Simple Steps to Get Remote Support on Your Computer

We’re going to use a program called Splashtop SOS so I can see your screen and help you with your computer. It’s like I’m sitting next to you, guiding you through the process and allows me to control your computer during the help session. (Once this session is over I will not have access to your computer.) Let’s get started!

1. Opening the Web Browser:

2. Deploying Splashtop SOS:

  • After the download is complete, you can find the file either at the bottom-left corner of your browser or, in most cases, in the upper-right corner.
    • For Google Chrome , or Edge, or FireFox: Look for
    • down arrow in the top-right, it will be to the left of the three dots beneath the X
    • The file will likely be named “SOSDownload.exe” or something similar.
    • If you see the arrow but not the file, click on the arrow, then on the download.
    • If you can’t find the downloaded file, click on the three dots under the “X” in the upper-right corner.
    • find and select “Downloads” (left click)
    • you should see your file there. “SOSDownload.exe”

Step 3 getting to the session code:

  • Click on the downloaded file to open it. You might see a message asking, “Do you want to save this program?” Choose “Yes”.
  • Then, a security prompt may ask, “Do you want to allow this app to make changes to your computer?” Respond with “Yes”.

4. Sharing Your Session Code:

  • After the program opens, it will display a 9-digit number. This is your session code, which allows me to connect to your computer and assist you.
  • Tell me that number and I’ll be able to remotely connect to your computer to provide help.

Don’t Worry:

  • If any step doesn’t go as planned, don’t worry! Take a deep breath, and we can try again. You’re doing just fine.
  • Remember, only share your session code with me, and no one else. This keeps your computer secure.

You’re All Set!

Antique email accounts; Should I keep it?

In the digital age, email addresses often serve as a gateway to our online presence, but clinging to old and antiquated email addresses can have unforeseen consequences. While it may seem convenient to maintain these accounts for continuity or sentimental reasons, this practice can pose significant risks and inefficiencies. From compromised security to cluttered inboxes and outdated personal branding, the drawbacks of hanging onto outdated email addresses are numerous and varied. In this article, we explore the compelling reasons why giving up old email addresses is not just a step towards better email management, but a crucial move for enhancing online security, improving email deliverability, and ensuring a more organized digital life.

Throughout my career, I’ve encountered clients clinging to their vintage AOL or Hotmail email accounts. Initially, these accounts evoke a sense of nostalgia, yet there’s an underlying issue that’s often overlooked: the disadvantage of not transitioning to more contemporary email services. This is particularly pertinent when considering emails tied to internet service providers (ISPs). It’s inevitable that superior ISPs will emerge, prompting a switch. Unfortunately, this change often renders your existing ISP-linked email address inaccessible, with the exception of a few like sbcglobal or att.com. Even in these cases, retaining such email addresses can lead to complex issues in the long haul, underscoring the importance of opting for more flexible and future-proof email solutions. 

Below are some links to to alternative emails and email clients

Below, you will find the response from Glenn Rue, a Microsoft moderator, addressing the issue of recovering your Hotmail password. No Guarantees here. 

Glenn Rue

Replied on September 26, 2022

Report abuse

Good day ChristineThompson3419!

Welcome to the Microsoft Community Forum. Please accept our warmest regards and sincerest hope that all is well.

 We understand that you’re unable to recover your husband’s Hotmail.com account due to setting up two-factor authentication (2FA) or what we call two-step verification (TSV).

I’ve helped folks in the past with such a situation and it indeed can be quite the challenge to recover the account. The simple fact is in order for TSV to work correctly it requires you to associate at least three unique security contact email addresses or phone numbers with your account. If you lose your security info and you don’t have a backup contact method available, you can permanently lose your account.

With that in mind let us work together as a team to get past this issue. But to better assist you I need to ask:

 1) If you go to https://account.microsoft.com/ and attempt to log in to your account with the last known password of your husband’s account what error message are you getting? Can you provide us a photo of it?

 2) If you attempt to reset the password of the account using https://account.live.com/password/reset do you get something similar to the photo below or something else? Can you provide us a photo of what you get something else?

Image

 3) When was the last time your husband successfully logged in to the account? I need an exact date.

