Author Archives: mary jean ziska

May 13th 2011 @6:20pm ( reply email from the biometric center of excellence)

I’m not sure that they understood what i was trying to achieve with my email questions concerning:

I was wondering what technology and
procedure you have in place to recognize various people via a biometric
voice identifying method.  I would also like to know  if any cases have
been  taken to court and won due to  identifying  the voice of the
criminal.  I need your help! I  think I have yet another 
> phone
line compromised  

Ms. Ziska,
 
    The FBI’s Biometric Center of Excellence (BCOE)
is not an investigative entity.  The FBI’s Science and Technology Branch
created the BCOE to be the FBI‘s focal
point to advance the adoption of optimal biometric and identity
management solutions within the FBI and across the law enforcement,
homeland security, and intelligence communities.  
 
     Since the BCOE is not an investigative entity within the FBI, I encourage you to either contact your local law enforcement agencies
to report any information or by visiting the FBI’s public web
site.  The FBI maintains a public web site with the capability to
report information online at  https://tips.fbi.gov/
 
Thanks,
 Brandi
 FBI, CJIS Division
 Biometric Services Section
 Biometric Center of Excellence

—– Original Message —–
From: mary jean ziska <whatabtmary@yahoo.com>
Date: Wednesday, May 11, 2011 8:13 pm
Subject: requesting information of biometric technologies availableto public to stop criminals
To: biometriccoe@leo.gov

>

>
> To whom it may concern:   May 11 2011

>  

> I
have had a great deal of problems with bullies and others  criminals on
a phone line… actually almost on  every phone  line i have had since 
2003. Some of the criminals have used a spoof card  and other times
gotten a phone number close to mine to gain access to my voice
mail. Because of their intrudance  into my life via the phone and
computer lines they have been able to know my schedule, to break into my
home, to steal not only my possessions but clients from 3 businesses I
helped to create since 2003….

I was wondering what technology and
procedure you have in place to recognize various people via a biometric
voice identifying method.  I would also like to know  if any cases have
been  taken to court and won due to  identifying  the voice of the
criminal.  I need your help! I  think I have yet another 
> phone
line compromised   as of today.  It started having a funny ring and the
people on the phone line souned very familiar for bing  complete
strangers.  Thank you for your kind attention to this email.

> Sincerely,

> Mary Jean Ziska 

>  

> You can please email me :  maryjeanziska@mysearchforjustice.com  /my webiste is:  www.mysearchforjustice.com    

>  

> PS. I started a blog to try to elaborate on the methods andmultiple times  they have broken multiple laws.

> I really want them caught and put in jail and to sue them civilly and criminally for all the  harm they have committed.    

>  

>

A Tender Loving Care Service

>

Marion Gregory   Director 239-598-1515

>

naplesmarion@aol.com

>

Mary Jean Ziska   Assistant Director 239-287-2294

>

whatabtmary@yahoo.com

>

This
e-mail may contain Personally Identifiable Information which must be
protected in accordance with applicable privacy and security policies. 
If you are not the intended recipient of this information; disclosure,
reproduction, distribution, or use of this information is prohibited.

May 13th 2011 @5:18pm ( youspoof.info / detecting a spoof) )

FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
Detecting A Spoof

There are clues for detecting a spoof for each of the several mediums
discussed on YouSpoof.info. Find the medium you are interested in
below and look for clues to see if you have been spoofed.

TEXT/SMS SPOOFING & CALLER ID SPOOFING
Text & caller ID spoofs are often difficult to detect as there is a
limited amount of data contained within the text or voice caller ID
message and very limited tools on most phones which enable a user to
detect a spoof.

Clues to detecting a spoofed text message:

1. You receive a message from a commercial company you have a
relationship with and you have not specifically signed up to receive
text messages.

2. You receive a message asking you for sensitive financial or personal.

3. You receive a message from a recognized person, however it seems wildly out of character for the sender.

4. You receive a message from a familiar sender but the caller ID name
and number do not match up. For example if the message comes from “Mom”
but the number displayed is incorrect.

Clues to detecting a spoofed voice caller ID message:

1. You receive a call from a representative of a commercial company you
have a relationship with asking you for any sensitive information.

2. If the caller ID shows a recognized person but the caller is not the recognized person.

URL SPOOFING

There are several clues which can help you determine if the web site you think you are visiting is a spoof.

1. The address location bar doesn’t display the correct domain name/URL
for the web site. This is the most commonly spoofed component of URL
spoofing. Spoofers use a JavaScript to insert whatever domain name they
want into the address location bar in order to deceive the user.
For example the location bar might say www.eBay.info but the user might
actually be at the web site www.phishingforebaylogins.net. The web page
probably looks just like eBay’s and keeps track of all log in attempts
in order to harvest eBay user ID and passwords.

2. The status line is located at the bottom left of the browsers screen.
Move your mouse over a link on a web site and the status line displays
the URL where that link goes.
Once again this can be a clue but beware because spoofers can also use a
JavaScript to insert whatever information they want into the status
line bar.

3. Users can glean clues about the URL they are on by viewing the source
HTML code from the menu bar to look for re-written URL’s. To do so in
Internet Explorer look at the top tool bar and click on the view option.
From the view option a list of drop down items will display; choose
the source option. A notepad pop up will open with the source code for
the web page. Look within the source code for bogus URL rewrites.
Note that this is tedious and time consuming task and most users are not
familiar enough with HTML or JavaScript in order to detect a spoof.

4. The easiest and most reliable clue to detecting URL spoofing is to
use the menu bar to view the web page’s Properties. For example in
Internet Explorer from the top menu choose File and then from the drop
down options choose Properties. The Address (URL) of the actual page
will be displayed. If it does not match the URL displayed in the
address line then the page has been spoofed.

E-MAIL SPOOFING

It is easier to determine if an e-mail is a spoof by reviewing the
message the e-mail contains than by using technical tools. For example
if an e-mail is from a commercial entity and the message requests that
you provide your log in ID or your account will be suspended it is
likely a spoofed e-mail. Reputable commercial entities regularly
contact their customers by e-mail but they don’t ask for log in ID
because they already have it.

Another clue is to highlight a link within the suspect e-mail with
the mouse cursor and to then look at the status line at the bottom left
of the screen. If the URL in the status line and the link your mouse is
highlighting do not match up a spoofer is likely at work. Note that
because JavaScript can be used to change the status line this method is
not fool proof. Overall, this is a good technique because a lot of
spoofers do not bother to use the JavaScript to change the status line.

Technical tools include the users viewing the source data for an
e-mail. For example, in Outlook Express the message in question is
chosen and then by right clicking the mouse the user gets a drop down
box. From the drop down box choose Properties and the e-mails source
data will be displayed. Usually spoofers will cover their tracks even
in the details of the source. Viewing the source is therefore not a
reliable tool.

WEB SPOOFING / IP SPOOFING

Use the clues from the URL and E-mail spoofing sections to look for Web and IP spoofing.


YouSpoof.info does not endorse spoofing, spamming, phishing,
pretexting or any illegal activities. The information contained on
YouSpoof.info is purely for informational purposes and not to be used
for any illegal activity.

Please do not SPOOF for illegal purposes and take serious note of the following:
Legally the Junk Fax Law covers Text to Text messages and fines can top out at $500.00 per spoofed message.

The CAN-SPAM act covers Internet (web and e-mail based) to Text
messages and fines can top out at $50,000.00 per spoofed message.

.INFO SPOOF LINKS
Detect Spoofed Sites
Detect Spoofed Emails
anti: spyware, spam, virus
TODAY’S SPOOFING FACT
Theory: Early digital marketing pioneers contend that spam is actually an acronym for Simultaneously Posted Advertising Message.

may 13th 2011 @5:16pm ( youspoof.info / types of spoofing)

FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
Types Of Spoofing

Text/SMS Spoofs are sent by either e-mail or through a web
site. The sender inputs your number and then inputs the number or name
they want you to see on the caller ID. They then input their message
and send.
See Text/SMS Spoofing for more in depth data.

Phone Spoofs are sent through a phone or a combination of a
web site and a phone. Typically either involves a third party company
that acts as an intermediary. The sender initiates a call by either
visiting the third party company’s web site or calling their specified
call in number. The sender then inputs the caller ID information they
want displayed and they are connected. The third party company does all
the work and charges by the minute. These third party companies will
even change the sender’s voice and record the call for the spoofer.
See Caller ID Spoofing for more in depth data.

URL Spoofing – When the address (A.K.A., domain name or URL)
displayed in the address ‘location’ bar at the top of a browser is not
really the web page being displayed it has been spoofed. For example
the user may see www.citibank.com in the address location bar but really
be on the web page www.iamgoingtorobyou.com

Web Spoofing is when the spoofer puts a computer between the
internet user’s machine and the entire internet thereby intercepting
everything the internet user does.

To accomplish this a spoofer must first somehow get an internet user
to visit the spoofers ‘trap’ web page. The spoofer could get an
internet surfer to the ‘trap’ web page through a variety of tricks and
techniques including but not limited to:

  • a link in a spam e-mail
  • through a hyper-link on a non-trap web page
  • even a link the internet surfer clicks on from a search engine.

Once the internet surfer visits the spoofers ‘trap’ web page every
web page that the internet user visits thereafter is served from
spoofers computer. The internet user sees the actual web pages that
they are visiting but the spoofer is acting as a malicious intermediary
ISP, spying on everything the internet user sees and types. This means
that the spoofer can intercept all of the internet users ID’s and
passwords, credit card information, and anything else the web surfer
types in to web pages they visit.

e-mail Spoofing is when a spoofer falsifies the information
about whom an e-mail is from. Most spam (unsolicited e-mail) uses
e-mail spoofing with the primary intent to trick the recipient into
viewing the e-mail. A good example is the thousands of e-mail claiming
to be from eBay that are really spam.
The spammer usually does not spoof to hide their location. In fact the
spammer will go to much greater lengths to hide their actual location
using a variety of techniques- so that they can not be found.
See e-mail Spoofing for more in depth data

IP Spoofing – (Internet Protocol Spoofing) – Data sent over
the internet (such as an e-mail) is broken up and sent in small pieces
of information called packets. These packets once received are
reassembled by the recipient. Each packet contains information about
who the packet is from and who the packet is to, among other data.
Spoofers can falsify who the packet is from to trick the recipient.
This type of spoofing is often used to gain access to machines which use
IP authentication to verify identity.
See IP Spoofing for more in depth data.


YouSpoof.info does not endorse spoofing, spamming, phishing,
pretexting or any illegal activities. The information contained on
YouSpoof.info is purely for informational purposes and not to be used
for any illegal activity.

Please do not SPOOF for illegal purposes and take serious note of the following:
Legally the Junk Fax Law covers Text to Text messages and fines can top out at $500.00 per spoofed message.

The CAN-SPAM act covers Internet (web and e-mail based) to Text
messages and fines can top out at $50,000.00 per spoofed message.

.INFO SPOOF LINKS
Detect Spoofed Sites
Detect Spoofed Emails
anti: spyware, spam, virus
TODAY’S SPOOFING FACT
If your cell phone
voice mail is not “pass protected” a Spoofer can access your Voice mail
and even change the greeting incoming callers hear.

May 13th 2011 ( you spoof.info webisite….)

FIND OUT WITH OUR GUIDE TO DETECTING A SPOOF.
Spoofing FAQ
1. What is spoofing?
Spoofing is the part of
any form of communication (electronic or physical) whereby the sender
inserts/attaches false identity contact information to the
communication.

Some examples:
You get a text message from your boss’s cell
phone reading “Yeah….I’m going to need you to stay late and finish that
TPS report” You sense a prank because your buddies in the cubical across
the room are snickering.

You receive an e-mail from your bank saying that there is a
problem with your online account and need to verify your account
information or your account will be suspended. You click on the link at
the end of the e-mail and get a log in page that looks exactly like
your banks. If you enter your log in and password, you just gave a
crook complete access to your bank account.

2. Who Spoofs and Why?

Spammers, friends and enemies:

Spammers often spoof to trick you into viewing an e-mail. They send
out mass messages with a false identity familiar to a large number of
people so that some percent of those receiving the message will view the
message. Once the recipient is tricked and the e-mail is viewed the
spammer may attempt to sell a product, send a political or religious
message, try to acquire personal or financial information, or deliver a
virus as an attachment.

Spammers spoof to make you think they are someone they are not.
They typically do this in order to separate you from your money.

Your friends spoof for fun and pranks. Hopefully, the end result is a good laugh.

Your enemies spoof for malicious fun and pranks usually resulting in hurt feelings or damaged relationships.

3. Where would someone send or receive a Spoof?
  • A cell phone (voice or text message)
  • A land line phone
  • An e-mail address
  • A Web site
  • The postal mail
4. When do you know it is a Spoof?

It is often impossible
to know if you have received a spoof. Although to the careful observer
there are several clues that help to separate a spoof from a legitimate
communication.
See our guide to Detecting a Spoof

5. How do Spoofs work?

A spoof works differently in each medium as the following shows:

Text/SMS Spoofs are sent by either e-mail or through a web
site. The sender inputs your number and then inputs the number or name
they want you to see on the caller ID. They then input their message
and send.
See Text/SMS Spoofing for more in depth data.

Phone Spoofs are sent through a phone or a combination of a
web site and a phone. Typically either involves a third party company
that acts as an intermediary. The sender initiates a call by either
visiting the third party company’s web site or calling their specified
call-in number. The sender then inputs the caller ID information they
want displayed and are connected. The third party company does all the
work and charges by the minute. These third party companies will even
change the sender’s voice and record the call for the spoofer.
See Caller ID Spoofing for more in depth data.

URL Spoofing is when the address (A.K.A., domain name or URL)
displayed in the address location bar at the top of a browser is not
really the web page being. For example the user may see
www.citibank.com in the address location bar but really be on the web
page www.iamgoingtorobyou.com
See URL Spoofing for more in depth data.

Web Spoofing is when the spoofer puts a computer between the
internet user’s machine and the entire internet thereby intercepting
everything the internet user does.

To accomplish this a spoofer must first somehow get an internet user
to visit the spoofers trap web page. The spoofer could get an internet
surfer to the trap web page through a variety of tricks and techniques
including but not limited to:

  • a link in a spam e-mail
  • hyper-link on a non-trap web page
  • a link the internet surfer clicks on from a search engine.

Once the internet surfer visits the spoofers trap web page every web
page that the user visits thereafter is served from the spoofers
computer. The internet user sees the actual web pages that they are
visiting but the spoofer is acting as a malicious intermediary ISP,
spying on everything the internet user sees and types. This means that
the spoofer can intercept all of the internet users ID’s, passwords,
credit card information and anything else the web surfer types in to web
pages they visit.

Email Spoofing is when a spoofer falsifies the information
about whom an e-mail is from. Most spam (unsolicited e-mail) uses
e-mail spoofing with the primary intent to trick the recipient into
viewing the e-mail. A good example are the thousands of e-mails
claiming to be from eBay that are really just spam.
See email Spoofing for more in depth data.

IP Spoofing (Internet Protocol Spoofing) is data sent over the
internet (such as an e-mail) broken up and sent in small pieces of
information called packets. These packets, once received, are
reassembled by the recipient. Each packet contains information about
who the packet is from and who the packet is to and other data.
Spoofers can falsify who the packet is from to trick the recipient.
This type of spoofing is often used to gain access to machines which use
IP authentication to verify identity.
See IP Spoofing for more in depth data.

6. What do I do if I have received a spoof?

If you’ve been
victimized by a spoofed e-mail or web site you should contact your local
police or sheriff’s departments and file a complaint with the FBI’s
Internet Crime Complaint Center at www.ic3.gov.

.INFO SPOOF LINKS
Detect Spoofed Sites
Detect Spoofed Emails
anti: spyware, spam, virus
TODAY’S SPOOFING FACT
Telephone access
to accounts using caller ID to verify the users identity are an easy
targets for Spoofers. Make sure all your accounts are security pass
code protected.

May 13th 2011 @3:26pm ( contact sheriff/police on information of voice changing solftware..)

So i tried to call the sheriff/police station form my magic jack… the funny thing is that it  did not go though for the regular  number…it did however go though on an additional number that information gave me . 
so this is how it went ….

i called in and spoke with the woman who answers the phone… she didn’t  say her name or that the line was recorded or give a badge number.. but when I questioned it .. because every other time i have called i usually have a person who answers the phone say who they are … where i am calling… ( ie department ) and that the  phone line was recorded.. and what their badge number is.

i tried to explain what  i was calling about and requested officer linquist( who i had just  talked with… and she suggested instead i speak with  someone form the “it” department so she put me though to officer rodriquez ( it was a woman and i was wondering if it was the same woman who sent me  a reply  email when i had questions concerning my driver’s license  being  swiped  at  a guard gate.  

 ms. Rodriquez then put me in touch with sonda moore at the help desk and i was given a number for don or john kilpatric. ( 793-9117) who is in charge of computer forensic department  where no one  answered so i called back and got  in touch with deputy finney the communnication supervisor… ( 252-9300 extension 3300)

As of this moment i still have a lot of questions concerning  how to prevent/stop anyone from using a  computer software program  and being able to  change their voice on the  phone…   and as of today… i am wondering why some phone numbers  are having problems going through… i also called the Naples bay resort the phone number listed on the website will not work on my magic jack number. HUMMMMMMM

May 13th 2011 @ 3:03pm ( tried to call for additional patrol but magic jack wouldn’t call the sheriff telephone. strange right? )

so as a precaution… and deterrent to make sure that there will be no one able to break into my home… i tried to call  the police/sheriff department to request an additional drive by  and told them that if anyone was in  my home to  please arrest them as they will not only be trespassing but also breaking and entering…  telephone number of: 239- 774-4434…. i dialed the telephone number it has two busy tones and then hangs up by itself… very strange.. You would think that having any criminal activity.. or needing a phone for an emergency… that the one phone number you should always be able to access… is the POLICE or FIRE Or SHERIFF   and any emergency numbers.. along with  dispatch for them…  and offices for them…. especially in the middle of a work day.. of a work week… This phone situation ….i don’t even know what to say about  it…  but i wanted to document it in my blog so that i will have record of me not only trying to protect myself.. my home and my possessions but the interference in pursuing that goal…   when i called the number that the information form magic jack gave me i received a telephone number of 239-597-1607 and was able to  speak with officer Linquest..badge number# 3141. ( he had actually been to my home   before…. so i left hm a message and told him i will follow through with a written request through their   website  he said he will also leave an email message and that i should also try to call again before babysitting.  and request  again…  i know when i met a police officer at the Mobil gas station he was also extremely helpful in helping me put in a request for additional patrols. 

I really appreciate  all the police and sheriff department   have tried to do on my behalf to prevent anyone from entering my home when i am not here.( which is considered breaking and entering… . and from harming not only my life but also protecting my possessions from any further damage…. I also want to thank  the neighbors who keep an eye on my place when i leave to make sure that no one breaks in when i go out to work .

