Consumertronics Organization Survival, Security Books, Manuals: Financial Frauds, Financial Security, Credit Cards, ATMs, Cons, Scams, Rip-Offs, Identity Theft, Invasion of Privacy, Countermeasures Technologies!
Consumertronics Combined Online Catalog
  Framed: www.consumertronics.net/index2.htm   Unframed: .../index1.html
P.O. Box 23097, ABQ, NM 87192, USA
FAX (call first (7-day, 24-hr)): (call to schedule)  VOICE ( 9-5 MST): 505-321-1034
TO ORDER: Order Form (by USPS Mail or Email (TXT/JPG/GIF format))

Or write down order on paper, add it up + S/H, Mail/Email (TXT/JPG/GIF format) to us.
PAYMENT: Payment must be made by Postal Money Order (PMO) in U.S. dollars,
made to: Consumertronics, or by U.S. Cash. Do not pay us by any other way.
(Any unauthorized form of payment will be a nonrefundable donation to us)
Before placing order, please inquire with us by email as to Item cost and availability.


2024 Catalog on 1G Flash Drive (only $39 (includes USA S/H))
Contact Us:
wizguru


Hardware Sales!
1000+ Items!



...tell your friends!
policies.htm
USA site - No cookies - No spyware - No adware - No trojans - No viruses - No worms - No spam - No pop-ups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

Welcome to Consumertronics.net books,disks,tutorials,services: Financial,business,frauds,scams, cheats,identity theft,checks,credit cards,ATMs,security,countermeasuresWelcome to Consumertronics.net books,disks,tutorials,services: Financial,business,frauds,scams, cheats,identity theft,checks,credit cards,ATMs,security,countermeasures Welcome to Consumertronics.net books,disks,tutorials,services: Financial,business,frauds,scams, cheats,identity theft,checks,credit cards,ATMs,security,countermeasures
We are technical professionals to serve YOUR High-Tech Survival & Security needs.
In business 30+ years. Featured on CBS "60 Minutes," New York Times, Forbes, - many more!

Consumertronics.net Financial Online Catalog
Hi-tech survival, security books, ebooks (email / CDROM), manuals, software, services: Financial, business frauds, scams, rip-offs, identity theft, check, credit card, ATM security and countermeasures ... !

Major Discounts all for Products on this Website: 15% OFF all Orders over $79, or 10% OFF for all Orders over $49 effective immediately and until changed here! Please order today! (No other types of discounts apply except $2.00 OFF for all online/mail/fax orders). Short of money? We can also accept trades (mostly electronic parts, test equip., computers) =>

NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.

Dropdown Topic Menus Feature all Major Consumertronics Book, Disk Topics/Titles
Compatible with IE + most other Browsers, else for Hotlinked lists => Topics & Titles Directories page
Please Select General Topic (all caps) or Title (from Topic dropdown), then click Go!
(because of overlap in what each Topic covers, please also visit related Topics)































Printed CATALOG : Sorry, printed copy of our Catalog is no longer available. See top of this page for our CDROM Catalog.

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #6:

MONEY, FINANCES, BANKS, CREDIT, CARDS, CHECKS, GAMING, INVESTING, FINANCIAL SECURITY, LEGAL

(NOTE: For all offers about credit card, ATM or check security, extra payment clearance period may apply, and no refund or return is allowed)

The IDENTITY THEFT MANUAL: Identity theft or ID theft is now one of the fastest growing serious crimes! Over 1,000+ per day become new victims, and the crime is costing $ Billions per year. Yet, in many jurisdictions, identity theft per se is not a crime, and nationally there are few prosecutions. The result is 1,000s of criminals are ripping-off the identities of others with impunity, and getting rich and committing crimes in the process! Details on how ID theft occurs, the myriad of ways that ID thieves benefit from their crimes ranging from maxing out credit cards, taking out free loans and life insurance policies on their victims (so they can murder someone in the victim's name?) to hiding from crimes and acts of terrorism. Includes "agent doubles." Plus countermeasures. ID theft has many more facets to it than the few snippets you see in the news. Words=15.6K. $29. ISBN: 0-934274-82-7

ATM SECURITY: ATM crimes, ATM security, ATM vulnerabilities exposed - protect yourself! 100+ methods described (actual cases) - ranging from physically yanking the ATM out to spoofing it through its phone lines. Includes case histories, law, countermeasures. Many ATM fraud cases are dismissed outright. We tell why. Topics include: How ATM's Work, How ATMs are Regularly Beaten, Debit & Credit Transactions, ATM Encryption, ATM Con Jobs, ATM Fraud by Legit Customers, Counterfeiting Cards, Obtaining PINs, Employee-Type Frauds, Physical Methods, ATM Sabotage, ATM Wiretaps, Tempest, Electronic & Software Frauds, Actual ATM Cases and Other ATM News, How ATM Customers are Robbed, Magnetic Stripes, Legalities, Personal Protection, much, much more!

Includes INTERNAL PHOTOS of ATMs - with close-up of the door-locking mechanism, circuit cards, cash boxes, etc.! And a Detailed Security Checklist for ATMs. Comprehensive and Invaluable! words=41.4K. $34. ISBN: 0-934274-65-7. Add Only $19 for "The PLACAK REPORT ."