4) How long have you had this issue? Days? Weeks? Months?

 Hope to hear from you soon.

 Respectfully,

 Many users hold onto email accounts that may be outdated or not fully supported by their founders. This report provides recommendations for transitioning to a new email service while ensuring a smooth migration of data and minimal disruption.

Key Points

  1. Maintain Old Email Access
    • It’s advisable to keep your old email address active for as long as possible to ensure you don’t miss any important communications during the transition.
  2. Selecting a New Email Provider
    • Choose a new email provider that offers nationwide or global access, ensuring you won’t lose your email address if you move or change internet services 2. Providers like Gmail or Outlook.com are popular choices due to their stability and feature sets.
  3. Email Forwarding and Importing Contacts
    • Forward emails from your old account to your new one to maintain continuity. Import your contacts to the new email address to keep your network intact.
  4. Notify Your Contacts
    • Inform your contacts about your new email address to ensure future communications are directed correctly.
  5. Secure Your New Account
    • Create a complex password for your new account and enable two-factor authentication to enhance security.
  6. Update Online Accounts
    • Inventory and update all locations where your old email is used, such as online accounts and subscriptions.
  7. Email Migration Considerations
    • Consider the reasons for email migration, such as improved performance, increased storage, and better security 11. Utilize an email migration tool to prevent data loss and chaos.
  8. Email Migration Methods
    • Choose between various migration methods like provider-to-provider, cloud-to-cloud, or using an email client.
  9. Performing the Migration
    • Get credentials for both old and new email addresses, start the migration, and wait for completion. Verify data and test email functionality after migration.
  10. Modern Authentication for Email Clients
  • For users of Outlook 2013 and later, enable Modern Authentication to ensure a secure connection to the email server.
  1. Final Steps After Migration
  • After a successful migration, sync mailboxes, update email settings, and remove or cancel the old account.

Conclusion

Transitioning from an old, outdated email account to a new one requires careful planning and execution. By selecting a reliable new provider, forwarding emails, updating contacts, securing the new account, and using proper migration tools and methods, users can ensure a seamless switch. It’s important to keep the old account active during the transition and to notify contacts and update online accounts with the new email address. Modern authentication should be enabled for email clients to maintain security. After the migration, verify the data, test functionality, and then you can safely remove the old account.

Introduction to Search Engines: Mastering the Art of Digital Search

Welcome to the comprehensive guide on understanding and mastering search engines, the powerful tools at the heart of our digital lives. This isn’t just about learning to use these tools; it’s about mastering them to enhance our online experiences. Let’s break down the complexities into something more tangible and efficient for our daily digital interactions.

Understanding the Mechanics: The Inner Workings of Search Engines

At their core, search engines are like ultra-efficient librarians of the digital world. They sift through millions of web pages using algorithms – sets of rules and formulas – to find and rank the most relevant results for your query. When you hit ‘search,’ these algorithms consider your words, match them with indexed content, and factor in aspects like site quality and relevance to present you with a neatly organized list of results.

The Right Tool for the Right Job: Choosing Your Search Engine

While Google might dominate the scene, other search engines like Bing and DuckDuckGo each have unique offerings. Bing is known for its image search capabilities and integration with Microsoft products, while DuckDuckGo appeals to those seeking privacy. Depending on what you’re looking for, different engines can yield different results and experiences. Being aware of and occasionally switching search engines based on your specific needs can lead to better, more tailored outcomes.

Crafting Effective Queries: The First Step to Better Results

The queries you input significantly influence the quality of results you get back. Be specific and deliberate with your words. For instance, instead of a generic “weather,” a more detailed “weather forecast New York September 2024” would yield more precise information. Utilize quotation marks to search for exact phrases, dramatically focusing your search and filtering out the noise.

Advanced Search Techniques: Elevating Your Search Game

To further refine your searches, familiarize yourself with a few advanced operators:

  • Excluding terms with “-“: If you want coffee makers but are not interested in a particular brand, “coffee makers -brandX” omits that brand from the results.
  • Searching within a site using “site:”: For specific inquiries like finding climate change articles on a particular news site, “climate change site:trustednewssite.com” directs the search engine accordingly.
  • Using “*” as a wildcard: This operator is helpful when you’re unsure of the exact phrase or want to broaden your search, like “best * for cold weather.”

