!! Teenager gets $71,000 XMAS present from the Internet !! [ljlyl]
$$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Parents of 15 year old find $71,000 in CASH in closet! $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Does this headline look familiar? Of course it does. You most likely have just seen this story recently featured on a major nightly news program (USA). His mother was cleaning and putting laundry away when she came across a large brown paper bag that was suspiciously buried beneath some clothes and a skateboard in the back of her son's closet. Nothing could have prepared her for the shock she got when she opened the bag and found it was full of cash. Five-dollar bills, twenties, fifties and hundreds- all neatly rubber-banded in labeled piles. My first thought was that he had robbed a bank, says the 41-year-old woman. There was over $71,000 dollars in that bag - that's more than my husband earns in a year! The woman immediately called her husband at the car-dealership where he worked to tell him what she'd discovered. He came home right away and they drove together to the boy's school and picked him up. Little did they suspect that where the money came from was more shocking than actually finding it in the closet. As it turns out, the boy had been sending out via E-mail on the Internet a type of 'chain-letter' to E-mail addresses that he obtained off of the Internet. Everyday after school for the past 2 months, he had been doing this right on his computer in his bedroom. "I just got the E-mail one day and I figured what the heck, I put my name on it like the instructions said and I started sending it out", says the clever 15-year-old. The E-mail letter listed 3 addresses and contained instructions to send three $5 dollar bills to the people on the list, then delete the top address and move the other 2 addresses up, and finally to add your name to the bottom of the list. The letter goes on to state that you would receive several thousand dollars in $5 dollar bills within 2 weeks if you sent out the letter with your name at the bottom of the 3-address list "I get junk E-mail all the time, and I really didn't think it was going to work", the boy continues. Within the first few days of sending out the E-mail, the Post Office Box that his parents had gotten for his video-game magazine subscriptions began to fill up with not magazines, but envelopes containing $5 dollar bills. "About a week later I rode (my bike) down to the post office and my box had 1 magazine and about 300 envelopes stuffed in it. There was a yellow slip that said I had to go up to the (post office) counter - I thought I was in trouble or something (laughs)". He goes on, "I went up to the counter and they had a whole box of more mail for me. I had to ride back home and empty out my backpack 'cause I couldn't carry it all". Over the next few weeks, the boy continued sending out the E-mail. "The money just kept coming in and I just kept sorting it and stashing it in the closet, I barely had time for my homework". He had also been riding his bike to several of the area's banks and exchanging the $5 bills for twenties, fifties and hundreds. "I didn't want the banks to get suspicious so I kept riding to different banks with like five thousand at a time in my backpack. I would usually tell the lady at the bank counter that my dad had sent me in (to exchange the money) and he was outside waiting for me. One time the lady gave me a really strange look and told me that she wouldn't be able to do it for me and my dad would have to come in and do it, but I just rode to the next bank down the street (laughs)". Surprisingly, the boy didn't have any reason to be afraid. The reporting news team examined and investigated the so-called 'chain-letter' the boy was sending out and found that it wasn't a chain-letter at all. In fact, it was completely legal according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, or Title 18, Section 3005 in the US code, also in the code of federal regulations, Volume 16, Sections 255 and 436, which states a product or service must be exchanged for money received. Every five-dollar bill that he received contained a little note that read, "Please add me to your mailing list". This simple note made the letter legal because he was exchanging a service (adding the purchasers name to his mailing list) for a five-dollar fee. Here is the letter that the 15-year-old was sending out by E-mail, you could do the exact same thing he was doing, simply by following the instructions in the letter. $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Here are instructions on how to make $10,000 US cash in the next 2 weeks: There are 3 addre
MAKE WINDOWS MORE RELIABLE
Dear Windows User, Now you can boost the reliability of ordinary Windows 3.x, 95 and 98 to nearly the level of Windows NT or 2000, Microsoft's professional and industrial version of Windows. The new WinFix 4.3 is a very effective way to improve the reliability of Windows, because it makes Windows fault-tolerant and self-repairing. And WinFix is very safe, because it operates completely independent of Windows. http://www3.quickstockpower.com/comph to find out more about WinFix, the safest, most effective way to keep you working, by keeping your PC working non-stop. Arlen Dixon, CEO Westwood Software Marketing * * * * * * * * * * * * * * * * * This announcement is being sent to PC users who asked to be kept informed about new developments in Windows(tm) technology. To be removed from our mailing list, go to the Email-us page OR To be removed mailto:[EMAIL PROTECTED]?Subject=REMOVE
U.S. Draws Attention to Information Warfare Threat
By REUTERS Filed at 0:56 a.m. ET WASHINGTON (Reuters) - A year after the Y2K bug, U.S. officials are once again warning about perceived dangers to a United States increasingly stitched together by bits and bytes of computer code. This time, a key stated fear is information warfare, or sneak electronic assaults that could crash power grids, financial networks, transportation systems and telecommunications, among other vital services. National security aides trace the threat to hostile or potentially hostile governments as well as drug lords, criminal cartels and increasingly computer savvy guerrilla groups. Some of these organizations ``are doing reconnaissance today on our networks, mapping them, looking for vulnerabilities,'' Richard Clarke, President Clinton's top aide for infrastructure protection and counterterrorism, told a Microsoft Corp. digital security conference in Redmond, Washington, on Dec. 8. Cyberblitzes like those that briefly knocked out major Web sites in February -- including Yahoo! Inc.'s Internet gateway, eBay Inc.'s auction service and Amazon.com Inc.'s retail site -- could easily be copied on a larger scale, said Clarke, a staff member of the White House National Security Council. ``Criminals, crackers, foreign governments -- when the new president reads that intelligence briefing, he had better move pretty fast,'' he added. Such warnings are not new from Clarke, who has frequently conjured up a ``digital Pearl Harbor,'' a reference to the Japanese surprise attack that threw the United States into the Second World War. But Clarke and other U.S. officials seem to be stepping up a public awareness campaign, spurred by the spread of information technology, growing knowledge of malicious computer code and ever greater U.S. reliance on networked systems. CYBERINICIDENT GROUP MEETS On Dec. 18, the National Security Council held the first meeting of the recently formed Cyberincident Steering Group, aimed at fostering cooperation between the private sector and government to secure systems from domestic and international cyberattack. ``This meeting was an important first step in building computer security programs for the nation,'' said Peter Tippett, chief technologist for TruSecure Corp., a leading computer security company. Among topics discussed were the creation of a rapid response system and communications between industry and government, said David Perry, the public education director for Trend Micro Inc., a maker of anti-virus products, and the co-chairman of the steering group. The U.S. intelligence community voiced its concerns last week with the release of ``Global Trends 2015,'' a wide-ranging analysis by the CIA, its sister U.S. spy shops and outside experts. The report said foes of a militarily dominant United States, rather than challenging it head-on, would seek to target an Achilles' heel in cyberspace or threaten the use of the deadliest chemical, nuclear or biological weapons. ``Such asymmetric approaches -- whether undertaken by states or nonstate actors -- will become the dominant characteristic of most threats to the U.S. homeland,'' the report, released by the National Intelligence Council, said. Over time, attacks are increasingly likely to be fired off through computer networks rather than conventional arms, as ``the skill of U.S. adversaries in employing them'' evolves, the assessment said. FBI FINGERS CHINA It said many unnamed countries were developing such technologies to complicate what the U.S. military refers to as ''power projection'' and to undermine morale at home. The interagency, FBI-led National Infrastructure Protection Center uses a slide depicting China's Great Wall in its standard presentation on cyberthreats, along with a quote from Sun Zi, author of a treatise on war in about 350 B.C. ``Subjugating the enemy's army without fighting is the true pinnacle of excellence,'' the FBI's slide quotes the ancient Chinese strategist as saying. In a telltale update, the slide includes a 1999 quote from a Chinese newspaper referring to information warfare as a means of achieving strategic victory over a militarily superior enemy.
Re: More half-baked social planning ideas
>>> but soon realized it was likely. Tens of millions of Californians >>> have *no idea* of the many-armed oil-fed beast that lives in basements.. >> >>They've never read a story which mentions such a thing? > >"Read" ??? Cthulhu. Gravity-hot-air heating systems. Steam radiators. In the basement, no one can hear you scream... Thanks! Bill Bill Stewart, [EMAIL PROTECTED] PGP Fingerprint D454 E202 CBC8 40BF 3C85 B884 0ABE 4639
Re: CDR: About Gilmore's letter on IBM&Intel push copyprotection into ordinary disk drives
Peter Wayner wrote: > But I was quite worried until I began to see the dangers for IBM and > Intel in the scheme. This is not an easy play for them because it > threatens much of the entire industry in these ways: You've answered it yourself in the last two paragraphs. Screw IBM, screw Intel. In order for this nonsense to work, the operating system has to support it. You can bet Linux, and *BSD won't support it, or if they do, they'll provide the "extra" access needed. More and more I find, I need less Microsoft software*. Even at work where it's a mostly Microsoft shop and the standard desktop is W2K. GUID's, CPU Serial numbers, and now hard drives. That's ok, this will wind up killing Intel, and hard drive manufacturers that insist on this. Many like us, won't buy the shit. We'll buy hardware without serial numbers, or at least those whose serial numbers can be overwritten. i.e. SPARC's, Mac's, etc. and we'll be running *BSD/Linux. * Anecdotal: I've recently purchased a home entertainment PC as a replacement for my DVD player and CD changers, etc from qbex.com. It's basically a small PC in a very small form factor. If I ever get my hands on a good Linux based DVD player, I'll use that. (I guess I haven't yet been trolling the DivX stuff as I've had no need for it yet.) It pisses me off that the DVD player tells me that after five more plays, it will lock itself to "Region 1" and that while I have both VGA and RCA+SVIDEO out, that it would refuse to play on any RCA/SVIDEO hardware that doesn't have Macrovision. This is insane. Anyone can build such a Home Entertainment PC as the QBEX simply by purchasing an infrared keyboard+mouse and a VGA to RCA scan converter and likely get much better output... I bought this piece of shit simply because it already had all the drivers and pieces in one box. All I have to say is this: you bastards! Copyright protection is getting out of hand when it gets in my way. I've paid for the DVD's. I've paid for the player software. I've paid for the hardware. How dare they tell me how I may use it so long as I don't make copies other than backups? So what if I buy a perfectly legitimate DVD from a different country? I should be able to watch it without going through acrobatics! So what if I back up my legally purchased DVD's to VHS tape so I can watch it where I don't have a DVD player, or on my camcorder? So what if I can copy the raw bits off the DVD platter for backup incase I scratch it? When was the last time you saw a movie house offer to replace damaged media for nominal cost? (i.e. you've damaged accidentally, or your kid decided to use as a frisbie, or your dog as a chew toy?) So what if I hook up the VIDEO out signal of the DVD player or PC to a 2GHz transmitter so I can watch it in my bedroom instead of my living room? So what if I can have ten friends come over with beer and popcorn to watch a movie I purchased? So what if I chose to let a friend borrow my DVD's or if I borrow theirs? > This is another opportunity for Red Hat or some other Linux box > company to walk into companies and say, "Use Red Hat, Mozilla, and > Star Office and you'll never have license problems again. The > hardware guys claim that they can take care of rights management > issues for you. So can we and we cost alot less." > > I think this may be the greatest thing that's come along for open > source OSs yet. As Princess Leia said in the Hollywood content "Star > Wars", "The harder you squeeze your fingers Vader, the more planets > slip through the fingers." Do those content wrangling lawyers down > there ever look at the content they protect? -- --Kaos-Keraunos-Kybernetos--- + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\ \|/ :aren't security. A |share them, you don't hang them on your/\|/\ <--*-->:camera won't stop a |monitor, or under your keyboard, you \/|\/ /|\ :masked killer, but |don't email them, or put them on a web \|/ + v + :will violate privacy|site, and you must change them very often. [EMAIL PROTECTED] http://www.sunder.net
Snowhite and the Seven Dwarfs - The REAL story!
Today, Snowhite was turning 18. The 7 Dwarfs always where very educated and polite with Snowhite. When they go out work at mornign, they promissed a *huge* surprise. Snowhite was anxious. Suddlently, the door open, and the Seven Dwarfs enter... midgets.scr
Antigen found W32/Hybris-B virus
Antigen for Exchange found midgets.scr infected with W32/Hybris-B virus. The file is currently Deleted. The message, "CDR: Snowhite and the Seven Dwarfs - The REAL story!", was sent from Hahaha and was discovered in IMC Queues\Inbound located at Cognex/Natick/BAMBI.
Antigen found W32/Hybris@m virus
Title: Antigen found W32/Hybris@m virus Antigen for Exchange found midgets.scr infected with W32/Hybris@m virus. The file is currently Deleted. The message, "Snowhite and the Seven Dwarfs - The REAL story!", was sent from Hahaha and was discovered in IMC Queues\Inbound located at ITC/Corporate/EXCHANGE.
!!!Mortgage Rates DROP! Lenders COMPETE for your Business!!! -ydtt
The Lender's Network Mortgage Specialists We Shop The Best Loan For You! The Lenders Network is a 100% free service which lets you shop for a mortgage conveniently and securely from the comfort of your home. Using our vast network of lenders across the U.S., we will search our database of loan programs for the best loans that fit your needs. Even if you're currently working with another lender or have been turned down before, we can still help. Choose from these types of loans: Debt Consolidation, 2nd Mortgage, Refinance, Credit Repair, or Home Improvment. We also specialize in self employed and (fair to poor credit) borrowers. Competitive rates! Ready to get started? Simply fill out the form below, and we'll begin shopping for your loan. It's that easy! Free Mortgage Quote Contact Information (* required info) Name: * Address: * City: * State(US Only): AKARAZCACOCTDCDEFLGAHIIAIDILINKSKYLAMAMDMEMIMNMOMSMTNCNDNENHNJNMNVNYOHOKORPARISCSDTNUTVAVTWAWIWVWY * Zip/Postal Code: * Home Phone: * Work Phone: * Email Address: Best Time to Call: Morning at HomeMorning at WorkAfternoon at HomeAfternoon at WorkEvening at HomeLate Evening at Home Do You Own Your Home? YesNoMobile Homes DO NOT Qualify Current Property Value: * See Below For Qualifications 1st Mortgage Owed: * 2nd Mortgage Owed: * Amount You Wish To Borrow: * Interest Rate on Current Mortgage: * Monthly Gross Household Income * Monthly Debt (excluding current mortgage(s)) * Credit Rating: Please SelectExcellentGoodFairPoor* Loan Interested In: Debt ConsolidationSecond Mortgage (Home Equity)Home ImprovementRefinance* Email List Removal Click Here
!! Teenager gets $71,000 XMAS present from the Internet !! [ycbha]
$$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Parents of 15 year old find $71,000 in CASH in closet! $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Does this headline look familiar? Of course it does. You most likely have just seen this story recently featured on a major nightly news program (USA). His mother was cleaning and putting laundry away when she came across a large brown paper bag that was suspiciously buried beneath some clothes and a skateboard in the back of her son's closet. Nothing could have prepared her for the shock she got when she opened the bag and found it was full of cash. Five-dollar bills, twenties, fifties and hundreds- all neatly rubber-banded in labeled piles. My first thought was that he had robbed a bank, says the 41-year-old woman. There was over $71,000 dollars in that bag - that's more than my husband earns in a year! The woman immediately called her husband at the car-dealership where he worked to tell him what she'd discovered. He came home right away and they drove together to the boy's school and picked him up. Little did they suspect that where the money came from was more shocking than actually finding it in the closet. As it turns out, the boy had been sending out via E-mail on the Internet a type of 'chain-letter' to E-mail addresses that he obtained off of the Internet. Everyday after school for the past 2 months, he had been doing this right on his computer in his bedroom. "I just got the E-mail one day and I figured what the heck, I put my name on it like the instructions said and I started sending it out", says the clever 15-year-old. The E-mail letter listed 3 addresses and contained instructions to send three $5 dollar bills to the people on the list, then delete the top address and move the other 2 addresses up, and finally to add your name to the bottom of the list. The letter goes on to state that you would receive several thousand dollars in $5 dollar bills within 2 weeks if you sent out the letter with your name at the bottom of the 3-address list "I get junk E-mail all the time, and I really didn't think it was going to work", the boy continues. Within the first few days of sending out the E-mail, the Post Office Box that his parents had gotten for his video-game magazine subscriptions began to fill up with not magazines, but envelopes containing $5 dollar bills. "About a week later I rode (my bike) down to the post office and my box had 1 magazine and about 300 envelopes stuffed in it. There was a yellow slip that said I had to go up to the (post office) counter - I thought I was in trouble or something (laughs)". He goes on, "I went up to the counter and they had a whole box of more mail for me. I had to ride back home and empty out my backpack 'cause I couldn't carry it all". Over the next few weeks, the boy continued sending out the E-mail. "The money just kept coming in and I just kept sorting it and stashing it in the closet, I barely had time for my homework". He had also been riding his bike to several of the area's banks and exchanging the $5 bills for twenties, fifties and hundreds. "I didn't want the banks to get suspicious so I kept riding to different banks with like five thousand at a time in my backpack. I would usually tell the lady at the bank counter that my dad had sent me in (to exchange the money) and he was outside waiting for me. One time the lady gave me a really strange look and told me that she wouldn't be able to do it for me and my dad would have to come in and do it, but I just rode to the next bank down the street (laughs)". Surprisingly, the boy didn't have any reason to be afraid. The reporting news team examined and investigated the so-called 'chain-letter' the boy was sending out and found that it wasn't a chain-letter at all. In fact, it was completely legal according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, or Title 18, Section 3005 in the US code, also in the code of federal regulations, Volume 16, Sections 255 and 436, which states a product or service must be exchanged for money received. Every five-dollar bill that he received contained a little note that read, "Please add me to your mailing list". This simple note made the letter legal because he was exchanging a service (adding the purchasers name to his mailing list) for a five-dollar fee. Here is the letter that the 15-year-old was sending out by E-mail, you could do the exact same thing he was doing, simply by following the instructions in the letter. $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ $$$ Here are instructions on how to make $10,000 US cash in the next 2 weeks: There are 3 addre
QUICK, EASY WEIGHT LOSS, GUARANTEED!
*AMAZING MELT AWAY FAT ABSORBER CAPSULES* LOSE 30 POUNDS IN 30 DAYS... GUARANTEED!!! All Natural Weight-Loss Program, Speeds Up The Metabolism Safely Rated #1 In Both Categories of SAFETY & EFFECTIVENESS In (THE USA TODAY) WE'LL HELP YOU GET THINNER IN WINTER!!! WE'RE GOING TO HELP YOU LOOK GOOD, FEEL GOOD AND TAKE CONTROL IN 2000 * Receive 1 Free Bottle Of Ultra Trim 2000 & Your Bonus Supply, With Every Order Of 2 Or More Bottles. Offer Good Until January 15, 2001! * WE GLADLY SHIP TO ALL FOREIGN COUNTRIES! You will be losing by tomorrow! Don't Wait, visit our web page below, and join now! Email Address: [EMAIL PROTECTED] Order by 24 Hour Fax!!! (775) 414-7455 or (937) 276-5567. * http://geocities.com/easyslim_2001/ * This is the easiest, fastest, and most effective way to lose both pounds and inches permanently!!! This weight loss program is designed specifically to "boost" weight-loss efforts by assisting body metabolism, and helping the body's ability to manage weight. A powerful, safe, 30 Day Program. This is one program you won't feel starved on. Complete program for one amazing low price! Program includes: BONUS AMAZING FAT ABSORBER CAPSULES, 30 DAY - WEIGHT REDUCTION PLAN, PROGRESS REPORT, AND MUCH MORE!!! SPECIAL BONUS..."FAT ABSORBERS", AS SEEN ON TV With every order...AMAZING MELT AWAY FAT ABSORBER CAPSULES with directions (1 Month Supply, Absolutely Free ) ...With these capsules you can eat what you enjoy, without the worry of fat in your diet. 2 to 3 capsules 15 minutes before eating or snack, and the fat will be absorbed and passed through the body without the digestion of fat into the body. You will be losing by tomorrow! Don't Wait, visit our web page below, and join now! Email Address: [EMAIL PROTECTED] Order by 24 Hour Fax!!! (775) 414-7455 or (937) 276-5567. * http://geocities.com/easyslim_2001/ * ___1 Month Supply $32.95 plus $3.75 S & H, 100 Amazing MegaTrim Capsules. ___2 Month Supply $47.95 plus $3.75 S & H, 200 Amazing MegaTrim Capsules. (A $9.95 Savings, Free Bottle)! ___3 Month Supply $62.95, Plus $3.75 S & H, 300 Amazing MegaTrim Capsules. (A $19.90 Savings, Free Bottle)! To Order by postal mail, please send to the below address. Make payable to MegaTrim. Ultra Trim 2000 4132 Pompton Ct. Dayton, Ohio 45405 (937) 567-9807 Order by 24 Hour Fax!!! (937) 276-5567 or (775) 414-7455. * Important Credit Card Information! Please Read Below! * Credit Card Address, City, State and Zip Code, must match billing address to be processed. CHECK MONEYORDER VISA MASTERCARD AmericanExpress___ Debt Card___ Name___ (As it appears on Check or Credit Card) Address (As it appears on Check or Credit Card) ___ City,State,Zip(As it appears on Check or Credit Card) ___ Country ___ (Credit Card Number) Expiration Month_ Year_ *IMPORTANT NOTE* If Shipping Address Is Different From The Billing Address Above, Please Fill Out Information Below. Shipping Name__ Shipping Address___ ___ Shipping City,State,Zip ___ Country ___ Email Address & Phone Number(Please Write Neat)