The PLACAK REPORT: As described in our infamous ATM manual, this eye-popping report details the reading (using a very simple method) and decryption of the magnetic flux-reversals of the magnetic stripes on popular credit cards, debit cards, security cards and other cards. How you can easily determine the decrypted PIN, PAN, bank number, routing codes, dates, number of daily uses and uses remaining (great for cards that are decremented after each use!). words=7.1K. $29. ISBN: 0-934274-78-9

CHECK & M.O. SECURITY: Detailed and comprehensive description of check forgery and check counterfeiting, types of checks, check characteristics, banks vs check cashing services vs stores, counterfeiting IDs, things that snag check crooks, how professional check crooks plan and run their operations, how check data is obtained, check paper stock, resources available to the pros, how merchants screen checks, dozens of ways to quickly detect bad checks, effective check scams and forged checks and counterfeit checks countermeasures, and all known check codes explained. Manual. Words=22.8K. $29. ISBN: 0-934274-66-5

CONS & SCAMS DATABOOK: Cons, scams and swindles fleece victims of at least $220 Billion per year! C&SD is the most comprehensive manual published these crimes, from the classic to techno-scams so popular today. Topics include: How Swindlers Pick Targets, Advantages Of Swindles, Chameleons, Legal Swindles, Approaches, much more! Detailed encyclopedic-type descriptions of 100s of cons, scams, frauds and rip-offs, and their many popular variations. Protect yourself - learn to recognize the clever techniques and strategies used by swindlers! words=53.6K. $29. ISBN: 0-934274-68-1

CREDIT CARD SECURITY: Now includes how identity theft is committed and how to avoid it! CCS completely details credit card frauds and scams that merchants cannot prevent! Annual credit card losses are over $3 Billion - yet few are caught or convicted. Learn the loopholes in the Authorization # and Credit Card Warning Bulletin - How the same cards are repeatedly used to commit $ Thousands in certain kinds of frauds with little risk! Other topics include: Who to Blame, Phone Card Fraud, Mail Order Fraud, Tips for Protecting your Plastic, Counterfeiting Credit Cards, Passing Bogus Cards, CODE-10, more! Describes why credit card companies refuse to eliminate vulnerabilities, and your rights when victimized. Includes many methods crooks use to obtain credit card numbers. Detailed and brutally frank. Words=12.8K. $29. ISBN: 0-934274-67-3

The ECHTERNACHT FILE: Describes how anyone "legally" can rip off merchandise and services using his own credit card - in the open with total impunity - as long as he wishes - without fear of even losing his card! - because of a little-known legal precedent! While "CCS" describes how crooks use other people's cards and numbers, EF describes methods used by actual cardholders. Shocking! words=5.2K. $19.

CASINO SECRETS: Casino gambling secrets / gambling strategies / gambling tactics / gambling tips / gambling tricks from a professional you won't find anywhere else! A no-holds-barred expose on how some casino cheaters win big. Topics include: The "Rules" that Cheaters Use, Blackjack Cheats, Cheating Slot Machine, Card Tricks, Video Poker, Inside Jobs, Indian Gaming, Surveillance, Using Special Devices, and much more! Learn how to spot opportunities to legally "cheat" and how to take advantage of them! And by understanding the way that casinos operate in general and their gambling setups specifically, and how others take advantage, you should be able to substantially increase your winnings LEGALLY. Shrewd people realize that whenever you deal with any large organization, opportunities are usually much larger and numerous than with small organizations - you just have to know what they are ("Casino Secrets" is an expose no way intended for anyone to break the law). Words=13.9K. $29. ISBN: 0-934274-69-X.

POLYGRAPH SECRETS!: How anyone can "tell the truth to a lie detector." In the last decade, over one million Polygraph tests were given in the U.S. Many jobs and some courts still accept polygraph test results as evidence or at least for persuasive value. PD describes in detail their uses, types of polygraph questions, polygraph test procedures and polygraph environments, "bogus pipeline", polygraph scoring methods, polygraph validity and polygraph reliability findings, polygraph machine design factors, and polygraph countermeasures. Additional info is provided on Voice Stress Analysis. Also a glossary and sample release form. Most impressive is our detailed sections on polygraph questions, polygraph procedures and effective polygraph defeats - usually far less covered in other similar books:

Plus: Modern non-polygraphic interrogation methods. Words=31.8K. $29. ISBN: 0-934274-77-0

FAKING ILLNESS & INJURY DISABILITIES: Disabilities are faked for numerous extremely profitable reasons, including obtaining huge court awards and out-of-court settlements, workers compensation, other disability instance, criminal leniency, hospitalizations, prescribed medications, sympathy and attention, escape from danger, avoidance of work and school responsibilities. Manual discusses in detail the types of disability faking (malingering, factitious disorder, somatoform disorder, munchausens, conversion disorder), dozens of major and minor maladies commonly faked and exactly how they are faked, how major individual symptoms are faked, and detailed countermeasures (dozens of tricks and tests detailed) used to prove faking (cases described where proving medical faking is very difficult), how those with legitimate disabilities are often routinely cheated out of just compensations by greedy insurance companies, and how the pros on both sides manipulate the system for maximum profits. Faking illnesses and injuries and denying legitimate claims are each multi- $ Billion scams! Detailed & comprehensive. An absolute must for everyone! words=23.1K. $39. ISBN: 0-934274-83-5.

FAKING PSYCHIC POWERS: Throughout the history of mankind, great people held psychic powers. Some have been called, "prophets." But just as there are crooked rich and famous lawyers and doctors, there are crooked rich and famous psychics. We considered naming this manual, "The Lazy Person's Way to Great Fame & Fortune." Faking psychic powers is probably today one of the most lucrative ways to obtain great fame and fortune with minimal education and efforts just by doing psychic entertainment, psychic readings, psychic predictions, psychic investigations, psychic communications, etc. Even if one has virtually zero psychic powers, if he/she has a good memory, talking and acting abilities, social engineering skills, and moderate intelligence, he/she can become a first-rate fake psychic within weeks of diligent self-study. No long hours of classes and great costs are required. And compared to magic, little or no costly props, special equipment, need of paid assistants, heavy lifting or high level of animation is required. This powerful, comprehensive manual describes in eye-popping detail the techniques, tricks and psychology fake psychics use to sometimes even fool and manipulate the biggest skeptics and cynics. One can get so good at faking psychic powers that he/she can even be fooled into believing that he/she is a real psychic. There are even high-paid respectable professional positions opened to psychics (e.g. psychic detectives, mentalist stage acts, remote viewers, etc.). And faking psychic powers is terrific for just personally entertaining and impressing your family, friends, coworkers and colleagues, for developing social engineering skills, and as a likely edge into careers in psychology, sales, acting, motivational speaker, etc! Includes countermeasures to protect yourself from fake psychics. words=11.7K. $29. ISBN: 0-934274-91-6.

CREDIT REPORTING AGENCIES: Giant "Information" brokers - Experian (formerly TRW), EquiFax, Trans Union, credit bureaus and the government agencies they service hold hundreds of millions of files on virtually every American! These files detail your financial, medical, family, employment, criminal, and political history. CRE describes:

Also consider:

Unbelievable and shocking! Comprehensive. Words=16.0K. $29. ISBN: 0-934274-29-0

CREDIT CARD EMERGENCY RESPONSE PROCEDURES: Credit card theft and rip-offs are more popular than ever! Credit card companies refuse to insist upon proper authentication procedures, instead intimidating credit card fraud victims to drop their disputed charges, often by threatening to prosecute. This manual gives you a set of step-by-step procedures that will not only minimize your losses, but greatly help catch the crooks, and get the credit card company off your back. And why credit card insurance is a scam. Words=6.6K. $12.

CREDIT CARD ANALYSIS: We used our powerful, " Cryptanalysis Techniques" (see Catalog) method to analyze credit card numbers for 1-gram, 2-gram and 4-gram numerical combination patterns. NOTE: CCA does NOT contain any actual credit card numbers - only the critical statistical results derived from in-depth n-gram analyses of card numbers. Words=8.6K. $19. ISBN: 0-934274-30-4.

HOW TO START YOUR OWN RELIGION & RUN IT: America is coming to a spiritual awakening! Many of us now seek a more personal, meaningful and fulfilling religious worship which suits our own religious, spiritual and lifestyle needs - not a religion dictated by some distant power or authority. And many of us now belong to a religion not spiritual enough, or with a doctrine we don't 100% agree with, or with few or wrong answers about life's mysteries and issues, or which is constantly taking more from us than what it is giving us, or which is so large, diverse and/or impersonal that we no longer have any meaningful say in its doctrines or how it is run. We now seek a relevant and comprehensive religion which not only addresses our unique religious beliefs and needs, but also our spiritual needs, self-realization needs, survival needs, and financial needs. With hardships greatly increasing, and with the steady loss of control that most people now have in their lives and future, increasing unhappiness with their lives and careers, increasing fears of job loss and the inability to find new jobs worthy of their abilities and with decent pay and benefits, more and more people are turning to religion for their answers. The only way anyone can have a meaningful say in their life, religion and spirituality is to start your own religion.

Today in the United States there are about 38,000 Christian and Jewish religious denominations and sects, and growing. Many savvy people now realize that of all of the organizational models, including sole proprietorship, partnership, business venture, limited liability company (LLC), corporation, trust, and even foundation, forming your own religion is by far the best way to go, especially should you have a strong or unique spiritual-, religious-, self-help-, and/or charitable fundraising-based concept.

THE GREAT ADVANTAGES TO BEING A RELIGION: Religions enjoy these great advantages:

THE GREAT BENEFITS OF BECOMING A DEACON/ELDER OR ABOVE MEMBER OF A RELIGION: With your own religion, you of course set the standards as to what the various positions and ranks of your members will be. Traditionally, church officials, and often their relatives and friends, enjoy in their communities numerous benefits that ordinary people never get to enjoy:

This great manual details how to start your own religion, the usually required but often overlooked critical elements before your organization will be considered a religion, information on applying for tax exemption, and many suggestions and tips on how to start and how to run your own religion or church. After much thought, research and prayer, I started my own religion, THE CHURCH OF BIBLE PROPHECY, when I could not find any existing religion which effectively, systematically or boldly researched Biblical End Time prophecies, helped their members survive and prosper during The End Times and boldly ferreted out and exposed modern good and evil people.

In addition, this manual describes in detail how THE CHURCH OF BIBLE PROPHECY ("The Church"; Albuquerque, NM) was recently created from scratch by one individual, and includes detailed sections on:

  1. CHURCH DOCTRINE, GOALS & OBJECTIVES
  2. CHURCH PRACTICES, RITES, RITUALS, SACRAMENTS AND CEREMONIES
  3. CHURCH TERMINOLOGY
  4. CHURCH ORGANIZATION: CHURCH POSITIONS & RANKS
  5. CHURCH POLICIES, RULES & REGULATIONS
  6. SCRIPTURAL BASIS OF THE CHURCH
  7. CHURCH MEMBERSHIP APPLICATION & OATH
  8. CHURCH PRAYERS
NOTE-1: These proprietary details on The Church are not being provided for anyone to copy this religion, but only to provide you insights as to what is required to start and operate your own church or religion. Your church's or religion's own beliefs, doctrines, goals, objectives, terminology, organization, policies, rules, regulations, scriptural foundations, specific provisions of the membership application, membership oath, and prayer will of course be unique to YOUR own religion. Furthermore, while this manual does contain The Church's actual Membership Application Form and Oath as insights as to how they are done, purchase of this manual does not include or guarantee membership into The Church, or any offer of employment, or any offer to set up a branch or affiliate of The Church, or in any way transfers or conveys any Church proprietary right to the buyer of this manual. This sale is limited to a copy of the manual.

