Bobbie, Please send me your email address [email protected] -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Bobbie Smith Sent: Thursday, November 15, 2012 5:50 PM To: [email protected] Subject: Re: [ARIZARD] 'Anti'-Malware FREE I have downloaded Spybot and when I go to install it there is a list of things to check or uncheck. I think I need help with these, one says Main files and the check mark is grayed out the second one is Icons for starting blind used mode which is unchecked, the rest are checked and they are 1.Additional languages, 2. Skins to change appearance, 3.Download updates immediately, 4. Security Center Integration, 5.Separate Secure Shredder application, and 6.Explorer file scan plugin (in file context menu). I don't need the additional languages or the icons for starting blind user mode nor do I need the skins to change appearance. I think I will want the Download updates immediately BUT the last three I do not understand nor do I know if I should leave them checked or if I should uncheck themAny help will be much appriciated, Thanka......Bobbie > From: [email protected] > To: [email protected] > Date: Thu, 15 Nov 2012 13:22:37 -0800 > Subject: Re: [ARIZARD] 'Anti'-Malware FREE > > I agree with that Billie. > > Spybot S&D (spybots); Spywareblaster (spyware); and AVAST [Everything] all > look for different things that the jerks in this world create. AVG and > Spybot Do NOT work together. McAfee and Norton's are targeted often & Do > NOT work together. I've had the 1st three that I mentioned on all family, > friends, and in law computers since 2008 without any problems! Of course > you have to lock out teenagers! > > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Billie Walsh > Sent: Thursday, November 15, 2012 5:05 AM > To: [email protected] > Subject: Re: [ARIZARD] 'Anti'-Malware FREE > > I'll second the motion on Avast. I've been using it for years on all the > Windows computers around here. We have never had Windows pick up a virus > since we started using it. IMNSHO, Avast for home use is better than any > of the antivirus on the market you have to pay for. > > AVG is another really good FREE antivirus. > > Never run more than one antivirus on your computer. One is good but, two > is not good. They fight each other and bad stuff can get through. > > On 11/15/2012 05:03 AM, Mike Reeves wrote: > > There are a lot of "FREE" programs out there that are excellent for > blocking > > these. > > > > I'm using AVAST.com that they allow me to update my FREE registration > every > > 14 months. > > > > I also use the manual mode for both SPYWAREBLASTER.com & SPYBOT S&D, where > I > > have to run and update my computer weekly. > > > > I stay away from Norton & McAfee since they both are competing on the > market > > and good targets of China. > > > > Go to AVAST.COM and check out the FAQ on their FREE version or you can buy > a > > registered copy. Same with Spybot S&D & spyware blaster. > > > > Mike Reeves > > > > > > > > -----Original Message----- > > From: [email protected] [mailto:[email protected]] > On > > Behalf Of Ellen Reesh > > Sent: Wednesday, November 14, 2012 10:29 PM > > To: [email protected] > > Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject > > > > List, > > Be sure you don't open the spam from Peggy, if you did run your computer > > anti-virus software because if you don't you will just pass along the > > malware to everyone in your address book. There has been a lot of this > > going on in different genealogy newslists so be real careful with opening > > you e-mail. > > > > Ellen > > > > On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> > wrote: > > > >> Discovered this morning that someone sent out whole bunch of mail -- so, > >> if you get "spam" from me, it isn't legitimate - not sent by me. Sorry > > for > >> the inconvenience. > >> > >> Peggy > >> > >> Peggy J. {KING} TRUESDELL > >> > >> ------------------------------- > >> To unsubscribe from the list, please send an email to > >> [email protected] with the word 'unsubscribe' without the > >> quotes in the subject and the body of the message > >> > > > > ------------------------------- > > To unsubscribe from the list, please send an email to > > [email protected] with the word 'unsubscribe' without the > quotes > > in the subject and the body of the message > > > > > > ------------------------------- > > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > > > -- > "The only difference between death and taxes is that death doesn't get worse > every time Congress meets." > > - Will Rogers > > > _ _... ..._ _ > _._ ._ ..... ._.. ... .._ > > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > ------------------------------- > To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
This is a Message Board Post that is gatewayed to this mailing list. Author: RuthElam55 Surnames: Walker Classification: queries Message Board URL: http://boards.rootsweb.com/localities.northam.usa.states.arkansas.counties.izard/357.437.436/mb.ashx Message Board Post: Hello Jeff are you still out there? Doing Izard county Walker research and have a question. Important Note: The author of this message may not be subscribed to this list. If you would like to reply to them, please click on the Message Board URL link above and respond on the board.
I have downloaded Spybot and when I go to install it there is a list of things to check or uncheck. I think I need help with these, one says Main files and the check mark is grayed out the second one is Icons for starting blind used mode which is unchecked, the rest are checked and they are 1.Additional languages, 2. Skins to change appearance, 3.Download updates immediately, 4. Security Center Integration, 5.Separate Secure Shredder application, and 6.Explorer file scan plugin (in file context menu). I don't need the additional languages or the icons for starting blind user mode nor do I need the skins to change appearance. I think I will want the Download updates immediately BUT the last three I do not understand nor do I know if I should leave them checked or if I should uncheck themAny help will be much appriciated, Thanka......Bobbie > From: [email protected] > To: [email protected] > Date: Thu, 15 Nov 2012 13:22:37 -0800 > Subject: Re: [ARIZARD] 'Anti'-Malware FREE > > I agree with that Billie. > > Spybot S&D (spybots); Spywareblaster (spyware); and AVAST [Everything] all > look for different things that the jerks in this world create. AVG and > Spybot Do NOT work together. McAfee and Norton's are targeted often & Do > NOT work together. I've had the 1st three that I mentioned on all family, > friends, and in law computers since 2008 without any problems! Of course > you have to lock out teenagers! > > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Billie Walsh > Sent: Thursday, November 15, 2012 5:05 AM > To: [email protected] > Subject: Re: [ARIZARD] 'Anti'-Malware FREE > > I'll second the motion on Avast. I've been using it for years on all the > Windows computers around here. We have never had Windows pick up a virus > since we started using it. IMNSHO, Avast for home use is better than any > of the antivirus on the market you have to pay for. > > AVG is another really good FREE antivirus. > > Never run more than one antivirus on your computer. One is good but, two > is not good. They fight each other and bad stuff can get through. > > On 11/15/2012 05:03 AM, Mike Reeves wrote: > > There are a lot of "FREE" programs out there that are excellent for > blocking > > these. > > > > I'm using AVAST.com that they allow me to update my FREE registration > every > > 14 months. > > > > I also use the manual mode for both SPYWAREBLASTER.com & SPYBOT S&D, where > I > > have to run and update my computer weekly. > > > > I stay away from Norton & McAfee since they both are competing on the > market > > and good targets of China. > > > > Go to AVAST.COM and check out the FAQ on their FREE version or you can buy > a > > registered copy. Same with Spybot S&D & spyware blaster. > > > > Mike Reeves > > > > > > > > -----Original Message----- > > From: [email protected] [mailto:[email protected]] > On > > Behalf Of Ellen Reesh > > Sent: Wednesday, November 14, 2012 10:29 PM > > To: [email protected] > > Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject > > > > List, > > Be sure you don't open the spam from Peggy, if you did run your computer > > anti-virus software because if you don't you will just pass along the > > malware to everyone in your address book. There has been a lot of this > > going on in different genealogy newslists so be real careful with opening > > you e-mail. > > > > Ellen > > > > On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> > wrote: > > > >> Discovered this morning that someone sent out whole bunch of mail -- so, > >> if you get "spam" from me, it isn't legitimate - not sent by me. Sorry > > for > >> the inconvenience. > >> > >> Peggy > >> > >> Peggy J. {KING} TRUESDELL > >> > >> ------------------------------- > >> To unsubscribe from the list, please send an email to > >> [email protected] with the word 'unsubscribe' without the > >> quotes in the subject and the body of the message > >> > > > > ------------------------------- > > To unsubscribe from the list, please send an email to > > [email protected] with the word 'unsubscribe' without the > quotes > > in the subject and the body of the message > > > > > > ------------------------------- > > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > > > -- > "The only difference between death and taxes is that death doesn't get worse > every time Congress meets." > > - Will Rogers > > > _ _... ..._ _ > _._ ._ ..... ._.. ... .._ > > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > ------------------------------- > To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
I'm not Jeff, but I'm Joseph's great-grandson, can I help? -----Original Message----- >From: "[email protected]" <[email protected]> >Sent: Nov 15, 2012 2:03 PM >To: [email protected] >Subject: Re: [ARIZARD] Joseph Walker > >This is a Message Board Post that is gatewayed to this mailing list. > >Author: RuthElam55 >Surnames: Walker >Classification: queries > >Message Board URL: > >http://boards.rootsweb.com/localities.northam.usa.states.arkansas.counties.izard/357.437.436/mb.ashx > >Message Board Post: > >Hello Jeff are you still out there? >Doing Izard county Walker research and have a question. > >Important Note: >The author of this message may not be subscribed to this list. If you would like to reply to them, please click on the Message Board URL link above and respond on the board. > > > > >------------------------------- >To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
I agree with that Billie. Spybot S&D (spybots); Spywareblaster (spyware); and AVAST [Everything] all look for different things that the jerks in this world create. AVG and Spybot Do NOT work together. McAfee and Norton's are targeted often & Do NOT work together. I've had the 1st three that I mentioned on all family, friends, and in law computers since 2008 without any problems! Of course you have to lock out teenagers! -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Billie Walsh Sent: Thursday, November 15, 2012 5:05 AM To: [email protected] Subject: Re: [ARIZARD] 'Anti'-Malware FREE I'll second the motion on Avast. I've been using it for years on all the Windows computers around here. We have never had Windows pick up a virus since we started using it. IMNSHO, Avast for home use is better than any of the antivirus on the market you have to pay for. AVG is another really good FREE antivirus. Never run more than one antivirus on your computer. One is good but, two is not good. They fight each other and bad stuff can get through. On 11/15/2012 05:03 AM, Mike Reeves wrote: > There are a lot of "FREE" programs out there that are excellent for blocking > these. > > I'm using AVAST.com that they allow me to update my FREE registration every > 14 months. > > I also use the manual mode for both SPYWAREBLASTER.com & SPYBOT S&D, where I > have to run and update my computer weekly. > > I stay away from Norton & McAfee since they both are competing on the market > and good targets of China. > > Go to AVAST.COM and check out the FAQ on their FREE version or you can buy a > registered copy. Same with Spybot S&D & spyware blaster. > > Mike Reeves > > > > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Ellen Reesh > Sent: Wednesday, November 14, 2012 10:29 PM > To: [email protected] > Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject > > List, > Be sure you don't open the spam from Peggy, if you did run your computer > anti-virus software because if you don't you will just pass along the > malware to everyone in your address book. There has been a lot of this > going on in different genealogy newslists so be real careful with opening > you e-mail. > > Ellen > > On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> wrote: > >> Discovered this morning that someone sent out whole bunch of mail -- so, >> if you get "spam" from me, it isn't legitimate - not sent by me. Sorry > for >> the inconvenience. >> >> Peggy >> >> Peggy J. {KING} TRUESDELL >> >> ------------------------------- >> To unsubscribe from the list, please send an email to >> [email protected] with the word 'unsubscribe' without the >> quotes in the subject and the body of the message >> > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > ------------------------------- > To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message > -- "The only difference between death and taxes is that death doesn't get worse every time Congress meets." - Will Rogers _ _... ..._ _ _._ ._ ..... ._.. ... .._ ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
SECURITY GLOSSARY from www.download.com in 2009 Internet hacks and attacks are part of an ever-changing, ever-expanding industry that hopes to fool or exploit PC users. The best defense against such threats is education. We've created a glossary of the most common terms relating to Internet security to help CNET users navigate the dangers from A to Z. ActiveX Controls These controls link to any object--traditionally dynamic content such as tables and buttons that react to mouse clicks--embedded within a Web page. Although ActiveX controls help Web pages spring to life, malicious programmers can easily use them as vehicles for downloading spyware. Install a sturdy browser and firewall that screens your ActiveX Controls, and download them with care, accepting ActiveX only from trusted Web sites. Adware Typically, adware components install alongside a shareware or freeware application. These advertisements create revenue for the software developer and are provided with initial consent from the user. Adware displays Web based advertisements through pop-up windows or through an advertising banner that appears within a program's interface. Antispyware software This is a broad term for programs designed to protect a computer from adware and spyware. Almost all antispyware applications feature a scanning engine, which detects suspicious items and removes them from the infected machine. Some antispyware applications also include a real-time-protection module, a shield that alerts users when suspicious programs attempt to install themselves and allows users to deny them. Backdoor programs This refers to any software program that allows other users to control machines remotely while hiding any evidence of the fact. Software developers are the most common authors and users of backdoor programs, adding them to make testing easier. Backdoor Trojan horses are spyware programs that sabotage your PC. These specific Trojan horses force a backdoor program onto your machine and infiltrate your system to collect information or install spyware. Bot An Internet robot, shortened to "bot," is an automated program that performs a specific timesaving function in lieu of a human operator, such as a spider that trolls Web sites collecting data for market research. Spyware bots secretly install through worms, Trojan horses, and drive-by downloads. They are mostly used to carry out remote attacks, such as denial-of-service (DoS) attacks. Botnet A botnet is a network of bots installed on multiple computers, each running identical malware. A botnet can be controlled remotely via an IRC (Internet Relay Chat) server or a peer-to-peer application. Browser-helper object (BHO) BHOs are files--most frequently DLLs--that add additional functionality to Internet Explorer. Although many useful programs such as Adobe Acrobat employ BHOs, these files also can be used for unsavory purposes. BHOs associated with adware or spyware can monitor your browsing activities, hijack your home page, or replace certain advertisements with others. Cracker Cracker is a shortened name for a criminal hacker. Read more at hacker. Denial-of-service (DoS) attack Denial of service is an attack designed to block user access to a Web site or network by flooding it with bogus information (such as a surplus of requests). The information overload maxes out the Web site or network's processing capabilities, resulting in the user's inability to access Internet services and making it appear inaccessible. These DoS attacks damage productivity and can be highly frustrating, though the hacker's primary purpose of such attacks is generally disruption and not identity theft. Distributed denial-of-service (DDoS) attack This variety of DoS attack enlists multiple compromised computers to flood a single target with bogus information. A criminal hacker can hijack your computer and force it and others to perform a DoS attack against other computers, users, or networks. Dialer Traditional modems use a program called a dialer to connect a computer to the Internet, but dialers are perhaps most well-known for their illegitimate purposes. Bad dialers cause your PC to call long-distance or for-pay numbers, rather than you're ISP. This most often results in a large telephone bill for the user and a tidy profit for the dialer's creator. Drive-by This term is loosely used for a stealth software installation the user does not initiate. In some cases, simply visiting a Web page can download malicious programs to a PC without a user's knowledge or consent. In other cases, a pop-up ad might be used to initiate a drive-by installation. Evil twin A spoofed doppelganger of a legitimate wireless access point is known as an evil twin. Often home constructed, the evil twin hotspot offers wireless access for the purpose of collecting the user's data, which can then be exploited or sold. False positive False positives can fall into several categories. In an effort to sell software, unscrupulous antispyware programs often will mislead a user into believing his or her machine is infected with spyware when no problems actually exist. The term false positive also can be used when legitimate antispyware applications mistakenly label a benign program as a threat. Firewall A firewall is a crucial component in a computer's line of defense, as firewalls prevent unauthorized services or programs from accessing a computer or network resources. Although virtually every corporate network has its own firewall, every personal computer should have one as well. Personal firewalls can come as standalone products or as components built-in to a larger security suite. Hacker "Hacker" is a term that often requires more qualification than is given, as hackers can act with intentions and outcomes ranging from beneficial to malicious. To hack a file or a program is simply to deconstruct it or tweak its performance. Therefore the term hacker has neutral connotations, encompassing those who tinker with computer programs with no malicious intent, such as computer programmers or security researchers, as well as criminal hackers (also called crackers) who seek to damage your system, gain from stored data, or control your PC remotely. Hacking taxonomy is associated by color--black hat hackers are malicious, white hat hackers are benign and gray hat hackers are characterized by varying motivations. Hijackers Often installing as a helpful browser toolbar, hijackers may alter browser settings or change the default home page to point to some other site. Keylogger Keyloggers are just what they sound like--programs that record every keystroke made on a PC. Though some parental-control applications include keyloggers for monitoring purposes, the ones that come bundled with spyware are far more insidious. These types of keyloggers send sensitive information to a remote computer, where thieves can access data such as credit-card and bank-account numbers, as well as passwords and social-security numbers. Malware Malware is generally used to describe a piece of software that exploits or inconveniences the user. It usually refers to the most malicious forms of adware and spyware. Man-in-the-middle attack In this particular type of attack, a third party piggybacks on valid user privileges to gain unapproved access to a computer or network. The man-in-the-middle (MITM) attack exploits the authentication process of a one-way authentication (user approved by the network) wireless access point (WAP). MITM attacks are orchestrated by intercepting a valid authentication granted by a network with a one-way authentication setup to any valid Media Access Connection (MAC). With the user's legitimate access as a shield, the MITM has full access to the data flowing in and out of a user's computer. Pharming Like phishing, pharming preys on socially conditioned patterns of human behavior to coax sensitive information from victims. Whereas phishers masquerade as legitimate organizations, pharmers hijack sites' domain names to redirect traffic elsewhere. In this way, visitors to an online banking site can be channeled to a mirror site and prompted to provide personal data that crackers can collect and use. Phishing Spoofing legitimate organizations to lure users into giving up sensitive data is a favorite technique among security fraudsters. In a common phishing scam, users receive a look-alike e-mail message purportedly from a trusted institution like their bank, alerting them to an urgent need. Users follow the embedded link to a convincing site that requires them to sign in using account information. Among the subsets of phishing scams, spear phishing targets a specific user demographic, such as gamers. In VoIP phishing, users are directed to verify their account information over the phone rather than on a Web site. Phreaking Combining the words "phone" and "freak," phreaking refers to a wide subculture of hacking that involves manipulating and exploiting telephone systems. Rogue antispyware software Posing as legitimate antispyware applications, these malicious programs scan a computer and induce false positives to scare users into buying a product. Rogues often attempt to distribute themselves via ominous pop-up ads and can be very difficult to manually uninstall. Rootkit Although an exact definition of what constitutes a rootkit is still under debate, it is generally regarded as a piece of software that allows intruders to conceal malicious files and programs from users or system administrators. Rootkits can be extremely hard to uninstall and allow troublemakers to go about their dirty work undetected. Spam Originally, the unsolicited bulk messages that inundate a user's account took the form of e-mail messages (mostly advertisements) in which the sender attempted to engage the user in a purchase. Spam has evolved, and unsolicited bulk messages crop up in instant messages (spim), blog comments (splogs), mobile texts (SMS spam), forums, and so on. More than merely annoying, spam attachments can contain viruses and malware or link to dangerous Web sites. Spam is the principle vehicle for phishing scams. Spoof Spoofs are misleading Web addresses, spam e-mails, and IP addresses forged by a malicious hacker to look identical to the legitimate organization's materials. They are used to trick users into responding to alerts that appear to be issued by trusted organizations such as banks. Users who respond to the visual fakery and urgency of the requests are prompted to give up private data, which is then often used in identity theft. Spoofs are instrumental in carrying out phishing, pharming, and phreaking scams. In a pharming exploit, a spoofed IP address of a legitimate company might be scripted to float over the culprit's actual, nonlegitimate IP address in order to make the user believe the site is valid. Spyware Spyware refers to programs that gather and transmit the user's personal details or behavior to a third party, often without the user's knowledge or consent. Like adware, it often installs as a third-party component bundled with freeware or shareware, creating a fuzzy distinction between the two. Tracking cookies Internet browsers write and read cookies, files with small amounts of data (such as site passwords and settings) based on instructions from Web sites. In many cases, cookies provide a benefit to users. However, in some instances cookies are used to consolidate and track user behavior across different sites, which provide marketers with private information about an individual. Trojan horses Trojan horses slip into an individual's system and run without the user's knowledge. They can have many functions. For example, some use a computer's modem to dial long-distance, generating huge phone bills for the computer owner. Unlike viruses and worms, Trojan horses do not make copies of themselves. Virus Like human viruses, the computer varieties contain harmful code and spread easily to infect multiple hosts. Viruses are notorious for corrupting hardware, software, and personal files. Viruses cannot spread on their own, requiring users to share infected files through e-mail attachments, flash drives, disks, P2P, Web sites, or any other file-transferring mechanisms. Worm Often conflated with viruses, worms also are self-replicating programs; however, they propagate independently of user interaction, often through a shared or direct network connection. Worms may destroy data on individual machines, but mostly inflict their damage by siphoning users' bandwidth or shutting down their computers. Zombie Using viruses, Trojan horses, and worms, criminal hackers can remotely operate a compromised machine without the knowledge of its owner. Zombie computers often host programs that allow them to be conscripted by a remote controller into bot armies, called botnets, to launch DDoS attacks. Zero-day exploit Malicious hackers have discovered they can increase their level of destruction by cracking the defenses of a product on the same day that news of a vulnerability breaks and/or an ensuing patch is released. Disclosure practices compel software and security vendors to publicly announce flaws, which informs fast-acting exploiters. The resulting zero-day attacks affect users who haven't applied a patch to fix the vulnerability. Check to verify if email is SPAM before forwarding: www.snopes.com/ www.truthorfiction.com/ Report unsolicited SPAM www.ftc.gov/spam/ www.spam.org/ Blocking Spammers www.spamhaus.org/sbl Mike Reeves
I'll second the motion on Avast. I've been using it for years on all the Windows computers around here. We have never had Windows pick up a virus since we started using it. IMNSHO, Avast for home use is better than any of the antivirus on the market you have to pay for. AVG is another really good FREE antivirus. Never run more than one antivirus on your computer. One is good but, two is not good. They fight each other and bad stuff can get through. On 11/15/2012 05:03 AM, Mike Reeves wrote: > There are a lot of "FREE" programs out there that are excellent for blocking > these. > > I'm using AVAST.com that they allow me to update my FREE registration every > 14 months. > > I also use the manual mode for both SPYWAREBLASTER.com & SPYBOT S&D, where I > have to run and update my computer weekly. > > I stay away from Norton & McAfee since they both are competing on the market > and good targets of China. > > Go to AVAST.COM and check out the FAQ on their FREE version or you can buy a > registered copy. Same with Spybot S&D & spyware blaster. > > Mike Reeves > > > > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Ellen Reesh > Sent: Wednesday, November 14, 2012 10:29 PM > To: [email protected] > Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject > > List, > Be sure you don't open the spam from Peggy, if you did run your computer > anti-virus software because if you don't you will just pass along the > malware to everyone in your address book. There has been a lot of this > going on in different genealogy newslists so be real careful with opening > you e-mail. > > Ellen > > On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> wrote: > >> Discovered this morning that someone sent out whole bunch of mail -- so, >> if you get "spam" from me, it isn't legitimate - not sent by me. Sorry > for >> the inconvenience. >> >> Peggy >> >> Peggy J. {KING} TRUESDELL >> >> ------------------------------- >> To unsubscribe from the list, please send an email to >> [email protected] with the word 'unsubscribe' without the >> quotes in the subject and the body of the message >> > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the quotes > in the subject and the body of the message > > > ------------------------------- > To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message > -- “The only difference between death and taxes is that death doesn't get worse every time Congress meets.” — Will Rogers _ _... ..._ _ _._ ._ ..... ._.. ... .._
This warning came too late for me. I did that very thing. I am so sorry for passing it along. Joy From: Ellen Reesh <[email protected]> To: [email protected] Sent: Wednesday, November 14, 2012 11:28 PM Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject List, Be sure you don't open the spam from Peggy, if you did run your computer anti-virus software because if you don't you will just pass along the malware to everyone in your address book. There has been a lot of this going on in different genealogy newslists so be real careful with opening you e-mail. Ellen On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> wrote: > Discovered this morning that someone sent out whole bunch of mail -- so, > if you get "spam" from me, it isn't legitimate - not sent by me. Sorry for > the inconvenience. > > Peggy > > Peggy J. {KING} TRUESDELL > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the > quotes in the subject and the body of the message > ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
There are a lot of "FREE" programs out there that are excellent for blocking these. I'm using AVAST.com that they allow me to update my FREE registration every 14 months. I also use the manual mode for both SPYWAREBLASTER.com & SPYBOT S&D, where I have to run and update my computer weekly. I stay away from Norton & McAfee since they both are competing on the market and good targets of China. Go to AVAST.COM and check out the FAQ on their FREE version or you can buy a registered copy. Same with Spybot S&D & spyware blaster. Mike Reeves -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Ellen Reesh Sent: Wednesday, November 14, 2012 10:29 PM To: [email protected] Subject: Re: [ARIZARD] "HACKED AGAIN" Off Subject List, Be sure you don't open the spam from Peggy, if you did run your computer anti-virus software because if you don't you will just pass along the malware to everyone in your address book. There has been a lot of this going on in different genealogy newslists so be real careful with opening you e-mail. Ellen On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> wrote: > Discovered this morning that someone sent out whole bunch of mail -- so, > if you get "spam" from me, it isn't legitimate - not sent by me. Sorry for > the inconvenience. > > Peggy > > Peggy J. {KING} TRUESDELL > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the > quotes in the subject and the body of the message > ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
List, Be sure you don't open the spam from Peggy, if you did run your computer anti-virus software because if you don't you will just pass along the malware to everyone in your address book. There has been a lot of this going on in different genealogy newslists so be real careful with opening you e-mail. Ellen On Wed, Nov 14, 2012 at 3:12 PM, PEGGY TRUESDELL <[email protected]> wrote: > Discovered this morning that someone sent out whole bunch of mail -- so, > if you get "spam" from me, it isn't legitimate - not sent by me. Sorry for > the inconvenience. > > Peggy > > Peggy J. {KING} TRUESDELL > > ------------------------------- > To unsubscribe from the list, please send an email to > [email protected] with the word 'unsubscribe' without the > quotes in the subject and the body of the message >
Discovered this morning that someone sent out whole bunch of mail -- so, if you get "spam" from me, it isn't legitimate - not sent by me. Sorry for the inconvenience. Peggy Peggy J. {KING} TRUESDELL
this is my family mygrgrgrandfather was elijah wadkins julie frances green any infomation or pictures would be appreciated mary ellen wadkins was my grandmother my mom was carlene j taylor ----- Original Message ----- From: [email protected] To: [email protected] Sent: Tuesday, November 13, 2012 2:00:27 AM Subject: ARIZARD Digest, Vol 7, Issue 312 Today's Topics: 1. Re: Watkins,Wadkins (Harold Blevins) 2. Re: Watkins,Wadkins (Give your children 2 things, one is roots, the other--wings!!!) 3. Re: Watkins,Wadkins (Harold Blevins) ---------------------------------------------------------------------- Message: 1 Date: Mon, 12 Nov 2012 12:58:52 -0600 From: "Harold Blevins" <[email protected]> Subject: Re: [ARIZARD] Watkins,Wadkins To: <[email protected]> Message-ID: <[email protected]> Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original I grew up in the Sage-LaCrosse area and have about 30 "Watkins" and 20 "Wadkins" in my files. Don't remember if the two spellings are connected or not. Could we have names of specific people you are looking for???.......Harold B. -------------------------------------------------- From: <[email protected]> Sent: Sunday, November 11, 2012 6:45 PM To: <[email protected]> Subject: Re: [ARIZARD] ARIZARD Digest, Vol 7, Issue 303 > > looking for information on taylors and greens and wadkins > ----- Original Message ----- > From: [email protected] > To: [email protected] > Sent: Tue, 06 Nov 2012 14:52:42 -0600 (CST) > Subject: ARIZARD Digest, Vol 7, Issue 303 > ------------------------------ Message: 2 Date: Mon, 12 Nov 2012 19:31:54 -0600 From: "Give your children 2 things, one is roots, the other--wings!!!" <[email protected]> Subject: Re: [ARIZARD] Watkins,Wadkins To: [email protected] Message-ID: <[email protected]> Content-Type: text/plain; charset=utf-8 Harold, This person is a desc of Julie Green & Lige (Elijah) Wadkins. Julie is sister to my grandfather. Elijah had a twin, Elisha. Sent from my MOTOROLA ATRIX? HD on AT&T Harold Blevins <[email protected]> wrote: >I grew up in the Sage-LaCrosse area and have about 30 "Watkins" >and 20 "Wadkins" in my files. Don't remember if the two spellings >are connected or not. Could we have names of specific people >you are looking for???.......Harold B. > >-------------------------------------------------- >From: <[email protected]> >Sent: Sunday, November 11, 2012 6:45 PM >To: <[email protected]> >Subject: Re: [ARIZARD] ARIZARD Digest, Vol 7, Issue 303 > >> >> looking for information on taylors and greens and wadkins >> ----- Original Message ----- >> From: [email protected] >> To: [email protected] >> Sent: Tue, 06 Nov 2012 14:52:42 -0600 (CST) >> Subject: ARIZARD Digest, Vol 7, Issue 303 >> > >------------------------------- >To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message ------------------------------ Message: 3 Date: Mon, 12 Nov 2012 22:44:14 -0600 From: "Harold Blevins" <[email protected]> Subject: Re: [ARIZARD] Watkins,Wadkins To: <[email protected]> Message-ID: <[email protected]> Content-Type: text/plain; format=flowed; charset="UTF-8"; reply-type=original Pasted below is what I have in my files on this family................Haold B. --------------------------------------------------------------------------------------------------------- > Harold, This person is a desc of Julie Green & Lige (Elijah) Wadkins. > Julie is sister to my grandfather. Elijah had a twin, Elisha. ---------------------------------------------------------------------------------------------------------------------- Descendants of Jesse Robert Wadkins Generation No. 1 1. JESSE ROBERT WADKINS He married SARAH JANE BLANKENSHIP Abt. 1872, daughter of ELISHA BLANKENSHIP and ELIZABETH MOORHEAD. She was born Abt. 1835, and died in Old Marshall AR (Old Marshall Cemetery)c. Children of JESSE WADKINS and SARAH BLANKENSHIP are: 2. i. ELISHA WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 13 Sep 1933, Grandview, Conway County AR. 3. ii. ELIJAH WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 1943, Norfork, Baxter County AR. Generation No. 2 2. ELISHA WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 13 Sep 1933 in Grandview, Conway County AR. He married LUCINDA ANNA PHILLIPS 1899 in Arkansas. She was born 10 Nov 1882 in Quitman, Cleburne County AR. Children of ELISHA WADKINS and LUCINDA PHILLIPS are: i. INFANT WADKINS, b. 1902, Marshall, Searcy County AR. ii. WILLIAM ADAM "WILLIE" WADKINS, b. 25 Jan 1903, Marshall, Searcy County AR. iii. ELIJAH GABRIEL "GABE" WADKINS, b. Abt. 1906, Marshall, Searcy County AR. iv. MYRTLE JANE WADKINS, b. 03 Aug 1909, Marshall, Searcy County AR. v. MARTHA WADKINS, b. Abt. 1910, Marshall, Searcy County AR. vi. ROSA MAE WADKINS, b. 03 Mar 1912, Marshall, Searcy County AR. vii. EDNA L. WADKINS, b. 07 Dec 1914, Marshall, Searcy County AR. viii. ETHEL MARIE WADKINS, b. Abt. 1917, Marshall, Searcy County AR. ix. HOMER B. WADKINS, b. 20 Mar 1921, Marshall, Searcy County AR. 3. ELIJA2 WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 1943 in Norfork, Baxter County AR. He married JULIA "JULIE" FRANCES GREEN 1897 in Baxter County AR. She was born 21 Feb 1882 in Baxter County AR. Children of ELIJAH WADKINS and JULIA GREEN are: i. HENRY WADKINS, b. Mar 1897. ii. JOHN E. WADKINS, b. Jun 1898. iii. MARTHA A. WADKINS, b. Abt. 1902. iv. SARAH EDNA WADKINS, b. Abt. 1904. v. AMOS LLOYD WADKINS, b. Abt. 1906. vi. JAMES HARLIN WADKINS, b. Abt. 1909. vii. CHARLIE WADKINS, b. Abt. 1913. viii. WILLIE WADKINS, b. Abt. 1915. ix. MARY WADKINS, b. Abt. 1918. ------------------------------ To contact the ARIZARD list administrator, send an email to [email protected] To post a message to the ARIZARD mailing list, send an email to [email protected] __________________________________________________________ To unsubscribe from the list, please send an email to [email protected] with the word "unsubscribe" without the quotes in the subject and the body of the email with no additional text. End of ARIZARD Digest, Vol 7, Issue 312 ***************************************
Thanks, Vera Pat Foster -----Original Message----- From: [email protected] [mailto:[email protected]] On Behalf Of Vera Reeves Sent: Tuesday, November 13, 2012 7:26 AM To: [email protected] Subject: [ARIZARD] Watkins,Wadkins Harold, here's the marriage info for E. W. Watkins & Julia Green 25 Oct 1896 in Baxter County, Arkansas Note the spelling of his name. You might find some death dates on Find A Grave. http://www.findagrave.com/cgi-bin/fg.cgi?page=gsr&GSiman=1&GScid=54184&GSfn= &GSln=Wadkins
This is the second one in two days. Unless you send me a personal email this is going to the trash. Betty --- On Tue, 11/13/12, Eugene Maddox <[email protected]> wrote: From: Eugene Maddox <[email protected]> Subject: [ARIZARD] ari hey! To: "ari" <[email protected]> Date: Tuesday, November 13, 2012, 1:24 PM check this out http://msnbc.msn.com-in5.us/finan ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
check this out http://msnbc.msn.com-in5.us/finan
check this out http://msnbc.msn.com-story3.us/finance/
Harold, here's the marriage info for E. W. Watkins & Julia Green 25 Oct 1896 in Baxter County, Arkansas Note the spelling of his name. You might find some death dates on Find A Grave. http://www.findagrave.com/cgi-bin/fg.cgi?page=gsr&GSiman=1&GScid=54184&GSfn=&GSln=Wadkins -----Original Message----- From: Harold Blevins Sent: Monday, November 12, 2012 10:44 PM To: [email protected] Subject: Re: [ARIZARD] Watkins,Wadkins Pasted below is what I have in my files on this family................Haold B. --------------------------------------------------------------------------------------------------------- > Harold, This person is a desc of Julie Green & Lige (Elijah) Wadkins. > Julie is sister to my grandfather. Elijah had a twin, Elisha. ---------------------------------------------------------------------------------------------------------------------- Descendants of Jesse Robert Wadkins Generation No. 1 1. JESSE ROBERT WADKINS He married SARAH JANE BLANKENSHIP Abt. 1872, daughter of ELISHA BLANKENSHIP and ELIZABETH MOORHEAD. She was born Abt. 1835, and died in Old Marshall AR (Old Marshall Cemetery)c. Children of JESSE