Tuesday, December 31, 2013

Multi-Channel Detector for Wireless Protocols

TheDD1207 is a new measuring device which can be successfully used by engineers or counter surveillance specialists as a reliable tool for tracing different digital transmissions such as GSM, Bluetooth and other  \wireless transmissions. The sensitivity of a common RF detector (bug detector) is spread along a wide frequency range, usually 3, or even 6-7 GHz. This means the common detector cannot detect such weak and non-continuous signals as Bluetooth, Wi-Fi or Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect because of their low sensitivity at higher frequency ranges.
The only way to reliably detect wireless protocols is to use pre-selector chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect DD1207 which has 6 channels for different frequency ranges and can simultaneously detect 6 different kinds of transmissions at a distance much greater than any common RF detectors.

Features

Portable device for the inspection and location of wireless sources
-6 channels of detection for different kinds of protocols
-Detection of GSM/CDMA/3G
-Detection of Bluetooth/Wi-Fi/Wi-Max
-Can be used for tracing both regular sources and illegal eavesdropping
devices
-6 bar graphs with 10-segments each, for accurate location of RF sources
-4 modes: Silent, Vibration, Visual and Listen
-2 levels of sensitivity (attenuator)
-Extra display shows probable protocol
-Durable metallic body
-Microprocessor controlled
-Setup mode with selection the threshold level for vibration.
 Detects the following kinds of bugging devices:
-GSM baby-monitors/GSM alarm/GSM bugs
-GSM/GPRS/EDGE/3G video cameras
-GSM Spy phones
-GPS Trackers
-Bluetooth bugging devices
-Spy phones with Bluetooth/Wi-Fi
-Wi-Fi/Wi-Max bugging devices
-Wireless videocameras 2.4 Ghz


Specs

  • Bluetooth, Wi-Fi 2400-2480
  • CDMA 824-849 MHz
  • Wi-Max 3000-7000 MHz
  • Antenna 2 Omni-directional antennas
  • Box Size 7 x 5 x 1.50
  • Detection distance 1-10 meters
  • Frequency range
  • GSM (DCS) 1710-1790 MHz
  • GSM 880-920 MHz
  • operation time 10-15 hours
  • power 2 AAA
  • Unit Size 2.75 x 4.75 x .50
  • WCDMA, 3G, GSM (PCS), DECT 1920-2000 MHz
  • Weight 1.00
Includes
  • 2 Antennas
  • 2 Batteries size AAA
  • Cleaning Cloth
  • Detector
  • Manual
  • Screw driver

Friday, December 27, 2013

How to Install the Eblaster Mobile Cell Phone Monitoring Software

Here is a sample set of instructions for Spectorsoft's Eblaster Moblie.
From the Target phone, go into the Internet Explorer from the phone and type in m.spectorsoft.com in the url bar It will prompt you to 'click here' for blackberryor android application, and the download will start
Once the download it complete you will need to install the program, generally from Android phones you can go back to the home screen and slide your finger down from the top of the phone and this will slide down a menu screen, if not you will need to find out where the phone sends downloads so you can install the program
When you see the download for
'Mobile Logs' , click on the program and it will take you to an install screen
Click 'install' to start the installation
Once the program is installed, you will need to go to your phone screen like youre making a phone call
Dial
*#4321 and click send, once dialed it will automatically take you to the eBlaster Mobile program
Read and Accept the terms, then it will ask you for the Serial #

9990MO0022208451
Then just follow the prompts for the complete setup
You will be able to set up your email address, password(to get back into the program if you need to make changes), what you want sent to the email address and how often you want it sent
The link below is if you want to register the program, you dont have to but it helps if you ever have any problems with the program

http://www.spectorsoft.com/support/WebRegistration.asp?snum=9990MO0022208451

From star to finish the whole process takes about 5 minutes with the target phone, but once programmed the
eBlaster Mobile allows you to monitor the activity of an Android mobile device. This is appropriate for parents monitoring a phone given to their children or employers monitoring a phone provided to their employee.
eBlaster Mobile recordings are organized into an easy-to-read Activity Report that is automatically sent to any email address you choose... as often as every 30 minutes or as infrequently as once a day.
You can also set up virtual fences around key locations and be notified when they enter or leave these important places.
eBlaster Mobile Instant Notification keeps you "in-the-know" by automatically sending you an exact copy of every text message sent and received, and a thumbnail of every photo snapped, even if the messages or images were deleted from the phone.


