Send Anonymous Email | Stealth Internet Rotating Header Image

February 6th, 2009:

Obama– A Self-confessed Addict?

During his campaign for presidency, President Barack Obama showed signs of addiction. Yes, he even admitted it himself and there were actually various witnesses to prove that his addiction is real. According to some reports, Obama was often seen during his campaign thumbing his addiction, his BlackBerry mobile email phone.

Is Obama’s addiction trivial

The issue on whether President Obama should keep or give up his mobile email phone addiction is not trivial as some may think. In the past and until today, emails are actually used to commit serious crimes. For instance, an email can be hacked by cyber crime organizations to obtain important information that would enable them to commit more serious crimes. In the case of President Obama, the danger is doubled because his BlackBerry phone has a built-in GPS technology that can be used to trace his location within a short distance.

Obama to bring the object of his addiction to the White House

Because email is viewed with a skeptical eye in the White House, former presidents gave up using emails during their administrations. Former President Clinton, for instance, sent only two emails during his term and Bush gave up emails as well. Just recently, however, it was announced that Obama would be allowed to bring his addiction to the White House. This announcement made him the first US president to use email regularly. But to ensure the safety of information and of the president himself, a special security software would be installed on his BlackBerry mobile email phone.

Plain is Safe

There are countless cases of Internet scams committed everyday. Lots of people suffer from financial losses just because of some minor carelessness in conducting transactions online. As netbots become more sophisticated, it is now easier for cyber crime organizations to access information from government, financial, and academic institutions. However, institutions are not the only ones who can be the target of cyber crime. You can also be a potential victim. However, there are various ways by which you can avoid becoming the next victim of email spoofs and other finance-related cyber crimes.

Why use plain text

One of the ways to combat unauthorized access of your messages and files is by reading your emails in plain text. Many people are seduced by the HTML-rendered file because of its attractive features; there are colored fonts and images in HTML-rendered emails. However, it is not secure to read emails in HTML format because it can hide images and links that could aid hackers to obtain the information from the emails. This can also help spammers find their new victims. However, if you use plain text, you don’t have to worry about hidden links and images because the plain text format will show everything. The plain text format does not support active content; some types of active content can actually harm your system by allowing harmful files to be downloaded automatically.

Plain text email messages are easy to compose, send, and receive. No plain text email has ever been found to contain viruses or cause any problems when being accessed.

Email Time Capsules

Do you want to send yourself or your friend a message which would reach you 6 or more years from now? You may not believe it but there are actually lots of sites that offer to freeze your message somewhere in time and deliver it during your intended date, which could be many years from now.

Finding companies that offer email time capsules

Finding an email time capsule is easy because there are various sites online that offer to send your message in the future. In some sites, you have to pay for the service. However, there are also lots of sites that offer their services for free. The FutureMe, for instance, offer this kind of service. In this email time capsule, you are given the option to send your email as a private or anonymously public one. Another example is the FutureMail. This allows you to send yourself notes and reminders in the future. Unlike FutureMe, FutureMail requires you to register first before you can access their services. You can also try MyLastEmail. This offers services to deliver your notes and messages to your family once you have passed away. This email time capsule does not charge for initial services. However, succeeding services are charged.

Tips before you send your email to the future

It is important to consider some things before you send your email to the future. You have to take into account the guarantee that the site gives to ensure that your message will be delivered. It is also important that you make sure that if you hand over your email address to the site, it will not be used for spamming and other forms of cyber crime.

CNN Spoofed

Israeli-Palestinian malware

As the Israeli-Palestinian conflict continues, the number of innocent victims increases. And what’s worse, the attacks are now online, attacking those who are in the comforts of their home. Just last month, Internet users were bombarded with a malware hidden in a spoofed CNN news about the Israeli-Palestinian conflict. The cyber criminals took advantage of this conflict to wage a warfare of their own, using the Trojan malware as aweapon.

There are really lots of people who took the bait that cyber criminals have set. For one, the fake site do really look authentic. It would probably take a very critical eye to distinguish the fake one from the legitimate one. Once the Internet user clicks the video containing an update on the conflict, a Trojan is installed. This malware proliferation alerted the authority because the Trojan can actually be used to steal data from various sites. Aside from this, the installed malware can slowly damage the user’s system.

How to avoid the attack

There are various ways to avoid being the next victim of cyber crime. One is by installing anti-malware and anti-spyware on your computer. You also need to keep these software updated. You should also scan your computer regularly. However, some malicious software cannot be detected by your anti-malware and anti-spyware, so the best thing that you should do is to determine if the site is authentic before clicking anything. You should also avoid opening attachment from unknown sources, especially if the attachment has .ink, .exe, and .vbs extensions.

How to Find Someone Through the Internet

One of the best things about the Internet is that it serves as a reservoir of information, including those about certain individuals. Although the Internet cannot give you information on every single individual, it can still be a helpful tool if you want to look for your grade school buddy or high school sweetheart.

How to start

You can start your search about a specific person by visiting online directories. Online directories are, however, limited. These directories find the email address of a person by various means such as searching among web pages and snooping around news groups. Some examples of online directories are MetaEmail Search Agent, Switchboard, and Yahoo’s People Finder.

Explore the web

If your search through the directories did not succeed, you can search the web. You just have to type the first name of the person and then the surname on the search engine. Formore precise results, put the name in quotes.You can also go directly to the website of the school in which that particular person went to. You can ask the reunion committee for a directory.

Set trap for ego-surfers

If you have not found the contact information of a certian person, make a webpage that advertises your intention and contains information on how to contact you. If that person typed his or her name in the search engine, he or she would find the webpage. However,it is not so often that a person would search for his or her name on the web. And if you display your contact information on the web, chances are, unsolicited emails will make their way to your email account.