Conclusion: Your Path to Search Engine Mastery

Understanding and effectively utilizing search engines is about more than just finding information; it’s about ensuring that the information you find is relevant, useful, and trustworthy. As you become more familiar with how these digital librarians work, how to speak their language through precise queries, and how to utilize advanced techniques, you’ll find your searches becoming more efficient and productive.

Stay tuned as we continue to explore and build upon these foundational skills in subsequent articles. With practice and these tips, you’ll become more adept at navigating the vast digital landscape, turning every search into a successful quest for knowledge.

The Annual Antivirus Showdown: 

A 16-Year Tradition of Assessing Cybersecurity

As the year winds down and the festive spirit of Christmas becomes a memory, I revisit a unique tradition that has been a part of my routine for the past 16 years. During the quiet period between Christmas and New Year’s, I take the time to delve into the ever-changing world of antivirus software. This isn’t just a pastime; it’s a dedicated effort to understand how our digital protectors stand against the evolving threats of the internet. Interestingly, the top contender has remained unchanged for the third consecutive year, yet the path to this conclusion is always lined with new insights and discoveries.

In this detailed review of our system’s defenders, it’s imperative to highlight the crucial role of the user. No antivirus solution can replace the diligent oversight of a vigilant individual. The responsibility ultimately rests with each of us to ensure the security of our digital environment. It’s vital to demand transparency and control from our software providers to guarantee that we can effectively implement and interact with our security tools. Formulating a strategy for regular assessment and interaction with your antivirus software is key, and understanding how to monitor and manage its operations is a necessity.

Before I dive into my rankings and the reasoning behind them, it’s important to navigate the complex landscape of antivirus options. Recognizing the potential pitfalls associated with these digital safeguards is essential, urging us to proceed with caution before committing to any particular solution. Be aware that a subpar or ineffective antivirus can burden and slow down your computer as much as a virus can.

As you explore this comprehensive article, feel free to skim through the sections, but I encourage you to take the time to grasp the intricacies of antivirus issues fully.

The Double-Edged Sword of Internet Security Suites

In the world of digital defense, our guardians are designed to be robust protectors, yet their strengths are often coupled with weaknesses that can cast long shadows over our digital well-being. Let’s deconstruct the layers of these guardians, exposing not only their protective exterior but also the burdens they may bring.

Resource Intensity: Consider antivirus suites as vigilant knights sworn to defend your digital domain. Impressive in their duty, yet their operations can be resource-intensive, echoing through your system like the heavy footsteps of a towering figure. During their most active periods, such as during comprehensive scans or updates, they can consume a substantial portion of your system’s resources, leaving little for other tasks.

False Positives: Visualize a wary sentry, quick to sound the alarm at the slightest disturbance. Often, these alerts are false alarms, not actual threats. This scenario mirrors the issue of false positives in antivirus software, where benign files are mistakenly flagged as harmful, leading to unnecessary distress and the potential loss of important but harmless data.

Fighting the Unknown: Antivirus protectors are well-educated in the lore of known threats, but they face challenges when encountering zero-day threats—new or modified malware that remains unrecorded in their databases. In these instances, the antivirus might struggle, its defenses less effective against these unknown adversaries.

Over-reliance: Residing within the fortified walls guarded by these digital sentinels can instill a sense of invulnerability. However, no defense system is impenetrable, and no protector is without flaws. This over-reliance can be a weakness if it leads to complacency, overshadowing the importance of constant vigilance and proactive security measures.

Complexity and Intrusiveness: Maneuvering through the intricate settings and notifications of some security suites can be as perplexing as navigating a labyrinth. While aiming to offer comprehensive protection, these suites can sometimes complicate rather than clarify, leaving users puzzled rather than confident in their digital safety.

Privacy Concerns: In a twist of irony, the entities we entrust with our digital secrets sometimes turn their gaze back onto us. Instances of security products overstepping their boundaries and infringing on user privacy have surfaced, casting doubt on the intentions behind these watchful eyes.

