Tag: Mail

  • Detect Letter Bombs Packages

    Now Terrorism is using ingenious techniques, it is better to be prudent to know about how to detect them.

    One need not be a President to be on the hit list of terrorists, they are well protected any way, at our expense.

    It is ordinary Joes like and me are affected and for the Terrorists it is a terror tactic.

    Detect Letter Bombs.

    Detecting Suspiscious [sic] Packages / Letters

    Mail Bomb.
    Mail Bomb.

    *REMEMBER*

    The item does not have to be
    delivered by a carrier. Most
    bombers set up and deliver the
    bomb themselves.

    1. If delivered by carrier, inspect for
    lumps, bulges, or protrusions,
    without applying pressure.

    2. If delivered by carrier, balance
    check if lopsided or heavy sided.

    3. Handwritten addresses or labels
    from companies are improper.
    Check to see if the company exists
    and if they sent a package or letter.

    4. Packages wrapped in string are
    automatically suspicious, as modern
    packaging materials have eliminated
    the need for twine or string.

    5. Excess postage on small packages or
    letters indicates that the object was
    not weighed by the Post Office.

    6. No postage or non-canceled postage.

    7. Any foreign writing, addresses, or
    postage.

    8. Handwritten notes, such as: “To Be
    Opened in the Privacy of”
    “CONFIDENTIAL” – “Your Lucky Day
    is Here” – “Prize Enclosed”.

    9. Improper spelling of common names,
    places, or titles.

    10. Generic or incorrect titles.

    11. Leaks, stains, or protruding wires,
    string, tape, etc.

    12. Hand delivered or dropped off for a
    friend packages or letters.

    13. No return address or nonsensical return
    address.

    14. Any letters or packages arriving before
    or after a phone call from an unknown
    person asking if the item was received.

    15. If you have a suspicious letter or
    package, Call Emergency Police helpline.

    Bombs

    Bombs can be constructed to look
    like almost anything and can be
    placed or delivered in any number of
    ways. The probability of finding a
    bomb that looks like the
    stereotypical bomb is almost
    nonexistent. The only common
    denominator that exists among
    bombs is that they are designed or
    intended to explode.

    Most bombs are homemade and are
    limited in their design only by the
    imagination of, and resources
    available to, the bomber. Remember,
    when searching for a bomb, suspect
    anything that looks unusual. Let the
    trained bomb technician determine
    what is or is not a bomb.

    Those who can afford may buy Mail Bomb Detector.

    .Mail Bomb.
    Mail Bomb Detector.
    • Excellent discrimination between potentially dangerous contents and paper clips, staples and metal tags
    • Designed for use by secretaries, receptionists and mailroom staff without any requirement for special training
    • Reliable and easy to use with negligible false alarm rate

    SCANMAIL 10K is a new generation microprocessor-controlled mail screener which will reliably screen all your mail and courier deliveries up to about telephone directory size.

    It will detect virtually all known letterbomb detonating devices regardless of the type of explosive used, whether plastic or otherwise. SCANMAIL 10K is specifically programmed to automatically alarm on packages containing potentially dangerous contents, such as explosive devices, whilst reliably ignoring the normal office stationary items contained in your mail such as paperclips, staples and metal tags.

    This high level of selectivity is achieved without any loss of the forensic standard protection it provides. The sensitivity level is set at the factory and cannot be reduced by its users. A special test card is supplied to allow customers to check the correct functioning of the unit each time it is switched on. In this way there is no false sense of security.

    SCANMAIL 10K employs simple touch pad operation and requires no specialist training. It will run off an ordinary mans socket and also incorporates its own internal battery should your mains power fail. The unit is completely portable and takes up as little valuable desk space as normal office printers or mailroom scales. In addition, it is completely safe to use and does not damage camera film, magnetic tape nor computer discs.

    http://www.intpro.co.uk/scanna.htm

    http://publicintelligence.net/atf-letter-and-package-bomb-detection-brochure/

  • How To Identify Phishing.

