Home » Technology » Articoli recenti:

Flying man really exists

marzo 5, 2010 Technology No Commenti

Jetpack

Human flight is nowadays really possible. Or at least, it is for those who can afford to spend at least 70000 dollars for this toy, which can turn anyone into a real jet man.

Manufactured by Martin Aircraft Company, a firm based in New Zealand (in Christchurch, to be more precise), the personal Jet Pack has a power of approximately 200 HP, and weighs around 115 kgs.
Thanks to its twin engines, it is capable of covering a distance of about 45 kilometers in half an hour with a full tank load. In order to use it, there is no need to have a pilot license, all you need is the 70000 dollars on its price tag and you are ready to experiment first-hand the thrill of human flight.

The latest evolution of Jet Pack can reach a speed of approximately 90 kilometers per hour, while taking its pilot to a height of over 2400 meters above sea level. At the current stage, Martin Aircraft has just started industrial production of what should be its commercial spearhead, and the first deliveries to their well-heeled customers should take place somewhere near the end of the current year.

Obviously, Martin Aircraft’s clientele is not limited to rich clients who wish to try human flight, but most of all the New Zealand manufacturer caters to other fields: for example, rescue and first aid services, or armed forces which might use it for reconnaissance missions or recovery of wounded personnel in war zones, especially where the terrain is particularly rough and unsuitable for conventional means of transport.

An iPhone application to delete your text messages

marzo 5, 2010 Technology No Commenti

TigerText

As anyone living on planet Earth may have heard lately, the recent gossip news about world class professional golf player Tiger Woods teach us that sometimes, forgetting to delete text messages from your mobile phone may leave tracks and evidence which may turn out very harmful for our personal life, as well as for our finances, especially for those who, like Woods himself, are sitting on a substantial fortune.

Of course, the world of telephone communication could not leave the problem unsolved, and more specifically, the world of iPhone applications has quickly found a solution, by releasing a small piece of software which can automatically delete your text messages, both incoming and outgoing.

With a slight touch of irony, this application has been christened TigerText, and it works on iPhone and iPod Touch (but in the near future there will be a release for Android and BlackBerry). By using it, one will have the possibility to send text messages which, almost like in the movie Mission Impossible, will automatically self-destruct after being read, or will be automatically deleted after a certain time lapse which can be defined by the user, ranging from one minute to a maximum of 30 days after the message has been read.

Along with deleting text messages from the phone on which it is installed, TigerText can also remove it from the receiver’s handset, provided that both users are equipped with an iPhone and that the application is installed on both of them.
When a message is removed, the text disappears and is replaces by tiger footprints. By doing this, no dangerous tracks are left on either of the phones involved.

Unfaithful wives and husbands have a new friend now, and it comes really cheap: in fact, the service costs a maximum of 2.49 dollars a month; certainly an affordable price to protect peace in your family!

A high security USB drive

marzo 4, 2010 Technology No Commenti

SuperTalent

One of the main reasons for headaches, when using USB sticks to transfer data files from one computer to the other, especially if the transported files contain sensitive or private data, is that the key may, one way or the other, end up in the wrong hands, along with the data and files that it contains, with all the possible negative consequences that one may imagine.

To protect oneself from such kind of threat, the usage of USB encrypted keys is becoming more and more widespread, while the USB drives are becoming bigger (up to 256 GB of capacity) and most importantly, much safer than before, thanks to the application of several encryption technologies, which aim at making the data inaccessible for a non authorized user.

The latest example under this point of view is coming from the encrypted drive manufactured by the Californian company Super Talent, specializing in high security data storage devices and solutions.

Their new USB drive, called SuperCrypt, is equipped with AES type hardware encryption, and thanks to the USB 3.0 standard, it ensures an extremely high operating speed, which allows for a very quick transfer of large files (for example, transferring a 600 MB movie file would not take more than 7 seconds).

This USB drive is, of course, password protected, and is available with two different encoding levels (at 128 or 256 bit), which guarantee absolute protection for the data stored on your stick. The storage capacity varies from 16 to 256 GB, with different security and speed features depending on model and capacity of your choice.

A photo camera, a camera bag or…. both of them?

marzo 4, 2010 Technology No Commenti

Cloak Bag

For those who want to protect their photo camera in case of rain, for who wants to take quick shots without being immediately noticed, or simply for those who are just too lazy to take their camera out of its bag but still do not want to miss a single snapshot.

For all these situations and many more, a new product, called Cloak Bag, has just been launched on the market. At a first sight, it looks like your ordinary camera bag, but at a closer look you can see that it has a little secret: its bottom can be removed by unzipping it open, thus revealing its contents.

