For those of you also here in Marin County you can drop off your outdated computer equipment at the warehouse of RENEW COMPUTERS, a San Rafael based company.
Dear Fellow E-mailer,
My resolution is:
I WILL NOT FORWARD ANY E-MAIL THAT IS A TYPE OF CHAIN LETTER.
I WILL NOT FORWARD ANY E-MAIL INDICATING GOOD OR BAD THINGS WILL HAPPEN SHOULD I FAIL TO DO CERTAIN THINGS.
I WILL NOT FORWARD ANY E-MAIL THAT MAY BE A HOAX WITHOUT CHECKING WITH AT LEAST TWO AUTHORITATIVE WEBSITE SOURCES TO BE POSITIVE IT IS NOT A HOAX.
I WILL NOT FORWARD ANY E-MAIL ABOUT A VIRUS UNLESS I HAVE CHECKED WITH AT LEAST TWO AUTHORITATIVE WEBSITE SOURCES TO VALIDATE THE VIRUS.
I WILL NOT INITIATE CHAIN LETTERS, HOAXES OR VIRUSES.
Make this your resolution! Also remember:
I WILL NOT FORWARD THIS TO ANYONE ON MY ADDRESS LIST BUT I WILL RECONSTRUCT IT SO IT WILL APPEAR AS MY RESOLUTION AND SEND IT TO MY CONTACTS.
I WILL KEEP A COPY OF THIS RESOLUTION FOR FUTURE REFERENCE
I WILL VISIT THE FOLLOWING SITES FOR INFO ON CHAIN LETTERS, HOAXES AND VIRUSES.
Bookmark these websites for checking on the latest hoax, chain letter, virus, etc.:
(Kahl Consultants portal to hoax and virus infos)
(US Dept. of Energy's Computer Incident Advisory Capability)
(about computer virus myths, hoaxes, urban legends, hysteria)
(Virus information site)
(Symantec's virus site)
(McAfee's site for virus info and other links)
(alphabetical listing of hoaxes, myths, chain letters, etc)
(Internet fraud information)
(info on chain emails)
(info on hoaxes, scams, rumors, etc.)
Thanks for helping clean up the Internet.
Like junk mail and spam e-mail, "junk faxes" are another way businesses waste our time and invade our privacy. Problems created by "junk faxing" include:
Junk faxing in the U.S. is illegal under federal law, but many junk faxers continue to ignore the law.
Learn how to use the law that lets you sue advertisers for at least $500 per unwanted fax!
Here's how to do it:
1. Save and date your faxes.
4. Send demand letters.
5. Sue in small claims court.
6. Sue in state court.
Good luck fighting back!
Reduce Junk Mail
JUNK FAXES Stealing Time, Resources and Privacy
For years users have been hearing about "phishing," the sending of bogus e-mails - allegedly from a bank or other online business. Those who click on a link in the e-mail are shipped off to a phony but authentic-looking site and asked to enter sensitive information. If they type in their passwords or account numbers, thieves have that data.
Now phishers have been joined by "pharmers," who have made the ruse more sophisticated by planting a seed of malicious software in the user's own computer - or poisoning servers that direct traffic on the Internet. The result: Even if you type in the correct address of a website, the software can send you to a bogus one.
Phishing attacks require participation of the victims who must click on a link within an e-mail. But not clicking on such links is no protection against a pharming attack.
Here's how the scam works. The URL you use, such as www.my-bank.com, is connected to a distinct numerical IP address. Pharming replaces the number with a fraudulent one, sending you to a criminal site instead of the real one.
Besides keeping antivirus and antispyware programming up to date on their PC, users have few other ways to defend themselves from pharming.
Any site conducting financial transactions should be able to maintain a secure website. The corner of the browser should display a padlock symbol, and the address in the address bar should begin with "https," not simply "http." Click on the lock symbol and make sure it displays the address you are expecting to be at.
Another kind of pharming, sometimes called "domain spoofing," "domain poisoning," or "cache poisoning," attacks the servers that route traffic around the Internet. These so-called domain name system (DNS) servers also link the word address to its underlying numerical address.
To corrupt a DNS takes significantly more expertise than attacking PCs. Thieves first will try to get into individual computers.
The Internet was designed to make sharing of information between scholars and researchers fast and easy, not for secure financial transactions. Now new layers of security continually must be added, as criminals probe for weak points.
Phishers and pharmers set up their fake websites for only a few days or even a few hours, then move on before they can be found out.
But even if crooks can't get at your PC or the DNS server, they can always hope that you just can't spell.
Example: a malicious website was set up at www.googkle.com, just one keystroke away from www.google.com. Users who accidentally went to the site (using the Internet Explorer browser) were inundated with spyware, adware, and other malicious software that tried to secretly load itself onto their PCs. Similar attack sites have been created just a slip of the finger away from sites such as CNN.com, AOL.com, and MSN.com.
The people behind the malicious sites can be anywhere. The PC operating the site could be "somebody's grandmother's computer" being remotely controlled without her knowledge.
• Since 2004, the number of sites linked to the scam rose an average 28 percent a month.
• The US hosted a third of the phishing sites - more than any other nation - followed by China (12 %) and South Korea (9 %).
• Financial services are the most frequent target.
• Scam sites only last an average 5.8 days before they're taken down.
Also check out KC Virus & Hoax Alert at:
This website is good source for phishing news - if you get a "phishy" email look for it here: