12/19/2012

Foreign Economic Collection

Foreign Economic Collection and industrial espionage against the United States represent significant and growing threats to the nation’s prosperity and security.

Foreign economic collection and industrial espionage against the United States represent significant and growing threats to the nation’s prosperity and security. Cyberspace—where most business activity and development of new ideas now takes place—amplifies these threats by making it possible for malicious actors, whether they are corrupted insiders or foreign intelligence services (FIS), to quickly steal and transfer massive quantities of data while remaining anonymous and hard to detect.
You can find out more in Foreign Spies Stealing US Economic Secrets in Cybercpace

Download

Steganography Program

Steganography is the art and science of writing hidden messages

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
This is a  Zip file download that contains a Windows program (Instructions can be found in the Help menu), a bit map image file (for hiding an encrypted message) and example text files.
The program performs monoalphabetic encryption and decryption using a keyword to create a 26 character cipher alphabet and hides ciphertext in a bit map image file. This program is intended as a teaching aid in the understanding of how basic computer steganography works.
The SCB Steganography Program is extremely easy to use and very useful for understanding computer based steganography. It was written for Secret Code Breaker by Tom Jones, Vice-President, SigmaSIX LLC an engineering and manufacturing company located in the Detroit, Michigan area. The program display is illustrated here Steganography program screen.

Laser Espionage Microphone

In the world we live in today, there are many different reasons why you would want to listen in or record others. Especially private investigators can benefit from using audio surveillance products.
If you are looking for a Listening Device, here is how to make one.


Secret Folder

secret folder is an iphone app

Secret Folder is like a secret folder, you can manage private photos and videos. It protects your files with either a 4 number PIN lock or a dot lock. The options they give you include taking a photo with the front camera when someone attempts to unlock the app. There is also the option to include a fake password.
Whenever this fake password is entered, functions to the app will be very limited, and whatever pictures taken with the app won’t be saved.

12/18/2012

Phone Secret Codes

Phone Secret Codes

I will give you a few useful secret codes for your mobile, some of them must be entered without the SIM card in cellphone.

Alcatel
IMEI number:* # 0 6 #
Software version:* # 0 6 #
Net Monitor:0 0 0 0 0 0 *
Bosch
IMEI number:* # 0 6 #
Dafault Language:* # 0 0 0 0 #
Net Monitor:* # 3 2 6 2 2 5 5 * 8 3 7 8 #
Dancall
IMEI number:* # 0 6 #
Software version:* # 9 9 9 9 #
SIMcard serial number:* # 9 9 9 4 #
Information about battery status:* # 9 9 9 0 #
Selftest (only Dancall HP2731):* # 9 9 9 7 #
Show version configuration:* # 9 9 9 8 #
Net Monitor:* # 9 9 9 3 #
Ericsson
IMEI number:* # 0 6 #
Software version:> *
Dafault Language:
Enter to phone menu without SimCard - after Wrong PIN:press NO:
* * 0 4 * 0 0 0 0 * 0 0 0 0 * 0 0 0 0 #
Information about SIMLOCK:
Hagenuk
IMEI number:* # 0 6 #
Software version:# # 9 1 4 0 * 8 3 # 7 5 * 2 #
Mitsubishi
View IMEI:* # 06 # View IMEI
Default language English:* # 0044 # English
JDefault language Deutch:* # 0049 # Deutsch
NetMonitor1 activate:hold * enter 4329
NetMonitor2 activate:hold * enter 621342
Enter into M4 Test mode:hold * enter 5472
Show SW version:hold * enter 5806
Show HW version:hold * enter 5807
Show SW and HW version:hold * enter 936505
NS Lock Menu:hold * enter 476989
CP Lock Menu:hold * enter 482896
NS Lock Menu:hold * enter 574243
SP Lock Menu:hold * enter 967678
IMSI Lock Menu:hold * enter 362628
Lock net.level:hold * enter 787090
Lock net.level:hold * enter 787292
Shut Down:hold * enter 3926
Motorola
IMEI number:* # 0 6#
Net Monitor ON:* * * 1 1 3 * 1 * [OK]
Net Monitor OFF:* * * 1 1 3 * 1 * [OK]
* - press this until box shown up
Nokia
IMEI number:* # 0 6 #
Software version:* # 0 0 0 0 # lub * # 9 9 9 9 #
Simlock info:* # 9 2 7 0 2 6 8 9 #
Enhanced Full Rate:* 3 3 7 0 # [ # 3 3 7 0 # off]
Half Rate:* 4 7 2 0 #
Provider lock status:# p w + 1 2 3 4 5 6 7 8 9 0 + 1
Network lock status:# p w + 1 2 3 4 5 6 7 8 9 0 + 2
Provider lock status:# p w + 1 2 3 4 5 6 7 8 9 0 + 3
SimCard lock status:# p w + 1 2 3 4 5 6 7 8 9 0 + 4
1234567890 - MasterCode which is generated from IMEI
Philips
IMEI number:* # 0 6 #
Simlock info:* # 8 3 7 7 #
Security code:* # 1 2 3 4 # (Fizz) or * # 7 4 8 9 #
Samsung
IMEI number:* # 0 6 #
Software version:* # 9 9 9 9 # albo * # 0 8 3 7 #
Net Monitor:* # 0 3 2 4 #
Chaning LCD contrast:* # 0 5 2 3 #
Memory info:* # 0 3 7 7 # albo * # 0 2 4 6 #
Reset memory (SIMLOCK`a removing!!!):* 2 7 6 7 * 3 8 5 5 #
Reset CUSTOM memory:* 2 7 6 7 * 2 8 7 8 #
Battery state:* # 9 9 9 8 * 2 2 8 #
Alarm beeper:* # 9 9 9 8 * 2 8 9 #
Vibra test:* # 9 9 9 8 * 8 4 2 #
Sagem
IMEI number:* # 0 6 #
Service Menu access:MENU 5 1 1 #
Siemens
IMEI number:* # 0 6 #
Software version:put off sim card and enter:: * # 0 6 # (and press LONG KEY)
Bonus screen:in phone booke: + 1 2 0 2 2 2 4 3 1 2 1
Net Monitor (S4 Power):Menu 9 8, left SoftKey, 7 6 8 4 6 6 6, Red phone, Menu 5 6
Sony
IMEI number:*#06#
Software version:*#8377466#
Show list of product creator names:(you must save this number in your Phone Book with "own phone no." record): + 1 2 0 2 2 2 4 3 1 2 1