SMS/Text Messages
Get transcripts of text message conversations – every word that was typed on both sides of the conversation. Know who said what to whom and when.
Web History
Review the address of EVERY website they visit. Find out if children or employees are visiting inappropriate websites and how frequently they are visited. Know if they are spending all day surfing when they should be doing something else.
Location
Find out where children or employees are and when they were there by using the GPS or cell site location of the phone. Did they really go where they said they were going, or did they stop someplace else?
Call Logs
See when and who children or employees are calling and for how long. Find out if people are talking on the phone at inappropriate times, or determine if they are making too many improper phone calls





Thursday, December 26, 2013

The Druid Noise Generator

Protect your conversations against all kinds of eavesdropping!
Top-of-the-line protection system. This is the only device in the world which can give 100% protection to your conversations against interception or recording. The DRUID NG5000 creates powerful interference against all kinds of listening devices! Even if a person is standing next to the participants, they will not be able to understand what is being said. The headsets allow the users to hear each other clearly while the DRUID's central unit produces interference.  Powered from 110V or the internal rechargeable battery with a resource time of 2-4 hours.  The unit is supplied in a carry case.
Not all listening devices can be detected by existing methods. TheDRUID NG5000 is a unique system for providing protection of human's speech.
Remotely controlled radio microphones, wired microphones, passive resonators, miniature voice recorders  practically all these devices cannot be detected by conventional methods. Even a modern cellular phone may contain a digital voice recorder; this means that any phone lying on the desktop could be used by an adversary to record a conversation. Therefore it is extremely important to have a reliable device protecting private conversations, not depending on their level of importance. The concept of the DRUID is based on generating audio interference produced simultaneously with a human's speech. The volume of this interference is higher than a person's voice; therefore neither listening device nor recorder is able to pick it up. The generated audio interference cannot be cleared by any noise-clearance- methods. At the same time the produced interference does not create any inconvenience to the participants of the negotiation thanks to the special headsets. The DRUID headset allows users to hear each other with crystal clear quality.

Features
Professional system for protecting speech between up to 6 persons
Protects against all known methods of listening, including all types of radio microphones, stethoscopes, voice recorders, passive resonators, wired microphones, etc.
The system uses usual multimedia headsets. 4 headsets PLANTRONICS AUDIO 355 included in the standard set
Absolutely harmless to your health: no microwave reflections or ultrahigh sound noise
Compared to a white-noise generator the DRUID provides a much higher level of protection.
The system is portable: supplied in a plastic carry-case it can be easily prepared for use.
Powered from an internal rechargeable battery the DRUID D-06 can work for up to 4 hours without mains supply
The system can be used in any situation, it is especially valuable when conducting highly important negotiations in an unknown environment

Specs
  • Dimensions 23 x 6.5 x17 cm
  • Power source AC 110V Rechargeable battery
  • Type of noise Distortion plus Reverberation
Includes
  • Generator
  • 4 headsets
  • Sponges for headsets
  • Power charger 110V
  • Manual

Tuesday, December 24, 2013

AC Adapter Hidden Camera

It may look like a regular everyday AC adapter plugged into the wall, but it is much more!

This high-grade covert camera has a DVR built right into the unit, and is motion activated! To operate, simply insert an SD card, and plug it into any working electrical AC outlet, and the camera instantly starts recording as soon as motion is detected! 


Since the unit runs off AC power, there are no battery life concerns! Just plug it in, and let it record! When you are ready to retrieve the video, just remove the SD card, and you can play back the files on your PC, we recommend VLC Media Player.

Note : AC Adapter DOES NOT work as a a power source
 

Features
 • Normal looking AC adapter
• Built in DVR and camera
• Time/Date Video Stamp
• Powered by AC outlet - no batteries needed!
• Amazing 720x480 resolution @ 30fps
• Takes up to a 32GB SD card
• 1 hr per GB recording
Specs
 Image Sensor: 1/4" CMOS camera lens
Resolution: 720x480 NTSC
Time/Date Stamp: YES
Focal Lens: 4.3mm
Angle of View: 78 degrees
Min LUX: 0.5LUX @ F2.0
Recording Resolution: 720x480 @ 30fps
Video Format: MPEG 4 AVI
Recording Mode: Motion Detection or Continuous Recording
Memory Type: SD card
Max SD Card Size: 32GB
PC Interface: Mini USB 2.0
Size: 2.51" x 2.04" x 1.96"
Weight: 3.8oz

Saturday, December 21, 2013

The difference between Cat6 and Rg59

Coaxial cables, commonly called ‘coax’, are the cables that are commonly used for video and satellites installations. There are many kinds of cables to suit different applications, among which are the RG59 and RG6. The main difference between the two is their construction as the RG6 is bigger compared to the RG59. The inner conductor core of the RG6 cable is thicker as well as the shielding within the rubber sheath.
The difference between the two, in terms of construction, results in a better frequency range for the RG6 cable. RG6 cables are often certified to work up to 3Ghz. Although RG59 cables may work above the 2Ghz level, it is not always the case and problems may still appear later as the conditions change. Another key difference is the much lower attenuation of RG6 cables. With very long lengths of cable, the attenuation can degrade the signal to a point where it becomes noticeable. Using an RG6 cable simply means that you are able to use longer cables before you have problems with attenuation.
A downside to the RG6 cable is when it is used for applications operate below 50Mhz. A good example of this is HDTV, which only operates at around 37Mhz. The shielding of RG6 cables cannot properly prevent noise at levels of below 50Mhz and the signal may be worse with an RG6 cable than with an RG56.
Because of these differences, each of these two cables are often used for specific purposes despite being interchangeable. RG6 is the cable of choice for satellite receivers because it allows for better signal quality as well as insurance that any future specification that could use frequencies close to 3Ghz would still be compatible with the current wiring. RG59 is used for video signals as it would provide the best signal quality for the frequencies in use. Not to mention the cheaper price per length of RG59 cables compared to RG6 cables.
Summary:
1. RG6 cable has a thicker conductor than the RG59
2. RG6 cable has better insulation than the RG59
3. RG6 can carry signals of much higher frequencies than the RG59
4. RG6 has much lower signal losses compared to the RG59
5. RG6 cable may not operate below 50Mhz while the RG59 can
6. RG6 is better for satellite signals while RG59 is better for video signals
7. RG6 cables cost more than RG59

