Tech – for Everyone

Tech Tips and Tricks & Advice – written in plain English.

Greeting From Miss Joy

…Because of my uncles wicked attitude…

Greeting From Miss Joy

Dearest one,

May the grace and peace of our good Lord be multiplied unto you, I know that this my mail might be a surprise to you but never mind because i am contacting you in good faith, However accept my sincere apologies if it doesn’t meet your personal ethics, I am Miss Joy Kone, from Sierra Leone, the only Daughter of my parents late Mr. and Mrs. Zokora Kone, who used to be a major dealer in gem-quality diamonds and also a politician.

I was born out of tragic fate, my mother died of cancer when I was only four years old and I was brought up with great care and love by my father before he met his own untimely death on his way back from a business trip abroad. When he actually arrived at the airport, his driver when to pick him and on their way home they had a fatal accident which killed his driver at the spot while my father spent three days in the hospital before he gave up the ghost and after his burial, my uncle seized all my father’s properties and investments because of our traditional believe that I as a lady has no part in the family inheritance since I am supposed to eventually get married and leave the home. It was really hard on me as I had nothing to get on because of my uncles wicked  attitude.

However, my father told me an important secret while on his dying bed that he deposited the sum of Seven million, Five hundred thousand US Dollars ($7.5M) in a Finance House, and also directed me to the documents of the ownership of the fund and My uncle has no knowledge whatsoever about this and he has long relocated abroad with his children at the heat of the Sierra Leona an war.  I’ll give you the Finance House details when I’ve heard from you and more trust develops and I live in a missionary home in Dakar at present because of my uncle, however there has been political instability and disturbances here as well in resent times in the country  hence I want to transfer the fund abroad  to an enabling and stable environment where this money will be use for investment and profitable venture.  I’ll need a foreign account and  reliable  partner who might as well guide me in investing to do so and I want you to help me in these regard.

I’ll give you 30%   of the money if you will offer me the neccessary assistance in good faith and Your interest and willingness to help me will in no small measure be a big relief to me in this time of need. I want to hear from you, please kindly forward your full contact details to me on your respond to enable me use it write and submit an application letter of claim/ nomination to the finance house and introduce you as my foreign partner or representative.
(1) Full Name,,,,,,,,,,,,,,,
(2) Home Address,,,,,,,,,,,,
(3) Country,,,,,,,,,,,,,,,,,,,,,,,,,,,
(4) Age And Occupation,,,,,,,,,,,,,,,,
(5) Phone Number And Fax,,,,,,,,,,,,
I will be waiting from your reply soonest and please get back to me through my private email //


Miss. Joy Kone.

I think I will “but never mind because i am contacting you in good faith” this time because I am a fan of bold text in my e-mails.

Copyright 2007-9 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

August 5, 2009 Posted by | Internet, Internet scam, spam and junk mail | , , , , , , | 5 Comments

Once Again– I’m A Millionaire!

You know, I never could have predicted – when I was a lad – that when I grew up I would get a million bucks/Euros in the mail… much less, 2-to-3 times a week!

Ref No : ESE/WIN/008/02/10/MA‏
From: Max Raster (
You may not know this sender.Mark as safe|Mark as unsafe
Sent: Wed 1/14/09 9:00 PM
Ref No : ESE/WIN/008/02/10/MA
Batch No: EULO/1007/444/606/08
Lucky Numbers: 8-17-28-31-55 [09]

Your email address has won 1,000,000.00 (One Million Euro) in the ESPANA EURO MILLION PROMOTION. The Promotion is a joint Euro/America private lottery registered and organized in accordance with the World Lottery regulation act.

We the National Lottery organizing committee are pleased to officially notify you of the status of your email application. An official notification of winning is hereby issued to you as your email promotion ticket randomly drew for the Lucky Numbers: 8-17-28-31-55 [09] Bonus Ball which selected your email as the 2ND winner of our lottery program you have consequently won the lottery program in the first batch. You have been awarded a cash prize of 1,000,000.00 (One Million Euro)

Pretty good grammar in this one.. maybe it’s legit? Woman Bilked Of $400K By Nigerian Internet Scam and

Today’s free link:
Folks, please read Bill Mullins article Jealous? Cyber-crooks Have Your Number

Copyright 2007-9 © Tech Paul. All rights reserved. post to jaanix

Share this post :

January 14, 2009 Posted by | advice, computers, cyber crime, Internet scam | , , , , , , , , , , , | 2 Comments

A Vast Criminal Enterprise Aimed At You

– Five Defensive Strategies

“Today’s Internet attacks are organized and designed to steal information and resources¹ from consumers and corporations. The web is now the primary route by which cybercriminals infect computers. Cybercriminals are planting malicious code on innocent websites. This code then simply lies in wait and silently infects visiting computers.

The scale of this global criminal operation has reached such proportions that Sophos discovers one new infected webpage every 4.5 seconds – 24 hours a day, 365 days a year. In addition, SophosLabs, our global network of threat analysis centers, is sent some 20,000 new samples of suspect code² every single day.

2008 at a glance

  • Biggest malware threats – SQL injection attacks against (legitimate) websites and the rise of scareware (aka “rogue” anti-malware programs)
  • New web infections – one new infected webpage discovered by Sophos every 4.5 seconds (24/7 x 365)
  • Malicious email attachments – five times more at the end of 2008 than at the beginning
  • Spam-related webpages – one new webpage discovered by Sophos every 15 seconds
  • New scareware websites – five identified every day
  • Top malware-hosting country – US with 37 percent
  • Top spam-relaying continent – Asia with 36.6 percent
  • Amount of business email that is spam – 97 percent

Injection attack? coming to get you By exploiting poorly secured legitimate websites, hackers have been able to implant malicious code onto them, which then attempts to infect every visitor. One of the reasons the web is so popular is that legitimate websites can attract large numbers of visitors, all of whom are a potential victim.
(This as also known as “poisoning”.)

Many well known organizations and brands have fallen victim to this kind of attack during 2008. Both large and small organizations have been targeted.
January 2008: Thousands of websites belonging to Fortune 500 companies, government agencies and schools/universities were infected with malicious code. more..

¹ read “money”
² read “malware”

Folks, this is taken from a whitepaper titled “Security Threat Report 2009” and produced by the IT Security firm Sophos. Some of the emphasis is mine. You can download the document here.
I want to take a moment to thank them for publishing this, and saluting their effort to combat malware and the criminals behind it. In fact, let me go a step further and salute all you whitehats out there. Thank you.

What you can do

1: please read Top 10 things you should do to your computer–updated. It is a checklist, and provides you with the How To’s for a (more) secure computer, as well as providing links to important (free) security downloads.
2: enable an anti-phishing filter, which can help alert you to poisoned websites before you go there. All modern browsers have a filter built in, and all you have to do is turn it on; or, you can add a toolbar/plug-in such as McAfee’s Site Advisor or the excellent WOT.
3: make sure ALL the programs on your computer are patched and up-to-date. The easiest and most effective way to do this (IMHO) is to download and install the PSI (Personal Software Inspector) from Secunia.
4: Never respond to e-mails asking for personal information. Legitimate businesses never contact you about “important issues” via e-mail. But criminals love to go phishing!
5: Be PARANOID on the Internet. (Use common sense) Think someone can’t trace back to you? Guess again; your browser reveals a wealth of information by default. Sound too good to be true? It is. There’s no such thing as a “free iPod”… and, no, you did not win the Irish Lottery. Is looking at sexually explicit material simply irresistible? Go to one of those video rental shops that has a back room instead of clicking links and images — a malware infection can cost you all your data and/or several hundred dollars in cleanup.. and/or many hours of your time..

Folks, the Internet is not Disneyland. Most knowledgeable people refer to it as the “wild, wild, West” (a reference to sheer lawlessness) but I like a different analogy better.. think of it as going into the Big City, and going down to the docks/warehouse district, alone, and at night.
You can do it, but you best be careful.

Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

December 12, 2008 Posted by | advice, anti-spyware, antivirus, computers, cyber crime, e-mail, hackers, how to, Internet, PC, Phishing, phraud, security, software, tech | , , , , , , , , , , , , , , , , , , | 3 Comments

Interview with an ID thief

This CNN special report interviews spammer Jason Carpenter. Though it is dated, it is interesting.

November 29, 2008 Posted by | advice, computers, cyber crime, e-mail, hackers, Internet scam, Phishing, phraud, security | , , , , , , , , , | 6 Comments

Our Modern Nightmare – Zombie Attack

It’s like we woke up inside a horror movie– we are under attack by zombies.

Night of the Living Dead

Yes. It’s true. Real life is imitating art (if you’re willing to call Night of the Living Dead “art”). We really are under attack by zombies– only our zombies aren’t trying to eat our flesh, they are trying to sell us bootleg Ph@rmacuticals and cheap V1@gra, fake Rolex watches, and steal our identities. [note in the photo how the zombie is reaching for the wallet?]

In real life, our zombies can’t claw at us directly and they don’t have teeth. Our zombies are computers. Our computers. And they attack via e-mail and the Internet. Like the zombies in Night, they spread the zombie disease by infection. Differently, our zombies aren’t mindless; they’re controlled by villains (aka “cyber-criminals”).

Yes. Your computer may be a zombie, and odds are you wouldn’t know.

If it isn’t a zombie (yet), it is constantly under the attack of infection via the Internet. An unprotected computer, connected to the Internet, will be infected within 8 minutes (12 seconds in a recent test).
90 to 95% of all Internet traffic traveling the wires is zombie-generated junk e-mail that’s either a fraud attempt or (and?) loaded with malware– the “attack”.

How did this happen? Well, part of it is the Tech Industry’s fault (see, How the Tech Industry is Failing You), either unintentionally, or through lack of foresight, or through willful negligence and the rush to market. Security either wasn’t considered, or it was too expensive.
Nobody predicted the nerdy hackers evolving into the organized, well-financed, Mafia-style criminal gangs of today.
And they put too-powerful, fully-capable machines into the hands of the unwashed masses– us.
The rest of it is our fault.

* We let our antivirus expire and, every day, close the warning.
* We think we’ve just won the British Lottery.
* We still run Windows 98 because we’re “comfortable with it”.
* We cannot resist ‘free’ pornography.
* We cannot be bothered with those REALLY ANNOYING little windows that pop open at the worst times and tell us that a “newer version is available.”
* When someone tries to tell us about our machines, they start using big words in a funny language and we ‘tune out’.
* We believe that everything computer-related should be free, so we download cracked (aka “pirated”) software, bootleg music and video, and we don’t care who or where it comes from.

I could go on and on and on (and on, believe me!).

Yes.. we are our own worst enemies. But, you don’t have to be a part of the problem. And you don’t have to learn a big word-filled foreign language (aka “Geek speak”) to avoid the zombie attack.

Today’s free link: I have put together a list of proactive steps every computer user should know.. a checklist. In it you will find links to free, safe, and effective methods for protecting your computer, and keeping it safe. Please look over, Top 10 Things You Should Do To Your Computer. And then do us all a favor, pass the list on to your friends who have computers.

Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

November 11, 2008 Posted by | advice, antivirus, computers, cyber crime, e-mail, hackers, Internet, Internet scam, Phishing, security, tech | , , , , , , , , , , , , , | 7 Comments

Latest Scam E-mails — Are You Rich Now Too?


Your email address won £915,810.00 GBP in this month NATIONAL LOTTERY.
To file for your claim, contact our agent Rev.Harry Smith with
the details below(Full Names, Contact Address, Country, Age, Sex, Occupation & Telephone numbers) to this email: Phone Number: +44 (701) 115 3332

Please Confirm Your Purchase

Capture  Re: You have not responded to my previous letter‏

From a Ewald de Bever (Mr), claiming to be an “Oracle Database Engineer currently in London…” wants my help ‘confirming’ that it was my very wealthy relative who died.

Tip of the day: If you do not already do so, please get into the habit of marking these items as spam. Doing so will help your filters “learn” what is spam and what is legit.
* Fraud Prevention Tips
* Managing junk mail in Outlook/Thunderbird

Today’s free download and link: Today is a “two-fer”, and not my usual method for providing links to great free software. By clicking this link, you will read about a handy little app on a great blog written by a freeware devotee. Check ’em both out, click the link!

Copyright 2007-8 © Tech Paul. All rights reserved.jaanix post to jaanix

Share this post :

October 4, 2008 Posted by | advice, computers, cyber crime, e-mail, Internet scam, Phishing, phraud, security, spam and junk mail, tech | , , , , , , | 1 Comment