The photo camera is placed on the upper half of the bag, and by opening a slit on the side you can grab it and quickly take photos through the now open bottom. Thanks to its size and features, this bag is mostly suitable for reflex type cameras (SLR), which can be a little uncomfortable to use since they are not as quick as a digital camera, or because, especially in big cities, using them may not always be safe.

In some parts of the world, in fact, sometimes a gesture as simple as pulling out your camera (especially if it is as expensive as a SLR generally is) is tantamount to an invitation for pickpockets. For this reason, you may lose that special moment or that particular sight just out of fear that your camera might get stolen.

By using the Cloak Bag, the gesture is so quick and discreet that any potential robber would not have the time to figure out what you are really doing, and would not be able to do his dirty job.

In short, by spending a mere 49 dollars, we will no longer have to regret those pictures we could not take!

Mobile phone bugging is now made easier

febbraio 22, 2010 Technology No Commenti

Ear

If you are using your mobile phone frequently, especially for private and confidential conversations, or if because of your work you always have the handset on to carry out negotiations or exchange information, a small piece of news which appeared on newspapers worldwide should legitimately sound as a warning to you.

In fact, just a few weeks ago, a young hacker from Germany has declared that he has cracked the encryption key that is used to transmit voice and data over the GSM network. This standard key is adopted by all GSM network operators worldwide, and is based on a 64-bit algorithm which, no matter how safe it is, is still much less complicated to decipher than one might think, especially when compared to the highly advanced 128 or 256-bit keys in use on more recent systems, not only in telephone communications field.

Of course, the kind of job necessary to force the codes such as the one in use on GSM networks, called A5/1, is not so easy as to be done by anyone, and the devices used for this kind of operations are generally very expensive, which so far made this technology accessible only to government agencies and law enforcement.

Anyway, during a worldwide hackers’ symposium, one of them revealed that currently it is actually possible to sneak into the GSM network, by using simple equipment which costs not more than 3000 dollars. Once this device is started, all you need is 30 minutes of work and you will easily be able to listen to mobile phone conversations within the range reached by this system.

On top of this, with software tools such as Java Virtual Machine, it is possible to install any kind of program on a mobile phone, and the user would not even notice it, making it possible to remotely listen to his conversations, turning the handset into a real spy phone.

This said, what can the ordinary mobile phone network user do to protect himself from such invisible threats?
Of course we can not just stand still waiting for phone operators to upgrade their security standards, and in the meantime have our phone conversations exposed to the risk of being bugged.

The best option we have is to add one further layer of security on top of the GSM encryption, by providing ourselves with an encrypted mobile phone, that is, a normal cellphone on which a particular software is installed, that encodes its conversations, by using a 256-bit encryption key, much safer than the 64-bit standard GSM network key.

The conversation between two encrypted phones takes place following the same principle as key-protected email. By making sure that both cellphones engaged in a conversation share the same encryption key, any eavesdropping operation which could get through to the encrypted conversation would only be able to hear a white noise, and this means that your phone calls are absolutely secure.

Therefore, you will easily be able to talk about sensitive subjects, or carry our confidential or sensitive negotiations over the phone, without any fear that your conversations might be bugged by any prying ears. Naturally, if your counterpart has a mobile phone which is not equipped with the same encryption system, should his phone be bugged, your voice could be heard; it is therefore advisable to use at least two (or more) encrypted cell phones, to be used by the people whose conversations you wish to keep secret.

For more information about how the encryption software works, and the models of mobile phones on which it can be installed, we advise you to visit the Endoacustica website, and contact our specialists for specific advice tailored on your needs.

Stealth Phone and anonymous SIM card, for an absolute privacy

febbraio 9, 2010 Technology No Commenti

More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world, and of making itself fully protected from any attempt at eavesdropping.

In fact, mobile phone call interception is carried out noy only, as one might think, by searching for the phone number, but also by using the IMEI number which identifies the handset, as well as the IMSI which is used to authenticate the SIM card mounted on our phone.

In most Western countries, SIM cards can be purchased only by presenting an identification document, and for many network operators they are also linked to a specific handset and its IMEI number. In practice, phone and SIM card are unequivocally linked to a person.

If you need to use your phone for private conversations or confidential business talks, it is advisable to keep the privacy level high by using an untraceable phone just like Stealth, which changes its IMEI number automatically each time it is switched on, basically turning into a different hone each time you use it.

Together with Stealth, the best way to maintain your anonymity is by using a rechargeable SIM card, not connected to any subscription contract which might reveal your identity to others. The problem is that in most countries, even to purchase a rechargeable card, a personal document must be presented, and this means that we would not be able to achieve a fully anonymous phone experience.

