Marital infidelity? Fix it with a bug

ottobre 14, 2010 Technology No Commenti

It happened to all of us, or at least most of us, to have doubts about the reliability of their spouses, perhaps because of odd behavior, suspicious phone calls or unexpected absences. Often it can happen, fortunately, that such fears will prove unfounded, but this is not always the case.

To avoid sleepless nights and endless self-questioning, and to be reassured on the stability of your relationship, technology provides us with the bugs or hidden microphones, invaluable tools to solve cases of marital infidelity silently, unobtrusively and with maximum efficiency.

In fact, by connecting a bug to your home phone line, you can easily listen to conversations without the parties being aware. In addition, thanks to items such as GSM bugs, you can listen to these conversations in real time, even if you are on the other side of the world.

The bug, in fact, contains a SIM card just like the one of an ordinary mobile phone, and can be set to start operating as soon as the telephone handset is lifted. At that point, via the SIM card, it will automatically call your phone, enabling you to listen to what happens on the home phone, in a discreet and unnoticeable way.

The GSM bugs can be remotely programmed via SMS, and can be configured to suit your surveillance needs, to ensure absolute control of the situation. Power is supplied by connecting the cable directly into the mains, to operate continuously.

By using a hidden listening device, you can determine whether your fears are well founded or not, and solve the problem one way or another. For more details on the various types of bugs and their operation, you should contact Endoacustica.

Military security and sturdiness for USB drives

ottobre 14, 2010 Technology No Commenti

One of the latest developments in the field of data security, when files and documents are traveling on a small USB drive, comes from Japan, where Adata has just presented its last product for data storage, which has military-grade specifications in terms of protection and security of the files it stores.

This drive has been dubbed S007, with a nod to dear old James Bond and the gadgets you can see in his movies; just like the super spy in the movies, this USB drive is extremely difficult to defeat, at least for any hackers or whoever should find a lost one and wants to take a look into it. It is also shock resistant and waterproof, making it suitable for use in the field and in action, when the situation becomes dangerous, bullets fly and you have to get dirty if you want to complete your mission.

Also, when it comes to items suitable for military use, one must also take into account not only strength, but also data protection. From this point of view, the S007 drive is compatible with the most advanced military standards, in terms of encoding used for the encryption.

The data is also transferred quickly through the USB 2.0 protocol, and thanks to its OS To Go feature, you can launch Windows 7 on the computer you connect it to, without installation and without having to use the original DVD.

The cost and date of launch of the S007 have not yet been specified, guess we will just have to wait and, as good secret agents, keep eyes and ears open!

Biometric identity verification… through your ears!

ottobre 14, 2010 Technology No Commenti

With the advancement of biometric technologies for identification, the traditional method of ID-ing individuals by fingerprints could soon be obsolete, and our identity could be verified through our ears!

In fact, according to a team from the University of Southampton in the UK, every human being has different ears, unique in the world, and therefore they can be used as an identification method.
Moreover, unlike other biometric identification methods, their characteristics remain unchanged along the entire life of a human.

On the other hand, fingerprints may change due to a cut or burn, and therefore would not be comparable with a previous scan, while facial recognition systems would not be able to recognize the face of an elderly person if the stored image belongs to the same person when he or she was young.

The British University team created a software that can capture the biometric image of an ear, adding it to an identity verification database of the photographed subjects. This software is based on a technology that accurately measures the internal structures of the ear; that during the testing phase, it has shown a reliability of 99 percent.

The next step is to use it in real life situations, and more specifically as a form of identification at British airports; Stansted airport is already operating a biometric identification system with facial recognition, whose features were fine-tuned over the course of two years of use. Along with the reliability already proven, identification through biometric photos of the ear also has an advantage for the people being identified.

In fact, if for example for retinal identification, the person must be standing near a scanner that collects the image of their iris, this has disadvantages for the elderly or disabled. Instead, the software developed at Southampton gives the opportunity to collect the image with a special camera that can be used easily even on people with disabilities who can not stand or walk.

Calendar

ottobre: 2010
L M M G V S D
« Set   Nov »
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018

gps-gprs-tracking-system

Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …