#*deletes base post because giving people credit is not optional and if i can prevent people from reblogging it without credit i will*
Explore tagged Tumblr posts
Text
All the credits here
From left to right, top to bottom Top row: @aether-feather, @applygenderonchild, @3d10fire-damage, @lunashadow-bun, @parshaara-bitch, @creepibeesti, @victorcrystalgem, @gardeninthevoid (and their girlfriend @arcadiancrows ), @demonoflight, @skyedancer2006, @cyannpepperr, @roachhboy, @basementfrogs
Second row: @pimbo, @sketchbookletters, @itsflowers, @io0bean0oi, @qubelord, @mintymallo, @lemon-p0ku, @ala-25, @simping-for-solangelo, @satans-little-dog, @seasonedfrog, @nyooome, @frog-cult-leader, @raincalyx, @mountev
Middle row: @luckymisfortune, @chrombonist, @madebymaryssa, @slemhosta, @jazzzzzzhands, @queenpotatoo, @salamannder, @pinkcinnimon, @marikmizuki (and their boyfriend @olyrik ), @arofroge, @darbinator1101 (drawn by thir frind TKTKTK), @staygolden-studios, anonymous*, @mercworm
*I have no idea how you managed to anonymously submit since I have it disabled. If this is you and you want to be tagged let me know and I'll update everything!
Fourth row: @kittymango, @rionavow, @glitchven, @space-boyy, @homosexual-dino, @mokitimo , @booknerd133, @demiboy-dj, @blondhairedgoblin, @jevik, @lees-little-hummingbird, @ionized-alpaca, @geccky
Final row: @chemoluminescence, @lookineedsleep, @zaicat, @maskoffacade, @im-trubbish, @sp00kfrost, @kokichisms, @george-isnt-straight, @froggyfroo-art, @shittybraindrawings, @phrawwg, @arcadianskypirate, @emjoy398
I wasn't able to mention a few people, there are links to their blogs instead. Sorry to those affected!
youtube
Thank you so much everyone for joining!! This was so fun, I loved seeing everyones amphibians (and a honorary amphibian too)!
I hope everyone had a nice pride month and had fun drawing their amphibians
Credit will be added in reblogs, because tumblr can't handle all the mentions and won't let me post with them on the same post
#amphibian#pride#amphibian pride 2021#frog#toad#axolotl#olm#caecilian#salamander#newt#*deletes base post because giving people credit is not optional and if i can prevent people from reblogging it without credit i will*#also excuse the youtube link tumblr wouldnt let me upload the bideo to here directly#all the credits are on the second reblog again because 1 i figured out how to brute force tumblr to let me and#2 the first readmore is not functional when actaully on my blog#also the music is on to grasstown from cave story#also if i got your name wrong or somehow missed you let me know and i will add/update/fix it#anonymous person how did you even do that?? i can only see your submission on mobile its completely invisible on desktop#dont mind my 300 edits to this post im just making it perfect ok#if you read all my 5 million tags heres a fun fact for you#i pretty much memorized which url is connected to which frog in the process of editing everything#i understand the video is a bit long and i dont mind if people dont look at it i just wanted to do it because i thought itd be a fun bonus
360 notes
·
View notes
Text
so, you’re new to the studyblr community and dont know where to start. many people have been in this position, including myself. i was recently asked by @theboldrevision on how to grow their blog. here are a few tips on how to start a studyblr and how to grow.
your blog name / URL
have it something related to yourself and/or studying. this way it makes it easy to distinguish yourself as a studyblr. try and make it short as it is easy for people to remember.
theme
have an appropriate theme which correlates to your content. if your predominant focus is on photos; you can get away with a multi column theme but I find them personally difficult to navigate. if your blog is based mainly on text a singular column theme is a must have, it makes it easier to read large blocks of text i.e masterposts i recommend these themes: hera | genesis | caerus | nocturne | easton | 176 | nayeli
your icon
the icon size on tumblr is 135px x 135px it can be made using photoshop, (windows / mac) or if you prefer a legal route you can use vecteezy.com. your icon can be whatever you want, it can be a selfie, an icon or even a drawing
header icon (Optional)
this is up to personal preference, I have one but many blogs don't. the size for the header is 640px x 360px. yet again, it can be anything you desire, you can have a photo (max size 10MB) or a gif (max size 3MB)
presentation
choose a colour pallet for your theme, i recommend coolors.co for all my colour pallet needs. make sure the colours are visible and don't interfere with your content. this will ensure that your log is easy to see. on the topic of visibility, make sure your text size is visible for those with poor vision, we really appreciate it. choose a background which contrasts your text colour, I prefer a white background with black text but as long as it is legible it will work. i personally prefer minimalist themes as they are clean and easy to navigate but as long as it isn't overly cluttered and is legible it will work.
intro post
make an into post so people can get to know you, state some facts about you, your ambitions in life and with your blog, who inspired you etc. it is an easy way for people to get to know you and make friends as people with similar interests may ask you questions or dm you
communication
make friends, almost everyone is friendly and is always willing to help you out. don’t be afraid to message or ask people for advice. try and reply to messages and dms, you might make a friend.
participation
participate in events, eg blog rates, blog awards, ask games etc.host your own events; same as above, giveaways (if financially viable), follow forevers. join networks such as the small studyblr network @smallstudyblrsunite. it is an easy way to make friends and have your content reach an audience
original content
what is your focus going to be? photos, masterposts, tips, or a variety. choose what you want to post as it is important in forming your niche. A rule of thumb is original ideas are the best ideas when it comes to masterposts and advice.
how to take photos
you don't need a fancy camera, i use my phone. i strongly recommend natural lighting as it provides the best picture quality and it prevents over saturated photos caused by artificial light. choose a background that complements the object you’re taking a photo of. some people use their desk, a bench, table or their bed. i have also seen people use paper for their background. your options are limitless. you can try putting stationery or other things around your photo to make it interesting. you can include stationery, a drink, flowers, washi tape etc. make sure there aren't many/any shadows directly on top of what your photographing as it makes it harder to see. then it comes to editing, i usually increase the brightness and/or exposure, the warmth and the highlights just a bit to make it clearer. Some apps which people use are vsco (android / iOS) instagram and photoshop. i mainly use the the photos app on iOS to edit but i sometimes use photoshop. however, all photos don’t need to be staged like this, sometimes authentic photos are just as good. at the end of the day do what feels right to you.
hashtags
tag your posts with related tags and use tracking tags of your favourite blogs so they can see your content (mine is #aoademic) here is a directory of a lot of tracking tags made by @enfpstud 0-C | D-G | H-L | M-R | S-Z and some more by @getshitdonetbh (X) using popular tags will help you gain some extra exposure such as #studyblr #new studyblr #studying #student #studyspo #notes. tag your favourite blogs in your posts so they can see them but don’t go over the top.
advice
don't focus on followers and notes as the purpose is to become motivated to study and share that with the studyblr community. just think of notes and followers as icing on the cake, they’re a nice extra but what’s the point of icing without a cake? (terrible analogy, i know)
queue
the queue is a lifesaver. it auto posts your posts and if you activate queue 2.0 in tumblr labs you can schedule how many posts are posted, what time intervals you want a post posted and how long per day your queue is on. It makes it look like your blog is active when you are not online so you can focus on other things and not be on tumblr all day. i have mine set overnight as people on the other side of the world can see fresh content from my blog while I'm asleep. it is very convenient but you can queue 300 posts.
protecting your content
always source your original content so if people add to your post or delete your caption you will still be noted as the source. this can be done by clicking the gear icon and putting your blog url in the content source section. you can also watermark your original posts. this is usually done by placing your blog name or url somewhere in the post where it cant be cropped out but isn't too distracting.
ground rules
please don't repost, always reblog!!! (i can’t stress this enough) along those lines, avoid reblogging photos without captions or photos from pinterest and weheartit as it is probably stolen content. this is because many posts are being reuploaded and initially they might state the source and is later deleted or they don’t give credit at all. to respect the content creator please avoid doing this.
the best advice is to be friendly and be yourself. i wish you the best with your academic future ♡
#studyblr#masterpost#new studyblr#student#studyspo#study motivation#studyspiration#study notes#notes#advice#studyblr advice#how to start a studyblr#organisation#productivity#elkstudies#universi-tea#emmastudies#mochistudies#studyquill#school
576 notes
·
View notes
Text
Dub Logistics Part 25: Equity vs. Equality (with extra: Correlation and Causation) in Localisation
“True equality in the dub-sub debate comes with equity by means of dual audio options.”
When we buy a localised Japanese game, we are being shown equality in terms of audio options. But then, why do people complain that a game doesn’t have an English dub or the original Japanese audio? In my opinion, this is because we are not being shown equity.
I briefly mentioned about this in Part 20, which was the instalment talking about people with (actual) reading difficulties or people who might take a little longer to process information and thus, read a bit slower than the rest of us. These are the disadvantaged people I’ll be referring to in the below examples.
As you can see in the above image, equality is giving people the same things while equity is showing fairness to the needs and wants of other people. Of course, that is assuming that there are enough boxes in the first place to warrant it, but I won’t go deeper into any hidden subtext shown.
Let’s say the guy in the blue shirt is fine with playing the original game in Japanese, the boy in the red shirt is a sub fan and the boy in the purple shirt is a dub fan. As for the people who are fine with either way, they’re the ones in the audience who are not relevant to this example.
Here’s my take on how the logic of this image works in terms of localising Japanese games - equality is like giving everyone a localisation with subtitles only, while equity is providing the option for players to play with either the original or dubbed voices, or rather, allowing players to play the untranslated game from Japan if they so wish.
Unfortunately, the current situation with many companies and games is that there are only one or two boxes in the picture and there’s (sometimes) none for the little guy on the right. This is the problem that I’ve been seeing throughout Japanese anime and game fanbases and I believe that it is one that some dub fans may be able to sympathise with.
Now, I’m presuming that no one’s complaining in the picture about their situation because up until here, I’ve assumed that the three of them have the capability to read subtitles if they wanted to. Let’s say that the shortness of the boy in the purple shirt is a metaphor for (actual) reading difficulties, like those I stated in Dub Logistics Part 20, which is linked above. In this case, equality isn’t going to work entirely if you’re trying to make your game more accessible for people with reading difficulties. Understandably, the proportion of gamers with reading difficulties is in the minority, so they can be easily mistaken for people who are capably fluent in reading, particularly on online forums and social media. As such, developers usually assume that their fans don’t have such problems - to them, it’s easier and cheaper in the long run.
Dub-sub arguments happen because gaming companies exercise equality by not including English dubbing or the original Japanese voices when a game is localised. While this situation can’t be helped in most cases, it can be prevented with the right budget and resources; exercising equity by means of implementing dual audio options is always the best way to go.
If there are dub fans or sub fans who still complain even after their favourite game has been localised with dual audio, then I don’t know what to say; that’s what options are for, really.
Now for a little bit of filler to conclude this instalment.
“Japanese voice options or DLCs do not imply that the entire fanbase prefers Japanese voices over English.”
