|
|
Keeping your pc healthy at little or no cost
Protect Your PC
Having problems with your pc?
Do your kids, family or friends fill it with all the stuff they find on the internet?
Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You...
Protect Your System From The Internet Evils
Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was...
THE "MISSING LINK" OF THE INTERNET
Networking is a powerful tool. Just to be clear, we are NOT talking about running miles of cable from one computer to the next and we are NOT talking about recruiting people for a business opportunity. What we ARE talking about is recognizing,...
When trade and community freedom starts to cost, click on!
Ecommerce is the product, and 'dotcom' greed, the waste; and in it's wake is strewn a vibrant internet community, oozing a strong passionate flow of community and trade presence. Fear from the dotcom 'crash', due to over priced and underachieving...
WILIBOX launches embedded Linux wireless platform with industry's first 802.11 stack supporting Access Point and Client modes simultaneously
Kaunas, Lithuania - October 17, 2005 - WILIBOX, embedded Linux and IEEE 802.11 specialists released innovative embedded Linux software platform - WILI including industry's first 802.11 stack supporting multiple BSSID (Virtual AP) and multiple...
|
|
|
|
|
|
|
|
Fraud not taken seriously
How seriously are we taking Internet/Credit Card Fraud?
Not very, says James Tall of Tall Networking, a computer consultant to small businesses. A client was recently sucked into a fraud scam and reports some very serious obstacles trying to fix the problems created.
“I consider myself extremely tech savvy, but there was enough plausibility to get me hooked,” said Tall. The client found a job posting on one of the best known internet job posting sites, Monster.com, looking for someone to handle money transfers for internet software purchases to an East European company.
After submitting an application to a professional looking website he was selected and a purchase was made with the proceeds going to his Paypal account. “The last two emails I got from the company were from anonymous email companies and I got suspicious. I called the person who supposedly made the purchase” the client said. They reported they knew nothing about an internet purchase or the software company involved and he suggested they contact their credit card companies and credit bureaus.
Tall said, “That’s when I started making phone calls and found that there was no one to call.” The local police suggested a call to the FBI, where the local office was closed and the office in the state Capital had an impatient receptionist who suggested an email to the National White Collar Crime Center (www.nw3c.com or www.ifccfbi.gov ). The NW3C web site states they have no investigative authority. The state Attorney General’s office had no answer. The US Secret Service said to call the FBI.
Three weeks later, Paypal has reversed the payment, but neither they nor NW3C made any direct contact to discuss what went on.
Tall said, “At the time this happened, I felt some immediacy in the need to speak with an investigator. Monster must have garnered them hundreds or thousands of applications and many methods could have been used to try and track down the perpetrators.” He thinks that opportunity has been wasted and still doesn’t know if anyone has taken his concerns seriously.
With website
hosting becoming more inexpensive and site creation tools becoming easier to use, scam artists are able to put up a web of professional looking sites. No longer can we look at a site and say, “Yeah, that’s a real company.”
These are serious crimes and need to be treated as such. A web site with vagaries about who will get the email and who can or can’t investigate them is not enough.
1.Congress needs to make someone accountable. Whether it’s the treasury department, FBI, or Homeland Security there has to be a manned number to call or email with fast response from people empowered to investigate. 2.Publicize a checklist of what to do, who to call and send this list to all law enforcement agencies. And not just for victims, for people who think they’ve been recruited to help in the scam as well. In the event of credit card fraud, the card company will want a police report. Local police departments are the front line and should be able to tell people what to do, have a procedure to follow. 3.Use free resources. Internet users want to protect their web. Communicate with them about what to watch for and many of these scams will get stopped early. 4.This is large scale. Check with a local employer to see what kind of response they get for an ad on Monster. A local posting for a job in Albany recently got over 300 resumes, imagine what a national ad for work-at-home jobs must get. Victims working together in a coordinated effort should make flushing out scam artists easier. 5.Speed is of the essence. Scam artists hit and run. The closer to the hit, the better chances you’ll have of getting them.
It is time to take this seriously; lets investigate and stop these criminals.
Tall Networking provides computer consulting, network administration and setup, computer repair and upgrade. See my web page for more details at www.tallnetworking.com.
About the Author
Tall Networking provides computer software consulting, network administration and setup, computer repair and upgrade. See my web page for more details at www.tallnetworking.com.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|