Cost: The investment in digital security is not just a commitment of trust but also a financial one. Maintaining these digital guards comes at a price, prompting the question of whether the full arsenal is necessary for every user or if a more streamlined approach would suffice. My advice is to use a free Antivirus and don’t bog down your system.

In this era of digital uncertainties, our guardians stand as complex entities, a blend of strength and vulnerability, protection and potential intrusion. As the digital landscape continues to shift, this review serves as more than a critique; it’s a reminder of the continuous pursuit of security in an ever-changing world. The choice of antivirus goes beyond a mere technical decision; it’s a reflection of how we value and guard our digital lives. Choose with care, remain vigilant, and navigate your digital journey with confidence.

The Paid Promotions Dilemma: A Closer Look at McAfee and Norton

The antivirus industry is not immune to the influences of paid promotions and financial incentives, casting a shadow over the genuine effectiveness of certain products. This necessitates a discerning approach when considering rankings and reviews.

Resource Consumption: Both McAfee and Norton have a history of heavy resource usage. Although recent efforts to reduce their footprint are acknowledged, observations in the field prove to me it is not enough.

Feature Bloat: These suites sometimes resemble a Swiss army knife packed with an overwhelming array of tools. While intended to provide a comprehensive solution, they can often end up feeling cluttered and overcomplicated.

User Experience: Opinions on these suites are divided. Some users appreciate the convenience of an all-in-one package, while others find the abundance of features and the complexity of the interface overwhelming.

Market Presence and Brand Recognition: The longstanding presence of these companies in the cybersecurity field ensures their visibility and often guarantees them a spot on top lists. However, this prominence doesn’t always correlate with superior performance.

The Password Manager Conundrum

The integration of password managers within security suites presents both advantages and drawbacks. Their convenience is apparent, but the reliance on a single provider can pose challenges, especially if you decide to switch antivirus solutions. This emphasizes the value of independent password managers, which offer greater control and flexibility, ensuring that your transition between different security solutions doesn’t jeopardize your password management.

The Inconvenient Truth: No Antivirus Offers Total Immunity

The digital threat landscape is dynamic, with antivirus solutions constantly racing to keep up. While signature-based detection remains a stalwart defense against known threats, it falls short in the face of novel, sophisticated attacks. The integration of heuristic analysis and behavioral monitoring marks progress in this ongoing battle, but the inherent limitations of these approaches mean that the risk of an undetected threat is ever-present.

The Contenders and My Verdict

As we evaluate the array of antivirus options, it’s evident that each has its strengths and weaknesses, catering to different needs and preferences.

The Pinnacle:

  • Windows Defender (Microsoft Defender): As the native guardian of Windows, its performance and simplicity have earned it my recommendation for the past three years.
  • Bitdefender: With a long-standing reputation for excellence, it stands out as a top choice for those seeking a paid antivirus solution.
  • Kaspersky: Despite controversies, its efficacy in threat detection remains impressive.

The Fallen Heroes:

  • AVG, Avira, Avast, Trend Micro: Once at the forefront of cybersecurity, these options have seen a decline, marred by bloated features and aggressive marketing tactics.

The Heavyweights:

  • Norton (Symantec), McAfee: While effective in protection, their resource consumption and potential impact on system performance are notable concerns.

The Middle Ground:

  • F-Secure, Vipre, ESET, Malwarebytes, Sophos, Webroot: These options offer a balance, each with unique advantages and limitations, making them suitable for specific scenarios.

The new year is here and the digital battlefield evolves, reminding us that the quest for security is relentless. This annual review is not just an assessment; it’s a call to remain vigilant and proactive in our approach to digital security. The choice of antivirus transcends mere functionality; it’s a testament to our commitment to safeguarding our digital existence. Make your choice wisely, stay alert, and ensure your digital journey is fortified and secure.

Part 4: The Final Ploy: How Gift Card Scams Culminate and How to Stay Safe

And now, dear readers, we arrive at the final curtain of our tale of trickery. When last we met, our protagonist, driven by fear and false promises, stood on the precipice of folly, about to purchase gift cards in the vain hope of averting a crisis as real as a mirage in the desert. Let us now see how this grand deception reaches its denouement.

With the victim ensnared in their web of lies, our cunning scammer waits with bated breath as gift cards are procured. The instructions are clear: buy these tokens of commerce, scratch off the silver panel to reveal their hidden worth, and relay the numbers back to the scammer. It is a task performed with a sense of urgency and dread, under the false belief that it will bring resolution to the crisis at hand.

But here, dear readers, is where the illusion crumbles. For once those numbers are passed along, the scammer vanishes into the ether, as elusive as the wind on a hot summer’s day. The victim is left clutching worthless pieces of plastic, their value siphoned off by the faceless charlatan. The realization dawns, bitter and hard to swallow: they have been duped, their trust exploited, their coffers plundered.

This, then, is the harsh truth of the gift card scam – a modern-day confidence trick that preys upon the gullible and the trusting. It is a stark reminder of the perils that lurk in the shadows of our interconnected world, where scammers ply their trade with impunity, shielded by anonymity and distance.

So, how does one steer clear of these treacherous waters? Vigilance, dear readers, is the watchword. Be wary of unsolicited calls or messages that speak of crises and demand hasty solutions. Remember that no legitimate enterprise or government agency will ever ask for payment in the form of gift cards. Verify the authenticity of such claims by reaching out directly to the purported institutions through official channels.

Above all, guard your personal information zealously. Do not be quick to part with your name, your number, or the sanctity of your social security. In this age of information, knowledge is power, and the wise are those who do not offer it up lightly.

And so, we draw the curtain on our tale, wiser for having journeyed through its twists and turns. May these words serve as a beacon, guiding you safely through the fog of deceit. For in a world where the truth is often stranger than fiction, the greatest folly is to think oneself immune to the machinations of the unscrupulous.

The Road of Digital Deception

In a wood, forked and deep,
Where choices weigh and sorrows seep,
I ponder paths both wide and narrow,
Under the watchful eye of a sparrow.

A traveler in this digital age,
I come upon a deceptive stage,
Where roads diverge in a cyber wood,

And I stand where a weary traveler stood.

The gift card scam, a path so worn,
By feet of those who’ve been forlorn,
A trail of deceit and cunning lies,

Hidden beneath the virtual skies.

With promises of ease and gain,
They lure the unsuspecting in vain,
To purchase cards, a treacherous deed,

Believing it’s all they’ll ever need.

But once the numbers are relayed,
The path grows dark, the colors fade,
The journey ends, the truth revealed,

In the forest, the fate is sealed.

The money spent, now gone astray,
In the woods of scam, forever to stay,
A lesson learned in the hardest way,

In the forest where shadows play.

So now I choose with cautious heart,
From this deceptive path to depart,
For in the wood where choices lie,
The road less traveled catches my eye.

In the voice of Frost, I share this tale,
Of a path fraught with a sorrowful wail,
Choose your road with wisdom and care,
In the forest of the internet, be ever aware.


In this concluding part, the style of Samuel Clemens is continued to bring the series to a close. The narrative completes the story of the gift card scam, emphasizing the climax and providing readers with advice on how to avoid such scams. The series ends with a reflection on the importance of vigilance and the protection of personal information in the digital age.

Part 3: The Heightening Tension: Urgency and Manipulation in Gift Card Scams

Welcome back, dear readers, to our ongoing saga of skullduggery and deception in the age of Robocalls and outer space telescopes. When last we parted, our tale had reached a critical juncture, with our unsuspecting protagonist poised on the edge of the scammer’s trap. Let us now turn the page to the next chapter, where the plot thickens and the air grows heavy with the scent of duplicity.

In this act of our drama, the scoundrel, having woven a web of credibility, begins to stir the pot of urgency. They craft a crisis with the skill of a playwright, painting a picture of impending doom that would turn the stoutest of hearts to jelly. This emergency, mind you, is as real as the fabled riches of El Dorado, yet presented with such conviction that it might as well be knocking at your front door.

The scammer, now in full control of the narrative, plays upon the strings of human emotion with the dexterity of a seasoned puppeteer. They speak of calamities that would make Job’s trials seem a walk in the park – tales of compromised security, legal entanglements, or financial ruin. The objective? To drown reason in a sea of panic, urging immediate action lest the imaginary axe fall.