Towards the end of the feud last year, one person who was involved in the initial debate, but not in the ensuing feud, sent something to my page about Xenoblade Chronicles 2 getting a Japanese voice DLC, saying that the release of the DLC proved to the developers that their fanbase prefer the original voices over the dubbed voices (or something along those lines). Coincidentally, I was postblocked at the time (no thanks to his “friend”), so I wasn’t able to refute his point there and then. Instead, I just banned him from my page and deleted the post. I was going to hold off addressing this lingering statement until the second-last instalment of Dub Logistics, but I decided that I would do it now as filler.
Honestly, seeing the person post this, given that he was somewhat respectful to me during the debate, made me lose any remaining respect I had for him and proved to me that he was no better than the people on the other side of the feud. To his credit though, he wasn’t as bad as the perpetrators on his side, but enough about that.
To answer his statement, no, the inclusion of Japanese voices does not imply that a game’s fanbase prefers Japanese voices over English. This is a generalised statement on a subjective topic made without any solid proof, or rather, based on the opinions of a number of fans. If it were the case, then the developers and publishers wouldn’t have made the effort to record the English voices in the first place.
For the record, I’d probably only be okay with this (as would some people) if the entire fanbase prefers Japanese voices and the developers have acknowledged this (properly). On a side note, the argument that the developers and publishers are lazy for not dubbing the game would be invalid as well.
The purpose of language DLCs and dual audio options is to give gamers options on how they want to play the game. They should not be used as an indication of preference unless it’s something on the calibre of a Yakuza-type scenario or something like that. Even then, such use in this manner should be acknowledged in order to reduce complaints when a sequel to the game is localised without dubbing.
In the end, people’s opinions on various things, even language preferences, will vary and developers should respect them when making or localising games. Now, I am speaking on this topic in general, so where the statement lies in relation to the entire Xeno series is entirely up to the individual.
1 note
·
View note
Text
30 Strategies to Reduce Shopping Cart Abandonment & Drive Profits
Shopping cart abandonment is big, bad, and pervasive. Baymard’s latest stats peg the average documented online shopping cart abandonment rate at a scary 69%.
That means for every ten e-commerce customers that put an item in their cart, nearly seven will leave the site without completing their purchase.
Shopping cart abandonment sucks, and it’s time to lower it.
The problem seems to get worse every year. It’s time to take back those sales and lower cart abandonment. But how do you reduce the effects of shopping cart abandoment?
Here’s 30 strategies to win those customers back and grow your bottom line.
1. Use Email Retargeting
If you want to slay cart abandonment, you need to get on board with email retargeting. Retargeting uses cookies embedded in email messages to display your ads to the user as she browses the web.
Retargeting is the perfect way to win back customers quickly after their abandonment.
2. Get Clear on Extra Costs
The top reason that customers give for abandonment is extra costs.
The easiest way to solve this problem? Get rid of those extra costs — or at least be clear about them.
If you absolutely must add in shipping charges, taxes, or other fees, be upfrong. As early as possible in the process, give them complete information regarding all the extra costs that they will see as they enter the shopping cart.
3. Provide Full Disclosure on Shipping Details
Shipping costs are another big kibosh for shopping carts.
In an age of Amazon Prime and holiday specials, customers have been trained to demand free shipping on just about everything. Chances are, you have some competitors that are winning because they have free shipping and you don’t.
If you can afford free shipping, great. If you can’t afford free shipping, then be sure to tell the customer everything about the shipping cost.
If necessary, provide a built-in calculator to determine estimated costs based on the weight and quantity of items.
4. Send an Email Immediately After the Customer Abandons
When an e-commerce customer abandons their cart, you have a few hours to reel them back in. Assuming that you’re using some retargeting technology and email marketing, send an email immediately.
According to Rejoiner’s data, here’s how likely a customer is to purchase after receiving a reminder:
Those first few hours post abandonment are the golden window of opportunity to regain lost customers. Capitalize on it.
5. Get Rid of Sign-In Barriers
Are you preventing customers from buying with sign-in barriers? Just don’t.
Forcing users to create an account may work for some products and services, but in most cases, you’re simply setting yourself up for disappointment. A great alternative to clunky sign-up processes is using social login.
6. Make the Check-Out Process 3-5 Steps
The more complicated your e-commerce checkout process, the less likely users are to complete it. The check-out process should be between three and five steps. The shorter, the better.
If you do try to shorten the process, make sure you’re not using too many fields in a single step.
7. Give the Customer Clear Progress Indications
It will help the customer if you can show them how far along in the process they are with a progress bar. Users like to have a feeling of progress and forward momentum as they reach for the goal of purchasing an item.
8. Use Simple and Prominent Calls to Action in the Shopping Cart
Every marketer knows the importance of calls to action. Are you using CTAs in your shopping cart, too? They are as important as ever.
Users want to know what to do next, and it’s up to you to tell them what to do.
Create a headline-style set of instructions for each phase of the checkout process. For example, tell the user “Where should we send your stuff? Please fill out your address.”
9. Add a “Save For Later” Button
Many shoppers abandon their carts because they’re using them as a wishlist or a place to save things they want to buy later. Instead of funneling them into a shopping cart, make it easy for them to create a wishlist with an easy option to buy later.
You get the benefit of lowered abandonment rates, and they get the upside of a wishlist that will easily funnel them into a later sale.
10. Talk to the Customer During the Process
Make the shopping experience conversational and interactive. There’s no need to be harsh and form-driven. Talk to them.
Brief and casual messages like, “Okay, we’re almost done.” and “We just need a little extra info here.” make the experience more enjoyable. I don’t know many people who love filling out forms, but if you make it less agonizing for the shopper, you’re more likely to gain their completion.
11. Don’t Throw in Extra Links
Avoid placing links that take the customer away from the shopping cart. The customer might leave the cart of their own volition, but don’t make it easy for them!
One of the common ways that e-commerce retailers lose customers is by trying to upsell with related products. Often, when a customer clicks on these products, they never return to the shopping cart.
12. Create Engaging and Powerful Product Pages
We obsess over shopping cart abandonment but consider what comes prior to putting something in a shopping cart — the product page.
Take a look at your product page. How engaging is it, really? Russ Henneberry recommends creating “high-quality, interactive product images.”
13. Create Continuity Between the Product Page, and Shopping Cart
If possible, display a thumbnail of the image in the shopping cart. The customer wants to make sure that they are actually purchasing the item that they selected. Making the cart items visible and visual is a great way to keep the customer moving through to completion.
14. Create One-Click Shopping
Amazon has probably made billions off of its one-click shopping button. It’s so easy to just click and buy without even deliberating over the pros and cons of the purchase.
You can steal a page from Amazon’s playbook by creating your own easy-to-buy shopping cart process. It won’t work for unregistered customers, of course, but it can work for members.
15. Avoid Surprises of Any Kind
According to CPC Strategy “Bad surprises are one of the most common contributors to shopping cart abandonment.” Don’t surprise your shoppers, whatever you do.
The shopping process can be a nerve-racking experience for some e-commerce shoppers. The customer’s mind is tense. They’re pulling out their credit card. They’re a bit nervous. What’s going to happen?
Then — BOOM! A confusing pop-up. A discount code request. An “error” message. A missing field. Whatever.
The checkout process goes up in flames. You surprised them (or they surprised themselves) and you lost.
Watch carefully for any “surprises” in your checkout process. Make it clear, deliberate, and completely free of pop-ups, unexpected messages, and other factors that could be seen as an interruption.
16. Boost Site Speed
If your site is slow, customers will leave.
The shopping cart is one of the most critical places to boost site speed. Site speed and conversions are tightly correlated. Faster websites are just plain better.
17. Get an SSL Certificate
SSL certificates make customers feel secure. In today’s web, SSL is considered a standard part of good design and development. (It’s also good for your Google ranking!) If your site, and especially your checkout process lacks security measures, you’ll scare some customers away.
18. Display Business Contact Information Prominently
Another way of enhancing the trustworthiness of your website is by adding contact information. Many online businesses display their NAP (name, address, phone number) in the site footer. This is merely one more way of giving your customers the assurance that you are a legitimate and reliable business.
19. Add Chat or Phone Support Options on the Checkout Page
If a customer has a problem, question, or issue with checkout, what are they going to do? In the absence of support options, they might just leave.
To prevent this from happening, add an 800-number or online chat support to the checkout process.
20. Make the Cart Easy to Edit
Your cart should be easy to change. Deleting items, changing quantities, and adjusting shipping options should be intuitive and simple. Don’t make the mistake of creating cryptic buttons that accidentally remove everything in the cart.
21. Show Security Symbols on the Checkout Page
Your checkout page is the place to pile on the security. Obviously, you don’t want to clutter up the page with too many of these, but a few well-placed badges can reassure the skittish customer.
22. Highlight Your Return Policy
Have you ever experienced buyer’s remorse? Some buyers do. Buyer’s remorse doesn’t just happen after a purchase. The anticipation of remorse can sometimes cripple buyers before they purchase.
To prevent this from happening, give customers a clear and easy understanding of your return policy. Make it simple. “Don’t like it? Just return it, on us. No questions asked.”
23. Limit Cross-Selling on the Checkout Page
Trying to cross-sell or upsell customers in the 11th hour may just contribute to shopping cart abandonment, not bigger buys. Keep cross-selling to product page and let the check out page focus on converting.
24. Add Testimonials Everywhere
Some people put testimonials only on a devoted page. I suggest putting them everywhere — even in your checkout process. A simple callout or sidebar with a customer recommendation or two can keep the motivation level high as the customer continues to check out.
25. Personally Review the Checkout Process At Least Once a Month
Do you have first-hand experience with your site’s shopping cart? Do you know what customers are experiencing as they proceed through the funnel, fill out each form, and complete each field?
Personally take the time to test your own shopping cart. As you continually test, refine, and edit your shopping cart process, you’ll be able to iron out wrinkles that may be contributing to abandonment.
26. Be Careful With Coupon Codes
Coupon codes are a double-edged sword. On the one hand, they may motivate customers to purchase. On the other hand, they could prevent customers from completing the transaction.
If a customer doesn’t have a coupon code, for instance, they may leave the site to look for one, but never return.
27. Make Shipping Times as Quick as Possible
Many online customers want their order to arrive as soon as possible. Make arrangements for expedited shipping if customers want it.
28. Provide Courteous and Helpful Error Messages
If a user gets frustrated with the checkout process, they are likely to quit. As you optimize your checkout process, create error notifications that are as helpful and direct as possible. There are two angles to this:
Make it easy for them to find the error on the form.
Make it easy for them to fix the error.
29. Accept Any Currency
If you offer international sales, make sure you are providing clear currency conversion information as well as acceptance of other currencies.
30. Allow Multiple Payment Methods
As e-commerce shopping has become more popular, there has also been an expansion of payment methods. Open the gates as wide as possible and allow buyers to use any credit card, Paypal, Amazon, or any other forms of payment that are common within your niche.
If you need more ideas to lower cart abandonment, try these three strategies.
Conclusion
The effects of shopping cart abandonment can kill your e-commerce bottom line.
As eager as you are to reel users back in, let’s be honest. There’s no such thing as 0% abandonment. Some e-commerce customers will abandon their carts, and you’re going to have to accept it.
Don’t use it as an excuse to keep you from fighting for as many conversions as possible. You’re going to win some back, and it’s worth the effort.
If you are struggling to drive traffic to your store, let us help.
How have you reduced your shopping cart abandonment rates?
The post 30 Strategies to Reduce Shopping Cart Abandonment & Drive Profits appeared first on Neil Patel.
Original content source: https://neilpatel.com/blog/methods-for-killing-shopping-cart-abandonment/ via https://neilpatel.com
See the original post, 30 Strategies to Reduce Shopping Cart Abandonment & Drive Profits that is shared from https://imtrainingparadise.weebly.com/home/30-strategies-to-reduce-shopping-cart-abandonment-drive-profits via https://imtrainingparadise.weebly.com/home
0 notes
Text
Comment Exchange about a Manipulative Autism Mom
As I promised, here is the comment exchange, which I did on the Patheos blog Roll to Disbelieve, which discusses the behavior of a particularly manipulative Autism Mom™. To sum up: The owner of that blog, Captain Cassidy, once worked in a call center, and the Autism Mom™ in this case grabbed up the fanciest TV package she could find, one she could not afford, and played the autism card (complete with the whole array of humiliating details that so any Autism Parents show without the child’s consent) to get her bills forgiven indefinitely so she could basically et these services for free. I responded talking about how this is a well-known phenomenon within the autistic community, one we really do not like, and she and I ended up in an exchange talking about how this behavior affects the kids and how annoyingly manipulative it is. This is what led me to the conclusion that this type of manipulation, while it may not be always against companies, may be driving a lot of the vocal refusal to accept the sort of advice we have to give. After all, they want to hear a pat answer that makes their child convenient - they don’t want to hear that they may need to try multiple things, accept messy parts of life, and various other things we suggest that are likely to work, but are not something you can just implement and forget.
Exchange under the cut - note that a few other people on that blog, allistic people, do agree with the sentiment that people who claim autism as their identity when they themselves are not autistic, while simultaneously denying this identity to actually autistic people, is really a disgusting thing to do. All users except Captain Cassidy and me are designated with initials:
Captain Cassidy (blog mod, also calls herself Wielder of the Banhammer) Perpetual victims tend to leave nothing to chance when it comes to fucking up their lives. It's just amazing how they manage to cover every single potential base with epic failure so that there's only one possible avenue of help--which is guaranteed to be someone who'll be hugely put out by rescuing them. It's like watching the human version of a slow-motion train wreck. Then when nobody leaps forward to save them from their own poor choices, they'll whine that "so-and-so doesn't want to work with me." Yeah, been there and done that with call center work. You could always immediately tell who those people were: they'd have tons of little credits and line-item deletions on their accounts, a balance that hadn't been current since their account started (and a fairly recent activation date at that), a constant wave of promotions and specials they probably shouldn't have gotten, and--the tip-off--a pattern of forgiven late fees, disconnection fees, and bounced check fees, each noted with some new disaster the customer had suffered that had prevented them from paying their bill on time and in full that month. They always had some ideal solution in mind, and it seemed like they would refuse every option and possibility we offered if it wasn't that solution in their head. Usually the solution involved total absolution of all fees and balances, but barring that they'd happily take a very large discretionary credit "for being such good customers" and as "compensation" for the hassle caused to them by the disconnection or whatever. If a frontline agent refused to "work with them" that time, they'd escalate as high as they could to try to get their bill credited. I was one of the people in that escalation chain, but had the good fortune to be working for a company that was cracking down HARD on those kinds of credits so I could refuse knowing upper management wouldn't give in either. These idiots would ride the carousel as long as a company would let them, then fuck off and go right along to the next provider of that service. I remember telling one that sooner or later they'd go through all the providers in their rural area and it might be a good idea to talk to someone about learning how to budget and all that because she'd hit the limit on what we could do to save her from herself. It didn't go over well with her. (She had an autistic son, she said, and she'd gotten that company's largest entertainment package on a new customer promotion about 18 months previously. The son had gotten used to watching a channel that only came with that package and would, she assured us, beat his head against a wall until he landed in the hospital if he couldn't have that channel on all the time. She hadn't actually paid a bill at all in about 16 months and now owed the company somewhere around $2000. Normally that was an impossible balance to accrue, but we'd inadvertently taught her a very dirty trick we could do in cases of extreme need: When she got disconnected every month, she'd call up and pity-party someone into taking pity on her and reactivating it, even if that meant re-aging her account to get it back online, with the assurance--never fulfilled--that she'd totally pay in full "soon." The company's fraud team had flagged her account and made it impossible for ANYBODY not on their team to reactivate her without payment in full plus three months in advance. She was used to escalating a few times, since only people at a fairly high level could re-age accounts. I was one of them, but I sure wasn't gonna do it for her. Re-aging meant to take her full balance, credit that amount to the account to bring it current, then charge it all back again. In effect, she would still owe the full balance, but now it showed as a current balance instead of a past due one. This is a TERRIBLE thing to do and it completely freaks out fraud investigators. So she escalated on me, and I sent her to a manager, who "wouldn't work with her" either, and then she landed in the fraud team's queue and I didn't hear anything past that. I didn't believe her excuse story, but it hardly mattered if I did or didn't; the only solution at that point was for her to pay what was being demanded, and that wasn't the solution she wanted to hear.)
Me You know, that woman who claimed she had an autistic son? I wouldn't be shocked if she was one of those parents that the autistic community HATES. The ones who are always pity-partying their kid's autism, talking about how their kids DESERVE an autism cure (which most autistics, including me, don't want), acting as if autism is doom-and-gloom all the time, often supporting the crap "charity" Autism Speaks, which repeats those same pity lines, videoing their child's meltdowns and posting them on the internet without their consent along with giving graphic details of hygiene and bathroom habits of their kids, also without the child's consent (including feces-smearing, which is something an autistic person I know did as a baby and grew out of, and they transitioned to making mud pies by the creek as a kid), and calling themselves "autism parents" while telling us autistic people "no, no, sweetie, you are a person with autism". Ugh, there's a lot of nerve in that last one, taking our identity for themselves while expecting us to separate ourselves from it. And then it seems possible that one of these so-called "autism parents" (who inevitably are never autistic themselves, because autistic people who are parents call themselves "autistic parents") has the gall to scam your company, to boot.
 S
I just think it's obnoxious they make it all about them.
C
"Autism parent" sounds awful. It's like she thinks she's mothering the autism itself, rather than her kid.
Captain Cassidy, Wielder of the Banhammer
Oh yeah, that was completely this awful lady. That's exactly what she talked like. She presented herself as one step holier than the Virgin Mary and it just outraged her that my company wasn't just donating services to her because SHE was an AUTISM MOM and didn't we KNOW what she was GOING through every day... And yes, I got treated to some astonishing personal details about her son that seemed engineered to evoke the most pity and disgust in listeners. I almost told her hey gal, I've been emotionally manipulated by the best. And you ain't anywhere close to that level.
Me
I wish more people responded to "autism mom" laments the way you do. That type of manipulation allows parents to get away with literal murder of their autistic offspring, such that if you google "parent kills kid who has autism" or something, practically every article talking about such a murder has comments sections full of people saying things about how you'd understand why those poor parents would want to murder their autistic kid if you were in their shoes, and how the lack of services makes them worry so much they had to kill their kid.
No, I'm sorry, lack of services means that you should be willing to advocate for those services, not use that an excuse to treat your kid like a rabid beast who has to be put down. And besides, if you autism parents can pull heartstrings the way so many of you do engendering sympathy for murder and waltzing right into communities of actual autistic people to shit on them and silence them, I'm sure you can use those emotional manipulation skills to aid you in advocacy work.
(Not you personally, I mean those shitheads who do things ranging from what that mom did to you all the way up to actual murder).
You even get things like the parents in this article (http://autistext.com/2017/03/04/autpocalypse-then-autpocalypse-now/ ) talking about how if their son's autism didn't go away, they might have to kill him, at which point the son's autism went away and the parents blamed the autism on a "cerebral milk allergy" which, as we all know here, is a bullshit disease and that of course if you discuss the possibility of killing a kid for being visibly autistic, that kid is likely to hide his autistic behaviors because his life depends on it. Duh. But of course, a little thing like reality isn't going to stop them from selling alternative medicine to treat something that, in actuality, was visibly and abusively "treated" by putting the kid in fear for his life.
And it is clear from the quotes of those parents in that article that those are not the words of parents at their wit's end (which, of course, is the impression "autism parents" who murder their kids often successfully give to a lot of people when they talk about how people need to "walk in their shoes"). Those words are far too cold and calculating for that, and are simply abuser words.
Me
So, she was most likely telling the truth about having an autistic son, and she treated him like shit. Go figure. Just like every other "autism mom" out there. They do have a habit of presenting themselves as holy figures.
Really, I feel sorry for that kid.
Captain Cassidy Wielder of the Banhammer
I'm glad to take your word on it--though sad for the son.
Probably would have been a way better idea for her to contact the company in writing and just ask for the donation before signing up for anything. They might even have granted it then, who knows... But signing a contract and accepting a huge entertainment package like that, then unilaterally deciding not to pay because she felt she'd earned enough Autism Sympathy Points? Not a good plan. And offering a child a channel on a package she knows for 100% certain she can't afford to pay for monthly doesn't sound like she was thinking with portals at all.
Me
No, she wasn't. though I bet her taking an expensive package and working it into that kid's routine would win her massive sympathy points when her kid inevitably gets upset because his routine is disrupted due to the fact he can no longer see that show. So then she can use that as yet another example of how autism ruined her life (and yes, she would say it was her life that was ruined even though her kid is the autistic one).
Seriously, though. Don't incorporate shows you can't afford to keep into an autistic kid's daily routine - it's a real pain in the ass to have a routine disrupted without warning. I know that from personal experience. If your kid really likes that particular show, it would be more responsible to get DVDs of it if available, or else have it be something that you specially plan - do the latter if you can't get the DVD because that way the show falls under the category "special treat" and isn't incorporated into a daily routine.
But I guess advice like that is not going to go over well with people who use their kid's autism as a way to fish for sympathy. God for-fucking-bid they do anything that will genuinely reduce their kid's difficulty rather than win them sympathy points, especially since they are also doing things that make it harder for autistic people and those parents of autistic kids who actually want to make it easier for their kids and are willing to fight on their kid's behalf rather than using autism as a vehicle to fish for sympathy.
Captain Cassidy Wielder of the Banhammer
It definitely gave her something to keep her days busy. I got the feeling she'd done this to a lot of other companies for a lot of other services and goodies and did a lot of phone errands to keep the gravy train and sympathy brigade moving.
Me
And strung her son along in the process with repeated, unnecessary, and jarring interruptions to his routine, rather than finding things within his interest area that he liked and that she could consistently provide (i.e. a one-time or few-time DVD purchase in lieu of scamming expensive TV packages).
Seems that she cared more about getting the goodies for herself and exploiting her son's plight in order to do so, while making it worse for him, rather than making sure that both she and her son were able to have nice things she didn't need to scam people to get. And she probably saddled her son with a huge burden of guilt for getting attached to those goodies that weren't really his in the process, although it was in no way his fault that his mom brought in those things and let them be incorporated into his routine knowing damn well she might not be able to give her son consistent access to them (again, a disaster for a lot of autistic kids) rather than making them "special treats" as she should have done, while giving him things he could consistently use for his routine (like the aforementioned DVDs).