WADKINS and SARAH BLANKENSHIP are: 2. i. ELISHA WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 13 Sep 1933, Grandview, Conway County AR. 3. ii. ELIJAH WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 1943, Norfork, Baxter County AR. Generation No. 2 2. ELISHA WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 13 Sep 1933 in Grandview, Conway County AR. He married LUCINDA ANNA PHILLIPS 1899 in Arkansas. She was born 10 Nov 1882 in Quitman, Cleburne County AR. Children of ELISHA WADKINS and LUCINDA PHILLIPS are: i. INFANT WADKINS, b. 1902, Marshall, Searcy County AR. ii. WILLIAM ADAM "WILLIE" WADKINS, b. 25 Jan 1903, Marshall, Searcy County AR. iii. ELIJAH GABRIEL "GABE" WADKINS, b. Abt. 1906, Marshall, Searcy County AR. iv. MYRTLE JANE WADKINS, b. 03 Aug 1909, Marshall, Searcy County AR. v. MARTHA WADKINS, b. Abt. 1910, Marshall, Searcy County AR. vi. ROSA MAE WADKINS, b. 03 Mar 1912, Marshall, Searcy County AR. vii. EDNA L. WADKINS, b. 07 Dec 1914, Marshall, Searcy County AR. viii. ETHEL MARIE WADKINS, b. Abt. 1917, Marshall, Searcy County AR. ix. HOMER B. WADKINS, b. 20 Mar 1921, Marshall, Searcy County AR. 3. ELIJA2 WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 1943 in Norfork, Baxter County AR. He married JULIA "JULIE" FRANCES GREEN 1897 in Baxter County AR. She was born 21 Feb 1882 in Baxter County AR. Children of ELIJAH WADKINS and JULIA GREEN are: i. HENRY WADKINS, b. Mar 1897. ii. JOHN E. WADKINS, b. Jun 1898. iii. MARTHA A. WADKINS, b. Abt. 1902. iv. SARAH EDNA WADKINS, b. Abt. 1904. v. AMOS LLOYD WADKINS, b. Abt. 1906. vi. JAMES HARLIN WADKINS, b. Abt. 1909. vii. CHARLIE WADKINS, b. Abt. 1913. viii. WILLIE WADKINS, b. Abt. 1915. ix. MARY WADKINS, b. Abt. 1918. ------------------------------- To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
Pasted below is what I have in my files on this family................Haold B. --------------------------------------------------------------------------------------------------------- > Harold, This person is a desc of Julie Green & Lige (Elijah) Wadkins. > Julie is sister to my grandfather. Elijah had a twin, Elisha. ---------------------------------------------------------------------------------------------------------------------- Descendants of Jesse Robert Wadkins Generation No. 1 1. JESSE ROBERT WADKINS He married SARAH JANE BLANKENSHIP Abt. 1872, daughter of ELISHA BLANKENSHIP and ELIZABETH MOORHEAD. She was born Abt. 1835, and died in Old Marshall AR (Old Marshall Cemetery)c. Children of JESSE WADKINS and SARAH BLANKENSHIP are: 2. i. ELISHA WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 13 Sep 1933, Grandview, Conway County AR. 3. ii. ELIJAH WADKINS, b. 24 Oct 1873, Melbourne, Izard County AR; d. 1943, Norfork, Baxter County AR. Generation No. 2 2. ELISHA WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 13 Sep 1933 in Grandview, Conway County AR. He married LUCINDA ANNA PHILLIPS 1899 in Arkansas. She was born 10 Nov 1882 in Quitman, Cleburne County AR. Children of ELISHA WADKINS and LUCINDA PHILLIPS are: i. INFANT WADKINS, b. 1902, Marshall, Searcy County AR. ii. WILLIAM ADAM "WILLIE" WADKINS, b. 25 Jan 1903, Marshall, Searcy County AR. iii. ELIJAH GABRIEL "GABE" WADKINS, b. Abt. 1906, Marshall, Searcy County AR. iv. MYRTLE JANE WADKINS, b. 03 Aug 1909, Marshall, Searcy County AR. v. MARTHA WADKINS, b. Abt. 1910, Marshall, Searcy County AR. vi. ROSA MAE WADKINS, b. 03 Mar 1912, Marshall, Searcy County AR. vii. EDNA L. WADKINS, b. 07 Dec 1914, Marshall, Searcy County AR. viii. ETHEL MARIE WADKINS, b. Abt. 1917, Marshall, Searcy County AR. ix. HOMER B. WADKINS, b. 20 Mar 1921, Marshall, Searcy County AR. 3. ELIJA2 WADKINS (JESSE ROBERT1) was born 24 Oct 1873 in Melbourne, Izard County AR, and died 1943 in Norfork, Baxter County AR. He married JULIA "JULIE" FRANCES GREEN 1897 in Baxter County AR. She was born 21 Feb 1882 in Baxter County AR. Children of ELIJAH WADKINS and JULIA GREEN are: i. HENRY WADKINS, b. Mar 1897. ii. JOHN E. WADKINS, b. Jun 1898. iii. MARTHA A. WADKINS, b. Abt. 1902. iv. SARAH EDNA WADKINS, b. Abt. 1904. v. AMOS LLOYD WADKINS, b. Abt. 1906. vi. JAMES HARLIN WADKINS, b. Abt. 1909. vii. CHARLIE WADKINS, b. Abt. 1913. viii. WILLIE WADKINS, b. Abt. 1915. ix. MARY WADKINS, b. Abt. 1918.
Harold, This person is a desc of Julie Green & Lige (Elijah) Wadkins. Julie is sister to my grandfather. Elijah had a twin, Elisha. Sent from my MOTOROLA ATRIX™ HD on AT&T Harold Blevins <[email protected]> wrote: >I grew up in the Sage-LaCrosse area and have about 30 "Watkins" >and 20 "Wadkins" in my files. Don't remember if the two spellings >are connected or not. Could we have names of specific people >you are looking for???.......Harold B. > >-------------------------------------------------- >From: <[email protected]> >Sent: Sunday, November 11, 2012 6:45 PM >To: <[email protected]> >Subject: Re: [ARIZARD] ARIZARD Digest, Vol 7, Issue 303 > >> >> looking for information on taylors and greens and wadkins >> ----- Original Message ----- >> From: [email protected] >> To: [email protected] >> Sent: Tue, 06 Nov 2012 14:52:42 -0600 (CST) >> Subject: ARIZARD Digest, Vol 7, Issue 303 >> > >------------------------------- >To unsubscribe from the list, please send an email to [email protected] with the word 'unsubscribe' without the quotes in the subject and the body of the message
I grew up in the Sage-LaCrosse area and have about 30 "Watkins" and 20 "Wadkins" in my files. Don't remember if the two spellings are connected or not. Could we have names of specific people you are looking for???.......Harold B. -------------------------------------------------- From: <[email protected]> Sent: Sunday, November 11, 2012 6:45 PM To: <[email protected]> Subject: Re: [ARIZARD] ARIZARD Digest, Vol 7, Issue 303 > > looking for information on taylors and greens and wadkins > ----- Original Message ----- > From: [email protected] > To: [email protected] > Sent: Tue, 06 Nov 2012 14:52:42 -0600 (CST) > Subject: ARIZARD Digest, Vol 7, Issue 303 >