Welcome!

News Feed Item

Stun Guns Increasingly Popular for Self Defense

SAN ANGELO, TX -- (Marketwire) -- 02/07/13 -- Safety-conscious people are learning that they can protect themselves without using lethal force. Smart Stun provides reviews of the latest stun guns and has tested everything they sell. Consumers are finding that there is no need to harm anyone permanently just to get the protection they need. Perpetrators can be temporarily disabled until authorities arrive.

Stun guns are beginning to replace handguns. Stun guns have become increasingly popular as people search for ways to protect themselves and their families without doing permanent harm to others. A stun gun can turns the tables on a would-be attacker and puts the victim in control of the situation.

Women have started carrying lipstick stun guns. As they appear to prepare to be carrying lipstick, they can actually get ready to protect themselves as they enter a dark parking garage or quiet street. Lipstick stun guns come with a built-in flashlight for finding a keyhole quickly in an uncomfortable situation. If the lipstick stun gun must be used, it will be at the ready in their hand.

Some people are carrying what appears to be a flashlight, but is really a million volts of stun gun protection. The black flashlight appearance lets the carrier be discreet while being cautious. A quick touch of the flashlight stun gun disables a predator or attacker instantly.

The cell phone stun gun is perhaps the most discreet of all self-defense weapons. People can carry these everywhere, giving the appearance that they are speaking on their cell phones, when in fact they are fully prepared to defend themselves with 4.5 million volts. The cell phone appearance allows the carrier to be completely discreet yet prepared.

An executive or businessperson can discreetly reach for a pen and really be accessing 1.2 million volts of personal protection. This pen-like stun gun fits easily in a front jacket pocket, shirt pocket, or even openly in one hand. It appears to be a pen until it is needed for self-defense.

For those who prefer to have the most agile protection possible, stun batons have become popular. These batons have a handgrip and a protruding wand section that makes them look similar to police batons, but when they make contact, they deliver high voltage.

If anyone wants a lower-voltage stun gun, some come with as few as 500,000 volts. This can still deliver a disarming shock, but will not be as powerful as stun guns that carry several million volts.

People who would rather carry pepper spray or mace have started purchasing pepper guns. These effective self-defense tools aim like a pistol but spray a disarming pepper or mace spray that repels an attacker. These come in a variety of sizes so that men or women can find the one that accommodates their grip.

Wary consumers are combining their personal stun guns or pepper guns with personal alarms. Attached to a key chain, these alarms attract attention and shock a perpetrator who is unprepared for the loud sound.

About SmartStun.com:

Smart Stun -- Real Self Defense -- started with the goal of providing high quality self-defense products to people in the Texas area. That goal was quickly surpassed and Smart Stun now sells throughout the United States. With a distribution center located in Texas, Smart Stun can ship stun guns and related products quickly. The Smart Stun website can be found at SmartStun.com

Add to Digg Bookmark with del.icio.us Add to Newsvine

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"This is specifically designed to accommodate some of the needs for high availability and failover in a network managed system for the major Korean corporations," stated Thomas Masters, Managing Director at InfranicsUSA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
@DevOpsSummit at Cloud taking place June 6-8, 2017, at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long developm...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Infrastructure is widely available, but who’s managing inbound/outbound traffic? Data is created, stored, and managed online – who is protecting it and how? In his session at 19th Cloud Expo, Jaeson Yoo, SVP of Business Development at Penta Security Systems Inc., discussed how to keep any and all infrastructure clean, safe, and efficient by monitoring and filtering all malicious HTTP/HTTPS traffic at the OSI Layer 7. Stop attacks and web intruders before they can enter your network.
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
"We build IoT infrastructure products - when you have to integrate different devices, different systems and cloud you have to build an application to do that but we eliminate the need to build an application. Our products can integrate any device, any system, any cloud regardless of protocol," explained Peter Jung, Chief Product Officer at Pulzze Systems, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data professionals...
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.