May 12th 2011 @12:05am ( a “how to” site on changing your voice during a call )ru coi


How to Change Your Voice During a Call

updated: November 16, 2010

Being able to change one’s
voice is an interesting concept that can be applied in many ways to
personal phone calls, such as playing tricks on friends or sounding much
older or younger than you normally would. With a microphone,
voice-changing software and VoIP (Voice Over Internet Protocol) software for the computer, it’s simple to change one’s voice so that the person on the other line hears a voice that’s not your own.

Difficulty:
Moderately Easy

Instructions

  1. Voice-changing Software

    • 1

      Download voice-changing software to your computer (see Resources).

    • 2

      Install the voice-changing software to your computer by following the onscreen steps provided with the installation program.

    • 3

      Run the voice-changing software by double-clicking on the newly created shortcut icon on the desktop.

    • 4

      Configure the program to work
      with your microphone by selecting the “In” option to your built-in or
      external microphone. In most cases it will already be selected.

    • 5

      Read the instructions or help
      file that came with the program. All voice-changing programs are
      different but have the same basic controls and, by reading this, you
      will familiarize yourself with the program.

    Calling Someone

    • 1

      Download and install VoIP software if you do not already have this software (see Resources).

    • 2

      Use the VoIP software to call someone by entering the recipient’s user name or phone number, depending on the program.

    • 3

      Speak into the microphone.
      Depending on the voice-changing program you may or may not hear your own
      voice, but the person you’re calling will hear the changed voice on the
      receiving end.

    • 4

      Change options with the
      voice-changing software to your liking by either moving the pitch up or
      down or using preset effects. There often will be an option to hear
      yourself talk so you can change your voice in real time and hear what it
      sounds like.

  • www.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”title”>IVRwww.voiceshot.com”“>www.voiceshot.com””=””>www.voiceshot.com” class=”baseurl url”>www.voiceshot.com

    Automate IVR phone calls with XML. Inbound & outbound. Try it now free

  • www.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”title”>Computer Online Trainingwww.SkillSoft.com”“>www.skillsoft.com””=””>www.SkillSoft.com” class=”baseurl url”>www.SkillSoft.com

    Training available online anytime. Read “Getting Started” whitepaper.

  • www.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”title”>Freelance Graphic Designwww.visionsfreelancedesign.com”“>www.visionsfreelancedesign.com””=””>www.visionsfreelancedesign.com” class=”baseurl url”>www.visionsfreelancedesign.com

    Professional, Affordable & Custom Creatively Designing Your Visions.

  • Top 10 Predictive DialersBusiness-Software.com/DialerSoft

    2011 Top Predictive Dialer Software Free Buyer’s Guide – Download Now.

Ads by Google

Resources

Comments

    Helpful?
    Yes
    No

      May 12th 2011 @11:52pm ( terrifying…. found a voice changer soft ware… website..).

      oice Changer Software

      AV VOICE CHANGER SOFTWARE
      For Everyday Voice Mask Balls
      Pitch
      & Timbre table is the most important and unique tool of AV Voice
      Changer Software 3.1 – a computer’s voice changer software for Windows –
      in changing instantly the voice input in two dimensions: Voice Pitch
      and Voice Timbre. In addition, Effects, Preset, Record buttons and other
      functions support the voice output in real time. Thus, you can totally control the “age” and “gender” of high-quality and natural voice output with this voice changer software.

      Next-generation AV Voice
      Changer Software 3.1 of advanced technology can itself hook and change
      all audio streams such as: DirectX, Recording, and Playback. Therefore,
      AV Voice Changer Software 3.1 allows you to instantly change voice input
      from microphone, CD-ROM, Line-in or any other media files like MP3,
      WAV… played by a sound player.

      Experience fun and comfort with AV Voice Changer Software 3.1
      Computer’s Voice Changer Software for Windows.