Friday, December 20, 2013

C800 Wireless Pinhole Camera and Receiver

Easy set up and portability this tiny wireless color camera transmits a distance of approximately 300 feet(LOS-plain line of sight)! The receiver is more than just your average wireless receiver it is also a DVR. Packed with features, motion detection, easy operation, and video storage on an SD card that can record up to 6 hours! This camera great for covert operations, nanny cams, room surveillance etc.

 Specifications:


1/3 CMOS color camera
Wireless Receiver / DVR uses up to 2GB SD card
Motion detection
Approximately 300 feet LOS
0.5 LUX
420 TV lines resolution
Recording time:
Up to 6 hours recording on a 2GB card
Weight:
Camera: 1.0 oz
Receiver: 6.2 ozs

Includes:
Wireless camera
Wireless Receiver
Antenna for receiver
2 AC Adapters
Av cable
Stand / mounting bracket for camera
Manual

Thursday, December 19, 2013

Cell Phone and GPS Detector

This counter surveillance device is ideal for tracking down regular or concealed GSM mobile devices. Find and detect concealed transmitting cellular devices quickly and easily in GSM, CDMA, and WCDMA transmission ranges.











Specifications:

Detection Mode: RF Power Peak Detection
Detection Frequencies: GSM 880-915MHz, CDMA 824-849MHz, WCDMA (1920-1980MHz), and DCS (1710-1785MHz)
Antenna: Dual band dipole omni-directional
Power: Li-battery (single, 1800mAh @ 3.7VDC)
Alert: Vibration and audible
Operation Time: 18-20 hours (on a single charge)
Weight: 110grams
Size: 96mm x 60mm x 24mm (120mm w/ antenna)

Includes:
Cell Phone and GPS Detector
Li-ion Rechargeable Battery
AC Power Charger
Earphone








Wednesday, December 18, 2013

Rabbler White Noise Generator

Protect from evesdropping or recording with the NG3000 Rabbler. The NG3000 Rabbler creates  an additional barrier of interference which masks your speech. Since the generator creates a 'speech-like' noise, the cleaning of this sound is extremely difficult. Creating another layer of protection from evesdroppers.
The housing of the unit is made from a very reliable material and is extremely durable, guaranteeing a long life for the device.

Usage
Please note that the NG3000 Rabbler is just a tool, complementing and reinforcing the measures taken to protect you from eavesdropping and recording. To increase the security of your conversation do not increase the volume of your voice. A volume similar to what you would use in a crowded coffee shop is ideal. If possible, lean forward towards your interlocutor or sit closer to each other, then place the generator on the table between you.
 
It is not advisable to use only one NG3000 Rabbler if the number of participants is more than 4. In this situation, it may be necessary to use one or two additional devices. Do not hide the generator in a pocket or bag while in use. The unit should be as close to the speakers as possible so that the conversation is drowned in noise.

Features
  • Designed by TSCM countersurveilance professionals and will protect you against all types of eavesdropping when used in correspondence with the recommendations.
  • Employs a new approach to the problem of conversation protection.
  • Uses a new, speech-like noise which, in the most of cases, has proven to be more efficient when compared to white noise.
  • The noise has been 'compiled' using real human conversations and is similar to the noise of a 'rabble' in busy public places. This type of noise is the most  effective when creating interference to voice recorders and listening devi- ces, especially when the size of the protective device is critical.
  • Is a portable, cigarette-pack sized device which can easily be transported in a pocket or a small bag.
  • Has been specifically designed for situations when the safety of conversations is extremely important on the one hand, and on the other hand the protective device should be as small as possible to allow easy transportation while not giving away your intentions.
  • As the Rabbler is always nearby, it can easily be taken out and used anytime with the slightest chance of any information leakage.
Kinds of listening devices rendered useless by the NG3000 “Rabbler” 
  • Voice recorders

  • Radio microphones

  • GSM/3G “bugs”

  • Body-carried video cameras - watches, ties, etc. (jamming of acoustics)
  • Wired microphones

