Defense Against Crime


Password Correct..Access Granted

In this digital age, almost all of us are using a computer to access messages, social media cyber thief-hackernetworks, manage some aspects of our financial life, some other aspect of personal computer usage that puts aspects of our lives open to someone who has the key. I usually tell people not to hide their residence keys in obvious places, like under the welcome mat. The same common sense should be used is hiding the digital keys to the virtual residences of our lives. How safe would you feel is a crook has the keys to your house? The same sense of security should be taken when it comes to wanting to secure. One of the sad things is that we can unknowingly tell clues about our lives online in places like Facebook, or blogs, or that a thief can use to help him figure out possible passwords. If any of you have seen the 1983 movie War Games, you may remember that the Hacker was able to gain access to the system, by figuring out that the programmer used the name of his dead son as his backdoor password.

To highlight the necessity of securing your digital life should be news story accounts of security breaches at Abbot Labs,  IBM, Sony, Booz Allen Hamilton, Fox News, NBC, New York Times, Apple, Microsoft, Facebook, Twitter, Linkedin, the US Government and hundreds of other companies. These stories have exposed how insecure or unprepared these major websites and companies, to which consumers like you and I entrust their personal information really are. While we expect some level of security at a corporation, ultimately, your security is your responsibility. Unfortunately one of the side effects of this is that these stories have exposed, is just how helpless we can be. Close examination of a sample set of 40,00 username and passwords out of a sample size of over a million have revealed some interesting results.

Some analysis results:

  1. The analysis showed about 50% of the passwords are less than eight characters long. Eight characters are considered, the minimum length you should even consider when choosing a strong password.  (These passwords only take less than a minute  for a PC to crack) 2. Only 4@ percent of the passwords analyzed used at least makes use at least three of the four character types (Upper case letters, lower case letters, numbers, special characters like #|*. The vast majority only used one character type, such as all lowercase letters or all numbers.  (These passwords only take about 3 days for a PC to crack) 3.. Over 33% of the analyzed were not a random character like “qp}Edhg!13evTOI” rather than “ILikeSpock”. These analyzed passwords could be found in a common password dictionary. The most frequent passwords use included: Seinfeld, password, 123456, purple, princess, Maggie, peanut, shadow, ginger, Michael, Buster, sunshine, trigger, cookie, George, summer, Taylor, Bosco, abc123, Ashley, and bailey.  (most of these take less than a second for a PC to crack, ‘IlikeSpock’ takes about a year) 4. 67% of users had the exact same username/email and password on different systems used the same password on both systems. BAD BAD BAD

6 Simple Rules for some great passwords

  • NEVER choose passwords less than 8 characters long and that is made up solely of numbers or letters. Use letters of different cases, mixtures of digits and letters, and/or non-alphanumeric characters. The longer a password the better so strive for passwords over 8 characters long. If some systems limit the numbers of characters. It’s doesn’t have to be complex as “Picard-Delta-47-Alpha-21” or “173467321476C32789777643T732V73117888732476789764376” which would take a PC 14 octillion  years and 6 vigintillion years to crack respectively
  • Randomness is also key to a great password. NEVER choose a password based upon personal data like your name, birthday your username, or other information that one could easily discover about you from such sources as searching the internet.
  • Create a list of 10-12 such as Qy#i1827Vbsg12348()17w passwords that are random and use a password management program like 1Password or LastPass, or create and remember a password recipe or simple padding pattern.
  • NEVER choose a password that is a word (English, German, or otherwise), proper name, the name of a TV shows, or anything else that one would expect a clever person to put in a “dictionary” of passwords. Especially if it can be found it’s something you’re found of like ‘Hello Kitty’, ‘Disney’, etc
  • NEVER choose a password that is a simple transformation of a word, such as putting a punctuation mark at the beginning or end of a word, converting the letter “l” to the digit “1”, writing a word backward, etc. For example, “password,123” is not a good password, since adding “,123” is a common, simple transformation of a word. Neither is using password where you have substituted the number zero for the letter “o”
  • NEVER EVER EVER use the same password for all your logins (have at least 5).

How to Make Up a Great Password

Passwords should contain a mix of the following sets

  1. lowercase letters
  2. uppercase letters
  3. Numbers
  4. special characters !,#,$,+,%,~ etc
  5. Should be longer than 8 Characters
    1. Example the Password 1@Tf%s&E9Tewhich is based on the numbers 1-2-3-4-5-6-7-8-9-10 would take a PC 4 Thousand years to hack.

Password Levels

  • Level One – contains at least one of the character sets
  • Level Two – contains at least two of the character sets
  • Level Three- contains at least three of the character sets
  • Lever Four-contains all four character sets
  • You can Include some simple substitution like 3 for ‘e’, zero for the letter ‘O’, 1 for ‘I’, 7 to T, 2 for S

Example of how to create a good password

  1. Think of two unrelated things you like computer & socks books & dogs autumn & chocolate OR a phrase from one of your favorite movies or tv shows
  2. Join the words with a non-alphabetic character or two. (#,+,|,!..etc.)
  3. Make at least one change (for example, uppercase a letter or add another character) to one of the words (preferably not just at the very beginning or end of the password).
  • Some example passwords generated using this method:
    • C0mput3r%socks
    • B00ks #dogs
    • Autumn|choc0lat3
    • Gen3sis_Doggi3
    • 76TltbpWa110ccah# – (Seventy-six trombones led the big parade With a hundred and ten cornets close at hand.)
    • 2bo!2b_TitQ – -(To Be or Not To Be The Question)
    • I106mtC_wgaftog_hap0c_1dawws -It’s 106 miles to Chicago, we got a full tank of gas, half a pack of cigarettes, it’s dark… and we’re wearing sunglasses. Read more: Music Man – Seventy-six Trombones Lyrics | MetroLyrics
  • Books like the Bible have a great resource to create passwords as it has over 31,173 verses you can use. You can use Bible verses to create passwords like Joshua24I5$, 54Isa1ah17 *, Pr0v3rbs9_8%, J8hn316*
  • Convert from the Arabic-Hindu Number system into the Hexadecimal System so that you can say BacktoTheFuture1151955 and make it Back#T0#Th3#Future_1193D3

Biometric passwords – There is an increase of computers gives you the ability to use biometric data such as facial recognition, fingerprint, retina pattern or voice print data to generate a unique password based on your data. However, there have also been reported successful hacks for these methods.   An example of this would we be the Apple fingerprint lock, which was able to be bypassed the week it was released.

Second Key Authentication: Many systems like Facebook, Google, Yahoo, Hotmail, PayPal, and even financial institution offer second key authentication. In this method, you give the institutions your mobile phone number. When you attempt to login, the system sends a special random access code to the users mobile phone. To complete a log in the user must type in this code. Which mean they have to have your phone.

Personal Info Authentication: Many systems ask the user to select personal info questions to set up their user accounts such as the color of your first car, or mother’s maiden name, or best friend. These questions are to help users in case they have forgotten your password.  Be careful what info you select! Some information is public information or can be gathered from your Facebook profile.  For example, if your question is ‘Name of the High School you attended?’ and you are a member of the Eric Erickson High School group on facebook, then it’s not hard to answer this question.  What I can suggest is giving easy to nonsense answers like the J3di Acad3my. For example for all your selected question, put in the name of your favorite something (recording artist, fruit, book, author).  I mean if you select mother’s maiden name as your question, and typed in Mayberry.  it is highly improbable that anyone trying to hack your account will guess that.


Most computer security professionals recommend changing your Internet passwords and account login information at least once every three to six months. Though some debate if it is necessary, however, if you want to be safe change it at least once a year, like a month before or after your birthday and make it an annual reminder on your calendar. It may be safe for you to wait longer; it just depends on your computer habits, and how and where you surf the web. I recommend changing all your passwords at a minimum of once a year, perhaps the day after your birthday, or on New Year’s day, or the first day of spring (spring cleaning). Changing all of your Internet passwords can be a time-consuming and even an exasperating task, especially if you have lots of online accounts. But it is a sure way to guarantee a modicum level of safety; however, it is not the only safety precaution that should be considered for your login information. Whether you bank online or you are just sending a few simple emails, secure passwords are essential. You’ve heard of problems caused by hackers, who use your account to do illegal activity. There have been incidents of people not only hacking into people’s e-mail, or Facebook accounts but sending vicious messages.


You should avoid writing down your password or giving it to others. You should especially avoid writing it down and leaving it in a non-secured place such as on a post-it on your monitor or a piece of paper in your desk. If you absolutely must write something down (because you suffer from CRS), we suggest doing the following:

  • Don’t write down the entire password, but rather a hint that would allow you (but nobody else) to reconstruct it.
  • Keep whatever is written down in two places like a small notebook or other places that only you have access to and where you would immediately notice if it was missing or someone else gained access to it. (like in the movie Ghost)
  • Keep a list of 10 to 12 passwords of length 10 to 20 characters that you only use for 1 year, and then create new ones each year
  • Treat the not book like the One Ring – Keep it secret -Keep it Safe


There are several great websites that will examine your password and tell you how strong that is. Such sites include


However remember that hackers have tools as well, so you should have as many security measures to help reduce your chances of being hacked. Many sites link PayPal, Google, Facebook, Twitter and more have code key authentication features. You can turn these on, and when you (or anyone else) attempts to log in to your account, a numeric code is sent to your cell phone, and you need to type in that code to log in.  Sometimes it’s a hassle, especially if you lose or don’t have your phone with you.


NEVER EVER – TELL ANYONE YOUR PASSWORDS or LET SOMEONE KNOW WHERE YOU KEEP THEM..except in your will. Self-Defense Products Store is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information on the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. Victor Swindell of is a division of Onyx Knight Enterprises.



Cyber Security Tips and Tricks


Unless you have been living in a cave, you should know by now that the credit reporting firm Equifax was hacked and your personal data may have been stolen.  First, let me rant this.  At no time that I am aware of did I give Equifax, Transunion, or Experian permission, or contract with, to collect or control my credit or personal information. Did you?  Who did? What gave them this ability and why was it never challenged?  I think this in and of itself should be grounds for a law suit. I think that anyone who wants to have credit has to sign a contract to have these services.  Now the really, really sad point, with all these warning that other firms and entities have been hacked in the recent past like Yahoo (more than once),Target, Ashley Madison, Ebay, Home Depot, Sony Pictures and others Equifax should have done its due diligence to make sure they were secure.  They didn’t.  They were also warned months ago that they had a security weakness in their system. Still they did nothing. End of rant.

As hacks, data breaches, and other cyber-enabled crime become increasingly commonplace, this year’s incidents is an important reminder of the need to take steps to protect yourself and your family when using the Internet. When these breaches happen, there is very little you can do once data is breached, there are a few things you can so to limit your access to your personal information. However, companies like Equifax has all the information a person needs to open credit, get a loan, buy a timeshare, etc. using your identities.

Since October is National Cybersecurity Security Awareness Month brings to light what you already know – cruising the internet and filling out web forms can be harmful if you don’t follow best security practices. The good news is you don’t need to be a cybersecurity professional to employ smart online safety habits that can go a long way in guarding against online crime.

Cybersecurity best practices make up an expansive list of things to do, but for the individual user, the few tips below will be the ultimate steps you can take to protect your data.

How can you protect yourself?

  • Limit the amount of real information you have on your social media profile. Do you have your real birth year on your profile? What about the real town where you live? How about all the schools that you went to.  Are you providing all the information for someone to fake, being you?   What will happen when those databases are hacked…the thieves will have this information, and you provided it. Personally, I have two Social Media IDs real one and a fake one.
  • In general, be cautious with social media networking. Don’t post pictures or texts that reveal any personal information like home addresses, phone numbers, birth dates, or places you and your family regularly attend, such as schools or recreational complexes.I saw a demo where a cop was able to track a girl just from her photos. She was a cheerleader, and posted a pic.  So, he knew where she was going to school Other info she posted led him to her front door. Just as a lesson on how much information she was giving away. Someone with ill intent could use that information to harm you or your children. Don’t use the check-in feature on Facebook or the like. You don’t know who is getting that info, or are you really sure their security is working. (So did all those companies that were hacked).  When in doubt, remove it. Never accept connections from people you don’t know, and be sure you have your profile set to private so only those you trust can see your information.  See tip #1
  • Did I mention securing your Social Media, banking and other internet logins with two factor authentications? (There are articles on this blog about how to do this!)
  • Now is the time to purchase Identity theft insurance. Please note I said insurance, not a monitoring service. When South Carolina had a data breach. The state gave the people who filed state income taxes free credit monitoring. All a monitoring service does not prevent identity theft, and can only alert you of suspicious activity. If your identity is stolen, it is up to you to fix it, which can take hours, and hours, and hours.  A good identity theft insurance policy assigns someone to fix the issue for you.  This is the feature you need to shop for.


  • Think of download ‘free software’ or ‘free versions of expensive software’ like having sex with a prostitute. You may end up picking up something that can cause your computer great harm. So don’t do it. Even some web videos can contain viruses… you’ve been warned.


  • If you happen to find a USB Drive on the ground, DO NOT STICK IT IN your home or work computer. This is a common method that hackers use to upload a virus to systems that either allow them to secretly install spyware, or viruses.


  • Consider encrypting your computer. Recent versions of Microsoft Windows provide support for Bitlocker, a program that comes with Windows that will encrypt everything on your hard drive. You could also use third party encryption products. If your computer becomes lost or stolen, encryption can prevent prying eyes from seeing and using your personal data.


  • Worse than stolen data is unusable data. Aside from data breaches, we have also seen the rapid spread of hi-jacked data through the use of ransom-ware. You are wise to back up your data on a non-networked device. Also know that any data you have on connected cloud drives are also vulnerable. So be sure to discount these when you are not using them
  • Take time to learn about the IC3 (—and use it if you’re ever an id theft or internet crime or internet scam victim. The Internet Crime Complaint Center (IC3) is a reliable and convenient reporting mechanism for citizens to submit complaints about Internet crime and scams to the FBI. The IC3 uses the information from public complaints to refer cases to the appropriate law enforcement agencies and identify trends
  • Practice good cyber hygiene. This is the establishment and maintenance of an individual’s online safety. It encapsulates the daily routines, occasional checks and general behaviors required to maintain a user’s online “health” (security). This task entails A person knowing how select and maintain high quality passwords, install and maintain security software on the digital devices, keep their virus definitions up-to-date, run regular security scans on their digital devices, adhere to cyber security policies, protect their personal data, and avoid potential sources of infection. This is included at work and at home on all your connected devices.
  • Use computer/electronic protection products. A comprehensive host-based security suite provides support for anti-virus, anti-phishing, anti-malware, safe browsing, Host-based Intrusion Prevention System (HIPS), and firewall capabilities. These services provide a layered defense against most common threats, and you can enable the automated updates to keep software up-to-date. Think of it as adding a security guard, guard dogs, and electric fence around your residence.


  • Keep ALL application software updated. Since many software programs don’t have an automated update feature, attackers frequently target those programs to gain unauthorized access to a computer. Several software products will let you know what applications installed on your PC are vulnerable to attack and need to be updated. It would be wise to Install an automated software update monitoring manager such as Secunia Personal Software Inspector, FileHippo App Manager, ManageEngine or others.
  • Know the risks of the Internet of Things (IOT). Cyber security goes beyond your computer, digital devices and cell phone. Many homes are now filled with Internet-connected devices, such as home security systems, connected baby monitors, smart appliances, personal assistants (Echo, Google Home, etc) and Internet-connected medical devices. All of these devices present opportunities for hackers to spy on you and get your personal information. Using strong passwords and purchasing IOT devices from companies with a good security track record are just a few of the things you can do to protect your family and home.Keep an inventory of anything in your home that connects to the Internet. This includes video gaming systems, smart televisions, programmable thermostats, tablet, smart appliances and video security cameras, electronic locks. These devices are vulnerable to attack due to their limited ability to update their software. If a vulnerability is found in the software, there could be no way to update it to a safer version. Always change the default passwords for these devices. When possible, segment them from your home and work networks, and unplug them when they aren’t in use. Review and learn their various privacy configurations, and set them to the highest possible privacy setting. After all, do you want to have your home hacked?


