1.Fire Challenge- Chest
Teens apply fluid such as alcohol over their chest area. This usually takes place in the shower in order to put out the fire but a large number of teens are doing the firechallenge without being near a water source. Once the fire is lit then the participant along with friends put out the fire as fast as possible.
2. Fire Challenge- Hand
Teens apply alcohol all over their hand and then set it on fire and then quickly douse it with water or fan the flame out.
Make sure that you talk with teens in your household and your community about this deadly internet craze. One youth in Kentucky almost lost his life due to playing this game. Unfortunately his friends were not able to put out the fire fast enough thus resulting in significant burns.
]]>Unboxing the Nexus Galaxy,
mSpy ships the smartphone phone along with a one page instruction page with login credentials. The instructions shows users the steps to log in to the mSpy dashboard to monitor the phone. mSpy installs all of the monitoring software at their corporate offices prior to shipping to customers.
Mspy Features (Premium Subscription)
Cell Phone Activity
mSpy has an impressive UI dashboard that allows parents to run analytics on cell phone usage. The images above show usage between cellphone activity and messaging apps. Parents can also determine who is receiving the most calls. A great way to set up peer approved contact lists with teen.
Text Messages
mSpy logs all text messages that are made through the native SMS phone app. Texts to several phones were made and all of the text messages appeared under the text message dashboard. You see the name and number of the text along with a time stamp for when the text was sent or received. One glitch with mSpy is that MMS texts are not captured by the phone. Multiple texts that were sent with a picture attached were not logged by the server.
Location
mSpy location feature is one of the best features of the phone. mSpy utilizes google maps to provide the location of the phone. The users can either use the map or satellite view. It also lists all of the addresses that the phone has traveled. This is a great feature to monitor teen’s whereabouts when they are outside of the house without permission.
Photos
mSpy uploads every photo taken by the phone to the cloud. You can view all photos that are taken and stored on the phone. This feature does not support photos that are taken by third party apps.
Browser History
mSpy tracks every website that user visits through their mobile browser. The number of times the site is visited along with the name of the site. Users can click on the link to visit the sites that were visited by the user. The application also notes websites that are booked marked by the user.
Email
mSpytracks all emails that are set up on the phone. We used several google accounts for the test and all of the emails for that account were displayed on the mSpy Dashboard.
Uninstall App
mSpy feature allows you to monitor all mobile apps that have been downloaded to the phone. There is the option from the dashboard to block the apps from being operated. This feature is only powerful if the users know that they are being monitored.
Keylogger
mSpy key logger feature is the best feature for parents. It is the best way to monitor third party apps. Key logger allows you to capture username and passwords that are used by third party apps. Messages from the text are also logged by the keylogger. All passwords and messages can be viewed in the control panel.
Cost Savings
One huge benefit to mSpy is the cost savings on monthly cell phone plans. Since the phone comes unlocked, parents don’t have to be worried about being locked in to 2 year billing plan. No worries of teens increasing cell phone bills due to texting. Parents on average can save at least 50 dollars a month on cell phone bills.
The major advantage of mSpy is that it is a bundled package. The company is providing a turnkey solutions to parents and employees. The mSpy phones are ready to operate right out of the box. Parents don’t have to worry about confronting teens over tracking software. mSpy cell phones are the most comprehensive software and hardware to hit the market.
]]>Cambridge police are looking for a young man that sucker punched a male and his girlfriend leaving a local furniture store over the weekend. Surveillance Cameras from the store video taped the entire incident. According to authorities, the same male is a suspect in other assaults that took place the same day.
]]>Yik Yak was designed to allow college students to share anonymous stories that take place on campus. In our review of the app a lot of Yaks popped up regards to things that were happening on the campus of Georgia Tech. Yak maybe appropriate on a campus with thousands of students. It is less likely that the app will be taken serious by young adults. The problem for parents is that the app has caught fire in local high schools. Principals since the release of the app have been dealing with incidents of bullying. Some principals have went as far as banning the app.
In response, Yik Yak has created a zero tolerance policy against cyberbullying. Any users using full names or telephone numbers will be banned from the app. This policy is having a small impact due to app users complaining on Google Play that their accounts are being deleted due to bullying.
It is important for parents to block this app or delete this app off their teen’s phones. The developers clearly intended for the app to be used by adults. The app is rated 17+ in the App store for Nudity, Sexual Content,Crude Humor, Drug Use, etc. Parents can also request that school IT departments block access to the app within the school.
Please let us know below if your child has come into contact with Yik Yak.
]]>If true, this maybe one of the best social media shaming campaigns to hit the internet. Most social media shaming content is mostly for the parent’s entertainment and the embarrassment of the teen. At least this mom is teaching her child a lesson and contributing to a worthy cause.
What are your thoughts?
]]>It is only appropriate that we look to the work of Dr. Martin Luther King this weekend for answers. So we look at Dr. Martin Luther King’s 6 Steps to nonviolence to seek an end to the violence that is taking place through cyberbullying.
