To request your FREE subscription to Lis-LEAF,
the Learning Electronically About Freedom mailing service,
RELAX! Read Our Privacy Statement

|| Encryption || Online Privacy || Virus SCAMS and Hoaxes || JUNK Stoppers || Complaint Generator || Y2K Information ||

EPIC Online Guide to Practical Privacy Tools

ENCRYPTION SAVES LIVES!

PGP Awareness Project

Make using PGP fast and simple : HERE'S HOW!

  • THE GOLDEN AGE OF HACKTIVISM
  • Free, secure, and easy-to-use email encryption for everyone!
  • anonym.to - link to other sites anonymously (DEREFERING LINKS SINCE 2001)
  • anonymizer.com (which includes advertising in the process)
  • SpywareInfo.com
  • Encryption Policy Spotlight
  • Civil Disobedience at the International Arms Trafficker Training Page
  • PGP-PCpćdia
  • PGP-attack FAQ
  • Build your own PGP plug-in
  • You can also

    Online Privacy:
    1. Encryption Technology
    PGP (Pretty Good Privacy) is the industry standard. It’s designer/inventor is Phil Zimmerman (http://www.mit.edu/~prz/index.shtml) who was the subject of a three-year criminal investigation by the US government for exporting encryption technology to other countries which the government claimed was a violation of then-existing federal law. The government finally dropped its investigation in 1996. He was not indicted for any crime. PGP is available both as freeware for individual non-commercial use as well as in its proprietary form. The freeware versions (http://www.pgp.com/products/freeware.html) have limited capabilities and are not integrated with any e-mail platforms such as MS Outlook or Outlook Express, etc. AN introduction to cryptography can be found here: http://www.pgp.com/products/whitepapers/pgp_introtocryptography.pdf or you can download it from this page: http://www.pgp.com/products/whitepapers/index.html#cryptography. PGP is widely regarded as the very best encryption software out there. Encryption is an absolute prerequisite if you want to keep your communication with others confidential and private. PGP encryption is strong enough that even the entire computing power existing world wide today, if focused entirely on decrypting one PGP encrypted message, will be unable to do so in any reasonable time frame. In short, it’s about as strong as it gets, but nothing is absolutely perfect, of course. You can acquire personal or corporate proprietary encryption software from PGP corporation at http://www.pgp.com/products/index.html.

    2. Browsing: (a) AnotherProxy.com - Surf The Web Anonymously! requires absolutely no extra software or programs to be installed. (b) You can buy software that allows you to browse the internet anonymously. Some of them use proxy servers that do not reveal your identity. They also block pop-ups, etc.. The down side: they slow down your web browsing and don’t easily let you designate sites from which you do want to accept cookies, etc. Examples of Anonymous browsing software are: The Steganos Internet Anonym 6: http://www.steganos.com/en/sia/ Anonymizer:Privacy Manager: http://www.anonymizer.com/privacymanager/1.0/29index.shtml For other online privacy resources, including shareware, check out this web site: http://shareware.golddownload.com/Internet/Online_Privacy/. The “East-Tec Eraser” is very helpful in making sure files you delete on your computer cannot be recovered by someone who steals your computer or hard drive.

    3. Anti-Spyware Generally not worth the effort. “Spyware” can be any cookie that attaches itself to your computer when you browse. If you do online transactions, such programs would be a hinderance.


    1. The WorldWide Scam Network Insider
    2. ScamBusters
    3. TruthOrFiction.com
    4. Jump off the bandwagon
    1. From: Hahaha hahaha@sexyfun.net
      Subject: Snowhite and the seven Dwarfs - The REAL Story!
      Attachment: dwarf4you.exe
    2. Information Technology Services links on hoaxes, false virus reports, Internet rumors and Chain Letters
    3. Expert Partners Virus & Hoax E-Mail Warnings
    4. The NAVY INFOSEC WebSite
    5. Urban Legends and Folklore: Current Net Hoaxes, Urban Legends, and other digital lies...
    6. TOO GOOD TO BE TRUE: HOAXES -- Check it out before you send it out!
    7. HOWLER's Hoax page
    8. Symantec Hoax Alerts (particularly for virus hoaxes)
    9. stiller hoaxes
    10. internet-101
    1. pickover
    2. datafellows
    3. hoaxsquad
    4. antivirus.com
    5. virusbtn.com/Hoax/
    6. nonprofit.net hoax
    7. korova
    8. hoaxkill
    9. syntac science
    10. syntac index
    11. cnet.com special reports
    12. health issues
    13. health, political, economic, drug issues
    14. infoplease
    15. moonhoax

    ANTI SPAM
    spam dalenda est
    mail-abuse.org
    abuse dot net
    spam con
    address munging
    spam killer
    spam bouncer
    popup killer
    popup stopper

    UXN SPAM COMBAT:
    Take the law into your own hands!

  • Spam Be Gone! v1.1.1 is completely FREE.
  • ALT.SPAM FAQ or "Figuring out fake E-Mail & Posts" - A mother lode of information and links on SPAM.

    USE AN E-MAIL ALIAS
    (except when applying for
    your Lis-LEAF subscription)
    :

    JUNKBUSTERS
  • Junk Mail
    CEASE AND DESIST LETTER
  • ANATOMY OF A SPAM SCAM
  • SPAM & Pornography:
    Common Sense Solutions

  • PROTECT YOUR KIDS NOW
    WITHOUT INTRUSIVE AND OVERBROAD
    FEDERAL AND STATE LAWS!
  • Anti-spam banner
    Boycott Internet spam!

    PRIVACY IDAHO at Skuznet
    Note: should you have any questions about how illegal pyramid schemes differ from legitimate marketing programs, see the FTC website
    Junkemail.Org, are TWO sites of resources for those who are Upset about junk email? and who want to You can even Hit back at the Spammers! The SPAM Filter © and the latest entry into this growing field is


    COUNSEL: "Objection! That question should be taken out and shot."