The Mydeltapi Webstore

Innovative products to improve health, fitness and erotic satisfaction. Anti-aging medicines. Solutions for men's and women's issues. Products for acne, rosacea, hair loss, acid reflux, colon problems and joint issues - please click here Main menu of all products: Health and fitness, car equipment, sport, jewelry, hobby and rc models, electronics, household goods, games, music, clothes, scientific instruments, tools, erotic products and more

Go further down to see some hobby products and other interesting items

Some advices to protect yourself and your family against internet dangers




Affordable web hosting and internet services

Good web-hotel services - The conditions regarding special details vary much between the different web-hosts. Some have very good offers for some properties, for example disk-space and monthly traqffic limit other good conditions about other properties, like in-built web development packages. To shoose the offer that suits your needs best, you must simpy look at some web hosts and compare them on properties that are important for your own needs.

Here are banners that let you into the shops of four good web hosting companies. Please click on the banners to compare conditions and choose the  package that suits you best.


Trusted by over 5 million customers. See why!



Good stores for cellphones and electronic devices

MacMail - electronic devices for exceptional law prices: Special offers on cellphones, tablet PCs, cameras, keyboards and other periferials, batteries, memory units and more  Cellphones and phone accessories from many producents for good prizes. The shop specializes in unlocked cellphones but you can also find cellphones bound to a carrier's plan, which of cource will gie you an even lower entrance prize. - please click here to enter the shop


"Blackberry Curve 8530 Sprint Smartphone  Black"

" Blackberry Curve 8530 Sprint Smartphone:
Go places with the streamlined BlackBerry Curve 8530 smartphone. Chat with friends, email colleagues, share pictures, and listen to your favorite tunes! Featuring Wi-Fi technology, a 2MP camera, BlackBerry push technology, VZ Navigator, and support for popular apps like Facebook and Flickr, this smartphone gives you the power to do more of the things that matter in your life. Take your life with you, almost anywhere you go with the new BlackBerry Curve 8530 smartphone.

This brand new Blackberry Curve 8530 is ready to use on the Sprint network.

  • High-resolution 2.5'' screen
  • Backlit QWERTY keyboard
  • Bluetooth with A2DP
  • Send SMS, MMS, and instant messages
  • Wi-Fi enabled
  • GPS ready
  • MicroSD card slot for up to 16GB of expandable memory
  • Trackpad navigation
  • 2MP camera with digital zoom
  • Records video
  • Sprint

"Samsung Star S5230 Unlocked Smartphone - Black"

"Samsung S5230 Star Unlocked GSM Quad-Band Phone:
Looking for an affordable touch screen phone? The Samsung Star has all the features of those expensive touch screen phones?accelerometer, Bluetooth, and browser?without the price tag. Handwriting recognition software makes it simple to write what you need to know and easy to find it later.

This brand new Samsung Star is unlocked and ready to use on any GSM network. Just pop in your SIM card and you're all set! Order from and enjoy free shipping!

  • FM radio with RDS
  • View Word, Excel, PowerPoint, and PDF files
  • MicroSD card slot for up to 16GB of expandable memory
  • Record video at 15fps
  • Bluetooth version 2.1 with A2DP
  • Send SMS, MMS, and e-mail messages
  • WAP 2.0/xHTML, HTML browser
  • 3.15MP camera with smile detection
  • Handwriting recognition
  • Accelerometer sensor
  • T-Mobile, AT&T, Asian & European Carriers, Union Wireless, NEP Wireless, Longline Wireless, iWireless, Indigo Wireless, Farmers Wireless, Edge Wireless, Cincinnati Bell Wireless, Quantum Wireless, SunCom Wireless Holdings Inc, Wireless Alliance
" - unlocked cell phones and other technical devices  This is a big store where you can find a lot of items for daily use and many more special products for a very affordable prize, among others also cellphones, communication equipment and accessories for cellphones. Please click at these product links to see more about these praticular cell phones or to browse for all other cellphones in that shop. Cellphones is found in the communication department of the store and there is a separate department for cellphonbe eccessories.

Huge Discount at unbeatablesale

Some other items

General hobby magazine - In this general hobby store you can buy all kinds of radio controled robots, aircrafts, watercraft, vehicles and robots. You can also find electronic sets, several kinds of science sets, airsoft guns, magic sets and trics and a lot more. Robots Await

Great stores of remote controle models - Models driven electric motors or by nitro engines of airplanes, helicopters, cars, boggies, trucks, tanks and boats. Also flight and mission simulators. Are you looking for something special radio-controlled? It is a great chance that you will find it in one of these internet-based shops. Or you can just browse the shops to get ideas for gifts or ideas for a new hobby for yourself. In these shops you can find radio controled models for all ages. You can find models to use indoor and powerful models for rough outdoor environments.

