|
|
Computer Tips that Help Small Businesses Operate Profitably
When working properly, computers enable small businesses to make big business profits; however, get booted off your computer and you’re suddenly starving. In most instances, computers usually act up due to lack of care by its owners. Here are...
Life in Cyberspace
Two disparaging claims often made about the online world are that it is inhibited with nerds who don't have a life and that 30 years old woman you met and liked is actually a 13 year old boy. Both have a basis in fact. Some pioneering message-board...
Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking
Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network security consultant, I travel quite frequently. At times, it seems like the airport is my second home. I actually like to fly, it's a moment in time...
Spyware: What It Is and How to Combat It
Spyware is software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.
Spyware can be broken down into two different categories,...
Wireless Jargon / Glossary
Wireless networking, like so many things in life -- and
especially the ones that have anything to do with computers --
is filled with jargon. Hi-tech babble baffles many Don't be
intimidated, though: here's a quick computer-speak to...
|
|
|
|
|
|
|
|
Fraud not taken seriously
How seriously are we taking Internet/Credit Card Fraud?
Not very, says James Tall of Tall Networking, a computer consultant to small businesses. A client was recently sucked into a fraud scam and reports some very serious obstacles trying to fix the problems created.
“I consider myself extremely tech savvy, but there was enough plausibility to get me hooked,” said Tall. The client found a job posting on one of the best known internet job posting sites, Monster.com, looking for someone to handle money transfers for internet software purchases to an East European company.
After submitting an application to a professional looking website he was selected and a purchase was made with the proceeds going to his Paypal account. “The last two emails I got from the company were from anonymous email companies and I got suspicious. I called the person who supposedly made the purchase” the client said. They reported they knew nothing about an internet purchase or the software company involved and he suggested they contact their credit card companies and credit bureaus.
Tall said, “That’s when I started making phone calls and found that there was no one to call.” The local police suggested a call to the FBI, where the local office was closed and the office in the state Capital had an impatient receptionist who suggested an email to the National White Collar Crime Center (www.nw3c.com or www.ifccfbi.gov ). The NW3C web site states they have no investigative authority. The state Attorney General’s office had no answer. The US Secret Service said to call the FBI.
Three weeks later, Paypal has reversed the payment, but neither they nor NW3C made any direct contact to discuss what went on.
Tall said, “At the time this happened, I felt some immediacy in the need to speak with an investigator. Monster must have garnered them hundreds or thousands of applications and many methods could have been used to try and track down the perpetrators.” He thinks that opportunity has been wasted and still doesn’t know if anyone has taken his concerns seriously.
With website
hosting becoming more inexpensive and site creation tools becoming easier to use, scam artists are able to put up a web of professional looking sites. No longer can we look at a site and say, “Yeah, that’s a real company.”
These are serious crimes and need to be treated as such. A web site with vagaries about who will get the email and who can or can’t investigate them is not enough.
1.Congress needs to make someone accountable. Whether it’s the treasury department, FBI, or Homeland Security there has to be a manned number to call or email with fast response from people empowered to investigate. 2.Publicize a checklist of what to do, who to call and send this list to all law enforcement agencies. And not just for victims, for people who think they’ve been recruited to help in the scam as well. In the event of credit card fraud, the card company will want a police report. Local police departments are the front line and should be able to tell people what to do, have a procedure to follow. 3.Use free resources. Internet users want to protect their web. Communicate with them about what to watch for and many of these scams will get stopped early. 4.This is large scale. Check with a local employer to see what kind of response they get for an ad on Monster. A local posting for a job in Albany recently got over 300 resumes, imagine what a national ad for work-at-home jobs must get. Victims working together in a coordinated effort should make flushing out scam artists easier. 5.Speed is of the essence. Scam artists hit and run. The closer to the hit, the better chances you’ll have of getting them.
It is time to take this seriously; lets investigate and stop these criminals.
Tall Networking provides computer consulting, network administration and setup, computer repair and upgrade. See my web page for more details at www.tallnetworking.com.
About the Author
Tall Networking provides computer software consulting, network administration and setup, computer repair and upgrade. See my web page for more details at www.tallnetworking.com.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|