NOTE-2: This manual is not being sold by The Church or by the author in his Church capacity as The Revelator of The Church, but by the author in his private, non-Church capacity. Neither The Church nor the Revelator assumes any responsibility for the content of this book or its advertisements.

NOTE-3: The author is not an attorney, accountant, professional financial advisor or tax expert, therefore, he provides no advice or opinion which would require a licensed attorney, accountant, financial advisor, tax advisor or anything else requiring a license. All statements found in this ad or manual are the personal lay opinions of the author. As with everything the author writes and publishes, including this ad and manual, they are provided for legal educational and/or entertainment purposes only, and he takes no responsibility and assumes no liability for their content.


Words=27.4K. $49.

ULTIMATE SUCCESS MANUAL: Expose on how the often most successful lie, cheat, steal, influence, and intimidate to career success or just to be treated fairly! Are workplace politics working against you? Underpaid? Overworked? Harassed? Manipulated? Learn effective techniques to obtain jobs, promotions, raises, more or less travel, desirable transfers, and respectful and preferential treatment! From your first resume to CEO! The USM applies to all types of positions where "office politics" play a part - we lay it on the line! The ultimate looking out for #1 Machiavellian manual for career success! Virtually every dirty trick and office guerrilla warfare tactic - all described in fist-clenching detail:

If you work for anyone - or are looking for a job - regardless of how much you think you know - the USM is the only definitive source of job-related dirty tricks! Machiavelli step aside! words=19.8K. $19. ISBN: 0-934274-26-6.

REMOTE OFFICE TACTICS & STRATEGIES: Great for operating a home away from home! How would you like to start and operate YOUR own business anywhere at any time with little more than a cellphone and laptop/notebook computer, Palm Pilot or other similar device! Gone are the days that the dynamic business person, professional and entrepreneur wants to or even can afford to hang around his physical office at any time unless he absolutely has to. And with today's technology, it's no longer uncommon for people to routinely and regularly do business from other states and even countries, do their businesses well, serve their clients and customers well, and keep good track of their money, employees, contractors, sales personnel, and data. Today's savvy business executive lives and travels where he/she wants to live and travel - regardless of where the business is actually located. In fact, some are so successful at doing this that they are on a perpetual vacation while at the same time keeping in close touch with even the daily operations of their several businesses and other interests at once, some of which are physically spread over various states and even countries, and at low costs and with minimal complexities and equipment. And some business people today don't even have or use a physical office - physical offices are now becoming as obsolete as the desk phone. Other than the numerous people who conduct their businesses from the their homes or employers' offices, it's not uncommon now for people to run full-fledge business operations from their motel/hotel rooms, vehicles, RVs, boats, commercial storage spaces, city parks, restaurants, country clubs, bars, casinos, race tracks, golf courses, tennis courts - you name it! And having a remote office has another big advantage: It protects you from people wanting to harm or injure you in some way. Just think where YOU could be RIGHT NOW and what YOU could be doing if only you weren't stuck in your stuffy old office slavishly chained to an idiotic landline phone and desktop computer - spending countless high-stress hours driving to and from work during rush hours, and countless time and money just maintaining your professional get-up, your car fueled up, and keeping rigid hours! There is simply no reason any longer to stop YOU from starting and running a successful and highly profitable business with absolutely minimal equipment, advertising and other overhead costs. And there is every reason to avoid the risks of personally dealing with customers, clients, employees, solicitors, bill collectors and others.
       ROT&A addresses in detail - with lots of information, tips and insights - the following areas: (1) How to Pick a Cellphone & Cellphone Service. (2) How to Hook Up Your Cellphone With Your Computer. (3) Voice Mail & Other Basic Cellphone Tips. (4) How to Most Effectively Use Your Email Capabilities. (5) How to Do E-Business. (6) How to Choose a Laptop or Notebook Computer & Some Programs You Might Need (software not included). (7) How to Use Your Laptop to Fax. (8) Transferring Funds In & Out of Business Accounts On The Fly. (9) How to Keep Your ID & Location Secret From Criminals. (10) Miscellaneous Tips & Advice.
Words=20.0K. $29. ISBN: 0-934274-94-0

HOW TO DO SECURE EBOOKS: There are many ebook compilers now available, and it is hard to find objective and meaningful reviews of them (we don't sell ebook software). And once you find the best ebook software for your needs, it requires much experimentation to find just the right combo of settings to produce the best quality, yet fully-secure ebooks. We know, because we have waded through this tedious and laborious process of finding and fine-tuning the right ebook programs over weeks. Sometimes you may not want to secure your ebook from copying because you may use it to obtain widespread recognition in your field or for your company, advertise your other offers, etc (e.g. your ebook catalog). However, usually you need to protect your hard-earned book from being easily copied because future sales, secrecy, high-paying clients, etc are critical. No ebook security system is absolute - if your ebook can be read, a crook can sit in front of a computer/typewriter and manually type it in. Fortunately, copyright infringers - book crooks - are mostly so lazy and dimwitted that very few will manually copy books - especially if they can't derive high quality copies of the images and tables from the books. If they can't just photocopy good copies or burn password-free CD copies, they then try to scan or capture the book pages to convert into image files, and then use an Optical Character Recognition (OCR) program to convert the images back into original text and graphics. However, by using our techniques, you can prevent the OCR attack, and the ebook compiler we prefer will produce password- , registration code-, and/or time-limited-protected copies that make it difficult and risky for book crooks to make and distribute copies. When you need a secure ebook, you cannot afford to release even one poorly-protected copy. Manual comprehensively describes the ebook programs we selected, reasons why, the settings we found for optimum image quality and security, and many both software and non-software techniques and tips on how to do and secure your ebooks. Also includes a comprehensive section on how to professionally label your CDs and DVDs - some standard printers can be easily converted to print directly onto CDs/DVDs. Note: No software or device is included. Words=11.6K. $29.

HOW TO STOP JUNK FAXES: Fed up with receiving, paying for and wasting your valuable time with those aggravating spam faxes day after day?! Tired of losing valuable business because your customers can't get through because your fax is tied up with the latest offer for free exotic vacation, pump & dump stock, your "Nigerian uncle" who willed you $6 million, offer to make a million dollars by licking envelopes, or your huge contest win or UK lottery win?! You've called their opt-out number only to find that it either does not connect or the opt-out lasted for about a week, and now you are getting even more junk faxes - now that they know that you read their junk faxes and emotionally respond to them. Caller ID screening doesn't work because few fax blasters reveal their phone numbers, and restricting faxers to a list is time-consuming and almost always misses important faxers. Sure, unsolicited junk faxes are illegal. Suing fax blasters is not the problem - collecting from them is the problem. Some are overseas; others regularly go out of business and then pop up as new fax businesses the next day. They have been sued countless times and that hasn't stopped them. Most law enforcement is so bogged down with violent crimes and terrorism that few prosecute fax criminals.
           The cost of one unsolicited fax is about $1 in toner or ribbon, paper, wear and tear on your fax machine, and annoyances and disruptions to you and your family and/or employees. At a buck each, a mere 3 junk faxes per day cost YOU about $1,000/yr of YOUR hard-earned money! With money tighter than ever, who can afford that! If you are a business, agency or institution, junk faxes can even be more costly to you because it leaves you wide open to competitors, pranksters and disgruntled customers and former employees to sabotage you with junk faxes. Junk faxes is also an easy, low-tech type of denial of service attack ripe for exploitation by criminals, terrorists and rogue states. In some cases, the cost to you of even one junk fax can be very high - if not devastating to you - for example, if the junk fax tie-up of your fax machine loses you an important client or a critical medical, legal, or financial document.
           Until we fixed this seriously irritating and costly problem, we got about 4 unsolicited faxes daily! We had tried about a dozen methods to stop the junk faxes that didn't work until we found a method that works great. We also had tried replacing the fax machine with an answering machine for periods up to a week at a loss of fax business to us, only to find that within a day of reconnecting the fax machine, the junk faxes resumed full force. We also had tried CNG filters (CNG notch filters or CNG band stop filters) to filter out the fax CNG tone (the 3-second beeps transmit fax machines send receive fax machines to alert it to prepare for a fax transfer) in conjunction with a fax controller / fax switch (also often referred to as a phone controller / phone switch) from reaching the fax controller / fax switch and causing it to automatically transfer to fax function. While the notch filters worked well to filter out the CNG beeps, however, they also sometimes interfered with the fax transfer itself if the sender or us manually punched in the fax code to allow the fax. We also tested about a dozen fax controllers / fax switches and found that even those that permit you to program in a fax transfer code would still automatically transfer to fax machine upon receipt of the CNG beeps (their fax transfer codes work only with silent fax machines which don't transmit CNG beeps, however, fax blasters typically use CNG beeps to force your fax controller / fax switch to automatically transfer). Finally, we found one high quality fax controller / fax switch you could program to not respond to CNG beeps, but instead to always automatically transfer calls to answering machine (where you would have instructions on the fax transfer code needed to activate transfer to your fax machine (or other procedure you require) so that your fax machine can only be manually activated by the sender or you by pressing in your fax transfer code) - although its user manual clearly states that it automatically switches to fax machine if CNG beeps arrive (do they intentionally mislead so they don't upset the fax manufacturers and office supply and electronic retailers who sell a lot of fax machines to replace spam worn-out fax machines, and fax toner, fax ribbons and paper - heavily profiting from fax spam?)! We often see this fine fax controller / fax switch sell Online for about $20 + shipping.
           This book provides you full details on the fax controller / fax switch we found that can be programmed for manual fax switching regardless of CNG tone input to defeat junk faxes, and how we programmed it to to ignore the CNG tone and always transfer to the answering machine (works with all of the makes and models of fax machines and answering machines we tested it with) to require manual fax transfer code entry to activate fax transfers. Also included is our experiences in trying to discover and perfect this method (including our simple, passive fax filter design), much information on the laws that apply to junk faxes, information on fax counterfeiting, and exposes the shocking methods others use to turn the tables on fax spammers. No hardware included.
Words=11.3K. $19.

