Consumertronics
Combined Online Catalog Framed: www.consumertronics.net/index2.htm Unframed: .../index1.html P.O. Box 23097, ABQ, NM 87192, USA FAX (call first (7-day, 24-hr)): (call to schedule) VOICE ( 9-5 MST): 505-321-1034 ![]() Or write down order on paper, add it up + S/H, Mail/Email (TXT/JPG/GIF format) to us. PAYMENT: Payment must be made by Postal Money Order (PMO) in U.S. dollars, made to: Consumertronics, or by U.S. Cash. Do not pay us by any other way. (Any unauthorized form of payment will be a nonrefundable donation to us) Before placing order, please inquire with us by email as to Item cost and availability. 2024 Catalog on 1G Flash Drive (only $39 (includes USA S/H)) |
wizguru Hardware Sales! 1000+ Items! ![]() ...tell your friends! policies.htm | |
USA
site - No cookies - No spyware - No adware - No trojans - No viruses -
No worms - No spam - No pop-ups We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data |
Major
Discounts all for Products on this Website: 15%
OFF all Orders over $79, or 10%
OFF for all Orders over $49 effective immediately and until changed
here! Please order today! (No
other types of discounts apply except $2.00 OFF for all online/mail/fax orders).
Short of money? We can also accept trades (mostly electronic
parts, test equip., computers) =>
NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.
A-C: The "ad ware." The "antivirus programs." The "antivirus software." The "AOL webpage designs." The "AOL webpages." The "best scams." The "business frauds." The "business scams." The "computer crime." The "computer crimes." The "computer countermeasures." The "computer data privacy protection." The "computer data protection." The "computer data security." The "computer data survival." The "computer file privacy protection." The "computer file protection." The "computer file security." The "computer file survival." The "computer fraud." The "computer frauds." The "computer hackers." The "computer hacks." The "computer infection." The "computer infections." The "computer privacy protection." The "computer programs." The "computer scam." The "computer scams." The "computer security." The "computer services." The "computer software." The "computer spam." The "computer spamming." The "computer survival." The "computer trojan horses." The "computer virus." The "computer viruses." The "computer vulnerability." The "computer vulnerabilities." The "computer worm." The "computer worms." The "con artists." The "countermeasure devices." The "countermeasure equipment." The "countermeasure hardware." The "countermeasure strategies." The "countermeasure tactics ." The "countermeasure target." The "countermeasure techniques." The "crime fighting." The "criminal countermeasures." The "criminal fraud."
D-G: The "data privacy protection." The "data protection." The "data recovery." The "data rescue." The "data security." The "data survival." The "defrauded IDs." The "defrauded identity." The "defrauded privacy data." The "email addresses." The "email filters." The "fake ID scams."
The "filtering emails." The "financial frauds." The "financial protection." The "financial rip-offs." The "financial scams." The "fraud and abuse." The "fraud countermeasures." The "fraud defenses." The "fraud detection." The "fraud on the internet." The "fraud on the net." The "fraud online." The "fraud on the web." The "frauds on the internet." The "frauds on the net." The "frauds online." The "frauds on the web." The "fraud prevention." The "fraud protection." The "fraud, scam." The "frauds, scams." The "frauds and scams." The "great scams."
H: The "hacker culture." The "hacker files." The "hacker strategies." The "hacker tactics." The "hacker techniques." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services."
The "home network." The "home networks." The "how to prevent harassment." The "how to prevent ID theft." The "how to prevent identity theft." The "how to prevent invasion of privacy." The "how to prevent private data losses." The "how to prevent stalking." The "how to prevent theft." The "how to prevent theft of passwords." The "how to protect." The "how to protect against ID theft." The "how to protect your ID." The "how to protect your identity." The "how to protect your passwords." The "how to protect your privacy." The "how to protect your private data." The "how to prevent internet harassment." The "how to prevent internet ID theft." The "how to prevent internet identity theft." The "how to prevent internet invasion of privacy." The "how to prevent internet private data losses." The "how to prevent internet stalking." The "how to prevent internet theft." The "how to prevent internet theft of passwords." The "how to protect your internet ID." The "how to protect your internet identity." The "how to protect your internet passwords." The "how to protect your internet privacy." The "how to protect your internet private data." The "how to prevent net harassment." The "how to prevent net ID theft." The "how to prevent net identity theft." The "how to prevent net invasion of privacy." The "how to prevent net private data losses." The "how to prevent net stalking." The "how to prevent net theft." The "how to prevent net theft of passwords." The "how to protect your net ID." The "how to protect your net identity." The "how to protect your net passwords." The "how to protect your net privacy." The "how to protect your net private data." The "how to prevent online harassment." The "how to prevent online ID theft." The "how to prevent online identity theft." The "how to prevent online invasion of privacy." The "how to prevent online private data losses." The "how to prevent online stalking." The "how to prevent online theft." The "how to prevent online theft of passwords." The "how to protect your online ID." The "how to protect your online identity." The "how to protect your online passwords." The "how to protect your online privacy." The "how to protect your online private data." The "how to prevent web harassment." The "how to prevent web ID theft." The "how to prevent web identity theft." The "how to prevent web invasion of privacy." The "how to prevent web private data losses." The "how to prevent web stalking." The "how to prevent web theft." The "how to prevent web theft of passwords." The "how to protect your web ID." The "how to protect your web identity." The "how to protect your web passwords." The "how to protect your web privacy." The "how to protect your web private data."
IA-IM: The "ID fraud." The "ID security." The "ID theft." The "ID stolen." The "ID theft and fraud." The "ID theft countermeasures." The "ID theft help." The "ID theft information." The "ID theft on the internet." The "ID theft on the net." The "ID theft online." The "ID theft on the web." The "ID theft prevention." The "ID theft protection." The "ID theft scams." The "ID theft solutions." The "ID theft victims." The "identity fraud." The "identity security." The "identity theft." The "identity stolen." The "identity theft and fraud." The "identity theft countermeasures." The "identity theft help." The "identity theft information." The "identity theft on the internet." The "identity theft on the net." The "identity theft online." The "identity theft on the web." The "identity theft prevention." The "identity theft protection." The "identity theft scams." The "identity theft solutions." The "identity theft victims."
Internet: The "internet casinos." The "internet countermeasures." The "internet credit card fraud." The "internet fraud." The "internet fraud countermeasures." The "internet fraud prevention." The "internet fraud protection." The "internet frauds." The "internet frauds and scams." The "internet gambling." The "internet hacker." The "internet hackers." The "internet hacks." The "internet harassment." The "internet hoaxes." The "internet hoaxes and frauds." The "internet hoaxes and scams." The "internet ID frauds." The "internet identity frauds." The "Internet ID theft." The "internet identity theft." The internet investment frauds." The "internet investment scams." The "internet operations." The "internet phone scams." The "internet products." The "internet privacy." The "internet privacy invasion." The "internet privacy protection." The "internet protect privacy." The "internet scam." The "internet scams." The "internet scams and frauds." The "internet science project." The "internet science projects." The "internet security." The "internet security products." The "internet security solutions." The "internet security systems." The "internet services." The "internet spam." The "internet special projects." The "internet stalking." The "internet strategies." The "internet strategy." The "internet survival." The "internet tactics." The "internet tracing." The "internet tracking." The "internet tracing and tracking." The "internet tracking and tracing." The "internet tutorials." The "internet vulnerabilities." The "internet worms."
IN-M: The "invasion of internet privacy." The "invasion of net privacy." The "invasion of online privacy." The "invasion of web privacy." The "invasion of privacy." The "investment fraud." The "investment frauds." The "investment scams." The "local area network." The "local area networks." The "master hackers." The "modern security."
Net: The "net casinos." The "net countermeasures." The "net credit card fraud." The "net fraud." The "net fraud countermeasures." The "net fraud prevention." The "net fraud protection." The "net frauds." The "net frauds and scams." The "net gambling." The "net hacker." The "net hackers." The "net hacks." The "net harassment." The "net hoaxes." The "net hoaxes and frauds." The "net hoaxes and scams." The "net ID frauds." The "net identity frauds." The "net ID theft." The "net identity theft." The net investment frauds." The "net investment scams." The "net operations." The "net phone scams." The "net privacy." The "net privacy invasion." The "net privacy protection." The "net products." The "net protect privacy." The "net scam." The "net scams." The "net scams and frauds." The "net science project." The "net science projects." The "net security." The "net security products." The "net security solutions." The "net security systems." The "net services." The "net spam." The "net special projects." The "net stalking." The "net strategy." The "net strategies." The "net survival." The "net tactics." The "net tracing." The "net tracking." The "net tracing and tracking." The "net tracking and tracing." The "net tutorials." The "net vulnerabilities." The "net worms."
Online: The "online casinos." The "online countermeasures." The "online credit card fraud." The "online fraud." The "online fraud countermeasures." The "online fraud prevention." The "online fraud protection." The "online frauds." The "online frauds and scams." The "online gambling." The "online hacker." The "online hackers." The "online hacks." The "online harassment." The "online hoaxes." The "online hoaxes and frauds." The "online hoaxes and scams." The "online ID frauds." The "online identity frauds." The "online ID theft." The "online identity theft." The online investment frauds." The "online investment scams." The "online operations." The "online phone scams." The "online privacy." The "online privacy invasion." The "online privacy protection." The "online products." The "online protect privacy." The "online scam." The "online scams." The "online scams and frauds." The "online science project." The "online science projects." The "online security." The "online security products." The "online security solutions." The "online security systems." The "online services." The "online spam." The "online special projects." The "online stalking." The "online strategy." The "online strategies." The "online survival." The "online tactics." The "online tracing." The "online tracking." The "online tracing and tracking." The "online tracking and tracing." The "online tutorials." The "online vulnerabilities." The "online worms."
P-R: The "password protection." The "password theft." The "password theft prevention." The "personal internet security." The "personal net security." The "personal online security." The "personal web security." The "personal privacy security." The "personal security." The "phishing attacks." The "phishing expeditions." The "phishing frauds." The "prevent frauds." The "prevent scams." The "prevent ID theft." The "prevent identity theft." The "preventing identity theft." The "privacy protection." The "privacy security." The "protect against identity theft." The "protect ID." The "protect identity." The "protect internet ID." The "protect internet identity." The "protect internet privacy." The "protect net privacy." The "protect online privacy." The "protect web privacy." The "protect privacy." The "quick money scams." The "reporting computer." The "reporting internet."
S: The "scams and cons." The "scams and frauds." The "scams and hoaxes." The "scams on the internet." The "scams on the net." The "scams online." The "scams on the web." The "scams that work." The "science project." The "science projects." The "security books." The "security fraud." The "security holes." The "security information." The "security manuals." The "security measures." The "security online." The "security plans." The "security problems." The "security products." The "security services." The "security solutions." The "security strategies." The "security systems." The "security tactics." The "security techniques." The "security tutorials." The "social engineer." The "social engineering." The "social engineering strategies." The "social engineering tactics." The "social engineering techniques." The "spammed email." The "special projects." The "spoofed email addresses." The "spoofed webpage." The "spoofed website." The "spoofing email addresses." The "spoofing webpages." The "spoofing websites." The "spy ware." The "stolen ID." The "stolen IDs." The "stolen identity." The "stolen password." The "stolen passwords." The "stolen privacy data." The "surfing the internet." The "surfing the net." The "surfing online." The "surfing the web." The "surviving the internet." The "surviving the net."
T: The "theft of IDs." The "theft of identity." The "theft of passwords." The "theft of privacy data." The "top 10 frauds." The "top 10 scams." The "top ten frauds." The "top ten scams." The "top 10 internet frauds." The "top 10 internet scams." The "top ten internet frauds." The "top ten internet scams." The "top 10 net frauds." The "top 10 net scams." The "top ten net frauds." The "top ten net scams." The "top 10 online frauds." The "top 10 online scams." The "top ten online frauds." The "top ten online scams." The "top 10 web frauds." The "top 10 web scams." The "top ten web frauds." The "top ten web scams." The "trojan horse." The "trojan horses."