Fortunately though, thanks to Endoacustica it is possible to purchase form an extensive selection of anonymous SIM cards, that is, rechargeable phone cards, manufactured in several foreign countries, that do not require an identity document to be presented.

Furthermore, with this kind of service, recharging your credit on your mobile phone can be done with a Western Union money transfer, instead of using a bank transfer or, even worse, a credit card purchase, transactions which could become a visible link between your person and the anonymous phone number.

By adding an anonymous SIM card to a Stealth untraceable phone you will be completely safe and protected from interceptions.

In order to add one further layer of protection, we have created a new version of our Stealth software. This version, which can be used on a normal Nokia 6021 handset, will allow you to receive a notification in the highly unlikely case of an interception attempt.

In that case, your Nokia Stealth will discreetly vibrate, and at that point all you have to do is switch it off, then turn it on again to have a new IMEI number generated, and be once again safe from any unauthorized attempt at listening to your calls.

Thanks to these simple precautions, you will be able to carry out confidential business talks, private negotiations, or simply stay in touch with your loved ones, in a completely safe manner. Just make sure that your counterpart is equipped with the same level of protection and the same equipment, and you will no longer need to worry.

For more information about anonymous phone cards and invisible phones, we advise you to visit the Endoacustica website.

Micro Earpiece: Equipment No Surveillance Agency Can Afford to Neglect

febbraio 8, 2010 Technology No Commenti

Wireless Micro Earpiece

Jagson Global Network was a private detective agency run by Mr. Steve Jagson. He had a small team of eight detectives and its office located at the top floor his apartments. Jagson had over twenty years of experience in detective and surveillance activities. The agency was just four years old but gained quite a reputation for itself in the field.

The credit belonged to none other than Jagson and his acumen in utilizing advance technology for the purpose. But many times, communicating secretly with the men on mission proved troublesome for him. His men needed his guidance at many crucial moments but could not communicate openly. Going away from the scene to communicate or use of mobile phones proved a distracting and wasted lot of crucial time.

Jagson was hell bent on finding a perfect technical solution to discrete listening problems in surveillance activities. He approached none other than Endoacustica Europe, leading manufacturers of surveillance equipment. After going through their unbelievable wide range of products, he picked up Ear-GSM kit. It is a cordless invisible micro earpiece that snugs inside the ear and is almost invisible to the naked eye.

This 12x6x5 mm piece is so powerful that it can covertly listen to any conversation, without compromising on clarity, from where a cell phone is kept. It works with transmitters as well as cellular phones. This invisible micro earpiece can receive voice signal from any distance. Its standard zinc-air battery can last 50-100 hours. To adapt to latest technology, it comes with Bluetooth collar as well.

The performance of Jagson’s team enhanced dramatically. With the help of invisible micro earpiece, Jagson could guide and control his men precisely to accomplish missions.

An Illegal Empire Comes Down Crashing

febbraio 5, 2010 Technology No Commenti

An Illegal Empire Comes Down Crashing

This was going to be a never before opportunity for the City Police Department. They got an inside information that Mr. Robin Leister was hosting a big bash on his marriage anniversary; and many people wanted by police were expected to attend the party.

Leister was a famous industrialist. He made his fortune mainly in brewery and liquor business. But the police knew that he ran a drugs racket under the disguise and his anniversary bash will be attended by many people linked to his racket and drug paddling.

City Police Chief Mr. Pereira was ready with his plan. He printed a fake invitation card and trained one of his best personnel to attend the party. It could fetch crucial information about the drugs racket and the people present over there. But the problem was that except him, nobody knew the insides of the mansion where the big celebration was planned to be held. Further, only he could give the clues about the people at the party and how to deal with them.

Pereira’s experience and research came handy. He purchased Micro earpiece, a wireless ear piece that could enable discreet, two ways communication. It is so tiny that it could easily fit inside the earlobe. It requires very less energy and can operate for 15 to 30 hours on zinc-air battery. It is so sensitive that it can pick up very subtle and distant noises but filters unnecessary background noise.

Need not say, with the help of Micro earpiece, a wireless earpiece Pereira guided his man precisely to go around in the party, talk to various guests and collect critical information about the drug racket. A tiny wireless earpiece brought an illegal empire down.

How to turn a mobile phone into a bug

gennaio 28, 2010 Technology No Commenti

Cellphone

One of those actions that we take automatically and without thinking, such as turning off our mobile phone, is basically just like hanging a “Do Not Disturb” sign outside a hotel door when we want to sleep a bit more, and allows us not to be disturbed by people we do not really want to talk right now, enjoy a bit of privacy or maybe just take a short nap.