Is someone listening to your calls?

is someone listening to your calls?


Listening to other persons calls is illegal, you can only monitor your own device if you don't want to be fined or to do some time in jail. However, in these days everybody listens to everybody. 
How this works?
Some types of phone monitoring software are able to record phone conversations and act as “bugs” that discretely tap into the phone’s microphone so you can listen in on conversations.
The problem is that most of the time, there is no sure way to tell if someone is monitoring you or spying on your conversations.

Tips:
Listen for additional sounds on the line, such as popping, excessive static, humming or clicking.
The phone sometimes lights up when you are not using it.
Watch for interference with your radio and television.
The phone’s battery seems to drain quicker than usual.
The phone bill goes up and you are charged for more texts than you remember sending.
Check your phone for apps and downloads, but you might not find any software, even if you use "bugs" from surveillance companies this may not always work.
If you discover some software on your device or you are suspicious of  some soft being installed, get rid of it by wiping the phones memory and go to your service provider, they can restore your phone.

Snake Spy Cam!

If you suspect someone of something and you don't have enough evidence, this gadget might help you. In stores are very expensive, but in this video you'll learn how to build one from skratch.


Self Destructing Message

Self Destructive Message delete messages after reading
 
Self Destructing Message (SDM) is a message application along the lines of Viber or Whatsapp. With this app you’ll be able to set ‘self destruct’ timers to your messages. Your friend will have 5, 10, 15, 30 or 60 seconds to read the message that you sent. After that, the message ‘self destructs’ (gets deleted).


12/17/2012

Freeware Applications to Protect Electronic Mail

Freeware applications are encrypted software programs that allows you to protect any confidential emails

Encrypted software program allows you to protect any confidential emails. It will help keep information private and data protected. 
Recognizing the importance of email communications, users need to rely on protecting their electronic mail.
As you already know, to protect an electronic mail requires an encryption so the content won't be legible. To read the mail you must use a password to decrypt it.

Freeware programs:

iSafeguard Freeware can safely secure your files and e-mails. It uses a strong encryption and digital signature. Supports the following e-mail clients: Microsoft Outlook, Microsoft Outlook Express, Yahoo Mail, Hotmail, Gmail, Juno Mail, Lycos Mail, Eudora Webmail, Brinkster WebMail. It also supports Text, RTF and HTML e-mails.

HushMail  is a Web-based email service that uses a Java applet to encrypt and decrypt messages. It is able to encode emails using a 1024 bit public key encryption. E-mails attachments are also encrypted.

 Safe Express Home  is an e-mail client that is easy to configure and features automatic e-mail encryption and anti-spam filters.