A very well-asorted RC model store - here you find anything RC - Your Source for RC Toys

A huge store for nitro and electric powered redcats - Speedy models for cpmpetition in though terrain

Bidz jewelry auctions

- Bid on all types of jewelry and vauable apparel from quality producents and get it for a very affordable prize. Brand Name & Jewelry Auctions

Some simple advices to protect yourself from malware, spyware and internet frawd

Security programs can do much to protect you, but will not recogize everything. Therefore you should also take some manual precautions. To protect yourself from intruders, sites and programs with unhonest intents, you can take these simple precautions.

Never upload free software without knopwing who distributes it and knowing what the software does. Take at least a search on the net about the software before you upload it. That also holds for security software and virus protection software. Much of these so-called free security sofware is actually spyware and other types of malware.

If you get an authomatic question if you will upload something, or questions if you will scan your computer for viruses, or something of the kind start even without questions, then stop the process with Ctrl-f4 (pushing both tyhe Ctrl and f4 buttons sinulateously).  Most of these authomatic offers are malware and most of these uploads start even if you answatr no, therefore you must stop it the hard way at once.

Never send your bank acount number, credit or debet card number or passwords in mail. These should only be used in interfaces with the bank that has and encrypted communication or interfaces with internet merchants offering a secure communication channal.

If you get a mail saying it is from the bank and asking you confirm your personal details, passwords, bank acount numnber or credit card number, never answar that mail. It is not from your bank an any other authorized institution. These mails often will say that your acount has been shut down or will be shut down, but that you can solve the problem by confirming. Typically these mails will try to lead you into a web-page that resembles the pages of your bank. This page is allways a fake.

If you get a mail with a file that you are asked to open, and you do not know the sender and have not asked for the file, do not open it. It is probably a virus.

If you get an email asking for help with some big transaction using your bank account and promicing you big compensation if you help, do not concider it as anything but an attempt of frawd. If you say yes, the next step is to bill you for some lawyer honorary or transphere honorary or the like. They will try to bill you several times, each time with some excuse or explanation and the promiced trasfere never materialize. If they also ask for your credit card number, be sure to suffer a great credit card debit trasfere.

Likewise, if you get an email telling you thet you have won a fatastic amount in some free lottery, it is surely also an attempt of frawd. Yopu will get billed for trasfere honoraries, lawyer honoraries and the like many times until you give up getting the promiced premium. If they also ask for your credit card number, be sure to suffer a great credit card debit trasfere.

Beware of apps and other free downloadable software

Whereever you go in the internet, you are offered free software to download on your computer or phone that will quickly install. These are often apparently small applications with som kind of smart functionality you are likely to feel you need in your daily work and freetime. These programs are typically installed so that they load automatically each time you start your computer. These units are commonly called apps.

Often the offers to install pop up automatically as an icon or small page that it is impossible to get away with, without clicking some button, and they are typically made in such a way that you must think twice before you are able to do the right action for refuting the offer.

All kind of companies are offering free apps nowadays, both historically serious companies and downright crooks.

It is wise to choose not to intall any of these apps. A company does not give away free software without getting something as a compensation. Al these apps contain spyware or will plague you with untidy commercial spam, regardless of the honesty or seriousness of the company in other means. By installing apps, private date regarding your internet habits ind interests will be collected, used by the company itself or sold to other interessents.

Any app may also be construted in such a way that it disturbes the functions on your computer or corrupst your data, most often because of unintentional clumpsy construction, but sometimes also intentionally. If you have several of these apps reciding on your computer, they will also compete for resources with each other and with all other programs on your computer and make disturbances.

The companies offering the apps will typically present a disclaimer in small letters that states that you install the app on your own risk and hold the company free from responsibility for any damage it might cause. The disclaimer is usually held in the background and the only thing you see is usually a field you are supposed to hook to tell that you accept the conditions stated by the disclaimer.

More about internet security and spying on the net

The following description are about general things happening in many societies, and done by many actors of governmental or commercial type. The description is not about any special country or society, or about any spesific commercial or governmental actor. The reader must concider to what extend the description is valid for his own community or for the commercial actors he has a connection with.

