Raining Blessings From Holiness David's Heart


Holiness David Running Eagle Shooting Star

Search This Blog

Everyone is Welcome into the Heart of Holiness David, for he wants to help you with your questions! Nothing is too simple or complicated! Semiconductor World Trainer! He loves computers and he loves you too! Email holinessdavid@alightfromwithin.org

Sunday, February 21, 2010

GMAIL ACCOUNT FRAUD

GMAIL ACCOUNT FRAUD, Relatives BE AWARE, do not give your account information to these people, who have nothing to do but HATE.  Send LOVE to HATE.  VERIFY, that they are in need, because they make others bleed, they need to forgive all in their sleeves (hands given in sin).

NEVER, EVER give ur passwords away!! this is DEFINITELY a scam! they're just trying to steal information from u. never, EVER give passwords, account numbers or anything away. i remember a credit card scam like this going on. it was an elaborate scam. the email looked like a company email. it directed to to a website that even had the company name in it, but it was a scam! they said people had to either verify their personal identity and enter their account number and details into the website, or their credit account would be closed! they got a lot of credit card numbers and charged their accounts for everything they had!
NO BUSINESS EVER EMAILS U EITHER ASKING FOR UR PERSONAL ACCOUNT INFO, OR GIVING U A LINK DIRECTING U TO A WEBSITE TO ENTER ACCOUNT INFO!!! IF U EVER GET AN EMAIL LIKE THIS FROM UR BANK OR CREDIT CARD, OR EVEN UR EMAIL ACCOUNT, CALL THE COMPANY DIRECTLY AND ASK THEM IF THEY ARE DEMANDING ACCOUNT INFO TO BE ENTERED. EVEN IF THEY DO SAY THERE IS SUCH A THING, THE EMAIL U GOT COULD STILL BE A SCAM DIRECTING U TO A FALSE WEBSITE. NEVER, EVER EVEN GO TO THESE LINKS!! always just call the company and ask to speak to someone in charge. they will always tell u too, never give ur personal info away! they dont use email to do things like this!  22 days ago by   heatherbirdlady
http://www.complaintsboard.com/complaints/gmail-scam-c305178.html


Fraud begins: On Sun, Feb 21, 2010 at 9:58 AM, Gmail account-support@gmailservicess.com; wrote:


Dear Valued Member,



We are shutting down some email accounts and your account was automatically chosen to be deleted. If you are still interested in using our email service please fill in the space below for verification purpose by clicking the reply button. Learn more


Account:
Password:
Birth date:
Country:


Warning!!! Account owner that refuses to update his or her account within Seven days of receiving this warning will lose his or her account permanently.
Thank you for using Gmail !
The Gmail Team
GMAIL Fraud ends!

from    Twin Deer Mother
reply-to    TwinDeerMother@whitebuffalocalfwoman.org
to    Gmail ,
account-support@gmailservicess.com,
accounts@google.com
date    Sun, Feb 21, 2010 at 9:09 PM
subject    Re: Account Verification
mailed-by    gmail.com




Spammers beware, what you dish out, comes back to you!

White Buffalo Calf Woman Sings! Blessings to your heart, won't you come on in?  There is a place in paradise, when you listen to the within.  Don't find forgiveness in your heart, then find the time to pray, then you will know that God is here to alleviate your pain!

Mail Delivery Subsystem



Delivery to the following recipient failed permanently:

    accounts@google.com

Technical details of permanent failure:
Google tried to deliver your message, but it was rejected by the recipient domain. We recommend contacting the other email provider for further information about the cause of this error. The error that the other server returned was: 550 550 5.2.1 <accounts@google.com>... Mailbox disabled for this recipient (state 14).

Scam Gmail Verification Email is Identity Theft Effort in Disguise

Summary: A Gmail confirmation scam email is going around, asking you to verify your Gmail account. "Dear Account User," the request starts out - and goes on to say that you need to confirm your Gmail account, or it will be closed down. Of course, the language is wrong, and it wasn't even necessarily sent to your Gmail account, but still, people will be taken in by this scam, which asks for your account username and password, your date of birth, and your country of residence. Here's the scam reproduced in full - if you get this, don't reply!
Most Recent Searches that Led to This Page: gmail account verification, gmail scam, gmail verification email, gmail scams, Account Verification gmail, gmail verification, gmail verification scam, gmail account verification email, (kayt23401@gmail com), kayt23401@gmail com


GMail, AOL, Yahoo Mail also targeted in phishing scamGmail, AOL, Yahoo Mail also targeted in phishing scam

Google confirms problem is "industry-wide"

Google has confirmed that a large number of passwords to its email accounts have been stolen in an "industry-wide phishing scheme" which affects Hotmail, Gmail, Yahoo Mail, AOL and a number of other service providers.

Following the news that 10,000 Hotmail passwords had been posted on the Web, a second list surfaced - this time containing 20,000 account details from a string of different account providers. Some of the accounts are old, unused and fake, but many are genuine according to the BBC.

Google said: "We recently became aware of an industry-wide phishing scheme through which hackers gained user credentials for web-based mail accounts including Gmail accounts. "As soon as we learned of the attack, we forced password resets on the affected accounts. We will continue to force password resets on additional accounts when we become aware of them".

The company added that the password issue wasn't a breach of its security, it was instead a scam where users have been tricked into giving up their passwords on what they thought were legitimate sites. These types of attacks are known as "phishing".

Security experts have recommended that if users suspect they might be affected then they should immediately change their passwords, as well as on any other sites that share the same password.

Scams and fraud involving Gmail addresses

Print
If your credit card was used without your authorization, we recommend contacting your local authorities, your credit card company, and any website where the credit card was used.
If you have observed or been the victim of illicit activity on a non-Google website (i.e. Craigslist, Ebay, Paypal, and other sites), you'll need to contact your local authorities and the specific website that was involved.
In either case, you may also wish to file a report with the Internet Crime Complaint Center (www.ic3.gov), a partnership between the Federal Bureau of Investigation and the National White Collar Crime Center. Unfortunately, Gmail is unable to participate in mediations involving third parties, or track suspicious credit card activity.
If you wish to inquire about a Gmail user's involvement in a scam or identity theft case, please note that in accordance with state and federal law, it is Google's policy only to provide this information pursuant to a valid third party subpoena or other appropriate legal process.
http://mail.google.com/support/bin/answer.py?hl=en&answer=62401

Remember that you can perform a reverse DNS lookup of the email's origin (http://www.ip2location.com/emailtracer.aspx)

Report fraud to EBAYto spoof@e-Bay.com

Warriors of the Earth  
 

Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Friday, February 12, 2010

Spybot Search and Destroy and Tea Timer Installation


Overview
This is a short tutorial to show you the first steps you have to do to remove spyware and other kinds of malware from your computer, using Spybot-Search and Destroy.

1. Download
Obviously, the first thing you need to do is download Spybot-Search and Destroy from our download page.
The download page first gives you a bit of donation information; if you like the program, I encourage you to come back later and donate something. But right now, you want to download. The downloads are on the same page, just scroll down a few lines and click Spybot-Search and Destroy 1.6.2. On the next page you will see a table with four download locations. Clicking on one of them will lead you to a page offering the download. Each of these pages is a bit different, but you should be able to find the download link there without problems.
2. Installation
The file you have downloaded will be named spybotsd162.exe or similar. To install Spybot-Search and Destroy, all you have to do is run the file, and the installation program will start (if you have downloaded with Internet Explorer, the download dialog will give you the option to open the file directly). The installer will show you the license and ask you for the installation location. You can go with the default settings here and just click your way through the installer by using the Next button.

After the installation has finished, you will see a Spybot-Search and Destroy button on your desktop and in your start menu. Click on it to start Spybot-Search and Destroy the first time.

3. First run
The first time you start Spybot-Search and Destroy, it will display a Wizard, a small window helping you through the first steps. It gives you the possibility to add or remove the icons you have or haven't created during install, for example. Let's just say you want them and proceed to the next page.
If you are using a proxy in Internet Explorer, Spybot-Search and Destroy will show you this proxy and a button will give you the opportunity to use it for Spybot-Search and Destroy, too. If the text field is blank, you don't need to do it, but in most cases this will show an internet address, and you should import this proxy setting.

The next page deals with updates. It is very important to keep up-to-date. Using the two buttons this page offers will do the updates for you, if you want to do it at a later point, read this.
The last page of the wizard will ask you to read the help file. The help file is always a good resource if you are unsure what to do, so please do at least read the first pages of it.

4. Doing a scan
After the tutorial has finished, you may find yourself on the Settings or Update page. As the default settings are ok right now, and you've already updated, let's ignore them for now and do the first scan.
The left side of the program has a navigation bar that can lead you to all functions of the program. The first section there (the top-most button) is labeled Spybot-Search and Destroy and leads you to the main page. Right now, you will see only an empty list and a toolbar at the bottom. The first button in this toolbar is named Check for problems - that is the button you've got to press to start the scanning. Lean back and watch the scan progress.

5. Interpreting the results
At this point, you could just jump to point 7, and remove the results. Instead we recommend that you first have a look at what all the stuff is that Spybot-Search and Destroy detected. The first thing you should know is to distinguish between the red entries, which represent spyware and similar threats, and the green entries, which are usage tracks.

For the usage tracks (I hope you have followed that link to read what they are), removal is non-critical, but depends on your personal preferences.

Ignoring the usage tracks for now, you should have a look at the red entries which represent the real threats. While you of course can trust us that we have chosen the targets using strict criteria, you can check for yourself if you click on each product and read the product information that will be shown in a pop-up window.

6. Decision on exceptions
All problems displayed in red are regarded as real threats and should be dealt with. But while you read the product description, you may still decide to keep a threat, or just a usage track. Maybe you don't want your list of most recently used Word documents removed? At this point you have three options.
  • You could decide on ignoring all usage tracks. In that case you could open the File sets page on the Settings section of the program, and disable the Usage tracks entries.
  • Or if you want to just keep all tracks from a specific product, just right-click a product in the results list.
  • Finally, if you want to keep just one file, that is possible the same way.
7. Removing the threats found
So now you should know about everything you've found. It's time to use the Fix selected problems button.
Once you start thinking about removing the usage tracks, too, you may think that ticking all the green entries is hard work. This is for a simple reason - to force you, the newbie - to look at the results. Once you know what you are dealing with, there is a hidden Select all button available for you.

8. Resident
If you use Spybot-Search and Destroy's realtime protection against spyware, nasty spies will not enter your system. Currently there are three different kinds of protection.
The Immunize function prevents e.g. Tracking Cookies from entering your system. Immunize works with Mozilla Firefox, Internet Explorer and Opera, allowing you to adjust specific settings of the browser to block known spyware installers, (and similar baddies) already included in Spybot-S&D's database. You start the Immunize function by clicking on Spybot-Search and DestroyImmunize on the left navigation bar.

Resident SDHelper is a second layer of protection for IE. Immunize function blocks installers by their ActiveX ID, while SDHelper blocks badware that tries to enter using a different method. Thus Internet Explorer cannot download bad files. You start SDHelper by clicking on ToolsResident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "SDHelper" (Internet Explorer bad download blocker) active in order to activate SDHelper.

Resident TeaTimer prevents unwanted files from being installed – no matter how – on your system. It monitors the processes called/initiated perpetually. If known malicious processes want to start, TeaTimer immediately terminates them, giving you three options how to deal with this process in the future:
  • be informed when the process tries to start again
  • automatically kill the process
  • generally allow the process to run
There is also an option to delete the file associated with this process. If something tries to change critical registry keys, TeaTimer will detect it. TeaTimer can protect you against such changes by giving you an option: You can either Allow or Deny the change. TeaTimer is always running in the background.
Since Spybot-Search and Destroy 1.6 the TeaTimer uses our database where known files are rated as good or dangerous. This database contains several hundreds of thousands entries and is enlarged continuously. Nonetheless now and then there are files which are not contained yet. In these cases and if you use older Spybot versions Resident TeaTimer will ask your permission for every change. If you are not sure if you should allow the change, there is a simple rule of thumb:

If you have been installing something and/or if you judge the file that is going to be installed as good because you know its name, you can proceed by allowing the registry change (same thing if you or Spybot-Search and Destroy were deleting an application). But if the message comes out of the blue sky while you were surfing the web, you should get cautious. In this case it is better to deny the registry change.

You start Resident TeaTimer by clicking on ToolsResident on the left navigation bar (therefore Spybot-Search and Destroy has to run in Advanced Mode). There you can tick the checkboxes next to Resident "TeaTimer" (Protection of over-all system settings) active in order to activate TeaTimer.
Of course it is possible to revise each of your personal decisions. That could be necessary if you have denied some process which turns out as a good one later. You do so by right clicking on the TeaTimer symbol in the system tray - it is the blue one with the lock. (If you cannot see the symbol, it is probably hidden. Just click on the arrows in the system tray to show all hidden symbols.) A window appears where you have to click on Settings to modify your personal lists of registry changes and processes.
Overview
How to make a backup
How to disable Spybot-S&D temporarily
How to download Spybot-S&D
How to exclude products from the search
How to disable the proxy
How to make a recovery
How to enable the Select all button
How to export the Startup list
How to switch the language
How to uninstall
How to update

http://www.safer-networking.org/lv/tutorial/index.html


Download Page: http://www.safer-networking.org/en/download/index.html
Download Spybot-Search and Destroy from a mirror hosted by Safer-Networking
To avoid confusion often caused by download sites full of advertisements, we provide this service that is dependent upon donations. If you did not already send your donation, please give it a second thought.

Download Spybot - Search & Destroy©® 1.6.2 (15.6 MB)

md5: 54ACBA9CFD7154C02CEACF6310CF3CFA
x
Donate

NP. I like Spybot alot and want to see it grow. You can contribute to its success by sending threats you think it does not detect. Send the file in a zipped folder to: detections@spybot.info

Solution to fix the pop-ups in Spybot's TeaTimer

This fix is from Safer-Networking Ltd.