Along with all this, switching off their mobile phone might mean, for those who have something to hide, that they can talk about their private business, without worries or fear to be disturbed by prying ears… or not?

If the person in question is unaware that he is actually using a spy cellphone, the answer to this question is indeed a no. In fact, modern surveillance technology allows you to turn almost any phone equipped with Symbian operating system, into a full package for remote long distance surveillance.

Thanks to the installation of a spy software, it is in fact possible to keep constantly under control the person to monitor, listen to their conversations in real time as soon as a call is placed or received, receive on your cellphone a copy of all incoming and outgoing text messages; furthermore, for mobile phone models equipped with GPS navigation system, you can also receive geographical coordinates of its position, so as to know at any time where it is.

But certainly, the most interesting function featured by Spy Phone is certainly the one that allows to use your spy handset as if it were a real bugging device, just like the ones you see in spy movies, to listen not to incoming or outgoing phone calls, but rather to conversations taking place around it.

To do this, the spy software secretly installed on your spyphone uses the handset’s microphone to pick up sounds and voices within a range of approximately 5 meters. Just call from your normal cellphone, whose number has been stored as monitoring phone upon installation, and something amazing and unexpected will happen.

In fact, by calling from this number, the phone will not ring, nor will the phone call leave a record in the phone activity history, but instead, it will answer automatically, allowing the person at the other end to listen to what is happening around the handset, until the moment when the phone user places or receives a call; in that case, in fact, secret listening will be automatically be interrupted and the spy phone will turn into a normal mobile.

It is also possible to use the environmental listening mode when the mobile phone is turned off! In fact, it is exactly in these moments that those who fear that they are being bugged feel secure, believing that they are really safe from prying ears. Instead, if they are using a spy telephone, this is the moment when their privacy is running the highest risk.

When the spy handset is turned off, all you have to do is call from the controlling number, and even though in theory it should not be possible to talk, the spy software will give green light to your call, without giving out any visible sign of activity, and of course arising no suspicion in the person under surveillance.

If you want to know more about how spy cellphones are working, we advise you to visit the Endoacustica site, and request support from our experts, who will certainly be able to find the right option for your needs.

How a Spy Phone works

gennaio 26, 2010 Technology No Commenti

Nokia Spy

For those who do not happen to be experts of surveillance technology, the term spy phone may bring to their mind stories from a movie, with complicated secret agent machinery used to follow their targets basically anywhere.

The truth is actually very different, as a spy cellphone, even after more than a glance, on the outside looks exactly like your everyday mobile handset; and even by going through all its functionalities and features, you would not be able to see its true colors. In fact, the surveillance activity is carried out by a spy software, installed in an absolutely invisible way inside your mobile phone’s processor.

Thanks to this software, a third party listener will be able to keep in constant touch with the user of the handset under surveillance, and the latter would not be able to figure it out in any way.

All his conversations, both incoming and outgoing, will be listened to, from any distance; any text message sent or received can be comfortably read right on your cellphone; you will be able to listen to the conversations and sounds taking place around the spy phone, simply by dialing its number, even while it is turned off; And for cellphone models equipped with GPS positioning system, you will also be able to know in real time the geographical coordinates of your subject’s position.

All these functions, thanks to its invisible software, are carried out in an equally discreet fashion, without giving out any sign of activity like a ringtone, the glowing of its screen, the sound of an incoming text message and so on, and without leaving any trace in the phone activity history, which also means that no unnecessary suspicion could be raised.

The person who is remotely monitoring the spy phone can send commands by SMS to enable or disable its features and functions, to receive an activity report, a list of calls placed and received, or a list of all text messages both incoming and outgoing. These SMS messages, written in a particular easy format, are intercepted by the spy software and read as operating instructions, therefore they are not displayed on the screen.

Furthermore, always by sending a text message, it is now possible to activate the new recording function, to save conversations or eavesdropped conversations. By doing this, you will be able to record any call through the spy software, and the relevant audio file can be later sent, with another command, directly on your cellphone or your mailbox, via GPRS, Bluetooth or e-mail.

Like that, you will be able to use any compromising conversation as evidence before a court of law, to solve a child custody litigation, or a divorce, or even as a support for law enforcement to gather evidence against criminals or suspects.

In a few words, inside your ordinary cellphone you can conceal a valuable tool for complete surveillance. For more information on spy phones and how they work, you can visit the Endoacustica website and request more info.

Calendar

novembre: 2018
L M M G V S D
« Giu    
 1234
567891011
12131415161718
19202122232425
2627282930  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018

gps-gprs-tracking-system

Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …