You can subscribe to this list here.
2003 |
Jan
|
Feb
|
Mar
(128) |
Apr
(32) |
May
(15) |
Jun
(14) |
Jul
(34) |
Aug
(33) |
Sep
(30) |
Oct
(14) |
Nov
(9) |
Dec
(24) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2004 |
Jan
(140) |
Feb
(93) |
Mar
(233) |
Apr
(301) |
May
(335) |
Jun
(262) |
Jul
(185) |
Aug
(296) |
Sep
(194) |
Oct
(109) |
Nov
(104) |
Dec
(120) |
2005 |
Jan
(284) |
Feb
(188) |
Mar
(281) |
Apr
(153) |
May
(113) |
Jun
(146) |
Jul
(156) |
Aug
(103) |
Sep
(180) |
Oct
(142) |
Nov
(134) |
Dec
(175) |
2006 |
Jan
(275) |
Feb
(220) |
Mar
(153) |
Apr
(211) |
May
(186) |
Jun
(222) |
Jul
(196) |
Aug
(169) |
Sep
(157) |
Oct
(125) |
Nov
(163) |
Dec
(159) |
2007 |
Jan
(341) |
Feb
(237) |
Mar
(166) |
Apr
(164) |
May
(189) |
Jun
(128) |
Jul
(152) |
Aug
(191) |
Sep
(185) |
Oct
(101) |
Nov
(187) |
Dec
(235) |
2008 |
Jan
(205) |
Feb
(128) |
Mar
(85) |
Apr
(135) |
May
(75) |
Jun
(87) |
Jul
(149) |
Aug
(155) |
Sep
(168) |
Oct
(64) |
Nov
(66) |
Dec
(155) |
2009 |
Jan
(85) |
Feb
(62) |
Mar
(74) |
Apr
(54) |
May
(94) |
Jun
(46) |
Jul
(54) |
Aug
(79) |
Sep
(48) |
Oct
(32) |
Nov
(37) |
Dec
(16) |
2010 |
Jan
(109) |
Feb
(37) |
Mar
(39) |
Apr
(19) |
May
(49) |
Jun
(20) |
Jul
(35) |
Aug
(13) |
Sep
(28) |
Oct
(10) |
Nov
(21) |
Dec
(19) |
2011 |
Jan
(8) |
Feb
(16) |
Mar
(5) |
Apr
(4) |
May
(10) |
Jun
(8) |
Jul
(10) |
Aug
(5) |
Sep
(7) |
Oct
(12) |
Nov
|
Dec
(5) |
2012 |
Jan
(2) |
Feb
(2) |
Mar
(2) |
Apr
(4) |
May
(1) |
Jun
(2) |
Jul
(2) |
Aug
(2) |
Sep
(2) |
Oct
(1) |
Nov
(17) |
Dec
(2) |
2013 |
Jan
(1) |
Feb
(6) |
Mar
(1) |
Apr
(2) |
May
(1) |
Jun
(1) |
Jul
(1) |
Aug
(7) |
Sep
|
Oct
|
Nov
(1) |
Dec
(1) |
2014 |
Jan
|
Feb
(2) |
Mar
(1) |
Apr
|
May
(2) |
Jun
(1) |
Jul
|
Aug
(1) |
Sep
(5) |
Oct
|
Nov
(1) |
Dec
(1) |
2015 |
Jan
(2) |
Feb
|
Mar
|
Apr
(5) |
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2016 |
Jan
(3) |
Feb
|
Mar
|
Apr
(1) |
May
|
Jun
(1) |
Jul
|
Aug
(2) |
Sep
(2) |
Oct
|
Nov
|
Dec
|
2017 |
Jan
(3) |
Feb
|
Mar
|
Apr
|
May
(1) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2018 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(1) |
Sep
|
Oct
(4) |
Nov
|
Dec
|
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
(2) |
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
From: Daniel S. <da...@Sy...> - 2013-02-09 07:47:02
|
I don't think you have to contact your vendor. Just set both devices to talk through the bluetooth interface. Then you walk through the options, you'll find an option to send the contact list. I've done it once between a GSM and a CDMA phones and everything went well. On Fri, 2013-02-08 at 22:38 -0800, Al Varnell wrote: > On Feb 8, 2013, at 4:07 PM, Robert Peirce <bo...@pe...> wrote: > > > I have not done this before but I am on the verge of switching vendors and getting a new phone. Is there any way to transfer the information from your old phone to the new? This would be above and beyond what the phone vendors can do. > > Have you discussed this with the new vendor? I've never found one that couldn't transfer most, if not all contact information between instruments. > > > Sent from Janet's iPad > > -Al- |
From: Al V. <alv...@ma...> - 2013-02-09 06:38:12
|
On Feb 8, 2013, at 4:07 PM, Robert Peirce <bo...@pe...> wrote: > I have not done this before but I am on the verge of switching vendors and getting a new phone. Is there any way to transfer the information from your old phone to the new? This would be above and beyond what the phone vendors can do. Have you discussed this with the new vendor? I've never found one that couldn't transfer most, if not all contact information between instruments. Sent from Janet's iPad -Al- -- Al Varnell |
From: Robert P. <bo...@pe...> - 2013-02-09 00:07:29
|
I have not done this before but I am on the verge of switching vendors and getting a new phone. Is there any way to transfer the information from your old phone to the new? This would be above and beyond what the phone vendors can do. |
From: Karl S. <ks...@ya...> - 2013-01-29 06:50:06
|
this reminded me of you http://bit.ly/WJVuT4 Karl |
From: Ask Me <tec...@ya...> - 2012-12-11 02:42:25
|
http://claritynw.com/blog/wp-content/themes/clove/nextgenj.php |
From: Ask Me <tec...@ya...> - 2012-12-07 11:11:50
|
http://greentechrs.com/crm/modules/opdesiak.php |
From: Al V. <alv...@ma...> - 2012-11-19 00:22:09
|
On Nov 18, 2012, at 2:43 PM, Sonya <son...@ya...> wrote: > Please remove me from this list Please check at the bottom of every message posted for how to remove yourself. No need to further clutter this list with these. Sent from Janet's iPad Janet -- Janet Varnell |
From: D.J. <pea...@ya...> - 2012-11-18 23:57:48
|
Joe, What you're looking for is udev rules. Set up a udev rule for the phone and a group specifically with permissions to the device, say cellusers group. Put your user in that group, they'll have the permissions needed for the device, but not the rest of the system. Good luck. ;-) Sent from a Remote Location via ROOT! ;-) Joe <jo...@ma...> wrote: >Just asking one last time ... > >Joe > >On 11/10/2012 02:09 PM, Joe wrote: >> I have an LG VX8300. It syncs fine on Windows, but will only work on >> Linux with root permissions. >> >> Someone on this list said it was a permissions issue or something similar. >> >> Is there a howto or instructions somewhere on how to make it so root >> permissions are not necessary? I want to set this up for another user >> who definitely shouldn't be doing things as root. >> >> TIA >> >> Joe > > >------------------------------------------------------------------------------ >Monitor your physical, virtual and cloud infrastructure from a single >web console. Get in-depth insight into apps, servers, databases, vmware, >SAP, cloud infrastructure, etc. Download 30-day Free Trial. >Pricing starts from $795 for 25 servers or applications! >http://p.sf.net/sfu/zoho_dev2dev_nov >_______________________________________________ >BitPim-user mailing list Bit...@li... >Unsubscribe or change options at >https://lists.sourceforge.net/lists/listinfo/bitpim-user > >There are several hundred people on this list. Please be >courteous, on topic and follow the instructions before posting >http://www.bitpim.org/help/support.htm |
From: Sonya <son...@ya...> - 2012-11-18 22:43:10
|
