Tuesday, May 19, 2009

STOP DEBT COLLECTORS IN THEIR TRACKS

STOP DEBT COLLECTORS IN THEIR TRACKS

The Federal Fair Debt Collection Practices Act was enacted to stop abusive, deceptive, and unfair debt collection practices by debt collectors. If you believe you have been the victim of unfair practices of a debt collector, contact WeStopDebtCollectors.com for a FREE* evaluation of your debt collection issues.

Under debt collection laws, you may be entitled to money damages AND payment of your attorneys’ fees, if a debt collector has violated the law.

You Have the Right to Stop Debt Collectors from Harassing or Abusing

Yes, the law protects you against unfair and coercive debt collection methods. You must know how the law can protect you and help you keep him in check.

A Debt Collector CANNOT:

  • Telephone you an unreasonable number of times
  • Telephone you at an unusual time/ unusual place
  • Disclose information of your debts to third parties
  • Use profane or other abusive language
  • Contact you after written notification that you do not want to be contacted any further
  • Claim to be affiliated with any governmental organization
  • Misrepresent the character, amount or legal status of a debt
  • Threaten of to take any action that cannot be taken legally
  • Accuse you having committed a crime
  • Threaten or communicate false credit information
  • Attempt to collect, until he honors your request to validate
  • Use deceptive methods to collect debts
  • Call you before 8:00 a.m. or after 9:00 p.m.
  • Call you, but not announce who he/she is

Friday, February 13, 2009

Yes, You Can Dodge Google

Most companies judge their success based on how high they can rank on a Google search. But not everyone wants to be found by search engines. (Think members-only sites like Gilt Groupe. Or individuals who actually value their privacy.)

Confidentiality crusaders, rejoice. A small crop of companies makes a business out of helping you hide. File-sharing service Drop.io, for one, stores personal information on web pages that don't turn up on search engines. Users create web pages called "drops" that they can selectively distribute. Drop.io's technology is based on a theory called "casual privacy," which is a bit like leaving your house key under the doormat. The key is safe because only you and friends know to look for it there. Drop.io ensures that the content of its drops isn't tagged, so Google's crawlers can't find it.

The tool is catching on with businesses. MTV Networks International's PR department uses Drop.io to share news releases. The documents are somewhere out thee on the web, but they're un-Google-able.

Sunday, February 8, 2009

HOW WEB SEARCHES CAN DESTROY YOUR PRIVACY

How Web Searches Can Destroy Your Privacy

When you search for information online, you're not the only one who learns something. Microsoft retains data identifying your search--including the words and sites you searched for, and the time and date--for 18 months. Google keeps this data for nine months. In response to pressure from privacy advocates, Yahoo recently dropped its data-retention time to 90 days.

Because searches can be traced to you by name through your computer's IP address (the unique identifying number assigned to all computers to access the Web), Internet search companies have a detailed profile of your personal interests and tastes. Experts worry that this private data could be misused.

In 2006, America Online (AOL) shared the search records of 658,000 users with academics for research purposes. Even though AOL tried to protect the identities of its users, some data were able to be linked back to specific individuals.

"What if every phone conversation you had was recorded and used to make decisions about you?" asks Paul Stephens of the Privacy Rights Clearinghouse, a consumer-advocacy organization. "Your searches may provide information that's just as personal, such as illnesses you are researching."

"Consumers have no control over how their most intimate data are used," says Marc Rotenberg, executive director of the Electronic Privacy Information Center. Currently, there are no comprehensive laws that provide privacy protection for data submitted to search engines. Should search data be private?

Monday, February 2, 2009

LEAVE VOICEMAIL WITHOUT THEM PICKING UP

Slydial allows you to leave someone a message on his/hercell phone without talking directly to him. Just call 267-sly-dial (267-759-3425), listen to an ad and enter the cell-phone number you want to call.

You will be automatically connected to the person's voice mail. Slydial's phone number is a Pennsylvania number, so you will be charged for a call to Pennsylvania. If you would rather not listen to an ad, you can pay $4.95 a month, or $29.95 a year, for premium service.

www.slydial.com

Tuesday, January 20, 2009

HOW TO RETRIEVE A LETTER YOU MAILED BY MISTAKE

How to Retrieve A Letter You Mailed By Mistake

Believe it or not, you can retrieve a letter you've already mailed. All you have to do is go to the post office and file a Sender's Application for Recall of Mail. The service is absolutely free. But hurry. Your chances are best if you contact the post office before the mail is collected from the mailbox.

Thursday, January 1, 2009

TRACK EMAIL MESSAGES

When you send a important private email to your friend,you always wonder whether the sent email has been read or not.If it is read then you will be waiting for the reply or you may be thinking that your friend ignored you! How do you track all these ? By using a free email tracking service called as SpyPig.

track_send_email_spypig Track email messages - Find out if Your Friend Have Read the Sent Email Spypig is a email tracking system which acts as a spy system where you will get a notification email as soon as the recipient opens and reads your message. So no more guessing if your friend did open your mail and read it then you will be notified through a mail.You have to visit the SpyPig website and fill your email address,recipient’s name,message and select a tracking image then you are ready to begin.Copy the tracking image and paste it into your email message and send the mail.

How SpyPig tracks and notifies if the email was read ?

When you send a mail by activating Spypig and when your friend opens the mail then a tracking image will be automatically downloaded from SpyPig’s server which will trigger the action “email read” alert on their system and a notification email will be sent to you.

Remember that both you and the recipient must use an HTML-formatted email, not a plain-text or rich-text formatted email.You can also send the group emails to friend and you will get up to 5 notifications on whether the email was read or not.

SpyPig works with windows XP OS platform with wen browsers like Internet Explorer 6, Firefox 2+, Outlook 2003 and Web based email clients (Yahoo! Mail, GMail,AOL Mail, Hotmail, etc.). It was not tested on Mac,Linux OS but it will still work on those platforms.

Go on and track email messages!

Can Our Cell Phones Track Us?

"Can a government agency use cell phones as eavesdropping bugs? ...if the phone is on or off?"

Generally speaking, if the cell phone is truly off (no power applied), then it is useless as a surveillance device... unless it has been specially modified.

If it is "on," but not being used in an active phone call (in standby mode) then it can be used to track the phone's location in many service areas.

I am not aware of remote turn-on of microphones (as a normal feature) in any except GSM type cell phones. If this is a concern there are two solutions: Keep the phone turned off and/or remove the battery when not in use, or keep your phone into a special radio-frequency shielded pouch so it can't communicate.

This is not to say cell phones have not been used as bugs. Modified spy phones are being sold on the Internet. The look like regular cell phones. They work like regular cell phones. But... they allow an eavesdropper to call the phone (silently) and listen into on-going calls and anyone speaking near the phone - even when it is not in use!