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #13:
INFAMOUS DIRTY-2-DOZEN Disk Files
High-Tech Security & Survival Topics
(Relevant to Topics herein. For listing of all D-2-D disks => www.consumertronics.net/dirty2doz.htm)

Disks are 3.5" PC Windows format, and each has a (Acrobat) PDF file of about 1 MB in size, consisting of several .TXT, .HTM, et al ASCII Text files appended to each other. The combined compressed PDF file size is about half the total sizes of its ASCII files. We carefully sifted through our gigantic and growing private underground database (much of it NOT on the Net) and found the best files relating to the exciting topics of this webpage. Each PDF file is raw and mostly unedited content (substantial formatting editing is done to much improve readability); therefore there may be some inaccuracies, omissions, duplications. To preserve the rich and colorful expressions of some of the original authors, we mostly left intact those file parts which are crude. Most of this material is controversial (but applicable countermeasures are also usually included), and may require adult maturity. We take no responsibility for anything we publish, including file content. To read these PDF files requires Acrobat Reader 4.x or higher (Adobe Acrobat is standard software not provided by us). Once you’ve loaded a file, you can use the Acrobat Find feature to quickly search for keywords. NOTE: All Sales Final! - No Refunds on all D-2-D PURCHASES.

PRICES: 1 DISK $19, 2 DISKs $34, 3 DISKs $47, EACH ADD'L $13 EACH

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)


Customers, Contributors, Authors:
Relevant Topics, Titles, Chapters to this Webpage

SINGLE WORDS: The ATMs. The CDs. The CDROMs. The cheats. The consultants. The consulting. The Consumertronics. The Consumertronics.net. The copyrights. The counterfeit. The counterfeiting. The countermeasures. The defrauding. The DVDs. The ebook. The ebooks. The fakery. The faking. The forgery. The forgeries. The frauds. The hoaxes. The impersonators. The infringement. The investments. The misrepresentations. The OCR. The scams. The rip-offs. The scanning. The scanners. The tutorials.

A-B: The "anti counterfeit." The "anti forgery." The "asset protection." The "ATM cheats." The "ATM cheating." The "ATM con jobs." The "ATM counterfeit." The "ATM counterfeits." The "ATM counterfeiting." The "ATM crimes." The "ATM decryption." The "ATM encryption." The "ATM fraud." The "ATM frauds." The "ATM fraud prevention." The "ATM PINs." The "ATM sabotage." The "ATM scams." The "ATM security." The "ATM swindles." The "ATM vulnerabilities." The "ATM wiretaps." The "avoid identity theft." The "avoiding identity theft." The "best scams." The "book crooks." The "business advice." The "business careers." The "business coaching." The "business consulting." The "business consultant." The "business consultants." The "business counseling." The "business crimes." The "business executive lifestyles." The "business executives." The "business finances." The "business fraud prevention." The "business frauds." The "business plans." The "business professional." The "business scams." The "business security." The "business strategies." The "business security systems." The "business tactics." The "business tutorials."

Ca-Cn: The "casino gambling secrets." The "casino gambling strategies." The "casino gambling tactics." The "casino gambling tips." The "casino gambling tricks." The "casino gaming secrets." The "casino gaming strategies." The "casino gaming tactics." The "casino gaming tips." The "casino gaming tricks." The "casino secrets." The "CD labelers." The "CD labeling." The "CDROM labelers." The "CDROM labeling." The "CD disk labelers." The "CD disk labeling." The "CDROM disk labelers." The "CDROM disk labeling." The "cheat ATMs." The "cheating ATMs." The "cheat checks." The "cheating checks." The "cheat countermeasures." The "cheat credit cards." The "cheating credit cards." The "cheat defenses." The "cheat detection." The "cheat information." The "cheat money orders." The "cheating money orders." The "cheat prevention." The "cheats and scams." The "cheats and frauds." The "cheats on the internet." The "cheats that work." The "check cheats." The "check cheating." The "check codes." The "check counterfeit." The "check counterfeits." The "check counterfeiting." The "check forgery." The "check forgeries." The "check forging." The "check fraud." The "check frauds." The "check fraud prevention." The "check scams." The "check security."

Co-Cz: The "commercial consulting." The "commercial consultants." The "commercial enterprises." The "commercial services." The "computer fraud." The "computer frauds." The "computer hackers." The "computer hacks." The "computer privacy protection." The "computer scams." The "computer security." The "con artists." The "confidence scams." The "cons and scams." The "cons, scams." The "consumer fraud." The "consumer frauds." The "consumer scams." The "copyright protection." The "copyright security." The "corporate frauds." The "counterfeit ATM." The "counterfeit ATMs." The "counterfeited ATM." The "counterfeiting ATMs." The "counterfeit check." The "counterfeit checks." The "counterfeited check." The "counterfeiting checks." The "counterfeit credit card." The "counterfeit credit cards." The "counterfeited credit card." The "counterfeiting credit cards." The "counterfeit money order ." The "counterfeit money orders." The "counterfeited money order." The "counterfeiting money orders." The "counterfeit detectors." The "counterfeit detecting." The "counterfeit detection." The "countermeasure strategies." The "countermeasure tactics ." The "countermeasure target." The "credit card cheats." The "credit card cheating." The "credit card counterfeit." The "credit card counterfeits." The "credit card counterfeiting." The "credit card forgery." The "credit card forgeries." The "credit card forging." The "credit card fraud." The "credit card frauds." The "credit card fraud prevention." The "credit card scams." The "credit card security." The "credit fraud." The "credit frauds." The "credit fraud protection." The "credit identity theft." The "crime fighting." The "criminal countermeasures." The "criminal fraud." The "current scams."

D: The "data privacy protection." The "data security." The "debit card frauds." The "debit cards." The "detect counterfeit." The "detect counterfeits." The "detect forgery." The "detect forgeries." The "detecting counterfeit." The "detecting counterfeits." The "detecting forgery." The "detecting forgeries." The "detection of counterfeit." The "detection of counterfeits." The "detection of forgery." The "detection of forgeries." The "door to door scams." The "download ebooks." The "disk labelers." The "disk labeling." The "DVD labelers." The "DVD labeling." The "DVD disk labelers." The "DVD disk labeling."

E: The "ebook CDs." The "ebook CDROMs." The "ebooks on CDs." The "ebook compilers." The "ebook compiler reviews." The "ebook compiling." The "ebook computer programs." The "ebooks on CDROMs." The "ebook downloads." The "ebook programs." The "ebook security." The "ebook software." The "electronic fund transfers." The "electronic security."

F: The "fake disability." The "fake disabilities." The "faked disability." The "faked disabilities." The "faking disability." The "faking disabilities." The "fake id scams." The "fake illness." The "fake illnesses." The "faked illness." The "faked illnesses." The "faking illness." The "faking illnesses." The "fake injury." The "fake injuries." The "faked injury." The "faked injuries." The "faking injury." The "faking injuries." The "fight identity theft." The "fighting identity theft." The "financial fraud." The "financial frauds." The "financial protection." The "financial rip-offs." The "financial scams." The "forged check." The "forged checks." The "forging checks." The "forge credit card application." The "forged credit card application." The "forging credit card applications." The "forged money order ." The "forged money orders." The "forging money orders." The "forgery detectors." The "forgery detecting." The "forgery detection." The "fraud and abuse." The "fraud countermeasures." The "fraud defenses." The "fraud detection." The "fraud help." The "fraud information." The "fraud prevention." The "frauds and scams." The "frightening fraud."

G-H: The "gambling secrets of casinos." The "gambling strategies of casinos." The "gambling tactics of casinos." The "gambling tips of casinos." The "gambling tricks of casinos." The "gaming secrets of casinos." The "gaming strategies of casinos." The "gaming tactics of casinos." The "gaming tips of casinos." The "gaming tricks of casinos." The "gambling scams." The "get rich quick scams." The "get rich schemes." The "government scams." The "great scams."

The "hacker techniques." The "health frauds." The "health scams." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services." The "hoax and scam." The "hoaxes and scams." The "how to beat the casino." The "how to beat the slots." The "how to beat video poker." The "how to do ebooks." The "how to make ebooks." The "how to prevent identity theft." The "how to run your own church." The "how to run your own religion." The "how to start your own church." The "how to start your own religion." The "how to stop identity theft."

I: The "ID theft." The "identity fraud." The "identity security." The "identity theft." The "identity stolen." The "identity theft and fraud." The "identity theft avoidance." The "identity theft countermeasures." The "identity theft help." The "identity theft information." The "identity theft on the internet." The "identity theft prevention." The "identity theft protection." The "identity theft scams." The "identity theft solutions." The "identity theft victims." The "internet fraud." The "internet frauds and scams." The "internet scams." The "internet hoaxes." The "internet identity frauds." The "internet identity theft." The "internet privacy protection." The "internet scams." The "investment fraud." The "investment scams."

J-N: The "job security." The "label CDs." The "labeling CDs." The "label CDROMs." The "labeling CDROMs." The "label CD disks." The "labeling CD disks." The "label CDROM disks." The "labeling CDROM disks." The "label DVDs." The "labeling DVDs." The "label DVD disks." The "labeling DVD disks." The "magnetic stripes." The "magnetic strips." The "mail frauds." The "mail order fraud." The "mail order scams." The "medical insurance fraud." The "medical insurance frauds." The "medical insurance scams." The "modern security." The "money order cheats." The "money order cheating." The "money order counterfeit." The "money order counterfeits." The "money order counterfeiting." The "money order forgery." The "money order forgeries." The "money order forging." The "money order fraud." The "money order frauds."

O-R: The "OCR protection." The "online fraud." The "online frauds." The "online privacy protection." The "online scams." The "online security." detectors." The "optical character recognition." The "phishing attacks." The "phishing expeditions." The "phone card frauds." The "phone frauds." The "phone order fraud." The "polygraph defeats." The "polygraph secrets." The "prevent frauds." The "prevent scams." The "prevent identity theft." The "preventing identity theft." The "privacy protection." The "privacy security." The "professional advice." The "professional consulting." The "professional consultants." The "professional services." The "proof of fraud." The "protect against identity theft." The "protect copyrights." The "protecting copyrights." The "protect identity." The "protect internet identity." The "protect internet privacy." The "protect privacy." The "pyramid schemes." The "pyramid scams." The "quick money scams." The "reporting check fraud." The "reporting credit card fraud." The "reporting computer." The "reporting crimes." The "reporting criminal." The "reporting internet." The "rip-offs."

S-Z: The "scams and abuses." The "scam countermeasures." The "scam defenses." The "scam detection." The "scam help." The "scam information." The "scam prevention." The "scams and cons." The "scams and frauds." The "scams and hoaxes." The "scams on the internet." The "scams that work." The "scanning protection." The "scientific fraud." The "secure ebooks." The "security cards." The "security consulting." The "security consultants." The "security fraud." The "security holes." The "security information." The "security manuals." The "security measures." The "security online." The "security plans." The "security problems." The "security services." The "security solutions." The "security strategies." The "security systems." The "security tactics." The "slot machines." The "social engineering." The "Spanish prisoner." The "special projects." The "stop junk faxes." The "stop spam faxes." The "stop unsolicited faxes." The "top 10 scams." The "top ten scams." The "victim of crime." The "victim of ID theft." The "victim of identity theft." The "victims of ID theft." The "victims of identity theft." The "video poker." The "web frauds." The "web scams." The "web security." The "white collar crimes." The "wire fraud." The "wire frauds." The "world wide scams." The "worldwide scams."

