The I.Q.D. Team Connection
  • Welcome
  • Iraq News Current
  • PRE & POST RV Information
  • Market Place
  • Twitter Feed
  • Join Our Mailing List
  • Future Of Iraq Project & Other Links
  • The IQD Team Connection Blog & Announcements
  • Quick Links
  • Conf Calls: Recordings
  • Contact Us
  • Financial Planning
  • How to Choose A Financial Advisor
  • Private Bankers: Contacts & Websites
    • Private Bankers - Articles of Interest
  • Computer Security
  • Dinar Dealer & Exchange Info
  • Public Record Sites - Background Checks FREE
  • Real Estate
    • Landlord Tenant Laws & Information
  • Documents: Gifting
  • In Loving Memory of Tim
  • Health & Wellness Blog
  • Health Wellness Products
  • In Loving Memory of Linda

Understanding Mobile Apps

1/7/2012

0 Comments

 
_Understanding Mobile Apps


If you have a smart phone or other mobile device, you probably use apps – to play games, get turn-by-turn directions, access news, books, weather, and more. Easy to download and often free, mobile apps can be so much fun and so convenient that you might download them without thinking about some key considerations: how they’re paid for, what information they may gather from your device, or who gets that information.

    Mobile App Basics
    Questions About Your Privacy
    Questions About Advertising
    Malware and Security Concerns
    Mobile App User Reviews

Mobile App Basics
What’s a mobile app?

A mobile app is a software program you can download and access directly using your phone or another mobile device, like a tablet or music player.
What do I need to download and use an app?

You need a smart phone or another mobile device with internet access. Not all apps work on all mobile devices. Once you buy a device, you’re committed to using the operating system and the type of apps that go with it. The Android, Apple, Microsoft and BlackBerry mobile operating systems have app stores online where you can look for, download, and install apps. Some online retailers also offer app stores. You’ll have to use an app store that works with your device’s operating system. To set up an account, you may have to provide a credit card number, especially if you’re going to download an app that isn’t free.

    Data Plans and Wi-Fi: Two ways to access the internet from your phone
    You can access the internet using a data plan tied to your phone service, or through a Wi-Fi hotspot. Phone companies generally charge a monthly fee for a data plan that can connect you to the internet.

    Wi-Fi connections usually are faster, but you have to be in range of a hotspot to use one. Most public Wi-Fi hotspots – like those in coffee shops, airports, and hotels – don't encrypt the information you send over the internet and are not secure. Get tips for using public Wi-Fi.

    To set up a home wireless network, you'll need to pay for internet access and a wireless router, and you’ll want to take steps to secure the network.

Why are some apps free?

Some apps are distributed for free through app stores; the developers make money in a few ways:

    Some sell advertising space within the app. The app developers can earn money from the ads, so they distribute the app for free to reach as many users as possible.
    Some apps offer their basic versions for free. Their developers hope you’ll like the app enough to upgrade to a paid version with more features.
    Some apps allow you to buy more features within the app itself. Usually, you are billed for these in-app purchases through the app store. Many devices have settings that allow you to block in-app purchases.
    Some apps are offered free to interest you in a company’s other products. These apps are a form of advertising.

Questions About Your Privacy
What types of data can apps access?

When you sign up with an app store or download individual apps, you may be asked for permission to let them access information on your device. Some apps may be able to access:

    your phone and email contacts
    call logs
    internet data
    calendar data
    data about the device’s location
    the device’s unique IDs
    information about how you use the app itself

Some apps access only the data they need to function; others access data that’s not related to the purpose of the app.

If you’re providing information when you’re using the device, someone may be collecting it – whether it’s the app developer, the app store, an advertiser, or an ad network. And if they’re collecting your data, they may share it with other companies.
How can I tell what information an app will access or share?

It’s not always easy to know what data a specific app will access, or how it will be used. Before you download an app, consider what you know about who created it and what it does. The app stores may include information about the company that developed the app, if the developer provides it. If the developer doesn’t provide contact information – like a website or an email address – the app may be less than trustworthy.

If you’re using an Android operating system, you will have an opportunity to read the “permissions” just before you install an app. Read them. It’s useful information that tells you what information the app will access on your device. Ask yourself whether the permissions make sense given the purpose of the app; for example, there’s no reason for an e-book or “wallpaper” app to read your text messages.
Why do some apps collect location data?

Some apps use specific location data to give you maps, coupons for nearby stores, or information about who you might know nearby. Some provide location data to ad networks, which may combine it with other information in their databases to target ads based on your interests and your location.

Once an app has your permission to access your location data, it can do so until you change the settings on your phone. If you don’t want to share your location with advertising networks, you can turn off location services in your phone’s settings. But if you do that, apps won’t be able to give you information based on your location unless you enter it yourself.

Your phone uses general data about its location so your phone carrier can efficiently route calls. Even if you turn off location services in your phone’s settings, it may not be possible to completely stop it from broadcasting your location data.

Questions About Advertising

Why does the app I downloaded have ads in it?

Developers want to provide their apps as inexpensively as possible so lots of people will use them. If they sell advertising space in the app, they can offer the app for a lower cost than if it didn’t have ads. Some developers sell space in their apps to ad networks that, in turn, sell the space to advertisers.

Why do I see the ads I do?

Advertisers believe you’re more likely to click on an ad targeted to your specific interests. So ad networks gather the information apps collect, including your location data, and may combine it with the kind of information you provide when you register for a service or buy something online. The combined information allows the mobile ad network to send you targeted ads – ads that may be relevant to someone with your preferences and in your location.
Malware and Security Concerns

Should I update my apps?

Your phone may indicate when updates are available for your apps. It’s a good idea to update the apps you’ve installed on your device and the device’s operating system when new versions are available. Updates often have security patches that protect your information and your device from the latest malware.
Could an app infect my phone with malware?

Some hackers have created apps that can infect phones and mobile devices with malware. If your phone sends email or text messages that you didn’t write, or installs apps that you didn’t download, you could be looking at signs of malware.

If you think you have malware on your device, you have a few options: you can contact customer support for the company that made your device; you can contact your mobile phone carrier for help; or you can install a security app to scan and remove apps if it detects malware. Security apps for phones are relatively new; there are only a few on the market, including some with free versions.

Mobile App User Reviews
Can I trust all the user reviews I read about an app?

Most app stores include user reviews that can help you decide whether to download. But some app developers and their marketers have posed as consumers to post positive comments about their own products. In fact, the Federal Trade Commission recently sued a company for posting fake comments about the apps it was paid to promote.

SOURCE LINK


0 Comments

Tips for Using Public Wi-Fi Networks

1/7/2012

0 Comments

 
_Tips for Using Public Wi-Fi Networks


Wi-Fi hotspots in coffee shops, libraries, airports, hotels, universities, and other public places are convenient, but they’re often not secure. When using a hotspot, it’s best to send information only to websites that are fully encrypted.

You can be confident a hotspot is secure only if it asks you to provide a WPA password. If you're not sure, treat the network as if it were unsecured.

    How Encryption Works
    How to Tell if a Website is Encrypted
    Don’t Assume a Wi-Fi Hotspot is Secure
    Protect Yourself When Using a Public Wi-Fi

How Encryption Works

Encryption is the key to keeping your personal information secure online. Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. When using wireless networks, it’s best to send personal information only if it’s encrypted – either by an encrypted website or a secure Wi-Fi network. An encrypted website protects only the information you send to and from that site. A secure wireless network encrypts all the information you send using that network.
How to Tell If a Website is Encrypted

If you send email, share digital photos and videos, use social networks, or bank online, you’re sending personal information over the internet. The information you share is stored on a server – a powerful computer that collects and delivers content. Many websites, such as banking sites, use encryption to protect your information as it travels from your computer to their server.

To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure). Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, your entire account could be vulnerable. Look for https on every page you visit, not just when you sign in.
Don’t Assume a Wi-Fi Hotspot is Secure

Most Wi-Fi hotspots don’t encrypt the information you send over the internet and are not secure.

If you use an unsecured network to log in to an unencrypted site – or a site that uses encryption only on the sign-in page – other users on the network can see what you see and what you send. They could hijack your session and log in as you. New hacking tools – available for free online – make this easy, even for users with limited technical know-how. Your personal information, private documents, contacts, family photos, and even your login credentials could be up for grabs.

An imposter could use your account to impersonate you and scam people you care about. In addition, a hacker could test your username and password to try to gain access to other websites – including sites that store your financial information.
Protect Yourself When Using Public Wi-Fi

So what can you do to protect your information? Here are a few tips:

    When using a Wi-Fi hotspot, only log in or send personal information to websites that you know are fully encrypted. To be secure, your entire visit to each site should be encrypted – from the time you log in to the site until you log out. If you think you’re logged in to an encrypted site but find yourself on an unencrypted page, log out right away.
    Don’t stay permanently signed in to accounts. When you’ve finished using an account, log out.
    Do not use the same password on different websites. It could give someone who gains access to one of your accounts access to many of your accounts.
    Many web browsers alert users who try to visit fraudulent websites or download malicious programs. Pay attention to these warnings, and keep your browser and security software up-to-date.
    If you regularly access online accounts through Wi-Fi hotspots, use a virtual private network (VPN). VPNs encrypt traffic between your computer and the internet, even on unsecured networks. You can obtain a personal VPN account from a VPN service provider. In addition, some organizations create VPNs to provide secure, remote access for their employees.
    Some Wi-Fi networks use encryption: WEP and WPA are the most common. WPA2 is the strongest. WPA encryption protects your information against common hacking programs. WEP may not. If you aren’t certain that you are on a WPA network, use the same precautions as on an unsecured network.
    Installing browser add-ons or plug-ins can help, too. For example, Force-TLS and HTTPS-Everywhere are free Firefox add-ons that force the browser to use encryption on popular websites that usually aren't encrypted. They don’t protect you on all websites – look for https in the URL to know a site is secure.        

SOURCE LINK



0 Comments

Laptop Security

1/7/2012

0 Comments

 
_Laptop Security

A minor distraction is all it takes for a laptop to vanish. If it goes missing, all the valuable information stored on it may fall into the hands of an identity thief. Keep these tips in mind when you’re out and about with your laptop:
Do:

    Treat your laptop like cash.
    Lock your laptop with a security cable.
    Be on guard in airports and hotels.
    Consider an alarm for your laptop.
    Consider carrying your laptop in something less obvious than a laptop case.

Don’t:

    Leave your laptop unattended — even for just a moment.
    Put your laptop on the floor.
    Leave your laptop in the car.
    Keep passwords with your laptop or in its case.

    The Dos
    The Don'ts
    Where to Report a Stolen Laptop

The Dos
Treat your laptop like cash.

If you had a wad of money sitting out in a public place, would you turn your back on it — even for just a minute? Would you put it in checked luggage? Leave it on the backseat of your car? Of course not. Keep the same watchful eye on your laptop as you would on your cash.
Lock your laptop with a security cable.

 In the office, a hotel, or some other public place, use a laptop security cable. Attach it to something immovable or to a heavy piece of furniture — say, a table or a desk.
Be on guard in airports and hotels.

Keep your eye on your laptop as you go through airport security. Hold onto it until the person in front of you has gone through the metal detector — and keep an eye out when it emerges on the other side. The confusion and shuffle of security checkpoints can be fertile ground for theft.

If you stay in hotels, a security cable may not be enough. Store your laptop in the safe in your room. If you leave your laptop attached to a security cable in your hotel room, consider hanging the "do not disturb" sign on your door.
Consider an alarm.

Depending on your security needs, an alarm on your laptop can be a useful tool. Some laptop alarms sound when there's unexpected motion, or when the computer moves outside a specified range. A program that reports the location of your stolen laptop once it's connected to the internet also can be useful.
Consider carrying your laptop in something else less obvious than a laptop case.

When you take your laptop on the road, carrying it in a computer case may advertise what's inside. Consider using a suitcase, a padded briefcase, or a backpack instead.
The Don’ts
Don't leave it — even for just a minute.

Your conference colleagues seem trustworthy, so you're comfortable leaving your laptop while you network during a break. The people at the coffee shop seem nice, so you ask them to keep an eye on it while you use the restroom. Not a good idea. Don't leave your laptop unguarded — even for a minute. Take it with you if you can, or at least use a cable to secure it to something heavy.
Don't leave your laptop in a car.

Parked cars are a favorite target of laptop thieves. If you have no choice and you must leave it in your car, keep it locked up and out of sight.
Don’t put your laptop on the floor.

No matter where you are in public — at a conference, a coffee shop, or a registration desk — don’t put your laptop on the floor. If you must put it down, place it between your feet or up against your leg so you remember that it’s there.
Don’t keep passwords with your laptop or in its case.

Remembering strong passwords or access numbers can be a challenge. However, leaving them in your laptop carrying case or on your laptop is like leaving your keys in your car. Don’t make it easy for a thief to get to your personal or corporate information.
Where to Report a Stolen Laptop

If your laptop is stolen, report it immediately to the local authorities.

    If it's your personal laptop and your information might be misused by an identity thief, visit ftc.gov/idtheft.
    If it's a business laptop, immediately notify your employer, as well. You may want to review the FTC's information about data breaches.

SOURCE LINKS

0 Comments

Securing Your Wireless Network

1/7/2012

0 Comments

 
_Securing Your Wireless Network

    Tips for Using Public Wi-Fi Networks
    Computer Security

If you don't secure your wireless network, strangers could use it and gain access to your computer – including the personal and financial information you’ve stored on it. Protect your computer by using WPA encryption.

    Understand How a Wireless Network Works
    Use Encryption
    Secure Your Computer and Router
    Limit Access to Your Network
    Don’t Assume That Public Wi-Fi Networks Are Secure

Understand How a Wireless Network Works

Going wireless generally requires connecting an internet "access point" – like a cable or DSL modem – to a wireless router, which sends a signal through the air, sometimes as far as several hundred feet. Any computer within range with a wireless card can pull the signal from the air and access the internet.

Unless you take certain precautions, anyone nearby with a wireless-ready computer or mobile device can use your network. That means your neighbors – or any hacker nearby – could "piggyback" on your network, or access information on your computer. If an unauthorized person uses your network to commit crime or send spam, the activity could be traced back to your account.

Use Encryption

Encryption scrambles the information you send over the internet into a code so that it’s not accessible to others. Using encryption is the most effective way to secure your network from intruders.

Two main types of encryption are available: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). Your computer, router, and other equipment must use the same encryption. WPA2 is strongest; use it if you have a choice. It should protect you against most hackers.

Some older routers use only WEP encryption, which may not protect you from some common hacking programs. Consider buying a new router with WPA2 capability.

Wireless routers often come with the encryption feature turned off. You must turn it on. The directions that come with your router should explain how. If they don't, check the company’s website.

    Tutorials for Turning Your Router’s Encryption On:

        Linksys
        NETGEAR
        Apple Airport

Secure Your Computer and Router

Use anti-virus and anti-spyware software, and a firewall. Use the same basic computer security practices that you would for any computer connected to the internet.

Change the name of your router from the default. The name of your router (often called the service set identifier or SSID) is likely to be a standard, default ID assigned by the manufacturer. Change the name to something unique that only you know.

Change your router's pre-set password. The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. Hackers know these default passwords, so change it to something only you know. Use passwords that are at least 10 characters long: the longer the password, the tougher it is to crack.

Visit the company’s website to learn how to change the password.

    Tutorials for Changing the Default Password for Your Router:

        Linksys
        NETGEAR
        Apple Airport

Limit Access to Your Network

Allow only specific computers to access your wireless network. Every computer that is able to communicate with a network is assigned a unique Media Access Control (MAC) address. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses to access to the network. Some hackers have mimicked MAC addresses, so don't rely on this step alone.

    Tutorials for Limiting Access to Your Wireless Network:

        Linksys
        NETGEAR
        Apple Airport

Turn off your wireless network when you know you won't use it. Hackers cannot access a wireless router when it is shut down. If you turn the router off when you're not using it, you limit the amount of time that it is susceptible to a hack.
Don’t Assume That Public Wi-Fi Networks Are Secure

Be cautious about the information you access or send from a public wireless network. Many cafés, hotels, airports, and other public places offer wireless networks for their customers to use. These "hot spots" are convenient, but they may not be secure. To learn more, check out these tips for using public Wi-Fi.

SOURCE LINK

0 Comments

Computer Security

1/7/2012

0 Comments

 
_Computer Security


Scammers, hackers, and identity thieves are looking to steal your personal information – and your money. But there are steps you can take to protect yourself, like keeping your computer software up-to-date and giving out your personal information only when you have a good reason.

    Use Security Software That Updates Automatically
    Treat Your Personal Information Like Cash
    Check Out Companies to Find Out Who You’re Really Dealing With
    Give Personal Information Over Encrypted Websites Only
    Protect Your Passwords
    Back Up Your Files

Use Security Software That Updates Automatically

The bad guys constantly develop new ways to attack your computer, so your security software must be up-to-date to protect against the latest threats. Most security software can update automatically; set yours to do so. You can find free security software from well-known companies. Also, set your operating system and web browser to update automatically.

If you let your operating system, web browser, or security software get out-of-date, criminals could sneak their bad programs – malware – onto your computer and use it to secretly break into other computers, send spam, or spy on your online activities. There are steps you can take to detect and get rid of malware.

Don’t buy security software in response to unexpected pop-up messages or emails, especially messages that claim to have scanned your computer and found malware. Scammers send messages like these to try to get you to buy worthless software, or worse, to “break and enter” your computer.

Treat Your Personal Information Like Cash

Don’t hand it out to just anyone. Your Social Security number, credit card numbers, and bank and utility account numbers can be used to steal your money or open new accounts in your name. So every time you are asked for your personal information – whether in a web form, an email, a text, or a phone message – think about whether you really can trust the request. In an effort to steal your information, scammers will do everything they can to appear trustworthy. Learn more about scammers who phish for your personal information.

Check Out Companies to Find out Who You’re Really Dealing With

When you’re online, a little research can save you a lot of money. If you see an ad or an offer that looks good to you, take a moment to check out the company behind it. Type the company or product name into your favorite search engine with terms like “review,” “complaint,” or “scam.” If you find bad reviews, you’ll have to decide if the offer is worth the risk. If you can’t find contact information for the company, take your business elsewhere.

Don’t assume that an ad you see on a reputable site is trustworthy. The fact that a site features an ad for another site doesn’t mean that it endorses the advertised site, or is even familiar with it.

Give Personal Information Over Encrypted Websites Only

If you’re shopping or banking online, stick to sites that use encryption to protect your information as it travels from your computer to their server. To determine if a website is encrypted, look for https at the beginning of the web address (the “s” is for secure).

Some websites use encryption only on the sign-in page, but if any part of your session isn’t encrypted, the entire account could be vulnerable. Look for https on every page of the site you’re on, not just where you sign in.

Protect Your Passwords

Here are a few principles for creating strong passwords and keeping them safe:

    The longer the password, the tougher it is to crack. Use at least 10 characters; 12 is ideal for most home users.
    Mix letters, numbers, and special characters. Try to be unpredictable – don’t use your name, birthdate, or common words.
    Don’t use the same password for many accounts. If it’s stolen from you – or from one of the companies with which you do business – it can be used to take over all your accounts.
    Don’t share passwords on the phone, in texts or by email. Legitimate companies will not send you messages asking for your password. If you get such a message, it’s probably a scam.
    Keep your passwords in a secure place, out of plain sight.

Back Up Your Files

No system is completely secure. Copy important files onto a removable disc or an external hard drive, and store it in a safe place. If your computer is compromised, you’ll still have access to your files.

SOURCE LINK


0 Comments

You Have No Privacy

12/6/2011

0 Comments

 
_You Have No Privacy

Written on December 3, 2011 by Floyd Brown
91
Carrier-IQ-detector_1

If you are like us, every day you pick up a smartphone and you send email, visit with friends on Facebook, send a text message or even log into your bank’s website and pay a bill. These modern day conveniences have become routine.

We all believe that our passwords are secure, our data is protected, and life is easier if we don’t have to write a check to pay a bill or dig around and find a stamp to send a friend a quick note.

But this morning we are no longer sure. The tech world is in a fury, which we believe will soon break out into society at large, about a little know software program call Carrier IQ. Over the Thanksgiving weekend a 25 year old programmer by the name of Trevor Eckhart posted a video on YouTube which graphically displays how our naive beliefs of privacy are just plain wrong.

The video which lasts 17 minutes and starts slowly because he methodically goes through the privacy statements on his cell phone is frightening. If you watch it, you will never look at your smartphone the same again. We have posted the video at Floydreports.com if you want to watch.

The program, Carrier IQ cannot be turned off. But it tracks your every move. Dial a friend’s phone, it sends the number off to someone. Send or receive a text message and the message is recorded and sent off. Call up your bank or another website in the allegedly secure https: mode which we have been told is secure and Carrier IQ is there recording your username, password and any other move you make on your phone.

Rather than calling them smartphones we should be calling them people monitors. The only action you take which it cannot record is a thought in your head that you refuse to express. These phones are even capable of recording what you say. Scary is not the word for it.

Trevor Eckhart even takes pains to turn off the GPS function for use by Google maps and search and then he demonstrates how Carrier IQ still is logging your position.

Now what can you do about it? The program can only be removed if you hack or as they say “root” your phone. But beware rooting your phone likely violates the contract you have signed with your carrier, and it clearly voids any manufacturers’ warranty you may have on the device.

Since the video was first posted others have gone to work and exposed how in addition to Android phones the Carrier IQ software is also present on I Phones with iOS 3 operating system and above.

The privacy issues surrounding smartphones have been numerous, but the exposure of Carrier IQ brings the threat to an entirely new level. Chances are if you have a smartphone you have no privacy around or while using the device. Be careful.

Makes you understand why criminals all use burner phones.

©2011 Floyd and Mary Beth Brown. The Browns are bestselling authors and speakers. To comment on this column, e-mail [email protected]. Together they write a national weekly column distributed exclusively by Cagle Cartoons newspaper syndicate. Floyd is also president of the Western Center for Journalism.

This column has been edited by the authors. Representations of fact and opinions are solely those of the authors.

LINK




0 Comments

The IQD Team: How to Be Invisible Book & Free Download

11/20/2011

0 Comments

 
_How to Be Invisible by J J Luna
Information we discussed on many calls...

LINK TO FREE DOWNLOAD and Book


0 Comments

PTR RV Itis Post: 13 things your burgular wont tell you

11/19/2011

0 Comments

 
_Thanks to RV-ITIS for this post...

    There are some really great tips here:
    The best are near the end.
    Common sense applied in a vigorous way.

    13 THINGS YOUR BURGLAR WON'T TELL YOU

    I am particularly interested in the part about the wasp spray...

    1. Of course I look familiar. I was here just last week cleaning your carpets, painting your shutters, or delivering your new refrigerator.

    2. Hey, thanks for letting me use the bathroom when I was working in your yard last week. While I was in there, I unlatched the back window to make my return a little easier.

    3. Love those flowers. That tells me you have taste... and taste means there are nice things inside. Those yard toys your kids leave out always make me wonder what type of gaming system they have.

    4. Yes, I really do look for newspapers piled up on the driveway. And I might leave a pizza flyer in your front door to see how long it takes you to remove it..

    5. If it snows while you're out of town, get a neighbor to create car and foot tracks into the house.. Virgin drifts in the driveway are a dead giveaway.

    6. If decorative glass is part of your front entrance, don't let your alarm company install the control pad where I can see if it's set. That makes it too easy.

    7. A good security company alarms the window over the sink. And the windows on the second floor, which often access the master bedroom - and your jewelry. It's not a bad idea to put motion detectors up there too.

    8. It's raining, you're fumbling with your umbrella, and you forget to lock your door - understandable. But understand this: I don't take a day off because of bad weather.

    9. I always knock first. If you answer, I'll ask for directions somewhere or offer to clean your gutters. (Don't take me up on it.)
    10. Do you really think I won't look in your sock drawer? I always check dresser drawers, the bedside table, and the medicine cabinet.

    11. Here's a helpful hint: I almost never go into kids' rooms.

    12. You're right: I won't have enough time to break into that safe where you keep your valuables. But if it's not bolted down, I'll take it with me.

    13. A loud TV or radio can be a better deterrent than the best alarm system. If you're reluctant to leave your TV on while you're out of town, you can buy a $35 device that works on a timer and simulates the flickering glow of a real television.. (Find it athttp://www.faketv/.com/) ;
   
8 MORE THINGS A BURGLAR WON'T TELL YOU:

    1. Sometimes, I carry a clipboard. Sometimes, I dress like a lawn guy and carry a rake. I do my best to never, ever look like a crook.

    2. The two things I hate most: loud dogs and nosy neighbors.

    3. I'll break a window to get in, even if it makes a little noise. If your neighbor hears one loud sound, he'll stop what he's doing and wait to hear it again. If he doesn't hear it again, he'll just go back to what he was doing. It's human nature.

    4. I'm not complaining, but why would you pay all that money for a fancy alarm system and leave your house without setting it?

    5. I love looking in your windows. I'm looking for signs that you're home, and for flat screen TVs or gaming systems I'd like. I'll drive or walk through your neighborhood at night, before you close the blinds, just to pick my targets.

    6. Avoid announcing your vacation on your Facebook page. It's easier than you think to look up your address.

    7. To you, leaving that window open just a crack during the day is a way to let in a little fresh air. To me, it's an invitation.

    8. If you don't answer when I knock, I try the door. Occasionally, I hit the jackpot and walk right in.

    Sources: Convicted burglars in North Carolina , Oregon , California , and Kentucky ; security consultant Chris McGoey, who runs http://www.crimedoctor.com/%C2%A0and Richard T. Wright, a criminology professor at the University of Missouri-St. Louis, who interviewed 105 burglars for his book Burglars on the Job.


    Protection for you and your home:
    If you don't have a gun, here's a more humane way to wreck someone's evil plans for you.

    WASP SPRAY

    A friend who is a receptionist in a church in a high risk area was concerned about someone coming into the office on Monday to rob them when they were counting the collection. She asked the local police department about using pepper spray and they recommended to her that she get a can of wasp spray instead.

    The wasp spray, they told her, can shoot up to twenty feet away and is a lot more accurate, while with the pepper spray, they have to get too close to you and could overpower you. The wasp spray temporarily blinds an attacker until they get to the hospital for an antidote. She keeps a can on her desk in the office and it doesn't attract attention from people like a can of pepper spray would. She also keeps one nearby at home for home protection.. Thought this was interesting and might be of use.


    FROM ANOTHER SOURCE:

    On the heels of a break-in and beating that left an elderly woman in Toledo dead, self-defense experts have a tip that could save your life.

    Val Glinka teaches self-defense to students at Sylvania Southview High School . For decades, he's suggested putting a can of wasp and hornet spray near your door or bed.
    Glinka says, "This is better than anything I can teach them."
    Glinka considers it inexpensive, easy to find, and more effective than mace or pepper spray. The cans typically shoot 20 to 30 feet; so if someone tries to break into your home, Glinka says, "spray the culprit in the eyes". It's a tip he's given to students for decades. It's also one he wants everyone to hear. If you're looking for protection, Glinka says look to the spray.

    "That's going to give you a chance to call the police; maybe get out." Maybe even save a life.

    Put your car keys beside your bed at night. Tell your spouse, your children, your neighbors, your parents, your Dr.'s office, the check-out girl at the market, everyone you run across. Put your car keys beside your bed at night.

    If you hear a noise outside your home or someone trying to get in your house, just press the panic button for your car. The alarm will be set off, and the horn will continue to sound until either you turn it off or the car battery dies. This tip came from a neighborhood watch coordinator. Next time you come home for the night and you start to put your keys away, think of this: It's a security alarm system that you probably already have and requires no installation. Test it. It will go off from most everywhere inside your house and will keep honking until your battery runs down or until you reset it with the button on the key fob chain. It works if you park in your driveway or garage. If your car alarm goes off when someone is trying to break into your house, odds are the burglar/rapist won't stick around. After a few seconds all the neighbors will be looking out their windows to see who is out there and sure enough the criminal won't want that. And remember to carry your keys while walking to your car in a parking lot. The alarm can work the same way there. This is something that should really be shared with everyone. Maybe it could save a life or a sexual abuse crime.

    P.S. I am sending this to everyone I know because I think it is fantastic. Would also be useful for any emergency, such as a heart attack, where you can't reach a phone. My Mom has suggested to my Dad that he carry his car keys with him in case he falls outside and she doesn't hear him. He can activate the car alarm and then she'll know there's a problem.


0 Comments

The IQD Team FTC: Facts for Consumers: Investment Risks Scams Fraud

11/8/2011

0 Comments

 
FTC: Facts for Consumers: Investment Risks Scams Fraud

Picture this:
 
In search of investments for working capital, an oil company sends consumers surveys of property that suggest the land is oil-rich. The company’s sales force tells interested consumers that top oil experts project the fields will yield thousands of barrels of oil a day — and a tidy return to investors within a year.
 
A film production company tells potential investors it is raising capital to produce a high-quality, low-budget family film with actors who are willing to sacrifice their usual high salaries for the sake of art. Claiming that the independent film market, cable television and video stores have increased the demand for movies, investors are "guaranteed" to make their money back. According to the prospectus, investor money will be spent on production, distribution and the screenplay.
 
Brokers of gemstones, rare coins or precious metals tell investors that the market price of these hard assets is skyrocketing. According to the brokers, the assets will increase in value — not only because experts have graded them rare, but also because of the demand.
 
Brokers of an FCC-licensed partnership tell consumers they’re raising capital to acquire a communications business that can be enhanced with new technology and turned into a competitive high-tech enterprise to be sold or developed for huge profits.
 
Investment brokers are claiming to sell ownership interests in a company that will offer Internet access to the public. The brokers maintain that investors will realize substantial gains from the fees the company will charge its users.
 
What’s wrong with these pictures? In a word — plenty.
 
The oil surveys are fake. The land owned by the company has not been drilled for oil, and in a legitimate deal, much more capital is required to determine if oil could be produced from the land at all.
 
The principals of the film-flam scam are the "producers" and "screenwriters." They take most of the money raised and then use a small amount to produce a low-quality film that is unlikely to turn a profit, let alone be released commercially.
Gemstone, rare coin or precious metal scam promoters often charge very high mark-ups and, as a result, consumers who try to resell their assets almost always lose most of their money.
 
The communication technology promised may be unavailable, unworkable or too costly. The partnership brokers take most of the money for themselves after they acquire low-tech businesses for consumers that would require millions of dollars more to have even a slim chance at turning a profit.
 
The fraudulent promoters generally structure the deals to siphon off at least 85 percent of investor money, never intending to turn over a functioning business with Internet expertise, equipment or staff. Investors are left with little capital, expertise or business with which to compete on the Internet.
 
It’s easy to make a new venture sound like a sure-fire money-maker, especially if the press is writing about successful legitimate companies in similar industries. Fraud promoters create the illusion of authenticity and success by incorporating, renting office space and issuing partnership units or stock certificates. But while they claim to offer investments in exciting sounding businesses or sell lucrative assets, they deliver cheap imitations of what they promise. As for consumers, they remain unaware that they’ve bought something of little or no value until their money is gone and profits have not materialized.
 
Pre-Investment Questions
 
Fraud is always a possibility, even with secured, regulated investments. Before investing, ask tough questions, both of yourself and those who are soliciting your investments. If the answer to any of these questions is "no" — or if the answers are vague or complicated — more than likely the investment being pitched is a fraud.
 
Is the company I’m investing in registered to sell securities? 
Be cautious if the company selling you stock, assets, or partnership units has not registered its securities. Companies that register their securities file prospectuses and annual reports with securities regulators. If a promoter tells you that your investment is "structured" to exempt the securities of the company from registration, you may be dealing with an outfit that’s purposely avoiding contact with regulators.
 
Is it "too late" if I don’t invest my money now? 
Using sales scripts, scam artists create the impression that only a few shares of stock or partnership units are left. They try to convince you that you’ll miss out on a big opportunity if you don’t send them thousands of dollars by overnight courier or wire transfer. Once you give your money to a scam artist, it may be too late to get it back.
 
Does the investment have a track record? 
Claiming that their "opportunity" is similar to those of "hot" entrepreneurs, scam artists often use news stories about the success of legitimate companies as bait. Unfortunately, success stories of other companies in the field are irrelevant for your purposes. Get the track record of the company you’re considering investing in and the background of the people promoting it.
 
Where is my money going? 
Legitimate companies account for investors’ money at all times. Ask for written proof of how much of your money is going to the actual purchase or development of the opportunity and how much is going to commissions, promoters’ profits and marketing costs. If most of your financial investment is slated to cover expenses and costs, much less will be available to earn a return. Telemarketing is particularly expensive; if you are investing in a telemarketed investment, how much are your brokers getting paid to talk to you?
 
Do I have an independent, knowledgeable, trustworthy person who can advise me? 
Get an independent appraisal of the specific asset, business or venture you’re considering. An appraisal offered by the party selling the investment opportunity can be fake. Talk to the previous owners of an asset or a business you’re acquiring for its value history. Discuss all investment ideas or plans with an accountant or an advisor you know and trust.
 
Do I know who I’m dealing with? 
Can you find published information about the company in which you’re investing, proof that the company has registered the securities it is selling with a government agency (if required), or someone you trust who has heard of the company? Have you checked with your state securities agency to see if the promoter or sales person is licensed to sell securities in your state, if required? If not, be cautious. You’re giving your money to strangers.
 
Checking law enforcement agencies and Better Business Bureaus in the community where promoters are located is prudent, but not fool-proof. It may be too soon for the company’s victims to realize they’ve been defrauded or to have lodged complaints with the authorities. In addition, fraudulent promoters can lie about their name or their business history, or even pay people to be "references."
 
Can I tell a genuine company from a fictional one? 
Don’t let appearances fool you. For a few dollars, anyone can incorporate an entity. Personal computers and desktop publishing software help scam artists produce slick promotional materials. Phone service providers can put toll-free telephone numbers in homes.
 
Did my sales representative tell me the risk of losing my money was high? 
Sales representatives should tell you the risk of particular investments. Be particularly suspicious of sales pitches that play down risk or portray written risk disclosures as routine formalities required by the government. Believe the risk disclosures that say you could lose your whole investment. When your money is gone, fraudulent investment promoters often use "risk disclosures" against you.
 
Can I be certain a promoter is not lying to me? 
Scam artists lie. Their success depends on having an airtight answer for everything. They inflate the costs and value of worthless investments. They promise you profits years down the road so you won’t find out that your investment is a scam until long after they’ve disappeared with your money.
 
Do I know when something is too good to be true? 
Investing is risky business. Anyone who tells you an investment is likely to turn a profit quickly should have a basis for the claim. Demand written proof of profit projections from independent sources. Be especially wary when someone tells you profits will be big enough to offset the risk of investing. Every potentially high profit investment is high risk.
 
For More Information
 
Several government agencies and business organizations register, regulate, investigate or monitor companies and individuals who offer investment opportunities. If you have questions about a company or an individual, or you wish to make a complaint, contact one or more of these offices, as appropriate. When you seek information, understand that the absence of complaints filed with governmental and private agencies does not mean that a company or an investment is necessarily sound.
 
Federal Trade Commission
North American Securities Administrators Association (NASAA)
Chief United States Postal Inspector
Commodity Futures Trading Commission
Securities and Exchange Commission
Better Business Bureau
National Association of Securities Dealers
National Futures Association
National Fraud Information Center
Your State Attorney General's Office
Your State Securities Commission, Securities Department, or Department of Corporations
The FTC works to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint or get free information on consumer issues, visit ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. Watch a video, How to File a Complaint, at ftc.gov/video to learn more. The FTC enters consumer complaints into the Consumer Sentinel Network, a secure online database and investigative tool used by hundreds of civil and criminal law enforcement agencies in the U.S. and abroad.
 
http://www.ftc.gov/bcp/edu/pubs/consumer/invest/inv03.shtm
0 Comments

The IQD Team IRS Video Portal: Safeguarding your personal info

11/8/2011

0 Comments

 
IRS Video Portal: Safeguarding your personal info

There’s nothing the IRS takes more seriously than protecting taxpayer information.  Safeguard all of your personal and business information including your SSN or EIN, or ITIN.  Also, if you have employees safeguard their information too.

http://www.irsvideos.gov/Professional/ScamsFraud
   
0 Comments

The IQD Team Simple Checklist that could have prevented Ben Bernanke's Wife from being ripped off by Aggressive Identity Thieves

11/6/2011

0 Comments

 
Thanks to Karen for this post

Simple Checklist that could have prevented Ben Bernanke's Wife from being ripped off by Aggressive Identity Thieves

Tips are below:
 
Fr: Lee Bellinger, Publisher 

Re: A Simple Checklist That Could Have Prevented Ben Bernanke's Wife from Being Ripped Off by Aggressive Identity Thieves 
This is an urgent message for you – or anyone who has a friend, parent, or spouse who underestimates the severe and growing risk of identity theft. This common crime is turning lots of unsuspecting people into paupers overnight and even getting some wrongly arrested. 
No one is immune from identity theft. Especially the unprepared. Here's a high-profile example where no fancy high-tech maneuver was involved, nor any violence, nor much sophistication. 
Anna Bernanke, wife of Federal Reserve Chairman Ben Bernanke, recently went to the Starbucks near their Washington, D.C. home. As she was sipping her beverage, her purse was snatched off the back of her chair. 
According to Newsweek, court records reveal Mrs. Bernanke's purse had her "driver's license, Social Security card, four credit cards, and a book of Wachovia bank checks from the couple's joint checking account. Printed on each check were the Bernanke's bank-account number, home address, and telephone number."
If it can happen to individuals of the Bernankes' rank and status, you better believe it can happen to you. For today's Executive Bulletin, we've assembled a 26-step checklist you can follow to protect your identity, and the identities of those you care about, from this fast-growing crime. 
What's more, by implementing these identity-shielding steps, you also reinforce your privacy from government goons and frivolous-lawsuit scumbags.
No one is safe from identity theft. PrivacyRights.org reports that from 2005 to today, over private 542,335,668 records have been breached! In only one month, over 5 million records were put at risk of exposure and abuse. 
26 Common-Sense Steps to Prevent Identity Theft 
and Protect Your Privacy
Not all of these steps may be appropriate for your personal situation, so feel free to cherry-pick from the list and implement the ones you need. Make sure to share this list with others you care about, so they're better protected, too. It's a long list, so it might help if you print a copy, tack it to your wall, and check off the steps as you complete them.
1) Alter your phone book listing. Phone books still exist (even though they're not as prevalent as before). Call your local phone company and limit the information they publish about you in the phone book or ask to be completely removed from it.

2) Subscribe to a credit-monitoring service. Not all services are alike. Most will monitor your credit report and notify you when new data is found. Some will help you clean up the damage if your identity is stolen. Some reputable options to look into are I.D. Theft Shield (from Pre-Paid Legal), iSekurity, CSIdentity, and Debix.

3) Beware of Internet phishing scams. In this scam, a crook sends you a fake email pretending to be from a known company (your bank, eBay, IRS, your state lottery, etc.) with some kind of urgent message saying you "need" to fill-in your private account details. Bottom line: If you don't trust the email or if it "feels" fishy – do NOT click on any of the links. If you're concerned that it may be important, use a "proven" phone number (NOT the phone number on the suspicious email) and call the company direct. Chances are if you feel unsure about the email, you'll find out it is in fact a fraudulent email.

4) Own a cross-cut shredder. Shred everything that has any identifying information, even if it's just your name, I.D. thieves can piece together your profile over time, like putting together a puzzle. Sometimes, all they need is one piece of information to create a fake identity. It depends on what kind of fraud they want to commit – "shred, baby, shred."

5) Encrypt email. A great stopgap to begin encrypting email on your end is to use Hushmail.com. This is a free web-based email service, just like Gmail or Hotmail. (Note: Hushmail keeps a copy of the encryption keys within the corporation, which means if asked by authorities to open your emails, they have the ability to do so.) Their free service option comes with a small 2 MB storage size, which is the size of the old 2-inch diskettes. One trick is to use the free version for sensitive email – bank, health insurance, doctor, broker, etc. Of course, you can buy a membership to increase your storage capacity.

6) Pay cash as often as possible. Reduce exposure of your checks, credit, or debit cards. Pay in cash. If you like the convenience of plastic, especially if you shop online, purchase pre-paid Visa, Mastercard, Amex, or Discover "gift" cards. These "gift" cards are available at most chain stores such as CVS, Wal-Mart, even your local post office. Gift cards can only be used once and do not require any identifying information. (This is not the case with "re-loadable" pre-paid debit cards – to use these you must surrender your birth date, social security number, and more). 

7) Use Firefox as your web browser. This is an open-source browser with safety, security, and privacy built in. Plus, it has a number of add-ons that further enhance protection of your online use.

8) Load these Firefox privacy-related add-ons. BetterPrivacy, Ghostery, HTTPS Finder, HTTPS Everywhere, NoScript, PrivacyChoice, TrackerBlocker. A few of these add-ons' benefits may overlap a bit. Overall, they help keep out little programs (scripts) from embedding on your computer, make it more difficult for tracking software to track you, and encrypt your sessions with the more secure, but often optional, HTTPS (S meaning secure) version of the website "url."

9) Secure your mobile electronics. Imagine if someone stole (or you lost) your cell phone, smart phone, iPad, or any other portable digital device. Most likely these gadgets have some personal information like your name, address, or address book with your friends, family, and workmates' personal details. At the very least, use a code to open and access these devices. Limit how much information you carry in these devices. And if you must store private information, use code names or initials to mask the information.

10) Electronically secure your computer and laptop. Make it difficult to steal your data off your computer equipment. As in the example above, use an access code to open and enter your computers. Also, encrypt the data on your computer. You can use TrueCrypt.org to encrypt your hard drive or other portable storage device. You can also use Wuala.com to encrypt and backup your data online (Wuala does NOT store copies of the encryption keys; only you have the keys. Not even their own employees can access your files). 

11) Physically secure your computer and laptop. If you travel often with your laptop, buy a physical cable with lock. This allows you to "chain" your laptop to your desk. Physically secure your desktop computer and storage devices at home and work. Make it difficult to pick up your computers (and backup drives) and run off with them.

12) Limit giving out personal information. Most entities ask, but often don't need it (or all of it) to provide services to you. Be especially careful with entities with which you're not familiar. Be equally vigilant with entities related to your child/grandchild and also older adults you're responsible for (children and seniors are often targeted by identity thieves). This includes preferred shopper club cards, filling out warranty cards, and more. If you must give out information, give out as little as possible.

13) Consider using a pre-paid cell phone and pre-paid mobile broadband. These make it convenient to maintain your privacy, and they do double-duty because you don't have to give up your private data like your Social Security number or date of birth. You simply buy a pre-paid phone (or mobile router) and minutes, and you're good to go.

14) Encrypt online browsing. Do this especially when communicating with sensitive websites like your bank, broker, insurance company, health-care provider, etc. The easiest step is to get started is to use the Firefox web browser with both "HTTPS Finder" and "HTTPS Everywhere" add-ons installed. For better security, use a proxy server or VPN. One simple to use proxy server (and it's free) is Cocoon: GetCocoon.com.

15) Opt-out of telemarketing and direct mail lists. This limits the amount of junk mail you receive, helps you avoid getting unsolicited phone calls at home, and gives you an added level of privacy.