But what, you might wonder, is the solution to this fabricated fiasco? Here, dear reader, is where the scam takes a curious turn. Our villain, ever the helpful soul, suggests a resolution so bizarre, it would make a cat laugh. They propose the purchase of gift cards – yes, those colorful tokens of commerce, more fitting for a birthday gift than the settling of serious matters.

This suggestion, absurd as it may seem, is presented as a lifeline, the only means to avert disaster. The scammer assures our harried hero that these gift cards are the key to salvation, spinning a tale of their untraceability and ease of transfer as virtues in this hour of need.

And so, the trap is sprung. The victim, driven by fear and a misplaced trust in the voice of authority, is led down the garden path to the nearest purveyor of these plastic panaceas. Little do they realize that each step takes them further from safety and closer to the jaws of ruin.

But hold, dear readers, for our tale is not yet complete. The final act awaits, where we shall witness the climax of this elaborate charade and glean wisdom from the unraveling of our cautionary tale. Join me next time, as we conclude our journey through the shadowed alleys of the gift card scam and emerge, hopefully, wiser and warier.

Part 2: The Deceptive Dawn: Starting Point of a Gift Card Scam

In our last convivial gathering, I introduced you to the wily world of the gift card scam, a modern-day swindle that would make even the most seasoned riverboat gambler blush. Today, let us embark on the next chapter of our tale, where we explore the genesis of this cunning deceit.1

Picture this, if you will: a day like any other, with the sun climbing its usual path across the sky. You are at ease, perhaps enjoying a cup of coffee or perusing the day’s news. It is then that our story takes a curious turn, with the arrival of an unexpected electronic missive or, for those still favoring the spoken word, a telephone call. This is no ordinary communication, but rather the opening gambit in a game of deception.2

The voice on the other end, or the words on the screen, claim lineage from some reputable establishment – maybe the tax collectors, or a company whose name is as familiar as the stars in the sky. They speak with authority, their words carefully chosen to project an air of legitimacy and urgency.3

Now, these scoundrels are clever, I’ll give them that. They spin a yarn that would make a novelist proud, peppering their speech with just enough truth to season the lie. Perhaps they claim your computing machine has been besieged by bandits of the digital kind, or that Uncle Sam himself is knocking at your door, hat in hand, seeking unpaid dues.

As our tale unfolds, the scammer weaves their narrative, turning the screw of urgency tighter and tighter. They talk of dire consequences, of impending doom that could befall you should you tarry. Their words are designed to cloud your judgment, to rush you headlong into a decision without the luxury of thought or counsel.

And so, the stage is set. Our unwitting protagonist, armed with nothing but trust in their fellow man, stands on the precipice of a decision. Little do they know that the person on the other end of that line, or the author of that electronic letter, is nothing but a modern-day brigand.

But what, you ask, is the endgame of this sordid affair? How does our charlatan convince their mark to part with their hard-earned wealth? Ah, that, my dear readers, is a tale for our next meeting, where we shall explore the heart of this deception – the moment the scammer plays their ace.4

Join me next time, as we delve into the murky waters of the scammer’s strategy, where urgency and fear conspire to loosen the strings of the purse and the bonds of common sense.

Echoes of the Digital Monster

In a world of shadowed screens and whispered lies,
Where modern Prometheus in darkness thrives,
Lies a tale of woe and treachery profound,
A scam most vile, where heartache is found.
In the depths of the digital ether’s embrace,
Monsters are born, wearing a human’s face,
Crafting their schemes with a sinister plan,
The gift card scam, a curse upon man.
They speak in tongues smooth and sly,
Promising safety under a virtual sky,
“Quick, buy these cards,” they deceitfully claim,
“To save your soul from financial flame.”
Unsuspecting hearts, pure and true,
Fall prey to this unholy crew,
Venturing forth in the dead of night,
To purchase cards, their only light.
The stores, like crypts, hold secrets untold,
Where plastic cards are bought and sold,
Their numbers, like secrets, whispered in haste,
To fiends unseen, in the cybernetic waste. 
But as dawn breaks, the horror reveals,
The truth behind these nefarious deals,
Empty wallets, dreams turned to dust,
In the digital monsters we blindly trust.
Oh, the tears that fall like rain,
From victims of this infernal pain,
For in the gift card’s deceptive glow,
Lies a darkness, a malevolent woe.
So heed this tale, a cautionary verse,
Of a cyber monster, a modern curse,
Guard well your trust, your fortune, your name,
Lest you fall victim to this monstrous game.
In Mary Shelley’s voice, we recount this plight,
A tale of techno-horror, of cybernetic blight,
Remember, in the world’s digital part,
Lurks the shadowed peril of the gift card scam’s heart.