  • Any other type of audio surveillance

Tuesday, December 17, 2013

Reasons Why Women Should Carry Pepper Spray

There are many reasons women should carry pepper spray. Your personal safety is the most important thing. Today you need to think about educating yourself about personal safety, learning moves that might help save your life, become aware, escaping, fighting back, and other things that can help you.
The most important thing you should think about is your personal safety. You should educate yourself about self defense and learn a few basic self defense moves too. Self defense is extremely important and it can cost you your life if you don't know a few basic tips to help you. It is best to learn a few different physical self-defense moves that you can use in any circumstance that you might feel threatened, or if someone makes you feel unsafe or violates your space.
The most important thing is awareness. Many women are not aware of their surroundings at times and this is what costs them their life. It is important to be aware of what is going on around you at all times. When you pull into a parking lot to park the car you should look around for people in front and behind you. Before you choose a spot to park you should look around and see if you see anyone. When you are done shopping and walking back to your car you should be sure you don't see anyone lurking near your vehicle or following you in the parking lot. If you do, act as if you forgot something and walk back to the store. Always be aware of your surroundings and if there are people around you that make you feel uncomfortable you need to do something about it.
The most important thing when you think about personal safety is your 6th sense. Many women often have a bad feeling about something initially and they continue to move forward with what they are doing. If you have a bad feeling about a person or a situation it is important to trust that feeling. Any time that you feel unsafe in a situation you need to remedy your feeling. Your intuition is usually right and if you feel unsafe, even for just a second, you probably are.
An important thing to consider about self defense is that it can take a long time to learn it. Some women consider taking karate classes but this is actually a long-term commitment to really learn the moves. The problem with these classes is that women who take them find that when they are really in an actual dangerous and unsafe situation they do not perform the moves they learned. The time is wasted on the classes and they really don't work. Danger happens fast and you have to be able to react quickly. What you learn in a class doesn't kick in fast enough to actually use until it is beyond the point where you could have used it. The best thing you can do is carry pepper spray on your key ring for your personal protection. This makes it perfect because it is already in your hand and only takes less than two seconds to be able to spray someone with it. There is no thinking involved.
Escaping is important. You don't want a stranger to take you into a dark alley or shove you into the trunk of a car. You may never make it home to your family again. If you are in a public place and a stranger tells you to come with them or they will kill you it is important to yell and fight back now. This will be your only chance. The person most likely won't kill you in public but when they get you wherever it is they want to take you they probably will. Pepper spray is the best way to distract a predator from hurting you in public. You can spray them in the face.
Pepper spray or OC is very distressing to experience which makes it a great self defense weapon. OC will induce coughing, choking and nausea, as well as dilating the eye capillaries resulting in temporary blindness. The mucous membranes will swell to prevent all but life support breathing causing the assailant to be temporarily incapacitated. You will gain precious time to get away safely.
Fighting back is also something you need to consider. You must fight back any time someone touches you and they shouldn't. Shout as loud as you can and make a scene. Break a window and make a scene, if possible. Never let someone try to take you by gun or knife point without a fight. The more of a scene you cause will cause them to actually run away because they don't want to go to jail.
Pepper spray is one of the most important things you can have on you at all times as a woman in the world today. It is a sad truth that you cannot trust your environment anymore. You must be aware of your surroundings at all times. Never let anyone touch you or invade your space and if you feel threatened you can spray them with your pepper spray and use it as a chance to get away. This is the best defense mechanism you can have.

Monday, December 16, 2013

Cell Phone Recon for Smart Phone Monitoring

This cellphone software allows you to covertly monitor all of the activities on your cell phone. Log incoming and outgoing calls, incoming/outgoing text messages and emails, and track phone location. You must have access to the phone you want to monitor to download the software, can not remotely access the phone.


Features:


  • Record all incoming/outgoing SMS messages
  • Record incoming/outgoing/missed call log
  • Record and track location of cell phone
  • Record all incoming/outgoing emails
  • Easy to install
  • Secure control panel
  • Possible to monitor multiple phones


Make sure that the phone you want to monitor is compatible with this program.
Click Here to see what phones are Compatible with this software.


Specifications:
Cell Phone Recon is compatible with most smartphones, including phones using following operating systems:
- Symbian OS 9.x
- Symbian OS 8.x
- Windows Mobile 6.x
- Windows Mobile 5.x/2003SE
- Android
- Blackberry
Does NOT work on Apple iPhones (see iRecovery Stick)

Click Here for Installation Instructions

Disclaimer: The software must only be used to monitor cell phones when the owner/user has given permission for you to do so. If the software is installed on a mobile phone whose owner/user has not given permission, then you could liable for legal action.

Saturday, December 14, 2013

Spy Finder Camera Detector

The Spy Finder is an easy-to-use hidden camera detector. Simply look through the viewing port and scan any room to reveal the exact location of concealed wireless and wired cameras. Use it in dressing rooms or gym locker rooms to protect yourself from prying eyes. Give your loved ones peace-of-mind knowing their privacy has not been compromised.
The Spy Finder Hidden Camera Detector/Locator is the most reliable, user-friendly technology on the market, allowing you to make sure that you are not being watched. It uses optical augmentation; a phenomenon whereby light reflected from a focused optical system, such as a video camera, is reflected along the same path as the incident light. If a hidden camera is illuminated and viewed with the Spy Finder, then a strong reflection from the target camera will reveal its position to the user.
The Spy Finder takes advantage of this phenomenon by using a ring of ultra-bright LEDs arranged around a viewing port. When a user scans a room looking through the viewing port, a hidden camera appearing in the field of view will brightly reflect the light from the LEDs.
To scan an area, simply look through the viewing port and depress the button to activate the LEDs. Slowly scan areas where hidden cameras are suspected and look for bright-reflected spots. Remember, most hidden video cameras use pinhole camera lenses, so the spot you are looking for could be small.
If you see a suspected camera, move your vantage point slightly. If the location of the reflection moves as you move, then this is not a camera. If the location of the reflection does not move, then it is highly likely that you have discovered the optics of a hidden camera.



Specifications:

  • Personal or professional use
  • Works on most camera types: CCTV, Digital, Auto Focus, Camcorders, and Pinhole.

Includes:

  • Spy Finder Camera Detector
  • 2 AAA Batteries
  • Instructions

Size:

  • 4 1/2″ x 1 1/2″ x 3/4″

Friday, December 13, 2013

New Sleuth Gear Wireless Nanny Cameras

No more interference issues like the 2.4 GHz analog wireless cameras. Now your video will be secure with our new digital wireless line of cameras.
Check out the new line of IP Wireless cameras.




Check Out the New Complete Wireless!!! Available Now!!!
This new line will offer easier Remote Access!! No router configuration needed,
its as simple as logging onto a website!!



To use the remote viewing on PC, we highly recommend you to have the following software and hardware specifications on your PC:
  • Microsoft Windows XP or Windows 7 (.NET Framework 3.5 higher)
  • Internet Explorer 8 or higher.
  • CPU: 2.0GHz or higher(only supports x86 and x64)
  • Memory: 1GB and up
  • Display card: Independent display card and support DirectX 9.0 or higher.
To use the remote viewing on iPhone/iPad, we highly recommend you to have the following software and hardware and your iPhone/iPad:
  • iPhone 3 or higher
  • iPad
  • iOS 4.3 or higher
Recommended internet speed 1mbs or faster


Thursday, December 12, 2013

Check mate infidelity home test kit

The Latest Revolution in Home Test Kits
Over one million tests sold and performed since 1999!


Do you suffer from the nightmare of suspicion and doubt caused by the infidelity of a cheating spouse?  Now you can find out what's really going on the quick and easy way with a semen detection test from CheckMate.  As seen on the Today Show, Howard Stern, Dr. Phil, Maury Povich, The View, Fox News, Playboy, FHM, Maxim, Popular Science and many more.

CheckMate is the revolutionary home use semen detection test that instantly detects the traces of dried semen that can be found in underwear after sex. Sold around the world since 1999, CheckMate detects even the smallest trace amounts of semen, and can give you the instant information you need to deal with an impossible situation.  Designed specifically for the accurate testing of undergarments for traces of semen while inside a marital or relationship setting.

Each CheckMate semen detection test kit comes with everything you need to test 5 to 10 items of clothing for the presence of semen, and CheckMate can even be extended to test more items if needed. Works on any type or color of material without damaging or staining the item in any way. Second test kit included free in every box.

Wednesday, December 11, 2013

How to network your Home Security DVR

Since most businesses and many households have local area networks (LANs), you will find the task of connecting a security DVR to a LAN is a common procedure. While it is a relatively simple thing for most security equipment installers, it is complex enough to confuse many users, especially users who have never worked with IP numbers before or have never worked with LAN topology.
Let's begin by identifying your LAN topology. To do this, locate your 1) security DVR, 2) the router attached to your security DVR and 3) a computer/workstation that is attached to the same router. It can also help if you locate 4) the modem  (or router AND modem)  that connects to the internet outside your home or facility - it is usually the first piece of hardware attached to the internet cable the comes through the wall. If you don't have #3 (computer attached to the same router shared by your security DVR), create one now and verify that the PC/workstation has a working connection. If you can't find or locate #4 (modem that provides connection to the internet) don't worry about it at this point since locating it may not be necessary.
Some typical network topologies are shown below. Figure #1 represents a simple network topology you might find in small business, while figure #2 represents a very simple network you would find in many homes. (Figure #2 actually represents the bare minimum hardware & connections you need for remote DVR monitoring/programming.)

Make sure (verify) your network connection is active and your PC can connect to the internet without any problems. Start at your PC and do the following:
1. Go to the COMMAND PROMPT. Different Windows versions have different ways of getting a COMMAND PROMPT. Most Windows versions let you reach a command prompt by going to START, then RUN, then type CMD into the window and hit ENTER. If you need help go to www.windows.com or use any search engine to research your OS version command prompt. If successful you'll see a screen similar to Figure 3.

Figure 3
2.  Figure 3 shows a computer screen with the command prompt, and the PROGRAM FILES folder is open. That location should be fine. Type IPCONFIG/ALL and hit ENTER.  You should see a display screen similar to Figure 4.
( If you DON'T see Figure 4, they you are probably getting an error message. You'll need to find the person who installed your OS and find out why it doesn't have essential DOS files - you won't be able to continue this procedure without them.)
IPCONFIG is a standard Microsoft DOS command. You can read all about it at the official Microsoft website (http://technet.microsoft.com/en-us/library/bb490921.aspx), if you want. When you use this command as described here, it will report the computer's IP numbers so you can record them for your records. It does NOT change any settings or perform any kind of configuration process.
3. Write down the IP numbers shown under IP ADDRESS (192.168.1.100), SUBNET MASK (255.255.255.0), GATEWAY (192.168.1.1) and DNS SERVERS (206.222.98.82, 216.199.46.11, 206.222.98.82 - this particular computer has 3 DNS SERVER connections) and label them.

