Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Non-profit Payday Loans: Get Nailed, Just Not as Deeply

I don’t know how they get away with calling these non-profit. The Consumerist calculates that the interest being paid by their example case is still at 252%.

Tags:

Odd Comment Spam: “Thank You”

Leaving comments that are short and irrelevant to the conversation is a spammer trick for getting bloggers to approve their comment (which usually has a link attached to a site they want to drive traffic to). However, I got three such comments with no links so I wasn’t sure if they were spam or not at first. However, I solved that pretty fast. Do a simple google search for “Dakota .... [Click here to read the rest of this post]

In Arizona, Sharing Music Online is Costly

The results of this case are signifigant because the RIAA didn’t have to prove that the defendants actually shared anything. They won their suit because they were able to prove that the defendants made the songs available in their shared folder which, to the RIAA, is the same as distributing whether or not anyone actually downloads it.

New E-mail Scam: The IRS is Investigating You

Whenever you get something like this, always go to the source, never respond to the e-mail.

Tags:

Why the Consumer Safety Product Commission Doesn’t Work

From the Washington Post, a fairly concise description of what the CSPC is, where it came from, why it's necessary, and why it's almost completely irrelivant today. JTAG ERROR: No consumerist_ht index defined

Gonzales Steps Down, But Gets Off Scott Free?

So he's finally gone. He didn't get prosecuted yet, but will he? That's the question.

Gonzales's resignation is the latest in a series of high-level departures that has reshaped the end of Bush's second term. Karl Rove, another of Bush's close circle of aides from Texas, stepped down two weeks ago.
On this, all I have to say is that the rats are leaving… hopefully that .... [Click here to read the rest of this post]

Tags: ,

Proof That Telco’s Aided Illegal Spying

It's so nice that our spy chief slipped up and released this information. If it helps the lawsuits against AT&T and the like go forward, all the better. One comment about something McConnell said:

McConnell also said telecom firms should have immunity from lawsuits. "If you play out the suits at the value they're claimed, it would bankrupt these companies," he said.
…. Your point? Typicall .... [Click here to read the rest of this post]

Tags:

Drug Testing Cities/Communities

Here’s a neat thought. Drug test the sewage to determine the drug usage of whole cities or neighborhoods. This would be a great tool for determinining safe places to live, though there are certainly some privacy implications if this were used to narrow down to individuals.

More WGA Problems

Microsoft uses the Windows Genuine Advantage (WGA) tool, a piece of DRM software with a catchy marketing slogan, to spy on your computer and then make a decision whether or not your version of Windows is valid. Assuming that it decides it's not (even if it is), it will disable your computer. The best part of the deal is that on Windows XP machines, they slipped the "tool" into the .... [Click here to read the rest of this post]

Tags:

Gaming: Bioshock Doesn’t Have a Rootkit

There's been buzz that the new game, Bioshock, comes installed with a rootkit. It turns out that it's rootkit free… sort of. The point here is that people were worried that there's inappropriate software secretly installed with the game, and that much is true, it's just DRM, not an actual rootkit. As Ars Technica puts it:

Systems like SecuROM attempt to defeat common modes of piracy, but .... [Click here to read the rest of this post]

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]