Wednesday, June 17, 2009





some of the pictures at the seminar


SWEETWELL ANTI-THEFT SOFTWARE SOLUTION SEMINAR

WE THE ENTIRE MEMBER OF SWEETWELL GLOBAL SEVICES NIG. LTD APPRECIATE GOD AND EVERY BODY

THAT ATTEND OUR SEMINAR AND THOSE PEOPLE THAT CONTRIBUTE TO THE SUCCESS OF THIS SEMINAR

MAY THE GOOD LORD REWARD YOU ALL IN JESUS NAME , AMEN.

THANK YOU.

KOLADE KEHINDE ADELEYE
(AKKOT)

FOR: SWEETWELL LTD.

SWEETWELL ANTI-THEFT SOFTWARE SOLUTION SEMINAR

WE THE ENTIRE MEMBER OF SWEETWELL GLOBAL SEVICES NIG. LTD APPRECIATE GOD AND EVERY BODY

THAT ATTEND OUR SEMINAR AND THOSE PEOPLE THAT CONTRIBUTE TO THE SUCCESS OF THIS SEMINAR

MAY THE GOOD LORD REWARD YOU ALL IN JESUS NAME , AMEN.

THANK YOU.

FOR: SWEETWELL LTD.

KOLADE KEHINDE ADELEYE
(AKKOT)

Sweetwell Instructions Guide


Tuesday, June 9, 2009

INTRODUCTION

WE INTRODUCE OUR COMPANY SWEETWELL GLOBAL SERVICES NIG.LTD.

OUR COMPANY PROVIDES SUPER PROOF SECURITY SOFTWARE FOR YOUR SENSITIVE AND VALUABLE INFORMATION WHICH YOU DO NOT WANT ANYBODY OR UNAUTHORIZED PERSON TO GET ACCESS TO.

OUR PRODUCTS ARE PRESENTLY IN THE HANDS OF MANY INDIVIDUAL AND COMPANIES. THESE PRODUCTS HAVE BEEN SPEAKING VOLUME OF GOOD PERFORMANCE.

WE LOOK FORWARD TO YOUR COMMENTS ON OUR BLOG ON HOW YOU FEEL ABOUT OUR PRODUCTS.follow this blog: http://phoneinfo-protection.blogspot.com
http://sweetwellltd.blogspot.com
e-mail-sweetwellltd@yahoo.com

Yours Sincerely
Taiwo Adeleye

Sunday, June 7, 2009

DO YOU WANT TO RELAX AND LAUGH LIKE THIS???


DO YOU WANT TO RELAX LIKE THIS
AT HOME WITHOUT FEAR? IF YES!!!
THEN YOU NEED TO DO WHAT
THIS MAN DID. WHAT DID HE DO?
HE HAS ALL HIS VITAL INFO.
PROTECTED WITH SWEETWELL
ANTI-THEFT SOFTWARE.

Remove Formatting from selection

IS ALWAYS GOOD TO CHECK THE INFORMATION ON OUR
LAPTOP AND BE HAPPY LIKE THIS JUST BECAUSE OF THE WAY WE
CHERISHED THOSE VALUABLE INFORMATION ON IT. BUT WHAT HAPPEN WHEN YOU ARE NOT THERE? SOME PEOPLE MAY WANT TO GET ACCESS TO YOUR INFORMATION WITHOUT YOUR KNOWLEDGE . IS N'T IT?.

SOLUTION IS CLOSE TO YOU, GET OUR ANTI-THEFT SOFTWARE ON IT AND RELAX YOUR MINED.

Saturday, June 6, 2009

one in town ANTI-THEFT SOFTWARE.......



Secure - Recover - Locate - Lock - Alert - Track - Wipeout
Between losing a wallet with some cash and your phone or laptop, you're likely to go ballistic when it's the latter. Most of the time, it's not just the cost of replacement but the sensitive data (photos, video etc) and the risk of losing hundred of contacts that you may never get back!
Check out how our mobile security software can help you against theft and protect all your data in it.
Anti-theft software for Windows Laptop
Anti-theft software for desk top (Best Selling)

HOW IT WORKS.........



INFORMATION IS MONEY PROTECT........

this machine cost you a lot of money protect it from wrong eyes that desire it...... your information is money protect.......





SMS Text Alert: When an unauthorized SIM card is inserted into the stolen BlackBerry, SMS text alert and email will be sent out immediately on the background to pre-defined number/email address (e.g. spouse, colleague, IT dept) about the theft.
*Send from thief's own phone number, that includes IMEI & IMSI information to help in recovery.
Repetitive alerts can be set to send SMS Text Alert every minute on the background.

IMEI Detection:A number unique to every GSM phones used by the GSM network to identify valid devices and therefore can be used to stop a stolen phone from accessing the network.

IMSI Tracking: An unique number associated with all GSM network mobile phone users stored in the SIM inside the phone and is sent by the phone to the network.
E.g. In many countries like U.K, all prepaid and postpaid SIM cards users need to register with their ID or passport to the authorities. With IMSI, the authorities will be able to track back to the thief.
Location of thief: Information of the cell location (Area Code & Cell ID) will be captured in the SMS Text Alert when the thief changes the SIM card.
Multi SIM CardsUp to 100 authorized SIM cards can be supported by the program.Tamper Proof Password protection to ensure no unauthorized access to the software.Customizable MessageOwner can personalize the SMS Text Alert to be sent to the pre-defined numbers to notify others of the theft.