  • Update your operating system in a timely fashion. This would be within a year of being released. If you are using MS Office, also keep that updated.  If you’re using Windows, bite the bullet and upgrade to the latest edition for the latest security preventions. For example, Windows 10 Home can push to your PC patches immediately upon their release. Microsoft Office 2016 can block macros from loading in certain high-risk scenarios. Macros are a set of commands intended to automate specific functions, and are often used by attackers to run malicious software on a victim’s computer. Make sure you either use auto update, or apply updates on a regular schedule.


  • If you are an Apple person, it is wise to create two accounts for your Mac. The first account created when configuring a Mac for the first time is the local administrator account. You should also create a non-privileged “user” account and use it for the majority of activities on your computer. Your administrator account should only be used to install updates or software, or to reconfigure the computer as needed. Browsing the web or reading email as an administrator provides a path for an attacker to gain unauthorized access to your computer.


  • Never ever ever ever  tamper with your smartphone base config. This is often referred t to as “jailbreaking” or “rooting” your devices. Those terms refer to hacking the software on your phone or tablet. Users sometimes hack the software on the phone to allow it to do something it was not originally intended by the manufacturer. Hacking the software can cause vulnerabilities and can void the phone warranty and open you up to bigger issues. Word you remove the lock from your house to allow easy access?


  • If you are a regular reader of this blog, you are aware of some of the type of Exercise caution when opening emails. Beware of emails with attachments or links urging immediate action, especially those purportedly from a delivery service or bank. Some malicious emails seem to come from popular businesses, but the attachments or links in them may surreptitiously download malware. When you open any email, even one from a friend, be cautious about clicking on any links or attachments. If your friend’s email account has been hacked, you could easily receive an email that purportedly comes from your friend, when in reality, it comes from the attacker.


  • Be careful when using FREE Wi-Fi hotspots. Free public Wi-Fi may cost you. When you connect to Wi-Fi, your communications may not be private unless you’re using a Virtual Private Network. A VPN allows you to send and receive data across a public network as if you were actually on a private network, so anyone intruding on the Wi-Fi connection cannot see or capture your data or login credentials. Attackers often set up “open” Wi-Fi access points with names similar to the name of the establishment. This fools users into using the attackers’ “open” network, allowing them to capture your keystrokes and spy on your communication. For example, at O’Hare Airport, there could be a fake network called Chicago Airport and an authentic network called OHare-Public. If there are no signs telling you the name and password of the authentic network, you won’t know unless you ask.


  • Be vigilant regarding common fraud and theft tactics. Look for credit/debit card skimmers at gas pumps and ATM machines. Usually hidden, skimmers are small devices that can scan and store data from the magnetic strips on the back of credit and debit cards. Pull on the card reader to be sure it is part of the permanent fixture. If it is movable, report it to an attendant and don’t use it.Scammers often attach what looks like a genuine piece of the machine over the top of the slot where you insert your card. That piece copies your card number. On ATM machines, in addition to installing skimmers, thieves often install a tiny spy camera that records a digital video of you typing in your PIN. Use a magazine, or at least your hand, to hide your PIN from prying eyes. Jiggle the part of the machine where you insert your card to see if it comes loose. If it does, don’t use the machine.

    Beware that some new cards with RFID can easily be read by someone with an RDIF reader walking next to you.


  • Use Bluetooth sparingly. Although Bluetooth is useful for connecting headsets, hands-free speakerphones, and speakers to your cellular phone, it can also be a hidden door for unwanted devices and malware. If possible please, keep your Bluetooth disabled until you need to connect to a device.


  • Backup your data. Backup your data regularly with an offline device. If you become a victim of ransomware and you only have a cloud-based backup service, your files in the cloud will also become encrypted. This includes Dropbox, Google Drive, Microsoft One Drive, Apple Drive and many others.


