Southern Appalachian Digital Collections

Western Carolina University (21) View all

Western Carolinian Volume 68 Number 05

items 12 of 28 items
  • hl_westerncarolinian_2003-10-28_vol68_no05_12.jpg
Item
?

Item’s are ‘child’ level descriptions to ‘parent’ objects, (e.g. one page of a whole book).

  • åxp You've Got Deceit: E-Mail Scams Grow By Don Oldenburg I The Washington Post Special to WCnewsmagazine Beware of a rash of e-mail scams lately that can stop cold the spam- deleting duties of even the smart consumer—momentarily at least. One arrived here last week with a subject line typical of this spam scam genre: "Your credit card has been charged $234.65." Gulp! So you open that e-mail and read a brief, poorly written message that says because you are either "a child-pornography webmaster or deal with dirty money," your funds are being deducted to pay for money-laundering services. At the bottom, there are blanks for your credit card number and expiration date—and then a "no" button if the e-mail is a mistake, or a "yes" button to confirm the transaction. Puh-leeze! Even if you're convinced someone thinks you're a porno king, there's never a good reason to key in your credit card number in response to an unsolicited e-mail. This is nothing more than a thinly veiled criminal scam. A more convincing e-mail scheme landed in the in-box of Fairfax County, Va. resident Mert Griffin last week. The subject line was an order confirmation number. "l thought, 'What the heck is this? I didn't order anything!"' says Griffin, who then worried that maybe her kids did. When she opened the e-mail, it said her America Online account had been billed $90 for an order of long-stem roses from 1-800-flowers.com. Along with a realistic itemized invoice, it provided a hyperlink button to click "if this order was unauthorized." Griffin clicked it and got a Web site purporting to be 1-800-flowers.com. But instead of proceeding, she called the company. The customer rep told her this was a scam that's going around and that most likely every e-mail contact in her AOL address book would soon get the same spam. "It's a hoax targeting AOL members that falsely claims to be sent by us. Obviously, or not, it is not sent by us or anyone on our behalf," says 1-800- flowers.com spokesman Ken Young. According to Young, the scam tries to get AOL members' screen names and passwords at a counterfeit 1-800-flowers.com Web site. "We never ask for anything like that on our site," he says, adding that 1-800-flowers.com and AOL are working together to snuff this scam. In the past, scams like this have tried to pry loose screen names and passwords or credit card numbers for identity fraud, or even to bamboozle millions of recipients into flaming a corporate site after thinking it had sent them an incorrect invoice. "A lot of people out there scoff at these, but don't forget there are tens of thousands of people and more who come online everyday for the first time," says AOL spokesman Nicholas Graham. "Our one golden rule is that AOL will never ask our members for their password or billing information, period, end of story," he says, adding that AOL often repeats that warning to members. "If you get an e-mail out of the blue, and it purports to be from AOL and asks for your password and billing information, you know it's a scam." What to do? Graham says you should report the scam to your Internet service provider so it can shut down the crooks; then delete the e-mail. He warns that AOL has received about 1 ,000 reports about the 1-800-flowers.com scam, which is still out there circulating. "It's a constant cat-and-mouse game," he says, "and we just have to be smarter cats all the time." 02003 WASHINGTON POST STUDENT LIFE TECHNOLOGY DOUNAR ON COMPUTERS By Lou Dolinar l, Newsday - Special to WCnewsmagazine Windows XP is like the guy in the maze who drops cookie crumbs behind him to remember his path. Only in Windows, anyone can follow your trail to learn where you've been and what you were doing. This isn't a bug, it is a feature. True, it is genuinely useful to have a list of the Web sites you've typed into the Internet Explorer address bar. Why, you don't have to retype www.newsday.com the next time you visit! So, with everyone from hackers, to direct marketers to the Recording Industry Association of America spying on your computer, I thought this might be an appropriate time to show you some simple techniques for spying on other people's computer use. I mean, why should the bad guys have all the fun? In the course of doing so, you'll also learn how to hide traces of where you've been. The best stuff is in the Internet Explorer cache, namely entire pages and pictures that you've viewed once, and that are then held for quick reference on second viewing. Click on IE's Tools/lnternet Options/General. Under Temporary Internet Files, click on the Settings button. In the next window, View Files will let you look at the contents of the cache, as well as cookies that remote sites have installed on your computer. Cookies are quite helpful to the incipient snoop in that they also list URLs you've visited. How do you get rid of this stuff? Back up a screen (nice of Microsoft to make it easier to cover your tracks than to follow them). Click on "Delete Files." Up comes a little box that prompts you to "Delete all offline content." Check the box and it should clear your computer. I've noticed Explorer typically freezes at this point, and the only workaround I've come up with is to click forward again to settings and move the slider control for cache size to 1 MB. Then try deleting again. Cookies are great. True, they show where you've been. But cookies also do useful things like remember log-on and password information. When you wipe 'em out (Tools/lnternet Options/Delete Cookies) just be sure you haven't forgotten any obscure passwords or logons that had been saved. I always manage to lose at least one, so I only kill off my cookies once a month. Apart from convenience, cookie management is one of the main reasons to buy a privacy management program — most let your deletion exempt cookies that are storing log-on information for particular sites. This assumes, of course, that you're not worried about someone using your computer to automatically log on. You can usually figure out where someone's been for the past few weeks by looking at the History panel of the Explorer Bar. (View/Explorer Bar/History) On the Internet Options screen, click "Clear History" to wipe that out; you'll also clear the drop down address bar menu of visited sites. The Start menu for Windows XP gives us a fair amount of information as well. Besides listing the most recently used programs, it gives the name of the files that have been opened. Right-click on the Start button, select Properties and then Customize to the Customize Start Menu panel. Under the General tab, click on "Clear List" to empty the list of programs. You also can set an option here that prevents any such list from accumulating. There are similar options under "Advanced" for clearing the list of most recently opened documents and blocking new lists. Most Windows programs, like Windows itself, keep track of what you've been doing with them. The Windows Media Player, for example, keeps a helpful list of recent video and audio tracks in the File menu. To get rid of this list, click on Tools/Options/Privacy. Deselect Save File and URL History, then click on "Clear History" and "Clear CD/DVD." Other programs have similar options. When you're done, empty the Recycle Bin. True, experienced snoops like me know how to retrieve shredded documents, but don't worry, we're not going to tell anyone this week. The cleanup operations I've described will take 15 minutes or so, and you have only gotten rid of the most grossly obvious stuff. You could spend another 15 minutes on more obscure trails, for example, saved search terms. But if you're really that concerned, you probably want to invest in some software. Cheapskates might want to take a look at Evidence Wiper. It offers basic functionality for automating cleanup of all major trails in Windows, but it doesn't let you save selected cookies that contain log-on information. The software is free, but it includes pop-up advertising, and the release you sign when you download it gives Operations Systems, its author, some rights to monitor your Internet usage. Read the contract carefully before you install the software. Funny thing, I haven't seen any pop ups/adware/spyware, etc. since I installed it, but then again I run Ad Aware (www.lavasoftusa.com) and Spybot Search and Destroy (www .safer- networking.org) every few days. If you want to spend a few bucks on your habits, the oldest and most popular privacy manager, Webroot Window Washer 5.0, will set you back $39.95 after the trial period expires. Besides managing cookies, Window Washer also has an extensive stable of plug-ins for programs, like Word, that save the names of past files they've processed. It also "shreds" deleted files by overwriting them, thus preventing some clever person with a disk editor from reconstructing them. @ 2003 Distributed by -the Los Angeles Times-Washington Post News Service
Object
?

Object’s are ‘parent’ level descriptions to ‘children’ items, (e.g. a book with pages).