In this second part, following the style of Samuel Clemens, the narrative delves into the initial stages of the gift card scam, setting the scene for the scammer’s manipulative tactics. The storytelling aims to engage the reader with a mix of humor and critical observation, typical of Twain’s writing. The cliffhanger at the end paves the way for the next installment. Followed with a poem in the style of Mary Shelley.

1https://www.reddit.com/r/instacart/comments/12kenl6/gift_cards_scam/?rdt=59530    

 2https://www.youtube.com/watch?v=z96n80IQjUM   

 3https://www.fdacs.gov/Consumer-Resources/Scams-and-Fraud/Gift-Card-Scams   urgency

 4https://www.cnbc.com/select/gift-card-scam-money-back/   

Part 1: Unveiling the Menace

An Introduction to the Gift Card Scams

In our modern age, where the electric light of technology has brightened every corner of our lives, there lurks a shadowy figure, as sly as a fox and twice as cunning. I speak, dear readers, of the gift card scam1, a devious trick as old as falsehood itself, yet dressed in the garb of modernity.

What, you might ask, is this trickery? Well, it’s a simple yet devilish plot where a charlatan convinces an honest soul to purchase2 gift cards under the pretense of a most urgent matter, only to filch the value therein for themselves. This scheme takes many forms, but at its rotten core, it involves a rogue pretending to be a reputable agent – be it from the government or a known commercial enterprise.

The tactics employed by these scoundrels are as varied as they are nefarious3. They might conjure a sense of immediate danger or dangle the carrot of a reward too good to pass up. The art of their deceit lies in creating a problem where none exists and then, like a wolf in sheep’s clothing, offering a solution that benefits none but themselves.

To illustrate, let us imagine you receive4 a letter or, as is more common in these electric times, an electronic missive, that rings with the urgency and authority of the law itself. Such letters might include the emblem of a known establishment and speak in a language that would make a lawyer tip his hat in respect. This, dear reader, is the bait.

The importance of understanding this ruse cannot be overstated. For it is not just your purse that is at risk, but also your peace of mind.5 These tricksters play not only with your hard-earned money but with your trust in the institutions that form the bedrock of our society.

As we journey together through this series, we shall uncover the layers of this deception, laying bare the mechanisms of these modern-day bandits. Our tale will lead us down the path of their trickery6, through the dark woods of manipulation, and out into the light of knowledge and vigilance.

Stay with me, dear reader, for in our next installment, we shall delve into the beginnings of this deceitful art – the siren call that lures the unwary into the jaws of the scam.


The Whispered Web of Deceit

In the shadowed night, where whispers thread,
Lurks a sinister design, a dread most deep,
A tale of deceit, of woe and trepidation,
A gift card scam, a fiend’s creation.

Upon the soul’s lonely, winding path,
Comes a call, a voice, a phantom’s wrath,
Cloaked in guise of urgency and need,
Spinning tales where avarice and danger breed.

“O haste,” it cries, “lest doom befall,
Your name, your fortune, risk them all,
For gift cards, a remedy so sure,
To cure the ills you must endure.”

With heart aflutter and mind ensnared,
The innocent, ensnared by fear, unprepared,
Ventures forth in night’s cold grasp,
To fulfill the specter’s whispered task.

Beneath the moon’s pallid, ghostly glow,
In store’s fluorescent aisles they go,
Gathering cards, the scammer’s fee,
Unknowing the price of this decree.

Scratched reveal, numbers like runes,
Whispered through lines, under darkened moons,
To the ears of a shadow, a ghost in the machine,
Gone in an instant, silent, unseen.

Then comes the dawn, cold and gray,
Revealing the scam’s cruel play,
Empty cards, promises unkept,
Leaving the soul broken, bereft.