U-WE: The "victim of frauds." The "victim of scams." The "victim of theft." The "victim of internet frauds." The "victim of internet scams." The "victim of internet theft." The "victim of net frauds." The "victim of net scams." The "victim of net theft." The "victim of online frauds." The "victim of online scams." The "victim of online theft." The "victim of web frauds." The "victim of web scams." The "victim of web theft." The "victims of frauds." The "victims of scams." The "victims of theft." The "victim of internet frauds." The "victims of internet scams." The "victims of internet theft." The "victims of net frauds." The "victims of net scams." The "victims of net theft." The "victims of online frauds." The "victims of online scams." The "victims of online theft." The "victims of web frauds." The "victims of web scams." The "victims of web theft." The "war driving."
Web: The "web casinos." The "web countermeasures." The "web credit card fraud." The "web fraud." The "web fraud countermeasures." The "web fraud prevention." The "web fraud protection." The "web frauds." The "web frauds and scams." The "web gambling." The "web hacker." The "web hackers." The "web hacks." The "web products." The "web scam." The "web scams." The "web hoaxes." The "web hoaxes and frauds." The "web hoaxes and scams." The "web ID frauds." The "web harassment." The "web identity frauds." The "web ID theft." The "web identity theft." The web investment frauds." The "web investment scams." The "web operations." The "web phone scams." The "web privacy." The "web privacy invasion." The "web privacy protection." The "web protect privacy." The "web products." The "web scam." The "web scams." The "web scams and frauds." The "web science project." The "web science projects." The "web security." The "web security products." The "web security solutions." The "web security systems." The "web services." The "web special projects." The "web stalking." The "web strategy." The "web strategies." The "web survival." The "web tactics." The "web tracing." The "web tracking." The "web tracing and tracking." The "web tracking and tracing." The "web tutorials." The "web vulnerabilities." The "web worms."
WF-Z: The "war driving." The "white collar crimes." The "wide area network." The "wide area networks." The "world wide scams." The "worldwide scams." The "worldwide web." The "world wide web."
HARDWARE & SPECIAL SERVICES (for
legal educational and/or entertainment purposes only)! Our exciting
books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm.
Many of these include comprehensive circuit diagrams and functional descriptions.
We designed and built here almost all of these circuits (and many, many more),
and sold them as our Off-the-Shelf Hardware and Special Projects.
We no longer sell functional hardware that we make. We do sell nonfunctional
hardware of what we used to make - mostly electronic
(www.consumertronics.net/oshpast.html) strictly as
salvage: www.consumertronics.net/salvage.html (LIMITED
QUANTITIES REMAINING! - once sold there will be no more! - buy all you need
as soon as possible - before they are all forever gone!), and also strictly
as very realistically-looking models, mockups, replicas and novelties as SPECIAL
PROJECTS: www.consumertronics.net/spaf-spp.html.
NOTE: For salvage and SP hardware, while priced very low compared to the original
functional versions, we provide no guarantees, support, user manuals, schematics,
batteries or refunds (Special Projects also does consulting and research
services).
HARDWARE
SALES: We also sell functional hardware which others make as surplus
and salvage: For comprehensive list of 10,000s of item types we Sell, Buy and
Trade for (including in exchange for our popular books and manuals), see our
popular: ABQ-Techzonics
- 1,000,000 integrated circuits (ICs) + 1,000,000 other small electronic parts
+ plus electronic test equipment + many other high-tech electronic and non-electronic
Items.
LONE
STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334, www.lonestarconsultinginc.com) makes
customized device types much closer than any other company we know of to the
popular and exciting functional device types we used to make and sell as Special
Projects and Off-the-Shelf Hardware - plus many other device types - plus extensive
invention prototyping and invention consulting services - plus they
also sell Historical Diagrams for many controversial device types! Their device
types are described at ==> LONE
STAR CONSULTING, INC. NOTE: We are not LONE
STAR CONSULTING, INC. Neither one owns the other, is a subsidiary
of the other, or is responsible for the other. Should you wish to do business
with Lone Star Consulting, Inc., please contact them DIRECTLY as you would any
other business (as with all purchases one makes, you should check out all available
sources for items of interest). Furthermore, Lone Star Consulting, Inc. has
an excellent free tutorial on mind control
and electronic attacks (if you go to it, please return here):
FREE
MIND CONTROL /ELECTRONIC ATTACK TUTORIAL. As policy, we never recommend
or endorse for or against any other company, product or service - even if you
find a link for it on our webpages. (Our privacy and other policies
are at: www.consumertronics.net/policies.htm).
