EZ1 Rate report from a reader

I want to apologize everyone. I am one of the employee working with EZ1 Rate. It is a Scam. Preveiouly it was Value Benefits of America and then its name got changed as Caller Advantage then Super Savings and now it is EZ1 Rate.

This company is situated in India. We r asked to take the Credit Card numbers of customers saying tht it is just an identification number but it is a very important numbers of cards.

after taking the numbers the card is charged of any amount and then after every month the card is getting charged. if u read this then pls sumone launch a complaint against this company. many r the ladies and old people who give us the credit card numbers so easily.

i m giving the name of the company who is running it is Silgate Solution. it is india one branch is in Delhi in gurgaon another 2 branches r in Mahaashtra in mumbai. if u want the complete address then check out for the silgate call center in yahoo else visit http://www.silgate.cc

New York, New York

i found this today i had some call me to asking the same thing that you have writen in these bolgs but i am a cop so i know this was a joke so while i was on the phone i googel what he told me. there was no info of a build and a company name.dont ever gave you info ever over the phone. i called a # for reporting a a scam the are the fedrual some of such there # is 877-382-4357 call them and tell them what happen so the can find these crimanal.

Dangers on the Internet

Dangers on the Internet
This is a follow up to my post Why is Internet Safety Important

Dangers of the Internet are relative to the perspective of those accessing it. That is to say, on the Internet “dangers” are completely dependent on who is accessing what data from where and what their intentions are for accessing it. For example, researching a list of poisons could be a considered “dangers to the Internet” if a seriously disturbed person intends to kill his or her spouse. On the other hand, if a parent is just wondering what house hold products are poisonous with the intention of protecting her children, can that be considered a danger?

So protection from dangers on the Internet should be proactive and involve human judgment at some level. Policies must be written, planned and implemented in advanced or ad hoc to suit the environment and the users accessing the Internet. Children at a school with access from the classroom will more than likely be different from employees at a skating rink.

Even the items commonly considered dangers on the Internet relate directly to how much access individuals and organizations allow to and from the web. Common “dangers” may include (but should not be limited to) the following:

Accessibility to personal – applies to educating users on the dangers of putting personal information on the Internet and protecting organizational data bases

Sensitive data – For a school sensitive data is likely linked to the grades and personal information of staff and student, but for a business sensitive information could include proprietary information that would hurt the bottom line if it were leaked to competition.

Financial fraud & criminal hackers/scammers- This applies to educating users about criminal hacker techniques such as malware, social engineering, email and website phishing

The access of impressionable and/or psychologically disturbed individuals to potentially harmful and destructive information – This is rather subjective however it should be a concern to schools from elementary – colleges, rehabilitation facilities and mental institutions. There are ways to block certain obvious material with web-blocker type applications, but no one can stop them all. Monitoring is a must if this danger is to be handled seriously.

The risks and damage of these dangers are dependent on the environment & the users involved. It is up to the system owners to ensure that the policies are properly planned, implemented and maintained as exposure to any Internet danger can disrupt the safety, mission and/or values of an organization or individual.

LifeLock Guy Hacked :(

457-55-5462 Todd Davis
I think this is a sad day. A sad day indeed. Todd Davis, CEO of Lifelock (his social security #457-55-5462). Todd Davis has promoted his company by advertising his social security number on the web, radio, tv and billboard signs.

My name is Todd Davis
My social security number is 457-55-5462

I’m Todd Davis, CEO of LifeLock, and yes, that’s my real social security number*. Identity theft is one of the fastest growing crimes in America, victimizing over 10 million people a year and costing billions of dollars. So why publish my social security number? Because I’m absolutely confident LifeLock is protecting my good name and personal information, just like it will yours. And we guarantee our service up to $1 million dollars.”

While I’ve always thought that it was a risky way to promote one business (lol), I’ve always believed that it was a good idea. What they do is monitor your credit card and fico information and alert you if there is anything suspicious. It works (you can also do your self for free). But the Life lock service doesn’t protect you 100% from identity theft.
Some guy in Texas took Todd’s personal information and used it for a pay day load (there is not system to actively keep track of the Payday loan market). So the guy was able to get $500. When it was time to pay back the Payday loan (+1million% interest or whatever it is) the Payday store called the REAL Todd Davis (social security #457-55-5462). I think its unfortunate because it seems like a pretty good service. They are one of the few organizations in the U.S. actually trying to help people take on what is now and epidemic with now grassroots effort to slowdown ID theft and financial fraud.

Although Todd Davis was hacked, I believe their product will still be an effective way to be proactive method of protecting yourself from ID theft & financial fraud. But you should definitely take extra steps to safe guard your personal information. Don’t advertise your social security, your physical address, phone number, birthday or critical information.

