Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Wikileaks Proves Useful In Exposing Scientology “Secrets”

(Image used under: Creative Commons 3.0 [SRC])

Hopefully we'll see more material like this.

.... [Click here to read the rest of this post]

Tags: ,

A More Clever Way to Get Customer Satisfaction

Unscrewed: The Consumer's Guide to Getting What You Paid For: Burley
(See online!)

Here's a new book on my list: "Unscrewed. The Consumer's Guide to Getting What You Paid For".

The Consumerist has a great interview with the author that describes some of the techniques in the book. Check this one out:

BURLEY: As you know, none of the techniques require anyone to .... [Click here to read the rest of this post]

Tags: ,

Online Password Checker

(Image used under: Creative Commons 2.0 [SRC])

My first thought is to be very cautious about using an online password checker to test the strength of your passwords because you might inadvertantly give away your password to a rogue site. However, this Microsoft sponsored password checker requires no logins or personal information and being that it's a fairly well-known company, chances are smaller that they .... [Click here to read the rest of this post]

Tags: ,

Fight Unauthorized Charges

(Image used under: Creative Commons 3.0 [SRC])

It's worth repeating that if you get charged for something you didn't ask for, you should challenge it. One point this article makes that I want to stress, sometimes you get signed up for something because you didn't notice and uncheck a box during a transaction with some other company or you had a free trial and it .... [Click here to read the rest of this post]

Tags: ,

Wide-spread Drinking Water Contamination

Water contamination is no bueno
(Image is in the Public Domain)

Just another example for why we need federal monitoring and regulation of certain industries and services. Stuff like this would go on all the time if there wasn't oversight and corresponding accountability. Just look at the presidential administration for an example.

.... [Click here to read the rest of this post]

Tags: , , ,

Bittorrent For Legitimate Purposes

(Image is in the Public Domain)

Lest one think of torrents and illegal downloads at the same time, it's worth reminding the public that torrents are just a file distribution system and one that has many legitimate uses. For example, one IT department used torrent technology to distribute a set of system patches and upgrades in just four hours. The same patch would have previously .... [Click here to read the rest of this post]

Tags: ,

Comcast Must Die

(Image used under: Fair Use doctrine)

Comcastmustdie.com is a blog where people are invited to post their customer numbers so Comcast can get in touch with them to resolve issues. Given that people sometimes have vast difficulties that never seem to get resolved over the phone, this is a pretty good idea.

And according to the blog's comments, people have been getting results. It's .... [Click here to read the rest of this post]

Tags: ,

Science vs Scientology Timeline

(Image used under: Creative Commons 3.0 [SRC])

A timeline comparing the beliefs of Scientology versus actual science. And also this:

Science fiction writer L. Ron Hubbard's most notorious space opera is the religion of Scientology, which is packed with aliens and space battles and waves of invaders to our solar system.
.... [Click here to read the rest of this post]

Tags: ,

Bush Says America Should Thank Telecoms

George W. Bush
(Image used under: Fair Use doctrine)
[Bush] Now the question is, should these lawsuits be allowed to proceed, or should any company that may have helped save American lives be thanked for performing a patriotic service; should those who stepped forward to say we’re going to help defend America have to go to the courthouse to defend themselves, or should the Congress .... [Click here to read the rest of this post]

Tags: , ,

Computers Freedom and Privacy Conference of 2008

(Image used under: Fair Use doctrine)

The CFP2008 conference is coming up in late May. They're not taking registrations yet, but their information page is up at least. I wasn't able to attend last year, but the 2006 session was very cool.

The conference is the perfect place for paranoid anti-government/business privacy invasion types to congregate and complain as a group. Besides that, there are .... [Click here to read the rest of this post]

Tags: , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]