Figure 4
NOTE: Some versions of MS Windows will display IPv4 ADDRESS and an IPv6 ADDRESS - you want to use the IPv4 ADDRESS numbers.
4. Now get the IP Address of the security DVR. Got to the VRR andaccesssthe programing menu and get to the NETWORK settings area. Find the option that says DHCP (Dynamic Host Configuration Protocol) and ENABLE it..
5. Still at the DVR, write down the IP addresses it shows in the DHCP screen. Now turn OFF DHCP (or DISABLE it). If the IP addresses shown did not change, go to the next step. IF THEY DID CHANGE, re-enter them in the fields shown (DO NOT enable, or turn on, DHCP again).). If the IP addresses shown did not change, go to the next step. IF THEY DID CHANGE, re-enter them in the fields shown (DO NOT enable, or turn on, DHCP again).
6. Note the PORT NUMBERS shown in the DVR NETWORK screen. Write them down.
7. Test your configuration. Do the following at the PC/workstation that shares the same router as your DVR:
  • Get to the COMMAND PROMPT.
  • Type PING [IP Address], hit ENTER. (In our example the IP address is 192.168.1.100)
  • If you get a REPLY message, it communicated. If not, and you got a TIME OUT message of any kind then check your settings.
8. Your DVR has CLIENT SOFTWARE or REMOTE VIEWING SOFTWARE that was included in the box. Locate it and install it on the PC/workstation.
  • If your DVR has a webserver you can use IE Browser to communicate with the DVR - just type in the DVR IP Address in the URL bar of the browser.

Port Forwarding & Accessing Your DVR from Outside Your Network

To set up external (remote) viewing of your DVR and attached cameras, you will need to access your router. Refer to the router's User Manual to learn how to set port forwarding. If you can't find it, look here http://www.portforward.com/english/routers/port_forwarding/routerindex.htm. All routers have a different method of setting up port forwarding so it's impossible to instruct you here.
Program the router so that when it gets an internet request for the IP ADDRESS of the DVR it will refer (or activate) to the PORT NUMBER of the DVR (you wrote these numbers down earlier, right?). Normally most routers have a field for each physical connection and it will be obvious where to place the IP and PORT NUMBER information. If you can't find how to access your router, look at the router closely and make sure it is indeed a router and NOT a switcher. It should be ok if it's labeled ROUTER/SWITCHER but if it is an older piece of hardware and just says SWITCHER, discard it and get a true ROUTER.
Test the connection from an network external location. If the IP numbers and Port Forwarding numbers are set correctly you should be able to receive streaming video.

Using IE Browser VS Client/Remote Viewing Software

If the DVR has a webserver, then you can use IE Browser to connect to the DVR. Put the DVR IP address in the URL bar of the browser (like http://192.168.100.200, etc).
If the DVR does NOT have a webserver, then you will need to install the client/remote viewing software (that came with the DVR) on the PC/workstation you are using to view your security installation. The Client Software (or Remote Viewing Software) gives you additional features, such as ability to program motion detection, etc., that the IE Browser can not provide. Since each surveillance DVR has it's own client software, you'll have to refer to the software manual for help using their software.

Tuesday, December 10, 2013

5 Ways to detect if someone has put Spyware on your Cell Phone

Do you know that in a couple minutes, someone can install spy phone software on your mobile phone
that may enable them to take full control over your cell phone? Yes, this isn't sci-fi, or make believe James Bond picture sorcery. One of the most important threats at this time to cell phones is the danger of cell spy software. The ability of these programs is astonishing.Spy software can give somebody access to all of your text mesages, call history, email, GPS location, and even give them the power to anonymously listen in on your live cell chats. The good news though is that cell spy software can be easily removed if done right, so if you believe you have spy phone software installed on your mobile phone , you should take your mobile phone to where you purchased it at and have them reformat it. This is the sole way to truly remove it. So how does one know if somebody has installed spy phone software on your cell phone?

Here are the top 5 signs:

1) Am I able to Borrow Your Phone? Somebody has latterly asked to borrow your mobile to make a
quick call or to quickly download a ring tone or something similar like a game. 99.9% of all spy software requires a person to get physical access to the mobile phone in order to install the spy phone software.

2) Where Is My Charger? Is your battery life-span all of a sudden a lot shorter than the usual quantity of hours? Depending on the kind of cell spyware, your cell might experience a substantial quantity of unusual battery drain.


 
3) Receipt Please! Your text bill has latterly increased and you don't remember sending so many text messages. Another sign is that you notice a unusual increase in GPS activity and/or charges on your bill.

4) Strange Flashes. Your mobile 'lights up' for no reason but does not ring. Some types of cell spy software have remote monitoring features and when anyone attempts to call your cell phone to observe you, the spy software sometimes can't stop the cell phone from showing that a call is coming in.

5) Weird Sounds? When spy software is installed that has a live call interception feature (commonly found on BlackBerry spy software , your cell phone will sometimes make a noise when you are chatting on it.

As you have just read, spy phone software has come a long ways and it is a lot stronger than folks think. The good news is that there are methods to detect spy software and ultimately remove it. Which means that as long as you are careful, there is nothing to worry about. I would also highly counsel that you check out Spy Phone Software Forums, which is the #1 resource for spy phone info on the internet. This is n fantastic place to download free that will detect spy phone software. In addition there are a ton of other useful spy phone software resources.

Monday, December 9, 2013

How to Prove the Infidelity of a Cheating Spouse

It's a sad fact but today more and more marriages are ending in divorce. This can be due to problems at home or even financial issues. A growing percentage of these cases are becoming due to cheating and infidelity from one spouse or another.
 
1.If you can prove that your spouse was cheating and ultimately was guilty of infidelity then this will prove to be a good weapon in the divorce discussions. The first step is to sit down and figure out all the possible ways that you can prove or help to show how and when this all went down.
 
2. The number one way in our technologically advanced world to prove cheating and infidelity is by phone and text records. If you can prove that the individual had been frequently calling another person then this will help your case. This is something that you can actually bring into a courtroom as well.

3.If this isn't an option then perhaps checking the person's online browsing history could work. Check and see if they had visited any chatrooms or dating sites. More and more people are using social sites like MySpace and Facebook as engines to find sex partners. This is another good way to catch your spouse's cheating and infidelity.

4. If those options fail then you could always hire a private investigator to research the issue or place a GPS tracker on the spouses vehicle. These people are usually professionals for a reason and it's because they are good at way they do which is dig up dirt on people. If the person is indeed guilty of cheating and infidelity then these guys will find out.

 

Friday, December 6, 2013

How to Detect If Someone Put a GPS Tracking Device on My Car?

If you're like many people, you may be wondering how to detect if someone has placed a GPS tracking device on your vehicle. GPS Tracking devices have gotten so small, they are commonly the size of a pack of cigarettes, and some are even as small as a quarter! With devices that small, they can be hard to detect, especially if you've got a large vehicle.
The first thing you need to know is that there are two different types GPS tracking devices:
GPS "Loggers"
A GPS Logger is a passive device, meaning that it doesn't actively transmit your GPS location. This means whoever put a GPS logger on your car will have to place it on your car, and then retrieve it later in order to view the driving data, which is stored on the device. A popular example of this is the Sleuthgear iTrail GPS Logger, which is only 1.5"X1.5" big.
GPS "Trackers"
A GPS Tracker is an active device, meaning that it actively transmits your location "live", usually to a secure website, where the person who placed it there can view your location and driving information via a web browser or special program. Once they put it on there, they do not have to retrieve it, they can just view the information online. They will likely come back later though, because the battery life on active tracker is usually less than 30 days.
Here's where knowing the difference between the two types of tracking devices is important. A GPS Logger (like the iTrail GPS) can only be detected manually - meaning you'll have to physically search for it. The reason for this is because since they don't actively transmit a signal (they just store data to the device), then a bug detector or bug sweeper won't be able to pick up any kind of transmission or signal. If you suspect that you might have a GPS logger on your vehicle, the first place to look for it is UNDER THE VEHICLE. This is the most popular place to hide a GPS tracking device, and is accomplished by placing the device inside a magnetic case, which securely attaches to the metal on the underside of your vehicle. Other places to look are in the glove box, center console, and the truck (including under the spare tire).
If you suspect that you might have an active GPS Tracker on your car, a manual search is always the first step. Look under the vehicle, in the glove box, and in the trunk. These type of units are usually bigger than GPS Loggers because they need a bigger battery in order to actively transmit a signal. If you don't have time to do a manual search, you're in luck, because active GPS Trackers can be easily detected by a GPS Detector.
A GPS Detector is a handheld device that is usually battery powered that allows you to "sweep" your vehicle (or wherever else you want to locate a GPS Tracker) and will alert you when it detects a transmitting GPS signal that is sending out your location. There is an adjustable sensitivity knob that allows you to hone in on the exact location of the tracker, so you can remove it from your vehicle.
A GPS detection device will also detect cell phone signals, because cell phones are commonly used as makeshift GPS tracking devices, since owners of cell phones can often use a "locate" feature of their phone to find out where it is at.
So if you want to find out if someone has placed a GPS tracking device on your car, first conduct a manual search, and for a quicker and easier search, use a GPS Detector.

Wednesday, December 4, 2013

16 Signs Your Child May Be Taking Drugs

Here is a list of problems that could indicate drug use. Be careful not to automatically assume, however, that drugs are the problem. Children, especially adolescents, give off many of these signals when they are distressed in other ways, too. You'll need to sort out with your child exactly what the problem is and try to identify any substance abuse, perhaps with the help of a family counselor or child psychologist. Keep in mind that even if there is no drug abuse going on yet, these other problems need to be addressed.