16) Monitor your credit report. Go to www.AnnualCreditReport.com and follow their instructions to order a free credit report from each of the three major credit bureaus. Identity-theft expert John Sileo suggests staggering the free reports. For example, order the first one from Equifax now, Experian four months from now, and TransUnion four months after that. Then keep the cycle going. With this system in place, fraudulent activity will be easy to catch within four months rather a year (allowing less time for damage to occur).

17) Use long-length passwords. To help you create and "memorize" long passwords (longer than 15 characters; the longer the better) use a password manager like LastPass.com. Make sure your passwords have each character type: capital letters, lower case letters, numbers, and special characters ^&*#$<. Using a password manager, you only need to memorize one safe, secure, and long-length password, and let your password manager "remember" all the rest for you. Note: LastPass.com encrypts your data and YOU keep the only key; not even LastPass employees can access your account.

18) Educate your family to be vigilant. Protecting your and family's identity and privacy should be done on all levels. Everyone should be responsible for maintaining a unified front. Limit the weak spots in your defensive wall.
19) Secure your postal mail. An identity thief can easily steal your mail and use your credit card offers, bank statements, and more to commit fraud. Buy a strong locking metal mailbox that can't be easily broken open. The Mail Boss is one brand that you can buy from hardware stores like Home Depot.
20) Use a ghost address. Avoid using, giving out, or attaching your name to the address where you and your family physically live. This is a good safety measure to build your privacy and physical security. A ghost address could be as simple as a P.O. Box, a mail receiving address, a second address where you don't physically live, or even a business address.
21) Lighten your wallet and purse. When Mrs. Bernanke had her purse stolen, it contained too much personal information. Carry as little identity revealing documents and financial products (such as credit cards and checkbook) as possible. If it ever gets lost or stolen, there'll be less to clean up later.
22) Secure your home. Are your personal documents as secure as your jewelry, bullion, or cash? The ability to falsify your identity or breach your checking account could be more valuable to a thief than your family valuables. Don't leave paperwork such as statements, tax records, pay stubs, bills, etc. laying around for anyone to see, pick up, or photograph with a cell phone camera. Store your private documents under lock and key and shred anything you no longer need. (Tip: most people "hide" valuables in bedroom closets and dresser drawers; don't use these spaces to hide YOUR valuables.)
23) Be aware of how you're watched at work. Don't carry out any private communications from your work computer, phone, or fax. For example, if you login into your brokerage account from work, the password could be exposed to your employer and compromised.
24) Secure your business. Train your employees about proper security, privacy, and data-protection protocols. This will allow you to protect your personal information, your customers, the staff's information, and of course your corporate data as well.

25) Shield your driver's license and license plate. Once you secure a ghost address (or two) use that as your address on your driver's license (if allowed in your state). Anyone who peeks at your license only sees your ghost address. Anyone who runs your license plate number also gets your ghost address.

26) Freeze your credit report. This is especially important for children and seniors, since they don't normally monitor their credit reports, allowing a thief to steal their identities and abuse them for many years. Contact each of the three credit reporting bureaus (Equifax, Experian, and TransUnion). Complete their credit freeze process by mail and pay their fee. When you're ready to apply for a new credit account, remove the freeze beforehand.
Stay one step ahead of everyone else and don't be a victim of identity theft. Print a copy of this checklist, tack it to your wall, and implement the steps as soon as you can. Protect your privacy, your family, and your financial assets from this increasingly prevalent problem of identity theft.

 
0 Comments

The IQD Team Nations First Ever Emergency Alert System (EAS) Test Nov. 9

11/5/2011

0 Comments

 
Nations First Ever Emergency Alert System (EAS) Test

On Wednesday, November 9 at 2 p.m. (Eastern Standard Time), FEMA and the Federal Communications Commission (FCC) will conduct the nation's first ever Emergency Alert System (EAS) test. The purpose of this test is to help determine if the national-level system will work as designed, should officials ever need to send a national alert. 

This test will last approximately three minutes and will be seen on all local, cable, and satellite TV stations across the country, as well as radio. 

For additional information:

http://www.fema.gov/emergency/ipaws/eas_info.shtm

http://www.fcc.gov/encyclopedia/emergency-alert-system-nationwide-test
0 Comments

5 ways thieves steal credit card data

10/30/2011

0 Comments

 
5 ways thieves steal credit card data 

LINK
0 Comments
Forward>>
    Health Products Favs
    Health Books
    Picture
    filterfluoride
    IGNITEChewable Energy
    Get younger skin the natural way with Chews-4-Health™
    Picture
    Picture
    Liquid Zeolite
    Health Books
    Health Products FAV
    Picture
    Get 50% off Vetisse Jimin Ointment

    Categories

    All
    Articles Of Interest
    Automobile
    Banking
    Banking Laws
    Banking Tools
    Books
    Budget Tips
    Business Start Up
    Calculators
    Calling Help Google
    Cashing In
    Cashing In Info
    Cdars
    Changing State Residency
    Charities
    Check Authenticity Of Dinars
    Computer Security
    Con Men
    Credit
    Credit Cards
    Currency Classifications
    Currency Exchange
    Currency Trading Forex
    Debt
    Delarue
    Dinar Dealers - Check Out License
    Dinar Information
    Email Accounts Set Up
    Entities
    Entities Help
    Fair Debt Collection Practices Act
    Financial Planning
    Financing
    Fincen
    Forex & Currency Converters
    Fractional Banking
    Free
    Free Calling
    Fun
    Gifting
    Health & Wellness
    Home Ownership Help
    Home Safety
    Identity Protection
    Insurance
    Internet Crime Center
    Investing
    Iraq Investing
    Iraq News
    Iraq Stock Exchange Isx
    Lop
    Misc
    Modern Money Mechanics
    Money
    Money Financial Planning
    Money. Financial Planning
    Mortgage Scams
    Mr Anonymous
    Music & Inspiration
    News Sources
    Phone Security
    Post Rv Checklists
    Preparedness
    Pre & Post RV Daily Postings
    Privacy
    Private Banking
    Questions To Ask Professionals
    Real Estate
    Retirement
    Rfid Be Aware
    Safes
    Scam & Fraud
    Scam & Fraud
    Security
    Self Help
    Sent In By Our Listeners
    Shopping
    Straight Talkin Mike
    Sudden Wealth
    Tag Account
    Taxes
    Telephone
    Travel
    Twitter
    Veterans Assistance
    Words Of Wisdom

    Garden of Life