SlideShare a Scribd company logo
1 of 6
Download to read offline
Fonegard App
Protect your Mobile
Phone from Theft.
About Fonegard:
Fonegard is a mobile application created to help individuals
safeguard their phone from thieves. The mobile application
works for users of Android Operating Systems only. Every
year, thousands of mobile phones are stolen across the
globe.
Billions of pounds are racked up by thieves, which
ultimately leads to an increasing amount of money spent by
people on the purchase of Phones each year.
The Fonegard App instantly detects when the phone is
disconnected from the bluetooth Device. A loud alarm is
triggered and the camera starts flashing.The shout of:
‘Help! Stop Thief!’ is instantly started to alert the person
that the phone is in danger.
How To Operate?
When you know you are entering an are prone
to phone theft, like a town or city centre, or
anywhere you feel you want protection:
Turn on your Bluetooth Device.
Start Bluetooth and pair phone to Device.’
Open up your ‘Fonegard’App.
Press ‘Start’
• When you are in a ‘safe’ area, an area you feel you
are not in danger of attempted phone theft, Simply
open the Fonegard app again, and press ‘Stop’, then
close your phones’ bluetooth.
Fonegard app

More Related Content

Viewers also liked

UNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATOUNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATODayanuquis
 
Best Security app | Fonegard
Best Security app | FonegardBest Security app | Fonegard
Best Security app | Fonegardpitersonsmithuk1
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textosNico9901
 
Freelancing part 1
Freelancing part 1Freelancing part 1
Freelancing part 1David Fudge
 
Freelancing part 2
Freelancing part 2Freelancing part 2
Freelancing part 2David Fudge
 
JavaScript is Eating the World
JavaScript is Eating the WorldJavaScript is Eating the World
JavaScript is Eating the WorldDavid Fudge
 
troubleshootingver2
troubleshootingver2troubleshootingver2
troubleshootingver2Indra L Gaol
 
Operative otolaryngology
Operative otolaryngologyOperative otolaryngology
Operative otolaryngologynisreenbagi
 
Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Sean Fackrell
 

Viewers also liked (13)

UNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATOUNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATO
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Best Security app | Fonegard
Best Security app | FonegardBest Security app | Fonegard
Best Security app | Fonegard
 
CAREER DAY
CAREER DAYCAREER DAY
CAREER DAY
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textos
 
Freelancing part 1
Freelancing part 1Freelancing part 1
Freelancing part 1
 
Freelancing part 2
Freelancing part 2Freelancing part 2
Freelancing part 2
 
JavaScript is Eating the World
JavaScript is Eating the WorldJavaScript is Eating the World
JavaScript is Eating the World
 
troubleshootingver2
troubleshootingver2troubleshootingver2
troubleshootingver2
 
Key topic (1)
 Key topic (1) Key topic (1)
Key topic (1)
 
Operative otolaryngology
Operative otolaryngologyOperative otolaryngology
Operative otolaryngology
 
Anti-theft solution app
Anti-theft solution appAnti-theft solution app
Anti-theft solution app
 
Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2
 

Similar to Mobile security apps | Fonegard

Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker softwareGerryspeck
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentationremiwanless
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for androidiYogi
 
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID Mary_Robinson
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossWireless Solutions NY
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirusconnectsafe
 
Android spy-app
Android spy-appAndroid spy-app
Android spy-appSPY24
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackersAndrew
 
Women Security in India
Women Security in IndiaWomen Security in India
Women Security in IndiaOptisafeApp
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)Poojaagrawal130
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Naval OPSEC
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloningGudia Khan
 

Similar to Mobile security apps | Fonegard (20)

Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Android spy-app
Android spy-appAndroid spy-app
Android spy-app
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
Article Writing
Article WritingArticle Writing
Article Writing
 
Women Security in India
Women Security in IndiaWomen Security in India
Women Security in India
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

Mobile security apps | Fonegard

  • 1. Fonegard App Protect your Mobile Phone from Theft.
  • 2. About Fonegard: Fonegard is a mobile application created to help individuals safeguard their phone from thieves. The mobile application works for users of Android Operating Systems only. Every year, thousands of mobile phones are stolen across the globe. Billions of pounds are racked up by thieves, which ultimately leads to an increasing amount of money spent by people on the purchase of Phones each year.
  • 3. The Fonegard App instantly detects when the phone is disconnected from the bluetooth Device. A loud alarm is triggered and the camera starts flashing.The shout of: ‘Help! Stop Thief!’ is instantly started to alert the person that the phone is in danger.
  • 4. How To Operate? When you know you are entering an are prone to phone theft, like a town or city centre, or anywhere you feel you want protection: Turn on your Bluetooth Device. Start Bluetooth and pair phone to Device.’ Open up your ‘Fonegard’App. Press ‘Start’
  • 5. • When you are in a ‘safe’ area, an area you feel you are not in danger of attempted phone theft, Simply open the Fonegard app again, and press ‘Stop’, then close your phones’ bluetooth.