  • Oversee your children’s computer usage. Children should use a computer in a common area of the home so parents can ensure their children aren’t communicating with people or sites that could cause harm. Many different devices have internet connectivity, so monitor children using cell phones, tablets, e-readers, gaming devices and laptops. Know all the passwords for your children’s devices in case your child becomes endangered by someone online and authorities need to conduct an investigation into your child’s online communication. Know your children’s social networking connections and the people they play online games with. Keep computer webcams covered with painter’s tape or a sticky note when they aren’t being used to communicate with family members and friends. Attackers who have access to your computer can remotely turn the cameras on without a user’s knowledge. Regularly talk to you children about online safety, but keep the tone informal.



Internet thieves are becoming more and more clever, and it is difficult to know all the latest and greatest hacks, and trips. But if you just stick with the basics and treat your computer like a living entity you should be relatively safe. Self-Defense Products is dedicated to providing you with the best and most affordable self-defense products, survival and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high-quality discount self-defense products. Survival kits and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option.



I Hate Customers Like These

Last week received a large order from a customer in Florida for a our Nap Alarms ( This in and of itself is not unusual. It is one of our popular items that we tend to get lots of bulk orders for.  We cleared the transaction even thou PayPal said it was a NO-US email.  Again, nothing really unusual. Generally scamwhen orders come in during the evening they are sent to the warehouse the next day. The database will flag this as a ‘NEW ORDER’. The warehouse usually takes 1-2 to process orders as they have lots of them to process.  during this time the order status is changed to ‘IN PROCESS’  Once the order is processed and shipped, we then update the status to ‘COMPLETE’ and the tracking info is entered into the database. This information is related to the customer on the e-mail receipt that they receive once their order is placed.  The receipt also informs the customer that they can check their order status at any time by simply typing their order number in the order tracking page that is provided to them.

Two days after the order was placed the client started bombarding me with e-mails wanting to know the status of their order. Our customer service representative kindly responded telling the client how they could track their order. In one e-mail provided their Fedex Tracking number etc. When we attempted to call the client using the phone number they provided,we found the number didn’t work.  (597 Area code..which isn’t US)

The next thing we knew they filed a complaint on paypal (on the day after they received the order), they didn’t receive their order, and we didn’t respond to their e-mail. So PayPal immediately reverse the put a hold on the payment.  While this isn’t the first time this has happened, an in the past it was just frustration of holiday mail going to Puerto Rico.  So we gathered our evidence, the string of e-mails that we received, and our responses, along with the FedEx Tracking information, including the info from their site showing proof of delivery.  Now we have to wait up to 30 days for PayPal can make a decision.

We are looking at our policies to see what changes we need to make.

We are constantly making changes to our policies to safeguard us against scams, and paypal is good, but often slow with protecting on-line sellers.

So I ask you…what would you have done differently? is also one of the leading on-line providers of a wide variety of specialty selected high quality, discount Pepper Sprays, discount Stun Guns, and other self-defense products, as well as Guardian Survival Gear. Protect yourself and family, your home, car, school, or your business with Self-Defense Products including, real and fake Security Cameras and Surveillance/Spy Gear, Alarm Systems, Hidden or Diversion Safes or other personal Protection Products. Our premium Streetwise products are one of the best on the market and many of them are made in the United Stated. Purchasing our Lab Certified Pepper Sprays or powerful Stun Guns allow you to deliver a powerful defensive “fight back” opportunity to escape imminent danger. We also sell Guardian Survival Gear to allow you and your family to hold out in an emergency or natural disaster.


Pepper Spray Day Catches Students’ Eyes

pepper_sprayI saw this article from one of our clients about their Pepper Spray Day(  We have been working with Virginia Common Wealth University for the past few years providing them some of out best Personal Alarms

There are a wide variety of personal alarms on the market. Choosing the correct one for you can sometimes be tricky. Read on for tips on how to make the right choice.

The point of a personal alarm –  The function e of a personal safety alarm is to shock and disorientate an attacker, giving you vital seconds to get away.

