!! Teenager gets $71,000 XMAS present from the Internet !! [ljlyl]

2000-12-26 Thread caujabxknw


   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$

Parents of 15 year old find $71,000 in CASH in closet!

   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$


   Does this headline look familiar?  Of course it does.  You most likely have just 
   seen this story recently featured on a major nightly news program (USA).

   His mother was cleaning and putting laundry away when she came across 
   a large brown paper bag that was suspiciously buried beneath some clothes 
   and a skateboard in the back of her son's closet.  Nothing could have prepared 
   her for the shock she got when she opened the bag and found it was full of 
   cash.  Five-dollar bills, twenties, fifties and hundreds- all neatly rubber-banded 
   in labeled piles.  

   My first thought was that he had robbed a bank, says the 41-year-old 
   woman.  There was over $71,000 dollars in that bag - that's more than my 
   husband earns in a year!

   The woman immediately called her husband at the car-dealership where he 
   worked to tell him what she'd discovered.  He came home right away and they 
   drove together to the boy's school and picked him up.  Little did they suspect 
   that where the money came from was more shocking than actually finding it 
   in the closet.

   As it turns out, the boy had been sending out via E-mail on the Internet a type 
   of 'chain-letter' to E-mail addresses that he obtained off of the Internet.  
   Everyday after school for the past 2 months, he had been doing this right on 
   his computer in his bedroom.

   "I just got the E-mail one day and I figured what the heck, I put my name on it 
   like the instructions said and I started sending it out", says the clever 
15-year-old.

   The E-mail letter listed 3 addresses and contained instructions to send three 
   $5 dollar bills to the people on the list, then delete the top address and move 
the other 2 addresses up, and finally to add your name to the bottom of the list. 
   

   The letter goes on to state that you would receive several thousand dollars in 
   $5 dollar bills within 2 weeks if you sent out the letter with your name at the 
   bottom of the 3-address list "I get junk E-mail all the time, and I really didn't 
   think it was going to work", the boy continues.

   Within the first few days of sending out the E-mail, the Post Office Box that 
   his parents had gotten for his video-game magazine subscriptions began 
   to fill up with not magazines, but envelopes containing $5 dollar bills. "About 
   a week later I rode (my bike) down to the post office and my box had 1 
   magazine and about 300 envelopes stuffed in it.  There was a yellow slip 
   that said I had to go up to the (post office) counter - I thought I was in trouble 
   or something (laughs)".  He goes on, "I went up to the counter and they had 
   a whole box of more mail for me. I had to ride back home and empty out my 
   backpack 'cause I couldn't carry it all". 

   Over the next few weeks, the boy continued sending out the E-mail.  "The money 
   just kept coming in and I just kept sorting it and stashing it in the closet, I 
barely 
   had time for my homework".  He had also been riding his bike to several of the 
   area's banks and exchanging the $5 bills for twenties, fifties and hundreds. 
   "I didn't want the banks to get suspicious so I kept riding to different banks with 
   like five thousand at a time in my backpack.   I would usually tell the lady at the 
   bank counter that my dad had sent me in (to exchange the money) and he was 
   outside waiting for me.  One time the lady gave me a really strange look and 
   told me that she wouldn't be able to do it for me and my dad would have to 
   come in and do it, but I just rode to the next bank down the street (laughs)".

   Surprisingly, the boy didn't have any reason to be afraid.  The reporting news 
   team examined and investigated the so-called 'chain-letter' the boy was sending 
   out and found that it wasn't a chain-letter at all. In fact, it was completely 
legal 
   according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, 
   or Title 18, Section 3005 in the US code, also in the code of federal regulations, 
   Volume 16, Sections 255 and 436, which states a product or service must be 
   exchanged for money received.

   Every five-dollar bill that he received contained a little note that read, "Please 
   add me to your mailing list".  This simple note made the letter legal because 
   he was exchanging a service (adding the purchasers name to his mailing list) 
   for a five-dollar fee.  Here is the letter that the 15-year-old was sending out by 
   E-mail, you could do the exact same thing he was doing, simply by following 
   the instructions in the letter.

   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$

   Here are instructions on how to make $10,000 US cash in the next 2 weeks:

   There are 3 addre

MAKE WINDOWS MORE RELIABLE

2000-12-26 Thread info6

Dear Windows User,

Now you can boost the reliability of ordinary Windows 3.x, 95 and 98 to
nearly the level of Windows NT or 2000, Microsoft's professional and 
industrial version of Windows.

The new WinFix 4.3 is a very effective way to improve the reliability of
Windows, because it makes Windows fault-tolerant and self-repairing. And
WinFix is very safe, because it operates completely independent of Windows.

http://www3.quickstockpower.com/comph to find out more about WinFix,
the safest, most effective way to keep you working, by keeping your PC
working non-stop.


Arlen Dixon, CEO

Westwood Software Marketing


* * * * * * * * * * * * * * * * *

This announcement is being sent to PC users who asked to be kept
informed about new developments in Windows(tm) technology.

To be removed from our mailing list, go to the Email-us page


OR

To be removed

mailto:[EMAIL PROTECTED]?Subject=REMOVE






U.S. Draws Attention to Information Warfare Threat

2000-12-26 Thread Nomen Nescio

By REUTERS
 

Filed at 0:56 a.m. ET

WASHINGTON (Reuters) - A year after the Y2K bug, U.S. officials are once again warning 
about perceived dangers to a United States increasingly stitched together by bits and 
bytes of computer code.

This time, a key stated fear is information warfare, or sneak electronic assaults that 
could crash power grids, financial networks, transportation systems and 
telecommunications, among other vital services.

National security aides trace the threat to hostile or potentially hostile governments 
as well as drug lords, criminal cartels and increasingly computer savvy guerrilla 
groups.

Some of these organizations ``are doing reconnaissance today on our networks, mapping 
them, looking for vulnerabilities,'' Richard Clarke, President Clinton's top aide for 
infrastructure protection and counterterrorism, told a Microsoft Corp. digital 
security conference in Redmond, Washington, on Dec. 8.

Cyberblitzes like those that briefly knocked out major Web sites in February -- 
including Yahoo! Inc.'s Internet gateway, eBay Inc.'s auction service and Amazon.com 
Inc.'s retail site -- could easily be copied on a larger scale, said Clarke, a staff 
member of the White House National Security Council.

``Criminals, crackers, foreign governments -- when the new president reads that 
intelligence briefing, he had better move pretty fast,'' he added.

Such warnings are not new from Clarke, who has frequently conjured up a ``digital 
Pearl Harbor,'' a reference to the Japanese surprise attack that threw the United 
States into the Second World War.

But Clarke and other U.S. officials seem to be stepping up a public awareness 
campaign, spurred by the spread of information technology, growing knowledge of 
malicious computer code and ever greater U.S. reliance on networked systems.

CYBERINICIDENT GROUP MEETS

On Dec. 18, the National Security Council held the first meeting of the recently 
formed Cyberincident Steering Group, aimed at fostering cooperation between the 
private sector and government to secure systems from domestic and international 
cyberattack.

``This meeting was an important first step in building computer security programs for 
the nation,'' said Peter Tippett, chief technologist for TruSecure Corp., a leading 
computer security company.

Among topics discussed were the creation of a rapid response system and communications 
between industry and government, said David Perry, the public education director for 
Trend Micro Inc., a maker of anti-virus products, and the co-chairman of the steering 
group.

The U.S. intelligence community voiced its concerns last week with the release of 
``Global Trends 2015,'' a wide-ranging analysis by the CIA, its sister U.S. spy shops 
and outside experts.

The report said foes of a militarily dominant United States, rather than challenging 
it head-on, would seek to target an Achilles' heel in cyberspace or threaten the use 
of the deadliest chemical, nuclear or biological weapons.

``Such asymmetric approaches -- whether undertaken by states or nonstate actors -- 
will become the dominant characteristic of most threats to the U.S. homeland,'' the 
report, released by the National Intelligence Council, said.

Over time, attacks are increasingly likely to be fired off through computer networks 
rather than conventional arms, as ``the skill of U.S. adversaries in employing them'' 
evolves, the assessment said.

FBI FINGERS CHINA

It said many unnamed countries were developing such technologies to complicate what 
the U.S. military refers to as ''power projection'' and to undermine morale at home.

The interagency, FBI-led National Infrastructure Protection Center uses a slide 
depicting China's Great Wall in its standard presentation on cyberthreats, along with 
a quote from Sun Zi, author of a treatise on war in about 350 B.C.

``Subjugating the enemy's army without fighting is the true pinnacle of excellence,'' 
the FBI's slide quotes the ancient Chinese strategist as saying.

In a telltale update, the slide includes a 1999 quote from a Chinese newspaper 
referring to information warfare as a means of achieving strategic victory over a 
militarily superior enemy.






Re: More half-baked social planning ideas

2000-12-26 Thread Bill Stewart

>>> but soon realized it was likely.  Tens of millions of Californians
>>> have *no idea* of the many-armed oil-fed beast that lives in basements..
>>
>>They've never read a story which mentions such a thing?
>
>"Read" ???

Cthulhu.  Gravity-hot-air heating systems.  Steam radiators.

In the basement, no one can hear you scream...


Thanks! 
Bill
Bill Stewart, [EMAIL PROTECTED]
PGP Fingerprint D454 E202 CBC8 40BF  3C85 B884 0ABE 4639





Re: CDR: About Gilmore's letter on IBM&Intel push copyprotection into ordinary disk drives

2000-12-26 Thread sunder

Peter Wayner wrote:
 
> But I was quite worried until I began to see the dangers for IBM and
> Intel in the scheme. This is not an easy play for them because it
> threatens much of the entire industry in these ways:

You've answered it yourself in the last two paragraphs.  Screw IBM, 
screw Intel.  In order for this nonsense to work, the operating system 
has to support it.  You can bet Linux, and *BSD won't support it, or if 
they do, they'll provide the  "extra" access needed.

More and more I find, I need less Microsoft software*.  Even at work where
it's a mostly Microsoft shop and the standard desktop is W2K.

GUID's, CPU Serial numbers, and now hard drives.  That's ok, this will
wind up killing Intel, and hard drive manufacturers that insist on this.
Many like us, won't buy the shit.  We'll buy hardware without serial
numbers, or at least those whose serial numbers can be overwritten.

i.e. SPARC's, Mac's, etc. and we'll be running *BSD/Linux.


* Anecdotal: I've recently purchased a home entertainment
PC as a replacement for my DVD player and CD changers, etc from 
qbex.com.  It's basically a small PC in a very small form factor.

If I ever get my hands on a good Linux based DVD player, I'll use
that.  (I guess I haven't yet been trolling the DivX stuff as I've
had no need for it yet.)

It pisses me off that the DVD player tells me that after five more
plays, it will lock itself to "Region 1" and that while I have both
VGA and RCA+SVIDEO out, that it would refuse to play on any RCA/SVIDEO
hardware that doesn't have Macrovision.   This is insane.

Anyone can build such a Home Entertainment PC as the QBEX simply by
purchasing an infrared keyboard+mouse and a VGA to RCA scan converter
and likely get much better output...  I bought this piece of shit
simply because it already had all the drivers and pieces in one box.

All I have to say is this: you bastards!  

Copyright protection is getting out of hand when it gets in my way.  
I've paid for the DVD's.  
I've paid for the player software.  
I've paid for the hardware.  
How dare they tell me how I may use it so long as I don't make copies other than 
backups?
So what if I buy a perfectly legitimate DVD from a different country?  I should be 
able to watch it without going through acrobatics!  
So what if I back up my legally purchased DVD's to VHS tape so I can watch it 
where I don't have a DVD player, or on my camcorder?  
So what if I can copy the raw bits off the DVD platter for backup incase I scratch
it?  When was the last time you saw a movie house offer to replace
damaged media for nominal cost?  (i.e. you've damaged accidentally, 
or your kid decided to use as a frisbie, or your dog as a chew toy?)
So what if I hook up the VIDEO out signal of the DVD player or PC to a 2GHz
transmitter so I can watch it in my bedroom instead of my living room?
So what if I can have ten friends come over with beer and popcorn to watch
a movie I purchased?
So what if I chose to let a friend borrow my DVD's or if I borrow theirs?


> This is another opportunity for Red Hat or some other Linux box
> company to walk into companies and say, "Use Red Hat, Mozilla, and
> Star Office and you'll never have license problems again. The
> hardware guys claim that they can take care of rights management
> issues for you. So can we and we cost alot less."
> 
> I think this may be the greatest thing that's come along for open
> source OSs yet. As Princess Leia said in the Hollywood content "Star
> Wars", "The harder you squeeze your fingers Vader, the more planets
> slip through the fingers." Do those content wrangling lawyers down
> there ever look at the content they protect?


-- 
--Kaos-Keraunos-Kybernetos---
 + ^ + :Surveillance cameras|Passwords are like underwear. You don't /|\
  \|/  :aren't security.  A |share them, you don't hang them on your/\|/\
<--*-->:camera won't stop a |monitor, or under your keyboard, you   \/|\/
  /|\  :masked killer, but  |don't email them, or put them on a web  \|/
 + v + :will violate privacy|site, and you must change them very often.
[EMAIL PROTECTED] http://www.sunder.net 




Snowhite and the Seven Dwarfs - The REAL story!

2000-12-26 Thread Hahaha

Today, Snowhite was turning 18. The 7 Dwarfs always where very educated and
polite with Snowhite. When they go out work at mornign, they promissed a 
*huge* surprise. Snowhite was anxious. Suddlently, the door open, and the Seven
Dwarfs enter...


 midgets.scr


Antigen found W32/Hybris-B virus

2000-12-26 Thread ANTIGEN_BAMBI

Antigen for Exchange found midgets.scr infected with W32/Hybris-B virus.
The file is currently Deleted.  The message, "CDR: Snowhite and the Seven
Dwarfs - The REAL story!", was
sent from Hahaha  and was discovered in IMC Queues\Inbound
located at Cognex/Natick/BAMBI.





Antigen found W32/Hybris@m virus

2000-12-26 Thread ANTIGEN_EXCHANGE
Title: Antigen found W32/Hybris@m virus





Antigen for Exchange found midgets.scr infected with W32/Hybris@m virus.
The file is currently Deleted.  The message, "Snowhite and the Seven Dwarfs - The REAL story!", was
sent from Hahaha  and was discovered in IMC Queues\Inbound
located at ITC/Corporate/EXCHANGE.





!!!Mortgage Rates DROP! Lenders COMPETE for your Business!!! -ydtt

2000-12-26 Thread paule909





The
Lender's Network
Mortgage
Specialists
We Shop
The Best Loan For You!

The Lenders Network is a 100%
free service which lets you shop for a mortgage conveniently and securely
from the comfort of your home. Using our vast network of lenders across
the U.S., we will search our database of loan programs for the best loans
that fit your needs.  Even if you're currently working with another
lender or have been turned down before, we can still help.
Choose from these types of
loans:
Debt Consolidation, 2nd Mortgage,

Refinance, Credit Repair, or Home Improvment.  We also specialize
in self employed and (fair to poor credit) borrowers. Competitive rates!

Ready to get started? Simply
fill out the form below, and we'll begin shopping for your loan. 
It's that easy!

Free Mortgage 
Quote
Contact Information
(* required 
info)










Name:

*



Address:

*



City:

*



State(US Only):

AKARAZCACOCTDCDEFLGAHIIAIDILINKSKYLAMAMDMEMIMNMOMSMTNCNDNENHNJNMNVNYOHOKORPARISCSDTNUTVAVTWAWIWVWY *



Zip/Postal Code:

*



Home Phone: 

*



Work Phone:

*



Email Address:





Best Time to Call:

Morning
at HomeMorning at WorkAfternoon
at HomeAfternoon at WorkEvening
at HomeLate Evening at 
Home





Do You Own Your Home?

YesNoMobile
Homes DO NOT Qualify



Current Property Value:

*
See
Below For Qualifications



1st Mortgage Owed:

* 



2nd Mortgage Owed:

*



Amount You Wish To Borrow:

*



Interest Rate on Current Mortgage:

*



Monthly Gross Household Income

*



Monthly Debt (excluding current mortgage(s))

*



Credit Rating:

Please
SelectExcellentGoodFairPoor*



Loan Interested In:

Debt
ConsolidationSecond Mortgage (Home 
Equity)Home
ImprovementRefinance*





Email List Removal
Click Here







!! Teenager gets $71,000 XMAS present from the Internet !! [ycbha]

2000-12-26 Thread pcisasbqqx


   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$

Parents of 15 year old find $71,000 in CASH in closet!

   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$


   Does this headline look familiar?  Of course it does.  You most likely have just 
   seen this story recently featured on a major nightly news program (USA).

   His mother was cleaning and putting laundry away when she came across 
   a large brown paper bag that was suspiciously buried beneath some clothes 
   and a skateboard in the back of her son's closet.  Nothing could have prepared 
   her for the shock she got when she opened the bag and found it was full of 
   cash.  Five-dollar bills, twenties, fifties and hundreds- all neatly rubber-banded 
   in labeled piles.  

   My first thought was that he had robbed a bank, says the 41-year-old 
   woman.  There was over $71,000 dollars in that bag - that's more than my 
   husband earns in a year!

   The woman immediately called her husband at the car-dealership where he 
   worked to tell him what she'd discovered.  He came home right away and they 
   drove together to the boy's school and picked him up.  Little did they suspect 
   that where the money came from was more shocking than actually finding it 
   in the closet.

   As it turns out, the boy had been sending out via E-mail on the Internet a type 
   of 'chain-letter' to E-mail addresses that he obtained off of the Internet.  
   Everyday after school for the past 2 months, he had been doing this right on 
   his computer in his bedroom.

   "I just got the E-mail one day and I figured what the heck, I put my name on it 
   like the instructions said and I started sending it out", says the clever 
15-year-old.

   The E-mail letter listed 3 addresses and contained instructions to send three 
   $5 dollar bills to the people on the list, then delete the top address and move 
the other 2 addresses up, and finally to add your name to the bottom of the list. 
   

   The letter goes on to state that you would receive several thousand dollars in 
   $5 dollar bills within 2 weeks if you sent out the letter with your name at the 
   bottom of the 3-address list "I get junk E-mail all the time, and I really didn't 
   think it was going to work", the boy continues.

   Within the first few days of sending out the E-mail, the Post Office Box that 
   his parents had gotten for his video-game magazine subscriptions began 
   to fill up with not magazines, but envelopes containing $5 dollar bills. "About 
   a week later I rode (my bike) down to the post office and my box had 1 
   magazine and about 300 envelopes stuffed in it.  There was a yellow slip 
   that said I had to go up to the (post office) counter - I thought I was in trouble 
   or something (laughs)".  He goes on, "I went up to the counter and they had 
   a whole box of more mail for me. I had to ride back home and empty out my 
   backpack 'cause I couldn't carry it all". 

   Over the next few weeks, the boy continued sending out the E-mail.  "The money 
   just kept coming in and I just kept sorting it and stashing it in the closet, I 
barely 
   had time for my homework".  He had also been riding his bike to several of the 
   area's banks and exchanging the $5 bills for twenties, fifties and hundreds. 
   "I didn't want the banks to get suspicious so I kept riding to different banks with 
   like five thousand at a time in my backpack.   I would usually tell the lady at the 
   bank counter that my dad had sent me in (to exchange the money) and he was 
   outside waiting for me.  One time the lady gave me a really strange look and 
   told me that she wouldn't be able to do it for me and my dad would have to 
   come in and do it, but I just rode to the next bank down the street (laughs)".

   Surprisingly, the boy didn't have any reason to be afraid.  The reporting news 
   team examined and investigated the so-called 'chain-letter' the boy was sending 
   out and found that it wasn't a chain-letter at all. In fact, it was completely 
legal 
   according to US Postal and Lottery Laws, Title 18, Section 1302 and 1341, 
   or Title 18, Section 3005 in the US code, also in the code of federal regulations, 
   Volume 16, Sections 255 and 436, which states a product or service must be 
   exchanged for money received.

   Every five-dollar bill that he received contained a little note that read, "Please 
   add me to your mailing list".  This simple note made the letter legal because 
   he was exchanging a service (adding the purchasers name to his mailing list) 
   for a five-dollar fee.  Here is the letter that the 15-year-old was sending out by 
   E-mail, you could do the exact same thing he was doing, simply by following 
   the instructions in the letter.

   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$   $$$

   Here are instructions on how to make $10,000 US cash in the next 2 weeks:

   There are 3 addre

QUICK, EASY WEIGHT LOSS, GUARANTEED!

2000-12-26 Thread ultratrim2000

*AMAZING MELT AWAY FAT ABSORBER CAPSULES*

LOSE 30 POUNDS  IN 30 DAYS... GUARANTEED!!!

All Natural Weight-Loss Program, Speeds Up The Metabolism Safely
Rated #1 In Both Categories of SAFETY & EFFECTIVENESS In
(THE USA TODAY)

WE'LL HELP YOU GET THINNER IN WINTER!!!
WE'RE GOING TO HELP YOU LOOK GOOD, FEEL GOOD AND TAKE CONTROL IN 2000

*
Receive 1 Free Bottle Of Ultra Trim 2000 & Your Bonus Supply, 
With Every Order Of 2 Or More Bottles. Offer Good Until January 15, 2001! 
*

WE GLADLY SHIP TO ALL FOREIGN COUNTRIES! 

You will be losing by tomorrow!  Don't Wait, visit our web
page below, and join now!

Email Address:   [EMAIL PROTECTED]

Order by 24 Hour Fax!!!  (775) 414-7455 or (937) 276-5567.

*

http://geocities.com/easyslim_2001/

*

This is the easiest, fastest, and most effective way to lose both
pounds and inches permanently!!!  This weight loss program is
designed specifically to "boost" weight-loss efforts by assisting
body metabolism, and helping the body's ability to manage weight.
A powerful, safe, 30 Day Program.  This is one program you won't
feel starved on.  Complete program for one amazing low price!
Program includes: BONUS AMAZING FAT ABSORBER CAPSULES, 30 DAY - WEIGHT
REDUCTION PLAN, PROGRESS REPORT, AND MUCH MORE!!!

SPECIAL BONUS..."FAT ABSORBERS", AS SEEN ON TV
With every order...AMAZING MELT AWAY FAT ABSORBER CAPSULES with
directions (1 Month Supply,  Absolutely Free ) ...With these capsules
you can eat what you enjoy, without the worry of fat in your diet.
2 to 3 capsules 15 minutes before eating or snack, and the fat will be
absorbed and passed through the body without the digestion of fat into
the body. 


You will be losing by tomorrow!  Don't Wait, visit our web
page below, and join now!

Email Address:   [EMAIL PROTECTED]

Order by 24 Hour Fax!!!  (775) 414-7455 or (937) 276-5567.

*

http://geocities.com/easyslim_2001/

*

___1 Month Supply $32.95 plus $3.75 S & H, 100 Amazing MegaTrim
 Capsules.

___2 Month Supply $47.95 plus $3.75 S & H, 200 Amazing MegaTrim
 Capsules.  (A $9.95 Savings, Free Bottle)!

___3 Month Supply $62.95,  Plus $3.75 S & H, 300 Amazing MegaTrim
 Capsules.  (A $19.90 Savings, Free Bottle)!


To Order by postal mail, please send to the below address.
Make payable to MegaTrim.


Ultra Trim 2000
4132 Pompton Ct.
Dayton, Ohio  45405
(937) 567-9807

Order by 24 Hour Fax!!!  (937) 276-5567 or (775) 414-7455.

*
Important Credit Card Information! Please Read Below!
 
* Credit Card Address, City, State and Zip Code, must match
  billing address to be processed. 


CHECK  MONEYORDER  VISA MASTERCARD AmericanExpress___ Debt Card___

Name___
(As it appears on Check or Credit Card)

Address
(As it appears on Check or Credit Card)

___
City,State,Zip(As it appears on Check or Credit Card)

___
Country

___
(Credit Card Number)

Expiration Month_  Year_

*IMPORTANT NOTE*

If Shipping Address Is Different From The Billing Address Above,
Please Fill Out Information Below.


Shipping Name__

Shipping Address___

___
Shipping City,State,Zip
___
Country
___
Email Address & Phone Number(Please Write Neat)