ASM Software Blog

Facebook-fueled “rager” party caused $45,000 in damage

by Slava 28. April 2010 16:03

The urbandictionary defines “rager” as:

“A larger gathering usually of highschool or college students where massive amounts of alcohol are consumed”.

Well, this sounds like a big trouble, is not it?

But big trouble can easy become a big disaster if social networking is involved. This is a typical story: parents went to the trip to Paris and left their 18-year old son in charge of the house. So far nothing is unusual. I've been in this shoes first as a teenager, second as a parent. But in this case son's schoolmates announced a “rager” on Facebook. As News Channel 8 reported, “Close to 100 kids showed up and caused $45,000 in damage.”

As parents said: “They couldn't possibly imagine...what this must be like for the family because this has turned our life inside out, upside down.” Police arrested four teenagers in connection with this case. The power of social networks can multiply trouble into a disaster several times fold. This is the power of modern technology. What you as a parent need to know – how it is been used.


Link to the original story:



Tags: , ,

Sexting – what is it and how to deal with it

by Slava 14. February 2010 16:02


In Wikipedia (, the term "Sexting" is defined as "Sexting (a portmanteau of sex and texting) is the act of sending sexually explicit messages or photos electronically, primarily between mobile phones."

From the technical standpoint, it requires to have (a) digital camera and (b) device for sending messages (emails) with pictures, such as cell phone or computer. Modern cell phones, such as iPhones, SmartPhones or BlackBerries  has all these capabilities – camera and Internet connection.

The social danger of sexting is that these messages or photos can be widely distributed over the Internet beyond the originator's control.

Sexting could have very serious legal consequences if it involves someone under the age of 18, because it constitutes child pornography, according to Parry Aftab, an Internet privacy and security lawyer. "If you take a picture, you can be accused of producing child pornography; if you send it to somebody, you can be accused of distributing child pornography; and if you keep a picture, you can be accused of possessing child pornography," Finally: "Anywhere along this chain of transmission of the images, you can be charged as a registered sex offender."

FBI's Parent's Guide to Internet Safety ( suggests:

"Review what is on your child's computer. If you don't know how, ask a friend, coworker, relative, or other knowledgeable person. Pornography or any kind of sexual communication can be a warning sign."

"Monitor your child's access to all types of live electronic communications (i.e., chat rooms, instant messages, Internet Relay Chat, etc.), and monitor your child's e-mail."

But this could be a difficult task to do, especially consider the very sensitive matter of monitoring. If you need private monitoring of emails, webmails, instant messenger's chats, websites visited, you can easy use BlackBox Security Monitor. It is very effective and it is free.


Tags: ,

P2P networks (BitTorent and others)

by Slava 15. December 2009 14:01

There is an excellent web site of Parry Aftab: with lots of useful information about online safety for parents and children. One of the online safety aspects is downloads from Internet. The site talk about music downloads from P2P (pier-to-pier) networks and contains useful tips for parents.


But its technical part could be updated with explanations about the most resent picture of P2P technology. First of all, P2P networks are been used not only for distribution of mp3 music files, but mainly for sharing videos and also computer software. The majority of P2P music, video and software content is illegal and violates US and international copyright laws. It includes ripped DVDs and CDs, captured cable and satellite TV broadcasts, cracked programs and games. There is also some legitimate content – for example distribution of free software, such as Linux, but this is just a small drop in big ocean.


The most popular type of P2P network is BitTorrent. According to British Web analysis company CacheLogic, BitTorrent accounts for 35 percent of all the traffic on the Internet. This is more than all other P2P networks combined and much more compare to popular media sharing Web sites such as Youtube or Facebook. The easy of use and abundance of media content (more than Netflix or your local Blockbuster) makes it irresistible for young computer users.


To use BitTorrent, one need to have a client – a program for downloading files from BitTorent. According to Wikipedia, there are 56(!) different BitTorrent clients. To make things even more complicated, there are several free libraries, which allow writing even more. So – if you want to know – is this computer uses BitTorrent by searching for particular software - which one to look for? There are also claims about blocking of BitTorrent. Well, the recent enhancements in BitTorrent protocol, such as traffic encryption, using of DHT (distributed hash table) and random ports makes it very difficult to detect and thus to block.


BlackBox Security Monitor has a feature that guarantees detection of any kind of P2P downloads. This is alerting on excessive network traffic. Turn it on and you will be notified on unusually high amount of data, transferred from outside of your home network.

Tags: ,

What is BlackBox?

by Slava 17. November 2009 14:21

Black box or black box approach is a science term to describe situation when you don't have a knowledge or simply don't want to know the inside details of something. Instead of trying to understand the nitty-gritty details of a complex system, you can describe it in terms of input and output. In this case you can left the internals inside the black box, hidden and invisible.

In aviation black box is a popular name for two on-board devices: flight data recorder and cockpit voice recorder. These devices are designed to survive the plane crash and provide all the information to determine the actual reason of what happened. This means that black box is practically indestructible. The interesting thing is that actually air plane's black boxes are not black, rather orange to be easier found and recovered.

Our BlackBox Security Monitor is also designed to be a reliable, indestructible recorder of very important data – computer activity. To see what it capable to do – download BlackBox now! One thing to consider – this is a 100% free product.





Comment RSS


<<  October 2020  >>

View posts in large calendar