Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

New Games Require Internet Connection or You Can’t Play (PBBBBBLLTT!)

It's a trap!
(Image used under: Creative Commons 2.0 [SRC])

Some new game manufacturers are requiring that the game system you play with have an Internet connection so the game can authenticate itself every few days. Most people are pretty adverse to being treated like criminals just to play a game much like they'd resent a screeching corporate harpy who strikes their hands with a ruler every .... [Click here to read the rest of this post]

Tags: ,

National Security Letter Successfully Challenged

Note to Author: One of your jtags is missing a closing quote or a />. Your post is currently broken

Tags: ,

Chrysler’s 2.99 Gas Deal is No Deal

(Image used under: Creative Commons 3.0 [SRC])
Simply put, you get a special credit card when you buy a new Dodge (not every new Dodge, but most). You can use this credit card to buy fuel for $2.99 a gallon at any service station for three years following your date of purchase, regardless of the actual market price. Sounds great right?
.... [Click here to read the rest of this post]

Tags: ,

Using Cellphones to Track Missing Persons

(Image is in the Public Domain)

While this is barely legal (if it IS legal), I don't particularly have a problem with cell phone companies opening their data to police to help find a person reported as missing. That is, of course, assuming that they don't abuse the power and that missing persons are defined correctly.

As with most government powers, as long as there .... [Click here to read the rest of this post]

Tags:

Protecting Yourself From Suspicionless Border Searches

Don't tempt pointless attention
(Image is in the Public Domain)

The EFF has an excellent article about how to avoid being searched at the border. Specifically, how to protect your laptop data that courts recently ruled could be searched without warrant.

.... [Click here to read the rest of this post]

Tags: ,

California Court Leaks SSNs and Medical Data Online

(Image is in the Public Domain)

In case you didn't already know, state offices posting "public" records online for anyone in the world to see is a huge and persistent problem.

.... [Click here to read the rest of this post]

Tags: , , , ,

Youtube Champions Scientology Over Anonymous

(Image used under: Fair Use doctrine)

Anonymous posts anti-scientology videos on Youtube. They get canceled. They start a new account in order to try again and perhaps not get canceled this time. They get canceled.

Apparently Youtube policy is that if you've been banned, you get no second chances. Any new account you create will be destroyed…. Unless you're paying money as in the case .... [Click here to read the rest of this post]

Tags: , ,

Voting Machines Shown to Add Wrong

(Image is in the Public Domain)

In case you didn't know already, voting machines are hackable and otherwise, just plain poop. Any state that's using them should be sued. Now a man has used voting machine print-outs to prove that they are adding votes incorrectly.

.... [Click here to read the rest of this post]

Tags:

School Then Versus School Now

Schools
(Image is used under the Pixabay license)

I just got this e-mail describing how different situations might be handled in 1967 versus 2007. I think it's supposed to be interpreted that the older way was better, but even if the '67 version wasn't obviously glorified, it's not necessarily something to envy.

School 1967 vs. School 2007

Scenario: Jack goes quail hunting before school, pulls into .... [Click here to read the rest of this post]

Tags:

Lady Sued Exquifax and Handed Them Their Butts

(Image used under: Fair Use doctrine)

Not only did a lady win almost $3 million for suing equifax, but now they have to pay another half million in attorney fees. The story is that Equifax refused to fix her credit report after she was a victim of identity theft.

.... [Click here to read the rest of this post]

Tags: , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]