Support Philippine Internet Freedom Alliance Online Protest

Show your support for the Internet Freedom and Freedom of Speech in the Philippines spread this message that the government will take actions to review the Cybercrime Law ʀᴀ ɴᴏ. 10175. I also got this information on Facebook and Twitter and I’m just sharing it here on my blog. Here is one example of the call to action.

TODAY, 02 October 2012, the Supreme Court sitting en banc is set to hear several petitions for prohibition against the Cybercrime Prevention Law.

If the high court junks these petitions and disapproves the request for a temporary restraining order (TRO), the Cybercrime Prevention Law will take effect the following day, forever changing the Internet landscape in the Philippines — possibly even killing Internet freedom.

As a sign of protest, please take down your profile pictures and cover photos and change it to a simple black image.

We also call on website administrators in the Philippines to take down/blacken their websites starting 12 midnight in protest of the looming implementation of the draconian law. There are several plugins available in the net to do so (GIYF).

With enough websites participating, we can be a formidable force that can compel the government to think twice.

If you’re active on social media you can change your social media profiles and show your friends, followers about this law suppressing Internet freedom. If you have your own website or blog follow the instructions here on how to participate on Website Blackout Protest self hosted blogs, Blogger and Tumblr is supported by the script. Show your online support now!

How To Monitor Or Track A Smartphone

Smartphone tracking

A Smartphone is a mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a regular mobile phone. Smartphones have become very popular and about 18% of the global population uses Smartphone. The current models combine the functions of portable media players, low-end compact digital cameras, pocket video cameras, and GPS navigation units.. Some of the popular smartphones available in the market are Apple, Motorola, HP, HTC, Nokia, Samsung, RIM, LG, Palm and Sony Ericsson.

Some of the exclusive features in a Smartphone include a unique operating system to run the applications.. A Smartphone has an exhaustive list of applications. It is very easy to download and use any available application. It can be used for accessing Microsoft Office documents or composing a playlist of digital tunes or as an electronic book reader or to play games. The technological advancements have resulted in great devices like Smartphone, but have also brought out a flurry of cybercrimes. This required the need for mobile monitoring software. There are available many such mobile applications. Some of them are Mobile Spy, Mobistealth, FlexiSpy, Spybubble, and Cellspy to name a few popular ones. Cell Phone Spy is the first mobile Smartphone monitoring software with a trusted customer base of 100,000 worldwide.
Installing Mobile Monitoring apps

To track any kind of Smartphone, the user needs to install any one of the above mentioned monitoring apps on the Smartphone. The user has the facility to create an online account with app website through which the user can track the day to day activities of the Smartphone. Almost all kinds of mobile monitoring apps work in stealth mode which is an advantage when the buyer has to monitor the activities of kids, partner, and employee.

To monitor a Smartphone the mobile app users can check details like:
•    Call Log: With this Smartphone monitoring feature a parent or an employer can find details regarding the calls made/received and the time and duration of the child or employee.
•    SMS Texting: It is highly essential to monitor child’s Smartphone for sexting. Children would be abused and hence very essential for parents to monitor the contents of messages with full texts.
•    Email tracking: Helps to know the contents of the mail and also the contacts from and to whom the mails are sent and received. It would help employers to know if any company sensitive information is being compromised   by any employee.
•    Web History: This feature maintains the URL addresses of all the web sites accessed. This would help the parent to know if the child was viewing any inappropriate information.
•    Photo and Video Log: Child pornography is on the rise along with the increasing number of pedophiles. This makes it necessary to monitor the videos and pictures taken or recorded using the phone.
•    GPS location: The GPS tracking feature helps to know the location of your child and ensures his safety. It is also beneficial for employers to know if the field staffs are at designated locations.

The functionality of all monitoring software is almost the same except for a few additional features in some of them. The ultimate goal of all is to uncover the truth. The very purpose of installing such applications is to nab the culprits.

[box type=”info”] Guest Post:Lucille J Cronk is a blogger who is enthusiastic about writing a blog on cell phone technology and other applications.[/box]

How to Secure Smartphones

Nokia Lumia 900 Smartphone

As a matter of fact, smartphones such as Android and iPhone are more prone to security threats than desktops and laptops, especially while using their WiFi feature. As more and more people are embracing smartphones, these intelligent gadgets are becoming the hit targets of hackers who always seek to spy for stealing critical information. However, with the advancement in the technology, these smartphones are now supporting more and more security features so that the risk of different threats is minimized. Right from the built-in security features to the third-party protective apps, the smartphone technology has really challenged the intruders and even the owners to misuse the phone in the presence of these security options. So, here are some of the most reliable ways to secure your smartphone.

Set up a Password
As usual, securing the phone with a password even today is the easiest way to start. Today, a majority of smartphones have a built-in password protection feature that allows locking your phone. However, there are different ways of password protecting your phone. For example, any Android phone, except for 2.2 Froyo, comes with a swipe grid pattern wherein you connect the dots to form your own pattern to lock the phone. Irrespective of style and type, the password-protect method will only be successful if you choose a complex phrase or pattern.

Install an antivirus
This is the most common way of securing your smartphone from viruses, bad apps, malware, and unauthenticated access. The desktop rulers such as McAfee, Norton, and AVG have already come up with their own unique antivirus version for smartphones, which are either available for free or at reasonable price. Do check out the Android market or iPhone store for apps! And yes, after installing, ensure that you keep updating the antivirus app. This is because the latest patches make it possible for the app to deal with new threats.

Install an advanced spying app
In case you want to track a lost smartphone or wish to keep an eye on what is happening on your kid’s phone to ensure her/his security, get an advanced spying app. The most admirable feature of such an app is that it works in an invisible mode after installation so that your kid or the robber does not come to know about your spying activity.  Moreover, you can keep an eye on the calls, e-mails, SMSs, MMSs, downloaded or captured multimedia, and live GPS location from a remote place just with the help of a PC or mobile Web browser. Some apps, such as phone spy, give you a complete control of the phone’s live screen via a Live Control Panel on its official site so that you can stop the risk activities.

Take a Backup
Many times, the only way to deal with a virus is to format the phone’s memory. Therefore, it is wise to take backups of your phone book, apps, photos, videos, and messages on regular intervals.  Disable Wi-Fi or Bluetooth As a rule of thumb, you should always turn off the wireless features whenever you are at a crowded or strange place. If they are kept on, hackers can easily gain access to your phone from a remote location. Even if you want to use the features, ensure that the data you exchange is encrypted.


[box type=”info”] Guest Post:Lucille is a blogger who loves to blog on various mobile phone applications and tools. She has garnered special interest for mobile spy technology.[/box]

Join Us on Open Web Day @ Asian Institute of Management

Open Web Day @ Asian Institute of Management

Mozilla Philippines community and Wikimedia Philippines joined forces to give open source workshops on Firefox localization and wiki editing. Join us for a day long of fun contributing to open source projects that we are using everyday. This will happen on Saturday May 19 , 2012 at the Asian Institute of Management, TPIC and BANCOM Room, Asian Institute of Management, 123, Paseo De Roxas, Makati. You can register online and invite your friends, the venue can handle 100 participants so keep em coming. It’s not a computer laboratory so participants should bring their laptop or tablet pc for the workshop.

This is a FREE workshop and If you have any questions about the event don’t hesitate to contact us. We are more willing to help you.