Its $10 a month. I’m thinking of doing it just so I can contribute to their cause.

Integral Hacking: Developing Jedi Mind Tricks at DEFCON

“To the weak I became weak, that I might win the weak; I have become all things to all men that I may by all means save some.” 1 Corinthians 9:22

How does a 60 year old former Episcopal priest manage to captivate a packed audience of tech savvy red teens, ambitiously orange “20-something” hackers, amber security professionals, and green information freedom hacktivists while speaking about nothing technical at DEFCON, the world largest hacker convention? Richard Thieme, author of Islands in the Click Stream, has been able to do this since DEFCON 4, 1996 (1).

There is a body of knowledge growing like a fungus in the cracks of the burgeoning technological super fortress that is the information age. Hacking is that fungi and the DEFCON hacker convention is the petri dish where this new organism is cultivated. Like penicillin, this mold can be used for good. This culture is growing tendrils beyond cyberspace and into the human mind. Complex systems and technologies are synergizing toward an integral hacking solution now pushing humanity into new levels of communication by slipping passed the psychological firewalls to communicate on a deeper level with kick ass Jedi mind tricks. Prepare for psychological nudity!

At DEFCON 14, Richard Thieme’s subject was “Beyond Social Engineering: Tools for Reinventing Yourself” in which he discussed how to “manage multiple modular identities” then link them into a seamless life by leveraging them with an intimate knowing of the true inner self (2). The auditorium was crammed with wide-eyed technophiliacs at the edge of their seats.

Even though Thieme freely admits to not having any discernable technical hacking skills he is able to successfully “hack” (a.k.a socially engineer) his way into a very elitist, and young and mostly apathetic counter-culture. He is an Integral Hacker.

The same skills used naturally by Mr. Thieme are used by integral leaders like Brett Thomas, co-founder of the Stagen Leadership Institute, to recognize a person’s worldview, determine what stage of development they are likely to identify with and then communicated with them on that level (4). An integralist would call this “skillful means” but hackers call it a subtle form of social engineering. Social engineering has a slightly negative connotation as it is usually associated with manipulation rather than enhanced communication.

As a complete method of hacking people, integral hacking goes way beyond mere social engineering and into Neuro-Linguistic Programming (NLP) techniques. This subject was also discussed at DEFCON 14. Brad Smith of Computer Institute of the Rockies discussed how law enforcement, FBI and other three letter agencies use NLP during interviews and interrogations (2). Full spectrum people hacking would include all of the NLP “physiological lock picking” techniques to get full access the root of ego.

Past DEFCON speakers touching on the outer reaches of wetware and integral hacking have included Thieme’s, “Hacking a Trans-Planetary Net” which touched on the need for hacking to include “an artist’s imagination, an obsessive hunger for knowledge, and a deep understanding of cyborg humanity” (1). Former hacker Susan Thunder spoke on “Social Engineering and Psychological Subversion of Trusted Systems” which was about infiltrating a company without physical or digital access (3). People are the weakest part of any secure network.

Hackers are the gun slingers of the Wild, Wild Web, living in a world of 20 year old millionaires who have already change the world and actual evil genius’ who are drifting ghosts pilfering the pockets of the ignorant weak. Whether their intentions are holistic or selfish all hackers view ignorance as the greatest sin. The DEFCON prides itself on a borderline dangerous freedom that is fertile ground of both immeasurable brilliance and debauchery of the filthiest sort. It’s the frothiest edge of technological mayhem and creativity. It is on the fringes of every digital-civilizations’ decomposing structures that you will find a culture of complex integral hackers of hardware, software or wetware growing and sending out spores.


1. DEFCON. (July 28, 1999). DEFCON 4 Archive. Retrieved November 18, 2006, from http://defcon.org

2. DEFCON. (August 6, 2006). DEFCON 14. Retrieved November 18 2006,
from http://defcon.org

3. DEFCON. (July 28, 1999). DEFCON 3 Archive. Retrieved November 18, 2006, from http://defcon.org

4. Integral Leadership Review. Biography of Brett Thomas. Retrieved November 18, 2006,


Thieme Works. (2001). Keynotes, Workshops and Retreats. Retrieved November 18 2006,

Social Engineering, the USB Way

I made my way to the credit union at about 6 a.m. to make sure no employees saw us. I then proceeded to scatter the drives in the parking lot, smoking areas, and other areas employees frequented.

I knew a professor who did something similar to this.  He and his class wanted to prove how unsecure the computer stores are so they went to CompUSA/Fry's type computer store and loaded up the display computers with malware.  But they weren't evil malware.. they were “happy malware”.  They notified the manager of what they'd done in order to give them a heads up on the lack of security.  Needless to say the store was pissed.  Gray Hats get no respect.

read more | digg story