Tag Archives: pc

The weak link of the company: unfaithful employees

dipendinfedeliIt’s one of the greatest dangers in companies both big and small. Loyal, disciplined and educated employees, but that in front of a good sum of money or a prestigious position can sell information and confidential data.

According to a recent research, behind the office desk, 3 of 5 they shop online or go to the website of their bank, while half “attended” social networks. A risky behavior, so businesses become vulnerable for what concerns the safety online. The “perpetrators” would be the most loyal employees, liabilities and “cynical bored”, the real weak link in the chain of IT security.

640 of 1000 interviewees are convinced that it’s the company to have “vaccinated” them as bugs and by other web hazards. One in three even thinks that security is equivalent to less innovation. The result? Many surfers without protection, and a company boat at risk.
But it would be enough to implement control systems for computers that invisibly protect companies from undercover criminals . Because they are often the same companies to protect employees from any risk, but not the opposite.


A warning about teenagers photos sharing. They end up in child pornography sites

pedopornografia-3We have repeatedly stressed the great importance of parental controls on the PC used by their children and the every day news give us ample confirmation.
Everything starts for playing: a mischievous photo of themselves sent to a person of whom you trust, that you know well or for which perhaps you’re in love. From there the picture take a path that teenagers cannot even imagine, and it’s not infrequent to reach dangerous virtual destinations: abuse of minors. The young users don’t have sufficient awareness of the network and its risks. The world data of virtual child pornography are alarming. That’s why making sexting can be very dangerous.

Usually the messages following this process: the girl sends them with a naughty photo. The boy receives them on the phone and forwards them to a friend or this subtracts them to him without his knowledge, or even, once the relationship ends, the ex-boyfriend spreads them purposely on social networks. Already at that point the way to that photo is at risk and the picture protagonist will no longer be able to manage it, to recover it or control it. Sucked from the network, the snapshot becomes viral, it discloses with the speed of a virus, and especially likely to be noticed by experts of child pornography.

The Internet Watch Foundation, a British charity expert in tracking and tracing of pedo-pornographic contents, said that this adolescents mode of sending self-portraits is widespread. The organization has tried to count how many risqué snapshots are taken and spread almost as a game that is collected from hard sites, reporting that the numbers are exorbitant and that the vast majority of hardcore videos and pictures generated by the young are taken from the original location to be published on adult sites. Even innocent shooting now constitute the main source of supply of sites for adults, with psychological, social and emotional damages uncountable for the teenagers. But the teenagers aren’t fully aware.

Needless to say to teenagers that it would be better not to release photos of themselves on the net: already in the first sharing you lose control of the image. In the event, however, it’s a mistake and you want to stop the process of that picture you can contact the police, which control everything that is broadcast on the network, especially protecting minors subject to all kinds of abuse. But it isn’t always enough to remove a photo from the websites and it’s good to know that, once posted on the web, a content may also reside there forever. The only solution may be control in real time from a distance what the kids commit to the computer. By inserting small monitoring tools, invisible to the user and therefore not limiting for those who are using your computer, you can control what is typed or is going to be posted and shared before it’s too late.

One in three people spying on partner’s emails

spiarepcpartnerFailure log-out, weak passwords, but above all small monitoring tools. This is what facilitates the control of e-mail of the partner. According to a Google search, carried out on a sample of 2,000 people, one in three people have peeked at least once in the e-mail of the partner. Mail, documents and informations are often under the magnifying glass of partners suspicious.

The lack of password security is one of the “help” to get access to the partner’s cyber world. It appears that 10% of users choose the name of his dog or cat for password, while 8% use the word “password”. 6% of people leave the password pinned on a post-it next to the PC, 13% claim to be entered in an account of others, guessing the password, taking advantage of the failure to log out from a session or with monitoring tools. Among these, a third (33%) entered into the partner’s, mostly men, and almost one-fifth that of ex (17%), mainly women. One in ten has, however, tried to guess the password of a work colleague.

11% say that they use a significant date as password, such as wedding anniversary, while 11% use the date of birth of a close relative. 62% change the password only when it becomes necessary, only 24% do it regularly, while 16% say they always use the same password.

Generally, women are more inclined to share their password with partners. More than half of respondents write their passwords somewhere: a diary, a file on the PC, the phone, a post-it.

If all this doesn’t happen, no fear. The partners more smart bought small devices such as key hunters and key records that, in discreet manner, allow you to monitor everything that is typed on the PC keyboard, including passwords and email.

Often who decide to control the partner, already has a strong motivation to do it: suspicion of betrayal or some unclear affair. So it becomes strictly necessary to check out some doubt and uncertainties, better do it with reliable tools.

Web threats


The web is one of the primary sources of knowledge especially for young people and teenagers. Unfortunately, the same is also a large container of violent images and hard contents that children often meet while surfing.

On this subject has intervened the Safer Internet Programme of the European Commission, who wanted to give voice directly to the young people with regard to the dangers of the web. From what results, Italians are more frightened by the violence that circulates in the network. In fact, among the dangers of the web, they have put in the first place this kind of contents, while European peers have placed the porn in top of the list.

To answer the question “What things on the internet could annoy your peers?” were approximately 25,000 children between 9-16 years from 25 different European countries.

44% of the Italian respondents think that, on the internet, are present contents that upset their peers. 27% gives top priority to violent content (18% of the EU average), 21% pornographic ones (22 percent of the EU average), and 10% other potentially dangerous contents. To convey this material are especially video sites. While social networks, particularly Facebook, are associated, as we have seen numerous times, to behavior risks (such as bullying) or contact (priming). Fear is the prevailing sentiment among children aged 9 and 10 years, while the boys of 11 and 12 years show more often revulsion and annoyance.

Starting from these results we heard Lucy, a mother who told us about her personal experience with his 12 year old son. “Henry is a guy very sunny and helpful. Use, like all his peers, the pc mainly for study and recreation for about an hour a day, a little more during the weekend. One night I heard some moaning in sleep by my son. I stood up and I realized that I was very upset and cried. I woke him up from the nightmare and he, evidently frightened, calmed down after a few minutes. This episode was repeated for about 6 days, but I couldn’t explain the reason. He told me that he always dreamed of being chased, just as he had seen in a video shown by a older friend. I didn’t want to betray the trust towards him, but I had to understand. I bought from the site www.endoacustica.com a key hunter which allowed me to know every detail of the chat with this guy. I realized that he was using these videos with the intention to scare Henry and there was nothing funny. It seemed to me just a principle of bullying. I contacted the boy’s parents who were very helpful in taking action. In a few days the situation returned to normal and Henry found peaceful dreams”.

Divorce at the time of PC

tastiera_pcThe time of separation is for a couple often a traumatic event, certainly not very happy. Manage objects, relationships and children, if there are, becomes very difficult when you want to avoid as much as possible to meet the “guilty of our difficulties”. It seems that in this respect, a tool able to alleviate this kind of trouble is the technology. As is evident, talking to a person in front of the PC screen doesn’t offer the same warmth of a physical and verbal interaction.

Email, chat, electronic organizers shared (for the management of children, perhaps) may be expedients to “cool down” the relationship avoiding also to have a nasty experience with new partners. In this way they could lighted the tensions between them and in front of children.

The digital communication, also shortens the use of phrases that touch the emotional sphere, making minimum the structure of a sentence. Subject, verb and complement, that’s all.

What might undermine this kind of protection offered by technology is the psychological component. If from a part it’s still alive a strong feeling, reverse situations can be started. The use of spy phones is very widespread in these cases: to monitor every action taken by the former partner with the phone, to view his position and to listen everything happens around the device installing just the leading software on his phone…it’s child’s play!

And even when doubts arise about the use of chat, email and social networks there are tools that allow to easily monitor what is being viewed, downloaded or any character is typed on the keyboard. Keyrecord, keyloggers and keyhunters are tools on the agenda.

So the technology could be once again a double-bladed weapon. Are even available on smartphones apps that help to manage the separation putting together the communication flows and the economic ones of the two subjects, in some cases even sharing electronic organizers. But we are sure that they all agree?