had stopped by e-mail a relationship more than once, compared with 14% of men.

Moreover, 3% of the boys admitted that he hid a tiny camera in the lover room and 5% regularly use mobile tracker for monitoring partners’ movements. In general, women are more predisposed to this type of control that manifests jealousy and anxiety, especially when she has fear of being cheated, while men are more morbid and spies.

Now to discover if the partner is cheating on you don’t need to go to a private investigator, but just use right tools. Everywhere we leave traces of our passage, by swiping a credit card, at the supermarket…but the safety of a possible betrayal, you can have just by taking control tools for PCs and smartphones. Who has never spyed on partner’s phone or computer? What is different today are the means by which this “peek” is put in place.

Obviously on the top list is the phone with the attached spy software that allows you to listen calls, read incoming and outgoing text messages, listen what is happening around the phone and also control its position; in second place (in private messages) is the computer, Facebook, and finally the email, monitored through computer control tools.

So it isn’t unusual to become real James Bond with the risks outbuildings. An adventure that can bring to light betrayals never confessed or strengthen the couple’s relationship.

Rejected the EU “porn ban” proposal

bambinopcA wave of protests has risen as a result of the proposal, discussed by the EU Parliament, for the elimination of all forms of pornography in the media.

The “motion to eliminate gender stereotypes in the EU” has triggered the fear that one day we can get to ban porn; citizens have turned against Brussels, forcing Euro MPs to put filters to their mailboxes clogged with hundreds of thousands of messages in defense of freedom of the network.

The proposal required for short to EU Member States to make every possible effort to eliminate the discrimination of women from advertising and also it demanded a ban of all forms of pornography in the media. It was this last part to arouse controversies about the freedom to freely distribute online contents.

Parliament, after admitting that it had chosen unsuitable and too general words for its proposal, it canceled from the text, the phrase that evoked the “ban of all forms of pornography in the media and in the sex tourism advertising”. It also found that most of the complaints were sended by a “very limited” number of IP addresses and therefore could represent a instrumentalization of the case.

What the EU effectively wanted to propose was the prohibition of pornography, but only in advertising. So the problem seems to have been of communication. But we must recognize that through the web, circulating pornographic images and contents of any kind and often have access to them not only adults, but also children and adolescents. At the moment the only way to control is self-defense.

Many parents use the anti porn key, a normal usb pen drive that cleans thoroughly the pc from any pornographic images thanks to complex algorithms that are used to search through all the data stored on your hard disk. The freedom of the network is important, but the protection of the youngest it’s in the same way, just know how to combine the two.

Facebook for couples with “Us”

noifacebookAfter having been defined home wrecker and have been called into question in numerous cases of separations of our day, forcing the “smartest” partners to use monitoring tools for pc, Facebook tries to make peace with the couples online.

How? Making the couple “social” with the application “Us“, through which the untiring romantic can share everything happens within the couple: photos, thoughts, videos, and so on…

In reality “Us” is an extension of the existing functionalities of Facebook, which allows you to view details of friendship clik on the wheel in the top right corner of the profile, accessing to the settings of the page, and then selecting “view friendship details”. Then you see the chronicle of the interaction between two people from the moment they close social friendship. “Us” leads, via a link, to a page very similar to this, but in a more direct way and also in a more customizable space. In addition to keep a diary with his status and updates, the user “coupled” may then manage a detailed chronicle of love, with the level of privacy configurable from the main settings.

If the love were to end, the couple’s Facebook page could soon turn into a vent page or better yet a page where publicly denigrate the former partner.

In the U.S., a woman of 43 years has published on the “Us” of her lover a photograph of herself and the man in intimate attitudes. Of course, the surprise wasn’t pleasant for the counterpart and for his official partner. In many use invisible control systems for PC that take away this kind of discovery, preventing the risk of betrayal online.