      Free download computer's voice changer software for windows. Create a 'nickvoice' for each nickname! Each nickname needs a
      “nickvoice”! Your nicknames are not enough for you to be anyone you wish
      in online chat zones such as: AOL Instant Messenger (AIM), Yahoo!
      Messenger (YIM), ICQ, MSN Messenger, Paltalk, Odigo, Trillian…. With
      AV Voice Changer Software 3.1 though, you can create each “nickvoice”,
      either male or female, that matches each of your nicknames. Turn chat
      rooms into voice masquerades! More fun, more entertainment experiences.
      Feel free to download and try out this unique voice changer software for
      Windows 95/98/ME/NT/2000/XP.
      Free download computer's voice changer software for windows. Call your lover with a 'nickvoice' via Net2Phone If you fancy disguising your
      virtual voice on phone conversations, then AV Voice Changer Software 3.1
      is a cool gadget for you. Acquire new voices with AV Voice Changer
      Software 3.1 in PC2Phone to be totally anonymous! Get a FREE download of
      this computer’s voice changer software for Windows and try it out!
      Free download computer's voice changer software for windows. Create a 'nickvoice' for each singer! Got tired of listening to
      songs with the same voices? Let’s change voices of songs with AV Voice
      Changer Software 3.1, save them as new songs, and now you can have your
      own CD, a cool gift for friends!
      Free download computer's voice changer software for windows. Create a 'nickvoice' to threaten other gamers! Ever threatened other gamers
      with voice effects in online voice games? AV Voice Changer Software 3.1
      will help you to create terrifying, roaring or ghostlike voices to
      exhaust your opponent’s spirits. With the support of DirectX, you now
      can apply voices changed by AV Voice Changer Software 3.1 to voice
      games.
      Free download computer's voice changer software for windows. Find a 'nickvoice' to sing karaoke! Sing your favorite karaoke
      songs with hundreds of different voices. With AV Voice Changer Software
      3.1, you now can sing like your favorite singers. Fun and easy. Free
      down load trial version for Windows offered!

      MAIN FEATURES OF AV VOICE CHANGER SOFTWARE

      Change voice in real time. Create a “nickvoice” for each nickname.
      High-quality and natural voice output.
      Compatible
      with almost all audio & video programs, including Voice Chat Rooms,
      Instant Messengers, Audio Video Conferencing, PC-to-Phone, Voice Games
      as well as Media Players, Recorders, DVD, CD and Karaoke Players.
      Record audio streams from Microphone, CD ROM, Line-in…, as well as from Winamp, RealPlayer, Windows Media Player…
      Rich in real time audio effects.
      Easy to use with proper default settings.

      Using AV Voice Changer Software 3.1 is fun and simple, it is a matter of how you play with the buttons and sliders.

      Click ” Nickvoices ” to choose a preset voice: old
      woman, old man, woman, man, girl, boy,….; Or create new “nickvoices”
      yourself by adjusting the Pitch-Timbre table to change your voice, saving the settings, giving names to the “nickvoices” for later use.

      Improved Graphic Equalizer helps you to smooth out the
      voice outputs (the “nickvoices”). Adjust its 10 sliders yourself, or
      again, simply choose one of the presets: gentle, soft, silky,.

      The new version AV Voice Changer Software 3.1 also comes with
      interchangeable skin designs including a standard windows interface and
      many sexier and bolder skins which are available for free download.

      RegNow Secure Ordering – 100% Secure
      Purchase
      The order process is protected through
      a secure connection.Your personal data is encrypted
      and cannot be accessed by a third party.
      We do not record your credit card information.
      You can select the payment
      type such as credit card, switch/solo, bank/wire
      transfer, check, cash.

      Voice Changer Software: free download
      computer’s voice changer software for Windows, voice changer software,
      computer voice changer software, voice changer software for windows,
      free download voice changer software, computer voice changer for
      windows, download voice changer software for computer, download voice
      changer software for windows, voice changer software download, voice
      changer download, free voice changer software, free voice changer for
      computer, software voice changer, free voice changer download

      ©2002 – 2005 DVDXCOPY-Software.com