<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6761684931693524587</id><updated>2024-09-02T04:21:43.360-05:00</updated><category term="protection"/><category term="identity theft"/><category term="safety"/><category term="small business owners"/><category term="anti-spyware software"/><category term="firewall"/><category term="spam"/><category term="spyware"/><category term="tech support"/><category term="virus"/><category term="anti-virus software"/><category term="keylogging software"/><category term="security"/><category term="secure"/><category term="customer service"/><category term="cyber-security"/><category term="small business"/><category term="stay safe"/><category term="ATM card"/><category term="AutoPlay"/><category term="AutoPlay option"/><category term="Central National Bank"/><category term="Champ Bulldogs"/><category term="ESL Teachers"/><category term="FBI"/><category term="Federal Trade Commission"/><category term="KTVO News"/><category term="Microsoft"/><category term="PigBusters"/><category term="Social Security Number misuse"/><category term="Subtle Particle"/><category term="The Scam Team"/><category term="The UK Cats"/><category term="USB"/><category term="USB sticks"/><category term="Windows"/><category term="Windows Shell"/><category term="alerts"/><category term="awareness"/><category term="banking fraud"/><category term="clinical social worker"/><category term="communication"/><category term="consultant"/><category term="credit bureau"/><category term="credit report"/><category term="cyber security"/><category term="debt collector"/><category term="driver&#39;s license number misuse"/><category term="executives"/><category term="file"/><category term="flash drive"/><category term="hackers"/><category term="home-based entrepreneurs"/><category term="leadership"/><category term="management trainer"/><category term="managers"/><category term="medical identity theft"/><category term="motivational speaker"/><category term="nonprofit organization"/><category term="nonprofit organizations"/><category term="pc service"/><category term="predators"/><category term="removable drives"/><category term="scammers"/><category term="security advisory"/><title type='text'>Say No to Hackers and Spyware</title><subtitle type='html'>Saying no to hackers, spyware, and cybercriminals is a shared community responsibility. That means everyone has the potential to make a difference and educate others. The goal of this site, in attempting to raise awareness, is to encourage you to think about online safety within your home, workplace, and community, no matter what your role is. To accomplish this goal, we shall share articles and resources, especially those to help people reinforce safe online and offline behavior.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>57</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-8487698632549502751</id><published>2012-04-18T11:09:00.001-05:00</published><updated>2012-04-18T11:09:56.387-05:00</updated><title type='text'>Guest Blogger: BOLT Explains the Dangers of International Business Travel</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #073763; font-family: Times, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;BOLT is &lt;i&gt;Your Business Owners Liability Team&lt;/i&gt;.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #073763; font-family: Times, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #073763; font-family: Times, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;b&gt;Their extensive&amp;nbsp;graphic might just help you to understand the Dangers of International Business Travel&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #073763; font-family: Times, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;span style=&quot;line-height: 23px; text-align: left;&quot;&gt;for business owners and their employees. It&amp;nbsp;&lt;/span&gt;&lt;em style=&quot;line-height: 23px; text-align: left;&quot;&gt;&lt;/em&gt;&lt;span style=&quot;line-height: 23px; text-align: left;&quot;&gt;is the ultimate free resource for helping to protect your business and your future against dangers abroad by understanding the very real risks you can be taking without proper protection.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #073763; font-family: Times, &#39;Times New Roman&#39;, serif; font-size: large;&quot;&gt;&lt;span style=&quot;line-height: 23px; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;a href=&quot;http://info.boltinsurance.com/dangers-of-business-travel-infographic/&quot;&gt;&lt;img alt=&quot;Dangers of International Business Travel Infographic&quot; border=&quot;0&quot; src=&quot;http://info.boltinsurance.com/Portals/16893/images/dangers_of_international_business_travel_infographic.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
Via: &lt;a href=&quot;http://www.boltinsurance.com/&quot;&gt;&lt;b&gt;Bolt Insurance&lt;/b&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/8487698632549502751/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/8487698632549502751?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/8487698632549502751'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/8487698632549502751'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2012/04/guest-blogger-bolt-explains-dangers-of.html' title='Guest Blogger: BOLT Explains the Dangers of International Business Travel'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-7579300115521920038</id><published>2010-09-14T11:00:00.004-05:00</published><updated>2010-09-14T11:40:30.892-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ATM card"/><category scheme="http://www.blogger.com/atom/ns#" term="banking fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="credit bureau"/><category scheme="http://www.blogger.com/atom/ns#" term="credit report"/><category scheme="http://www.blogger.com/atom/ns#" term="debt collector"/><category scheme="http://www.blogger.com/atom/ns#" term="driver&#39;s license number misuse"/><category scheme="http://www.blogger.com/atom/ns#" term="Federal Trade Commission"/><category scheme="http://www.blogger.com/atom/ns#" term="medical identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="Social Security Number misuse"/><title type='text'>Have You Been a Victim of Identity Theft?</title><content type='html'>&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Below is an excerpt of a helpful guide provided by Privacy Rights Clearinghouse to get your identity back.&lt;br /&gt;&lt;br /&gt;The guide provides victims of identity theft with instructions on how  to regain their financial health and who to contact for more help. You  must act quickly and assertively to minimize the damage.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;If you want to stay protected in the future, be sure to sign up for iDefend and let our identity specialists manage everything for you. To learn more about the 25 + resources mentioned in the guide, &lt;a href=&quot;http://www.invisus.com/id_victim.php&quot;&gt;click here&lt;/a&gt;.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Identity Theft: What to Do if It Happens to You&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;You apply for a credit card and are turned down because of a low credit score, yet you know that you&#39;ve always paid your accounts on time.&lt;br /&gt;&lt;br /&gt;A debt collector calls to demand payment on a six-month overdue account for a credit card you have never had.&lt;br /&gt;&lt;br /&gt;You receive a credit card in the mail that you&#39;ve never applied for.&lt;br /&gt;&lt;br /&gt;What&#39;s happening? You could be the victim of identity theft, where an imposter is using your personal information to obtain credit. Then when the thief does not pay the bills, the company itself or a debt collection company contacts you to demand payment. As a result, your credit report is likely to contain negative information about your bill-payment history, and your credit score has probably been lowered considerably, making it difficult or impossible to obtain new credit yourself&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/7579300115521920038/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/7579300115521920038?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7579300115521920038'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7579300115521920038'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/09/have-you-been-victim-of-identity-theft.html' title='Have You Been a Victim of Identity Theft?'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-4550521469211133491</id><published>2010-09-04T10:00:00.005-05:00</published><updated>2010-09-14T11:05:35.050-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AutoPlay"/><category scheme="http://www.blogger.com/atom/ns#" term="AutoPlay option"/><category scheme="http://www.blogger.com/atom/ns#" term="file"/><category scheme="http://www.blogger.com/atom/ns#" term="flash drive"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="removable drives"/><category scheme="http://www.blogger.com/atom/ns#" term="security advisory"/><category scheme="http://www.blogger.com/atom/ns#" term="USB"/><category scheme="http://www.blogger.com/atom/ns#" term="USB sticks"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows"/><category scheme="http://www.blogger.com/atom/ns#" term="Windows Shell"/><title type='text'>Hackers Target USB and Other Removable Media . . . Again</title><content type='html'>&lt;div style=&quot;text-align: center; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Written July 19, 2010 by Joel Harrison,&lt;br /&gt;INVISUS Senior Technology Analyst&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The world was recently attacked by malware that installed itself through the AutoPlay feature, and it is happening again. The previous attack placed a second AutoPlay option in the window that pops up when you insert a flash drive&lt;qtlend&gt;&lt;/qtlend&gt;. Clicking on the wrong one would infect the computer. This new threat attacks shortcut icons. It targets USB sticks and other removable drives.&lt;br /&gt;&lt;br /&gt;A security advisory issued by Microsoft warns users of targeted attacks against Windows Shell (that is the main interface that Windows uses to organize the desktop and file system). The attacks work on virtually all versions of Windows and could enable a hacker to take complete control of a victim’s machine.&lt;br /&gt;&lt;br /&gt;The attack targets the way Windows parses shortcut icons on a user’s system. Microsoft said disabling AutoPlay makes it more difficult for the attack to work. The attack can be carried out remotely through network shares or remote WebDAV shares.&lt;br /&gt;&lt;br /&gt;As usual, make sure that the INVISUS security software on your machine is updated and running scans regularly. Do not plug in USB flash drives that you find or were given to you by someone you are unfamiliar with.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;hr style=&quot;margin-left: 0px; margin-right: 0px; height: 4px; font-weight: bold;&quot;&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Note:  Whether your computer is at your home, church, or small business, you owe it to yourself, your family, congregation, customers, and employees to ensure that it is safe and secured from hackers and cybercriminal attacks.&lt;br /&gt;&lt;br /&gt;Thus, I encourage you to test your PC right now by clicking on the test button in the upper, right column. After you&#39;ve tested it, why not also take a moment to see if your small business is PCI compliant?&lt;/span&gt;&lt;/div&gt;&lt;qtlbar id=&quot;qtlbar&quot; dir=&quot;ltr&quot; style=&quot;display: inline; text-align: left; line-height: 100%; padding: 0pt; background-color: rgb(236, 236, 236); -moz-border-radius: 3px 3px 3px 3px; cursor: default; z-index: 999; left: 203px; top: 151px;&quot;&gt;&lt;img class=&quot;qtl&quot; title=&quot;Copy selction&quot; src=&quot;http://www.qtl.co.il/img/copy.png&quot; /&gt;&lt;a title=&quot;Search With Google&quot; target=&quot;_blank&quot; href=&quot;http://www.google.com/search?q=flash%20drive&quot;&gt;&lt;img src=&quot;http://www.google.com/favicon.ico&quot; class=&quot;qtl&quot; /&gt;&lt;/a&gt;&lt;img src=&quot;http://www.qtl.co.il/img/trans.png&quot; title=&quot;Translate With Google&quot; class=&quot;qtl&quot; /&gt;&lt;iframe id=&quot;qtlframe&quot; src=&quot;&quot; style=&quot;display: none; border: 1px solid rgb(236, 236, 236); background-color: white;&quot;&gt;&lt;/iframe&gt;&lt;/qtlbar&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/4550521469211133491/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/4550521469211133491?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4550521469211133491'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4550521469211133491'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/09/hackers-target-usb-and-other-removable.html' title='Hackers Target USB and Other Removable Media . . . Again'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-5995404706228961835</id><published>2010-08-24T14:11:00.004-05:00</published><updated>2010-08-24T14:24:13.145-05:00</updated><title type='text'>Beware of Job-Search Scammers Who Will Steal Your Information and Money, Part I of IV</title><content type='html'>&lt;div  style=&quot;text-align: justify; font-weight: bold; color: rgb(0, 0, 102);font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;If you’re looking for a job, you may see ads for firms that promise results. Many of these firms may be legitimate and helpful, but others may misrepresent their services, promote out-dated or fictitious job offerings, or charge high fees in advance for services that may not lead to a job. The Federal Trade Commission (FTC) announced a new crackdown on con artists and scammers who are preying on unemployed Americans with job-placement and work-at-home scams, promoting empty promises that they can help people get jobs in the federal government, as movie extras, or as mystery shoppers; or make money working from their homes stuffing envelopes or assembling ornaments.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Visit the FTC’s Web site at &lt;a href=&quot;http://www.ftc.gov/&quot;&gt;www.FTC.gov&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;or write to the FTC at their&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Consumer Response Center, Room 130,&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;600 Pennsylvania Avenue, N.W.,&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Washington, D.C. 20580.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and unfair business practices and to provide information to help spot, stop, and avoid them. &lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Their Web site provides free information on a variety of consumer topics.&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;To file a complaint in English or Spanish, visit the FTC’s online Complaint Assistant or call 1-877-FTC-HELP (1-877-382-4357).&lt;br /&gt;&lt;br /&gt;The FTC enters complaints into Consumer Sentinel, a secure, online database available to more than 1,700 civil and criminal law enforcement agencies in the U.S. and abroad.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;qtlend&gt;&lt;/qtlend&gt;&lt;qtlbar id=&quot;qtlbar&quot; dir=&quot;ltr&quot; style=&quot;display: inline; text-align: left; line-height: 100%; padding: 0pt; background-color: rgb(236, 236, 236); -moz-border-radius: 3px 3px 3px 3px; cursor: pointer; z-index: 999; left: 3px; top: 1023px; opacity: 0.9;&quot;&gt;&lt;img class=&quot;qtl&quot; title=&quot;Copy selction&quot; src=&quot;http://www.qtl.co.il/img/copy.png&quot; /&gt;&lt;a title=&quot;Search With Google&quot; target=&quot;_blank&quot; href=&quot;http://www.google.com/search?q=If%20you%E2%80%99re%20looking%20for%20a%20job,%20you%20may%20see%20ads%20for%20firms%20that%20promise%20results.%20Many%20of%20these%20firms%20may%20be%20legitimate%20and%20helpful,%20but%20others%20may%20misrepresent%20their%20services,%20promote%20out-dated%20or%20fictitious%20job%20offerings,%20or%20charge%20high%20fees%20in%20advance%20for%20services%20that%20may%20not%20lead%20to%20a%20job.%20The%20Federal%20Trade%20Commission%20%28FTC%29%20announced%20a%20new%20crackdown%20on%20con%20artists%20and%20scammers%20who%20are%20preying%20on%20unemployed%20Americans%20with%20job-placement%20and%20work-at-home%20scams,%20promoting%20empty%20promises%20that%20they%20can%20help%20people%20get%20jobs%20in%20the%20federal%20government,%20as%20movie%20extras,%20or%20as%20mystery%20shoppers;%20or%20make%20money%20working%20from%20their%20homes%20stuffing%20envelopes%20or%20assembling%20ornaments.%0D%0A%0D%0AVisit%20the%20FTC%E2%80%99s%20Web%20site%20at%20www.FTC.gov%0D%0Aor%20write%20to%20the%20FTC%20at%20their%0D%0AConsumer%20Response%20Center,%20Room%20130,%0D%0A600%20Pennsylvania%20Avenue,%20N.W.,%0D%0AWashington,%20D.C.%2020580.%0D%0A%0D%0AThe%20Federal%20Trade%20Commission%20works%20for%20consumers%20to%20prevent%20fraudulent,%20deceptive,%20and%20unfair%20business%20practices%20and%20to%20provide%20information%20to%20help%20spot,%20stop,%20and%20avoid%20them.%20Their%20Web%20site%20provides%20free%20information%20on%20a%20variety%20of%20consumer%20topics.%0D%0A%0D%0ATo%20file%20a%20complaint%20in%20English%20or%20Spanish,%20visit%20the%20FTC%E2%80%99s%20online%20Complaint%20Assistant%20or%20call%201-877-FTC-HELP%20%281-877-382-4357%29.%0D%0A%0D%0AThe%20FTC%20enters%20complaints%20into%20Consumer%20Sentinel,%20a%20secure,%20online%20database%20available%20to%20more%20than%201,700%20civil%20and%20criminal%20law%20enforcement%20agencies%20in%20the%20U.S.%20and%20abroad.%0D%0A&quot;&gt;&lt;img src=&quot;http://www.google.com/favicon.ico&quot; class=&quot;qtl&quot; /&gt;&lt;/a&gt;&lt;img src=&quot;http://www.qtl.co.il/img/trans.png&quot; title=&quot;Translate With Google&quot; class=&quot;qtl&quot; /&gt;&lt;iframe id=&quot;qtlframe&quot; src=&quot;&quot; style=&quot;display: none; border: 1px solid rgb(236, 236, 236); background-color: white;&quot;&gt;&lt;/iframe&gt;&lt;/qtlbar&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/5995404706228961835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/5995404706228961835?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5995404706228961835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5995404706228961835'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/08/beware-of-job-search-scammers-who-will.html' title='Beware of Job-Search Scammers Who Will Steal Your Information and Money, Part I of IV'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-3824594642422189406</id><published>2010-08-05T16:05:00.002-05:00</published><updated>2010-08-05T16:10:00.610-05:00</updated><title type='text'>Criminals and Spies Swamp Cyberworld</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;The  following is an article written by Mr. Sebastian Smith that he  published on Wednesday, August 4, 2010 online  at 09:19 am ET. It presents a current state of affairs in the  cybercriminal world that we are exposed to every time we go online.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;_____________________&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;NEW YORK (AFP) – Finally the world has a hacker-proof communications  device. The bad news? It&#39;s a brick in a glass case. The joke, told to a  cyber conference Tuesday in New York, illustrates what top US experts  describe as the dire state of online security.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;&quot;Threats today are basically not preventable,&quot; said Amit Yoran, a  leading IT (Information Technology) security consultant and CEO (Chief  Executive Officer) of NetWitness Corporation. &quot;There&#39;s basically no way  to defend any large-scale environment today.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;The spoof brick really exists -- right in the lobby of the secretive US  National Security Agency, Yoran said. And that&#39;s to remind America&#39;s top  cyber spooks how limited their powers really are.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Yoran described a world where hackers operate mostly with impunity,  since they are rarely caught -- or extradited when found -- and at great  profit. Nor are they all lone teenage computer geniuses playing for  kicks.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Organized gangs and government-sponsored spies are the real threat,  making cyber crime a bigger sector even than drug trafficking, he said.  &quot;It&#39;s a very complex set-up.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;The gloomy diagnosis from the FBI-sponsored conference at New York&#39;s  Fordham University comes when the Internet and society are becoming more  integrated by the minute.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Everything from countries&#39; military maneuvers to ordinary citizens&#39;  grocery shopping is increasingly organized online. In fact the entire US  economy, White House cyber security coordinator, Howard Schmidt, told  the conference, essentially rests on safe Internet facilities.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Last year saw 10 trillion dollars in online business, a figure forecast to hit 24 trillion in another decade, he noted.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Yet, incredibly, the business world has yet to grasp the threat that  online thieves and vandals pose. Almost half of small businesses don&#39;t  use anti-virus software and even fewer use it properly, Schmidt warned.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;&quot;There has been enough exfiltration of personal property in this country  in the past years to fill the Library of Congress over and over again.  So we must do more.&quot; But chasing cyber criminals is a task that can  exasperate the most powerful sleuth.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;&quot;Cyber criminals are not constrained by geographic borders,&quot; said  Michael DuBose, head of the computer crime section at the Department of  Justice. &quot;A Romanian hacker sitting at his kitchen table can penetrate a  US network within seconds and exit just as quickly.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;The hackers&#39; &quot;world has become a lot smaller,&quot; he added, but &quot;they prey on what is essentially a global victim pool.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Another hurdle, according to the FBI&#39;s cyber division deputy assistant  director, Jeffrey Troy, is outdated legislation, combined with the usual  complications of cross-border probes.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;&quot;We need to be operating like one global law enforcement agency,&quot; he  said. Instead &quot;a lot of countries don&#39;t have laws that fit the crime...  We&#39;re using laws that were written when no one even had thought of the  crime.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Experts at the conference also lamented what they said was the failure  of private software companies to come up with adequate defenses.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;In the end, they said, all that can be done is to mitigate the problem  and make the hacking business -- ranging from theft of bank details and  spam advertising to espionage and terrorist sabotage -- less easy.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;Gary Gagnon, from the IT security firm MITRE, joked the biggest problem  was people -- &quot;users who just can&#39;t help clicking&quot; on infected files.  But he said no one should ever feel smug about security levels. &quot;If  (hackers) are determined to get in our network, they&#39;ll get in. The odds  are stacked in their favor.&quot;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;______________&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;color:navy;&quot;&gt;&lt;span style=&quot;font-family:times new roman,times;&quot;&gt;The bottomline? Please stay vigilant whenever you go online, especially  when you send Comments and warning alerts encouraging your friends to  send to everyone on their list.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;qtlend&gt;&lt;/qtlend&gt;&lt;qtlbar id=&quot;qtlbar&quot; dir=&quot;ltr&quot; style=&quot;display: inline; text-align: left; line-height: 100%; padding: 0pt; background-color: rgb(236, 236, 236); -moz-border-radius: 3px 3px 3px 3px; cursor: pointer; z-index: 999; left: 3px; top: 1625px;&quot;&gt;&lt;img class=&quot;qtl&quot; title=&quot;Copy selction&quot; src=&quot;http://www.qtl.co.il/img/copy.png&quot; /&gt;&lt;a title=&quot;Search With Google&quot; target=&quot;_blank&quot; href=&quot;http://www.google.com/search?q=The%20following%20is%20an%20article%20written%20by%20Mr.%20Sebastian%20Smith%20that%20he%20published%20on%20Wednesday,%20August%204,%202010%20online%20at%2009:19%20am%20ET.%20It%20presents%20a%20current%20state%20of%20affairs%20in%20the%20cybercriminal%20world%20that%20we%20are%20exposed%20to%20every%20time%20we%20go%20online.%0D%0A_____________________%0D%0A%0D%0ANEW%20YORK%20%28AFP%29%20%E2%80%93%20Finally%20the%20world%20has%20a%20hacker-proof%20communications%20device.%20The%20bad%20news?%20It%27s%20a%20brick%20in%20a%20glass%20case.%20The%20joke,%20told%20to%20a%20cyber%20conference%20Tuesday%20in%20New%20York,%20illustrates%20what%20top%20US%20experts%20describe%20as%20the%20dire%20state%20of%20online%20security.%0D%0A%0D%0A%22Threats%20today%20are%20basically%20not%20preventable,%22%20said%20Amit%20Yoran,%20a%20leading%20IT%20%28Information%20Technology%29%20security%20consultant%20and%20CEO%20%28Chief%20Executive%20Officer%29%20of%20NetWitness%20Corporation.%20%22There%27s%20basically%20no%20way%20to%20defend%20any%20large-scale%20environment%20today.%22%0D%0A%0D%0AThe%20spoof%20brick%20really%20exists%20--%20right%20in%20the%20lobby%20of%20the%20secretive%20US%20National%20Security%20Agency,%20Yoran%20said.%20And%20that%27s%20to%20remind%20America%27s%20top%20cyber%20spooks%20how%20limited%20their%20powers%20really%20are.%0D%0A%0D%0AYoran%20described%20a%20world%20where%20hackers%20operate%20mostly%20with%20impunity,%20since%20they%20are%20rarely%20caught%20--%20or%20extradited%20when%20found%20--%20and%20at%20great%20profit.%20Nor%20are%20they%20all%20lone%20teenage%20computer%20geniuses%20playing%20for%20kicks.%0D%0A%0D%0AOrganized%20gangs%20and%20government-sponsored%20spies%20are%20the%20real%20threat,%20making%20cyber%20crime%20a%20bigger%20sector%20even%20than%20drug%20trafficking,%20he%20said.%20%22It%27s%20a%20very%20complex%20set-up.%22%0D%0A%0D%0AThe%20gloomy%20diagnosis%20from%20the%20FBI-sponsored%20conference%20at%20New%20York%27s%20Fordham%20University%20comes%20when%20the%20Internet%20and%20society%20are%20becoming%20more%20integrated%20by%20the%20minute.%0D%0A%0D%0AEverything%20from%20countries%27%20military%20maneuvers%20to%20ordinary%20citizens%27%20grocery%20shopping%20is%20increasingly%20organized%20online.%20In%20fact%20the%20entire%20US%20economy,%20White%20House%20cyber%20security%20coordinator,%20Howard%20Schmidt,%20told%20the%20conference,%20essentially%20rests%20on%20safe%20Internet%20facilities.%0D%0A%0D%0ALast%20year%20saw%2010%20trillion%20dollars%20in%20online%20business,%20a%20figure%20forecast%20to%20hit%2024%20trillion%20in%20another%20decade,%20he%20noted.%0D%0A%0D%0AYet,%20incredibly,%20the%20business%20world%20has%20yet%20to%20grasp%20the%20threat%20that%20online%20thieves%20and%20vandals%20pose.%20Almost%20half%20of%20small%20businesses%20don%27t%20use%20anti-virus%20software%20and%20even%20fewer%20use%20it%20properly,%20Schmidt%20warned.%0D%0A%0D%0A%22There%20has%20been%20enough%20exfiltration%20of%20personal%20property%20in%20this%20country%20in%20the%20past%20years%20to%20fill%20the%20Library%20of%20Congress%20over%20and%20over%20again.%20So%20we%20must%20do%20more.%22%20But%20chasing%20cyber%20criminals%20is%20a%20task%20that%20can%20exasperate%20the%20most%20powerful%20sleuth.%0D%0A%0D%0A%22Cyber%20criminals%20are%20not%20constrained%20by%20geographic%20borders,%22%20said%20Michael%20DuBose,%20head%20of%20the%20computer%20crime%20section%20at%20the%20Department%20of%20Justice.%20%22A%20Romanian%20hacker%20sitting%20at%20his%20kitchen%20table%20can%20penetrate%20a%20US%20network%20within%20seconds%20and%20exit%20just%20as%20quickly.%22%0D%0A%0D%0AThe%20hackers%27%20%22world%20has%20become%20a%20lot%20smaller,%22%20he%20added,%20but%20%22they%20prey%20on%20what%20is%20essentially%20a%20global%20victim%20pool.%22%0D%0A%0D%0AAnother%20hurdle,%20according%20to%20the%20FBI%27s%20cyber%20division%20deputy%20assistant%20director,%20Jeffrey%20Troy,%20is%20outdated%20legislation,%20combined%20with%20the%20usual%20complications%20of%20cross-border%20probes.%0D%0A%0D%0A%22We%20need%20to%20be%20operating%20like%20one%20global%20law%20enforcement%20agency,%22%20he%20said.%20Instead%20%22a%20lot%20of%20countries%20don%27t%20have%20laws%20that%20fit%20the%20crime...%20We%27re%20using%20laws%20that%20were%20written%20when%20no%20one%20even%20had%20thought%20of%20the%20crime.%22%0D%0A%0D%0AExperts%20at%20the%20conference%20also%20lamented%20what%20they%20said%20was%20the%20failure%20of%20private%20software%20companies%20to%20come%20up%20with%20adequate%20defenses.%0D%0A%0D%0AIn%20the%20end,%20they%20said,%20all%20that%20can%20be%20done%20is%20to%20mitigate%20the%20problem%20and%20make%20the%20hacking%20business%20--%20ranging%20from%20theft%20of%20bank%20details%20and%20spam%20advertising%20to%20espionage%20and%20terrorist%20sabotage%20--%20less%20easy.%0D%0A%0D%0AGary%20Gagnon,%20from%20the%20IT%20security%20firm%20MITRE,%20joked%20the%20biggest%20problem%20was%20people%20--%20%22users%20who%20just%20can%27t%20help%20clicking%22%20on%20infected%20files.%20But%20he%20said%20no%20one%20should%20ever%20feel%20smug%20about%20security%20levels.%20%22If%20%28hackers%29%20are%20determined%20to%20get%20in%20our%20network,%20they%27ll%20get%20in.%20The%20odds%20are%20stacked%20in%20their%20favor.%22%0D%0A______________%0D%0A%0D%0AThe%20bottomline?%20Please%20stay%20vigilant%20whenever%20you%20go%20online,%20especially%20when%20you%20send%20Comments%20and%20warning%20alerts%20encouraging%20your%20friends%20to%20send%20to%20everyone%20on%20their%20list.&quot;&gt;&lt;img src=&quot;http://www.google.com/favicon.ico&quot; class=&quot;qtl&quot; /&gt;&lt;/a&gt;&lt;img src=&quot;http://www.qtl.co.il/img/trans.png&quot; title=&quot;Translate With Google&quot; class=&quot;qtl&quot; /&gt;&lt;iframe id=&quot;qtlframe&quot; src=&quot;&quot; style=&quot;display: none; border: 1px solid rgb(236, 236, 236); background-color: white;&quot;&gt;&lt;/iframe&gt;&lt;/qtlbar&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/3824594642422189406/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/3824594642422189406?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3824594642422189406'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3824594642422189406'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/08/criminals-and-spies-swamp-cyberworld.html' title='Criminals and Spies Swamp Cyberworld'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-3106185153225639656</id><published>2010-06-28T15:50:00.003-05:00</published><updated>2010-06-28T16:00:59.997-05:00</updated><title type='text'>FTC Halts International Scheme of More Than $10 Million In Unauthorized Credit and Debit Cards Charges</title><content type='html'>&lt;div  style=&quot;text-align: justify; font-weight: bold;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;At the request of the Federal Trade Commission (FTC), a federal court has halted an elaborate international scheme that used identity theft to place more than $10 million in bogus charges on consumers’ credit and debit cards, pending a trial.&lt;br /&gt;&lt;br /&gt;More than a million consumers were hit with one-time charges of $10 or less, and their payments were routed through dummy corporations in the United States to bank accounts in Eastern Europe and Central Asia.&lt;br /&gt;&lt;br /&gt;The defendants, using phony company names resembling real companies, and information taken from identity theft victims in the United States, opened in excess of 100 merchant accounts with companies that process charges to the credit and debit card accounts of c&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;onsumers&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;, according to the FTC complaint.&lt;br /&gt;&lt;br /&gt;The FTC believes the defendants may have run credit checks on the identity theft victims first, to be sure they were creditworthy. The defendants also cloaked each fake merchant with a virtual office address near a real merchant’s location, a phone number, a home phone number for the “owner,” a Web site pretending to sell products, a toll-free number consumers could call, and a real company’s tax number found on the Internet.&lt;br /&gt;&lt;br /&gt;The FTC alleged that with spam e-mail, the defendants recruited at least 14 “&lt;span style=&quot;font-style: italic;&quot;&gt;money mules&lt;/span&gt;” – people in the United States they paid to form 16 dummy corporations, open associated bank accounts to receive the card payments, and transfer the money overseas. The defendants used debit cards linked to these bank accounts to set up telephone service, virtual addresses, and Web sites that helped deceive the card processors, according to the complaint.&lt;br /&gt;&lt;br /&gt;The “&lt;span style=&quot;font-style: italic;&quot;&gt;money mules&lt;/span&gt;” responded to spam e-mail pretending to seek a U.S. finance manager for an international financial services company. The FTC has not determined how the defendants obtained the stolen identities or consumers’ credit and debit account numbers. Consumers’ payments were sent to bank accounts in Lithuania, Estonia, Latvia, Bulgaria, Cyprus, and Kyrgyzstan.&lt;br /&gt;&lt;br /&gt;None of the consumers affected by the scam had contact with any of the defendants. Most consumers either didn’t notice the charges on their bills or didn’t seek chargebacks because of the small amounts – charges ranged from 20 cents to $10. Consumers who called the toll-free numbers that appeared on their bills either found them disconnected or heard recorded messages instructing them to leave a message, but no calls were returned.&lt;br /&gt;&lt;br /&gt;The defendants are the 16 sham companies – API Trade LLC, ARA Auto Parts Trading LLC, Bend Transfer Services LLC, B-Texas European LLC, CBTC LLC, CMG Global LLC, Confident Incorporation, HDPL Trade LLC, Hometown Homebuyers LLC, IAS Group LLC, IHC Trade LLC, MZ Services LLC, New World Enterprizes LLC, Parts Imports LLC, SMI Imports LLC, SVT Services LLC – and one or more persons who are unknown to the agency at this time. The FTC charged them with making unauthorized charges to consumers’ credit cards in violation of Section 5 of the FTC Act. The court froze the defendants’ assets and ordered them to stop operating, pending final resolution of the case.&lt;br /&gt;&lt;br /&gt;The Commission vote to file the complaint was 4-0. The preliminary injunction order was entered by Judge Ronald A. Guzman in the U.S. District Court for the Northern District of Illinois, Eastern Division.&lt;br /&gt;&lt;br /&gt;NOTE: The Commission authorizes the filing of a complaint when it has “reason to believe” that the law has been or is being violated, and it appears to the Commission that a proceeding is in the public interest. The complaint is not a finding or ruling that the defendants have actually violated the law.&lt;br /&gt;&lt;br /&gt;The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and unfair business practices and to provide information to help spot, stop, and avoid them. To file a complaint in English or Spanish, visit the FTC’s online Complaint Assistant or call 1-877-FTC-HELP (1-877-382-4357). The FTC enters complaints into Consumer Sentinel, a secure, online database available to more than 1,800 civil and criminal law enforcement agencies in the U.S. and abroad.&lt;br /&gt;&lt;br /&gt;The FTC’s Web site (&lt;a href=&quot;http://www.ftc.gov/&quot;&gt;www.FTC.gov&lt;/a&gt;) provides free information on a variety of consumer topics.&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/3106185153225639656/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/3106185153225639656?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3106185153225639656'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3106185153225639656'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/06/ftc-halts-international-scheme-of-more.html' title='FTC Halts International Scheme of More Than $10 Million In Unauthorized Credit and Debit Cards Charges'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-5434359777505700801</id><published>2010-06-16T11:52:00.001-05:00</published><updated>2010-06-16T11:55:28.027-05:00</updated><title type='text'>The Digital Photocopier You Use May Be Loaded with Secrets</title><content type='html'>&lt;object width=&quot;400&quot; height=&quot;395&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/6pIFUOav2xE&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/6pIFUOav2xE&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;400&quot; height=&quot;395&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/5434359777505700801/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/5434359777505700801?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5434359777505700801'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5434359777505700801'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/06/digital-photocopiers-loaded-with.html' title='The Digital Photocopier You Use May Be Loaded with Secrets'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-4577223807607788122</id><published>2010-06-14T16:08:00.003-05:00</published><updated>2010-06-14T16:15:31.405-05:00</updated><title type='text'>Your Social Network Profile Might Attract Pedophiles and Predators</title><content type='html'>&lt;object height=&quot;395&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube-nocookie.com/v/e_pDZRs55qQ&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;color1=0x006699&amp;amp;color2=0x54abd6&amp;amp;border=1&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube-nocookie.com/v/e_pDZRs55qQ&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;color1=0x006699&amp;amp;color2=0x54abd6&amp;amp;border=1&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;395&quot; width=&quot;400&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/4577223807607788122/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/4577223807607788122?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4577223807607788122'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4577223807607788122'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/06/your-social-network-profile-might.html' title='Your Social Network Profile Might Attract Pedophiles and Predators'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-5926333824221069636</id><published>2010-05-06T13:28:00.002-05:00</published><updated>2010-05-06T13:46:18.900-05:00</updated><title type='text'>Future Computer Technology from Microsoft</title><content type='html'>&lt;object width=&quot;400&quot; height=&quot;395&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/SQu5zRmqa_E&amp;border=1&amp;color1=0x6699&amp;color2=0x54abd6&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/SQu5zRmqa_E&amp;border=1&amp;color1=0x6699&amp;color2=0x54abd6&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;400&quot; height=&quot;395&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/5926333824221069636/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/5926333824221069636?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5926333824221069636'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5926333824221069636'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/05/future-of-compter-technology.html' title='Future Computer Technology from Microsoft'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-5876963859890881779</id><published>2010-05-04T11:00:00.000-05:00</published><updated>2010-05-04T11:48:33.131-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="keylogging software"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>The Days of High PC Maintenance and Repair Costs Are Gone!</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.invisus.com/images/inv_logo5.gif&quot;&gt;&lt;img style=&quot;float: left; margin: 0pt 10px 10px 0pt; cursor: pointer; width: 158px; height: 68px;&quot; src=&quot;http://www.invisus.com/images/inv_logo5.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;At INVISUS, we provide you with &lt;b&gt;significant cost  savings&lt;/b&gt; for professional computer support services every time you  need assistance. Brand name security products and computer services companies charge high  per-minute or per-incident service fees anytime you need live  personalized help.              With the average computer requiring fixes and repairs an  average of twice a year, and with security problems at an all-time high,  this can hit the pocketbook hard for anyone who owns a computer today.  &lt;/span&gt;            &lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;In fact, American consumers now spend over &lt;b&gt;$4 billion&lt;/b&gt; every year  on computer  repairs including virus and spyware removals and system cleanups.  This doesn&#39;t include the cost for downtime, the cost of travel to and from the repair shop, or the cost of having to  purchase a new computer altogether. Increasingly, maintaining and  repairing computers is costing as much as the computer itself. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;b&gt;It&#39;s  not a question of &quot;if&quot;&lt;/b&gt; you will need professional help, it&#39;s a  matter of &quot;&lt;span style=&quot;font-style: italic;&quot;&gt;when&lt;/span&gt;&quot;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;                Our service subscribers enjoy the benefit of actually &lt;/span&gt;               &lt;span style=&quot;font-size:130%;&quot;&gt;&lt;b&gt;saving  money&lt;/b&gt; with our service because they don&#39;t pay the stiff price the  rest of the industry charges for live help. Every &lt;b&gt;security checkup,  system cleanup, virus removal, spyware removal&lt;/b&gt;, etc. that we do for  our subscribers amounts to real bottom line savings to members of the  INVISUS community.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;b&gt;There are no per-minute costs nor per incident charges. Ever!!!&lt;/b&gt;&lt;/span&gt;                              &lt;span style=&quot;font-size:130%;&quot;&gt; Our subscribers receive &lt;b&gt;unlimited  service&lt;/b&gt; at no extra cost. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;As a subscriber, you won&#39;t have to pull apart your computer, haul it down to a repair shop, and wait for days to get it cleaned  up. As an added huge bonus, you&#39;ll have an &lt;b&gt;English speaking&lt;/b&gt;, US-based technician personally helping you every time you need assistance.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;           We are here to help make your computer hassle-free and  safe again.  And we are here to save you money in the process.&lt;/span&gt;               &lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;So, why not take the first step by taking our free test! Just click on the red test button at the top of the right column.&lt;/span&gt;&lt;qtlend&gt;&lt;/qtlend&gt;&lt;qtlend&gt;&lt;/qtlend&gt;&lt;br /&gt;&lt;/div&gt;&lt;qtlbar id=&quot;qtlbar&quot; dir=&quot;ltr&quot; style=&quot;display: inline; text-align: left; line-height: 100%; padding: 0pt; background-color: rgb(236, 236, 236); -moz-border-radius: 3px 3px 3px 3px; cursor: pointer; z-index: 999; left: 240px; top: 721px; opacity: 0.9;&quot;&gt;&lt;img class=&quot;qtl&quot; title=&quot;Copy selction&quot; src=&quot;http://www.qtl.co.il/img/copy.png&quot; /&gt;&lt;a title=&quot;Search With Google&quot; target=&quot;_blank&quot; href=&quot;http://www.google.com/search?q=So,%20why%20not%20take%20the%20first%20step%20by%20taking%20our%20free%20test%21%20Just%20click%20on%20the%20red%20test%20button%20at%20the%20top%20of%20the%20right%20column.&quot;&gt;&lt;img src=&quot;http://www.google.com/favicon.ico&quot; class=&quot;qtl&quot; /&gt;&lt;/a&gt;&lt;img src=&quot;http://www.qtl.co.il/img/trans.png&quot; title=&quot;Translate With Google&quot; class=&quot;qtl&quot; /&gt;&lt;iframe id=&quot;qtlframe&quot; src=&quot;&quot; style=&quot;display: none; border: 1px solid rgb(236, 236, 236); background-color: white;&quot;&gt;&lt;/iframe&gt;&lt;/qtlbar&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/5876963859890881779/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/5876963859890881779?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5876963859890881779'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5876963859890881779'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/04/days-of-high-pc-maintenance-and-repair.html' title='The Days of High PC Maintenance and Repair Costs Are Gone!'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-6956947316210393479</id><published>2010-04-30T15:00:00.003-05:00</published><updated>2010-04-30T16:53:48.117-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="keylogging software"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>What Everybody Ought to Know: Why  Your Computers Need to Be Fully Protected</title><content type='html'>&lt;div  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Here is what you will need to be fully protected on your home or  business computer:&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul  style=&quot;font-family:times new roman;&quot;&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;  at least five layers of overlapping security technologies and services  to create a virtual fortress for your PC. Most off-the-shelf and free  software offer two, or three at the most, programs. But are they  overlapping when they work and when they update?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; desktop firewall to lock out hackers and other unauthorized intrusions  and shield your PC from unauthorized communication both to and from  your PC, making your PC virtually invisible to hackers and other  intruders randomly scanning the Internet for vulnerable PCs;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;world-class anti-virus protection, including 24/7 scanning and  certification that your incoming and outgoing e-mails attachments are  virus-free — plus scanning of all removable media such as CDs, Zip  disks, portable hard drives, and floppies;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;  anti-spyware that continuously monitors, detects, and eliminates all  forms of spyware, hacker tools, and malware from your PC including  malicious spyware tools, adware, browser hijackers, search hijackers,  keyloggers, ghost spammers, remote access tools (RATs), back doors, and  many other illegal programs and applications that breach your privacy  and security;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;  patch management that will automatically find and fix security holes  and other dangerous vulnerabilities in your computer’s operating system  and software programs that hackers use to break into your computer;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;security alerts that warns you of brand new viruses, worms, and other  security threats as they emerge – including specific recommendations of  what to watch out for and how to avoid getting attacked to keep your  privacy secured and your PC safe; and to wrap it all together,&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; premium technical support that offers free unlimited expert technical  support for any security related problems or issues by highly trained  technicians.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;              &lt;div  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Although the Internet basically provides a positive and productive  experience, cyber-attacks against our personal privacy and security are  reaching epidemic proportions. These attacks are occurring in our own  homes and businesses. Our own computers are being used are being used as  zombies to attack other people, businesses, and even our nation itself.  As an average Internet user, you may not be aware of these threats nor  have any idea about the dramatically increasing risks you face when  connected to the Internet.&lt;br /&gt;&lt;br /&gt;On a campaign for internet safety awareness and protection, my mission  is to bring critical awareness to individuals, families, and small  business owners, and to provide access to the necessary tools and  ongoing expertise to secure your computer and help you stay protected.&lt;br /&gt;&lt;br /&gt;I invite you to join the many thousands of others who have tested their  computers, discovered these threats are real, and taken the necessary  steps to protect their computers, their families, and their businesses.&lt;br /&gt;&lt;br /&gt;Now that you have become aware of these issues, I encourage you to share  this vital information with your families, friends and communities.  Together, we can reach many millions of people and inform them about the  threats to their privacy and security, and help them get the protection  they desperately need.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Remember: &lt;span style=&quot;font-style: italic;&quot;&gt;When you say “No!” to hackers and spyware, everyone wins! When  you don’t, we all lose.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;  &lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:130%;&quot;  &gt; Test your computer now!&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;Part 3 of 3&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/6956947316210393479/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/6956947316210393479?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6956947316210393479'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6956947316210393479'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/04/what-everybody-ought-to-know-about.html' title='What Everybody Ought to Know: Why  Your Computers Need to Be Fully Protected'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-6963408097204738893</id><published>2010-04-27T16:00:00.000-05:00</published><updated>2010-04-27T16:06:41.135-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="keylogging software"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>What Everybody Ought to Know: Why You Need a Comprehensive Security Service Package</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;The Internet-based attacks on your personal privacy and security  continue to worsen year after year. The future of Internet security is  gloomy  and it takes an extremely dedicated and savvy computer user to  find the right mix of security programs and stay current with the newest  threats. Internet security is not a one-time event. You cannot simply  install security software on your PC and then forget about its safety  and security, and ultimately, the safety and security of your family,  home, and business. Internet safety and security require an ongoing,  time-intensive process with a fairly high level of expertise and  vigilance.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Why you need a team of security experts on your side:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Do you want to be an Internet security expert? If you are like most  people, you neither want to nor have the time. You don’t want to worry  about staying current with the latest technologies. You can’t possibly  keep up with the all the new threats coming at you almost daily because  you have better things to do with your time. Instead, most people end up  relying on the opinions and recommendations of more knowledgeable  friends and family members for their security needs and hope nothing bad  happens. But is that the best and safest strategy?&lt;br /&gt;&lt;br /&gt;To get maximum protection for your PC, you need an Internet security  expert on your side. Better yet, you need a team of experts making sure  that you, your family, and your business are always safe and secure. You  need to find your own personal team of experts to rely on. If you ever  have a security problem, you want a trusted expert you can call for  professional answers and solutions without any hassles and extra costs!  As time goes on, it will become even more critical than it is today.&lt;br /&gt;&lt;br /&gt;The best protection you can have in today’s rapidly changing world of  cyber-attacks is to have expert support for all your Internet security  needs. Hackers will likely always be one step ahead of law enforcement  and the security industry itself. Software-based protection alone, as  you can see, is not enough anymore.&lt;br /&gt;&lt;br /&gt;Of all the Internet users who have anti-virus software on their  computers, 85% of them had computers that were subsequently infected  with a virus or worm! Have you ever had a virus you couldn’t get rid of?  Has your computer acted funny or has it slowed way down due to a  massive spyware infestation? Then you see and know how dangerous and  damaging these threats and risks are!&lt;br /&gt;&lt;br /&gt;Unfortunately, for consumers seeking security and privacy protection  with brand name solutions will find two extremes – complex systems they  cannot afford or properly maintain, or consumer-grade technology that  doesn’t provide adequate protection. If they do find something that fits  their budget, it will likely have only a part of what is needed to  truly protect a computer, and it won’t include free expert support and a  security guarantee.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Caution: &lt;/span&gt;Don’t be lulled into a false sense of security thinking that  the anti-virus software that came with your computer is enough  protection. Off-the-shelf anti-virus software does not always protect  you from attacks such as: hackers, spyware, remote access tools, Trojan horses, password  crackers, keystroke loggers, identity theft tools, Microsoft security  holes, hybrid viruses, and others much worst. And most people let their  anti-virus program expire, thereby losing protection from everyday  viruses and worms.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Remember: When you say “No!” to hackers and spyware, everyone wins! When  you don’t, we all lose.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Test your computer now!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;End Part 2 of 3</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/6963408097204738893/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/6963408097204738893?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6963408097204738893'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6963408097204738893'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/04/what-everybody-ought-to-know-why-you.html' title='What Everybody Ought to Know: Why You Need a Comprehensive Security Service Package'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-7822195575294679247</id><published>2010-04-21T19:21:00.010-05:00</published><updated>2010-04-27T16:05:55.294-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="keylogging software"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>What Everybody Ought to Know: It’s No Longer Enough to Install Off-the-shelf Security Software</title><content type='html'>&lt;div  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Think about this:&lt;/span&gt; You had problems with your computer in the past. Now you want to insure that those little annoying nuisance, pests, threats, and risks from hackers and spyware don’t hide in your computer any more. So, you load up your computer with all the free and off-the-shelf security software you can find. Now, as your confidence rises, you think that your computer is as impenetrable as the gold at Fort Knox.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Wrong!!!! &lt;/span&gt;You have been fooled into thinking that your computer is fully protected.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Now think about this: &lt;/span&gt;With all the options available to you, how do you know which one offers the best protection for you, your family, or your business? Here are some questions you need to consider:&lt;br /&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Are you a trained computer and Internet security expert?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Do you know exactly which security software is compatible with your system?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Do you have the time to continually research all the latest security technologies?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Do you know exactly which software you should install and which ones should not?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Once installed, how do you keep the different software programs updated? In fact, how often are they updated: daily? weekly? biweekly? monthly? Are the updates free. And if so, for how long?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;If you encountered a problem that your installed security software could not fix, or you simply had a question, would you have access to free, live technical support?&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;If not, what would it cost you? Would it be a one-time fee? Would it come with a warranty period? And what would it cost you when the warranty expires?&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;By now, I’m hoping that you’re beginning to see why it is not enough any longer to install off-the-shelf security software. There is a better option! You need a revolutionary full security service package that gives you peace of mind because its software programs work together, its technical support is always live and free, and at no additional cost.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Remember: &lt;span style=&quot;font-style: italic;&quot;&gt;When you say “No!” to hackers and spyware, everyone wins! When you don’t, we all lose.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Test your computer now!&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/7822195575294679247/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/7822195575294679247?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7822195575294679247'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7822195575294679247'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/04/what-everybody-ought-to-know-its-no.html' title='What Everybody Ought to Know: It’s No Longer Enough to Install Off-the-shelf Security Software'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-6706226738407953105</id><published>2010-04-03T14:19:00.006-05:00</published><updated>2010-04-30T16:43:15.140-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus software"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="keylogging software"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>Taking Your Computer to the Store is So Yesterday</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;By Joel Harrison&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;INVISUS Senior Technology Analyst&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;There’s nothing worse than having to get down behind your desk, memorize where all the wires go, and hope you can get them all back where they belong.&lt;br /&gt;&lt;br /&gt;Except maybe paying too much for the repair once you get it to the store.&lt;br /&gt;&lt;br /&gt;It’s time you stopped lugging your computer around town trying to find someone to fix it and take advantage of the latest software and services that lets the technician come to you – remotely.&lt;br /&gt;&lt;br /&gt;With the advances in technology and the tools that are available, taking your computer to the shop is becoming a thing of the past. A technician can repair the majority of your computer problems without you leaving your house or them entering.&lt;br /&gt;&lt;br /&gt;Remote help is taking over the support industry. And with the right support team caring for your computers, you don’t need to worry about a thing. They can do everything for you.&lt;br /&gt;&lt;br /&gt;Sure, having to take your computer to the tech shop may still be warranted in some rare occasions, but you should always call for remote support first to see if they can get you up and running.&lt;br /&gt;&lt;br /&gt;With just a phone call and a couple of clicks of the mouse, a technician can be connected to your computer to diagnose and repair errors and even clean off all the viruses and spyware.&lt;br /&gt;&lt;br /&gt;Just sit back, relax, go get some dinner, and let the [INVISUS] technicians do everything for you. Ah, the beauty of remote support.&lt;br /&gt;&lt;br /&gt;&lt;hr /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 0, 0);&quot;&gt;Note:&lt;/span&gt; Whether your computer is at your home, church, or small business, you owe it to yourself, your family, congregation, customers, and employees to ensure that it is safe and secured from hackers and cybercriminal attacks.&lt;br /&gt;&lt;br /&gt;Thus, I encourage you to test your PC right now by clicking on the test button in the upper, right column. After you&#39;ve tested it, why not also take a moment to see if&lt;qtlend&gt;&lt;/qtlend&gt; your small business is PCI compliant?&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;qtlbar id=&quot;qtlbar&quot; dir=&quot;ltr&quot; style=&quot;display: inline; text-align: left; line-height: 100%; padding: 0pt; background-color: rgb(236, 236, 236); -moz-border-radius: 3px 3px 3px 3px; cursor: pointer; z-index: 999; left: 280px; top: 906px; opacity: 0.9;&quot;&gt;&lt;img class=&quot;qtl&quot; title=&quot;Copy selction&quot; src=&quot;http://www.qtl.co.il/img/copy.png&quot; /&gt;&lt;a title=&quot;Search With Google&quot; target=&quot;_blank&quot; href=&quot;http://www.google.com/search?q=whether&quot;&gt;&lt;img src=&quot;http://www.google.com/favicon.ico&quot; class=&quot;qtl&quot; /&gt;&lt;/a&gt;&lt;img src=&quot;http://www.babylon.com/favicon.ico&quot; title=&quot;Translate With Babylon&quot; class=&quot;qtl&quot; /&gt;&lt;iframe id=&quot;qtlframe&quot; src=&quot;&quot; style=&quot;display: none; border: 1px solid rgb(236, 236, 236); background-color: white;&quot;&gt;&lt;/iframe&gt;&lt;/qtlbar&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/6706226738407953105/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/6706226738407953105?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6706226738407953105'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6706226738407953105'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/04/taking-your-computer-to-store-is-so.html' title='Taking Your Computer to the Store is So Yesterday'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-2529295796207630241</id><published>2010-03-20T14:45:00.008-05:00</published><updated>2010-03-22T15:52:30.303-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="alerts"/><category scheme="http://www.blogger.com/atom/ns#" term="Central National Bank"/><category scheme="http://www.blogger.com/atom/ns#" term="Champ Bulldogs"/><category scheme="http://www.blogger.com/atom/ns#" term="ESL Teachers"/><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><category scheme="http://www.blogger.com/atom/ns#" term="hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="KTVO News"/><category scheme="http://www.blogger.com/atom/ns#" term="PigBusters"/><category scheme="http://www.blogger.com/atom/ns#" term="scammers"/><category scheme="http://www.blogger.com/atom/ns#" term="Subtle Particle"/><category scheme="http://www.blogger.com/atom/ns#" term="The Scam Team"/><category scheme="http://www.blogger.com/atom/ns#" term="The UK Cats"/><title type='text'>Fight Scammers with Scammer Alert Images</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Like me, individuals, businesses, and organizations across the Internet are sick and tired of being victims of scammers and hackers and are fighting back.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;I&#39;ve added graphics from their sites with the intention of encouraging you to fight back, too. I further encourage you to post similar graphics on your websites or social networking profiles.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Beneath each graphic I&#39;ve placed a link to the source. Be sure to view what they have to say.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.heartlandconnection.com/uploadedImages/ktvo/News/Stories/scam%20alert.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 373px; height: 301px;&quot; src=&quot;http://www.heartlandconnection.com/uploadedImages/ktvo/News/Stories/scam%20alert.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.heartlandconnection.com/news/story.aspx?id=423547/&quot;&gt;KTVO News&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.eslteachersboard.com/jpg/scam-warning.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 229px; height: 70px;&quot; src=&quot;http://www.eslteachersboard.com/jpg/scam-warning.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://www.eslteachersboard.com/cgi-bin/scamalerts/index.pl/&quot;&gt;ESL Teachers Board&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://subtleparticle.com/wp-content/uploads/2008/11/scam_alert.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 365px; height: 300px;&quot; src=&quot;http://subtleparticle.com/wp-content/uploads/2008/11/scam_alert.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://subtleparticle.com/Word/?p=996&quot;&gt;Subtle Particle&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.scamteam.com/files/scammeralert.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 173px; height: 109px;&quot; src=&quot;http://www.scamteam.com/files/scammeralert.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;br /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://www.scamteam.com/&quot;&gt;The Scam Team&lt;/a&gt;, which was formed by a group of  international trade and Internet communications experts. They are based in a little &lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Spanish c&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;ity called Palencia.  &lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.champbulldogs.com/scamtears.gif&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 335px; height: 300px;&quot; src=&quot;http://www.champbulldogs.com/scamtears.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://www.champbulldogs.com/scam.htm&quot;&gt;Champ Bulldogs&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.prnewschannel.com/absolutenm/articlefiles/822-scammer%20alert.JPG&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 224px; height: 72px;&quot; src=&quot;http://www.prnewschannel.com/absolutenm/articlefiles/822-scammer%20alert.JPG&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://www.prnewschannel.com/absolutenm/templates/?z=61&amp;amp;a=822&quot;&gt;PRNewsChannel.com&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.centralnational.com/images/FBIFraudAlert.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 372px; height: 491px;&quot; src=&quot;http://www.centralnational.com/images/FBIFraudAlert.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of the &lt;a href=&quot;http://www.fbi.gov/majcases/fraud/internetschemes.htm&quot;&gt;FBI&lt;/a&gt; and &lt;a href=&quot;https://www.centralnational.com/fraudalerts.asp&quot;&gt;Central National Bank&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://fightfraud.nv.gov/images/scam_alert_big.jpg&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 351px; height: 300px;&quot; src=&quot;http://fightfraud.nv.gov/images/scam_alert_big.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Courtesy of &lt;a href=&quot;http://fightfraud.nv.gov/&quot;&gt;Nevada Fight Fraud&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.pigbusters.net/FlashDSL.gif&quot;&gt;&lt;img style=&quot;display: block; margin: 0px auto 10px; text-align: center; cursor: pointer; width: 350px; height: 300px;&quot; src=&quot;http://www.pigbusters.net/FlashDSL.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Courtesy of &lt;a href=&quot;http://www.pigbusters.net/ScamGraphics.htm&quot;&gt;PigBusters.net&lt;/a&gt;&lt;qtlend&gt;&lt;/qtlend&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/2529295796207630241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/2529295796207630241?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/2529295796207630241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/2529295796207630241'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/03/fight-scamers-with-scammer-alert-images.html' title='Fight Scammers with Scammer Alert Images'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-1054957265580335079</id><published>2010-02-13T12:15:00.004-06:00</published><updated>2010-02-13T12:42:31.295-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="customer service"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber-security"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="nonprofit organizations"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="secure"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><category scheme="http://www.blogger.com/atom/ns#" term="stay safe"/><category scheme="http://www.blogger.com/atom/ns#" term="tech support"/><title type='text'>Karen Lodrick, Leading Nationwide Consumer Advocate for ID Theft Protection</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:150%;&quot;&gt;Watch Karen&#39;s story on &lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:150%;&quot; &gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Good Morning America&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:150%;&quot;&gt;&lt;span&gt; about how her identity was stolen, and how she caught (literally) the thief on the streets of San Francisco.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;object height=&quot;349&quot; width=&quot;400&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/X2epEnCCTLc&amp;amp;border=1&amp;amp;color1=0x2b405b&amp;amp;color2=0x6b8ab6&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/X2epEnCCTLc&amp;amp;border=1&amp;amp;color1=0x2b405b&amp;amp;color2=0x6b8ab6&amp;amp;hl=en_US&amp;amp;feature=player_embedded&amp;amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowscriptaccess=&quot;always&quot; height=&quot;349&quot; width=&quot;400&quot;&gt;&lt;/embed&gt;&lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/1054957265580335079/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/1054957265580335079?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/1054957265580335079'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/1054957265580335079'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/02/karen-lodrick-leading-nationwide.html' title='Karen Lodrick, Leading Nationwide Consumer Advocate for ID Theft Protection'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-7423882096716332639</id><published>2010-02-11T11:59:00.017-06:00</published><updated>2010-02-16T16:10:43.923-06:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware software"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber-security"/><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="identity theft"/><category scheme="http://www.blogger.com/atom/ns#" term="pc service"/><category scheme="http://www.blogger.com/atom/ns#" term="predators"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="safety"/><category scheme="http://www.blogger.com/atom/ns#" term="secure"/><category scheme="http://www.blogger.com/atom/ns#" term="small business"/><category scheme="http://www.blogger.com/atom/ns#" term="small business owners"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="virus"/><title type='text'>Improved Changes for You, Your Family, and Your Business!</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Personal Computer Services for Home and Family:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Our personal computer services simplify your life and protect you against Internet predators and cyber-crime. Our expertise is in eliminating headaches and hassles with your computer, and saving you time and money. With our popular monthly service plans, you&#39;ve got unlimited access to all the expert help you need - for one low monthly fee.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Try our monthly service plans with a 30 Day RISK-FREE TRIAL!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You&#39;ve got two great plans to choose from:&lt;br /&gt;&lt;br /&gt;*&lt;span style=&quot;font-weight: bold;&quot;&gt; iSafe Service Plan&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Professional grade protection against Internet predators, viruses, spyware, and other digital security threats that put you at risk and cause ongoing problems and big repair bills.&lt;br /&gt;&lt;br /&gt;* &lt;span style=&quot;font-weight: bold;&quot;&gt;iCare Service Plan&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Total care for your computer to keep it safe, reliable and running like new. Professional grade protection, plus full system tune-up, optimization, maintenance, troubleshooting and repair for virtually any computer problem.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Professional Computer Services for Small Businesses:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You need multiple layers of protection to truly secure your business computers. Anti-virus is not enough. Our home office, INVISUS, offers a comprehensive suite of products to lock your systems down to keep your information&#39;s integrity intact.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Try our services RISK-FREE with our 30-day money-back guarantee!&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;You&#39;ve got three great plans to choose from:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;  * iSafe Pro Service Plan&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;A comprehensive, maximum protection, professional computer security service plan for your business. Gives you maximum protection against cyber-crime and fraud for the digital age.&lt;br /&gt;&lt;br /&gt;Affordable protection your business requires, and the security you and your customers deserve.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;  * iCarePro&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Total care for your business computers to keep them safe, reliable, and running like new. You get Maximum Protection and Total Care of your computers.&lt;br /&gt;&lt;br /&gt;Take your iSafePro protection to the next level and never worry&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; again&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt; about computer problems or downtime! Get unlimited expert help from our certified INVISUS technicians who will troubleshoot and resolve virtually ALL your computer problems over the phone or through a secure remote connection.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;  * InfoSafe Service Plan&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Information Security Compliance! An industry first! Makes it easy for you to get and keep your business compliant with federal, state, and industry data security laws and regulations.&lt;br /&gt;&lt;br /&gt;Promotes privacy, safety, and trust with your customers.&lt;br /&gt;&lt;br /&gt;* Become compliant with laws and industry standards.&lt;br /&gt;* Prevent penalties, fines, and security breaches.&lt;br /&gt;* Increase customer confidence and sales.&lt;br /&gt;* Save valuable time and money.&lt;br /&gt;&lt;br /&gt;Backed by InfoSafe Services and Certification, you can be confident that you are compliant with industry standards and best practices for information privacy and security.&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;a href=&quot;http://reps.invisus.com/EGibbs&quot;&gt;&lt;img style=&quot;width: 408px; height: 154px;&quot; src=&quot;http://www.invisus.com/images/home_img2.jpg&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Click on banner for more information.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/7423882096716332639/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/7423882096716332639?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7423882096716332639'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7423882096716332639'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/02/improved-changes-for-you.html' title='Improved Changes for You, Your Family, and Your Business!'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-672480763149984737</id><published>2010-02-05T13:20:00.004-06:00</published><updated>2010-02-05T13:30:03.570-06:00</updated><title type='text'>Looking at Fraud from the Inside Out</title><content type='html'>&lt;p align=&quot;justify&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;In this video  a convicted business opportunity scam artist takes you behind the scenes so you can learn the tricks he used to cheat people out of their money.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align=&quot;justify&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;He also instructs you about what questions you must ask in order to help you determine if a business opportunity is a  scam or the real deal. &lt;/span&gt;&lt;/p&gt;      &lt;object title=&quot;Fraud: An Inside Look&quot; width=&quot;420&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.ftc.gov/bcp/edu/multimedia/video/bizopps/fraud-inside-look.swf&quot;&gt;&lt;param name=&quot;wmode&quot; value=&quot;transparent&quot;&gt;&lt;param name=&quot;quality&quot; value=&quot;high&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;sameDomain&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;embed src=&quot;http://www.ftc.gov/bcp/edu/multimedia/video/bizopps/fraud-inside-look.swf&quot; quality=&quot;high&quot; wmode=&quot;transparent&quot; allowscriptaccess=&quot;sameDomain&quot; allowfullscreen=&quot;true&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot; type=&quot;application/x-shockwave-flash&quot; width=&quot;420&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;br /&gt;  &lt;/object&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold; font-style: italic;&quot;&gt;Video is courtesy of the US Federal government.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/672480763149984737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/672480763149984737?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/672480763149984737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/672480763149984737'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/02/looking-at-fraud-from-inside-out.html' title='Looking at Fraud from the Inside Out'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-5578964516772844744</id><published>2010-02-01T10:00:00.000-06:00</published><updated>2010-02-05T13:20:19.767-06:00</updated><title type='text'>Some Safe Practices for Computer Security, According to the Federal Government</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;;font-family:times new roman;font-size:130%;&quot;  &gt;Access to information and entertainment, credit and financial services, products from every corner of the world — even to your work — is greater than ever. Thanks to the Internet, you can play a friendly game with an opponent across the ocean; review and rate videos, songs, or clothes; get expert advice in an instant; or collaborate with far-flung co-workers in a &quot;virtual&quot; office.&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;But the Internet — and the anonymity it affords — also can give online scammers, hackers, and identity thieves access to your computer, personal information, finances, and more.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;With awareness as your safety net, you can minimize the chance of an Internet mishap. Being on guard online helps you protect your information, your computer, and your money. To be safer and more secure online, make these practices part of your online routine.    &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Visit &lt;a href=&quot;http://ftc.gov/idtheft&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;FTC.gov/idtheft&lt;/span&gt;&lt;/a&gt; to learn what to do if your identity is stolen or your personal or financial information has been compromised – online or in the &quot;real&quot; world.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;How do criminals get your personal information online? One way is by lying about who they are, to convince you to share your account numbers, passwords, and other information so they can get your money or buy things in your name.  The scam is called &quot;phishing&quot;: criminals send email, text, or pop-up messages that appear to come from your bank, a government agency, an online seller or another organization with which you do business.  The message asks you to click to a website or call a phone number to update your account information or claim a prize or benefit.  It might suggest something bad will happen if you don&#39;t respond quickly with your personal information.  In reality, legitimate businesses should never use email, pop-ups, or text messages to ask for your personal information.To avoid phishing scams:&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Don&#39;t reply to an email, text, or pop-up message that asks for personal or financial information, and don&#39;t click on links in the message.  If you want to go to a bank or business&#39;s website, type the web address into your browser yourself.&lt;/span&gt;&lt;/li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;     &lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Don&#39;t respond if you get a message – by email, text, pop-up or phone – that asks you to call a phone number to update your account or give your personal information to access a refund.  If you need to reach an organization with which you do business, call the number on your financial statement, or use a telephone directory.&lt;/span&gt;&lt;/li&gt;    &lt;/ul&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;Some identity thieves have stolen personal information from many people at once, by hacking into large databases managed by businesses or government agencies.  While you can&#39;t enjoy the benefits of the Internet without sharing some personal information, you can take steps to share only with organizations you know and trust.  Don&#39;t give out your personal information unless you first find out how it&#39;s going to be used and how it will be protected. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;If you are shopping online, don&#39;t provide your personal or financial information through a company&#39;s website until you have checked for indicators that the site is secure, like a lock icon on the browser&#39;s status bar or a website URL that begins &quot;&lt;span style=&quot;color: rgb(102, 0, 0);&quot;&gt;https:&lt;/span&gt;&quot; (the &quot;s&quot; stands for &quot;secure&quot;). Unfortunately, no indicator is foolproof; some scammers have forged security icons.  And some hackers have managed to breach sites that took appropriate security precautions.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:130%;&quot;  &gt;Learn what to do in an e-mergency.&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;text-align: justify;font-family:times new roman;font-size:130%;&quot;  &gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. Malware could be sending your personal information to identity thieves. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;p  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Confirm that your security software is up-to-date, then use it to scan your computer. Delete everything the program identifies as a problem. You may have to restart your computer for the changes to take effect.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;    &lt;/div&gt;&lt;p  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;If the problem persists after you exhaust your ability to diagnose and treat it, you might want to call for professional help. If your computer is covered by a warranty that offers free tech support, contact the manufacturer. Before you call, write down the model and serial number of your computer, the name of any software you&#39;ve installed, and a short description of the problem. Your notes will help you give an accurate description to the technician.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;If you need professional help, if your machine isn&#39;t covered by a warranty, or if your security software isn&#39;t doing the job properly, you may need to pay for technical support. Many companies — including some affiliated with retail stores — offer tech support via the phone, online, at their store, or in your home. Telephone or online help generally are the least expensive ways to access support services — especially if there&#39;s a toll-free helpline — but you may have to do some of the work yourself. Taking your computer to a store usually is less expensive than hiring a technician or repair person to come into your home.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:times new roman;&quot;&gt;Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. &lt;/span&gt;&lt;br /&gt;&lt;/span&gt;    &lt;/div&gt;&lt;p  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Also, talk about safe computing with anyone else who uses the computer. Tell them that some online activity can put a computer at risk, and share practices for safer computing.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style=&quot;font-weight: bold;font-size:130%;&quot; &gt;Where to report hacking or a computer virus:&lt;/span&gt;&lt;/p&gt;&lt;p  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Alert the appropriate authorities by contacting:&lt;/span&gt;&lt;/p&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;     &lt;/div&gt;&lt;ul  style=&quot;text-align: justify;font-family:times new roman;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Your ISP and the hacker&#39;s ISP (if you can tell what it is). You can usually find an ISP&#39;s email address on its website. Include information on the incident from your firewall&#39;s log file. By alerting the ISP to the problem on its system, you can help it prevent similar problems in the future.&lt;/span&gt;&lt;/li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;     &lt;li&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The FBI at &lt;a href=&quot;http://www.ic3.gov/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;www.IC3.gov&lt;/span&gt;&lt;/a&gt;. To fight computer criminals, the FBI needs to hear from you.&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;p style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Get more in-depth information from &lt;a href=&quot;http://www.onguardonline.gov/&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;www.OnGuardOnline.gov&lt;/span&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/5578964516772844744/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/5578964516772844744?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5578964516772844744'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/5578964516772844744'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/02/7-practices-for-computer-security.html' title='Some Safe Practices for Computer Security, According to the Federal Government'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-6817788124480192010</id><published>2010-01-13T14:51:00.015-06:00</published><updated>2010-01-13T15:27:50.601-06:00</updated><title type='text'>The Biggest Misconceptions about Identity Theft</title><content type='html'>&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.myinvisusdirect.com/office/iDefend_more.aspx&quot;&gt;&lt;img style=&quot;margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 149px; height: 353px;&quot; src=&quot;http://www.myinvisusdirect.com/office/images/about_id_theft_ad.gif&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;Don&#39;t be fooled by the misleading ads and false promises for preventing Identity Theft!&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;Here&#39;s what you really need to know. &lt;/span&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;br /&gt;There is a great deal of misinformation floating around the internet, and on TV, radio, etc. these days about protecting yourself from identity theft.&lt;br /&gt;&lt;br /&gt;Here&#39;s a reality check:&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;Can you actually&lt;span style=&quot;font-style: italic;&quot;&gt; prevent&lt;/span&gt; identity theft?&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div  style=&quot;text-align: justify; font-weight: bold;font-family:times new roman;&quot;&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;The answer is &quot;No&quot;! But there are some things you can do to keep thieves from stealing your personal information from your home, your garbage, your computer, etc.  (For example, be sure you shred all your bills and other papers with personal information.)&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div  style=&quot;text-align: justify; font-weight: bold;font-family:times new roman;&quot;&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;The reality is that identity thieves can find your personal information in many places (as shown above) that are out of your control.  So while you can&#39;t actually prevent your identity from getting stolen, you can protect yourself against the devastating consequences of identity theft.  This is why you need true identity theft protection with iDefend.&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;Credit fraud is only &lt;span style=&quot;color: rgb(102, 51, 0);&quot;&gt;ONE TYPE&lt;/span&gt; of identity theft.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify; font-weight: bold;&quot;&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;In fact, 67% of identity theft cases involve criminal fraud in other areas besides loans, credit cards, etc.  While having loans or credit taken out in your name is a serious problem, most identity theft cases (true identity theft) are discovered in areas like:&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;ul  style=&quot;font-weight: bold;font-family:times new roman;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;    &lt;span style=&quot;font-family:times new roman;&quot;&gt;Social Security benefits fraud;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Medical benefits fraud;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Checking accounts;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Criminal records;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Bankruptcy;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;401k theft;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;li  style=&quot;font-family:times new roman;&quot;&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Tax fraud;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;;font-family:times new roman;font-size:180%;&quot;  &gt;and more . . .&lt;/span&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style=&quot;font-weight: bold;font-family:times new roman;font-size:180%;&quot;  &gt;For more information, &lt;a href=&quot;http://www.myinvisusdirect.com/office/iDefend_more.aspx&quot;&gt;click here&lt;/a&gt;.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/6817788124480192010/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/6817788124480192010?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6817788124480192010'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/6817788124480192010'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2010/01/biggest-misconceptions-about-identity.html' title='The Biggest Misconceptions about Identity Theft'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-365029699750719335</id><published>2009-12-29T15:27:00.007-06:00</published><updated>2009-12-29T15:40:50.370-06:00</updated><title type='text'>Happy New Year Fireworks Around the World!</title><content type='html'>&lt;embed src=&quot;http://toys.myyearbook.com/fireworks/fireworks_end.swf?eleccion=11&quot; quality=&quot;high&quot; pluginspage=&quot;http://www.macromedia.com/go/getflashplayer&quot; type=&quot;application/x-shockwave-flash&quot; height=&quot;400&quot; width=&quot;410&quot;&gt;&lt;/embed&gt;&lt;center&gt;&lt;br /&gt;&lt;b&gt;&lt;a href=&quot;http://pimp.myyearbook.com/toys/fireworks/&quot; target=&quot;_blank&quot;&gt;Click here&lt;/a&gt; to get your own copy from pimp.myYearbook.com!!&lt;/b&gt;&lt;br /&gt;&lt;/center&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/365029699750719335/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/365029699750719335?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/365029699750719335'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/365029699750719335'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2009/12/happy-new-year-fireworks-around-world.html' title='Happy New Year Fireworks Around the World!'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-7149807648133282474</id><published>2009-11-24T15:57:00.002-06:00</published><updated>2009-12-23T14:22:26.292-06:00</updated><title type='text'>Christmas Wishes to You and Yours!</title><content type='html'>&lt;p align=&quot;center&quot;&gt;&lt;span style=&quot;;font-family:trebuchet ms;font-size:180%;&quot;  &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;May You and Your Family Have&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; the Merriest of Christmases!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;img src=&quot;http://i687.photobucket.com/albums/vv236/Ran87dle/Christmas/AnimatedChristmasHouseLights.gif&quot; width=&quot;90%&quot; /&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/7149807648133282474/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/7149807648133282474?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7149807648133282474'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/7149807648133282474'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2009/11/happy-thanksgiving-wishes-to-you-and.html' title='Christmas Wishes to You and Yours!'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i687.photobucket.com/albums/vv236/Ran87dle/Christmas/th_AnimatedChristmasHouseLights.gif" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-4100744762474569235</id><published>2009-10-29T11:48:00.003-05:00</published><updated>2009-10-29T11:52:43.745-05:00</updated><title type='text'>Good News about Stranger Danger</title><content type='html'>&lt;object width=&quot;420&quot; height=&quot;370&quot;&gt; &lt;param name=&quot;movie&quot; value=&quot;http://www.worldstarhiphop.com/videos/e/16711680/wshhpE6Fugc4Kz97S5BU&quot; /&gt; &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot; /&gt;&lt;param name=&quot;quality&quot; value=&quot;high&quot; /&gt; &lt;embed src=&quot;http://www.worldstarhiphop.com/videos/e/16711680/wshhpE6Fugc4Kz97S5BU&quot; quality=&quot;high&quot; type=&quot;application/x-shockwave-flash&quot; allowFullscreen=&quot;true&quot; width=&quot;420&quot; height=&quot;370&quot;&gt;&lt;/embed&gt; &lt;/object&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/4100744762474569235/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/4100744762474569235?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4100744762474569235'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/4100744762474569235'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2009/10/good-news-about-stranger-danger.html' title='Good News about Stranger Danger'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-3388138933038975624</id><published>2009-09-09T09:00:00.002-05:00</published><updated>2009-10-11T19:28:42.317-05:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="awareness"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber security"/><category scheme="http://www.blogger.com/atom/ns#" term="nonprofit organization"/><category scheme="http://www.blogger.com/atom/ns#" term="protection"/><category scheme="http://www.blogger.com/atom/ns#" term="secure"/><category scheme="http://www.blogger.com/atom/ns#" term="stay safe"/><title type='text'>Doing Our Part For National Cyber Security Month.</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;October is National Cyber Security Awareness Month.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;&quot;Protect Yourself Before You Connect Yourself&quot;&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;a href=&quot;http://www.staysafeonline.org/&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; text-align: center; width: 271px; display: block; height: 226px; cursor: pointer;&quot; id=&quot;BLOGGER_PHOTO_ID_5375587879638759442&quot; alt=&quot;&quot; src=&quot;http://1.bp.blogspot.com/_5lRbdxTKmUc/SpnssgjDeBI/AAAAAAAAAYk/eg226L40jas/s320/NCSAM-09-300x250_web.jpg&quot; border=&quot;0&quot; /&gt;&lt;/a&gt; &lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;National Cyber Security Alliance Launches&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Cyber Security Awareness Volunteer Education&lt;/span&gt; &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;(C-SAVE)&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Program&lt;/span&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt; Focuses on bringing Cybersecurity Experts Into Nation’s K‐12 Schools To Educate Students and Teachers about Internet Safety and Security&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;SAN FRANCISCO, April 22, 2009 –&lt;/span&gt; With studies finding that less than 25%** of educators feel comfortable teaching students how to keep themselves safe from online cyber predators, bullies, and online fraud, the National Cyber Security Alliance (NCSA) has focused much of its efforts on providing K‐12 schools with the resources they need to better equip today’s digital generation.&lt;br /&gt;&lt;br /&gt;Today at the RSA Conference, the NCSA announced the launch of a nationwide initiative – the Cyber Security Awareness Volunteer Education Program (&lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt;) – that is focused on fostering opportunities for cybersecurity experts and IT security professionals to donate their time and tap their expertise to help educate elementary, middle and high school students about Internet security and safety.&lt;br /&gt;&lt;br /&gt;“There is an Internet safety and security knowledge gap,” said Michael Kaiser, executive director of the NCSA. “As we evolve into web based culture, our schools have not kept pace in teaching our youth to develop the skills they need to stay safe and secure online. Only 18%** of K‐12 curriculum discusses identity theft and only 22%** of teachers are comfortable teaching about cyberbullying. In these difficult financial times, &lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt; provides schools with a cost‐free opportunity to enrich the education experience and help improve the everyday lives of both their students and their teachers. It also provides information security professionals a wonderful opportunity to give back to their community.”&lt;br /&gt;&lt;br /&gt;NCSA is seeking motivated individuals and corporations to approach local schools to deliver the C‐SAVE program. A comprehensive set of learning materials designed by a U.S. Department of Education veteran is available at &lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.staysafeonline.org/CSAVE&quot;&gt;www.StaySafeOnline.org/CSAVE&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Suggested lesson plans designed to meet the developmental level of young people at all grade levels provide clear, easy to understand instructions and tips for working in a classroom setting. In addition, resources are available that allow teachers and administrators to continue the conversation with their students and their students’ parents.&lt;br /&gt;&lt;br /&gt;“We are living in a time when many of our children know much more about how to use the technology than their teachers and parents,” said Bill Sanderson, principal of the International Studies Academy high school in San Francisco. “Most of our students spend more time on the computer each day then they do watching television. School and parents have a responsibility to ensure that students can use computers safely, &lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt; will help better educate our children by leveraging the expertise of those who bring significant life experience making computers more secure. In turn, this program will also allow our teachers to better understand the online challenges our students face and better prepare them to harness the power of the Internet safely and securely.”&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt; also provides the opportunity to introduce students to the possibility of cybersecurity as a profession and become part of the next generation of cyber defenders. As part of the lesson plans, cybersecurity professionals are encouraged to talk about their job and the path they took to get to where they are.&lt;br /&gt;&lt;br /&gt;EMC Corporation is the world’s leading developer and provider of information infrastructure technology and solutions that enable organizations of all sizes to transform the way they compete and create value from their information. Striving to be active and socially responsible in its local and global communities, EMC encouraged its cybersecurity experts to participate in &lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt;. More than 25 EMC security practitioners have already agreed to volunteer at schools from Massachusetts to California and help train more than 1000 families on staying safe online.&lt;br /&gt;&lt;br /&gt;“There is no doubt that both our nation’s students and teachers need assistance when it comes to Internet safety and security,” said Roland Cloutier, Vice President and Chief Security Officer of EMC Corporation. “Companies such as EMC and others have a vast amount of resources that can not only help to keep our children safer online, but also foster a better understanding of the responsibilities one must embrace when using the Internet.”&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;C‐SAVE&lt;/span&gt; was launched in collaboration with the NCSA’s K‐12 education working group and its corporate sponsors.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;** &lt;/span&gt;Data from 2008 K‐12 National Cyberethics, Cybersafety, Cybersecurity Baseline Study. Full results can be found at &lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://staysafeonline.mediaroom.com/index.php?s=67&amp;amp;item=44&quot;&gt;www.StaySafeOnline.MediaRoom.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;About NCSA&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The National Cyber Security Alliance is a nonprofit organization. Through collaboration with the government, corporate, non‐profit and academic sectors, the mission of the NCSA is to empower a digital citizenry to use the Internet securely and safely protecting themselves and the cyber infrastructure. NCSA works to create a culture of cyber security and safety through education and awareness activities. Visit &lt;a style=&quot;font-weight: bold;&quot; href=&quot;http://www.staysafeonline.org/&quot;&gt;www.StaySafeOnline.org/&lt;/a&gt; for more information.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Contacts:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Aimee Larsen-Kirkpatrick&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;National Cyber Security Alliance&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Phone: 202-756-3616&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;email: &lt;a href=&quot;mailto:aimee@staysafeonline.org&quot;&gt;aimee@staysafeonline.org&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Joshua Zecher&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;463 Communications&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;202-463-0013, ext. 206&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;email: &lt;/span&gt;&lt;a style=&quot;font-weight: bold;&quot; href=&quot;mailto:/josh.zecher@463.com&quot;&gt;mailto:/josh.zecher@463.com&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;&lt;hr /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;About National Cyber Security Awareness Month&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;National Cyber Security Awareness month now in its sixth year is a coordinated effort of the National Cyber Security Alliance, The Department of Homeland Security (DHS), and The Multi-State Information Sharing and Analysis Center (MSISAC).&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Source: &lt;span style=&quot;font-style: italic;&quot;&gt;National Cyber Security Alliance&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/3388138933038975624/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/3388138933038975624?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3388138933038975624'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/3388138933038975624'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2009/08/doing-our-part-for-national-cyber.html' title='Doing Our Part For National Cyber Security Month.'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://1.bp.blogspot.com/_5lRbdxTKmUc/SpnssgjDeBI/AAAAAAAAAYk/eg226L40jas/s72-c/NCSAM-09-300x250_web.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6761684931693524587.post-2639554261492905985</id><published>2009-09-07T11:14:00.003-05:00</published><updated>2009-09-07T11:59:09.960-05:00</updated><title type='text'>Ringling Brothers and Barnum and Bailey Went &quot;Over the Top&quot;</title><content type='html'>&lt;a href=&quot;http://www.ringling.com/&quot;&gt;&lt;img style=&quot;width: 372px; height: 260px;&quot; src=&quot;http://us.st12.yimg.com/us.st.yimg.com/I/ptbarnum_2046_9832029&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ringling Brothers and Barnum and Bailey went &quot;over the top&quot; with their all-out show and circus performances. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The music! The colors! The unbelievable precision! The animal performances! The comedy! The clowns! All these elements in a 2-hour performance came together in an unseamed cavalcade of acts that were nothing short of &quot;Over the Top&quot; entertainment. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Not only did Ringling Brothers and Barnum and Bailey go &quot;over the top&quot;, but they definitely lived up to their name as &quot;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-style: italic; font-weight: bold;font-size:130%;&quot; &gt;The Greatest Show on Earth&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&quot;. Simply outstanding!!!! Or better yet, Way Over the Top!!!!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;I greatly admired, and was in awe about, the precision and talents of the aerial performers and those riding circles in the ring.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Visit &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ringling Brothers and Barnum and Bailey at&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;a href=&quot;http://www.ringling.com/&quot;&gt;&lt;br /&gt;www.Ringling.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://saynotohackersandspyware.blogspot.com/feeds/2639554261492905985/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6761684931693524587/2639554261492905985?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/2639554261492905985'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6761684931693524587/posts/default/2639554261492905985'/><link rel='alternate' type='text/html' href='http://saynotohackersandspyware.blogspot.com/2009/09/ringling-brothers-and-barnum-and-bailey.html' title='Ringling Brothers and Barnum and Bailey Went &quot;Over the Top&quot;'/><author><name>Executive And Group Development</name><uri>http://www.blogger.com/profile/18156207878514127001</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFbyFYnCz0ZZt1UrEUWCkv0gE9pCKIvLRI3RoV8AGOQdvKsbxb5QbgESe7nEfv6wUGYk9BrHQfTXpKtE6J81PUMF9c00nWt5JpFZXJOnCjZGx9DaJJnM0hKV45azHJQ/s113/EAGibbs+375x334.jpg'/></author><thr:total>0</thr:total></entry></feed>