Earn 1 million $’s the Easy Way (Seriously)
I don’t know about you, but I’m tired of not being a millionaire. Fortunately, two recent reader submissions have pointed me to two ideas that will put an end to my days of brown bag, peanutbutter sandwich lunches, and will have Robin Leach looking for me.
“As to the “Easy Money” of today’s “Tech-for Everyone”, many, many years ago, did I say many years ago? I bought my usual Saturday morning comic book. In the back of it were interesting things one could order. Tucked into a sharp ad was an inticing promise; “Earn 1 million $’s the easy way.” Of course I wanted to know how. The clipping said that I had to send $1 to the address on the ad. I did so and waited anxiously for the golden information that would make me a millionaire…the easy way. After 2 very long weeks I received a postcard that said, “Take out an ad in a comic book ad ask for $1 for the information on how to get rich.” That was it. I immediately felt that I had been ripped off and took it to my dad so that he might take legal action. He informed me that I had just paid for a a very important lesson and he was glad that I was learning it at 7 and not at 27. I guess the more things change the more they stay the same.” ~ Ann
Method 2: if you have a new smartphone, one with near-field technology (like the Galaxy S III), you could just stroll around town for a while…
* Credit card data can be stolen with a wave and an app Certain smartphones allow potential fraudsters to get sensitive info, with minimal effort
“It seems like there’s a smartphone app for everything these days — including one that could be used to steal your credit card information.” Read more..
I guess the $700 it takes to buy an S III isn’t such a bad investment after all…
I sincerely thank the readers for bringing those to my attention!
Today’s quote: “Sometimes it’s important to work for that pot of gold. But other times it’s essential to take time off and to make sure that your most important decision in the day simply consists of choosing which color to slide down on the rainbow.” ~ Douglas Pagels
Copyright 2007-2013 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
All we really have, in the end, are our stories.
Make yours great ones. Ones to be proud of.
Do You Use A Debit or Credit Card? Watch This.
The other day I received a call. The person had read about a skimmer being found at a Lucky store they shop at, and they wanted to know how they could “spot” a skimmer. (See Lucky Supermarket Chain Reveals Scope Of Card Reader Scam)
Well.. um.. I wish I had an easy answer.
What I do have is 3 videos. The first is in German, but what I want you look at is the “skimmer” devices, used on ATM machines.. could you “spot” one of those?
It doesn’t just happen in Europe.. here’s a RL story..
And, it’s worse than that. Here’s a Bob Sullivan report on “pocket skimmers”.. like the ones your waiter/waitress might have..
So.. I haven’t even touched upon (wireless) RFID skimmers, or even begun to paint the picture as black as it is. Yippee.
What can you do to protect yourself? Do you need to scratch at keypads, and try to pop off faceplates before you use an ATM..? Wrap your wallet in tinfoil, too?
Well.. I don’t know. I guess that’s up to you. But, if your bank allows you to set “activity notifications”, I would activate it, and set it to 1¢. It won’t stop the ID Thief, but you may be able to act fast, and notify the bank before your account is completely emptied…………
Perhaps hire a “credit monitoring service”, or otherwise routinely, frequently, check your credit report as well? (Hint)
I have an idea. Why don’t we do away with currency altogether. Just (only) use chips or cards! It’s so convenient, and think of the money the government will save if it doesn’t have to print bills.
… arrrgh.
Today’s quote: “If you’re not outraged, you’re not paying attention.” ~ Unknown
Copyright 2007-2011 © “Tech Paul” (Paul Eckstrom). All Rights Reserved.
>> Folks, don’t miss an article! To get Tech – for Everyone articles delivered to your e-mail Inbox, click here, or to subscribe in your RSS reader, click here. <<
Vacation Odds and Ends + Giveaway
The weekend is here – the last weekend of Tech Paul’s ‘vacation mode’ – and I intend to get the most out of it as I can.. by doing as little as possible. With that in mind, here are some quick bits.
1) Have you ever wished you could go back in time…and un-do something you did? Windows’ built-in recovery tool, System Restore, allows your computer to do what you and I cannot do, jump back in history to a time when everything was working properly, and that’s a pretty neat trick!
See, How To Use System Restore To Fix Windows
2) In spite of the pop-up windows that are geared to urging you to purchase, AVG can STILL be downloaded for free. (To do so now, click here.)
3) Skype CANNOT detect a problem on your computer… but that doesn’t stop a criminal from sending you a “chat” that says it has.
See, Skype — “Windows Requires Immediate Attention”.. Not!
4) Are you still using XP? Want a more “modern” and attractive look and feel?
See, Make XP Look Like Vista or Mac OS X
5) Welcome to the world of the illiterati, where ignorance is indeed bliss, where being a moron is somehow classed as being “cute” and where screaming and roaring abuse at someone for any perceived slight doesn’t mean you’re an ———-, it means you have “attitude”.
See, Welcome to the world of the illiterati, where ignorance is indeed bliss…
(Thanks to Tech-Thoughts for bringing that one to my attention,)
6) Network Solutions discovered in early June that attackers had hacked into Web servers the company uses to provide e-commerce services – a package that includes everything from Web hosting to payment processing — to at least 4,343 customers, mostly mom-and-pop online stores.
See, Network Solutions Hack Compromises 573,000 Credit, Debit Accounts (in some browsers, you may have to scroll down a bit..)
And last but not least.. (drum roll please)
Free Lifetime License for SUPERAntiSpyware Professional – 20 to Give Away
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
A Thieves Market — The Internet
“When you think of the Internet underground, you probably don’t think about Burbank or Ventura, Calif.. But if you want to see what’s going on in the Web’s darkest corners, the Ventura Freeway is where you need to go…”
I have been a fan of Bob Sullivan’s MSNBC Red Tape Chronicles for a while now, and recently I had the time to go through some of his older articles, and I came across one I had missed — A Portal On Credit Card Crime.
I highly recommend that you read this article.
On it, I also found links to a Dateline special undercover series titled “To Catch an ID Thief”, which I had also missed. It too, is a “must read”, er.. “must see”. So I have provided links to the videos. (You will need to enable Flash.)
Amazing stuff here. I hope you’ll watch and learn, and tell your friends.
3: ‘Hansen Discount Electronics’
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Hacker Theft Could be the Largest Credit Card Crime in History
Hackers breach Heartland Payment credit card system
Heartland Payment Systems hpy on Tuesday disclosed that intruders hacked into the computers it uses to process 100 million payment card transactions per month for 175,000 merchants. The number of victims is still unknown.
Heartland’s disclosure coincides with reports of heightened criminal activities involving stolen payment card numbers. Security firm CardCops has been tracking a 20% year-over-year increase in Internet chat room activity where hackers test batches of payment card numbers to make sure that they’re active.
To read the full news story, click here.
My two cents: This is why, folks, you don’t want to get all excited about “cloud computing”, or allow your governments to create large “databases”.. like a “national health registry”, or “crime database”.. and why I don’t use “online backup” to store my files.
Why trust someone else’s server? The Conficker outbreak shows you how well servers get patched..
I feel bad for the folks at HPS.. the cost to “clean this up” is going to be astounding.. For more on that see, Credit card hackers find new, rich targets.
Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
International cooperation busts cyber-crime ring
In a pair of related cases, a total of 38 people with links to global organized crime—mostly working out of Romania and the U.S., but also operating in Pakistan, Portugal, and Canada—were indicted for engineering a decidedly 21st century cyber-based scheme. (From the FBI Website.)
By using the fairly routine online crime of “phishing“, the online scam also used a clever offline payoff, and ultimately swindling thousands of people and hundreds of financial institutions out of millions before being shut down.
Folks– were you one of the “thousands” who responded? One phish message was made to appear as if it originated from Connecticut-based People’s Bank. (In fact, the e-mail message directed victims to a computer in Minnesota that had been “hacked,” and used to host a counterfeit People’s Bank Internet site. {called “pharming“}) During the course of the investigation, it was determined that the individuals had engaged in similar phishing schemes against many other financial institutions and companies, including Citibank, Capital One, JPMorgan Chase & Co., Comerica Bank, Wells Fargo & Co., eBay and PayPal.
Tip of the day: I don’t care how “authentic” the e-mail, IM, or text message looks; don’t click the link!
Today’s free link: This video quick tip on CNet TV shows you how to move your complete (including playlists and metadata) iTunes library to a new computer.
Copyright 2007-8 © Tech Paul. All rights reserved. post to jaanix
Share this post : | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |