Yes, it's THAT book!

Drop your email here to stay informed of the status of my "tell most" book about the National Security Agency:

--OR--

Read a little about the book here:

Employees are allies, not the adversary

--OR--

Check out the Kickstarter here (click)
How can I help you?
Contact Jeremy
Recommendations

Here's something that


I, Jeremy Duffy, actually recommend and think is worth checking out.
No web-bugs, no bs, just a legit recommmendation that I have personally evaluated before allowing it to be listed here:

Think something's here that shouldn't be? contact me!

Spy Chief Trying to EXPAND Surveillance Powers

Well... that's not how this is supposed to work
(Image used under: Creative Commons 2.0 [SRC])

They're trying to get even more power and less oversight? And I thought this Mike guy was doing such a good job so far. Here's one that caught my eye:

Give telecommunications companies immunity from civil liability for their cooperation with Bush's terrorist surveillance program. Pending lawsuits against companies .... [Click here to read the rest of this post]

Tags: ,

White House “Lost” E-mails – Evade Recordkeeping?

Note to Author: One of your jtags is missing a closing quote or a />. Your post is currently broken

Tags: , ,

How to Tell When It’s Bait and Switch

Want this? Lol, nope
(Image used under: Creative Commons 2.0 [SRC])

This is useful. A short write-up on how to tell when someone can get away with not giving you what was advertised vs when you can force them to honor a deal to their detriment. Here's the interesting part:

Employs compensation methods that discourage or penalize sales people for selling the bait.
.... [Click here to read the rest of this post]

Tags:

Vista Comatibility Mode – Good News And Bad

(Image used under: Fair Use doctrine)

Good news: Here's an article on how to use Vista's compatibility mode to run older software.

Bad news: According to all the comments on the article, it doesn't work at all (which matches my experience with the XP compatibility mode).

.... [Click here to read the rest of this post]

Tags: , ,

Department of Defense Seeks Public Comment on Predatory Lending

Lending shouldn't be predatory
(Image is in the Public Domain)

According to Public Citizen, the DoD has proposed some rules that severely limited the scope of protections as suggested by consumer protection groups. Up to June 11th, you can submit your ideas about the proposal to them directly (information about sending in the comments is on the last page of the proposal).

.... [Click here to read the rest of this post]

Tags:

Privacy Advocate Teaches State a Lesson – Posts Senators’ Private Data

Golly. I wonder if posting private information online could be a problem
(Image used under: Creative Commons 2.0 [SRC])

This lady found Social Security Numbers on a state website. She's threatened to publicly release detailed instructions on how to find them like she did and to expose the SSNs of several important people in the state if they don't fix the problem.

A spokesman for the office .... [Click here to read the rest of this post]

Tags: , , , , ,

Maryland Passes Paper Vote Bill!

(Image is in the Public Domain)

You may recall that Maryland was considering passing some laws requiring paper voting. According to the TrueVoteMD newsletter:

In the closing hours of the 2007 legislative session, a four-year effort to require paper ballots for Maryland's voting system passed the House and the Senate unanimously. ... The final bill ensures that any new voting system certified for .... [Click here to read the rest of this post]

Tags: ,

Enterprise Rentals – Insurance Selling Guide

Sleazy Sales

Here's a sheet they use for upselling people on what many consider to be worthless insurance.

Tags:

More States Defy National ID Card

(Image used under: Creative Commons 2.0 [SRC])

It looks like the ball is starting to roll.

New Hampshire, North Carolina, and Arkansas have joined the list of states evaluating proposals to ban implementation of the controversial Real ID act.
.... [Click here to read the rest of this post]

Tags: , ,

The Failure of the President’s ID Theft Task Force

The 2006 Presidentially mandated joint task force led by the Attorney General and head of the FTC were responsible for providing actionable steps to curb the ID Theft risk, but failed to do so. I watched as their preliminary recommendations went from recommending credit report freezes to omitting it to practically discouraging them. If they weren't incompetent, they're sellouts.

Tags: , , , , ,

Loading...

If you want to learn more about my professional background, click here to learn more.

Check out one of my guides/tutorials:

email Tutorial
|INDEX|next: E-mail Viruses

E-mail Dangers

Until we find out who the people are who actually buy things from spammers and kick them off the Internet, you're going to have to learn how to deal with and prevent spam.
E-mail Viruses - Learn how viruses are spread through e-mail and how to stop them
Phishing - Spot and avoid lures that pull you into the dark side of the web
Don't be one of those people that loses thousands of dollars to the classic Nigerian Scam.

E-mail Etiquette

Use CC only when necessary and BCC the rest of the time.
Use Reply-All when you mean to and never when you don't.
Practice proper E-mail Forwarding to protect privacy and make e-mails more readable.
Always personalize your e-mails to make it obvious to your recipient that it's valid.

E-mail Tips and Tricks

Using E-Mail Aliases Properly - Be careful about using sensitive data (like your real name) in an e-mail account.
Remember to treat your e-mail account with the security it deserves.
Use a decoy e-mail account to keep your main e-mail account free of spam.
Avoid using any Internet provider's default e-mail.

... or check out any of my other guides and tutorials by clicking here!

Preventing Spam

Spam is annoying and worthless, but you still see it every single day. Here are some tips for preventing and reducing spam.

[Click for full description]

E-mail Viruses

Make sure that viruses don't sneak onto your computer through your e-mails. Read some simple tips to prevent that from happening.

[Click for full description]

Phishing

By far the most dangerous thing you'll find in e-mails is a lie. Sending a bogus e-mail to someone is generally called phishing, but can also be referred to as a Nigerian scam (depending on the goal of the e-mail). Learn to recognize and deal with phishing before it's too late.

[Click for full description]

Nigerian Scam

Many people have lost thousands and even hundreds of thousands of dollars to the classic Nigerian Scam. Don't fall for it!

[Click for full description]

How to Use "CC" Properly

Don't violate people's privacy and invite spam into their accounts by CC'ing all your contacts. Learn the proper way to send mass e-mails first.

[Click for full description]

Reply-All

It's easy to embarass yourself or harm your career when you don't know how to use Reply-All appropriately.

[Click for full description]

How to Forward E-mails Properly

Don't forward e-mails carelessly or you risk looking foolish as best and violating the privacy of all your contacts at worst.

[Click for full description]

Personalize E-mail

Follow this simple rule of e-mail etiquette to help prevent your friends and family from falling for phishing scams.

[Click for full description]

Using E-Mail Aliases Properly

It can be hard to find a good name to use in an e-mail account that hasn't been used and doesn't give away too much information about you.

[Click for full description]

Protecting E-mail Passwords

Your e-mail account is the most important online account you have. Remember to treat it as such!.

[Click for full description]

Using a Decoy E-Mail Account

Why it's very important to use a buffer e-mail account to shield your main account from people and companies that you don't trust.

[Click for full description]

The ISP E-mail Trap

Don't fall for the trap of using the free e-mail account provided to you by your Internet service!

[Click for full description]