“Alas,” they cry to the uncaring sky,
“Tricked by a phantom, a mere lie,
My fortune stolen, my trust betrayed,
In the perilous game, a pawn played.”

So hear this tale, this mournful song,
Of a scam most vile, a wrong so wrong,
Guard your heart, your trust, your coin,
Lest into this dark web, you too are drawn.

In Poe’s voice, we weave this sorrowful tale,
A warning in the night, a cautionary veil,
For in the depths of deceit’s dark art,
Lies the perilous gift card scam, a poison dart.


This first part of a three part series sets the stage in a Mark Twain-like narrative introducing the tragedy of the gift card scam. Followed with a poem in the style of Eger Allen Poe.

In collaboration with Artificial Intelligence (AI) these articles are an experiment using cutting edge technology to help create a narrative that is compelling and entertaining as well as genuinely informative of real world events. 


1 https://consumer.ftc.gov/gift-card-scams

2  https://www.justice.gov/usao-sdny/pr/husband-and-wife-charged-multimillion-dollar-gift-card-fraud-scheme

3 https://www.justice.gov/usao-sdny/pr/husband-and-wife-charged-multimillion-dollar-gift-card-fraud-scheme 

4 https://kb.mit.edu/confluence/display/istcontrib/Common+Email+Scams

5 https://www.aarp.org/money/scams-fraud/info-2022/mental-health-impact.html

6 https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2021/12/scammers-prefer-gift-cards-not-just-any-card-will-do

Poetry, Prose, and Cybersecurity

In my journey as a computer repair specialist, I’ve encountered myriad stories – tales of unsuspecting individuals ensnared by the cunning traps of modern technology. Each client who walked through my doors brought more than just a device in need of repair; they brought a story of deception, often a victim of the various scams that plague our digital landscape.

This experience, both humbling and enlightening, inspired me to embark on a unique project. My aim was not only to raise awareness about these prevalent scams but to do so through a medium that resonates across ages and backgrounds – poetry. I sought to blend the poignant lessons of my clients’ experiences with the immortal voices of great poets, hoping to create a bridge between the ethereal world of literature and the very real world of cybersecurity threats.

In this series, you will find prose and poetry inspired by the styles of Samuel Clemens, Edgar Allan Poe, Mary Shelley, and Robert Frost. Their distinct voices have always fascinated me, and their ability to delve deep into the human psyche seemed apt for exploring the intricacies of deception in the digital age.

However, as I share these works with you, it is crucial to acknowledge the line between inspiration and originality. These poems, while written in homage to the greats, tread closely to their unique styles and thematic elements. I must confess and apologize for any blatant appropriation, unintentional as it may have been, in my attempt to pay tribute to these literary giants.

 Mark Twain, with his sharp wit and keen observations, Edgar Allan Poe, with his mastery of the macabre, Mary Shelley, with her foresight into the fears of the unknown, and Robert Frost, with his profound simplicity, have all been sources of inspiration for this series. Their works have been a guiding light in my attempt to merge the worlds of cybersecurity and literature, to convey a message that is both educational and reflective.

In closing, I hope the prose and poems will resonate as more than mere echoes of literary past. While I have stylistically borrowed from the greats — and acknowledge that even stylistic emulation treads close to the act of taking what is not one’s own — the core message remains steadfast and clear. These verses are crafted to serve as a beacon, illuminating the ever-present threats in our digital world, and to inspire vigilance. In a realm where your personal information is as valuable as gold, the intention here is not to steal from the legacy of Twain,  Poe, Shelley, or Frost, but to protect you from being scammed. May this collection encourage a more cautious approach to technology, something we often embrace too readily, without understanding its potential perils.

Sincerely,

Kitt Condrey-Miller


In a world where night and day entwine,
Under a canopy of code and cyberspace design,
There lies a tale, both grim and true,
A digital deceit, a modern rue.

In bytes, these poets’ voices blend,
A cautionary tale, a means to an end, In the web of deceit, be wary, be wise,
For in the digital dusk, the gift card scam lies.

So heed these words, a quartet’s refrain,
In the virtual world, let vigilance reign,
For in the mingling of these voices four,
Lies a lesson, a warning, and so much more.