A slight glitch?

Page 5 - Passionate about caravans & motorhome? Join our community to share that passion with a global audience!
Jun 16, 2020
4,730
1,885
6,935
Visit site
We are registered with www.pobox.com and pay them about £18 a year. They stop spam at source and on the basic account you can have three email addresses with them. You can continue to use existing email address and all emails are directed to your existing email address. We have been using them for over25 years.
But not 100%. Remember, you had some from my old compromised email address a few years ago. Probably because it recognised it as a ‘safe’. Address.

John
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
But not 100%. Remember, you had some from my old compromised email address a few years ago. Probably because it recognised it as a ‘safe’. Address.

John
There is nothing you can do about that sort of email as it is not recognised as spam by any anti-spam app.
 

JTQ

May 7, 2005
3,340
1,152
20,935
Visit site
There is nothing you can do about that sort of email as it is not recognised as spam by any anti-spam app.
Why not simply block a known "old compromised email address"?
By inference, being "old", it can't be coming from the genuine source?
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
Why not simply block a known "old compromised email address", it can't be coming from the genuine source?
You cannot block it until it has been received. Not an easy one for find a solution as you may end up blocking your friend's genuine email address. Can't remember how they do it, but the email address looks genuine but does not come from the friend's address.

A couple of years ago, in addition to John's email address being compromised numerous members of our regiment had the same issue. Generally the email stated that they had been robbed, lost their wallet etc and needed money to get home.
 
Nov 11, 2009
20,463
6,295
50,935
Visit site
You cannot block it until it has been received. Not an easy one for find a solution as you may end up blocking your friend's genuine email address. Can't remember how they do it, but the email address looks genuine but does not come from the friend's address.

A couple of years ago, in addition to John's email address being compromised numerous members of our regiment had the same issue. Generally the email stated that they had been robbed, lost their wallet etc and needed money to get home.
You press on the email address and it reveals the originator. That tells you instantly if it’s a contact or one you don’t want. Then when it’s highlighted you get an option to block it.
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
You press on the email address and it reveals the originator. That tells you instantly if it’s a contact or one you don’t want. Then when it’s highlighted you get an option to block it.
Thanks I am well aware of the above however the email address is the genuine address which is the problem. In the email you are asked to help by forwarding on some money to "X" at an address. The amounts are small so as not to create any suspicion.
 
Jan 3, 2012
9,668
2,080
30,935
Visit site
We are registered with www.pobox.com and pay them about £18 a year. They stop spam at source and on the basic account you can have three email addresses with them. You can continue to use existing email address and all emails are directed to your existing email address. We have been using them for over25 years.
Thanks for information very useful (y)
 

Sam Vimes

Moderator
Sep 7, 2020
1,646
1,203
5,935
Visit site
Spam is generally classed as 'unsolicited emails' but I think there are at least two classes within that. Emails that are scams and emails that are marketing junk. From talking to many of my friends is clear that the latter is what fills up their inboxes, to the extent that one friend rarely uses email now because its full of junk and hard to spot the genuine emails.

Too many of these people are not aware of what they are signing up for when buying stuff on line or browsing web sites that collect your information. As a result they get sent junk they don't want and they're not even aware that many emails have an unsubscribe link at the bottom.

Some less scrupulous companies will automatically opt you in and make it hard to opt out.

So beware of what you're clicking on or signing up to.

Companies like Google, Apple and Microsoft are pretty good at filtering out the scam spam. I have my own domain and the hosting company is very good at this and makes it easy to block persistent offenders if they slip through.

In the end we are all responsible for our own on line actions.
 
  • Like
Reactions: otherclive
Jul 18, 2017
12,323
3,467
32,935
Visit site
Spam is generally classed as 'unsolicited emails' but I think there are at least two classes within that. Emails that are scams and emails that are marketing junk. From talking to many of my friends is clear that the latter is what fills up their inboxes, to the extent that one friend rarely uses email now because its full of junk and hard to spot the genuine emails.

Too many of these people are not aware of what they are signing up for when buying stuff on line or browsing web sites that collect your information. As a result they get sent junk they don't want and they're not even aware that many emails have an unsubscribe link at the bottom.

Some less scrupulous companies will automatically opt you in and make it hard to opt out.

So beware of what you're clicking on or signing up to.

Companies like Google, Apple and Microsoft are pretty good at filtering out the scam spam. I have my own domain and the hosting company is very good at this and makes it easy to block persistent offenders if they slip through.

In the end we are all responsible for our own on line actions.
I avoid clicking on links in emails preferring to Google and then enter the website that way and even then it is not 100% safe. Secondly I generally use my CC via Paypal to make a purchase Online even if the value of the goods is less than £100.

Today I got an email from Mhlengi Gwala a person we helped 4 years ago. Circumstances were that he was a potential class athlete and while riding his bicycle in Durban he was attacked by two individuals and they use a hacksaw to cut off one of his legs.

We knew it was genuine and did a donation to the Gofundme to help him get a prosthetic leg. This new email contained numerous links which I will not click on as they are asking for further donation to help fund a high-performance bike.

Rather they clicking on the links, we will go straight to the site to check if it is genuine and take it from there. Look up his name as he is a world class athlete.
 
  • Like
Reactions: otherclive
Jun 16, 2020
4,730
1,885
6,935
Visit site
Spam is generally classed as 'unsolicited emails' but I think there are at least two classes within that. Emails that are scams and emails that are marketing junk. From talking to many of my friends is clear that the latter is what fills up their inboxes, to the extent that one friend rarely uses email now because its full of junk and hard to spot the genuine emails.

Too many of these people are not aware of what they are signing up for when buying stuff on line or browsing web sites that collect your information. As a result they get sent junk they don't want and they're not even aware that many emails have an unsubscribe link at the bottom.

Some less scrupulous companies will automatically opt you in and make it hard to opt out.

So beware of what you're clicking on or signing up to.

Companies like Google, Apple and Microsoft are pretty good at filtering out the scam spam. I have my own domain and the hosting company is very good at this and makes it easy to block persistent offenders if they slip through.

In the end we are all responsible for our own on line actions.
The friends you describe remind me of how my old email address was. It happened for the reasons you describe. My new address’s are completly spam free. Mainly, I believe this is because I am far more careful with who I pass it onto.

It may also be the case that companies are far more aware of their own security and how the handle customers information.

Getting rid of my old compromised email address was not easy. It was used as a username with many organisations. As well as my contact details. It was easy to write to all of my contacts and ask them to delete my old address and update with the new one. But only about half actually did it. Months later, contacts would write to me to tell me they had recieved a spam mail ostensibly from me. I had to politly remind them that I had asked them to delete it. I needed to monitor it for a couple of years.

The other mistake I made in my ignorance was to use the address provided by my internet supplier. This ties you into that supplier. Much better to use free addresses like Gmail, which can move with you.

I made the same mistake when I moved to Apple. But as I am happy to stay with them. I am not too bothered.



John
 
Nov 11, 2009
20,463
6,295
50,935
Visit site
On the subject of passwords, passphrases are far more secure, and add a number and special character even more so

View attachment 6110View attachment 6110
That's an interesting post and my Router has a very easy to remember Pass Phrase even though I don't require it very often. Do you know how the cracking time for a Pass Phrase compares to the cracking time for the Apple generated long passwords with their array of Characters, Symbols and Numerics?
 
Nov 11, 2009
20,463
6,295
50,935
Visit site
The friends you describe remind me of how my old email address was. It happened for the reasons you describe. My new address’s are completly spam free. Mainly, I believe this is because I am far more careful with who I pass it onto.

It may also be the case that companies are far more aware of their own security and how the handle customers information.

Getting rid of my old compromised email address was not easy. It was used as a username with many organisations. As well as my contact details. It was easy to write to all of my contacts and ask them to delete my old address and update with the new one. But only about half actually did it. Months later, contacts would write to me to tell me they had recieved a spam mail ostensibly from me. I had to politly remind them that I had asked them to delete it. I needed to monitor it for a couple of years.

The other mistake I made in my ignorance was to use the address provided by my internet supplier. This ties you into that supplier. Much better to use free addresses like Gmail, which can move with you.

I made the same mistake when I moved to Apple. But as I am happy to stay with them. I am not too bothered.



John
I have a similar issue with an Email address that I have had since 2006 and it's quite a chore to exit it. But I have one "best address" that is reserved for friends and reputable contacts IE NHS, banks etc. I have recently craeted another Yahoo mail address which will be the one that I use for purchases and run of the mill stuff. My Hotmail address will attract up to 30-40 junk mails per day, but it takes a minute to scan down and Bin those that I don't want. Any remaining ones stay in Junk until I have looked at them. Some may have been Junked incorrectly so I go into Hotmail and put the setting to ensure future ones go into Inbox.
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
That's an interesting post and my Router has a very easy to remember Pass Phrase even though I don't require it very often. Do you know how the cracking time for a Pass Phrase compares to the cracking time for the Apple generated long passwords with their array of Characters, Symbols and Numerics?
Not sure how one is supposed to remember long passwords with an array of characters, symbols and numerics? Struggle to remember names and phone numbers. LOL!
 
  • Like
Reactions: ProfJohnL
Nov 11, 2009
20,463
6,295
50,935
Visit site
Not sure how one is supposed to remember long passwords with an array of characters, symbols and numerics? Struggle to remember names and phone numbers. LOL!
You don't remember them as they are held in the Browser or a Password Manager. If required you can always access them. But they will be used and inserted by fingerprint ID or facial recognition ID, or if on my computer by cursor.
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
You don't remember them as they are held in the Browser or a Password Manager. If required you can always access them. But they will be used and inserted by fingerprint ID or facial recognition ID, or if on my computer by cursor.

If they are held in the browser surely that compromises security? If they are inserted when you click on the password block and they are inserted, surely there is no point as anyone could do the same? Apologies if I have misunderstood.

Currently I do keep a record of passwords that i use for various sites on my laptop. However I use a code that I understand to allocate them to the correct website. Many sites will keep your login details including password even if you delete all the cookies and clear your cache.

Only passwords kept in my head are those for our bank, Paypal and CC who also require a verification code.
 
Jul 19, 2021
521
354
2,135
Visit site
That's an interesting post and my Router has a very easy to remember Pass Phrase even though I don't require it very often. Do you know how the cracking time for a Pass Phrase compares to the cracking time for the Apple generated long passwords with their array of Characters, Symbols and Numerics?
sorry I don't. I have as little to do with Apple as possible
 
  • Like
Reactions: Buckman
Nov 11, 2009
20,463
6,295
50,935
Visit site
If they are held in the browser surely that compromises security? If they are inserted when you click on the password block and they are inserted, surely there is no point as anyone could do the same? Apologies if I have misunderstood.

Currently I do keep a record of passwords that i use for various sites on my laptop. However I use a code that I understand to allocate them to the correct website. Many sites will keep your login details including password even if you delete all the cookies and clear your cache.

Only passwords kept in my head are those for our bank, Paypal and CC who also require a verification code.
Who is going to use my home computer to access passwords? It shuts down after five minutes of non use and requires me to insert my admin password which has to be done using the keyboard. even then bank, credit card Amazon, Paypal etc are not held on it as I remember those and input manually.
 
Jul 18, 2017
12,323
3,467
32,935
Visit site
Who is going to use my home computer to access passwords? It shuts down after five minutes of non use and requires me to insert my admin password which has to be done using the keyboard. even then bank, credit card Amazon, Paypal etc are not held on it as I remember those and input manually.
I take my laptop away with me when out in the caravan, but if you leave yours at home then no issue unless you have a burglar.
 
Nov 11, 2009
20,463
6,295
50,935
Visit site
I take my laptop away with me when out in the caravan, but if you leave yours at home then no issue unless you have a burglar.
A burglar would still need to input my admin password to the MAC MINI or steal it and try and gain access. But as I say I don't keep "key finance" passwords on the computer I remember them. And even if the burglar managed to access the computer it still need access permission for passwords stored in Safari. My phone and iPad leave the house.
 

JTQ

May 7, 2005
3,340
1,152
20,935
Visit site
I take my laptop away with me when out in the caravan, but if you leave yours at home then no issue unless you have a burglar.

If Windows 11 or 10 then there might be the biometric sign in, Windows Hello, face via the probably inbuilt webcam, or on some laptops fingerprint reader.
That coupled with a lengthy user password, the chances of the burglar looking alike enough to any of us is "rare".

LINKI

As said earlier just keep to using an encrypted USB stick, none of my computers etc holding in any form my critical passwords, or so I hope, not knowing for certain what these days is being "watched".

I can see real issues I would have if trying to access my bank accounts on a PC, if in a location without a messaging viable mobile phone link; all are solidly linked to requiring secondary verification.
 
Last edited:
Jun 16, 2020
4,730
1,885
6,935
Visit site
V9tPfqK-WC"G0,3n+$}Jl3PM#R=yP-l%

This is a typical password generated by my password manager. I certainly do not remember them. To use it I just need access to the vault. The password for this I have hidden in my files. But in normal use, it opens with facial recognition. Easy and quick.

My bank account opens almost instantly. On two phones and two iPads. And I believe the security is excellent.

Same with paying using my phone. Just two clicks, show my face and pay.

I understand that lots of people are very nervous about taking such a plunge, but the banks are happy with the security provided.

John
 
  • Like
Reactions: otherclive
Nov 6, 2005
7,429
2,106
25,935
Visit site
V9tPfqK-WC"G0,3n+$}Jl3PM#R=yP-l%

This is a typical password generated by my password manager. I certainly do not remember them. To use it I just need access to the vault. The password for this I have hidden in my files. But in normal use, it opens with facial recognition. Easy and quick.

My bank account opens almost instantly. On two phones and two iPads. And I believe the security is excellent.

Same with paying using my phone. Just two clicks, show my face and pay.

I understand that lots of people are very nervous about taking such a plunge, but the banks are happy with the security provided.

John
What happens with Lasting Power of Attorney (LPA) which can be set up to allow the nominated attorneys to handle financial matters during permanent disability or temporary disability - use a photo of the account holder to gain access?
 
Nov 11, 2009
20,463
6,295
50,935
Visit site
What happens with Lasting Power of Attorney (LPA) which can be set up to allow the nominated attorneys to handle financial matters during permanent disability or temporary disability - use a photo of the account holder to gain access?
No, you can arrange access to a Donors accounts with the banks, building societies etc.by discussion as different companies use different access requirements. For my BIL’s accounts I can use telephone banking where my voice is my my password, traditional usernames with passwords, some being accessed by passwords stored in Safari with fingerprint ID, or just plain old fashioned go into the office with ID. All have two stage verification as a minimum.
 

TRENDING THREADS

Latest posts