Getting goodies for oneself is okay (yes, I know that parents have a lot of reason to be stressed), just get goodies you can reasonably afford, for you and your kids, and don't use your kid to bilk people out of goodies like that woman did.
Captain Cassidy Wielder of the Banhammer
Jeez, yeah, 100% this. I'm glad you brought that up because I guess I hadn't even realized that the son might feel guilty about any attachments he formed to the TV channel in question. I see why parents like that are looked down on. That's a lot to saddle a child with, and none of it's his fault at all.
Me
I figured the son might feel guilty about this because I have felt guilty about similar things outside my control (like feeling so guilty about benefitting from the use of fossil fuels that I once went through a phase of basically denying climate change and hanging on to the hope of a magical solution so that the guilt wouldn't drive me nuts, especially since I couldn't realistically check out of use of technology, and this was before renewable energy sources looked as feasible as they do today)
Exchange over.
Bet I’m not the only autistic who would feel guilty about getting attached to something that people have gotten through ill-gotten gains. I mean, sometimes we do need to apply this in a socially aware way (like when talking about white privilege) but this isn’t one of those things. And even when it is a good idea to acknowledge this, it does not mean people should have to be ashamed of getting attached to something. Recognizing problematic elements and being ashamed of getting attached to something are not the same thing. But in this case, if the son did feel guilty, his mom would probably encourage it - heck, the tricks she used to manipulate Captain Cassidy, mentioned in the first comment, are exactly the sort of thing that would feed guilt and shame in a totally destructive way - his mom is portraying the situation in a way that would make the son feel like it is all his fault he gets deeply attached to things.
Seriously, how else are you supposed to feel when your mean mom is on the phone to a company desperately saying about how you will knock your head against the wall so hard you end up in the hospital if you can’t have the show you’ve grown deeply attached to? Of course you would feel guilty and absolutely sick with yourself - you don’t leap to thinking it’s your mom’s fault and that she could have skipped the fancy package and/or gotten DVDs of the shows or a TiVo to record your shows instead if she wanted you to have the shows - both options would be 100% cleaner, and a lot more likely to be able to continue, than scamming a company out of the fanciest packages the companies offer (which companies will likely cut you off from when they find out anyway, and in this particular case it would not be a dirty trick on the part of the company to do so since the company is not breaking any promises in that case). Especially since yes, companies are unethical a lot of the time, and yes, there are a lot of things companies should not deny, but that does not mean that people should be using children to scam said company. And they shouldn’t be humiliating their kids in public like that either. Period.
3 notes
·
View notes
Photo
New Post has been published here https://is.gd/36QLel
Dutch Billionaire Yet Another Victim of Deceptive Crypto Ads, Sues Facebook
This post was originally published here
Earlier this week, Dutch billionaire John De Mol launched a lawsuit against Facebook over crypto ads using his image without permission.
De Mol claims that consumers have lost as much as 1.7 million euros (over $1.9 million) due to the ads, and his reputation was damaged as a result.
It is not the first time the California-based media giant is being sued over fake bitcoin ads — and, despite Facebook’s efforts to eliminate the problem, it seems that the issue persists.
Brief introduction to Facebook’s relationship with crypto ads
In January 2018, Facebook became the first major social media platform to ban cryptocurrency-related ads.
Notably, the social media giant set a precedent for other big tech companies, including Google and Twitter, which soon followed suit and introduced similar regulations on their platforms.
Specifically, Facebook declared at the time that it would prohibit ads that use “misleading or deceptive promotional practices,” referring specifically to initial coin offerings (ICOs) and cryptocurrencies. Rob Leathern, product management director at Facebook, explained the company’s decision in a blog post:
“We want people to continue to discover and learn about new products and services through Facebook ads without fear of scams or deception. That said, there are many companies who are advertising binary options, ICOs and cryptocurrencies that are not currently operating in good faith.”
The ban was “intentionally broad,” meaning that the social media company decided to ban all cryptocurrency ads on its platforms (namely Facebook, Instagram and Audience networks) first, and then learn how to select the ones that are actually “deceptive.” However, Leathern also mentioned that the company intended to “revisit this policy and how we enforce it.”
Read more on this: Facebook Revises Policy on Blockchain Ads, Crypto-Related Materials
Indeed, in June 2018, Facebook partly reversed the ban, once again allowing cryptocurrency ads on its platform — however, only from preapproved parties this time. The ban on ICOs, however, was kept in full effect. Hence, Facebook’s revised “prohibited products and services” policy states:
“Starting June 26, we’ll be updating our policy to allow ads that promote cryptocurrency and related content from pre-approved advertisers. But we’ll continue to prohibit ads that promote binary options and initial coin offerings.”
Further, the updated policy requires advertisers to submit an application beforehand so that Facebook can see if they are fit to run crypto-related ads. Specifically, candidates have been advised to include “any licenses they have obtained, whether they are traded on a public stock exchange, and other relevant public background on their business.”
Ultimately, Facebook stated that “not everyone who wants to advertise will be able to do so.”
John De Mol case: Billionaire sues Facebook for damaged reputation
Despite the extra measures from Facebook, it appears that fraud-related crypto ads still manage to find their way to the platform — as a result, the social media giant is now in the midst of a major lawsuit.
The case was filed by John De Mol, a 64 year-old Dutch entertainment mogul whose net worth is estimated to be $1.7 billion.
It is not the first time De Mol, who is affiliated with international TV hits including “The Voice,” “Deal or No Deal,” “Fear Factor” and “Big Brother,” has brought up Facebook bitcoin ads that capitalize on his image. He first encountered the problem in October 2018, as Jacqueline Schaap, a lawyer from De Mol’s legal team, told Cointelegraph via email:
“John de Mol noticed the ads for the first time in October 2018, we do not know whether these were the first adds to appear. We just have not noticed them before, but that does not mean that they have not been published.”
At the time, he issued a public statement, saying that none of these ads had been given permission to use his name or image. Specifically, as per De Telegraf’s report, people were asked to transfer money to a company called Bitcoin Profit, which claimed to be backed by De Mol. The ad had reportedly been deleted by the time that article was published.
Now, De Mol is suing Facebook before the Amsterdam District Court, as the problem is still urgent for the media tycoon. According to court documents obtained by Cointelegraph, the ads featuring De Mol’s images promoted cryptocurrency scams on Facebook and Instagram, which allegedly damaged his reputation.
The plaintiff is accusing Facebook of failing to avert the ads and not being able to respond to the complaints on time. Moreover, De Mol’s lawyers asked Facebook to hand over identifying data about the people who create such advertisements.
Further, De Mol’s legal team claims that consumers have lost as much as 1.7 million euros (over $1.9 million) due to the ads, also noting that a number of other Dutch celebrities have been targeted. Schaap told Cointelegraph that the figure was produced from “several newspaper/internet articles” and that it has been mentioned by Fraudedesk, a local organization that raises public awareness about fraudulent activities.
A representative from Fraudedesk confirmed to Cointelegraph that the 1.7 million euros is the amount that has been reported to them by almost 200 people who engaged with the fake ads since 2017. The organization’s spokesperson wrote via email:
“Generally only 10% is reported to us, so this amount is just the tip of the iceberg,”
In a Reuters report, Schaap is quoted as saying that Facebook is responsible for such incidents, and that the current vetting process is not enough: “I don’t know what reality Facebook lives in, but that doesn’t work.”
In response, Facebook lawyer Jens van den Brink reportedly stated that the social media company could not be forced to monitor all ads on its platforms at all times, and that Facebook had removed the De Mol-linked ads promptly after being informed about the complaints.
Read more on this: Facebook’s Crypto Ad Ban Reversal Power Play Gets Their Own News Stuck
As per Reuters, when asked by the judge whether Facebook’s vetting includes checking the content of websites that advertisements link to, Van den Brink replied positively, but noted that the company’s software can be tricked by advertisers who change links in their ads or disguise the content of those pages. The lawyer also said that Facebook was trying to fix that problem.
Prior to the hearing, Facebook’s Leathern told reporters the company was actively trying to prevent fraudulent ads:
“The people who push these kinds of ads are persistent, they are well-funded and they are constantly evolving their deceptive tactics to get around our systems,”
The outcome of this case is not clear at this point. According to Reuters, the judge mentioned that the two sides might be able to reach a settlement.
Cointelegraph reached out to Van den Brink and Facebook for further comment, but neither of them replied to requests.
De Mol is not the first celebrity to fight fake crypto ads in court
Evidently, De Mol is not the only celebrity who has been targeted by deceptive crypto-related ads on social media. On Twitter, numerous users and bots have been impersonating celebrities like Elon Musk and Vitalik Buterin to promote cryptocurrency giveaways scams.
On Facebook, the fraudsters’ tactic seems different. Instead of promoting giveaways, they mostly appear to describe “big” investment opportunities in nonexistent cryptocurrencies.
To give the appearance of legitimacy, such ads feature fake celebrity endorsement and replicate popular media websites like CNBC or Daily Mail. Ultimately, they trick unknowing users into giving up sensitive data, such as their credit card information. During their research on the matter, the publication The Next Web had detected at least two pages that massively used this strategy, both of which were reportedly registered from Bulgaria.
Although the Dutch entertainment magnate seems to be one of the very few public figures to take the fight over bitcoin ads to court, he is not the first one to do so.
In April 2018, Martin Lewis, a British journalist and TV presenter who created Money Saving Expert, a popular financial advice website, sued Facebook for defamation over fraudulent ads featuring his name. Specifically, he argued that crooks were using his reputation to trick people into bitcoin “get-rich-quick schemes” on the social media platform.
“The impact on people’s mental health of losing their retirement funds, or losing their children’s money that they thought they were investing is catastrophic and life-destructive,” he told Business Insider. Lewis also mentioned that he had been contacted by a person who had allegedly lost 19,000 British pounds ($25,000) because of a bitcoin ad featuring his face as well as a woman from Scotland who had been scammed out of 150,000 British pounds ($195,000) in a similar way.
To reach an agreement with Facebook out of court, Lewis requested an apology and a “manifest substantial change” in the way the company deals with fake ads, particularly the ones capitalizing on public figures. The TV presenter reportedly said that if he wins the lawsuit, he will donate any damages he is awarded to charity.
In January 2019, Lewis and Facebook came to an agreement after the social media giant announced it was donating 3 million British pounds ($4 million) to Citizens Advice — a United Kingdom-based network of charities — to launch a new project that would educate people about frauds and provide guidance for victims or potential victims.
Moreover, Facebook said it was going to create a new button for its U.K. users that will allow them to report potential scam ads, which would subsequently be reviewed by “a new dedicated team” at Facebook. The company’s regional director for Northern Europe, Steve Hatch, mentioned that if the tools prove to be effective, they could be introduced in more countries.
Lewis said that he was happy with the outcome and preferred it to facing Facebook in court, where he believes he could have won 50,000 to 100,000 British pounds ($63,500-$127,000). He also mentioned that the problem was not limited just to Facebook, since other platforms like Google and Yahoo had similar issues.
It is unclear how Facebook and other big tech companies aim to deal with fraudulent cryptocurrency ads in the future, but for now, the problem persists, dealing damage to common users and stigmatizing the crypto industry.
Lewis, for instance, suggested that Facebook should rely on manual labor because the technology has been failing to sweep away fake ads entirely:
“No one says that a technology company can only have technological solutions. If you can’t do it with technology, you know what you have to do, is you have to cut your profits and do it manually,”
However, Facebook might have something else up its sleeve: In April last year, Mike Schroepfer, Facebook’s chief technology officer, mentioned that the social media giant plans to use facial recognition to help stamp out scam ads, but admitted that it is “challenging to do technically at scale.”
#crypto #cryptocurrency #btc #xrp #litecoin #altcoin #money #currency #finance #news #alts #hodl #coindesk #cointelegraph #dollar #bitcoin View the website
New Post has been published here https://is.gd/36QLel
0 notes
Text
Identity theft in 2020
January 6th 2020,
You know that scene in Futurama where they are trying to scare Fry by saying “Hello and welcome to the world of tomorrow!” and then Bender acts like a crazy killer robot? My 2020 has started just like that. I woke up Jan 1st 2020 at 3pm, because New Year’s Eve is now the one night a year I DJ at our local goth bar, Elysium. I never usually sleep that late. Little did I know that all the bad things had already happened. I texted a couple of people and realized didn’t have mobile service. Huh. There was a system message that said something unusual.. ”SIM Not Provisioned MM#2” Eventually I look up what that means: ”The main reason of Sim not provisioned mm#2 is because your sim isn’t activated or is suspended from the service provider or isn’t picked up by the cell phone. If you just bought a new sim card then you are likely to see this error because you might have to activate your sim. If your sim was working fine and started giving this error then it can mean two things. The first scenario is that the sim card is dead and, therefore, inactive (in case it’s too old). The second scenario is that your sim card was deactivated from your service provider because you asked to transfer your number to a new sim card.” Which is alarming because I was asleep, definitely not buying a new phone or anything like that. I check my bank account. I can’t even login because my account has been restricted. That’s when I check my email, revealing the horrorshow of how they systematically bypassed all my passwords. It’s called SIM Card Cloning or SIM Swap Fraud. Here’s the wikipedia page. Basically, they duplicate your phone’s SIM card (I don’t know how but it doesn’t matter) then they port out, taking your phone number to another carrier and opening an account with them. This automatically closes your phone account, which is why I had no service or ability to call my banks. Now that they have your phone number and you don’t, they use text verification to get into your email, banks, etc... This means your passwords don’t matter, because everything can be reset with verifying through text. You should still keep your passwords strong, but consider the fact that it may not matter once they’ve digitally stolen your phone. And this happens long distance, one of my gmail login attempts was supposedly in Atlanta, Georgia but {March edit} they were using a VPN because all of the fraudulent transactions occurred in Ft Lauderdale, Florida. All in $50 or $100 transactions at Home Depot or Walmart. I’m assuming it was all Visa gift cards that are as good as cash. The extra clever part of this scam was doing it on New Year’s Day when everything is closed, the stores and their tech support, fraud departments. What’s The Damage? I haven’t been able to calculate it yet because access to my bank account is still restricted, although hopefully in the next 24-48 hours... But what I learned through email is that they made a bunch of purchases I guess with my debit card information, AND opened a new credit card. They didn’t get into my PayPal account directly but they did activate Samsung Pay and linked that to my PayPal... which is crazy, to think they don’t even need to get into the PayPal account itself to exploit it with a smartphone. Also, let this sink in, I’m still tallying the damage. The other night I got more unauthorized transactions. I keep saying, dealing with this type of fraud is like battling a hydra... It’s not a one an done situation, it’s overwhelming how much is suddenly and continually compromised, for days on end. It’s been a week and I still haven’t fully recovered. {March edit} The total damage was $1812.26 which is more than every penny I had. It was everything in my savings and debit accounts, plus $550 that was drained later through PayPal after I recovered the money back from the first time. That first 48 hours, I felt so alone, not only because my phone service was dead but because every institution I talked to had not heard of this type of fraud yet... Hello, I’m Chicken Little and the sky is actually falling, I promise. For example, explaining it to PayPal, an account that had not itself been compromised, was a nightmare. I attempted to chat with a helper - "What are the fraudulent transactions?” “There aren’t any, but my identity has been stolen though my phone” “If there are no transactions there’s nothing to report to the fraud department” - Then a day or two later there’s an unauthorized pending deposit from my bank for $50 and another for $500, but the automatic reporting system wouldn’t let me report it as as fraud since it was “MONEY RECEIVED” - Yesterday I figured out how to call them with Skype and we got it sorted. But for the record, Venmo was much easier to lockdown than PayPal so I will be closing my account with them when this is over. {March edit} My PayPal was compromised around this time through SamsungPay. I think even though I had changed everything, it still went through because it must have been a delayed Jan 1st charge from after my accounts had been locked down. I called them and said there’s a pending transaction that is unauthorized. They said they would “try to stop it but have no real power while the transaction is in process” - cooooool thankssss. I called my bank too, but despite all of that the transaction still went through and I had to recover it after the fact. Now that I have you sufficiently freaked out, and you should be, we come to the point of writing about it in my blog... iana’s list of What Saved My Ass / Prevention / Recovery Steps !! Firstly, put together a sort of post-apocalyptic survival kit but for identity theft. I had recently been given a Shell gas card as a gift and that saved me because I had to drive around a lot to sort most of this out in person. Previously I was using Lyft for transport and that is tied to, you know it, PayPal... so if I hadn’t had a car it would have been impossible to do all of this quick recovery. I am so grateful to have a car now. Inspired by that, here’s my fantasy kit that I wish I had Jan 1st:
a gas card
a gift card like the prepaid Visa kind that you can use anywhere and not linked to bank
CDs or analogue music for the car listening to the one disc I had in there while sorting this out was insult to injury!
A PREPAID BURNER PHONE to keep charged up and ready to go in case of emergencies, you just need it to call banks etc while you recover so you don’t need Data (after all, my smartphone still worked on wifi). I found $30 major network unlimited talk & text flip phones at Target and one $20 which I didn’t recognize but would probably still be fine.
A local secondary bank account Gift cards are probably doing the same thing but this saved me. My main bank is based in San Antonio (USAA) but luckily I had a second bank account at UFCU here in Austin. While I didn’t have enough money in it to pay rent or anything, being able to walk in and get new cards made same-day gave me some peace of mind.
A Google Number This isn’t as useful as the burner phone but it did save me this week. I use one for my work number, so luckily I could still text with it from my phone (on wifi) I just couldn’t use it to call anything. But I was able to use it to verify some stuff (not Venmo) with a number that had not been compromised like my main.
Prevention:
PUT A FREEZE ON YOUR CREDIT : I had never heard about this until it was too late. If you freeze your credit, people can’t just sign up for a new credit card in your name. If you want to open a credit card, you still can, you just have to take extra steps to do so.
2-factor Authenticate everything : hopefully there are some options BESIDES texting your main number that allow for extra security. It’s a pain but easier to tolerate than this mess I’m in now.
LIE ON YOUR SECURITY QUESTIONS : Example “What’s your mother’s maiden name? Blue” - Now this one is really hard for me to wrap my head around because the point is to prove you’re you so it feels wrong like lying in court under oath. But the fact is, if they are hacking your identity and you are using facts that are on record somewhere, that information can be stolen too. So lie, and write it down.
Long passwords are better than complicated ones : I had this explained to me by someone in the field. There are 26 letters, but only 10 numbers and even less symbols. Each time you add a letter you are multiplying the possible choices by 26, whereas each time you add a number or a symbol you are only multiplying by 10 or less. Example “ianaspasswordisverylongandhopefullysecureokaybye” is a better password than “iana123pa$$w0rd!” which is like what I used to do. This was a very interesting piece of the puzzle to put together. When I think about it, the more complicated and “random stuff” the password is, the shorter I make it. But if it’s a run-on sentence, it’s super long yet easy to remember. Of course sometimes you’re required to use a number and a symbol, but if you use the maximum amount of letters and minimum amount of symbols and numbers, it should be solid.
Pay for everything online with CREDIT not DEBIT: Ugh, this is going to be a hard one for me to transition to. But basically this makes it easier to recover if your account has been compromised. They drained actual money from my debit account, therefore the bank has to go track down that actual money and it’s a long process to get it back. If it’s a credit card transaction, they just void the transaction from counting against my balance, I simply wouldn’t owe them more than I legitimately owe, but they wouldn’t have to return actual money to me. {April Edit} I just saw Capital One is now offering virtual card numbers. You use a virtual number for online shopping and then your actual card number is never compromised.
Online Resources:
haveibeenpwned
how to freeze your credit
identitytheft.gov
the SIM swapping bible
prevent a SIM swap scam
delete your old email addresses
March 5th 2020,
In conclusion, I am just now wrapping up this blog because obviously this whole thing has been traumatizing and recovery is a massive work in progress. I wish I had a happy ending for y’all but I’m still cleaning this mess up. My phone is secure, my money is secure... but my credit is going to be royally screwed for some time. My accountant said at least 2 years. I ended up needing extra steps to secure my phone account, btw. They initiated 2 step authentication but I was able to bypass the second step, an 8 digit passcode, with the last 4 digits on my social security number. Get this, when I brought this up to a call center rep, they told me to get a new SSN! As if that’s a thing! Short of being in witness protection or some other person of international interest, the government is not going to issue a new SSN just to prevent my SIM from being compromised again. So I went into the store and brought this up to the manager, fortunately the same person who helped me Jan 2nd, and she was also surprised a 4 digit SSN bypassed everything. She put a priority note onto my account that says in big bold red letters something to the effect of “Do NOT make changes to this customer’s account without them being in-store providing photo ID. this is at the customer’s request” Yeah, you are correct, it is a huge pain in the ass to do stuff now... but it’s locked down. I got so many questions, “Why don’t you just change your phone provider?” and the thing is, it’s not just AT&T. This is a happening across the board and you should be concerned no matter what service you have. At least now I know my account is secure. I now have a complex money funneling system, too. It goes in one account (which I never use online or at gas stations), it gets transferred to another institution and that is the only outbound account for actual cash monies. The outbound account is not linked to the inbound account. Like a canal, only one section of money can get drained and it doesn’t compromise the whole operation. My battle is not over, though. I still have credit reports and the police report to deal with. But I hope this helps you today. Be careful out there, folks!
April 18 2020, post script: Oof, I don’t know if this article will ever really feel finished. I put off posting it because with all the COVID-19 stuff happening, I didn’t want people to panic further or add to unnecessary stress. But after hearing about a few cases of fraud in my friend group, I decided it best to post this sooner rather than later. To ease the impact I’ll be posting something fun right after this one.
0 notes
Text
Remove LJ Ross Collections From Your Credit Report
LJ Ross Associates is a debt collection agency based out of Michigan. They specialize in debt collection for medical, utilities, government, education, and financial industries. Like most debt collection agencies, they are known for rude and unprofessional behavior.
If you recently discovered LJ Ross on your credit report, and are wondering where it came from, keep in mind that LJ Ross may have purchased a debt from an original creditor and are now attempting to collect on it. This debt may not even be yours. Many times collection agencies have incorrect information, but this doesn’t stop them from attempting to collect on a debt.
How to Deal with LJ Ross Associates
The first thing to keep in mind when dealing with any collection agency is that you have certain rights that the collection agencies have to not only acknowledge, but also abide by.
Fair Debt Collection Practices Act
Collection agencies often assume that you are unaware of your rights and therefore routinely ignore them. Your right fall under the Fair Debt Collection Practices Act These rights dedicate how debt collection agencies must conduct themselves when collecting on a debt. The most important thing to take away from this law is that collection agencies cannot harass you.
In addition to being prohibited from harassing you, collection agencies are also prohibited from:
Calling you outside of 8:00am and 9:00pm local time.
Continuing to contact you after you request they stop.
Contact you at your place of employment.
Attempting to collect on a debt after you have requested validation that the debt is yours.
Threatening legal action or arrest.
Using profane language.
Threatening to report false information on your credit report.
How to Communicate with LJ Ross
When LJ Ross contacts you on the phone, first let them know that you know your rights under the Fair Debt Collection Practices Act. Secondly, request that all future communication be done via the mail. Also tell them to never contact you at your place of employment.
Many times this will catch them off guard because again, most people are simply unaware of their rights. If at any time they become abusive or combative, remind them that they are in violation of the FDCPA.
Finding LJ Ross on Your Credit Report
If you haven’t been contacted by LJ Ross, either over the phone or by mail, but you find LJ Ross on your credit report in the form of a collection, you need to make sure that it’s actually your debt.
Like I mentioned before, many debt collection agencies buy old debts with inaccurate information and it’s not uncommon that they attempt to collect from the wrong person. If you don’t recognize the debt, you need to dispute it with all three of the credit bureaus, TransUnion, Equifax, and Experian.
Once you have disputed the negative entry, they will have 30 days to investigate.
How to Remove LJ Ross From Your Credit Report
When you’re unable to remove the LJ Ross collection from your credit report by disputing the entry, you have a few more options. It’s generally easier to remove older collections than newer ones.
The problem is, debt collection agencies have been known to “re-age” accounts. This basically results in the negative entry looking much newer than it really is. Since newer collections impact your credit score more significantly, a re-aged account can really affect your ability to get a loan or get pre-approved for a mortgage.
Debt Validation
Your first option to get the entry removed from your credit report is to demand that LJ Ross validate the debt. Debt validation is another right you have under the Fair Debt Collection Practices Act. Basically you can ask that a collection agency provide you with documentation that validates the debt is actually yours. If they are unable to provide the validation documentation, they will have to stop attempting to collect the debt and remove the negative entry from your credit report.
A debt validation letter is the first thing you need to start with if you receive a collection letter from LJ Ross. Check out my debt validation letter template to get an idea of what you should write.
One potential problem you might run into is technically you only have 30 days from their first contact to get them the debt validation letter. However, that shouldn’t prevent you from sending it anyway.
Pay in Full for Deletion
If the debt validation letter wasn’t successfully because they were able to provide you with documentation that the debt is indeed yours, your next step is to offer to pay the debt if they agree to remove it from your credit report.
There are a couple of things to keep in mind when using this method. First, don’t assume you have to pay the full amount they are asking. In fact, if it’s an older debt, it’s likely they’ll accept much less than the full balance. The point is, you have room to negotiate when dealing with collection agencies.
It’s acceptable to negotiate over the phone, but once a deal has been made, make sure you get everything in writing. Never agree to pay them over the phone or give them access to your bank account. Once you have the agreement in writing, write the check and wait 30 days for them to update your credit report. If after 30 days the collection hasn’t been removed from your credit report, contact them regarding the agreement.
How I Removed LJ Ross From My Credit Report
When you have been unsuccessful in removing the LJ Ross collection from your credit report using the steps I’ve outlined above, you might want to consider having a professional remove it.
This is usually the quickest way to get negative entries removed, and it’s worked many times for me (and my readers). For this I suggest you check out Lexington Law Credit Repair. They’ll take care of you. Give them a call at 1-844-764-9809 or Check out their website.
The post Remove LJ Ross Collections From Your Credit Report appeared first on Better Credit Blog | Credit Help For Bad Credit.
from Credit Repair News https://bettercreditblog.org/lj-ross/
0 notes
Text
New Post has been published on Military Spouse
New Post has been published on http://militaryspouse.com/msoy/town-hall-2017-did-we-empower-you/
Town Hall 2017: Did We Empower YOU?
Military Spouse magazine hosted its 5th annual Town Hall sponsored by Allstate on May 11 at the Army-Navy Country Club in Arlington, Va. Five sessions throughout the day touched on a different aspect of empowerment. Check out what each panel and speaker contributed to the message.
Sponsors, How Do YOU Empower?
Moderator: Sue Hoppin, founder and president, National Military Spouse Network
Panel members:
Melissa Christmann, military program manager, Allstate
Tom Down, diversity and military talent acquisition manager, Capital One
Herrick Ross, recruiter, military talent acquisition, Starbucks
Theresa Lepow, senior program manager for military recruiting, Amazon
credit: Steve Barrett Photography
TAKEAWAYS:
“The people in the room with you today are your tribe. In a time when resources are scarce and vary from installation to installation. We have one resource that never goes away: each other. Remember that and you’ll go far.” ~Sue Hoppin
Allstate: “If your program doesn’t include military spouses you only have half of a program.”
Capital One: “We look at spouses as equally as we do veterans.”
Starbucks: “As military spouses you have the opportunity to see the world in a different way.”
Amazon: “We look to hire military spouses and then retain them and honor them. I look to build a military spouse program with a menu of options.”
Each of the representative companies championed the military spouse employee and what they can bring to the table. One key takeaway? Be proud of the fact that you’re a military spouse. Be sure to self-identify if there is an option. These companies want to know you’re a spouse. They are looking for the skills you bring to the table.
As with any other job seeker, though, be calculated and specific about what jobs you apply to. Keep your resume to one to two pages. Use your cover letter to show your personality, explain any gaps in your resume and really iterate what an important role being a military spouse is. “Your cover letter should reflect what job you’re applying for. I know it’s a lot of work, but it’s what gets you a job.”
Consider three Cs when applying for jobs: Culture, commute and compensation. How you prioritize those is up to you.
Regarding the sometimes awkward salary conversation, the panel members emphasized research and realistic expectations. Websites such as glassdoor.com and salary.com give reasonable expectations as to what number is appropriate based on job title and location. Don’t forget to take other benefits into consideration, too; the whole benefit package counts. Don’t focus on a target number. Rather, have a salary range and be flexible.
Each company differed in work from home policies. The common takeaway is to have a conversation with your manager. Company policies vary, and policies vary by specific job and manager as well.
Empower YOU Panel of Milspouses
Moderator: MJ Boice, in-house staff writer, National Military Family Association
Panel members:
Holly Vega, stay-at-home parent, 2017 Quantico Base Spouse of the Year
Brittany Boccher, advocate, 2017 Armed Forces Insurance Military Spouse of the Year
Lauren Hope, entrepreneur for-profit, 2017 United States Military Academy Spouse of the Year
Verenice Castillo, entrepreneur nonprofit, 2013 Armed Forces Insurance Air Force Spouse of the Year
Jennifer Mullen, business professional, Verizon Wireless, 2016 Armed Forces Insurance Coast Guard Spouse of the Year
credit: Steve Barrett Photography
TAKEAWAYS:
Why do you do what you do?
“We pursue this niche because we have to. I’ve strived to have my own circumstance aside from the military. I like my own identity. What that means for me is I work and have something I’m passionate about. It’s whatever is appropriate for me in that season of my life. It’s a chosen reason.” ~Mullen
“I’m not in my husband’s shadows. I’m equally beside you. I am a volunteer. I am proud to be a volunteer and serve my community wherever I go and my children get to see that.” ~Vega
“We all have a purpose. It took one day for me to start meeting families for me to realize why didn’t I choose to do this sooner? Then I started getting more involved until there was no turning back. If I was going to do this, I would do it all the way. Running a nonprofit can be crazy and overwhelming. My husband will tell me to remember why you’re doing this. It’s not about you; it’s about those who you serve. That will always be my why.” ~Castillo
How do you measure success with what you want to do?
“At the end of the day, it’s about happiness. That’s it. I don’t need accolades or recognition. It’s if I’m happy with what I did that day when I lay my head down on my pillow at night. I don’t measure success over time; it’s literally each day.” ~Boccher
“We’re all here for a reason and I’d like to know that reason. The tribe I surround myself with is success. I’m a professionally trained chef by trade. After my son was diagnosed with multiple food allergies I had to stop everything that identified me to take care of him. Life changes. Priorities change. My family comes first. I’ve had a hard time identifying with my new life. Jewelry has always been a hobby but when cooking went out and I needed another creative outlet, jewelry came in. I’m flattered and honored it’s taken off.” ~Hope
All of the panelists agreed spouses need to ask the questions about what they can do to help and have a meaningful answer when someone asks them how they can help. Junior or senior spouse, moving is still scary. Find an organization, go in and tell them what you can offer. Ensure you share a mutual vision. If visions aren’t in alignment, you’ll end up following someone else’s rather than yours. “There is someone out there with your vision and passion who will want to work you.” Also be sure to ask for a seat at an organization’s table; you might be surprised how many tell you to pull up a chair and join.
Mentorship also is important. Find at least one mentor you can talk to; these people can change based on what season of life you’re in. It’s about building a whole support system.
Do three things: Embrace military life, embrace military community and embrace opportunities afforded to you as military spouses because they are abundant.
Now that YOU’re Empowered – How to Talk to the Decision Makers
Presenter: Elizabeth Adams, Director, Ceremonies and Protocol, Air Force District Washington
credit: Steve Barrett Photography
TAKEAWAYS:
Etiquette and formal protocol is never out of style. Within 30 seconds of meeting, people have established first impressions. Wear age appropriate clothing that reflects your personality, is appropriate for the occasion and is current and fashionable – but not trendy. A little trendy is OK; a lot trendy is not.
Dining etiquette: Don’t unfold your napkin until it’s already on your lap. Then, unfold it only half. One never drinks a toast to oneself. Set a knife down on the plate with the blade facing in. Never take a bite off of a roll; rather, break off the bite you’re going to eat and butter only that.
Cell phone etiquette: Maintain a privacy range. Use your library voice. Put it on vibrate or turn it off. Do not put your phone on the dining table.
RSVP etiquette: Respond by the due date no matter what your answer is. If you must cancel, do it personally within 48 or 72 hours.
Nearly 75 percent of adults experience anxiety at a party with strangers. To help alleviate that, improve your mingling skills and small talk to find connections. Be well read and listen to the news. Focus on the other person and remember to never interrupt.
Handshaking: Shake from the elbow using two smooth pumps. Maintain a firm, but not hard, grip. Clammy hands? Own it. Avoid large rings on your right hand and wearing fragrance to be sensitive to many people who have fragrance allergies.
Empowering YOU While Keeping You Safe
Presenter: Alexandra Brown, senior consultant in the advisory services, Ernst & Young LLP
credit: Steve Barrett Photography
TAKEAWAYS:
In a world of oversharing with social media, Brown recommends following The Dinner Rule: “If you wouldn’t invite them into your home, do not have them on your social media.”
Information is power, money, safety and security. Protect yours. The C.I.A. of information is it needs to be confidential, maintain the integrity of how it was originally published and it needs to be available.
Even if you post something online and delete it, it never fully disappears (the “digital tattoo”). Think before you post anything on social media. Online photos now will exist for generations. “We have become a generation of content producers. Privacy as you know it no longer exists.” When you post a photo of your child, think about if it could come back to bite them in 10 years, or when they’re looking for a job. Will your social media post affect or hurt them in some way?
Secret apps also are prevalent these days, such as Cover Me, Calculator Photo Apps and Omegle. Monitor your child’s technology closely. Encourage your child to write in a journal using a pen and paper rather than posting their feelings online. Brown does not give her children privacy with technology, but gives them total privacy with their pen and paper journals. “They are one click from anyone in this world; most children are not equipped with the maturity to handle that.”
To avoid ransomware, which prevents a victim from accessing critical data and system function until a fee is paid to the attackers, get in the habit of once a month downloading everything on your computer to an external hard drive and then unplug the hard drive until your next update.
Consider using passphrases instead of passwords. “Criminals are smart, don’t make it easy for them.” A passphrase, for example, could be derived from saying “I like Starbucks at 2 p.m.” The passphrase is shortened to ILoveSB@2p. That’s a strong password, and very hard to hack into. “Passwords are the key to your kingdom. Protect those.”
For more information, visit Facebook.com/OPSECforFamilies.
Take Care of YOU and Empower All Generations
Presenter: Corie Weathers, Licensed Professional Counselor, 2015 Armed Forces Insurance Military Spouse of the Year
credit: Steve Barrett Photography
TAKEAWAYS:
The biggest thing Weathers hears from spouses is that they don’t know what their purpose is. “My biggest concern is spouses today are chameleons and we have an identity problem,” she says.
“How will you serve or empower anybody else if you don’t know who you are? Let your own light shine, which gives other people permission to do the same. When you stop being afraid and insecure, that’s when you have power. Not that you use over other people – power you use as influential to make a difference in other people’s lives.”
What kind of a superhero are you as a military spouse? Where are you on your superhero journey? Weathers walks through the steps each superhero takes on their journey.
Backstory. Before a superhero has a power, they have a backstory. It’s often painful, but your backstory matters to your purpose and to what makes you passionate.
Call to adventure. Some superheroes have denied their calling at first, which is a sabotage moment. It’s not about who’s against you or who you’re out to rescue; it’s about yourself, who you’ll be and what you need to do within yourself to deal with it all.
Answer the call. No one can make the choice for you if you’re going to answer a call or not; you have to answer it yourself and realize it’s worth it to move forward with messy people and a messy life. True healing happens in the backstory when you can bring purpose and meaning to what’s happened and use it to bring hope into other people’s lives.
Blessing, which comes right after internal conflict. There is always a blessing on the other side of answering a call. We fear the blessings won’t come after internal conflicts, but they do.
Establish a dual persona. Superheroes have gone through a growth. Every superhero must go home and wrestle with the fact they are different. They know something about the world and about themselves they didn’t know before. You’re ready to make an impact on the world when you realize you can be in both places. You don’t have to be fully accepted anywhere for you to accept yourself. You are you wherever you go.
Subscribe to Military Spouse's Weekly Newsletter
Connect with us on Facebook!
#cybersecurity#military etiquette#Military Spouse Employment#military spouses are super#MSOY17#Spouse Empowerment#Town Hall
0 notes
Text
Activity Internet Online Marketing Information
New Post has been published on https://myupdatesystems.com/2017/04/14/activity-internet-online-marketing-information/
Activity Internet Online Marketing Information
NETWORKING
You didn’t learn it at school, or at the office. Would you believe your mother?
Networking is more than shaking hands and giving out business cards. Forget about the endless networking skills you may have learned at the office. We just have to put the few lessons mother taught us into practice. As a kid, we were always in a hurry to find something better. Our mothers taught us patience.
If you’re in a hurry you miss the value that can be built taking time with building relations in networking. Establishing a relationship by taking time, gives you a solid framework in networking building.
Your mother worked hard as an example. This is one of the better examples in networking she gave you. That’s why it is called networking, not sit work. For networking to be successful you have to work hard and put out the effort.
Remember her telling you to share your things with others? Some of our best resources are time, money, and information we are willing to give to the relationship. They appreciate us when we are willing to give to the relationship.
She always made you clean up after yourself. In networking, follow-up is required. Whether it’s a promise to meet someone, or just a thank you is one of the most important lessons of networking. These life lessons we learned from the mother during childhood are solid bases for strong networking skills. Thank you, mother, for all your help.
The biggest time spending selling, more so in mail order or on the Internet is developing a relationship with your customer and building trust. If you did a good job in the first two, closing a sale will take the smallest of your time spend with your customer.
CARD TRANSACTIONS REPORT TO IRS
Starting in 2011, banks or other companies that process credit cards must report the amount of the payments a merchant receives on card transactions to the IRS. The law will not apply to merchants doing less than 200 transactions totalling less than $20,000.
SCREENSAVERS
If you are looking for something different remember windows has a great choice. Don’t unload any free ones from anywhere, could have bugs, and almost impossible to delete.
For windows screen savers, right click on a blank area of desktop. Click “properties”, “screen savers”. Click the arrow to the right of “screen savers” just below the monitor. Pick the one you want. For the best information for your site or to check your competitors for persons who use Google AdWords, try out the Google AdWords Keyword Tool.
ADVANCED NEWS SEARCHES
A new offering from Google – Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.
WEB PAGE TRANSLATION This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.
LIGHTSIDE
A GOOD NIGHT’S SLEEP
All the rooms were taken when the soldier got into town. After pleading with the desk clerk, the clerk remarked. “Well, I do have a double room with only one occupant, but to tell you the truth he snores so loudly that people in the adjoining room have complained. I am not sure it would be worth it to you”. “No problem.” The tired army guy assured him, “I will take it’.
When he came down for breakfast the next morning the clerk asked, “How did you sleep?” “Never better”, replied the soldier. The desk clerk was impressed. “No problem with the other guy snoring”, the clerk asked?” “No I shut him up in no time”, explained the soldier. “How did you manage that?” asked the clerk.
“Well, he was already in bed, snoring away, when I walked into the room, so I gave him a kiss on the cheek”, explained the soldier”. “Then, I whispered in his ear Good night beautiful, and he sat up all night watching me.
COMPUTER WARNING
The tip on unplugging your computer from the wall outlet during a thunderstorm was sound advice. And we’re coming to the season when thunderstorms become more frequent. But let’s take that advice one small step further. Take the time to also unplug your modem from the telephone line! Surges can also pass through the telephone lines and even a small surge of static electricity can fry the delicate circuitry in your modem.
Your Clipboard can be seen by any hacker. For your protection, you should not copy passwords, credit card numbers or other sensitive information. To prevent this from happening to go to Internet Explorer: Click Tools, Internet Options, Security tab, Internet section. Go down to the Security level box, and click the Custom Level button. Scroll down to Scripting, and find the entry, “Allow Programmatic clipboard access” or “Allow paste operations via script”. Click Disable or Prompt. Click OK.
The American Federal Bureau of Investigation (FBI) is warning that hitman scam is back in a big way. The hacker behind it is sending out a flood of emails threatening to kill the recipient if he does not receive several thousand dollars.
This scam first popped up in December 2006, then again this last February. Some personal info is included in the emails, to make it look like the crook knows all about you. The FBI advises that you just ignore the email. Report it to the Internet Crime Complaint Center.
ONLINE RENTAL FRAUD
June, August, September, January are competitive months for rental suites.
There are a lot of fraudulence ads being placed free on Craigslist etc. Crooks ply on the shortage of apartments by placing ads on these sites. When someone answers they are informed owner had to go out of the country for a funeral or what ever. They had no one that they could have left the keys with so the apartment could be checked.
Now comes the kicker. If you’re interested in renting the apartment, send $900.00 as damage deposit, and $1200.00 for the first month’s rent and the key would be courier to them.
There is a limited supply of apartments on the market, so this is a huge target for scammers.
Don’t fall for this scam. People need to do their homework, physically see the apartment, talk to the owners’ and have a written contract.
WARNING, CAR JACKERS IN MALL
CST. Eric Doran #656 Chatham – Kent Police Court Services Here’s the latest tactic by car thieves.
Heads up everyone! Please keep this circulating. You walk across the parking lot, unlock your car and get inside. You start the engine and shift into reverse when you look into the rear-view mirror to back out of your parking space. You notice a piece of paper stuck to the middle of the rear window. So, you shift into Park, unlock your doors and jump out of your car to remove that paper (or whatever it is) that is obstructing your view.
When you reach the back of your car, that is when the car jackers appear out of nowhere, jumps into your car and take off. They practically mow you down as they speed off in your car. And guess what, ladies? I bet your purse is still in the car. So now the carjacker has your car, your home address, your money, and your keys. Your home and your whole identity are now compromised!
Men, you too are at risk. You can say good bye to your briefcase, and if your like many guys, who keep their wallet in the glove compartment, with your driver’s licence, credit cards, plus.
If you see a piece of paper stuck to your back window, just drive away, remove the paper later and be thankful that you read this e-mail. I hope you will forward this to friends and family, especially to women. A purse contains all kinds of personal information and identification documents, and you certainly do NOT want this to fall into the wrong hands.
Phishing still catches millions of persons who give out their personal information, believing the e-mail they received was from a bank, PayPal, taxation branch, or some other Government Department. Further, instead of typing in the URL supplied by the Phisher they just clink on it. Just because the URL has the proper heading doesn’t mean it is going to a legit URL. In phishing they have it redirected if you click on the URL and they get your personal information.
We trust our Government to safeguard the information we give them. But did you know that the government is among the biggest sources of ID leaks and that penalties for ID theft are rarely imposed on those who are negligent.
For more information on how to protect your computer and ID theft check out the website below.
NEW WEBSITE FIGHTING CRIME
The B.C. Crime Prevention Association has just launch a new website last week. Originally set up to support law enforcement, now available to everyone.
Information on cyber bulling, resource guides, blogs, printed materials including copyright law, staking, fraud awareness, I.D.theft, senior safety, and crime-proofing property.
PROTECT YOURSELF AND YOUR COMPUTER TOO.
Internet Explorer sorts web sites for you, Internet, local Internet, trusted sites, restricted sites.
If you don’t see the slider in any zone, click the default button. For restricted sites zones, I would suggest the slider to be at the very top, on high. It is the safest way to browse. It also is the most restricted. But with all the sites that could have harmful content that may damage your computer, necessary. Don’t forget to click OK to exit.
COMPUTER SECURITY TERMS
Adware is software that causes advertising to pop up on your computer display; without your permission.
Malware is malicious software that includes viruses, spyware, and other types of harmful programs.
Badware is adware or spyware that tracks your online activities and provides that information to others without your knowledge.
Spyware is software that’s installed on your PC via downloaded programs. It transmits data to others about your business, behaviour on line.
A virus is typically a small, malicious program that can infect programs and replicate itself.
Spam, Virus, Spyware, Phishing, is still big headaches for people online. Consumers have lost over $9 billion; more then 3 million computers have had to be replaced because of viruses.
DROP SHIP, WHOLESALE
SaleHoo makes importing easy. SaleHoo is a leading directory of drop ship, wholesale, liquidation and manufacturing distributors, and presents a constant and reliable supply of wanted items. Start your importing adventure with SaleHoo, and then spread your wings over the world.
ADVANCED NEWS SEARCHES
A new offering from Google – Advanced News Search, allows visitors to scour headlines by date, location, exact phrases or publication. People can use it retrieve articles from more than 4,500 news outlets publishing on the Web.
WEB PAGE TRANSLATION
This feature is particularly helpful if your search has non-English results. Google offers a facility to auto-martially translate a page for you in English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.
Learn and Earn. Good luck.
Article Source: Bruce Chambers sold his printing, publishing, mail order business and retired in 1980. He came on the Internet in 2003. He researched for 1 year and then started a free monthly Activity Internet Marketing Report, plus free monthly Grandma Hystad’s Recipes, bar mixes, tips newsletters. At present he resells from his website.
0 notes
Text
Internet Advertising Information, Networking, Fraud Recommendations
New Post has been published on https://giveuselife.org/internet-advertising-information-networking-fraud-recommendations/
Internet Advertising Information, Networking, Fraud Recommendations
NETWORKING
You failed to examine it at school, or on the office. Would you consider your mother?
Networking is greater then shaking fingers, and giving out business playing cards. Forget approximately the infinite networking skills you can have discovered on the workplace. We simply must position the few instructions mother taught us into practice. As a kid, we have been always in a hurry to locate something better. Our mothers taught us endurance.
In case your in a hurry you leave out the cost that may be constructed taking time with building relations in networking. Organizing a dating through taking time, gives you a stable framework in networking building.
Your mom worked hard for instance. This is one of the better examples in networking she gave you. That’s why it’s miles referred to as networking, not sit paintings. For networking to achieve the success you need to work difficult and placed out the effort.
Recollect her telling you to proportion your things with others? Some of our fine assets are time, cash, and Statistics we are inclined to offer to the connection. They respect us whilst we are inclined to give to the relationship.
She always made you smooth up after yourself. In networking, comply with-up is required. Whether or not it is a promise to satisfy someone, or only a thanks is one of the most critical pieces of training of networking. Those life training we discovered from the mother at some stage in youth are strong bases for strong networking competencies. thanks mother for all your help.
The largest time spent in promoting, more so in email order or on the Internet is growing a dating along with your customer and building agree with. In case you did a very good activity within the first, closing a sale will take the smallest of your time spend with your consumer.
CARD TRANSACTIONS Record TO IRS
Starting in 2011, banks or other corporations that system credit score playing cards should File the amount of the bills a merchant gets on card transactions to the IRS. The regulation will no longer observe to traders doing much less than two hundred transactions totaling less than $20,000.
SCREENSAVERS
If you are searching out something exceptional Remember home windows has a high-quality preference. Don’t dump any unfastened ones from anywhere, could have insects, and nearly impossible to delete.
For windows display screen savers, right click on a clean vicinity of the computer. click “properties”, “display savers”. click on the arrow to the right of “display savers” simply underneath the screen. Choose the one you need. For the pleasant Facts for your web page or to test your competition for individuals who use Google AdWords, strive out the Google AdWords Keyword Device.
simply input Keyword and select from 4 possible statistics show sorts. Superior News SEARCHES
A new presenting from Google – Superior Information Seek, lets in site visitors to scour headlines via date, region, specific terms or e-book. People can use it retrieve articles from greater than 4,500 News outlets publishing on the Internet.
Net Page TRANSLATION This feature is specifically useful In case your Seek has non-English effects. Google offers a facility to car-martially translate a Page for you in English. Currently, Google helps Italian, French, Spanish, German, and Portuguese languages.
LIGHTSIDE
an awesome Night’S SLEEP
All of the rooms have been taken while the soldier was given into city. After pleading with the table clerk, the clerk remarked. “Properly, I do have a double room with simplest one occupant, however, to inform you the fact he snores so loudly that Humans in the adjacent room have complained. I am not certain it would be really worth it to you”. “No hassle.” The tired navy man assured him, “I will take it’.
when he got here down for breakfast the subsequent morning the clerk asked, “How did you sleep?” “Never better”, spoke back the soldier. The desk clerk was inspired. “No trouble with the alternative man loud night breathing”, the clerk asked?” “No I shut him up right away”, defined the soldier. “How did you manipulate that?” asked the clerk.
“Nicely, he changed into already in bed, loud night breathing away, once I walked into the room, so I gave him a kiss on the cheek”, explained the soldier”. “Then, I whispered in his ear Properly Night time lovely, and he sat up all Night watching me.
Laptop Caution
The top on unplugging your Pc from the wall outlet during a thunderstorm was a sound recommendation. And we’re coming to the season whilst thunderstorms become extra common. but let’s take that advice one small step similarly. Take the time to also unplug your modem from the cellphone line! Surges also can pass via the smartphone lines and even a small surge of static strength can fry the sensitive circuitry in your modem.
Your Clipboard may be seen by way of any hacker. on your protection, you need to not copy passwords, credit score card numbers or different sensitive Statistics. To prevent this from going on go to Internet Explorer: click on Gear, Net Options, Protection tab, Internet segment. Go down to the security degree box, and click on the Custom level button. Scroll right down to Scripting, and find the access, “Permit Programmatic clipboard to get admission to” or “Allow paste operations through script”. click Disable or Spark off. click Adequate.
The Yankee Federal Bureau of Research (FBI) is Warning that hitman rip-off is again in a massive way. The hacker at the back of its miles sending out a flood of eye emails threatening to kill the recipient if he does now not receive several thousand dollars.
This rip-off first popped up in December 2006, then again this ultimate February. A few non-public information is protected in the e-mails, to make it appear like the criminal knows all approximately you. The FBI advises that you simply forget about e-mail. File it to the Internet Crime Grievance Middle.
On-line Apartment FRAUD
June, August, September, January are aggressive months for Condo suites.
There are loads of fraudulence commercials being located free on Craigslist etc. Crooks ply on the dearth of residences by way of putting advertisements on Those websites. while someone answers they may be knowledgeable owner needed to go out of u. St . for a funeral or whatever. They’d no one that they could have left the keys with so the condo can be checked.
Now comes the kicker. In case you’re inquisitive about renting the apartment, ship $900.00 as harm deposit, and $1200.00 for the first month’s rent and the key Would be courier to them.
There is a constrained supply of flats available on the market, so That is a huge goal for scammers.
Do not fall for this scam. Human beings want to do their homework, physically see the apartment, talk to the proprietors’ and feature a written agreement.
Warning, Automobile JACKERS IN MALL
CST. Eric Doran #656 Chatham – Kent Police Court docket Offerings Right here’s the modern day tactic by Automobile thieves.
Heads up all and sundry! Please keep this circulating. You stroll throughout the parking lot, liberate your Car and get internal. You start the engine and shift into reverse while you look at the rear-view reflect to again out of your parking area. You are aware a chunk of paper stuck to the middle of the rear window. So, you shift into Park, release your doors and soar from your Automobile to remove that paper (or whatever it is) this is obstructing your view.
when you attain the back of your Vehicle, that is when the car-jackers appear out of nowhere, jumps into your Car and take off. They almost mow you down as they speed off to your Car. And bet what, ladies? I bet your purse continues to be inside the Vehicle. So now the carjacker has your Car, your private home cope with, your cash, and your keys. your property and your complete identity at the moment are compromised!
Men, you too are in danger. You can say True by in your briefcase, and In case you’re like many men, who keep their pockets inside the glove compartment, along with your driving force’s license, credit score playing cards, plus.
If you see a chunk of paper caught on your returned window, simply power away, do away with the paper later and be grateful that you read this I hope you may forward this to buddies and own family, specifically to women. A handbag includes all kinds of personal Information and identity files, and also you clearly do not want this to fall into the incorrect fingers.
Phishing still catches tens of millions of people who deliver out their non-public Information, believing they acquired become from a bank, PayPal, taxation branch, or Some different Authorities Branch. similarly, instead of typing within the URL furnished by the Phisher, they simply clink on it. simply because the URL has the proper heading doesn’t mean it is going to a respectable URL. In phishing, they have got it redirected If you click on at the URL and they get your non-public Facts.
We trust our Government to guard the Information we provide them. but did that the Government is among The most important assets of Identification leaks and that consequences for Identity robbery are not often imposed on individuals who are negligent.
For greater Statistics on the way to guard your Computer and Identity theft take a look at out the website below.
NEW internet site Preventing CRIME
The B.C. Crime Prevention Affiliation has just released A brand new internet site an ultimate week. Originally set up to help law enforcement, now available to every person.
Statistics on cyberbullying, aid courses, blogs, revealed materials consisting of copyright law, stalking, fraud consciousness, I.D.robbery, senior protection, and crime-proofing property.
defend yourself AND YOUR Pc TOO.
Net Explorer sorts Web websites for you, Internet, neighborhood Internet, depended on websites, restricted sites.
In case you Don’t see the slider in any sector, click the default button. For restricted websites zones, I would recommend the slider to be at the very pinnacle, on high. it is the most secure way to browse. It is also the most confined. however with All of the sites that might have dangerous content that could harm your Pc, essential. Bear in mind to click on Adequate to exit.
Computer Protection Phrases
Adware is software that reasons marketing to pop up in your Computer display; without your permission.
Malware is malicious software that consists of viruses, adware, and other styles of dangerous packages.
Badware is Spyware or adware that tracks your Online sports and offers that Data to others without your information.
spyware is software That is established in your Laptop thru downloaded applications. It transmits statistics to others about your enterprise, behavior on-line.
A plague is typically a small, worm that could infect packages and reflect itself.
Junk email, Virus, adware, Phishing, remains large headaches for Humans Online. Purchasers have misplaced over $9 billion; extra than three million computers have needed to be replaced due to viruses.
DROP Deliver, WHOLESALE
SaleHoo makes importing easy. SaleHoo is a leading listing of drop Ship, wholesale, liquidation and manufacturing vendors, and offers a regular and reliable supply of wanted objects. start your uploading adventure with SaleHoo, and then spread your wings over the world.
Advanced Information SEARCHES
A brand new providing from Google – Superior News network Search, lets in traffic to scour headlines through the date, location, precise terms or publication. People can use it retrieve articles from greater than four,500 Information stores publishing on the Internet.
Internet Page TRANSLATION
This option is especially beneficial If your Seek has non-English results. Google offers a facility to auto-martially translate a Web page for you to English. Currently, Google supports Italian, French, Spanish, German, and Portuguese languages.
research and Earn. Suitable good fortune.
Article Supply: Bruce Chambers offered his printing, publishing, e-mail order commercial enterprise and retired in 1980. He came on the Internet in 2003. He researched for 1 12 months, after which started out a loose monthly Activity Net Marketing Document, plus free month-to-month Grandma Hystad’s Recipes, bar mixes, Suggestions newsletters. At gift, he resells from his internet site.
0 notes