Your Links

MEMPERCEPAT PERFORMA MODEM KAMU

You can't assume that just because you connected at a speed like 48.3KBps that you will stay there. Today's modems automatically fall back to a lower speed if the line noise is too high to maintain a faster connection, but sometimes they fall back too soon or too far.

Here's how to do it:


Click Start the button.
Select Settings.
Click Control Panel.
Double-click on the Modems icon.
Select your modem.
Click the Properties button.
Click the Connections tab.
Click the Advanced button.
In the "Extra settings" field, type S36=7
Click OK to save your settings.


This will force your modem to try to stay connected at high speeds in two different ways before dropping back to an asynchr
read more “MEMPERCEPAT PERFORMA MODEM KAMU”

HOW TO FIND SERIAL NUMBER IN GOOGLE

ok, this is a little trick that i usually use to find cd keys with google.


if your looking for a serial number for nero (for example) goto google.com and type nero 94FBR and it'll bring it up

this works great in google

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things.

1)The pages that are returned are pages dealing specifically with the product you're wantinga serial for.

2)Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.


I hope this trick help you finding your ccd keys easily

Enjoy :)
read more “HOW TO FIND SERIAL NUMBER IN GOOGLE”

KEY BOARD SHORTCUT

Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

[Alt] and [Esc] Switch between running applications

[Alt] and letter Select menu item by underlined letter

[Ctrl] and [Esc] Open Program Menu

[Ctrl] and [F4] Close active document or group windows (does not work with some applications)

[Alt] and [F4] Quit active application or close current window

[Alt] and [-] Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

[F1] Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box



acessability shortcuts

Right SHIFT for eight seconds........ Switch FilterKeys on and off.

Left ALT +left SHIFT +PRINT SCREEN....... Switch High Contrast on and off.

Left ALT +left SHIFT +NUM LOCK....... Switch MouseKeys on and off.

SHIFT....... five times Switch StickyKeys on and off.

NUM LOCK...... for five seconds Switch ToggleKeys on and off.

explorer shortcuts

END....... Display the bottom of the active window.

HOME....... Display the top of the active window.

NUM LOCK+ASTERISK....... on numeric keypad (*) Display all subfolders under the selected folder.

NUM LOCK+PLUS SIGN....... on numeric keypad (+) Display the contents of the selected folder.

NUM LOCK+MINUS SIGN....... on numeric keypad (-) Collapse the selected folder.

LEFT ARROW...... Collapse current selection if it's expanded, or select parent folder.

RIGHT ARROW....... Display current selection if it's collapsed, or select first subfolder.




Type the following commands in your Run Box (Windows Key + R) or Start Run

devmgmt.msc = Device Manager
msinfo32 = System Information
cleanmgr = Disk Cleanup
ntbackup = Backup or Restore Wizard (Windows Backup Utility)
mmc = Microsoft Management Console
excel = Microsoft Excel (If Installed)
msaccess = Microsoft Access (If Installed)
powerpnt = Microsoft PowerPoint (If Installed)
winword = Microsoft Word (If Installed)
frontpg = Microsoft FrontPage (If Installed)
notepad = Notepad
wordpad = WordPad
calc = Calculator
msmsgs = Windows Messenger
mspaint = Microsoft Paint
wmplayer = Windows Media Player
rstrui = System Restore
netscp6 = Netscape 6.x
netscp = Netscape 7.x
netscape = Netscape 4.x
waol = America Online
control = Opens the Control Panel
control printers = Opens the Printers Dialog


internetbrowser

type in u're adress "google", then press [Right CTRL] and [Enter]
add www. and .com to word and go to it


For Windows XP:

Copy. CTRL+C
Cut. CTRL+X
Paste. CTRL+V
Undo. CTRL+Z
Delete. DELETE
Delete selected item permanently without placing the item in the Recycle Bin. SHIFT+DELETE
Copy selected item. CTRL while dragging an item
Create shortcut to selected item. CTRL+SHIFT while dragging an item
Rename selected item. F2
Move the insertion point to the beginning of the next word. CTRL+RIGHT ARROW
Move the insertion point to the beginning of the previous word. CTRL+LEFT ARROW
Move the insertion point to the beginning of the next paragraph. CTRL+DOWN ARROW
Move the insertion point to the beginning of the previous paragraph. CTRL+UP ARROW
Highlight a block of text. CTRL+SHIFT with any of the arrow keys
Select more than one item in a window or on the desktop, or select text within a document. SHIFT with any of the arrow keys
Select all. CTRL+A
Search for a file or folder. F3
View properties for the selected item. ALT+ENTER
Close the active item, or quit the active program. ALT+F4
Opens the shortcut menu for the active window. ALT+SPACEBAR
Close the active document in programs that allow you to have multiple documents open simultaneously. CTRL+F4
Switch between open items. ALT+TAB
Cycle through items in the order they were opened. ALT+ESC
Cycle through screen elements in a window or on the desktop. F6
Display the Address bar list in My Computer or Windows Explorer. F4
Display the shortcut menu for the selected item. SHIFT+F10
Display the System menu for the active window. ALT+SPACEBAR
Display the Start menu. CTRL+ESC
Display the corresponding menu. ALT+Underlined letter in a menu name
Carry out the corresponding command. Underlined letter in a command name on an open menu
Activate the menu bar in the active program. F10
Open the next menu to the right, or open a submenu. RIGHT ARROW
Open the next menu to the left, or close a submenu. LEFT ARROW
Refresh the active window. F5
View the folder one level up in My Computer or Windows Explorer. BACKSPACE
Cancel the current task. ESC
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Use these keyboard shortcuts for dialog boxes:

To Press
Move forward through tabs. CTRL+TAB
Move backward through tabs. CTRL+SHIFT+TAB
Move forward through options. TAB
Move backward through options. SHIFT+TAB
Carry out the corresponding command or select the corresponding option. ALT+Underlined letter
Carry out the command for the active option or button. ENTER
Select or clear the check box if the active option is a check box. SPACEBAR
Select a button if the active option is a group of option buttons. Arrow keys
Display Help. F1
Display the items in the active list. F4
Open a folder one level up if a folder is selected in the Save As or Open dialog box. BACKSPACE

If you have a Microsoft Natural Keyboard, or any other compatible keyboard that includes the Windows logo key and the Application key , you can use these keyboard shortcuts:


Display or hide the Start menu. WIN Key
Display the System Properties dialog box. WIN Key+BREAK
Show the desktop. WIN Key+D
Minimize all windows. WIN Key+M
Restores minimized windows. WIN Key+Shift+M
Open My Computer. WIN Key+E
Search for a file or folder. WIN Key+F
Search for computers. CTRL+WIN Key+F
Display Windows Help. WIN Key+F1
Lock your computer if you are connected to a network domain, or switch users if you are not connected to a network domain. WIN Key+ L
Open the Run dialog box. WIN Key+R
Open Utility Manager. WIN Key+U

accessibility keyboard shortcuts:

Switch FilterKeys on and off. Right SHIFT for eight seconds
Switch High Contrast on and off. Left ALT+left SHIFT+PRINT SCREEN
Switch MouseKeys on and off. Left ALT +left SHIFT +NUM LOCK
Switch StickyKeys on and off. SHIFT five times
Switch ToggleKeys on and off. NUM LOCK for five seconds
Open Utility Manager. WIN Key+U

shortcuts you can use with Windows Explorer:


Display the bottom of the active window. END
Display the top of the active window. HOME
Display all subfolders under the selected folder. NUM LOCK+ASTERISK on numeric keypad (*)
Display the contents of the selected folder. NUM LOCK+PLUS SIGN on numeric keypad (+)
Collapse the selected folder. NUM LOCK+MINUS SIGN on numeric keypad (-)
Collapse current selection if it's expanded, or select parent folder. LEFT ARROW
Display current selection if it's collapsed, or select first subfolder. RIGHT ARROW
read more “KEY BOARD SHORTCUT”

BANDWIDTH EXPLAINED

Most hosting companies offer a variety of bandwidth options in their plans. So exactly what is bandwidth as it relates to web hosting? Put simply, bandwidth is the amount of traffic that is allowed to occur between your web site and the rest of the internet. The amount of bandwidth a hosting company can provide is determined by their network connections, both internal to their data center and external to the public internet.


Network Connectivity

The internet, in the most simplest of terms, is a group of millions of computers connected by networks. These connections within the internet can be large or small depending upon the cabling and equipment that is used at a particular internet location. It is the size of each network connection that determines how much bandwidth is available. For example, if you use a DSL connection to connect to the internet, you have 1.54 Mega bits (Mb) of bandwidth. Bandwidth therefore is measured in bits (a single 0 or 1). Bits are grouped in bytes which form words, text, and other information that is transferred between your computer and the internet.

If you have a DSL connection to the internet, you have dedicated bandwidth between your computer and your internet provider. But your internet provider may have thousands of DSL connections to their location. All of these connection aggregate at your internet provider who then has their own dedicated connection to the internet (or multiple connections) which is much larger than your single connection. They must have enough bandwidth to serve your computing needs as well as all of their other customers. So while you have a 1.54Mb connection to your internet provider, your internet provider may have a 255Mb connection to the internet so it can accommodate your needs and up to 166 other users (255/1.54).


Traffic

A very simple analogy to use to understand bandwidth and traffic is to think of highways and cars. Bandwidth is the number of lanes on the highway and traffic is the number of cars on the highway. If you are the only car on a highway, you can travel very quickly. If you are stuck in the middle of rush hour, you may travel very slowly since all of the lanes are being used up.

Traffic is simply the number of bits that are transferred on network connections. It is easiest to understand traffic using examples. One Gigabyte is 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. To put this in perspective, it takes one byte to store one character. Imagine 100 file cabinets in a building, each of these cabinets holds 1000 folders. Each folder has 100 papers. Each paper contains 100 characters - A GB is all the characters in the building. An MP3 song is about 4MB, the same song in wav format is about 40MB, a full length movie can be 800MB to 1000MB (1000MB = 1GB).

If you were to transfer this MP3 song from a web site to your computer, you would create 4MB of traffic between the web site you are downloading from and your computer. Depending upon the network connection between the web site and the internet, the transfer may occur very quickly, or it could take time if other people are also downloading files at the same time. If, for example, the web site you download from has a 10MB connection to the internet, and you are the only person accessing that web site to download your MP3, your 4MB file will be the only traffic on that web site. However, if three people are all downloading that same MP at the same time, 12MB (3 x 4MB) of traffic has been created. Because in this example, the host only has 10MB of bandwidth, someone will have to wait. The network equipment at the hosting company will cycle through each person downloading the file and transfer a small portion at a time so each person's file transfer can take place, but the transfer for everyone downloading the file will be slower. If 100 people all came to the site and downloaded the MP3 at the same time, the transfers would be extremely slow. If the host wanted to decrease the time it took to download files simultaneously, it could increase the bandwidth of their internet connection (at a cost due to upgrading equipment).


Hosting Bandwidth

In the example above, we discussed traffic in terms of downloading an MP3 file. However, each time you visit a web site, you are creating traffic, because in order to view that web page on your computer, the web page is first downloaded to your computer (between the web site and you) which is then displayed using your browser software (Internet Explorer, Netscape, etc.) . The page itself is simply a file that creates traffic just like the MP3 file in the example above (however, a web page is usually much smaller than a music file).

A web page may be very small or large depending upon the amount of text and the number and quality of images integrated within the web page. For example, the home page for CNN.com is about 200KB (200 Kilobytes = 200,000 bytes = 1,600,000 bits). This is typically large for a web page. In comparison, Yahoo's home page is about 70KB.


How Much Bandwidth Is Enough?

It depends (don't you hate that answer). But in truth, it does. Since bandwidth is a significant determinant of hosting plan prices, you should take time to determine just how much is right for you. Almost all hosting plans have bandwidth requirements measured in months, so you need to estimate the amount of bandwidth that will be required by your site on a monthly basis

If you do not intend to provide file download capability from your site, the formula for calculating bandwidth is fairly straightforward:

Average Daily Visitors x Average Page Views x Average Page Size x 31 x Fudge Factor

If you intend to allow people to download files from your site, your bandwidth calculation should be:

[(Average Daily Visitors x Average Page Views x Average Page Size) +
(Average Daily File Downloads x Average File Size)] x 31 x Fudge Factor

Let us examine each item in the formula:

Average Daily Visitors - The number of people you expect to visit your site, on average, each day. Depending upon how you market your site, this number could be from 1 to 1,000,000.

Average Page Views - On average, the number of web pages you expect a person to view. If you have 50 web pages in your web site, an average person may only view 5 of those pages each time they visit.

Average Page Size - The average size of your web pages, in Kilobytes (KB). If you have already designed your site, you can calculate this directly.

Average Daily File Downloads - The number of downloads you expect to occur on your site. This is a function of the numbers of visitors and how many times a visitor downloads a file, on average, each day.

Average File Size - Average file size of files that are downloadable from your site. Similar to your web pages, if you already know which files can be downloaded, you can calculate this directly.

Fudge Factor - A number greater than 1. Using 1.5 would be safe, which assumes that your estimate is off by 50%. However, if you were very unsure, you could use 2 or 3 to ensure that your bandwidth requirements are more than met.

Usually, hosting plans offer bandwidth in terms of Gigabytes (GB) per month. This is why our formula takes daily averages and multiplies them by 31.


Summary

Most personal or small business sites will not need more than 1GB of bandwidth per month. If you have a web site that is composed of static web pages and you expect little traffic to your site on a daily basis, go with a low bandwidth plan. If you go over the amount of bandwidth allocated in your plan, your hosting company could charge you over usage fees, so if you think the traffic to your site will be significant, you may want to go through the calculations above to estimate the amount of bandwidth required in a hosting plan.
read more “BANDWIDTH EXPLAINED”

8 PEOPLE CAN USE THE SAME MSN DIAL UP

8 People Can Use The Same Msn Dial Up Account

its easy really. want to have an entire family on dial-up with just one bill?

step one. purchase 20 dollar a month subscription to MSN unlimited access dial up. This will include an MSN 9 cd which you will need. With the software installed, fill up your secondary account slots with new users. Make sure you pick @msn if it gives you the choice, hotmail email addresses will not work..

say the secondary account is johnsmith@msn.com type in the Dial up connection

USER : MSN/johnsmith
PASS: ******* (whatever)

connect to your local msn phone number and the other people you gave secondary accounts to will be able to do the same, while you are connected. Its a sweet deal considering everyone is paying about 2 bucks a month for internet access, especially if you cannot get broadband. if you wanted to sell off the access to people you could actually make money doing this.. but i do not suggest it.

I used to be an msn tech and this was a little known secret even to most of the employees.

After you do this you do not need the software any more. I would suggest keeping it on to micromanage everyone else's accounts. and for the simple fact that if they don't pitch in, cut them off HEHEHE

i'm on broadband now so i dont care if i tell you my little secret. anyone else knew of this?
read more “8 PEOPLE CAN USE THE SAME MSN DIAL UP”

COMPUTER ELECTRONIC MAIL AND PRIVACY

COMPUTER ELECTRONIC MAIL AND PRIVACY
====================================

by

Ruel T. Hernandez

801 Cedarbend Way
Chula Vista, California 92010
(619) 421-6517 (voice)
(CompuServe: 71450,3341)
(GEnie Mail: R.HERNANDEZ)

January 11, 1987

Copyright (c) 1986, 1987 by Ruel T. Hernandez


(This is an edited version of a law school seminar paper I wrote at
California Western School of Law. A another version of the paper, entitled
"Electronic Mail - Your Right to Privacy," by Ruel T. Hernandez as told to
Dan Gookin, was published as the cover story in The Byte Buyer, San Diego's
Microcomputer Magazine, volume 4, number 24, December 5, 1986. That version
may also be found on their BBS at 619/226-3304 or 619/573-0359. Note,
citations to the Electronic Communications Privacy Act of 1986 refer to the
final version passed by the House of Representatives on October 2, 1986,
which was passed by the Senate the day before, as listed in the
Congressional Record.)


INTRODUCTION

Two years ago, legislation was introduced into Congress that sought to
provide federal statutory guidelines for privacy protection of computer
communications, such as electronic mail found on commercial computer systems
and on remote computer systems, commonly known as bulletin board systems
(BBS). Old federal wiretap law only gave protection to normal audio
telephonic communications. There was no contemplation of computers or their
operators using telephone lines to communicate. The old federal wiretap law
regulated police interceptions of communications while they are being
transmitted on a telephone line. Before the Electronic Communications
Privacy Act of 1976, the law did not provide guidelines for protecting the
transmitted message once it was stored within a computer system.


QUESTIONS

(1) Whether electronic mail and other intended private material stored
within an electronic computer communication system have Fourth Amendment
privacy protection?

(2) Should private electronic mail and other such material be accorded
the protection guidelines as with telephone communication and the U.S. Mail?


PROBLEM

Law enforcement seeks criminal evidence stored as E-Mail on either a
local, user-supported BBS, or on a commercial computer service, such as
CompuServe, GEnie or The Source. (Note, this situation is equally
applicable to personal, private data stored on a remote system for later
retrieval, as with CompuServe's online disk storage capabilities.)

For instance, a computer user calls up a computer communication system.
Using the electronic mail function, he leaves a private message that can
only be read by an intended recipient. The message is to inform the
recipient of a conspiracy plan to violate a federal or state criminal
statute. Law enforcement gets a tip about the criminal activity and learn
that incriminating evidence may be found on the computer system.

In 1982, such a situation occurred. (Meeks, Brock, "Life at 300 Baud:
Crime on the BBS Network," Profiles, August, 1986, 12-13.) A Detroit
federal grand jury, investigating a million-dollar cocaine ring, issued a
subpoena ordering a commercial service, The Source, to hand over private
subscriber data files. The files were routinely backed up to guard against
system crashes. The grand jury was looking for evidence to show that the
cocaine ring was using The Source as communication base to send messages to
members of the ring. With such evidence, the grand jury could implicate or
indict those suspected to be a part of the cocaine ring. The Source refused
to obey the subpoena. The prosecution argued The Source could not
vicariously assert a subscriber's privacy rights. Constitutional rights are
personal and could only be asserted by the person whose rights are invaded.
Additionally, if the files containing messages were duplicated, any
reasonable expectation of privacy by users would be extinguished. A court
battle ensued. However, before a ruling could be made, the kingpin of the
cocaine ring entered a surprise guilty plea to federal drug trafficking
charges. The case against the Source was discontinued.

