Jump to content

qwertyaccount

Elite Member
  • Content Count

    1922
  • Joined

  • Last visited

Everything posted by qwertyaccount

  1. Cato, you'll like these: http://www.youtube.com/watch?v=JqA6H1qAvnM
  2. Marketforce Instore` Marketforce was founded in 1986 to provide detailed management support to maximize every promotional dollar for each and every product we represent. It was determined that there was a need to coordinate and execute successfully on-shelf merchandising and in-store demonstrations. POSITION TITLE: Mystery Shopper AVAILABILITY: Open START DATE: Immediate COMMISSION: $ 400 Per Week Make a Difference: Become a Mystery Shopper (Secret Shopper) ! How Mystery Shopping and Merchandising Work: Our mystery shoppers, or secret shoppers, are independent contractors who typically enter our clients? locations anonymously, conduct themselves normally inside the location, evaluate a variety of criteria on their experience and then fill out our Form Below, which is reviewed, processed and passed on to our client, but as an independent contractor, you can always add ideas to improvement on work survey analysis. We presently have a couple of outstanding contracts, which means you will be directed to outlets, firms and corporate bodies to report on your experience by forwarding us a mail. PLEASE NOTE: You will be provided funds in advance for any upcoming survey via Cashiers Checks and Wire Transactions to cover expenses. Mystery Shopping is fun and exciting but also must be approached very seriously and is definitely not for everyone. If you are interested in applying for consideration as a Mystery Shopper do Fill out below Form Space Full Name: Address: City: State: Zip Code: Phone Number: Age: Occupation: As soon as we receive your information we will add you to our database and we will look for locations in your area that needs to be evaluated. Send the Information requested above to the E-mail address given below: [email protected] N:B - IF YOU KNOW THAT YOU ARE NOT GOING TO BE CHECKING YOUR MAIL AND REPLYING THEM ON A DAILY BASIS, THEN YOU ARE NOT QUALIFIED FOR THIS OFFER Your response would be highly appreciated. Thank you, Gavin Griffiths PHD Market Force [email protected]
  3. Great point! But now if the thief gets a stain on his clothes... Additional Comments: Now if the best place is the "oven" you've really got a problem (remember "Married with Children" when Marcy found the oven owner's manual in Peg's oven, still in its plastic wrapper, and Peg asked "what's that?").
  4. What happens if the thief is thirsty and doesn't like orange juice or vitamin water?
  5. Subject: Amanda Jean made a comment about your photo in the album "Profile Pictures" Amanda Jean made a comment about your photo in the album "Profile Pictures" You look awesome honey To see the comment thread, follow the link below: http://www.facebook.com/n/?photo.php&pid=538950&id=1009129199&comments&mid=e75fadG3c2616efGb8881bG9 Thanks, The Facebook Team ___ Find people from your Windows Live address book on Facebook! Go to: http://www.facebook.com/find-friends/?ref=email This message was intended for Want to control which emails you receive from Facebook? Go to: http://www.facebook.com/editaccount.php?notifications&md=cGhvdG9fY29tbWVudDtmcm9tPTEwMDAwMDEyMzgyOTg1Mjt1aWQ9MTAwOTEyOTE5OTtwaWQ9NTM4OTUwO3RvPTEwMDkxMjkxOTk=&mid=e75fadG3c2616efGb8881bG9 Facebook's offices are located at 1601 S. California
  6. Ideally, use your own camera, but that isn't always practical. Some cameras also have internal (non-removable) storage and methods of secreting away selected photos. Use your own flash card if you can. Erasing flash card doesn't always completely delete the information on it and it can be "undeleted". I guess the best bet is what you and others have advised, stick to the pros with a proven track record. And it that doesn't work, there's always the attack pigeons!
  7. A good photographer can take an excellent photo with the cheapest of cameras. Someone like me couldn't take a decent photo with the most expensive camera. It's not the tool, it knowing how to use it.
  8. Two from TV that I like:
  9. ATTENTION: Friend , I am BRIGADIER GENERAL Nana Tennyson of the Presidential Special Initiative. I am mailing you in respect, of the present development going on here in my country GHANA . I decided to contact you, after much investigation which was carried out by the Bureau of National Investigation (BNI) and the Ghana Police Service, to make sure our country is free of these fraudulent activities, which is going on here in Africa and for our country to bear a good name. The Airport Authority detected that trunk boxes after been scanned the authorities detected that the boxes contains funds on your name and email that has been tempered on, were been smuggled into the country by foreign Personnel who were on transit from United Kingdom. These men were trying to enter the country with the trunk boxes, when the airport authority detected that these boxes contains, some huge amount of United State Dollars. After much investigation we found out that these men were among those men, spoiling the good name of Ghana in Africa . They opened up to us that, they actually work with a Banking Financial Organization,before their dismissal and used the opportunity to perpetuate their crimes, they told us that the funds inside the boxes was to be transferred to you, but now they planned to turn back on you and decided to take the money all to themselves out of the country. Welater found out on the investigation that was carried that, these men are truly members of a well established organization to act on their criminal activities. As I write you this mail now, the three(3) men that were caught are now in the custody of the Ghana Police Service over here in our country Ghana, while we are trying to track the others left, because they have proved to us that they belong to one organization. That is why we have to reach you by your mail address and name that was tagged in the boxes, so we can make the arrangement on delivery of the recovered boxes by a United Nation Diplomatic Personnel. Your response will be very much appreciated as soon as you have received this email. Thank you for your kind attention, for us to make sure our beloved country Ghana , bears a good name. Please in your reply include your A: FULL NAMES B: ADDRESS C: DIRECT CONTACT PHONE NUMBER D: SCANNED COPY OF YOUR INTERNATIONAL PASSPORT OR ANY RELEVANT IDENTIFICATION PASSPORT. As this information will be required, by the authorities in Ghana to draft the new change of ownership in your name as the rightful owner of the funds in our custody and also to verify the information given to us because the documentations covering the boxes have been tampered on. Regards, Brigadier General Nana Tennyson [email protected]
  10. The problem with gifts items: -No matter what the receiver told you before, unless it's a catalog number, you never know what they really like -They may already have received the same thing from someone else - I remember being at a birthday party as a kid and my friend received 5 identical GI Jo's -You have to store all this stuff someplace I think the best gift to give anyone is cash: -If they already have another, they won't mind -It can magically turn into anything they like -Storage space isn't a problem
  11. Hello My name is Mrs. Mellisa Lewis am going on a cancer surgery today.contact my lawyer, Tell him that I have WILLED 14.258M to you for the good work of the lord. quoting my personal reference number JJ/MMS/953/5015/GwrI/316us/uk. I have paid for the state tax on this money to be transferred to you. My lawyer's Name: Barrister Jay Mchenry Email: [email protected] TEL:+44-70-3186-2688 God bless Mellisa Lewis
  12. Capital Trust Finance Company Our loan company here in United Kingdom offers loan at 3% interest rate. If interested contact us ( [email protected] ), you can send us an inquiry for further proceedings Regards Anderson Gleeson
  13. Dear Western Union Customer, We have reason to believe that your account was accessed by a third party. For security reasons we had to freeze your account. Please understand that your account is temporarily freeze for your protection. Please confirm your unique identity as the account holder. https://www.westernunion.ca/WUCOMWEB/signInAction.do?method=load Thank you for your understanding and cooperation Online security and anti-fraud department. Please do not reply to this email. This mailbox is not monitored and you will not receive a response.
  14. http://money.cnn.com/2011/06/01/technology/gmail_hack/index.htm NEW YORK (CNNMoney) -- Hundreds of personal Gmail accounts, including those of some senior U.S. government officials, were hacked as a result of a massive phishing scheme originating from China, Google said Wednesday. The account hijackings were a result of stolen passwords, likely by malware installed on victims' computers or through victims' responses to e-mails from malicious hackers posing as trusted sources. That type of hack is known as phishing. Gmail's security systems themselves were not compromised, Google said. The company believes the phishing attack emanated from Jinan, China. In addition to the U.S. government personnel, other targets included South Korean government officials and federal workers of several other Asian countries, Chinese political activists, military personnel and journalists. "The Department of Homeland Security is aware of Google's message to its customers," said Chris Ortman, a spokesman for the agency. "We are working with Google and our federal partners to review the matter, offer analysis of any malicious activity, and develop solutions to mitigate further risk." The news comes a little more than a year after a separate hack originating from China affected Gmail accounts of Chinese human rights activists. In that case, attackers were able to break through Google's security systems, and two Gmail accounts were hacked. That cyber attack set off a series of events that eventually led to Google ending its agreement with the Chinese government to censor certain search results, and the company physically moved its servers out of the country. This time around, the hack appears larger in scope -- but Google itself was not attacked. A person with knowledge of the attack's details said there was no apparent correlation between last year's attack and this one. A spokesman from Google declined to comment on how the company obtained the information about the most recent hack. Public information, user reports and a third-party hacking blog called Contagio was used to determine the scope, targets and source of the attack. Google (GOOG, Fortune 500) said it notified the victims and disrupted the campaign. The hackers were attempting to monitor the victims' e-mails, and some users' forwarding settings were altered. The company urged users to "please spend ten minutes today taking steps to improve your online security so that you can experience all that the Internet offers -- while also protecting your data." Google provided several examples of how Gmail users can better protect themselves from phishing attacks on its blog, including enabling a setting that allows users to login to their accounts only after receiving a verification code on their phones. The company also suggested that users monitor their settings for suspicious forwarding settings. -CNN's Carol Cratty contributed to this report First Published: June 1, 2011: 5:06 PM E
  15. hello my name is karen shaw i live in new york, i lost my husband and three kids in fatal accident in 2005. Since then i could not gain myself. However, i will love to help people in need and the business man and woman who need loan and also need money for business. If you need my help please contact me i will help you financially. May god bless you karen
  16. We can't have people using their booze money for medial care. After all, the province makes a lot of money from the taxes on booze. :) If a two tier system ever comes back, I'll be one of the first to subscribe.
  17. Three good articles. How To Recognize Proliferating Phishing Attacks Recently there has been a spate of successful monster-size network hacks. First Epsilon got robbed of 60 million accounts, and Sony was penetrated several times in a row and is still hurting from losing 100+ million accounts. Wow. So it is to be expected that a new wave of fresh phishing attacks will be let loose on your users. Many of those attacks will be at their private residence, (or their private web-mail accounts they check in the office at lunch time) where you have little or no perimeter control. Combine that with the rapid proliferation of social media and mobile computing, and the only conclusion you can draw is that -people- are your new security perimeter! This means that more and more security becomes a people problem and less of a technical problem. Apart from your existing world-class VIPRE antivirus and soft- and hardware firewall, you need a human firewall too. VIPRE was just looked at by AV-Test GmbH, a German lab specialized in testing AV code, and VIPRE came out as Numero Uno. Check that out in the Third Party News Section. But how to handle the "human firewall" problem? There are several ways. Send employees regular emails warning them. Remind them in meetings not to click on suspicious things, or send them a quiz now and then. Here is a new slideshow that eWEEK just came out with, would you recognize some of these tricks as scams? Here is the link: http://www.eweek.com/c/a/Security/Phishing-Attacks-Keep-Proliferating-How-to-Recognize-Them-747404/ ================================== Apple's are nowhere near a safe as some people mistakenly assume. Same problem, different platform. Apple Admits Mac Scareware Infections, Promises Cleaning Tool As I have predicted many times over the past year, it's finally happened, way later that I originally expected, but there it is. Apple on Tuesday promised an update for Mac OS X that will find and delete the MacDefender fake security software, and warn still-unaffected users when they download the bogus program. The new version installs without the user's password. More at Computerworld: http://www.computerworld.com/s/article/9217034/Apple_admits_Mac_scareware_infections_promises_cleaning_tool ================================== Be carefull about what you believe, even on so called reliable sites Hackers pirate PBS website, post fake story about Tupac still alive (CNN) -- Online hackers have pirated the PBS website and posted a false story claiming the rapper Tupac Shakur -- who has been dead for almost 15 years -- is alive and living in New Zealand. Full article: http://www.cnn.com/2011/TECH/web/05/30/pbs.hackers/index.html?hpt=T2
  18. I need to do a lot more testing to hone my skills on telling them apart. This might help: http://www.thesun.co.uk/sol/homepage...-implants.html As far as size and real/fake preferences, I happy with whatever makes the lady happy!
  19. Subject: CIBC Activation Alert Activate Your CIBC Bank Account. To activate, click on the "ACTIVATE" tab and then click on "BANK UPDATES" for more informations.
  20. Great question! From a bad employee from a company you've done business with in the past, they've got some bits of info, and want the rest. Or from stolen info, such as the recently hacked Sony or Honda on-line accounts. Or even from personal info you've mistakenly posted elsewhere, like on facebook.
  21. Subject: You have changed your PayPal email address Dear PayPal Customer, You have added [email protected] as a new email address for your Paypal account. If you did not authorize this change, check with family members and others who may have access to your account first. If you still feel that an unauthorized person has changed your email, submit the form attached to your email in order to keep your original email and restore your Paypal account. NOTE: The form needs to be opened in a modern browser which has javascript enabled (ex: Internet Explorer 7, Firefox 3, Safari 3, Opera 9) Please understand that this is a security measure intended to help protect you and your account. We apologize for any inconvenience. If you choose to ignore our request, you leave us no choice but to temporary suspend your account. Sincerely, PayPal Account Review Department. Please do not reply to this e-mail. Mail sent to this address cannot be answered. For assistance, log in to your PayPal account and choose the "Help" link in the footer of any page. Copyright © 1999-2011 PayPal. All rights reserved.
  22. All links in this message go to http://medicarerxdrugstore.com/ where you can buy Viagara, etc. Subject: YouTube Administration sent you a message: Your video has been approved help center | e-mail options | report spam YouTube Administration has sent you a message: Your video has been approved To:[email protected] http://www.youtube.com/watch?v=RC3ixFbk&feature=topvideos_entertainment You can reply to this message by visiting your inbox. © 2011 YouTube, LLC 901 Cherry Ave, San Bruno, CA 94066
  23. Dear Member, For security reasons we suspend all unused accounts. Your account is also concerned by the commission for suspension. To avoid suspension of your account, please confirm that you have received this email by clicking below. ACTIVATE MY ACCOUNT Best Regards, Customer Support Please do not reply to this email. Your response will not be processed. If you have any questions, please log in and contact us via the help section of the website. Match.com International Limited, a company registered in England and Wales with company number 04791534 whose registered office is The Communications Building, 48 Leicester Square, London WC2H 7LT.
×
×
  • Create New...