    What is Phishing?

     It’s an e-mail sent to you and hundreds of thousands of others with a message that tries to trick you into revealing sensitive personal information, such as passwords, banking information, your Social Security number, your mother’s maiden name, your date of birth and more. They  to hijack your assets, steal your identity or even open credit card accounts in your name.

    The plea in the e-mail may try to warn you of danger, offer you something for free or entice you with sexy or nude photos or videos of famous people.

    Don’t Click the link or even open the mail, if you do not know the sender.

    How to Spot Phishing Mail.

    Check the spelling
    Scammers are notorious for their lack of basic spelling and grammar skills. Look for misspelled words and incomplete or awkwardly written sentences.

    Who signed it?
    If it’s a legitimate e-mail from a business, it will be signed with a person’s name and contact information, but if it signs off with something vague, such as “Customer Support,” be wary.

    Screaming in CAPS.

    Be especially aware of e-mails that try to get your attention by using all capital letters, especially in the subject line.

    The e-mail has an executable attachment
    Never download an attachment unless you are sure it’s legitimate. 

     The e-mail has a link to a Web site
    Don’t ever provide this information if you got on the site by clicking a link in an e-mail.
    Do nor respond to a scam email

    Have WOT to warn you of the sites.

    Have Antivirus Soft ware installed,Norton, McAfee, Avasti, AVG,Kaspersky,Avira, ESET.

  • Can’t track Blackberry, Gmail: DoT

     

    ‘Enemy of The State’ is a favorite movie of mine. I was watching it(second time) yesterday.

    I wanted to write on the subject of privacy,National Protection and National Security.

    Now , as I sit down to write down on this,I find this funny gem,where an emerging giant of an industrial power unable to track G mail,Blackberry story has been going around for quite some time now.(read my blog on ‘no technology for 3G under Technology)

    Instead i am producing here below links on tracking electronic mail.

    I have deferred my decision on National Security for the time being,

    India‘s Department of Telecommunications (DoT) has given up on Blackberry – saying it cannot track about 15 communication services including Gmail and other email services. Nothing new was decided at a high-level meeting where India’s top security officials were present. The DoT understands the only option would be to build technologies for intelligence agencies for monitoring and interception purposes. It was pointed out by the DoT that in most countries, intelligence agencies build their own monitoring and interception capabilities, where feedback is provided by telcos. But, the Home Ministry has asked the service providers to ensure their services can be tracked on a real-time basis.
    DoT sources said: “The DoT has come to a conclusion that to track blackberry services and intercepting encrypted communication, security agencies must build capabilities of decrypting the intercepted communication. The ball is now in the Home Ministry’s court as it has to decide whether to ban such communications now.” The services listed by the DoT were video chats, internet telephony calls and push emails on high-end handsets.

    Related:

    E-mail tracking is a method for monitoring the e-mail delivery to intended recipient. Most tracking technologies utilize some form of digitally time-stamped record to reveal the exact time and date that your e-mail was received or opened, as well the IP address of the recipient.

    E-mail tracking is useful when the sender wants to know if the intended recipient actually received the e-mail, or if they clicked the links. However, due to the nature of the technology, e-mail tracking cannot be considered an absolutely accurate indicator that a message was opened or read by the recipient.

    Most e-mail marketing software provides tracking features, some

    times in aggregate (e.g. click-through rate), and sometimes on an individual basis.

    Read-receipts

    Some e-mail applications, such as Microsoft Office Outlook, employ a read-receipt tracking mechanism. The sender selects the receipt request option prior to sending the message, and then upon sending, each recipient has the option of notifying the sender that the message was received and/or read by the recipient.

    However, requesting a receipt does not guarantee that you will get one, for several reasons. Very few e-mail applications or services support read receipts, and users can generally disable the functionality if they so wish. Those that do support it aren’t necessarily compatible with or capable of recognizing requests from a different e-mail service or application. Generally read receipts are only useful within an organization where all employees/members are using the same email service and application.

    Depending on the recipient’s mail client and settings, they may be forced to click a notification button before they can move on with their work. Even though it is an opt-in process, a recipient may consider it inconvenient, discourteous, or invasive.

    Read receipts are sent back to your Inbox as e-mail messages. Additional technical information, such as who it is from, the e-mail software they use, and the IP addresses of the sender and their e-mail server is available inside the Internet headers of the read receipt.

    The technical term for these is MDN – Message Disposition Notifications, and they are requested by inserting one or more of the following lines into the email headers: X-Confirm-Reading-To: Disposition-Notification-To: or Return-Receipt-To:

    Return-receipts

    Main article: Return receipt#E-mail

    Another kind of receipt can be requested, which is called a DSN (delivery status notification), which is a request to the recipients email server to send you a notification about the delivery of an email you’ve just sent. The notification takes the form of an email, and will tell you if your delivery succeeded, failed, got delayed, or will warn you if any email server involved was unable to give you a receipt. DSN’s are requested at the time of sending by the sending application or server software (not anyplace inside the email or headers itself), and you can request to “Never” get any, or to “Always” get one, or (which most software does by default) only to get DSN if delivery fails (i.e.: not for success, delay, or relay DSNs). These failure DSNs are normally referred to as a “Bounce”. Additionally, you can specify in your DSN request whether you want your receipt to contain a full copy of your original email, or just a summary of what happened. In the SMTP protocol, DSNs are requested at the end of the RCPT TO: command (e.g.: RCPT TO:<> NOTIFY=SUCCESS,DELAY) and the MAIL FROM: command (e.g.: MAIL FROM:<> RET=HDRS)

    E-mail marketing and tracking

    Some e-mail marketing tools include tracking as a feature. Such e-mail tracking is usually accomplished using standard web tracking devices known as cookies and web beacons. When you send a tracked e-mail message, if it’s a graphical HTML message (not a plain text message) the e-mail marketing system may embed a tiny, invisible tracking image (a single-pixel gif, sometimes called a web beacon) within the content of the message. When the recipient opens the message, the tracking image is referenced. When they click a link or open an attachment, another tracking code is activated. In each case a separate tracking event is recorded by the system. These response events accumulate over time in a database, enabled the e-mail marketing software to report metrics such as open-rate and click-through rates. E-mail marketing users can view reports on both aggregate response statistics and individual response over time.

    http://www.telecomnewsindia.com/2011/03/cant-track-blackberry-gmail-dot.html

    Our StreamSend Email Marketing software includes programs that provide email tracking, email reporting and email monitoring.  Now, with our email reporting program, you can see the results of your online marketing campaigns in real-time. Plus, with email tracking, you can monitor email delivery to intended recipients, to make sure that all your email marketing campaign materials have been delivered according to your specifications. Utilizing the latest in email tracking technology, our software features a digital time-stamp to reveal exactly when your email was received and opened. In addition, you can track and flag invalid email addresses automatically.

    You can strategically review all your email marketing campaigns with the help of our email reporting program. So simple, it allows you to track click-through performance in terms of the total number of clicks and click-throughs for all the links within your email. You can even select up to five campaigns to compare, and then monitor their progress over time. Plus, our domain tracking features allow you to view the statistics on the top 100 domains on your mailing list.

    Email monitoring

    With our email monitoring services, you can customize your email marketing campaign to increase its potential for success. Track your click-to-conversion results, analyze your return on investment, and get easy integration with Google Analytics. By reviewing the email tracking and reporting data available through Google Analytics, you can prepare better, more targeted email advertisements, strengthen marketing initiatives and increase your conversion click-through ratio.

    For more information on our email marketing software that includes email tracking, reporting and monitoring, contact us at 877-439-4078, ext. 1.For free Download Clock Link below:

    http://www.streamsend.com/email-tracking-reporting.htm