Sbwave allows users to send and receive encrypted email via a web form. It requires no software to install. It also doesn't have users sign up for anything and does not place ads in the e-mails.

Secret Compartments

If you like secret compartments then you should take a look at this ideas.

Hidden Book


Wrist Watch


 Truck Compartment





Secret hiding sneakers
Wall socket



Hidden Coin



If you want to learn how to create a secret compartment watch this video. It's a good hidden place.



Is someone spying your computer?

Go to  "Start" and click "Control Panel"


Click "Security Center"


Click "Windows Firewall"


Click the "Exceptions Tab"


Uncheck programs that you do not want to have access to the Internet, but make sure you know what a program does before restricting access, as you could completely lose Internet access or prohibit programs that you need.

Click "OK" after you have deselected the programs you do not want to have access to the Internet.
Close the "Security Center" and the "Control Panel"

Download, install and run a complete computer scan with the free spyware detection software Spyware Terminator and schedule it to run a daily scan.

If you know someone who has reasons to spy on you and had access to your computer, you shoult take your keyboard and pc to a specialist and have it checked.

12/16/2012

Lipstick Pistol

Lipstick pistol is a 4.5 millimeter single-shot weapon

Lipstick pistol of this 4.5 millimeter single-shot weapon, presumably taken from a KGB agent in the mid-1960s. While it's unclear whether this dangerous "kiss of death" was ever used, a cyanide pistol was used for assassination in that era. These covert weapons are surviving examples of the "active measures" that were taken in this time period, unlike many of their intended targets.

Keyloggers

Keylogger 007 it can secretly track all activities of computer users

Keyloggers are software programs designed to secretly monitor and log all keystrokes. Also they can be devices and it's important to keep their existence in mind when we think about security.

Function:

They can secretly track all activities of computer users in total stealth mode, and automatically deliver logs to you via Email or FTP. They can help you gather information about web sites visited, file operations, every keystroke, username and password, online chat conversation.
Keywords  can take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.


You can try the 007 keylogger, it works in the background and it's totally safe, making it undetectable for antivirus in the market. You can download it for free here.

12/15/2012

Cam On! Lite

Cam on!Lite is a navigation tool

Cam on! Lite lets you explore the world by interacting with some of the  webcams on the net.
This is an app that has a map full of webcam cameras you can view. Also, you can control some of the cameras viewing angle (limited viewing angle) with on screen controls. You can also take a picture of the place you’re viewing and save it to your iPhone photo album.

Monitoring Software - Mobile Spy

Mobile spy is a smartphone monitoring software

Mobile Spy allows you to monitor your iPhone in real time by providing reports of incoming and outgoing calls, SMS, GPS locations, contact list, e-mails, website URLs, photos and videos. $49.97/Quarter.

Free apps spy on calls and texts

Companies are using free smartphone apps to allow them to spy on users messages, intercept calls and also to track their location. By accepting little-read terms and conditions when downloading apps, consumers give developers the right to gather private information.

Companies use apps to spy on calls and texts


Source: dailymail

12/14/2012

Handgun Electric Screwdriver

Handgun Electric Screwdriver is designed for home improvement

This gun is designed for home improvement types who are quick on the draw, this electric screwdriver is modeled after a classic revolver handgun and comes with six interchangeable bits stored in the cylinder.
To make the handgun experience more realistic, an LED light at the end of the barrel recreates the effect of a muzzle flash while also illuminating the screw in the gun's targeting. 

Flashlight Revolver Guns

Flashlight Revolver Guns

This flashlight includes a 22 caliber seven-shot revolver on the business end. Perfect for dark places. 
 It was produced in the early 1920s by Buffalo-based S.P. Cottrell & Son for use by security guards and night watchmen as a quick way to deal with intruders as soon as they were spotted. And you thought that baseball bat flashlight was dangerous.From this one you can't hide.


LaCie Rugged Key

LaCie Rugged Key is a usb key resistent to water and heat.


LaCie Rugged Key gives you peace of mind that your data is safe. The drive offers fast USB 3.0 speed and can withstand 328-foot drops. Also, is heat and cold resistant, and is IP-54 certified for dust and water-projection resistance.
The AES 256-bit encryption means it's secure from the inside out.

Positives:
Withstands drops from up to 328 feet
USB 3.0 for speeds up to 150MB/s
Secure AES 256-bit encryption

Negatives:
The LaCie RuggedKey doesn't float, caps at only 32GB and is expensive. Starting at: 39,99$.

You can find out more here .