Many persons and organizations of various kind gather, store and analyze data about you and your family when you surf the net.

Your internet provider likely collects a lot of data about your habits in the net. The provider can collect data telling all pages you have visited, it can collect every search string you have sent into the net, it can collect the mail adress and and often the name of everybody you send mail to or gets mail from, it can collect the address and often the name of persons you chat with, and it can collect data about when you surf. 

Basically, the provider can collect all traffic (every letter, every picture pixel) you generate on the net, but practically the provider must limit itself to certain key data. But sometimes the provider get paid for collecting special data of any kind, or is ordered to do so by government authorities or by commersial actors.

The provider can collect these data for own commercial interest.  They may collect the data for own security reasons. They may also sell tha data to other instances, for example governmental agencies and other commercial actors. The provider may sell or  the data either in crude form or in a processed and analyzed form.

Serious internet providers will always ask the customers of permission to sell or distribute the data further to other actors. But the answars to such questions is often just hooking out a field, and you can easily do so without actually having read what the field denotes. And, frankly speaking, not all providers are equally serious. The provider may also have an obligation from the authorities to report activities of the customers to specific agensies.

Commercial actors may also want to spy on you, analyze your needs, your personal interests and use the information to sell things to you.

Commercial actors are purhaps the most active of the groups callocting data about private persons or their families. By collecting your web adress, your mail adress and linking these to the types of web-pages you have visited in their domain, and to all activities you perform on these pages, they can find out a lot about your interests and your habits. Many of these are especially interested in children and the data they can deduce from their internet use, and then use the data to influence your children in a way that interest them.

Then they can use these data to brainwash you a period with strategically directed messages, so that you will be more likely to buy their products, and after being brainwashed for a period, you will get a lot of commercial offers. Especially children are seen as interesting obejcts for such projects.

Criminals of various types are very active on the internet. Those criminals are usually not single persons, but rather resourceful fraudolent companies or mafia organizations. Criminals most often want such things as credit card number, pin-kodes, netbank paswords, encryption codes and the like. Then they use this acsess information to rob your bank account or to abuse your credit card account.

Mafia groups of several kinds also collect information to use it for fraudulent activities. A way to do so, is by having wesites looking like ordinary commercial sites. When you get into such a site, your IP address is authomatically collected and also data about what pages you get into. Then the mafia group can upload spyware to your computer and authomatically collect credit card numbers, passwords and other personal data.

Government agencies both in your own country and in other countries also spy on you in many different ways, and for a plethorea of motives. Collecting data about internet users habits is an increasingly used method of spionage upon common citicens. Collection of such data is cheap, and you can deduce a lot of peoples life, habits and plans from such data.

They may collect data about you or your family, either as a part of a general screening of peoples internet use, because you have been selected as a research object, or because the government suspects you for something illegal or not confirming to the standards of the society. Anything you do that is unsual in any way can make them suspicious and use it to  give you trouble.

As metioned allready, governments often use the internet provider as a spy agency, but of course they also have their own way of spying upon you.  

One way is having websites that collect data about you when you surf these sites. And then they can upload spyware on your computer. Such web-sites look like ordinary commercial sites, like chat group sites, like porno sites, political sites, like online newspapers and actually anything. By collecting your ip address, email and data about your behaviour when you visit the sites, they can find out a lot about you.

Government agencies typically also have lines directly to your Internet provider or physical net providers that they use to collect data directly from the traffic, and they can copy all data sent or resceived by a person and deposit them in a database tagged with that persons internet adress and personal indentifications. They probably do not have the capacity to log all traffic to and from all persons simultanously. Such an extensive logging is probably only used upon specially chosen individuals. But metadata about the traffic of most or all persons are probably logged nowadays, either by the government themselves or by the providers engaged by the governments for that purpose.

Industrial espionage with the purpose of collecting data about patents and market manouvres is a great field nowadays. Both compies and government agencies are performing this kind or activity, and thee is typically connections between government agencies and key companies in the same country.

Industrial espionage may also be military espinoage at the same time, since many companies manufacture wapons or products used in military activities, and since these typically will have commercial contracts with own and other nations military authorities.

Apart from direct tapping of lines, there are many ways of collecting data about other peoples internet use:

- When someone visit a web-page of an actor, the application in the web-page will often collect the IP adress, and if you give it to them, your name, and collect information about what you did on the page.

