How to discover if someone is spying on us with a mobile phone

spy phoneYou have seen how to create a spy mobile phone in a few steps: it is a very simplified version of spy mobile phones much more advanced that cost thousands of euro and, according to their creators, can help you find non-existent lovers and so forth.

There are also ways to discover if someone is spying on us with a mobile phone.

1. Insert your SIM card in another phone

First, you have to insert your SIM card in another phone from the usual one, giving it in the new mobile phone for some days. If you begin to receive strange SMS can be suspicious. Who spies on you with a mobile phone usually sends text messages containing commands to your mobile phone number to ask questions about SMS, Contacts and Call. The mobile phone spy recognizes these commands, put them in place and hide the SMS command. However, if you put the SIM into a "clean" mobile phone, you can easily read SMS command.

2. Check your phone credit

Response SMS to commands sent from who is spying you, are sent through your mobile phone. For this reason, you have often to control your phone and to occur that you do not lack money. You could charge your mobile phone, pinning the remaining credit and, without making calls or send SMS, check back often if you lack money.

3. Sign up to the website of your mobile operator

If you sign up to the website of your mobile operator, you can view the list of messages and call made ​​and received.

Even if the last three digits of the phone number are obscured, you can still realize if there is something wrong. Some spy mobile phones have an interesting feature: Who wants to spy on you usually calls your mobile phone number, so the mobile phone spy secretly takes the call and makes you feel what you are doing.

Again , you have just to check if in the time indicated on the Internet site of the mobile operator we have received calls or not,  to find out if someone is spying on us.

4. DO NOT ACCEPT MOBILEPHONES FROM STRANGERS

DO NOT ACCEPT MOBILEPHONES FROM STRANGERS if you want your privacy to be protected.

Mobile: 

Similar Content

Dec. 21 2012 - Here's what will happen today ...

According to the Mayan calendar today should be the end

of the world as we have known it.
 
But the world is already finished, and no one has noticed it,
we really are living in a limbo hidden
without memory.
 
I have this certainty.
 
You just need make connections and strive to remember
some nights in which you find yourself placed during sleep, and
as it is recurrent, and how, by asking around,
this happens to more people than you think.
 
This year has seen everything, we realized
that religion, politics, the structure
society are all based on deception and
manipulation.

Identify harmful Web Shell with PHP Shell Detector

webshell php

A web shell is a script, commonly written in PHP, which can provide access as the root user to a web server compressed. Trojan also renamed PHP can be very harmful if used correctly by an attacker, it is therefore important to periodically analyze the platform's web in search of intruders.
Development: 

Create applications with Ember.js

ember.js

If at the beginning of his career JavaScript had a role almost decorative, merely add interactivity to Web pages, over the years its role has grown allowing you to create Web pages more sophisticated. Today, the role of this language on the Web, and not only took on such importance that enable achievement of real applications, which require skills so typical of those who develop software in a professional manner.
Development: 

Tutorial Drupal Views: How to create a view

ui drupal views

Drupal Views: guide and notes
The Views module allows webmasters to drupal to create, manage and display lists of content and therefore a way of presenting the contents and tables. Essentially it is a query builder that, given some information, it can create queries, execute and lead to visual data in pages, blocks or other formats. Every single view can also have multiple views.
Development: 

Encrypted files on Dropbox with BoxCryptor

crittographyOne of the main questions on the part of users, the use of cloud-based solutions is definitely the secrecy and confidentiality of the data that are stored in the storage cloud, many fear that their data (documents, photos, code, etc..) Can first eventually be violated, and in some cases compromised, thus losing days and days of work.

Taxonomy upgrade extras: 

Gallery with effect stack of images

css imageWhen he began to spread on the main browser support for CSS3 transformations, many tutorials applied this new feature to the galleries, creating the effect that here we define 'stack of images': the base image in the foreground and behind it the levels that give the illusion of a group of overlapping photos.

Development: