SlideShare ist ein Scribd-Unternehmen logo
1 von 19
Safari Pedophile Reporter extension
Copyright All material in this presentation is Copyright 2010 by Joseph Seanor and IPT LLC. Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor. If you wish to use this information in a presentation of your own, or in other materials, please contact me at: jseanor@internetpredatortracker.com
Mission Since 2005, Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet. And all of this is done for FREE.
What does IPT do? Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement the ability to collect evidence in a secure manner about online predators and pedophiles. We also provide software to the public in order to allow them to report suspected predators and pedophiles.
What does IPT do? IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more. The goal is to provide the tools and training for FREE to the public and law enforcement.
Who is IPT? Internet Predator Tracker was founded by Joe Seanor, who leads the organization , consulting and development. Max Fortuna acts as Project Manager software development, testing, and case management. We also have investigators around the country who donate their time to helping out.
What can I do? YOU are the most important part of this work. Without YOU involved, there is very little that can be done. The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles. So YOU really are our best source of information!
IPT Website The main website for IPT is at:  www.internetpredatortracker.com We also have numerous sites on web2.0 websites and social networks.
IPT Public Software I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles. And all of the software is FREE!! You can download the software from the IPT website, and multiple locations on the web.
IPT Public Software IPT is the ONLY source of predator and pedophile reporting tools for: Internet Explorer Firefox Google Chrome Safari Opera Outlook Thunderbird ALL FREE!!!
Safari Safari is the browser from Apple, and runs on both the Macintosh and PC. In order to install the extension using the Safari browser,  just go to: www.internetpredatortracker.com Click on the tab called Software Choose Safari extension Then click either the English or Spanish version of the software.
Safari Once you click on the download link, you will see the following window. Just click on Open
Safari You will then be prompted with the following window, choose Install.
Safari The extension will be installed, and you will see Safari, now look like this:
Safari Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
IPT Browser Software Once you click the Report button: An HTML copy of the site is made. No images are saved or uploaded. A MD5 checksum is created (this protects the evidence.) The file is uploaded to the IPT secure server An email is opened that contains the information about the file that was uploaded and your email address. You just click send!
You are now ready! Anytime that you come across a suspected predator or suspected pedophile website, just click the report pedophile button, and send in your email. If you want, an investigator will follow-up with you about your report.
Contact information Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 18 http://www.internetpredatortracker.com Email: internetpredatortracker@gmail.com jseanor@internetpredatortracker.com
Thank You!

Weitere ähnliche Inhalte

Was ist angesagt?

The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120jram2113
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?Lookout
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...ABHAY PATHAK
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacyVikas Patel
 
Computer based crime
Computer based crimeComputer based crime
Computer based crimeTaylor_Marie
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990missstevenson01
 

Was ist angesagt? (14)

The use of internet web 120
The use of internet web 120The use of internet web 120
The use of internet web 120
 
Spyware
SpywareSpyware
Spyware
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Twitter terms of service
Twitter terms of serviceTwitter terms of service
Twitter terms of service
 
security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...security privacy,security,web,internet,prevention from hackers,the onion rout...
security privacy,security,web,internet,prevention from hackers,the onion rout...
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Computer based crime
Computer based crimeComputer based crime
Computer based crime
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
11. cs sr p - computer misuse act 1990
11. cs   sr p - computer misuse act 199011. cs   sr p - computer misuse act 1990
11. cs sr p - computer misuse act 1990
 
Spyware
SpywareSpyware
Spyware
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware
SpywareSpyware
Spyware
 

Andere mochten auch

ไฟฟ้าในบ้าน
ไฟฟ้าในบ้านไฟฟ้าในบ้าน
ไฟฟ้าในบ้านsiriwan3335
 
Campus Gutenberg 15-09-2011
Campus Gutenberg 15-09-2011Campus Gutenberg 15-09-2011
Campus Gutenberg 15-09-2011buscaciencia
 
Internet predator tracker
Internet predator trackerInternet predator tracker
Internet predator trackerJoe Seanor
 
Axis Clinicals Brochure
Axis Clinicals BrochureAxis Clinicals Brochure
Axis Clinicals Brochuretullys101
 
The_ImplementationOfAviationHighEducation_In_Africa
The_ImplementationOfAviationHighEducation_In_AfricaThe_ImplementationOfAviationHighEducation_In_Africa
The_ImplementationOfAviationHighEducation_In_AfricaYabi Miki Expedit Kidibu
 
JBCF Special Report
JBCF Special ReportJBCF Special Report
JBCF Special Reportwingcomander
 