- Actors can resceive signals from radio links or from cables and store data from the traffic refered to various levels in the communication protocols. In order to interprete these data, the actor must have accsess to encryption keys. Governmental agencies often have got this information because telecommunication companies are obliged to give it out to them. In other cases both governmental actors and other strong actors may have got the keys from internal informants.

- By listening to radio signals from your own house with advanced equipment, it is possible to detect directly what you write on your keyboard.

- Fishing is a method many criminal actors use to get your name, card numbers, passwords and the like and then use these as tools in fraudolent activities against you. The criminals either present a web-site or send mail to you, pretendeing that they are some other than they are in reality. They can for example pretend they are the bank you use. Then they urge you to log into the fraudolent web-site with your password or other access information in order to change some data about yourself.

Often they even write you have to do so of security reasons and threaten that your account will be closed if you do not do as asked. If you log in, the criminals then will have all they need to empty your bank account or rob you in other ways.

- Any company can have employees cooperting with the security breakers. They can do so for money, for revenge or for some political purpose. These can furnish he security breakers with passwords and other security codes and open lines in firewalls for the security breaker.


About Phishing

Phishing  is a term for digital snoking or fishing for sensitive information like passwords or credit card number. The term comes from English "fishing", where f a is replaced with "ph" (common hacker jargon).

This form of computer crime is proliferating rapidly. Those who are behind is always developing new methods and technological tools, that is not necessarily described below or on anti-phishing sites.


A common approach a person sends out e-mail, claiminging to be from a large bank or financial institution. The emails are often sendt out to a nomber of mail adresses at the same time. The mail addresses are typically collected automatically from web-sites where persons have published them, like blogs or or social sites of all kind. Typically the sender do not know what bank you use, and the mail will therefore look suspicious for most resceivers. But some of them happen to use that bank. by more sofisticated sampling methods, the phishers are however likely to find out also what bank an address owner uses, and then phisher has an even greater chance of luring the resceivers. Collaborating with persons working in a a bank is an obvious method of finding out such information. 

Typically the e-mail sais that there is some problem with the accound or engagement of the customer with the bank, but the problem will be resolved by filling out information in a formula to send back or by going to a web-site and log into that site.

The customer is allway asked to fill out such sensitive information as credit card number, pin-kode, login id, passwords and the like. This data are then used to drain your credit card for the money. It all made more credible by e-mail looks like it's from a reputable bank and that the website you come to look quite like the official website of this bank, and have mock-up functions looking lik those of the banks.

The sensitive infromation is then used to draw mony out of your account and into the account of the criminals.

By the most advanced methods, the sensitive information like user-names, credit card numbers, passwords and security codes go directly to the server of the criminals and the server program wil automatically log in at the banks real web-site and use it to transfere money to their own account. Every time the bank asks back for a security number, tha question will be sent from the fraudolent server to mock-up program at your PC, and your answar will be sent to the fraudolent server program and then back to the bank.

Sometimes the web-site and program loaded at your PC is the real web-site and program from the bank, but in addition a back-end program will be loaded that transfere all communication through the server of the criminals as explained above. When this is done, even the web-address in the e-mail you resceive is the right web-address of the bank, but there will of cource be a hidden address in a script that loads the back-end program and connects the program from the bank and the back-end program together.

Spear phishing

Spear phishing is a selective, advanced and sophisticated form of phishing. It is directed often against companies. The attacker collects information in advance, for example, if a customer, supplier, contracts and partnerships. This data are then used to build credibility in an e-mail, by referring to the internal things and names which are known to the receiver.


There are several different programs on the net for the detection of phishing. New versions of the most popular browsers (Internet Explorer, Firefox, Opera and Chrome have protections against this. Nevertheless, the user training is very important to protect themselves the best way. There are two simple rules to follow.

- If you get an e-mail from a bank or a finasial company, never log in from a web-site that after clicking at an address in the email.

- Send a mail from generated by you to the bank and ask if this was a genuine mail.

- If the answar is yes, go to the bank's web-site by your own and log in.


About Cryptography

Encryption of data is a method to protect oneself from instances spying on stored sada and data under transmission. By cryptography the data is rendered unreadable by some mathematic method, and restored by another method after transmission or before use. The methods can be secret so that it is impossible to other persons restoring the data. More often the methods is known, but use one or more secret sequences of data, a so-kalled encryption key.


Current cipher methods and block methods

Encryption algorithms can also be divided into block cipher or current cipher. In the current cipher method a few bytes of the message is encrypted one at a time, while the block cipher a block of bytesis  taken and encrypted as a unit.

Symmetric methods

By symmetric encryption one uses the same key for both the encryption and decryption of data. The encryption method is usually very strong. The problem is the distribution of keys. There is a risk that a key can be obtained, or that one is unable to exchange keys.


Asymmetric methods

Asymmetric encryption is also called public key encryption. One uses two keys, one private and one public key. The instance resceiving data has a private key and a public key. The public key is shared by all those that wants to send data. The algorithm is such that data can only be encrypted with the public key and only be made readable again with the secret key.

The sender encrypts the message with the public key, and the resceiver decrypts it with the private key.

The advantage of this system is that you do not have problem with key distribution, one needs not to be afraid that keys will be obtained.  One  needs not to have any secret key for sending a message.

Asymmetric keys can also be used for signing. If Kari encrypts a message with his secret key, anyone who has her public key decrypt and read the message. If the message is actually readable and meaningful, Kari is the only one who could have written the message.

Quantum encryption

These are ncryption Method based on Heisenberg's uncertainty relation, first described by the student Stephen Wiesner in the late 60th century. This principle addresses a serious problem with encryption, namely the exchange of keys. In addition, it opens new possibilities. A property of quantum mechanics is the principle that by measuring or registering a state, rules out a chance for several observations.

This is exploited in quantum encryption. By sending information from point a to b, one knows that as long as B can read the information from A (and vice versa), it is impossible for others to eavesdrop. If anyone eavesdrop, the information will suddenly become unreadable.

Other characteristic possibilities with the method exist. An example is a message that contains two messages. By choosing to read one of the messages, it becomes impossible to read the other. Quantum money, money that can not be forged is a possibility.

Quantum encryption can also be used to send encryption keys to be used by other methods. It has now been designed transmission systems that use photons to exchange symmetric encryption keys.

This make the strong symmetric methods more easy and even safer to use.


Some common symmetric block encryption methods

DES -Data Encryption Standard: DES is the most famous computer-based encryption method. It was introduced in 1975 by IBM, based on a previous algorithm (Lucifer), designed by Horst Feistel. The key was 56 bits, actually a little too weak key. The reason that the key was on 56 bit, was that the NSA, the USA's security service, would not have an overly strong algorithm. With 56 bits, there was still a pretty strong encryption, but not so strong that the NSA could not decrypt it if necessary. Although 56-bit DES is still in use, it is now regarded to be too weak . A cluster of computers can crack the encryption in a matter of hours (brute force). To continue to use hardware designed for DES, Mon introduced a new variant called triple-DES. In the triple-DES encrypted the information 3 times, the force is effective at 112 bits. Triple DES has billions of more combinations than the 56 bit DES. It's currently not solved by brute force.

DES belong to the category block cipher; most symmetric encryption systems are based on this technique. In a block cipher (algorithm) divided the information into blocks which then undergoes encryption process. In the DES one uses blocks of 64 bits, these are divided into two new blocks of 32 bits. These blocks are called right and left, these blocks are encrypted (Exclusive OR) with 48 bit keys in a Feistel network. DES is running 64-bit blocks 16 laps before the finish encryption.

Electronic Code Book (ECB):  A relatively simple and quick system. Here is every single block or character encrypted with the XOR (exclusive or) to produce ciphertext. When to decrypt, you just repeat the process to retrieve the plaintext. The encryption key is randomly selected and is as long as the text, then have a one-time Schiff. In most cases one uses a minor key to make multiple keys, which weakens the system. Any weaknesses and patterns in the keys seem easy in chiffermeldingen. For this system to be safe, you have to encrypt with the same key once. During World War II made the German Lorenz operators several blunders, including to encrypt the same message twice. ECB recommended only used as a system if the information is small or if you have the possibility to change the key at the new encryption.

Cipher block chaining (CBC): Similar to the ECB at that encrypts blocks with XOR, but rather the result of encryption is encrypted again with the next block and the next key. If this method will clear the text to be mixed with the key, so that it produces a cipher that is not only dependent on the key, but also the plaintext.

Cipher Feedback Mode (CFB): Similar to the CBC, here the result is converted back into a self-synchronizing stream of cipher.

Output Feedback Mode (OFB):  Equal to CFB, but synchronous. This better protects against errors in transmission, including because the error correction systems can be used before and after encryption.