HARDWARE & SPECIAL SERVICES (for legal educational and/or entertainment purposes only)! Our exciting books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm. Many of these include comprehensive circuit diagrams and functional descriptions. We designed and built here almost all of these circuits (and many, many more), and sold them as our Off-the-Shelf Hardware and Special Projects. We no longer sell functional hardware that we make. We do sell nonfunctional hardware of what we used to make - mostly electronic (www.consumertronics.net/oshpast.html) strictly as salvage: www.consumertronics.net/salvage.html (LIMITED QUANTITIES REMAINING! - once sold there will be no more! - buy all you need as soon as possible - before they are all forever gone!), and also strictly as very realistically-looking models, mockups, replicas and novelties as SPECIAL PROJECTS: www.consumertronics.net/spaf-spp.html. NOTE: For salvage and SP hardware, while priced very low compared to the original functional versions, we provide no guarantees, support, user manuals, schematics, batteries or refunds (Special Projects also does consulting and research services).
         HARDWARE SALES: We also sell functional hardware which others make as surplus and salvage: For comprehensive list of 10,000s of item types we Sell, Buy and Trade for (including in exchange for our popular books and manuals), see our popular: ABQ-Techzonics - 1,000,000 integrated circuits (ICs) + 1,000,000 other small electronic parts + plus electronic test equipment + many other high-tech electronic and non-electronic Items.
        LONE STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334, www.lonestarconsultinginc.com) makes customized device types much closer than any other company we know of to the popular and exciting functional device types we used to make and sell as Special Projects and Off-the-Shelf Hardware - plus many other device types - plus extensive invention prototyping and invention consulting services - plus they also sell Historical Diagrams for many controversial device types! Their device types are described at ==> LONE STAR CONSULTING, INC. NOTE: We are not LONE STAR CONSULTING, INC. Neither one owns the other, is a subsidiary of the other, or is responsible for the other. Should you wish to do business with Lone Star Consulting, Inc., please contact them DIRECTLY as you would any other business (as with all purchases one makes, you should check out all available sources for items of interest). Furthermore, Lone Star Consulting, Inc. has an excellent free tutorial on mind control and electronic attacks (if you go to it, please return here): FREE MIND CONTROL /ELECTRONIC ATTACK TUTORIAL. As policy, we never recommend or endorse for or against any other company, product or service - even if you find a link for it on our webpages. (Our privacy and other policies are at: www.consumertronics.net/policies.htm).
       OTHER SPECIAL SERVICES: NO AC ADAPTER EQUIPMENT RESCUE: Lost or broken AC Power Adapter to your valuable equipment too hard to replace? We have 100s of AC adapters, and may be able to help: www.consumertronics.net/no-adapter-rescue.htm. INTERNET AUCTION SERVICES: We also offer Net Auction/Sales Services (eBay, Amazon.com, Craigslist, ABQ-Techzonics, etc.) for your stuff that you don't need so much any more but are just too busy to sell yourself: www.consumertronics.net/netauctions.htm. HOME/OFFICE TUTORING SERVICES: We also offer home and office tutoring services (Albuquerque, NM only): www.consumertronics.net/tutorservices.pdf. PROFESSIONAL PERSONAL PROPERTY APPRAISALS: We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/. COMPUTER SERVICING: Need to get your computer or software repaired, installed, modified, upgraded, updated, tuned-up, or lost data retrieved? Computer damaged by or inflicted with viruses, worms, trojan horses, adware/spyware, popups, other malware, and/or spam? Let us computer geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm. LEGAL RESEARCH SERVICES: Need/interested in being educated about civil or criminal legal topics important to you? Let us provide you relatively very low cost legal research. John Williams is an experienced lay litigant (District Court + Appeals Court), lecturer of "pro se" law, and a prolific legal researcher, legal author and legal publisher of legal books (we are not licensed attorneys and we don't offer legal advice, legal opinion or legal claims; New Mexico residents only): www.consumertronics.net/legalresearch.htm.

 

WE TRADE, BUY, SELL & MANY THINGS!
Prefer to trade rather than buy our products and services? Have items you no longer need but we do? Short of cash? We are interested in trading and buying (and also selling) numerous electronic parts, electronic test equipment, hardware, modern computer systems, computer peripherals, software, printing / publishing equipment / parts / supplies, books, small parts, scientific equipment, industrial equipment, commercial equipment, et al - too numerous to list here! For details of some of the items we are interested in trading for or buying from you that can eliminate or much reduce your out-of-pocket expenses for, see our items4trade.htm website, CLICK HERE =>
Items for Trade/Items to Buy/Items for Sale


Great Consumertronics Products and Services!

       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
             ON YOUR WEBSITE

Copyright © 1998-2024, Consumertronics. All rights reserved.

NOTE: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Consumertronics webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability or any other responsibility for any non-Consumertronics company, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or by any other means of communications. For more information on our policies, please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1, Source-2, Source-3, Source-4, Source-5, Source-6, Source-7, Source-10, Source-11

Site Map