SlideShare a Scribd company logo
Fonegard App
Protect your Mobile
Phone from Theft.
About Fonegard:
Fonegard is a mobile application created to help individuals
safeguard their phone from thieves. The mobile application
works for users of Android Operating Systems only. Every
year, thousands of mobile phones are stolen across the
globe.
Billions of pounds are racked up by thieves, which
ultimately leads to an increasing amount of money spent by
people on the purchase of Phones each year.
The Fonegard App instantly detects when the phone is
disconnected from the bluetooth Device. A loud alarm is
triggered and the camera starts flashing.The shout of:
‘Help! Stop Thief!’ is instantly started to alert the person
that the phone is in danger.
How To Operate?
When you know you are entering an are prone
to phone theft, like a town or city centre, or
anywhere you feel you want protection:
Turn on your Bluetooth Device.
Start Bluetooth and pair phone to Device.’
Open up your ‘Fonegard’App.
Press ‘Start’
• When you are in a ‘safe’ area, an area you feel you
are not in danger of attempted phone theft, Simply
open the Fonegard app again, and press ‘Stop’, then
close your phones’ bluetooth.
Fonegard app

More Related Content

Viewers also liked

UNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATOUNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATO
Dayanuquis
 
Best Security app | Fonegard
Best Security app | FonegardBest Security app | Fonegard
Best Security app | Fonegardpitersonsmithuk1
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textos
Nico9901
 
Freelancing part 1
Freelancing part 1Freelancing part 1
Freelancing part 1
David Fudge
 
Freelancing part 2
Freelancing part 2Freelancing part 2
Freelancing part 2
David Fudge
 
JavaScript is Eating the World
JavaScript is Eating the WorldJavaScript is Eating the World
JavaScript is Eating the World
David Fudge
 
troubleshootingver2
troubleshootingver2troubleshootingver2
troubleshootingver2
Indra L Gaol
 
Key topic (1)
 Key topic (1) Key topic (1)
Key topic (1)
nisreenbagi
 
Operative otolaryngology
Operative otolaryngologyOperative otolaryngology
Operative otolaryngology
nisreenbagi
 
Anti-theft solution app
Anti-theft solution appAnti-theft solution app
Anti-theft solution app
pitersonsmithuk1
 
Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Sean Fackrell
 

Viewers also liked (13)

UNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATOUNIVERSIDAD TÉCNICA DE AMBATO
UNIVERSIDAD TÉCNICA DE AMBATO
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Best Security app | Fonegard
Best Security app | FonegardBest Security app | Fonegard
Best Security app | Fonegard
 
CAREER DAY
CAREER DAYCAREER DAY
CAREER DAY
 
Redaccion de textos
Redaccion de textosRedaccion de textos
Redaccion de textos
 
Freelancing part 1
Freelancing part 1Freelancing part 1
Freelancing part 1
 
Freelancing part 2
Freelancing part 2Freelancing part 2
Freelancing part 2
 
JavaScript is Eating the World
JavaScript is Eating the WorldJavaScript is Eating the World
JavaScript is Eating the World
 
troubleshootingver2
troubleshootingver2troubleshootingver2
troubleshootingver2
 
Key topic (1)
 Key topic (1) Key topic (1)
Key topic (1)
 
Operative otolaryngology
Operative otolaryngologyOperative otolaryngology
Operative otolaryngology
 
Anti-theft solution app
Anti-theft solution appAnti-theft solution app
Anti-theft solution app
 
Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2Fackrell_S_s1400430_CT4017_Report_Group_2
Fackrell_S_s1400430_CT4017_Report_Group_2
 

Similar to Mobile security apps | Fonegard

Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
SUHITA MAZUMDAR
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
Gerryspeck
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
Er aditya kumar jha
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentationremiwanless
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
Quick Heal Technologies Ltd.
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
McAlester Army Ammunition Plant
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
iYogi
 
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
Mary_Robinson
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
Wireless Solutions NY
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
connectsafe
 
Android spy-app
Android spy-appAndroid spy-app
Android spy-app
SPY24
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
MrityunjaySaraswat
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
Andrew
 
Article Writing
Article WritingArticle Writing
Article Writing
Arif Robbani
 
Women Security in India
Women Security in IndiaWomen Security in India
Women Security in India
OptisafeApp
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
Poojaagrawal130
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
Naval OPSEC
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
Gudia Khan
 

Similar to Mobile security apps | Fonegard (20)

Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Fonetastic ppt
Fonetastic pptFonetastic ppt
Fonetastic ppt
 
Imei tracker software
Imei tracker softwareImei tracker software
Imei tracker software
 
Smartphone apps
Smartphone appsSmartphone apps
Smartphone apps
 
Mobile phone security
Mobile phone securityMobile phone security
Mobile phone security
 
Phone Safety presentation
Phone Safety presentationPhone Safety presentation
Phone Safety presentation
 
Tips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android DevicesTips and Tricks on Securing your Android Devices
Tips and Tricks on Securing your Android Devices
 
Smartphone Smart Card 061013
Smartphone Smart Card 061013Smartphone Smart Card 061013
Smartphone Smart Card 061013
 
8 steps to smartphone security for android
8 steps to smartphone security for android8 steps to smartphone security for android
8 steps to smartphone security for android
 
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
HOW TO HACK HANGOUTS CONVERSATION ON ANDROID
 
Steps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or LossSteps to Follow in Case of Phone Theft or Loss
Steps to Follow in Case of Phone Theft or Loss
 
10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus10 Reasons to Choose Connect Safe Antivirus
10 Reasons to Choose Connect Safe Antivirus
 
Android spy-app
Android spy-appAndroid spy-app
Android spy-app
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
Article Writing
Article WritingArticle Writing
Article Writing
 
Women Security in India
Women Security in IndiaWomen Security in India
Women Security in India
 
Savdhaan (Women Security App)
Savdhaan (Women Security App)Savdhaan (Women Security App)
Savdhaan (Women Security App)
 
Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14Traveling safely with smartphones 16 jun14
Traveling safely with smartphones 16 jun14
 
Cell phone cloning
Cell phone cloningCell phone cloning
Cell phone cloning
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Mobile security apps | Fonegard

  • 1. Fonegard App Protect your Mobile Phone from Theft.
  • 2. About Fonegard: Fonegard is a mobile application created to help individuals safeguard their phone from thieves. The mobile application works for users of Android Operating Systems only. Every year, thousands of mobile phones are stolen across the globe. Billions of pounds are racked up by thieves, which ultimately leads to an increasing amount of money spent by people on the purchase of Phones each year.
  • 3. The Fonegard App instantly detects when the phone is disconnected from the bluetooth Device. A loud alarm is triggered and the camera starts flashing.The shout of: ‘Help! Stop Thief!’ is instantly started to alert the person that the phone is in danger.
  • 4. How To Operate? When you know you are entering an are prone to phone theft, like a town or city centre, or anywhere you feel you want protection: Turn on your Bluetooth Device. Start Bluetooth and pair phone to Device.’ Open up your ‘Fonegard’App. Press ‘Start’
  • 5. • When you are in a ‘safe’ area, an area you feel you are not in danger of attempted phone theft, Simply open the Fonegard app again, and press ‘Stop’, then close your phones’ bluetooth.