HOW TO CHECK YOUR IMEI WITHOUT STRESS!!!!


LOVE TO PROTECT THIS MACHINES
ans confidential info. inside like:
your bank account, ATM code,
credit card code, and all other
info. that need to be secured...


How to detect your IMEI

When you buy any mobile devices especially phone the first thing you need to is to check for your IMEI to do this use this code *#06# do not press OK it will automatically display. Note: every phone IMEI ( international mobile equipment identity ) start with 35xxxxxxxxxxxxx and must be 15 digits any phone that its IMEI does not start with 35 is not original and this IMEI can never be the same that is different phone different IMEI, therefore can be use to stop a stolen phone from accessing the network.

sometimes is not about the price of replacing the machines






Sometimes is not just about the PHONE or LAPTOP but the confidential info. inside it which money can't buy no matter how RICH you are. the best thing you can do is to protect it.






protect your machine and all your valuables inside it now!!!


DO YOU TRAVEL A LOT ???






YOU CAN PROTECT YOUR VITAL INFO. DO IT NOW BEFORE IT IS TOO LATE !!!




DO YOU TRAVEL ALOT WITH YOUR PHONE OR LAPTOP
THAT CONTAINS YOUR VITAL INFORMATIONS WHICH YOU
CAN NOT AFFORD TO LOOSE IT TO THE HAND OF UNAUTHORISED PERSON INCASE OF THEFT OR LOSES. IF YOU FALL UNDER THIS CATEGORISE THEN YOU NEED MY SOFTWARE AND ALSO NEED TO ATTENED THIS SEMINAR WHICH WILL COMMENCE IN JUNE 12, 2009.

AT
EXECELLENCY FAST FOOD, 135, ISOLO ROAD, OYE BUS-STOP, ALONG ISOLO ROAD, LAGOS.


Thursday, May 21, 2009

NOKIA 8800
PROTECT THE INFORMATION INSIDE YOUR PHONE
informations like your bank details, contacts and all vital and cofidential datas

SWEETWELL MOBILE DEVICE INFO. SOFTWARE PROTECTION


INTRODUCTION

Looking a couple of years back, one tends to wonder how the world and Nigeria in particular, ever got by without the convenience information technology affords the average man. Gone were the times when hi-tech methods of carrying out basic endeavor were seen as the preserve of the rich class. From the Automated Teller Machine to the GSM mobile phone and the internet, the current day metropolitan dweller find a far more easier and convenient lifestyle in business, leisure, relationships and networking.

Though, as would any new phenomenon, this development has come with its own associated setbacks and negative implications. Information and communication technology has developed over time and some of the very basic problems (for example, data loss, medium congestion, portability, memory capacity, adaptability etc.) have been equalized by better processes and technologies in the search for the delivery of seamless performance.

One problem, however, continues to rear its ugly head in unbelievable dimensions, almost at a better rate compared to technological advancement so much so that advancing technology seem to be moving at a pace behind it. Security and privacy remains an issue with the world’s new found lifestyle. While the issue of privacy has been mitigated by certain legislations and best practices, security threats have become more ravenous. This has made it necessary for developments in the art of securing information and communication technology to move one step further to pre-empt a major setback in what has become a lifestyle to a majority of the twenty-first century generation.


2.0 HISTORICAL BACKGROUND OF THE COMPANY

Sweetwell Global Services Limited was incorporated (RC. 653022) on the 14th of May, 2006. At the time, the company majored in the printing and graphic design and arts industry. Its factory is located at 11 salako street off oliyide street, mushin, Lagos State, currently, its head office remains at 5 Pepple Street,Computer Village, ikeja, Lagos State,Nigeria.

The Information and Communication Technology terrain is not altogether new to Sweetwell Global Services Limited. While in the printing and graphic designs line of operation, most of the major clients of the company were dealers in computer, software and GSM phones. The business took advantage of the concentration of the Information and Communication Technology industry in Ikeja to advance its tentacles for business sustenance and survival.

However, the management of the business began to identify opportunities to diversify into the Information and Communication Technology terrain. The result of this venture is the basis of the business plan.






3.0 VISION AND MISSION STATEMENT

VISION:
To be a household name in hi-tech lifestyle solutions

MISSION:
“We hope to deploy the best of business ideals in our passionate drive at delivering the state of the art technology solutions that make life more qualitative.”

BUSINESS OBJECTIVES:

1.) To identify areas of technical lag in the use and application of information technology;

2.) To employ ethical, practical and lawful means in sourcing information and communication technology solutions that are designed to suit the needs of the peculiarity of the Nigerian socio-cultural environment;

3.) Acquiring and developing knowledge prowess in addressing some of the basic challenge that plague the use of information and communication technology;

4.) Sourcing for franchise from local and international organizations that offer applications that best tackle the problems associated with information and communication technology use;

5.) Providing sundry support using a warm and effective customer service channel and

6.) Promoting security awareness and consciousness, using the vehicle of our products and services and

7.) To leverage on the peculiarity of the Nigerian environment to achieve profitability while simultaneously empowering honest and diligent individuals who seek to make a living.