This is a provisory solution to fix the problem the bug in the pop-ups checkbox buttons

1.- Download "ResHacker" from here

2.- Deactivate the TeaTimer

Go into Spybot > Mode > Advanced Mode > Tools > Resident.
Uncheck the following: Resident "TeaTimer" (Protection of over-all system settings)

3.- Used "ResHacker" to open TeaTimer.exe (Should be in C:\Program Files\Spybot
- Spybot-Search and Destroy).

4.- Press Ctrl+F and searched for the word: decision

You will see this code:
Code:
object cbRemember: TCheckBox
Left = 8
Top = 160
Width = 339
Height = 17
Anchors = [akLeft, akTop, akRight]
Caption = '&Remember this decision.'
TabOrder = 2
end
 5.- Change the value "Top" from 160 to 190

6.- Press in "Compile Script" and File > Save

7.- Close the "Resource Hacker" and activate the TeaTimer again

This is the final result:

More information of this bug on Safer-Netowrking's Site:
http://www.safer-networking.org/en/news/2005-06-22.html

url:http://www.techsupportforum.com/networking-forum/security-firewalls/101314-solution-fix-pop-ups-spybots-teatimer.html

~~~~~~~~~~~~~~~~~~~
Angel Services around the world!
Client Security Solutions gifted by 
A Joy Light From Within .Org

Computer Weekly Telephone Free Access
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number:     1-218-895-3911
Your Conference Passcode:     62013#



If you have any problems, please don't hesitate contacting me at holinessdavid@alightfromwithin.org
Cheers and Blessings, Holiness David Elder Lavender person alightfromwithin.org Rainbow Warriors of Prophecy



Warriors of the Earth  

  
Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.

Beware of Fraud: Be Careful of What You Click On!

Hello relatives,
I was reading my eWeek magazine and the editor was writing to remind readers that we all make mistakes regardless of how much experience we have with computers.  Name of the article, "Do the right thing."

An example in phishing was an email she received from the "IRS" letting her know that the 1040 tax form had been updated.  All she had to do was click on this link.  The email looked very official and being at the right time when everyone is filing returns, it offered a simple way to get a form that a great many taxpayers use.  She didn't click on the link and I hope that if you get such an email that you don't either.  If you want the latest IRS forms, go to http://www.irs.gov/formspubs/index.html


Here's another one:  a chain-mail email was sent to see if  people still think that they will get money by forwarding email to a friend, forwarded to a friend, forwarded to a friend, etc.  It's hard to believe that some folks are still falling for that sort of stuff.  Well, they are just going to have to sit there and wait for their checks.


Thirdly, if a virus is reported on your computer and your computer acts strangely then it is possible that the virus was not cleaned out properly.  One of the writers at eWeek had a problem when he installed an updated version of an anti-virus program.  The anti-virus program detected a trojan virus, but it didn't remove the part of the infection that gave the command to launch the trojan upon startup.  Note: the trojan infection puts commands in the Windows registry that will restart a removed virus.  The next day when restarting his computer he got an error stating that a file wasn't able to load.  After some careful thought, he remembered the trojan.  The missing file was part of the complex trojan virus.  If he had reloaded that missing file, he would have re-infected the computer.  So, even experienced computer users have challenges from malware.


Summary: Don't click on anything that sounds too good to be true.  It could be that it isn't true. Don't click until you read it, give it some thought, and give it some more thought.  Maybe then you'll decide not to click in it.  If you like, you can call me and we'll go through it together.


Angel Services around the world!
Client Security Solutions gifted by 
A Joy Light From Within .Org

Computer Weekly Telephone Free Access
Elders for Assistance Available by Telephone
Sun 5:30 pm PST Arrive between 5:30 to 6:00pm PST
Your Conference Access Number:     1-218-895-3911
Your Conference Passcode:     62013#

If you have any problems, please don't hesitate contacting me at holinessdavid@alightfromwithin.org

Cheers and Blessings,
Holiness David
Elder Lavender person
alightfromwithin.org Rainbow Warriors of Prophecy




Warriors of the Earth  

  
Welcome to the home of love, where your computer gets to know of hugs. Take the time to give it love, to ensure the spine stands, on the test of time (until you update protection files again). For only you can operate the golden rule, do unto your computer, who knows who to fool. But we do outwit the slyest fox, when we give love instead of gloves (put them up, combative forces). The greatest part of protection is clear, the smooth operation of moving in space is dear (world wide web). Protect my computer God above to bring the Angels down below. Bless and bless the common place, to be rest assured that all is grace.