Please remove me from this list ________________________________ From: john komnick <jo...@ya...> To: "bit...@li..." <bit...@li...> Sent: Sunday, November 18, 2012 5:07 PM Subject: [BitPim-user] Unsubscribe ________________________________ From: Joe <jo...@ma...> To: bit...@li... Sent: Sunday, November 18, 2012 2:47 PM Subject: Re: [BitPim-user] Syncing on Linux without root permissions (VX 8300) Just asking one last time ... Joe On 11/10/2012 02:09 PM, Joe wrote: I have an LG VX8300. It syncs fine on Windows, but will only work on Linux with root permissions. > >Someone on this list said it was a permissions issue or something similar. > >Is there a howto or instructions somewhere on how to make it so root permissions are not necessary? I want to set this up for another user who definitely shouldn't be doing things as root. > >TIA > >Joe > ------------------------------------------------------------------------------ Monitor your physical, virtual and cloud infrastructure from a single web console. Get in-depth insight into apps, servers, databases, vmware, SAP, cloud infrastructure, etc. Download 30-day Free Trial. Pricing starts from $795 for 25 servers or applications! http://p.sf.net/sfu/zoho_dev2dev_nov _______________________________________________ BitPim-user mailing list Bit...@li... Unsubscribe or change options at https://lists.sourceforge.net/lists/listinfo/bitpim-user There are several hundred people on this list. Please be courteous, on topic and follow the instructions before posting http://www.bitpim.org/help/support.htm ------------------------------------------------------------------------------ Monitor your physical, virtual and cloud infrastructure from a single web console. Get in-depth insight into apps, servers, databases, vmware, SAP, cloud infrastructure, etc. Download 30-day Free Trial. Pricing starts from $795 for 25 servers or applications! http://p.sf.net/sfu/zoho_dev2dev_nov _______________________________________________ BitPim-user mailing list Bit...@li... Unsubscribe or change options at https://lists.sourceforge.net/lists/listinfo/bitpim-user There are several hundred people on this list. Please be courteous, on topic and follow the instructions before posting http://www.bitpim.org/help/support.htm |
From: john k. <jo...@ya...> - 2012-11-18 22:07:17
|
________________________________ From: Joe <jo...@ma...> To: bit...@li... Sent: Sunday, November 18, 2012 2:47 PM Subject: Re: [BitPim-user] Syncing on Linux without root permissions (VX 8300) Just asking one last time ... Joe On 11/10/2012 02:09 PM, Joe wrote: I have an LG VX8300. It syncs fine on Windows, but will only work on Linux with root permissions. > >Someone on this list said it was a permissions issue or something similar. > >Is there a howto or instructions somewhere on how to make it so root permissions are not necessary? I want to set this up for another user who definitely shouldn't be doing things as root. > >TIA > >Joe > ------------------------------------------------------------------------------ Monitor your physical, virtual and cloud infrastructure from a single web console. Get in-depth insight into apps, servers, databases, vmware, SAP, cloud infrastructure, etc. Download 30-day Free Trial. Pricing starts from $795 for 25 servers or applications! http://p.sf.net/sfu/zoho_dev2dev_nov _______________________________________________ BitPim-user mailing list Bit...@li... Unsubscribe or change options at https://lists.sourceforge.net/lists/listinfo/bitpim-user There are several hundred people on this list. Please be courteous, on topic and follow the instructions before posting http://www.bitpim.org/help/support.htm |
From: Joe <jo...@ma...> - 2012-11-18 20:47:54
|
Just asking one last time ... Joe On 11/10/2012 02:09 PM, Joe wrote: > I have an LG VX8300. It syncs fine on Windows, but will only work on > Linux with root permissions. > > Someone on this list said it was a permissions issue or something similar. > > Is there a howto or instructions somewhere on how to make it so root > permissions are not necessary? I want to set this up for another user > who definitely shouldn't be doing things as root. > > TIA > > Joe |
From: Joe <jo...@ma...> - 2012-11-18 20:44:27
|
Last reply to this on list. Send any further messages directly to me. Long ago and far away people didn't have copiers and computers. If they needed a copy of something written or typed, they took a special piece of paper covered with ink/carbon on one side and put it between two pieces of paper (often getting the stuff all over their finger tips). When they wrote on the top piece of paper, the pressure caused the ink to come off the middle sheet making a (somewhat legible) copy of what was written on the bottom sheet. They called the paper "carbon paper" and the copy, a "carbon copy", hence CC. BCC is a variation on CC meaning Blind Carbon Copy. Today, multi-part forms are still in use, but they don't use "carbon paper" or any separate piece of paper. They embed ink right into the original pages so that it comes out under pressure onto the sheet below. Joe https://en.wikipedia.org/wiki/Cc: https://en.wikipedia.org/wiki/Bcc: On 11/18/2012 02:57 PM, Toby Fredrickson wrote: > Thank you. A service well served. > > Trivia: What does CC: stand for? > > > On Sun, Nov 18, 2012 at 11:53 AM, Joe <jo...@ma... > <mailto:jo...@ma...>> wrote: > > It's pretty simple. > "To" means "This email is addressed to you directly" and your > email address is visible to anyone else who reads the email > (including malware). > > "CC" means this email isn't addressed to you (so you don't need to > respond, etc.), but it's something I think you should know about. > It also lets everyone know you received it - the same as "To", so > they don't forward another copy to you, etc.) > > This is often used on teams where you're talking with one > person/group, but it may affect/interest others who need to know > and who also need to know who else knows what's going on. If I > update a procedure at work, I would send a note "To" my supervisor > saying that it was done, I'd "CC" it to people who use that > procedure so they know what to do and can't say they weren't told > (and won't send copies of it to other people they think should > know - because they can see those people were also CC'd on the > email) and I might BCC a copy of it to my private email address > for archival purposes. > > "BCC" serves the same purpose as CC, but each recipient cannot see > any other email addresses on the BCC list. (They can still see > all the addresses on the "To" and "CC" lists.) This allows > sending information to a group without telling each recipient who > else received it. It also gets rid of emails that contain a > couple of lines of text, but that start with a page or more of To > and cc addresses when you print them. > > It seems like a lost cause, but I often send people who misuse to > or cc a boilerplate reply that explains the above and adds: "My > giving you my email address does not constitute permission for you > to give it out to other people." > > Joe > > > On 11/18/2012 02:13 PM, Toby Fredrickson wrote: >> To:, CC:, Bcc: >> >> Please tell us all the relationships and how this can help us >> all. Some are savvy, but seeing it in a posting would be most >> welcome. >> >> Thanks. >> >> Toby >> >> On Sun, Nov 18, 2012 at 11:06 AM, Joe <jo...