ไฟฟ้าในบ้าน
ไฟฟ้าในบ้านไฟฟ้าในบ้าน
ไฟฟ้าในบ้านsiriwan3335
 
Movement Image Small
Movement  Image  SmallMovement  Image  Small
Movement Image SmallCinzia Loli
 
Internet predator tracker v4
Internet predator tracker v4Internet predator tracker v4
Internet predator tracker v4Joe Seanor
 
Nelson Mandela by xola benya
Nelson Mandela by xola benyaNelson Mandela by xola benya
Nelson Mandela by xola benyalilyungz
 

Andere mochten auch (11)

ไฟฟ้าในบ้าน
ไฟฟ้าในบ้านไฟฟ้าในบ้าน
ไฟฟ้าในบ้าน
 
Campus Gutenberg 15-09-2011
Campus Gutenberg 15-09-2011Campus Gutenberg 15-09-2011
Campus Gutenberg 15-09-2011
 
Internet predator tracker
Internet predator trackerInternet predator tracker
Internet predator tracker
 
Axis Clinicals Brochure
Axis Clinicals BrochureAxis Clinicals Brochure
Axis Clinicals Brochure
 
The_ImplementationOfAviationHighEducation_In_Africa
The_ImplementationOfAviationHighEducation_In_AfricaThe_ImplementationOfAviationHighEducation_In_Africa
The_ImplementationOfAviationHighEducation_In_Africa
 
JBCF Special Report
JBCF Special ReportJBCF Special Report
JBCF Special Report
 
ไฟฟ้าในบ้าน
ไฟฟ้าในบ้านไฟฟ้าในบ้าน
ไฟฟ้าในบ้าน
 
Movement Image Small
Movement  Image  SmallMovement  Image  Small
Movement Image Small
 
Internet predator tracker v4
Internet predator tracker v4Internet predator tracker v4
Internet predator tracker v4
 
Nelson Mandela by xola benya
Nelson Mandela by xola benyaNelson Mandela by xola benya
Nelson Mandela by xola benya
 
Proposal for student training
Proposal for student trainingProposal for student training
Proposal for student training
 

Ähnlich wie Pedophile Reporter Safari extension

Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesVi Tính Hoàng Nam
 
Free software, free data formats - an opportunity for everyone
Free software, free data formats - an opportunity for everyoneFree software, free data formats - an opportunity for everyone
Free software, free data formats - an opportunity for everyonePaolo Pedaletti
 
Recommendations for the adoption of libre software in the public sector in So...
Recommendations for the adoption of libre software in the public sector in So...Recommendations for the adoption of libre software in the public sector in So...
Recommendations for the adoption of libre software in the public sector in So...Juan Pablo Puentes
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Ideas to App Store (2010)
Ideas to App Store (2010)Ideas to App Store (2010)
Ideas to App Store (2010)Joseph DeSetto
 
Jisc Digifest Keynote March 16
Jisc Digifest Keynote March 16Jisc Digifest Keynote March 16
Jisc Digifest Keynote March 16Ian Dolphin
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Jesus Rances
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetAbhinav Mishra
 
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACH
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACHPICTURES AND SOFTWARE TO ENGLISH BY ANA TEACH
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACHHerbalifeHQ
 
The Major Barrier to Getting Your Book Published
The Major Barrier to Getting Your Book PublishedThe Major Barrier to Getting Your Book Published
The Major Barrier to Getting Your Book PublishedKathleen Gage
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog comIrisPhilme
 
Salvatore Scanio Cybercrime Webinar
Salvatore Scanio Cybercrime WebinarSalvatore Scanio Cybercrime Webinar
Salvatore Scanio Cybercrime WebinarSalvatore Scanio
 

Ähnlich wie Pedophile Reporter Safari extension (20)

Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
Open Hack Indonesia Keynote
Open Hack Indonesia KeynoteOpen Hack Indonesia Keynote
Open Hack Indonesia Keynote
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Ce hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniquesCe hv6 module 44 internet content filtering techniques
Ce hv6 module 44 internet content filtering techniques
 
Amusenet
AmusenetAmusenet
Amusenet
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Free software, free data formats - an opportunity for everyone
Free software, free data formats - an opportunity for everyoneFree software, free data formats - an opportunity for everyone
Free software, free data formats - an opportunity for everyone
 
Recommendations for the adoption of libre software in the public sector in So...
Recommendations for the adoption of libre software in the public sector in So...Recommendations for the adoption of libre software in the public sector in So...
Recommendations for the adoption of libre software in the public sector in So...
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
Ideas to App Store (2010)
Ideas to App Store (2010)Ideas to App Store (2010)
Ideas to App Store (2010)
 