1. Increased truancy and tardiness to classes

2. A drop in grades

3. Behavior problems in school

4. Losing interest in activities the child once enjoyed

5. Dropping old friends and a sudden influence of a new crowd

6. Personality changes -- a child who was once outgoing is now withdrawn, or someone who is usually relaxed is now fidgety much of the time

7. Sudden mood changes -- euphoria followed by tenseness or edginess; excessive suspiciousness or paranoia

8. Appearing listless or hung over

9. Increased forgetfulness

10. Increased secretiveness

11. Withdrawal from the family

12. More combativeness at home

13. Red eyes

14. Weight loss

15. Not sleeping well

16. Fatigue or hyperactivity

Tuesday, December 3, 2013

The top 9 Signs your spouse may be cheating on you

You have a sinking feeling in the pit of your stomach, something is not right but you can't quite figure out what that feeling is about. Your spouse has become distant, he/she is working late on a regular basis or, maybe your spouse has moved out of the house with no explanation. You suspect your spouse is cheating but every time you bring it up with your spouse, he/she denies the possibility. All the signs are there but you don't have any proof. So, pay attention to the signs and your instinct but, be careful not to confuse signs with proof.

1. "I Love You But I'm Not In Love With You."

If you hear these words, a big warning bell should go off. This is one of the most consistent things a cheating spouse will say. Your spouse may have a deep, loving bond with you but, intense feelings of passion can override the bond with you and cause your spouse to lose sight of his/her true feelings. The cheating spouse will develop what I call hormone - induced amnesia. The surging hormones and passion they feel in their new relationship can cause some very skewed thinking.

2. "We are just friends."

This is also another very predictable statement that will come from a cheating spouse. If your spouse is spending more and more time with this new "friend"; then there is probably more to it than mere friendship. Your spouse may feel they have a lot in common with this person, that this person understands them and things they are going through. Whatever the reasons for the friendship, it's a big warning sign and one you should take seriously.

3. A sudden need for privacy.

If things the two of you used to share openly suddenly become private pay attention cause something is probably up. He/she may start password protecting computer activity. Cell phone and credit card bills may be hidden. If you ask why or attempt to find out information that used to be common knowledge between the two of you, you will be accused of snooping or trying to control your spouse. Big warning sign!

4. "I need some space to figure out my feelings."

Men and women who are involved with someone else will request more space, time alone or away from the family. They may say it is due to confusion over their feelings or stress at work. This can be a sign that there is someone else and the spouse is trying to figure out ways to have more freedom.

5. Regular work habits change.

Working late, going to work at odd hours or, putting in more time than is normal on work related issues can be an indication that a spouse is cheating.

6. Spending a large amount of time on the computer.

In today’s world, with modern technology, a person looking for an affair doesn’t even have to leave their home. The ease of internet chat rooms, online dating sites and secret email accounts has caused an alarming increase in emotional affairs. If your spouse is online more than usual, hanging out in chat rooms and visiting pornographic websites then you have reason to be alarmed.

7. Secretive phone calls and more time spent on the phone.

Emotional affairs occur primarily via the phone, especially cell phones. If you find your spouse hanging up suddenly when you enter the room or erasing the history on the cell phone and becoming defensive when asked about it, then you might want to check your phone records.

8. Behavior that just doesn't add up.

Not being where he/she was expected to be. Missing time they can't explain. Money that isn't accounted for. Receipts for things you don't have. Missing clothing. Clothing that does not belong to your family. Being caught in little lies about the details of the day.

9. Your Own fears and suspicions

If you find yourself looking for excuses for your spouse's behavior or trying to convince yourself that they would never cheat then that is a warning sign. Your intuition is frequently one of the best indicators that something is wrong. If you suspect your spouse might be cheating on you, do some investigating and then talk to him/her about what you've found. Do it in a way that is calm and courteous. Ask for honesty. Be prepared for lies. It is a sad fact that people having affairs become excellent liars. People who never told a lie before in their lives. Trust your gut instinct but get hard, cold proof also.

Monday, December 2, 2013

Law Enforcement Grade Cameras


This Mini DV features a higher frame rate (30fps), higher storage capacity (16GB), and now has a TIME/DATE stamp. It also has a unique metal housing in a ultra small design. 

It can be used in many recording situations such as network video, family entertainment, business meetings, outdoor sports, personal and home security evidence collection for the novice and professional.

Packed inside this small rugged DVR is a color camera with 640x480 resolution @ 30 fps. Great high quality video. With a built in rechargeable battery and the capacity to use up to an 16GB micro SD card this Micro Mini DVR is both versatile and small enough to carry anywhere! Includes 2GB SD Card.
 
Specifications:
Thumb size alloy housing
Time/Date Stamping
Web cam capability
Supports AVI video format
30 FPS and 640 x 480 Resolution
Built in Li-on rechargeable battery last up to 1.5 hours
Supports up to 16GB Micro SD Card (30 minutes per 1 GB of recording time)
LED indicator
Easy installation with a bracket or clip
Bracket allows for 360 degree pan and 150 degree tilt

Includes:

Mini DVR unit
USB  Cable
Mounts, clip or Rotating bracket
Carrying Case
Neck strap
Install Mini-CD
Instructions