1. Gather Information
Dr. King urged his followers to learn all the information possible through community organizations and the media in order to confront their enemy. It is vital that we follow the same steps by learning all we can about cyberbullying. This all can be accomplished through following anti-bullying organizations on social media sites such as Facebook and Twitter. Churches can hold forums on cyberbullying to educate their members. Schools need to continue to provide symposiums and workshops on cyberbullying.
2. Educate Others
Dr. King built the civil rights movement on educating others of social and economic justices that were happening in the community. Cyberbullying is a hard issue to provide education because most victims are too embarrassed to discuss the violence that it taking place. Since most of the bullying is taking place through text messaging or emails, there is a one on one line of communication that leaves others out. Therefore, the education has to come from the people that are the closest to the victims.
It is not enough for cyberbullying experts and community leaders to educate the community. There has to be a grassroots movement to learn about cyberbullying. These types of movements take place in the living room. It require mothers to talk about their child’s bullying experiences at work or at the grocery store. Fathers educating their friends on the dangers of cyberbullying. Victims have to educate the public of the violence they have suffered and continue to suffer through Youtube videos and other social media outlets.
3. Remain Committed
The civil rights movement continued their mission despite all of the legal obstacles that were endured along the journey. There has to be a strong commitment to stop cyberbullying. Citizens have to commit to Cyberbullying campaigns.Victims have to continue to lobby law makers to pass stronger policies. Parents have to hold mobile app companies accountable for their platforms that shield cyberbullies. Freedom of Speech cannot be a shield to up hold harassment and hatred.
4. Peacefully Negotiate
Dr. King was masterful at understanding the plight of the oppressed and oppressor. It is not enough to only listen and acknowledge the victims of cyberbullying. We also have to listen to the cyberbully. We need to obtain a deeper understanding of why they resort to digital violence. Research shows that some cyberbullies are dealing with underlining mental health disorders.Most cyberbullies are former victims of bullying themselves. Thus there exist a commonality between the bully and victim that could lead to resolution.
5. Peaceful Action
Non Violent actions and interventions were the hallmark of the Nonviolence Movement. Dr. King demonstrated this step through countless marches and peaceful sit-in demonstrations. In order to stop cyberbullying, some of the same tactics have to be employed in communities. Demonstrations and pickets can take place at corporations and small companies that uphold bullying behavior. Twitter and Social media campaigns can be waged against known cyberbullies.
Dr. King once said that “all we will remember in the end is not the words of our enemies, but the silence of our friends.” We have to teach our children not to stand by silently on their computers while other are harassed and bullied. They have to become digital citizens that stand up to cyberbullies by reporting and flagging their actions on the internet. They have to confront twitter tribes that perpetuate bullying and harassment that often lead to physical violence.
6. Reconcile
Dr. King popularized the term the benevolent community. King argued that the end game is reconciliation. The victim through love is able to forgive the bully. A Foe could easily be turned into friend. Dr. King was once quoted in a speech:
We must develop and maintain the capacity to forgive. He who is devoid of the power to forgive is devoid of the power to love. There is some good in the worst of us and some evil in the best of us. When we discover this, we are less prone to hate our enemies.
Only through the love and understanding of cyber bullies will we be able to forgive their actions. This is the last step that has to take place before reconciliation.
In order to resolve cyberbullying, sometimes with have to review our past for the answers. Dr. Martin Luther King’s philosophies of Non violence continue to guide us today in addressing some of the newer forms of violence that plague our communities.
]]>After the attack was uploaded to popular hip hop site World Star Hip Hop, countless memes appeared on Twitter. This memes pokes fun at Chris Brown and Rhianna domestic abuse incident.
The crowd source bullying moved from Twitter to Vine. There were several vines made within hours. Here is one that sets the entire incident to music.
The crowd source bullying continued on Thanksgiving. Sharkeisha’s Twitter Tribe used Thanksgiving hashtags to glorify Sharkeisha’s fight. The Twitter Tribe gave thanks to Sharkeisha as a joke. There are rumors that Sharkeisha’s victim may have committed suicide. The countless submissions of tweets, memes, vines, has the potential of leading the victim to self harm.
Parents have to promote digital citizenship in their household. Young people have to stand up for the victim and denounce this type of behavior on social media sites. Once teens like Sharkeisha realize that this type of behavior is socially unacceptable crowd source bullying will decrease.
]]>Our development team worked long and hard to fully support video playback on the PS4 browser. There were many hurdles to overcome, specifically with the PS4’s lack of flash support. Our team needed to find ways around this to deliver fast, streaming video and thus being able to give our users the option of using PS4 for all their Pornhub needs! This wasn’t an easy endeavor, but we put a lot of time into it as we felt it was very important and are proud to support our browser use on the system.
Today the popular streaming site Twitch has come under fire due to people using the Playstation app Playroom and the Playstation eye add on to broadcast sex shows. Game revolution reported a story over the weekend regarding a man that was exposing his wife’s breasts. Through the playroom app, the man lifted up his wife’s shirt several times and eventually stripped her naked while streaming the entire sequence on Twitch. Twitch is currently warning users through social media that all accounts that broadcast non gaming video will be banned and deleted from the service.