OTHER
SPECIAL SERVICES: NO AC ADAPTER EQUIPMENT
RESCUE: Lost or broken AC Power Adapter to your valuable equipment
too hard to replace? We have 100s of AC adapters, and may be able to help: www.consumertronics.net/no-adapter-rescue.htm.
INTERNET AUCTION SERVICES: We also
offer Net Auction/Sales Services (eBay, Amazon.com, Craigslist, ABQ-Techzonics,
etc.) for your stuff that you don't need so much any more but are just too busy
to sell yourself: www.consumertronics.net/netauctions.htm.
HOME/OFFICE TUTORING SERVICES: We
also offer home and office tutoring services (Albuquerque, NM only): www.consumertronics.net/tutorservices.pdf.
PROFESSIONAL PERSONAL PROPERTY APPRAISALS:
We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/.
COMPUTER SERVICING: Need to get your
computer or software repaired, installed, modified, upgraded, updated, tuned-up,
or lost data retrieved? Computer damaged by or inflicted with viruses, worms,
trojan horses, adware/spyware, popups, other malware, and/or spam? Let us computer
geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm.
LEGAL RESEARCH SERVICES: Need/interested
in being educated about civil or criminal legal topics important to you? Let
us provide you relatively very low cost legal research. John Williams is an
experienced lay litigant (District Court + Appeals Court), lecturer of "pro
se" law, and a prolific legal researcher, legal author and legal publisher
of legal books (we are not licensed attorneys and we don't offer legal advice,
legal opinion or legal claims; New Mexico residents only): www.consumertronics.net/legalresearch.htm.echzonics.
OTHER
SPECIAL SERVICES: INTERNET AUCTION SERVICES:
We also offer Net Auction Services (eBay, iOffer, Yahoo!, etc): www.consumertronics.net/netauctions/..
PROFESSIONAL PERSONAL PROPERTY APPRAISALS:
We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/.
COMPUTER SERVICING: Need to get your
computer or software repaired, installed, modified, upgraded, updated, tuned-up,
or lost data retrieved? Computer damaged by or inflicted with viruses, worms,
trojan horses, adware/spyware, popups and/or spam? Let us computer geeks confidentially
service your computer hardware and software needs: www.consumertronics.net/compservice.htm.
LEGAL RESEARCH SERVICES: Need/interested
in being educated about civil or criminal legal topics important to you? Let
me provide you relatively very low cost legal research. I am an experienced
lay pro se litigant (District Court + Appeals Court), lecturer of pro se law,
and a prolific researcher, writer and publisher of legal books (I am not an
attorney and I don't offer legal advice; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
LONE
STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334) does much of the incredible and exciting
functional hardware we used to make - mostly electronic (plus many other similar
items we did not previously make - plus they also sell Historical Diagrams
for much of their Hardware types!), described at: www.lonestarconsultinginc.com/devices.htm
(not a hotlink). NOTE: We are not LONE
STAR CONSULTING, INC. Neither one owns the other, is a subsidiary
of the other, or is responsible for the other. Should you wish to do business
with them, please contact them DIRECTLY (as with all purchases
one makes, you should check out all available sources for the item of interest).
As policy, we never recommend or endorse for or against any other company, product
or service. (Our privacy and other policies are at:
www.consumertronics.net/policies.htm).
IMAGE SPONSORED BY: Consumertronics Lone Star Consulting, Inc. ABQ-Techzonics REPRINT POW-MIA IMAGE=> ON YOUR WEBSITE |
Copyright © 1998-2024, Consumertronics. All rights reserved.
NOTE: By policy, we
never recommend for or against, approve or disapprove, sponsor, endorse, support,
guarantee, or take any responsibility for any of the content of any non-Consumertronics
webpage, website, advertisement, publication or other statement EVEN IF WE HAVE
PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against,
approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability
or any other responsibility for any non-Consumertronics company, product or
service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED
IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or
by any other means of communications. For more information on our policies,
please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1,
Source-2, Source-3,
Source-4,
Source-5,
Source-6,
Source-7,
Source-10,
Source-11