 Personal Alarms Important features 

  • The most important feature of an alarm is the sound it emits. If an attacker is to be shocked enough to pull away from you, this sound needs to be as loud and as shrill as possible.
  • It also needs to be different from those which are commonly heard. For example, if a personal alarm pulsates like many car alarms, the sound may not be as effective as it is not so shocking.  How many times have you ignored car alarms? The most effective sound is continuous and over 130 decibels (approximately 138db is ideal).
  • Your person alarm needs to be easy to carry and easy to use. However, consider whether a very lightweight and tiny alarm will be as loud as you need it to be. Consider if it is so small that, it will get lost at the bottom of your bag, or in your laundry.  Some small alarms can still be very loud – although the sound may not last for very long – and can be easier to handle for some people.  The best compromise is in an alarm which can fit easily into the palm of your hand but is still very loud.
  • Ease of use also needs to be considered: How would you operate the personal alarm in an emergency? There are many different ways to activate different types of alarms, including push caps, push buttons and pull out pins.  How fiddly is it to activate it?  Do you have problems using your hands or fingers?  Can it be operated simply by being pushed against something?

When,, where  & how to use a personal alarm

The primary purpose of a personal alarm is not to attract or help. You cannot rely on them to do that.  Firstly, there may not actually be anyone within earshot. Secondly, hearing an alarm does not necessarily attract help.  Often personal safety alarms sound like a car alarm and we are all desensitized to this sound and often ignore it thinking it’s a false alarm. The most effective sound is a loud continuous shriek.

If you are able to attract the attention of people nearby, you are more likely to get help if you shout a specific instruction – such as “Help! Call the police!”  This makes it clear that you are in danger and need help.

Once you have set off your alarm, leave the situation as quickly as you can, moving to a busy area if possible.  Don’t wait to check that your alarm has had the desired effect; just go.

Remember that a personal alarm should be just one part of your personal safety plan: There are lots of other ways in which you can help yourself to avoid violence and aggression.

Some of our personal alarms also have multiple functions such as serving as anti-theft devices, door alarms, and much more

For more safety advice and products including a selection of personal safety alarms, please click here to visit our online store. is dedicated to providing you with the best and most affordable self-defense products, and safety products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for protection, home security, business security, purchase our high quality discount self-defense products and arm yourself with the knowledge about self-defense and security products and information of the best way to stay secure in an ever-increasing violent world. In today’s society, being equipped mentally and physically is no longer an option. is a division of Onyx Knight Enterprises


How your House got Hacked!

Many of the top out of the box home security systems sell high-end systems designed to look as if they will provide you with the best security to protect your residence and family if 13_hai_panelsomeone decides to target your home.  Many of these new systems allow you to control and monitor your system remotely. While statistically homes with a home security system are less likely to be targeted by robbers than those with one, don’t think your new high-end system is perfect.  As someone said if you build a better mouse trap, nature will build a better mouse.

You see all those fancy electronics have inherited flaws. For example two researchers say that some of the top-selling home alarm setups can be easily subverted to either suppress the alarms or create multiple false alarms that would render them unreliable. False alarms could be set off using a simple tool from up to 250 yards away, though disabling the alarm would require closer proximity of about 10 feet from the home. Thieves can walk up, pick your lock, suppress your alarm, do what they want, and then leave without so much as a peep from your alarm,

The underlying technology of many of these wireless alarm systems rely on radio signals between the various wireless components and depending on the setting on the alarm panel and the sensors the alarm system will interpret an event.  With the right equipment you can pick up and decrypt those signals and do what you will.  Now mind you most burglars don’t have this type of equipment, but high-end neighborhood will attack high-end crooks.


Additional Resources is dedicated to providing you with the best personal protection products on the market to meet the security needs of you, your family members or your business, by assisting anyone who is unwilling to become a victim of crime.  If you want to take personal responsibility for yourself, your home or your business, buy our high quality discount personal protection products and arm yourself with the knowledge of the best way to stay secure in an ever-increasing violent world. In today’s society being equipped mentally and physically is no longer an option.

Next Page »

Blog at

%d bloggers like this: