Consumertronics
Combined Online Catalog Framed: www.consumertronics.net/index2.htm Unframed: .../index1.html P.O. Box 23097, ABQ, NM 87192, USA FAX (call first (7-day, 24-hr)): (call to schedule) VOICE ( 9-5 MST): 505-321-1034 ![]() Or write down order on paper, add it up + S/H, Mail/Email (TXT/JPG/GIF format) to us. PAYMENT: Payment must be made by Postal Money Order (PMO) in U.S. dollars, made to: Consumertronics, or by U.S. Cash. Do not pay us by any other way. (Any unauthorized form of payment will be a nonrefundable donation to us) Before placing order, please inquire with us by email as to Item cost and availability. 2024 Catalog on 1G Flash Drive (only $39 (includes USA S/H)) |
wizguru Hardware Sales! 1000+ Items! ![]() ...tell your friends! policies.htm | |
USA
site - No cookies - No spyware - No adware - No trojans - No viruses -
No worms - No spam - No pop-ups We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data |
Major
Discounts all for Products on this Website: 15%
OFF all Orders over $79, or 10%
OFF for all Orders over $49 effective immediately and until changed
here! Please order today! (No
other types of discounts apply except $2.00 OFF for all online/mail/fax orders).
Short of money? We can also accept trades (mostly electronic
parts, test equip., computers) =>
NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.
A-C: The "antivirus programs." The "antivirus software." The "Blacklisted 411 Magazine." The "computer attack." The "computer crime." The "computer crimes." The "computer countermeasures." The "computer decoding." The "computer decrypting." The "computer decryption." The "computer encoding." The "computer encrypting." The "computer encryption." The "cyber criminals." The "cyber-criminals." The "cyberpunk underground."
Computer Data : The "computer data decoding." The "computer data decrypting." The "computer data decryption." The "computer data encoding." The "computer data encrypting." The "computer data encryption." The "computer data privacy protection." The "computer data protection." The "computer data recovery." The "computer data rescue." The "computer data security." The "computer data survival."
Computer Files : The "computer file decoding." The "computer file decrypting." The "computer file decryption." The "computer file encoding." The "computer file encrypting." The "computer file encryption." The "computer file privacy protection." The "computer file protection." The "computer file recovery." The "computer file rescue." The "computer file security." The "computer file survival."
Computer Fraud - CZ: The "computer accessory." The "computer accessories." The "computer books." The "computer circuits." The "computer countermeasures." The "computer designs." The "computer devices." The "computer equipment." The "computer fraud." The "computer frauds." The "computer fraud prevention." The "computer fraud protection." The "computer hackers." The "computer hardware." The "computer hardware security." The "computer infection." The "computer infections." The "computer monitor eavesdropping." The "computer monitor surveillance." The "computer monitors." The "computer operating systems." The "computer peripherals." The "computer program." The "computer programing." The "computer programming." The "computer program." The "computer programs." The "computer privacy." The "computer privacy protection." The "computer products." The "computer protection." The "computer scams." The "computer science." The "computer science project." The "computer science projects." The "computer security." The "computer services." The "computer software." The "computer spam." The "computer special projects." The "computer strategy." The "computer strategies." The "computer survival." The "computer systems." The "computer system analysis." The "computer system analyst." The "computer system security." The "computer tactic." The "computer tactics." The "computer technique." The "computer techniques." The "computer technology." The "computer technologies." The "computer tutorials." The "computer virus." The "computer viruses." The "computer vulnerability." The "computer vulnerabilities." The "computer worm." The "computer worms." The "con artists." The "countermeasure devices." The "countermeasure equipment." The "countermeasure hardware." The "countermeasure strategies." The "countermeasure tactics ." The "countermeasure target." The "countermeasure techniques." The "crime fighting."
D-E: The "data decoding." The "data decrypting." The "data decryption." The "data encoding." The "data encrypting." The "data encryption." The "data privacy protection." The "data protection." The "data recovery." The "data rescue." The "data security." The "data survival." The "decoding computer files." The "decrypting computer files." The "decoding files." The "decrypting files." The "disk drive security." The "disk security." The "dumpster diving." The "encoding computer files." The "encrypting computer files." The "encoding files." The "encrypting files."
F-G: The "fake id scams." The "fighting crime." The "file decoding." The "file decrypting." The "file decryption." The "file encoding." The "file encrypting." The "file encryption." The "file privacy protection." The "file protection." The "file recovery." The "file rescue." The "file security." The "file survival." The "financial frauds." The "financial scams." The "fraud countermeasures." The "fraud detection." The "fraud prevention." The "fraud protection."
H: The "hacker countermeasures." The "hacker culture." The "hacker files." The "hacker strategies." The "hacker tactics." The "hacker techniques." The "hackers and phreakers." The "hard drive security." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services." The "home network." The "home networks." The "how to prevent." The "how to prevent hackers." The "how to prevent ID theft." The "how to prevent identity theft." The "how to prevent invasion of privacy." The "how to prevent private data losses." The "how to prevent theft." The "how to prevent theft of passwords." The "how to protect." The "how to protect against identity theft." The "how to protect against invasion of privacy." The "how to protect data." The "how to protect passwords." The "how to protect privacy." The "how to protect your ID." The "how to protect your identity." The "how to protect your passwords." The "how to protect your privacy." The "how to protect your private data." The "how to social engineer." The "how to stop hackers." The "how to stop ID theft." The "how to stop identity theft."
I-Q: The "identity fraud." The "identity security." The "identity theft." The "internet fraud." The "internet frauds and scams." The "internet scams." The "internet hoaxes." The "internet hoaxes and scams." The "internet identity theft." The "internet phone scams." The "internet privacy protection." The "internet scams." The "internet security products." The "internet security solutions." The "internet security systems." The "internet survival." The "invasion of privacy." The "investment frauds." The "investment scams." The "local area network." The "local area networks." The "modern security." The "net security." The "online fraud." The "online frauds." The "online privacy protection." The "online frauds." The "online scams." The "online security." The "online survival." The "permanent fixes." The "permanent solutions." The "phone operations." The "phone operators." The "phone phreakers." The "phreakers and hackers." The "programing computers." The "programming computers." The "protect against identity theft." The "protect identity." The "protect internet identity." The "protect internet privacy." The "protect privacy." The "phone system."
R-S: The "reporting computer." The "scams and cons." The "science project." The "science projects." The "security books." The "security fraud." The "security holes." The "security information." The "security manuals." The "security measures." The "security online." The "security personnel." The "security plans." The "security problems." The "security services." The "security solutions." The "security strategies." The "security systems." The "security tactics." The "security techniques." The "security tutorials." The "social engineer." The "social engineered." The "social engineering." The "social engineering tactics." The "social engineering techniques." The "social engineering strategies." The "special projects." The "SVGA monitors."
T: The "tempest circuit designs." The "tempest circuits." The "tempest countermeasures." The "tempest designs." The "tempest devices." The "tempest eavesdropping." The "tempest equipment." The "tempest espionage." The "tempest hardware." The "tempest merchandise." The "tempest methods." The "tempest plans." The "tempest products." The "tempest programs." The "tempest projects." The "tempest security." The "tempest services." The "tempest special projects." The "tempest spying." The "tempest strategies." The "tempest surveillance." The "tempest systems." The "tempest tactics." The "tempest techniques." The "tempest technology." The "tempest technologies." The "temporary fixes." The "temporary solutions." The "Transient ElectroMagnetic Pulse Surveillance." The "trash digging." The "trojan horse." The "trojan horses."
V: The "van eck." The "van eck circuit designs." The "van eck circuits." The "van eck countermeasures." The "van eck designs." The "van eck devices." The "van eck eavesdropping." The "van eck equipment." The "van eck espionage." The "van eck hardware." The "van eck merchandise." The "van eck methods." The "van eck plans." The "van eck products." The "van eck programs." The "van eck projects." The "van eck security." The "van eck services." The "van eck special projects." The "van eck spying." The "van eck strategies." The "van eck surveillance." The "van eck systems." The "van eck tactics." The "van eck techniques." The "van eck technology." The "van eck technologies." The "van eck tempest." The "van eck tempest circuit designs." The "van eck tempest circuits." The "van eck tempest countermeasures." The "van eck tempest designs." The "van eck tempest devices." The "van eck tempest eavesdropping." The "van eck tempest equipment." The "van eck tempest espionage." The "van eck tempest hardware." The "van eck tempest merchandise." The "van eck tempest methods." The "van eck tempest plans." The "van eck tempest products." The "van eck tempest programs." The "van eck tempest projects." The "van eck tempest security." The "van eck tempest services." The "van eck tempest special projects." The "van eck tempest spying." The "van eck tempest strategies." The "van eck tempest surveillance." The "van eck tempest systems." The "van eck tempest tactics." The "van eck tempest techniques." The "van eck tempest technology." The "van eck tempest technologies." The "VGA monitors." The "voice mail security."
W-Z: The "war driving." The "web frauds." The "web scams." The "web security." The "wide area network." The "wide area networks."
HARDWARE & SPECIAL SERVICES (for legal educational and/or entertainment purposes only)! Our exciting books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm. Many of these include comprehensive circuit diagrams and functional descriptions. We designed and built here almost all of these circuits (and many, many more), and sold them as our Off-the-Shelf Hardware and Special Projects. We no longer sell functional hardware that we make. We do sell nonfunctional hardware of what we used to make - mostly electronic (www.consumertronics.net/oshpast.html) strictly as salvage: www.consumertronics.net/salvage.html (LIMITED QUANTITIES REMAINING! - once sold there will be no more! - buy all you need as soon as possible - before they are all forever gone!), and also strictly as very realistically-looking models, mockups, replicas and novelties as SPECIAL PROJECTS: www.consumertronics.net/spaf-spp.html. NOTE: For salvage and SP hardware, while priced very low compared to the original functional versions, we provide no guarantees, support, user manuals, schematics, batteries or refunds (Special Projects also does consulting and research services).
IMAGE SPONSORED BY: Consumertronics Lone Star Consulting, Inc. ABQ-Techzonics REPRINT POW-MIA IMAGE=> ON YOUR WEBSITE |
Copyright © 1998-2024, Consumertronics. All rights reserved.
NOTE: By policy, we
never recommend for or against, approve or disapprove, sponsor, endorse, support,
guarantee, or take any responsibility for any of the content of any non-Consumertronics
webpage, website, advertisement, publication or other statement EVEN IF WE HAVE
PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against,
approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability
or any other responsibility for any non-Consumertronics company, product or
service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED
IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or
by any other means of communications. For more information on our policies,
please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1,
Source-2, Source-3,
Source-4,
Source-5,
Source-6,
Source-7,
Source-10,
Source-11