Publicly posted messages and other public material may be easily
retrieved by law enforcement. It is the private material, such as E-Mail,
that poses the problem.

Law enforcement's task is then to gather enough evidence to
substantiate a criminal case. Specifically, they would want the E-Mail, or
other private files, transmitted by suspected criminals. A computer
communications service, as keeper and transmitter of private electronic
messages, would not want to turn over the private data.


INADEQUACY OF OLD LAW

Brock Meeks of Profiles magazine noted that as of August, 1986, "no ...
protection exist[ed] for electronic communications. Any law enforcement
agency can, for example, confiscate a local BBS and examine all the message
traffic," including and private files and E-Mail. (Ibid.)

In the next section, case law will be examined and statutory law prior
to the Electronic Communications Privacy Act of 1986 (ECPA) will be noted.
Seemingly applicable statutes, as they stood, provided no guidelines for
privacy protection of electronic computer communication systems, such as
CompuServe, GEnie, and local, user-operated BBSs.

CASE LAW

There is little case law available on computer communications and
Fourth Amendment constitutional problems. (M.D. Scott, Computer Law, 9-9
(1984 & Special Update, August 1, 1984).) If not for the surprise
preemptive guilty plea, the above described Detroit case may have provided
guidance on computer communications and privacy issues.

Of the available cases, Scott noted those that primarily dealt with
financial information found in bank and consumer credit organization
computers. In U.S. v. Davey, 426 F.2d 842, 845 (2 Cir. 1970), the
government had the right to require the production of relevant information
wherever it may be lodged and regardless of the form in which it is kept and
the manner in which it may be retrieved, so long as it pays the reasonable
costs of retrieval. In a California case, Burrows v. Superior Court, 13
Cal. 3d 238, 243, 118 Cal. Rptr. 166, 169 (1974), a depositor was found to
have a reasonable expectation that a bank would maintain the confidentiality
of both those papers in check form originating from the depositor and the
depositor's bank statements and records of those same checks. However, in
U.S. v. Miller, 425 U.S. 435, 440 (1976), customer account records on a
banks' computer were held to not be private papers of the bank customer,
and, hence, there is no Fourth Amendment problem when they are subpoenaed
directly from the bank.

The computer data and information in these cases have more of a
business character in contrast to personal E-Mail found on remote computer
systems such as CompuServe or a local BBS. Under the old law, a prosecutor,
as in the Detroit case, may try to analogize duplicated and backed up E-Mail
to business situations where data on business computer databases are also
backed up. Both types of computer data are stored on a system and then
later retrieved. The provider of the remote computing service or the sysop
would counterargue that the nature of computers always require the
duplication and backup of any computer data, whether the data files are E-
Mail or centrally-based financial or credit data. Duplication does not
necessarily make E-Mail the same as financial or credit data stored in
business computers. Centrally-based business information is more concerned
with the data processing. That information is generally stored and
retrieved by the same operator. E-Mail is more concerned with personal
communications between individuals where the sender transmits a private
message to be retrieved only by an intended recipient. The sender and the
recipient have subjective expectations of privacy that when viewed
objectively is reasonable. Therefore, there is a constitutionally protected
expectation of privacy under Katz v. U.S., 389 U.S. 347, 19 L.Ed. 88 S.Ct.
507 (1967). However, the prosecution would note under California v.
Ciraolo, -- U.S. --, 106 S.Ct. 1809 (1984), the users would have to protect
their electronic mail from any privacy intrusion. The provider or operator
of the remote system has ultimate control of his system. He has complete
access to all areas of the system. He could easily examine the material.
The prosecution would note the user could not reasonably protect his private
data from provider or operator invasion. This "knot-hole" would exclude any
idea of privacy. If there is no privacy, there can be no search and
therefore no Fourth Amendment constitutional violation. Law enforcement can
retrieve the material.

FEDERAL WIRETAP STATUTES

The federal wiretap statutes, before the Electronic Communication
Privacy Act of 1986, protected oral telephone communications from police
interceptions. This protection was made in 1968 in response to electronic
eavesdropping by government. (Cohodas, Nadine, "Congress Races to stay
Ahead of Technology," Congressional Quarterly Weekly Report, May 31, 1986,
1235.) Although E-Mail appears to come under the statute's definition of
"wire communication," under the old law, it was limited to audio
transmissions by wire or cable and does not mention stored computer data.
(18 U.S.C. sec. 2510(1).) The old law required that an interception of a
wire communication be an aural acquisition of the communication. (18 U.S.C.
sec. 2510(4).) Being "aural," the communication must be "heard."
Therefore, a computer communication may come under the old law while being
transmitted. After a caller's message is "sent" on a remote computer
system, the message is then stored within the computer's system. The
communication's conversion into computer stored data, thus no longer in
transmission until retrieved, takes the communication out of the old
statutory protection.

"Eighteen years ago ... Congress could not appreciate - or in some
cases even contemplate - [today's] telecommunications and computer
technology...." (132 Cong. Rec. S7992 (daily ed. June 19, 1986) (statement
of Sen. Leahy).)

CALIFORNIA'S INVASION OF PRIVACY AND WIRETAP STATUTE

California's "invasion of privacy" and wiretap statutes (Cal. Penal
Code sec. 630 et seq.), appears to provide state protection for BBSs.
California Penal Code sec. 637 reads as:

Every person not a party to a telegraphic or telephonic
communication who willfully discloses the contents of a
telegraphic or telephonic message, or any part thereof, addressed
to another person, without the permission of such person, unless
directed so to do by the lawful order of a court, is punishable
by imprisonment in the state prison, or in the count jail not
exceeding one year, or by fine not exceeding five thousand
dollars ($5000), or by both fine and imprisonment.

Again, the question here would be whether "telegraphic or telephonic
messages" include computer communications via modem where a transmitted
message is subsequently stored within a computer awaiting retrieval by its
intended recipient. Again, the storage of the data takes the computer
communications out of the statute. When the statute was passed, the
California legislature, much like the Congress, could not foresee the
technological advances in computer communications.

It should be noted that Assemblywoman Moore introduced legislation in
1985 that would amend have the California state constitution to explicitly
provide state constitutional privacy protection for remote computing
services and their stored information. However, nothing has come out of
this. Aside from political reasons for the lack of further action is one
possible legal consequential argument against the amendment may be if
computer privacy protection is specified in the state constitution, more
litigation may result to tie up the courts in cases deciding whether or not
there is privacy protection for other unspecified matters. Although,
overall, the California state constitution is much more specific than the
United States Constitution, it may be best to not be any more specific with
regard to privacy.

PROTECTION FOR U.S. MAIL

Statutory U.S. Mail protection provides a suggestion for statutory
provisions of privacy protection for E-Mail deposited in electronic
communication systems. The unauthorized taking out of and examining of the
contents of mail held in a "depository for mail matter" before it is
delivered to the mail's intended recipient is punishable by fine,
imprisonment, or both. (18 U.S.C. sec. 1702.)


SOLUTION - THE NEW LAW

There are two methods towards a solution: (1) court decisions; and (2)
new legislated privacy protection.

COURT DECISIONS

Courts may have chosen to read computer communications protection into
the old federal wiretap statute or into existing state law. However, they
were reluctant to do so. Courts "are in no hurry to [revise or make new law
in this area] and some judges are openly asking Congress for help....
[F]ederal Appeals Court Judge Richard Posner in Chicago said Congress needed
to revise current law, adding that 'judges are not authorized to amend
statutes even to bring them up-to-date.'" (Cohodas, Nadine, "Congress Races
to Stay Ahead of Technology," Congressional Quarterly Weekly Report, May 31,
1986, p. 1233.)

NEW STATUTE

Last October 21, 1986, President Reagan signed the Electronic
Communications Privacy Act of 1986 amending the federal wiretap law. The
new Act (P.L. 99-508) would not take immediate effect until three months
after the signing - presumably January 21, 1986. (18 U.S.C. secs. 111 and
202.)

When the new law does take effect, it would first provide privacy
protection for any

'electronic communication' ... [by] any transfer of signs,
signals, writing, images, sounds, data or intelligence of any
nature transmitted in whole or in part by a wire, radio,
electromagnetic, photoelectronic or photooptical system that
affects interstate or foreign commerce...."

(18 U.S.C. sec. 2510(10).)

Second, and more importantly for this discussion, ECPA would protect
"stored wire and electronic communications," i.e. E-Mail stored and backed
up on disk or tape on an electronic computer communication system. (18
U.S.C. sec. 2701(a)(1) and (2).) The legislation makes it a federal
criminal offense to break into any electronic system holding copies of
messages or to exceed authorized access to alter or obtain the stored
messages. (Ibid.)

The legislation would protect electronic computer communication systems
from law enforcement invasion of user E-Mail without a court order. (18
U.S.C. sec. 2703.) Although the burden of preventing invasion of the E-Mail
is placed on the subscriber or user of the system, the government must give
him notice allowing him fourteen days to file a motion to quash a subpoena
or to vacate a court order seeking disclosure of his computer data. (18
U.S.C. sec. 2704(b).) However, the government may give delayed notice when
there are exigent circumstances as listed by the Act (18 U.S.C. sec. 2705.)

The legislation gives a civil cause of action to the provider or
operator, subscriber, customer or user of the system aggrieved by an
invasion of private material stored in the system in violation of ECPA. (18
U.S.C. sec. 2702; see also 18 U.S.C. sec. 2520.) If the provider or
operator has to disclose information stored on his system due to a court
order, warrant, subpoena, or certification under ECPA, there can be no cause
of action against him by any person aggrieved by such disclosure. (18
U.S.C. sec. 2703(e); see also sec. 2702(b).)

The electronic communications, under this new Act, must be sent by a
system that "affects interstate or foreign commerce." (18 U.S.C. sec.
2510(12).) The "electronic communications" may practically be limited to
electronic communications sent by common carrier telephone lines.

There may be some question as to whether or not ECPA is confined to
commercial systems and does not cover user-operated bulletin board systems.
That would be similar to arguing the old federal wiretap law was confined to
long distance communications and not to local telephone calls. The House
report (H.R. No. 647, 99th Cong. (1986)), indicates user-operated BBSs are
intended to be covered by the Act. The House noted a difference between
commercial subscription systems and user-operated BBSs readily accessible by
the public. However, it also noted the different levels of security found
on user-operated BBSs, i.e. the difference between system areas containing
private electronic mail and other areas containing public information.
Electronic communications that the operator attempts to keep confidential
would be protected by ECPA, while there would be no liability for access to
features configured to be readily accessible by the general public.
Language in the Act also refers to "the person or entity providing the wire
or electronic communication service." Such language may be seen to indicate
the inclusion of individuals who operate a BBS. (18 U.S. secs. 2701(c)(1)
and 2702(a)(1) and (b).) Additionally, a remote computing service was
defined in the Act as an electronic communications system that provides
computer storage or processing services to the public. (18 U.S.C. sec.
2710(2).) This would certainly be applicable to a user-operated BBS that
is easily accessible to public with the simple dialing of a telephone number
by a modem-equipped computer. On the political side, Senator Leahy, a
principal sponsor of the Act was reported to have been "soliciting [users
and operators' of BBSs] comments and encourage sensitivity to the needs of
BBS's in the legislation.... They are ... willing to listen to our side of
things." (BBSLAW02.MSG, dated 07/24/85, information from Chip Berlet,
Secretary, National Lawyers Guild Civil Liberties Committee, transmitted by
Paul Bernstein, SYSOP, LAW MUG, Chicago, Illinois 312/280-8180, regarding
Federal Legislation Affecting Computer Bulletin Boards, deposited on The
Legacy Network 213/553-1473.)


CONCLUSION

Electronic mail stored on computer communication systems have Fourth
Amendment constitutional privacy protection. Unfortunately, before the
Electronic Communications Privacy Act of 1986, such protection was not
articulated by federal or state statutory guidelines. Case law also did
not provide any helpful guidance. The peculiarities of computers and
computer storage posed problems which were not addressed by the old wiretap
laws. They were also problems overwhelmed by constitutional privacy law as
defined by the United States Supreme Court. A legislative solution was
required and was provided for by ECPA.

[For more information on ECPA, see 132 Cong. Rec. H8977 (daily ed.
October 2, 1986) or "Major Provisions of 1986 Electronic Privacy Act,"
Congressional Quarterly Weekly Report, October 11, 1986, 2558.]
read more “COMPUTER ELECTRONIC MAIL AND PRIVACY”

ALL ABOUT SPYWARE

here are a lot of PC users that know little about "Spyware", "Mal-ware", "hijackers", "Dialers" & many more. This will help you avoid pop-ups, spammers and all those baddies.

What is spy-ware?
Spy-ware is Internet jargon for Advertising Supported software (Ad-ware). It is a way for shareware authors to make money from a product, other than by selling it to the users. There are several large media companies that offer them to place banner ads in their products in exchange for a portion of the revenue from banner sales. This way, you don't have to pay for the software and the developers are still getting paid. If you find the banners annoying, there is usually an option to remove them, by paying the regular licensing fee.

Known spywares
There are thousands out there, new ones are added to the list everyday. But here are a few:
Alexa, Aureate/Radiate, BargainBuddy, ClickTillUWin, Conducent Timesink, Cydoor, Comet Cursor, eZula/KaZaa Toptext, Flashpoint/Flashtrack, Flyswat, Gator, GoHip, Hotbar, ISTbar, Lions Pride Enterprises/Blazing Logic/Trek Blue, Lop (C2Media), Mattel Brodcast, Morpheus, NewDotNet, Realplayer, Songspy, Xupiter, Web3000, WebHancer, Windows Messenger Service.

How to check if a program has spyware?
The is this Little site that keeps a database of programs that are known to install spyware.

Check Here: http://www.spywareguide.com/product_search.php

If you would like to block pop-ups (IE Pop-ups).
There tons of different types out there, but these are the 2 best, i think.

Try: Google Toolbar (http://toolbar.google.com/) This program is Free
Try: AdMuncher (http://www.admuncher.com) This program is Shareware

If you want to remove the "spyware" try these.
Try: Lavasoft Ad-Aware (http://www.lavasoftusa.com/) This program is Free
Info: Ad-aware is a multi spyware removal utility, that scans your memory, registry and hard drives for known spyware components and lets you remove them. The included backup-manager lets you reinstall a backup, offers and multi language support.

Try: Spybot-S&D (http://www.safer-networking.org/) This program is Free
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer. Blocks ActiveX downloads, tracking cookies and other threats. Over 10,000 detection files and entries. Provides detailed information about found problems.

Try: BPS Spyware and Adware Remover (http://www.bulletproofsoft.com/spyware-remover.html) This program is Shareware
Info: Adware, spyware, trackware and big brotherware removal utility with multi-language support. It scans your memory, registry and drives for known spyware and lets you remove them. Displays a list and lets you select the items you'd like to remove.

Try: Spy Sweeper v2.2 (http://www.webroot.com/wb/products/spysweeper/index.php) This program is Shareware
Info: Detects and removes spyware of different kinds (dialers, loggers, trojans, user tracks) from your computer.
The best scanner out there, and updated all the time.

Try: HijackThis 1.97.7 (http://www.spywareinfo.com/~merijn/downloads.html) This program is Freeware
Info: HijackThis is a tool, that lists all installed browser add-on, buttons, startup items and allows you to inspect them, and optionally remove selected items.


If you would like to prevent "spyware" being install.
Try: SpywareBlaster 2.6.1 (http://www.wilderssecurity.net/spywareblaster.html) This program is Free
Info: SpywareBlaster doesn`t scan and clean for so-called spyware, but prevents it from being installed in the first place. It achieves this by disabling the CLSIDs of popular spyware ActiveX controls, and also prevents the installation of any of them via a webpage.

Try: SpywareGuard 2.2 (http://www.wilderssecurity.net/spywareguard.html) This program is Free
Info: SpywareGuard provides a real-time protection solution against so-called spyware. It works similar to an anti-virus program, by scanning EXE and CAB files on access and alerting you if known spyware is detected.

Try: XP-AntiSpy (http://www.xp-antispy.org/) This program is Free
Info: XP-AntiSpy is a small utility to quickly disable some built-in update and authentication features in WindowsXP that may rise security or privacy concerns in some people.

Try: SpySites (http://camtech2000.net/Pages/SpySites_Prog...ml#SpySitesFree) This program is Free
Info: SpySites allows you to manage the Internet Explorer Restricted Zone settings and easily add entries from a database of 1500+ sites that are known to use advertising tracking methods or attempt to install third party software.

If you would like more Information about "spyware".
Check these sites.
http://www.spychecker.com/
http://www.spywareguide.com/
http://www.cexx.org/adware.htm
http://www.theinfomaniac.net/infomaniac/co...rsSpyware.shtml
http://www.thiefware.com/links/
http://simplythebest.net/info/spyware.html

Usefull tools...
Try: Stop Windows Messenger Spam 1.10 (http://www.jester2k.pwp.blueyonder.co.uk/j...r2ksoftware.htm) This program is Free
Info: "Stop Windows Messenger Spam" stops this Service from running and halts the spammers ability to send you these messages.

----------------------------------------------------------------------------
All these softwares will help remove and prevent evil spammers and spywares attacking your PC. I myself recommend getting "spyblaster" "s&d spybot" "spy sweeper" & "admuncher" to protect your PC. A weekly scan is also recommended

Free Virus Scan
Scan for spyware, malware and keyloggers in addition to viruses, worms and trojans. New threats and annoyances are created faster than any individual can keep up with.
http://defender.veloz.com// - 15k


Finding . is a Click Away at 2020Search.com
Having trouble finding what you re looking for on: .? 2020Search will instantly provide you with the result you re looking for by drawing on some of the best search engines the Internet has to offer. Your result is a click away!
http://www.2020search.com// - 43k


Download the BrowserVillage Toolbar.
Customize your Browser! Eliminate Pop-up ads before they start, Quick and easy access to the Web, and much more. Click Here to Install Now!
http://www.browservillage.com/ - 36k
read more “ALL ABOUT SPYWARE”