@ma... >> <mailto:jo...@ma...>> wrote: >> >> Spam is really annoying, but discussing it shouldn't be a >> reason for us to be uncivil to each other. >> >> You bring up some valid points. It is undoubtedly harder to >> spam a list like this by chance. Just for my own >> information, can you refer me to some evidence that your >> assertions are true? >> >> I belong to a number of non-technical lists that just can't >> be convinced to use BCC and once my address has unnecessarily >> gone out to 30 or more recipients for each list, it's >> vulnerability/availability goes up at least geometrically, if >> not exponentially. >> >> I would suggest a single warning email to the account >> (requiring a timely "human" reply) before banning it. People >> come to lists like this for support and should not be banned >> lightly. >> >> Of course, all of this is up to the moderator who is the only >> one who can take such an action. >> >> If he or she is good at reading email headers (I'm not), then >> a simple address spoof could be detected. But, if the >> address is spoofed, the list still gets it, so it's a problem >> even if it isn't the poster's fault. Knowing that would at >> least allow the moderator to send out a more polite banning >> message than "I don't like you and I don't like your computer >> either." Or worse yet, no message at all. >> >> 1) People don't usually let their computers send other >> people's spam on purpose. Very often, they don't know it's >> happening. If it's really a spam account, then there will >> almost certainly be no reply to a warning. If they are >> informed, maybe they will correct the problem. >> >> 2) I've seen spam using my email address and I run Linux, >> which, although it isn't invulnerable to such things, almost >> never gets "hacked" this way. >> >> In any case, "incompetent" people are not "bad" people and >> should be treated politely, even though their incompetence >> may cause situations like this that have to be addressed. >> >> Joe >> >> On 11/18/2012 09:50 AM, N4AOF wrote: >>> Oh yes, it is always "someone else's" computer that "got >>> hacked" -- BS on both counts -- the vast majority of these >>> spam infestations come from the person either getting >>> malware on their computer or from the person having given >>> away their account information in response to phishing, fake >>> sites, social engineering, or harvesting programs that offer >>> to 'consolidate' all your mail accounts. >>> >>> The "someone else's computer" story CAN occasionally be true >>> because some botnet malware does change the "from" address >>> on the email (usually detectable in the headers) but that is >>> rare overall and the odds are nearly astronomical in any >>> closed mail list (like this one and Yahoo or Google Groups) >>> because the changed "from" address would need to match >>> someone on the subscriber list. >>> >>> Bottom line: When we see spam here, it almost certainly came >>> from the account shown in the From address and usually the >>> individual is far from blameless. >>> >>> In any case, regardless of who might be at fault, there is >>> only one reasonable response for the manager of any mail >>> list -- once an address is used to send spam to the group, >>> the manager needs to remove and ban that account from the >>> list to prevent its use for continued spamming of the list >>> members. >>> >>> >>> *From:* Joe <mailto:jo...@ma...> >>> *Sent:* Sunday, November 18, 2012 03:37 AM >>> *To:* bit...@li... >>> <mailto:bit...@li...> >>> *Subject:* Re: [BitPim-user] (no subject) >>> >>> Most of the time, somebody else got their computer hacked >>> and all the email addresses harvested and used without ever >>> touching any of their computers. Teach people to use BCC >>> instead of CC or TO for mailings so fewer addresses get >>> unnecessarily propagated to vulnerable machines. >>> >>> On 11/17/2012 10:28 PM, Toby Fredrickson wrote: >>>> That happened to my Daughter on my Comcast account. She >>>> apparently switched over to "dookieprotect" (based on a >>>> fellow "stoodent" claiming it was the best) or something >>>> like it as malware protection and her box got zombied into >>>> a spam machine. We got it fixed. Any reputable virus system >>>> should fix that. >>>> >>>> On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar... >>>> <mailto:n4...@ar...>> wrote: >>>> >>>> Another idiot who wants to claim his Yahoo account was >>>> "hacked" because he can't explain why his computer is >>>> sending out spam. >>>> >>>> >>>> >>> >>> >>> ------------------------------------------------------------------------------ >>> Monitor your physical, virtual and cloud infrastructure from a single >>> web console. Get in-depth insight into apps, servers, databases, vmware, >>> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >>> Pricing starts from $795 for 25 servers or applications! >>> http://p.sf.net/sfu/zoho_dev2dev_nov >>> >>> >>> _______________________________________________ >>> BitPim-user mailing list Bit...@li... <mailto:Bit...@li...> >>> Unsubscribe or change options at >>> https://lists.sourceforge.net/lists/listinfo/bitpim-user >>> >>> There are several hundred people on this list. Please be >>> courteous, on topic and follow the instructions before posting >>> http://www.bitpim.org/help/support.htm >> >> >> ------------------------------------------------------------------------------ >> Monitor your physical, virtual and cloud infrastructure from >> a single >> web console. Get in-depth insight into apps, servers, >> databases, vmware, >> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >> Pricing starts from $795 for 25 servers or applications! >> http://p.sf.net/sfu/zoho_dev2dev_nov >> _______________________________________________ >> BitPim-user mailing list Bit...@li... >> <mailto:Bit...@li...> >> Unsubscribe or change options at >> https://lists.sourceforge.net/lists/listinfo/bitpim-user >> >> There are several hundred people on this list. Please be >> courteous, on topic and follow the instructions before posting >> http://www.bitpim.org/help/support.htm >> >> >> >> >> ------------------------------------------------------------------------------ >> Monitor your physical, virtual and cloud infrastructure from a single >> web console. Get in-depth insight into apps, servers, databases, vmware, >> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >> Pricing starts from $795 for 25 servers or applications! >> http://p.sf.net/sfu/zoho_dev2dev_nov >> >> >> _______________________________________________ >> BitPim-user mailing list Bit...@li... <mailto:Bit...@li...> >> Unsubscribe or change options at >> https://lists.sourceforge.net/lists/listinfo/bitpim-user >> >> There are several hundred people on this list. Please be >> courteous, on topic and follow the instructions before posting >> http://www.bitpim.org/help/support.htm > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, > vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > <mailto:Bit...@li...> > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm |
From: Toby F. <tob...@gm...> - 2012-11-18 19:57:35
|
Thank you. A service well served. Trivia: What does CC: stand for? On Sun, Nov 18, 2012 at 11:53 AM, Joe <jo...@ma...> wrote: > It's pretty simple. > "To" means "This email is addressed to you directly" and your email > address is visible to anyone else who reads the email (including malware). > > "CC" means this email isn't addressed to you (so you don't need to > respond, etc.), but it's something I think you should know about. It also > lets everyone know you received it - the same as "To", so they don't > forward another copy to you, etc.) > > This is often used on teams where you're talking with one person/group, > but it may affect/interest others who need to know and who also need to > know who else knows what's going on. If I update a procedure at work, I > would send a note "To" my supervisor saying that it was done, I'd "CC" it > to people who use that procedure so they know what to do and can't say they > weren't told (and won't send copies of it to other people they think should > know - because they can see those people were also CC'd on the email) and I > might BCC a copy of it to my private email address for archival purposes. > > "BCC" serves the same purpose as CC, but each recipient cannot see any > other email addresses on the BCC list. (They can still see all the > addresses on the "To" and "CC" lists.) This allows sending information to > a group without telling each recipient who else received it. It also gets > rid of emails that contain a couple of lines of text, but that start with a > page or more of To and cc addresses when you print them. > > It seems like a lost cause, but I often send people who misuse to or cc a > boilerplate reply that explains the above and adds: "My giving you my > email address does not constitute permission for you to give it out to > other people." > > Joe > > > On 11/18/2012 02:13 PM, Toby Fredrickson wrote: > > To:, CC:, Bcc: > > Please tell us all the relationships and how this can help us all. Some > are savvy, but seeing it in a posting would be most welcome. > > Thanks. > > Toby > > On Sun, Nov 18, 2012 at 11:06 AM, Joe <jo...@ma...> wrote: > >> Spam is really annoying, but discussing it shouldn't be a reason for us >> to be uncivil to each other. >> >> You bring up some valid points. It is undoubtedly harder to spam a list >> like this by chance. Just for my own information, can you refer me to some >> evidence that your assertions are true? >> >> I belong to a number of non-technical lists that just can't be convinced >> to use BCC and once my address has unnecessarily gone out to 30 or more >> recipients for each list, it's vulnerability/availability goes up at least >> geometrically, if not exponentially. >> >> I would suggest a single warning email to the account (requiring a timely >> "human" reply) before banning it. People come to lists like this for >> support and should not be banned lightly. >> >> Of course, all of this is up to the moderator who is the only one who can >> take such an action. >> >> If he or she is good at reading email headers (I'm not), then a simple >> address spoof could be detected. But, if the address is spoofed, the list >> still gets it, so it's a problem even if it isn't the poster's fault. >> Knowing that would at least allow the moderator to send out a more polite >> banning message than "I don't like you and I don't like your computer >> either." Or worse yet, no message at all. >> >> 1) People don't usually let their computers send other people's spam on >> purpose. Very often, they don't know it's happening. If it's really a >> spam account, then there will almost certainly be no reply to a warning. >> If they are informed, maybe they will correct the problem. >> >> 2) I've seen spam using my email address and I run Linux, which, although >> it isn't invulnerable to such things, almost never gets "hacked" this way. >> >> In any case, "incompetent" people are not "bad" people and should be >> treated politely, even though their incompetence may cause situations like >> this that have to be addressed. >> >> Joe >> >> On 11/18/2012 09:50 AM, N4AOF wrote: >> >> Oh yes, it is always “someone else’s” computer that “got hacked” -- BS >> on both counts – the vast majority of these spam infestations come from the >> person either getting malware on their computer or from the person having >> given away their account information in response to phishing, fake sites, >> social engineering, or harvesting programs that offer to ‘consolidate’ all >> your mail accounts. >> >> The “someone else’s computer” story CAN occasionally be true because some >> botnet malware does change the “from” address on the email (usually >> detectable in the headers) but that is rare overall and the odds are nearly >> astronomical in any closed mail list (like this one and Yahoo or Google >> Groups) because the changed “from” address would need to match someone on >> the subscriber list. >> >> Bottom line: When we see spam here, it almost certainly came from the >> account shown in the From address and usually the individual is far from >> blameless. >> >> In any case, regardless of who might be at fault, there is only one >> reasonable response for the manager of any mail list – once an address is >> used to send spam to the group, the manager needs to remove and ban that >> account from the list to prevent its use for continued spamming of the list >> members. >> >> >> *From:* Joe <jo...@ma...> >> *Sent:* Sunday, November 18, 2012 03:37 AM >> *To:* bit...@li... >> *Subject:* Re: [BitPim-user] (no subject) >> >> Most of the time, somebody else got their computer hacked and all the >> email addresses harvested and used without ever touching any of their >> computers. Teach people to use BCC instead of CC or TO for mailings so >> fewer addresses get unnecessarily propagated to vulnerable machines. >> >> On 11/17/2012 10:28 PM, Toby Fredrickson wrote: >> >> That happened to my Daughter on my Comcast account. She apparently >> switched over to "dookieprotect" (based on a fellow "stoodent" claiming it >> was the best) or something like it as malware protection and her box got >> zombied into a spam machine. We got it fixed. Any reputable virus system >> should fix that. >> >> On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar...> wrote: >> >>> Another idiot who wants to claim his Yahoo account was “hacked” >>> because he can’t explain why his computer is sending out spam. >>> >>> >>> >> >> >> ------------------------------------------------------------------------------ >> Monitor your physical, virtual and cloud infrastructure from a single >> web console. Get in-depth insight into apps, servers, databases, vmware, >> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >> Pricing starts from $795 for 25 servers or applications!http://p.sf.net/sfu/zoho_dev2dev_nov >> >> >> >> _______________________________________________ >> BitPim-user mailing list Bit...@li... >> Unsubscribe or change options athttps://lists.sourceforge.net/lists/listinfo/bitpim-user >> >> There are several hundred people on this list. Please be >> courteous, on topic and follow the instructions before postinghttp://www.bitpim.org/help/support.htm >> >> >> >> >> ------------------------------------------------------------------------------ >> Monitor your physical, virtual and cloud infrastructure from a single >> web console. Get in-depth insight into apps, servers, databases, vmware, >> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >> Pricing starts from $795 for 25 servers or applications! >> http://p.sf.net/sfu/zoho_dev2dev_nov >> _______________________________________________ >> BitPim-user mailing list Bit...@li... >> Unsubscribe or change options at >> https://lists.sourceforge.net/lists/listinfo/bitpim-user >> >> There are several hundred people on this list. Please be >> courteous, on topic and follow the instructions before posting >> http://www.bitpim.org/help/support.htm >> > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications!http://p.sf.net/sfu/zoho_dev2dev_nov > > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options athttps://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before postinghttp://www.bitpim.org/help/support.htm > > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > |
From: Joe <jo...@ma...> - 2012-11-18 19:53:49
|
It's pretty simple. "To" means "This email is addressed to you directly" and your email address is visible to anyone else who reads the email (including malware). "CC" means this email isn't addressed to you (so you don't need to respond, etc.), but it's something I think you should know about. It also lets everyone know you received it - the same as "To", so they don't forward another copy to you, etc.) This is often used on teams where you're talking with one person/group, but it may affect/interest others who need to know and who also need to know who else knows what's going on. If I update a procedure at work, I would send a note "To" my supervisor saying that it was done, I'd "CC" it to people who use that procedure so they know what to do and can't say they weren't told (and won't send copies of it to other people they think should know - because they can see those people were also CC'd on the email) and I might BCC a copy of it to my private email address for archival purposes. "BCC" serves the same purpose as CC, but each recipient cannot see any other email addresses on the BCC list. (They can still see all the addresses on the "To" and "CC" lists.) This allows sending information to a group without telling each recipient who else received it. It also gets rid of emails that contain a couple of lines of text, but that start with a page or more of To and cc addresses when you print them. It seems like a lost cause, but I often send people who misuse to or cc a boilerplate reply that explains the above and adds: "My giving you my email address does not constitute permission for you to give it out to other people." Joe On 11/18/2012 02:13 PM, Toby Fredrickson wrote: > To:, CC:, Bcc: > > Please tell us all the relationships and how this can help us all. > Some are savvy, but seeing it in a posting would be most welcome. > > Thanks. > > Toby > > On Sun, Nov 18, 2012 at 11:06 AM, Joe <jo...@ma... > <mailto:jo...@ma...>> wrote: > > Spam is really annoying, but discussing it shouldn't be a reason > for us to be uncivil to each other. > > You bring up some valid points. It is undoubtedly harder to spam > a list like this by chance. Just for my own information, can you > refer me to some evidence that your assertions are true? > > I belong to a number of non-technical lists that just can't be > convinced to use BCC and once my address has unnecessarily gone > out to 30 or more recipients for each list, it's > vulnerability/availability goes up at least geometrically, if not > exponentially. > > I would suggest a single warning email to the account (requiring a > timely "human" reply) before banning it. People come to lists > like this for support and should not be banned lightly. > > Of course, all of this is up to the moderator who is the only one > who can take such an action. > > If he or she is good at reading email headers (I'm not), then a > simple address spoof could be detected. But, if the address is > spoofed, the list still gets it, so it's a problem even if it > isn't the poster's fault. Knowing that would at least allow the > moderator to send out a more polite banning message than "I don't > like you and I don't like your computer either." Or worse yet, no > message at all. > > 1) People don't usually let their computers send other people's > spam on purpose. Very often, they don't know it's happening. If > it's really a spam account, then there will almost certainly be no > reply to a warning. If they are informed, maybe they will correct > the problem. > > 2) I've seen spam using my email address and I run Linux, which, > although it isn't invulnerable to such things, almost never gets > "hacked" this way. > > In any case, "incompetent" people are not "bad" people and should > be treated politely, even though their incompetence may cause > situations like this that have to be addressed. > > Joe > > On 11/18/2012 09:50 AM, N4AOF wrote: >> Oh yes, it is always "someone else's" computer that "got hacked" >> -- BS on both counts -- the vast majority of these spam >> infestations come from the person either getting malware on their >> computer or from the person having given away their account >> information in response to phishing, fake sites, social >> engineering, or harvesting programs that offer to 'consolidate' >> all your mail accounts. >> >> The "someone else's computer" story CAN occasionally be true >> because some botnet malware does change the "from" address on the >> email (usually detectable in the headers) but that is rare >> overall and the odds are nearly astronomical in any closed mail >> list (like this one and Yahoo or Google Groups) because the >> changed "from" address would need to match someone on the >> subscriber list. >> >> Bottom line: When we see spam here, it almost certainly came from >> the account shown in the From address and usually the individual >> is far from blameless. >> >> In any case, regardless of who might be at fault, there is only >> one reasonable response for the manager of any mail list -- once >> an address is used to send spam to the group, the manager needs >> to remove and ban that account from the list to prevent its use >> for continued spamming of the list members. >> >> >> *From:* Joe <mailto:jo...@ma...> >> *Sent:* Sunday, November 18, 2012 03:37 AM >> *To:* bit...@li... >> <mailto:bit...@li...> >> *Subject:* Re: [BitPim-user] (no subject) >> >> Most of the time, somebody else got their computer hacked and all >> the email addresses harvested and used without ever touching any >> of their computers. Teach people to use BCC instead of CC or TO >> for mailings so fewer addresses get unnecessarily propagated to >> vulnerable machines. >> >> On 11/17/2012 10:28 PM, Toby Fredrickson wrote: >>> That happened to my Daughter on my Comcast account. She >>> apparently switched over to "dookieprotect" (based on a fellow >>> "stoodent" claiming it was the best) or something like it as >>> malware protection and her box got zombied into a spam machine. >>> We got it fixed. Any reputable virus system should fix that. >>> >>> On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar... >>> <mailto:n4...@ar...>> wrote: >>> >>> Another idiot who wants to claim his Yahoo account was >>> "hacked" because he can't explain why his computer is >>> sending out spam. >>> >>> >>> >> >> >> ------------------------------------------------------------------------------ >> Monitor your physical, virtual and cloud infrastructure from a single >> web console. Get in-depth insight into apps, servers, databases, vmware, >> SAP, cloud infrastructure, etc. Download 30-day Free Trial. >> Pricing starts from $795 for 25 servers or applications! >> http://p.sf.net/sfu/zoho_dev2dev_nov >> >> >> _______________________________________________ >> BitPim-user mailing list Bit...@li... <mailto:Bit...@li...> >> Unsubscribe or change options at >> https://lists.sourceforge.net/lists/listinfo/bitpim-user >> >> There are several hundred people on this list. Please be >> courteous, on topic and follow the instructions before posting >> http://www.bitpim.org/help/support.htm > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, > vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > <mailto:Bit...@li...> > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm |
From: Toby F. <tob...@gm...> - 2012-11-18 19:13:57
|
To:, CC:, Bcc: Please tell us all the relationships and how this can help us all. Some are savvy, but seeing it in a posting would be most welcome. Thanks. Toby On Sun, Nov 18, 2012 at 11:06 AM, Joe <jo...@ma...> wrote: > Spam is really annoying, but discussing it shouldn't be a reason for us > to be uncivil to each other. > > You bring up some valid points. It is undoubtedly harder to spam a list > like this by chance. Just for my own information, can you refer me to some > evidence that your assertions are true? > > I belong to a number of non-technical lists that just can't be convinced > to use BCC and once my address has unnecessarily gone out to 30 or more > recipients for each list, it's vulnerability/availability goes up at least > geometrically, if not exponentially. > > I would suggest a single warning email to the account (requiring a timely > "human" reply) before banning it. People come to lists like this for > support and should not be banned lightly. > > Of course, all of this is up to the moderator who is the only one who can > take such an action. > > If he or she is good at reading email headers (I'm not), then a simple > address spoof could be detected. But, if the address is spoofed, the list > still gets it, so it's a problem even if it isn't the poster's fault. > Knowing that would at least allow the moderator to send out a more polite > banning message than "I don't like you and I don't like your computer > either." Or worse yet, no message at all. > > 1) People don't usually let their computers send other people's spam on > purpose. Very often, they don't know it's happening. If it's really a > spam account, then there will almost certainly be no reply to a warning. > If they are informed, maybe they will correct the problem. > > 2) I've seen spam using my email address and I run Linux, which, although > it isn't invulnerable to such things, almost never gets "hacked" this way. > > In any case, "incompetent" people are not "bad" people and should be > treated politely, even though their incompetence may cause situations like > this that have to be addressed. > > Joe > > On 11/18/2012 09:50 AM, N4AOF wrote: > > Oh yes, it is always “someone else’s” computer that “got hacked” -- BS > on both counts – the vast majority of these spam infestations come from the > person either getting malware on their computer or from the person having > given away their account information in response to phishing, fake sites, > social engineering, or harvesting programs that offer to ‘consolidate’ all > your mail accounts. > > The “someone else’s computer” story CAN occasionally be true because some > botnet malware does change the “from” address on the email (usually > detectable in the headers) but that is rare overall and the odds are nearly > astronomical in any closed mail list (like this one and Yahoo or Google > Groups) because the changed “from” address would need to match someone on > the subscriber list. > > Bottom line: When we see spam here, it almost certainly came from the > account shown in the From address and usually the individual is far from > blameless. > > In any case, regardless of who might be at fault, there is only one > reasonable response for the manager of any mail list – once an address is > used to send spam to the group, the manager needs to remove and ban that > account from the list to prevent its use for continued spamming of the list > members. > > > *From:* Joe <jo...@ma...> > *Sent:* Sunday, November 18, 2012 03:37 AM > *To:* bit...@li... > *Subject:* Re: [BitPim-user] (no subject) > > Most of the time, somebody else got their computer hacked and all the > email addresses harvested and used without ever touching any of their > computers. Teach people to use BCC instead of CC or TO for mailings so > fewer addresses get unnecessarily propagated to vulnerable machines. > > On 11/17/2012 10:28 PM, Toby Fredrickson wrote: > > That happened to my Daughter on my Comcast account. She apparently > switched over to "dookieprotect" (based on a fellow "stoodent" claiming it > was the best) or something like it as malware protection and her box got > zombied into a spam machine. We got it fixed. Any reputable virus system > should fix that. > > On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar...> wrote: > >> Another idiot who wants to claim his Yahoo account was “hacked” >> because he can’t explain why his computer is sending out spam. >> >> >> > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications!http://p.sf.net/sfu/zoho_dev2dev_nov > > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options athttps://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before postinghttp://www.bitpim.org/help/support.htm > > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > |
From: Joe <jo...@ma...> - 2012-11-18 19:06:41
|
Spam is really annoying, but discussing it shouldn't be a reason for us to be uncivil to each other. You bring up some valid points. It is undoubtedly harder to spam a list like this by chance. Just for my own information, can you refer me to some evidence that your assertions are true? I belong to a number of non-technical lists that just can't be convinced to use BCC and once my address has unnecessarily gone out to 30 or more recipients for each list, it's vulnerability/availability goes up at least geometrically, if not exponentially. I would suggest a single warning email to the account (requiring a timely "human" reply) before banning it. People come to lists like this for support and should not be banned lightly. Of course, all of this is up to the moderator who is the only one who can take such an action. If he or she is good at reading email headers (I'm not), then a simple address spoof could be detected. But, if the address is spoofed, the list still gets it, so it's a problem even if it isn't the poster's fault. Knowing that would at least allow the moderator to send out a more polite banning message than "I don't like you and I don't like your computer either." Or worse yet, no message at all. 1) People don't usually let their computers send other people's spam on purpose. Very often, they don't know it's happening. If it's really a spam account, then there will almost certainly be no reply to a warning. If they are informed, maybe they will correct the problem. 2) I've seen spam using my email address and I run Linux, which, although it isn't invulnerable to such things, almost never gets "hacked" this way. In any case, "incompetent" people are not "bad" people and should be treated politely, even though their incompetence may cause situations like this that have to be addressed. Joe On 11/18/2012 09:50 AM, N4AOF wrote: > Oh yes, it is always "someone else's" computer that "got hacked" -- > BS on both counts -- the vast majority of these spam infestations come > from the person either getting malware on their computer or from the > person having given away their account information in response to > phishing, fake sites, social engineering, or harvesting programs that > offer to 'consolidate' all your mail accounts. > > The "someone else's computer" story CAN occasionally be true because > some botnet malware does change the "from" address on the email > (usually detectable in the headers) but that is rare overall and the > odds are nearly astronomical in any closed mail list (like this one > and Yahoo or Google Groups) because the changed "from" address would > need to match someone on the subscriber list. > > Bottom line: When we see spam here, it almost certainly came from the > account shown in the From address and usually the individual is far > from blameless. > > In any case, regardless of who might be at fault, there is only one > reasonable response for the manager of any mail list -- once an > address is used to send spam to the group, the manager needs to remove > and ban that account from the list to prevent its use for continued > spamming of the list members. > > > *From:* Joe <mailto:jo...@ma...> > *Sent:* Sunday, November 18, 2012 03:37 AM > *To:* bit...@li... > <mailto:bit...@li...> > *Subject:* Re: [BitPim-user] (no subject) > > Most of the time, somebody else got their computer hacked and all the > email addresses harvested and used without ever touching any of their > computers. Teach people to use BCC instead of CC or TO for mailings > so fewer addresses get unnecessarily propagated to vulnerable machines. > > On 11/17/2012 10:28 PM, Toby Fredrickson wrote: >> That happened to my Daughter on my Comcast account. She apparently >> switched over to "dookieprotect" (based on a fellow "stoodent" >> claiming it was the best) or something like it as malware protection >> and her box got zombied into a spam machine. We got it fixed. Any >> reputable virus system should fix that. >> >> On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar... >> <mailto:n4...@ar...>> wrote: >> >> Another idiot who wants to claim his Yahoo account was "hacked" >> because he can't explain why his computer is sending out spam. >> >> >> > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm |
From: N4AOF <n4...@ar...> - 2012-11-18 14:50:09
|
Oh yes, it is always “someone else’s” computer that “got hacked” -- BS on both counts – the vast majority of these spam infestations come from the person either getting malware on their computer or from the person having given away their account information in response to phishing, fake sites, social engineering, or harvesting programs that offer to ‘consolidate’ all your mail accounts. The “someone else’s computer” story CAN occasionally be true because some botnet malware does change the “from” address on the email (usually detectable in the headers) but that is rare overall and the odds are nearly astronomical in any closed mail list (like this one and Yahoo or Google Groups) because the changed “from” address would need to match someone on the subscriber list. Bottom line: When we see spam here, it almost certainly came from the account shown in the From address and usually the individual is far from blameless. In any case, regardless of who might be at fault, there is only one reasonable response for the manager of any mail list – once an address is used to send spam to the group, the manager needs to remove and ban that account from the list to prevent its use for continued spamming of the list members. From: Joe Sent: Sunday, November 18, 2012 03:37 AM To: bit...@li... Subject: Re: [BitPim-user] (no subject) Most of the time, somebody else got their computer hacked and all the email addresses harvested and used without ever touching any of their computers. Teach people to use BCC instead of CC or TO for mailings so fewer addresses get unnecessarily propagated to vulnerable machines. On 11/17/2012 10:28 PM, Toby Fredrickson wrote: That happened to my Daughter on my Comcast account. She apparently switched over to "dookieprotect" (based on a fellow "stoodent" claiming it was the best) or something like it as malware protection and her box got zombied into a spam machine. We got it fixed. Any reputable virus system should fix that. On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar...> wrote: Another idiot who wants to claim his Yahoo account was “hacked” because he can’t explain why his computer is sending out spam. |
From: Joe <jo...@ma...> - 2012-11-18 08:38:30
|
Most of the time, somebody else got their computer hacked and all the email addresses harvested and used without ever touching any of their computers. Teach people to use BCC instead of CC or TO for mailings so fewer addresses get unnecessarily propagated to vulnerable machines. On 11/17/2012 10:28 PM, Toby Fredrickson wrote: > That happened to my Daughter on my Comcast account. > She apparently switched over to "dookieprotect" (based on a fellow > "stoodent" claiming it was the best) or something like it as malware > protection and her box got zombied into a spam machine. We got it > fixed. Any reputable virus system should fix that. > > On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar... > <mailto:n4...@ar...>> wrote: > > Another idiot who wants to claim his Yahoo account was "hacked" > because he can't explain why his computer is sending out spam. > > *From:* Ask Me <mailto:tec...@ya...> > *Sent:* Saturday, November 17, 2012 03:55 AM > *To:* tec...@ya... <mailto:tec...@ya...> ; > gan...@ya... <mailto:gan...@ya...> ; > cus...@al... > <mailto:cus...@al...> ; > bit...@li... > <mailto:bit...@li...> > *Subject:* [BitPim-user] (no subject) > > http://www.onelittlemister.com/wp-content/themes/lifestyle/munchmunch.php?abrahimabrar > > ------------------------------------------------------------------------ > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, > vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > <mailto:Bit...@li...> > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > > > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm |
From: Toby F. <tob...@gm...> - 2012-11-18 03:28:16
|
That happened to my Daughter on my Comcast account. She apparently switched over to "dookieprotect" (based on a fellow "stoodent" claiming it was the best) or something like it as malware protection and her box got zombied into a spam machine. We got it fixed. Any reputable virus system should fix that. On Sat, Nov 17, 2012 at 7:01 PM, N4AOF <n4...@ar...> wrote: > Another idiot who wants to claim his Yahoo account was “hacked” because > he can’t explain why his computer is sending out spam. > > *From:* Ask Me <tec...@ya...> > *Sent:* Saturday, November 17, 2012 03:55 AM > *To:* tec...@ya... ; gan...@ya... ; > cus...@al... ; bit...@li... > *Subject:* [BitPim-user] (no subject) > > > http://www.onelittlemister.com/wp-content/themes/lifestyle/munchmunch.php?abrahimabrar > > ------------------------------ > > > > ------------------------------------------------------------------------------ > Monitor your physical, virtual and cloud infrastructure from a single > web console. Get in-depth insight into apps, servers, databases, vmware, > SAP, cloud infrastructure, etc. Download 30-day Free Trial. > Pricing starts from $795 for 25 servers or applications! > http://p.sf.net/sfu/zoho_dev2dev_nov > _______________________________________________ > BitPim-user mailing list Bit...@li... > Unsubscribe or change options at > https://lists.sourceforge.net/lists/listinfo/bitpim-user > > There are several hundred people on this list. Please be > courteous, on topic and follow the instructions before posting > http://www.bitpim.org/help/support.htm > |
From: N4AOF <n4...@ar...> - 2012-11-18 03:19:17
|
Another idiot who wants to claim his Yahoo account was “hacked” because he can’t explain why his computer is sending out spam. From: Ask Me Sent: Saturday, November 17, 2012 03:55 AM To: tec...@ya... ; gan...@ya... ; cus...@al... ; bit...@li... Subject: [BitPim-user] (no subject) http://www.onelittlemister.com/wp-content/themes/lifestyle/munchmunch.php?abrahimabrar -------------------------------------------------------------------------------- |
From: Ask Me <tec...@ya...> - 2012-11-17 08:55:49
|
http://www.onelittlemister.com/wp-content/themes/lifestyle/munchmunch.php?abrahimabrar |
From: Joe <jo...@ma...> - 2012-11-10 19:25:15
|
I have an LG VX8300. It syncs fine on Windows, but will only work on Linux with root permissions. Someone on this list said it was a permissions issue or something similar. Is there a howto or instructions somewhere on how to make it so root permissions are not necessary? I want to set this up for another user who definitely shouldn't be doing things as root. TIA Joe |
From: Ritchie <ro...@gm...> - 2012-11-10 13:25:09
|
Hi to all, I downloaded the new version of BitPIM on my system (kubuntu 12.04) and try to get the PitPIM running, by the detection does not see my phone. I tried all Samsung Phone type manual with "detect", but it failed. I also tried SPH-A460, which was Carrier "Other", "Samsung" and the "SPH-A460" was the only possible selection ? The Port Details showns the correct vendor, but No Hardware Info, Driver Provider, Driver Version, .. Class Only "Active" was true What I am doing wrong ? Best regards Ritchie |
From: Denise <dc...@ya...> - 2012-10-10 14:52:27
|
Hello I have been using Bitpim with the same phone for a few years and it has been working for saving messages wonderfully. I have an LG Dare. What I have noticed very recently and when I look at my history since around August, I have been having issues with the way some messages appear in the Memo segment of Inbox. It appears several users I am receiving messages from have messages appear as gibberish. It changes the words to odd characters. It appears I am using Bitpim 1.0.7. I am uncertain of why the sudden issue. As far as I can tell users who have Verizon as carrier seem to be uploading with no issues. I can provide a screenshot as to what I am seeing. I have been texting with some users for extended time periods and this issue is very recent. Any ideas????? |
From: Sean A. <sea...@ya...> - 2012-09-26 15:52:23
|
http://addictionboot.com/wp-content/plugins/google.html?yui=ge.jieg&himoj=wg.gr&eec=fudw |