Parents must be vigilant in monitoring the Playstation 4 to ensure that their children are not targets of the porn and sex industry. Here are three ways to ensure that your child can’t access porn intentionally or accidentally:
Ban Twitch- Although Twitch is banning users that post non gaming content, parents should still block this service until better filtering software is developed to prevent sex and nudity.
Shut the Eye- Do not purchase the Playstation eye for your child’s Playstation 4. This prevents your child from recording and streaming inappropriate content. If your child already has the eye add on, then ensure that the camera is used in the presence of adults.
Parental control- Sony’s Playstation site has a dedicated page on how to enable parental controls on the Playstation 4. Parents can block the web browser, chat feature, and other features of the console. Parents should set parental controls prior to giving the console to their children.
These three steps will allow your child to enjoy the new console and also give you a peace of mind that porn will not be streaming live in your living room.
]]>The teens in the interview seem to be desensitized to the violence. Most of them are smiling and giggling during the interview. This seems normal and rational in their world. Video games such as GTA has desensitized teens to this level of violence. One could argue that teens playing the knockout game are mimicking the knockouts from GTA. A recent study indicates that teens that play mature rated violent games try to enact the violence from the characters in the game. Here is an example of a GTA knockout compilation. Look how similar the knockouts resemble the recent knockout game incidents.
Knockouts are one of the most hyped features of GTA 1-GTA5. There are dozens of YouTube videos teaching teens how to perfect their knockouts in the video game. GTA has come under pressure in the past due to teens acting out the video games scenes in real life. There have been several grand theft auto inspired murders over the years. Comedian and activist Bill Cosby linked GTA to a prep course for prison.
A Study Released by Pew Research indicates that black teens from lower socioeconomic backgrounds are playing games with video violence at large numbers. This is contributed to parents who don’t have a clue about the violence in these games. Parents are purchasing GTA for their underage teens while ignoring the mature labels. African American teens are playing games like GTA in large numbers. There are several African American criminal characters that are prominent in GTA. Criminal fictional video characters become role models for so many African American teens that lack role models in their families and community.
Parents will have to step up their monitoring of these games to ensure that teens do not mimic the behavior in GTA in real life. Play the games without the presence of your child to get a feel for the game and to determine the level of violence. Conduct Youtube searches to view other teens playing the games to determine if it is appropriate for your child. Visit gaming forums or public forums such as Reddit to see how the game is being discussed by other teens.
The community will also have to step up and resolve these deadly issues. The Toy Gun Buy Back program is a great example in St. Louis. Pastors are allowing parents to bring in violent video games and guns in exchange for non violent games, building sets, and other craft like toys. It’s these types of programs that will go a long way in stopping the violence.
]]>There are similar child locators on the market to the Toddler Tag that take the shape of various animals. We wanted to test the Toddler Tag at an outdoor event to determine the effectiveness of the product. The Annual Elijay Apple Festival was our choice of venue. The apple festival was chosen because of the number of attendees and its location in the North GA mountains to test any frequency issues.
Range
We tested the range of the toddler tag with our 5 year old whom the device was placed on her belt. Per the manufacture’s instructions, the alert feature did chirp around 30 feet away. Unlike similar devices, there were no false alarms or chirps with the unit that was supplied by Brickhouse Security. The range was also tested within a house to determine if walls or wifi would cause interference. By walking to a part of the house that was over 30 feet, the alarm went off without any problems.
Alarm
The manufacture states that the alarm can be heard at 56db with the push of the alert button. When our 5 year old had reached 30 feet, we could hear the chirp from the receiver attached to her belt. This is important because their were lots of people and music being played during the festival. The alert is definetly loud enough to alert parents of the location of their child and scare away potential predators. It is important to note that their are competitive products that claim their alert being from 80-90db.
Wearability
They key to child locators is whether or not the child will wear the device or take it off. Originally, I was of the opinion that the Toddler Tag was at a competitive disadvantage because the device is not molded into a cute teddy bear or bug. After using the product, I think that the Toddler Tag may be at an advantage. Most kids will not see this device as a toy therefore they will be less incline to take it off and play with it. Kids will treat the Toddler tag as a device that is placed on them by their parents.
The Toddler Tag can be placed on a shoe, belt, or placed in a book bag. Due to the size of the Toddler Tag, we recommend that the Tag be placed on a belt. It may be a litle too big for a toddler’s shoe. Belle is a picture of the device on my 5 year old.
Durability
The Toddler Tag is made of hard plastic that is not easy to damage or take apart. Brickhouse earns marks by creating a product that toddlers will not be able to destroy. The Toddler Tag is also water resistant in case you are caught out in the rain or the little one jumps in a puddle. Additionally, there are no small pieces which prevents any choking.
The Toddler Tag is perfect for toddlers due to its durability. Our test at the Apple Festival proved that the alarm works in a busy and noisy environment. Test of the range was flawless without any false alarms. Spy parent recommends this product for toddlers.
]]>