Jisc Digifest Keynote March 16
Jisc Digifest Keynote March 16Jisc Digifest Keynote March 16
Jisc Digifest Keynote March 16
 
Empowerment Technologies - Module 2
Empowerment Technologies - Module 2Empowerment Technologies - Module 2
Empowerment Technologies - Module 2
 
spyware
spywarespyware
spyware
 
Podcast
PodcastPodcast
Podcast
 
Peerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter MeetPeerlyst Delhi NCR Chapter Meet
Peerlyst Delhi NCR Chapter Meet
 
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACH
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACHPICTURES AND SOFTWARE TO ENGLISH BY ANA TEACH
PICTURES AND SOFTWARE TO ENGLISH BY ANA TEACH
 
The Major Barrier to Getting Your Book Published
The Major Barrier to Getting Your Book PublishedThe Major Barrier to Getting Your Book Published
The Major Barrier to Getting Your Book Published
 
Mystartbyincredibar blog com
Mystartbyincredibar blog comMystartbyincredibar blog com
Mystartbyincredibar blog com
 
Salvatore Scanio Cybercrime Webinar
Salvatore Scanio Cybercrime WebinarSalvatore Scanio Cybercrime Webinar
Salvatore Scanio Cybercrime Webinar
 

Kürzlich hochgeladen

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Kürzlich hochgeladen (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 

Pedophile Reporter Safari extension

  • 2. Copyright All material in this presentation is Copyright 2010 by Joseph Seanor and IPT LLC. Any reproduction in physical or electronic format is not allowed without the written permission of Joseph Seanor. If you wish to use this information in a presentation of your own, or in other materials, please contact me at: jseanor@internetpredatortracker.com
  • 3. Mission Since 2005, Internet Predator Tracker is dedicated to providing tools, training, and consulting to the public and law enforcement to assist in the protection of our children on the Internet. And all of this is done for FREE.
  • 4. What does IPT do? Internet Predator Tracker, or IPT, has dedicated their work to providing software that allows investigators and law enforcement the ability to collect evidence in a secure manner about online predators and pedophiles. We also provide software to the public in order to allow them to report suspected predators and pedophiles.
  • 5. What does IPT do? IPT provides training in the form of classes, both online and in-person, on how to use these tools, collecting evidence, tracking on the internet and more. The goal is to provide the tools and training for FREE to the public and law enforcement.
  • 6. Who is IPT? Internet Predator Tracker was founded by Joe Seanor, who leads the organization , consulting and development. Max Fortuna acts as Project Manager software development, testing, and case management. We also have investigators around the country who donate their time to helping out.
  • 7. What can I do? YOU are the most important part of this work. Without YOU involved, there is very little that can be done. The latest set of tools we have released allows anyone to be able to report suspected predators and pedophiles. So YOU really are our best source of information!
  • 8. IPT Website The main website for IPT is at: www.internetpredatortracker.com We also have numerous sites on web2.0 websites and social networks.
  • 9. IPT Public Software I am PROUD to announce that IPT has published the ONLY tools for the public to use in order to report suspected online predators and pedophiles. And all of the software is FREE!! You can download the software from the IPT website, and multiple locations on the web.
  • 10. IPT Public Software IPT is the ONLY source of predator and pedophile reporting tools for: Internet Explorer Firefox Google Chrome Safari Opera Outlook Thunderbird ALL FREE!!!
  • 11. Safari Safari is the browser from Apple, and runs on both the Macintosh and PC. In order to install the extension using the Safari browser, just go to: www.internetpredatortracker.com Click on the tab called Software Choose Safari extension Then click either the English or Spanish version of the software.
  • 12. Safari Once you click on the download link, you will see the following window. Just click on Open
  • 13. Safari You will then be prompted with the following window, choose Install.
  • 14. Safari The extension will be installed, and you will see Safari, now look like this:
  • 15. Safari Once it is completed, the options window will open up so you can choose the email program you use and the email address where you want a copy of the email sent. Then just click save/close on the options window.
  • 16. IPT Browser Software Once you click the Report button: An HTML copy of the site is made. No images are saved or uploaded. A MD5 checksum is created (this protects the evidence.) The file is uploaded to the IPT secure server An email is opened that contains the information about the file that was uploaded and your email address. You just click send!
  • 17. You are now ready! Anytime that you come across a suspected predator or suspected pedophile website, just click the report pedophile button, and send in your email. If you want, an investigator will follow-up with you about your report.
  • 18. Contact information Copyright 2010 PI Mall LLC and Joseph Seanor all rights reserved 18 http://www.internetpredatortracker.com Email: internetpredatortracker@gmail.com jseanor@internetpredatortracker.com