INTEGRATOR's JOURNAL by Wayne M

Total Page:16

File Type:pdf, Size:1020Kb

INTEGRATOR's JOURNAL by Wayne M INTEGRATOR'S JOURNAL by Wayne M. Krakau - Chicago Computer Guide, March 1992 Wayne Krakau welcomes all calls, comments, and questions from basement businesses to corporate MIS. Wayne is a partner in Krakau Business Computer Systems, a systems integration firm and a Novell Gold authorized and Lantastic 5 Star Dealer. He has been working with computers for 15 years. He has an MBA in Marketing and a BS in Information Science and was originally educated in Computer and Information Systems Analysis Engineering. He holds Novell CNE and CNI ratings, and LANDA Certifications in LAN Installation, Architecture, Connectivity, Maintenance, and Program Development. Wayne can be reached for questions, comments, or topic suggestions at (708)298-7695 or through the Computer Guide. This is a new column that will provide information on the products, people, news, and situations, encountered in the life of a systems integrator (yours truly). Since a large part of my work involves "res- cues" of people after they've been victims of botched integration attempts or abuse or abandonment by vendors, the slant of this commentary may sometimes be a bit cynical. As an experienced street cop might tell you, that's a hazard of constant exposure to the seamier side of the beat. Due to popular demand (via faxes to the Computer Guide -- Yes, we do read them!) LANs (Local Area Networks) and other connectivity issues will be prominently, though not exclusively, featured. Upon reading this column, my dedication to defining terminology will soon become apparent. I would rather err on the side of over-explaining and have technically oriented readers skip over the explanations than leave some people in the dark. Even techies don't know every variation of every possible phrase (unless they cheat like I do and look them up). I can still remember being baffled by the constant use of "BTW" in messages on BBS's (electronic Bulletin Board Systems). Eventually, I figured out that it was short for "By The Way". It was even worse for "OEM", an acronym constantly used in the computer press. It took an embarrassingly long time to find out that it means "Original Equipment Manufacturer". To add to my confusion, it's also used as a verb to describe two opposite sides of a transaction. Sometimes it refers to manufacturing and selling a product for another company's eventual resale under its name. Other times I've seen it used to describe the purchase side of that same transaction! I'd rather define terms up front to avoid this type of problem. For my first news item, in the category of "You Can't Teach An Old Dog New Tricks", Novell has finally confirmed the rumors about the future (or lack thereof) of Netware 2.2. With the allegedly "brain-dead" Intel 80286 chip taking the part of the old dog and Novell taking the part of the unwilling teacher, Novell announced that there would be no further development or enhancements for version Netware 2.2. Maintenance and support will continue (for now), but the product is now officially a dead-end. (Mechanical life-support will continue for the comatose patient, but his records will be tagged "DNR" -- Do Not Resuscitate.) A 10-user ($2495) version of Netware 3.11 was released last fall and a 5-user ($1095) version is expected soon. Prices on the 50- and 100-user versions of 2.2 are being raised by $500 (That's the stick). Special upgrade prices from 2.2 and below to 3.11 are expected (And there's the carrot). Those considering a purchase of or upgrade to 2.2 should stop and estimate the future costs involved in buying into an explicitly obsolete product. They also should consider purchasing XT's, AT's, and an occasional 386SX-16 to keep with the "retro" spirit of their system. Vendors of LAN-related hardware and software have long treated 2.2 as the poor stepchild of the Netware family making it an unattractive purchase option for those who monitor the industry. It's good to see 2.2's fate confirmed officially so everyone will know. My first cynical observation (or incoherent rave out, depending on your point of view) concerns the use of the term "systems integrator". A common remark in the LAN world is that it's easier to get Netware than it is to get a Slurpee since there are more Novell Authorized Resellers than there are 7-11s. This is not a facetious remark - it's true! After hearing a client remark that there was a systems integrator on almost every street corner, I thought something must be wrong with the definition of systems inte- grator. Subsequently, I kept an eye out for an unbiased explanation of that term. 1 I found that explanation in a recent issue of VARBUSINESS, a publication for value added resellers (VARs), developers, and integrators. In it, 19% of the respondents to their "State of the Market" survey called themselves systems integrators while less than 1% actually qualified according to the magazine's criteria! To use the term "systems integrator" the magazine required that at least 25% of the revenue of a company had to be from project management or systems integration. In their (somewhat pompous) definition, systems integrators "provide a comprehensive information processing solution through a unique combination of professional services and expertise in hardware, software, and communications technology." They emphasize that systems integrators must maintain full responsibility "for the entire project from design to post-implementation stages, including product selection." That last sentence is the key. Computer systems, and in particular, LANs, are almost by definition, multi-vendor solutions. For example, even IBM doesn't try to do everything anymore. They are currently abandoning their main applications programming effort, so applications software for their machines will have to be obtained from other vendors. Their main PC operating system (for now, at least), PC-DOS Version 5.0, was written by Microsoft with only minor tweaks by IBM. (Thank God! -- Their previous attempts at sig- nificantly modifying MS-DOS were versions 3.2 and 4.0, both unmitigated disasters.) That's another vendor. Also, most people end up with plenty of non-IBM hardware in or on their IBM computers, thereby adding more vendors. When you can't get a single brand solution from a monolith like IBM the need for someone to take responsibility for getting all of these products to work together optimally becomes apparent. The government and big business figured that out decades ago, as evidenced by the success of EDS (Electronic Data Systems) and its kin. The appeal of systems integrators seems to be spreading -- why else would so many companies try to use (or misuse) this moniker? Oh, well, the computer industry has never been known for truth in advertising. As mentioned above, questions, comments, and topic suggestions are always welcome. ©1992, Wayne M. Krakau 2 BACKUPS, ANYONE? by Wayne M. Krakau - Chicago Computer Guide, April 1992 Wayne Krakau welcomes all calls, comments, and questions from basement businesses to corporate MIS. Wayne is a partner in Krakau Business Computer Systems, a systems integration firm and a Novell Gold authorized and Lantastic 5 Star Dealer. He has been working with computers for 15 years. He has an MBA in Marketing and a BS in Information Science and was originally educated in Computer and Information Systems Analysis Engineering. He holds Novell CNE and CNI ratings, and LANDA Certifications in LAN Installation, Architecture, Connectivity, Maintenance, and Program Development. Wayne can be reached for questions, comments, or topic suggestions at (708)298-7695 or through the Computer Guide. This is getting ridiculous! I'm now getting at least one new client per month who is backing up its data in what turns out to be an invalid or inconsistent manner. A false sense of security keeps these system managers (if you run a LAN or even a single computer, you're THE System Manager even if you're a "civilian" and don't use the title) thinking that they are doing their duty and safeguarding their computer systems (mostly LANs). In reality, they were really running either partially or fully unprotected. One client had been using the same five 60MB (Note: MB=Megabyte, Mb=megabit) cassette-style tapes since 1986 to back up a 102MB network hard disk that held 97 MB! This is the proverbial ten pounds of potatoes in a five pound sack. The dealer who sold them the system thoughtfully automated the backup process with a batch file. He (I know it's a guy - I asked) was so considerate, in fact, that he disabled the ability to automatically request continuation onto a second tape when the first was full. None of that time wasting stuff for his customers. No more of those annoying, error messages, either -- he suppressed displaying them. And knowledge of the error log file really should be on a need to know basis, so don't tell anyone about it, and certainly don't do anything radical like printing it out at the end of the backup. As for the verify (also called compare) function, well, that's like having a belt and suspenders. Let's skip it. Finally, the most confidential aspect of a backup system is the backup software itself. This, of course, means that you shouldn't reveal where it is hidden, and you absolutely can't divulge the ultimate of secrets -- how to execute it manually in an emergency. While we're on a roll, let's also skip the lesson on multiple redundant backup tapes.
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Kevin Mitnick and I Were Intensely Curious About the World and Eager to Prove Ourselves
    Scanned by kineticstomp THE ART OF DECEPTION Controlling the Human Element of Security KEVIN D. MITNICK & William L. Simon Foreword by Steve Wozniak For Reba Vartanian, Shelly Jaffe, Chickie Leventhal, and Mitchell Mitnick, and for the late Alan Mitnick, Adam Mitnick, and Jack Biello For Arynne, Victoria, and David, Sheldon,Vincent, and Elena. Social Engineering Social Engineering uses influence and persuasion to deceive people by convincing them that the social engineer is someone he is not, or by manipulation. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. Contents Foreword Preface Introduction Part 1 Behind the Scenes Chapter 1 Security's Weakest Link Part 2 The Art of the Attacker Chapter 2 When Innocuous Information Isn't Chapter 3 The Direct Attack: Just Asking for it Chapter 4 Building Trust Chapter 5 "Let Me Help You" Chapter 6 "Can You Help Me?" Chapter 7 Phony Sites and Dangerous Attachments Chapter 8 Using Sympathy, Guilt and Intimidation Chapter 9 The Reverse Sting Part 3 Intruder Alert Chapter 10 Entering the Premises Chapter 11 Combining Technology and Social Engineering Chapter 12 Attacks on the Entry-Level Employee Chapter 13 Clever Cons Chapter 14 Industrial Espionage Part 4 Raising the Bar Chapter 15 Information Security Awareness and Training Chapter 16 Recommended Corporate Information Security Policies Security at a Glance Sources Acknowledgments Foreword We humans are born with an inner drive to explore the nature of our surroundings. As young men, both Kevin Mitnick and I were intensely curious about the world and eager to prove ourselves.
    [Show full text]
  • Organized Crime on Wall Street Hearing Committee on Commerce House of Representatives
    ORGANIZED CRIME ON WALL STREET HEARING BEFORE THE SUBCOMMITTEE ON FINANCE AND HAZARDOUS MATERIALS OF THE COMMITTEE ON COMMERCE HOUSE OF REPRESENTATIVES ONE HUNDRED SIXTH CONGRESS SECOND SESSION SEPTEMBER 13, 2000 Serial No. 106–156 Printed for the use of the Committee on Commerce ( U.S. GOVERNMENT PRINTING OFFICE 67–115CC WASHINGTON : 2000 VerDate 11-MAY-2000 15:08 Jan 04, 2001 Jkt 068011 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 E:\HEARINGS\67115 pfrm02 PsN: 67115 COMMITTEE ON COMMERCE TOM BLILEY, Virginia, Chairman W.J. ‘‘BILLY’’ TAUZIN, Louisiana JOHN D. DINGELL, Michigan MICHAEL G. OXLEY, Ohio HENRY A. WAXMAN, California MICHAEL BILIRAKIS, Florida EDWARD J. MARKEY, Massachusetts JOE BARTON, Texas RALPH M. HALL, Texas FRED UPTON, Michigan RICK BOUCHER, Virginia CLIFF STEARNS, Florida EDOLPHUS TOWNS, New York PAUL E. GILLMOR, Ohio FRANK PALLONE, Jr., New Jersey Vice Chairman SHERROD BROWN, Ohio JAMES C. GREENWOOD, Pennsylvania BART GORDON, Tennessee CHRISTOPHER COX, California PETER DEUTSCH, Florida NATHAN DEAL, Georgia BOBBY L. RUSH, Illinois STEVE LARGENT, Oklahoma ANNA G. ESHOO, California RICHARD BURR, North Carolina RON KLINK, Pennsylvania BRIAN P. BILBRAY, California BART STUPAK, Michigan ED WHITFIELD, Kentucky ELIOT L. ENGEL, New York GREG GANSKE, Iowa TOM SAWYER, Ohio CHARLIE NORWOOD, Georgia ALBERT R. WYNN, Maryland TOM A. COBURN, Oklahoma GENE GREEN, Texas RICK LAZIO, New York KAREN MCCARTHY, Missouri BARBARA CUBIN, Wyoming TED STRICKLAND, Ohio JAMES E. ROGAN, California DIANA DEGETTE, Colorado JOHN SHIMKUS, Illinois THOMAS M. BARRETT, Wisconsin HEATHER WILSON, New Mexico BILL LUTHER, Minnesota JOHN B. SHADEGG, Arizona LOIS CAPPS, California CHARLES W. ‘‘CHIP’’ PICKERING, Mississippi VITO FOSSELLA, New York ROY BLUNT, Missouri ED BRYANT, Tennessee ROBERT L.
    [Show full text]
  • False Claims Reform Act
    S. HRG.99-452 FALSE CLAIMS REFORM ACT Legislative Office MAIN LIBRARY HEARING U.S. Dept. of Justice BEFORE THE SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE OF THE COMMITTEE ONTHE JUDICIARY UNITED STATES SENATE NINETY-NINTH CONGRESS FIRST SESSION ON S. 1562 A BILL TO AMEND THE FALSE CLAIMS ACT, AND TITLE 18 OF THE UNITED STATES CODE REGARDING PENALTIES FOR FALSE CLAIMS, AND FOR OTHER PURPOSES SEPTEMBER 17, 1985 Serial No. J-99-52 Printed for the use of the Committee on the Judiciary U.8. GOVERNMENT PRINTING OFFICE 56-637 O WASHINGTON : 1986 SENATE COMMITTEE ON THE JUDICIARY STROM THURMOND, South Carolina, Chairman CHARLES McC. MATHIAS, JR., Maryland JOSEPH R. BIDEN, JR., Delaware PAUL LAXALT, Nevada EDWARD M. KENNEDY, Massachusetts ORRIN G. HATCH, Utah ROBERT C. BYRD, West Virginia ALAN K. SIMPSON, Wyoming HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina DENNIS DECONCINI, Arizona CHARLES E. GRASSLEY, Iowa PATRICK J. LEAHY, Vermont JEREMIAH DENTON, Alabama HOWELL HEFLIN, Alabama ARLEN SPECTER, Pennsylvania PAUL SIMON, Illinois MITCH McCONNELL, Kentucky DENNIS W. SHEDD, Chief Counsel and Staff Director DIANA L. WATERMAN, General Counsel DEBORAH G. BERNSTEIN, Chief Clerk MARK H. GITENSTEIN, Minority Chief Counsel SUBCOMMITTEE ON ADMINISTRATIVE PRACTICE AND PROCEDURE CHARLES E. GRASSLEY, Iowa, Chairman ARLEN SPECTER, Pennsylvania HOWARD M. METZENBAUM, Ohio JOHN P. EAST, North Carolina HOWELL HEFLIN, Alabama ALICE R. MILDER, Chief Counsel and Staff Director (II) CONTENTS STATEMENTS OF MEMBERS Page Grassley, Hon. Charles E., a U.S. Senator from the State of Iowa 1 Metzenbaum, Hon. Howard M., a U.S. Senator from the State of Ohio 13 DeConcini, Hon.
    [Show full text]
  • Landlocked 2.2
    LandLocked 2.2 i LandLocked Cultural Boundaries by Rachel Berkowitz Faculty Advisor Kij Johnson LandLocked, Issue 2.2, Summer 2020. Copyright © 2020 the contributors. No part of LandLocked may be reproduced without permission from the contributor. LandLocked is published by the graduate students in the Department of English at the University of Kansas. Unsolicited manuscripts are welcome through Submittable. Guidelines for submission are available online. LandLocked Wescoe Hall, Rm. 3001 1445 Jayhawk Blvd. Lawrence, KS 66045 http://www.landlockedmagazine.com [email protected] Contents Poetry Haley Lasché Abort 1 Abort 2 Abort 3 Devolver 4 Ashley Cline to tend the garden that is my throat, 16 suddenly in bloom knuckle teeth, with lines from Carly 17 Rae Jepsen MICHAEL CHANG you're out of touch i'm out of time 39 狮子山隧道 //////: lion rock tunnel 41 María DeGuzmán Memory of the Dance 47 Dani Putney Angeligender 54 Michelangelo 55 Technological Dismemberment 56 Madison Zehmer Unearthly 68 Preston Smith In Which You're A Spineless Monolith 80 To Earn Garden Merit 81 Riley Morsman Only Bones 86 Of Prairie 87 Charlotte Newbury Weeping Madonna // Anatomical 96 Venus Mycelium 98 Lauren Annette Boulton Takotsubo 105 Foundation, Summer 2002 107 Randi Clemens The American Daughter in the 121 Diorama Rapunzel Birthing 122 Hysterectomy 123 Nonfiction Maggie Argiro Highway Song 5 Mikala Stubley Postcard from the places I 33 haven't been Vilune Sestokaite Steps of Service 99 Anannya Uberoi To Shimla, from Madrid 111 Harrison Pyros The Question
    [Show full text]
  • Criminal Law
    Fraud From Wikipedia, the free encyclopedia Criminal law Part of the common law series Elements Actus reus Mens rea Causation Concurrence Scope of criminal liability Complicity Corporate Vicarious Seriousness of offense Felony Infraction (also called Violation) Misdemeanor Inchoate offenses Attempt Conspiracy Incitement Solicitation Offence against the person Alienation of affection Assassination Assault Battery Bigamy Criminal negligence False imprisonment Home invasion Homicide Kidnapping Manslaughter (corporate) Mayhem Murder corporate Negligent homicide Public indecency Rape Robbery Sexual assault Statutory rape Vehicular homicide Crimes against property Arson Blackmail Bribery Burglary Embezzlement Extortion False pretenses Fraud Larceny Payola Pickpocketing Possessing stolen property Robbery Smuggling Tax evasion Theft Crimes against justice Compounding Malfeasance in office Miscarriage of justice Misprision Obstruction Perjury Perverting the course of justice Victimless crimes Adultery Apostasy Blasphemy Buggery Providing Contraception information(Comstock law) Criminal conversation Dueling Fornication Gambling Adult Incest Interracial marriage Lewd and lasciviousbehavior Masturbation Creation ofObscenity Prostitution Recreational drug use (including alcohol, when prohibited) Sale of sex toys Sodomy Labor strike Suicide Crimes against animals Cruelty to animals Wildlife smuggling Bestiality Defences to liability Automatism Consent Defence of property
    [Show full text]
  • Interstate Mail Order Land Sales
    INTERSTATE MAIL ORDER LAND SALES HEARING BEFORE THE St[BCOMMITTEE ON FRAUDS AND MISR]L- RIg3SENTATIONS AFFECTING THE ELDER{LY OF THE SPECIAL COMMITTEE ON AGING UNITED STATES SENATE EIGHTY-EIGHTH CONGRESS SECOND SESSION PART 3 MAY 20, 1964 Printed for the use of the Special Committee on Aging <*. U.S. GOVERNMENT PRINTING OFFICE 34-56 0 WASHINGTON : 1964 For sale by the Superintendent of Documents, U.S. Government Printing Office Washington, D.C., 20402 - Price 35 cents SPECIAL COMMITTEE ON AGING GEORGE A. SMATHERS, Florida, Chairman PAT McNAMARA, Michigan EVERETT McKINLEY DIRKSEN, Illinois CLAIR ENGLE, California BARRY GOLDWATER, Arizona HARRISON A. WILLIAMS, li., New Jersey FRANK CARLSON, Kansas MAURINE B. NEUBERGER, Oregon WINSTON L. PROUTY, Vermont WAYNE MORSE, Oregon KENNETH B. KEATING, New York ALAN BIBLE, Nevada HIRAM L. FONG, Hawaii FRANK CHURCH, Idaho E. L. MECHEM, New Mexico JENNINGS RANDOLPH, West Virginia EDMUND S. MUSKIE, Maine EDWARD V. LONG, Missouri FRANK E. MOSS, Utah EDWARD M. KENNEDY, Massachusetts RALPH W. YARBOROUGH, Texas J. WILLIAM NOaMAN, Jr., Staff Director JoHN Guy MILLEa, Minority Staff Director SUBCOMMITTEE ON FRAUDS AND MISREPRESENTATIONS AFFECTING THE ELDERLY HARRISON A. WILLIAMS, Jn., New Jersey, Chairman MAURINE B. NEUBERGER, Oregon KENNETH B. KEATING, New York WAYNE MORSE, Oregon WINSTON L. PROUTY, Vermont FRANK CHURCH, Idaho HIRAM L. FONG, Hawaii EDMUND S. MUSKIE, Maine E. L. MECHEM, New Mexico EDWARD V. LONG, Missouri EDWARD M. KENNEDY, Massachusetts RALPH W. YARBOROUGH, Texas WILLIAM E. ORnOL, Professional Staff Member GERALD P. NYE, Minority Professional Staff Member NoTm.-Hearings on interstate mail-order land sales were held and they are identified as follows: Part 1-Washington, D.C., May 18, 1964.
    [Show full text]
  • Priority Development Assistance Fund Scam
    Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million
    [Show full text]
  • Chapter Four Fraud for Thought Where There Is Greed, Ignorance
    Chapter Four Fraud for Thought Where there is greed, ignorance, and a great deal of money, fraud can't be far behind. Investment scams are becoming the fraud of choice for many con men, con women, and gangsters as consumers are gradually becoming more aware of other scams such as free trips and phony sweepstakes. The press keeps feeding anecdotal evidence to the public of young kids and old ladies who, with a little ingenuity, have made it big in the stock market. Neighbors and friends tell friends and neighbors how they have been making 35% a year on their mutual funds with little risk over several years. People who have missed that boom, often the less financially sophisticated, feel the need to catch up, and thus become perfect targets for fraud. But it can happen to sophisticated investors as well. Several books could, and should, be written about how, and how often, individual investors fall prey to fraud perpetuated from some very unlikely quarters. The SEC website is full of people or companies caught scamming investors, but the public appears to be unaware, or unwilling to believe that fraud in the financial circles is prevalent, the regulators sometimes work against the individual investors interests, and the laws are either inadequate or to hard to enforce. Individual investors are 1 complacent; they prefer to believe that someone is looking out for them (auditors, the Congress, government agencies, law enforcement agencies, the SEC or NASD Dealers (National Asssociation of Securities, the private-sector overseer of the securities industry). If investors look at NASD, they will find that with only 2000 employees NASD oversees 5,160 brokerage firms, 108,685 branch offices, and 663,938 registered security representatives—also known as stockbrokers.
    [Show full text]
  • Fraud Investigation and Audit ICPAP
    Study Notes Specialization Fraud Investigation MODULE-6 SP-612 and Audit ICPAP Institute of Certified Public Accountants of Pakistan Fraud Investigation and Audit ICPAP Question No 1. Explain Classic Fraud Research Theories. Classic Fraud Research Fraud is a topic much in vogue today. Seminars, symposia, and conferences on that subject abound, sponsored by government agencies, universities, trade groups, professional organizations, chambers of commerce; and business, fraternal, and religious organizations. Most are well attended, particularly because the cost of such crimes to individual businesses and society is substantial, but also because few know much about fraud. Reviewing the literature creates an appreciation for the scope and nature of fraud and builds a foundation for understanding fraud topics. The current term fraud was traditionally referred to as white-collar crime, and the two are used synonymously here. The classic works on fraud are White Collar Crime, by Edwin H. Sutherland; Other People‘sMone, by Donald R. Cressey; The Thief in the White Collar, byNorman Jaspan and Hillel Black; and Crime, Law, and Society, byFrank E. Hartung. These authorities essentially tell us: White-collar crime has its genesis in the same general process as other criminal behavior; namely, differential association. The hypothesis of differential association is that criminal behavior is learned in association with those who define such behavior favor-ably and in isolation from those who define it unfavorably, and that a person in an appropriate situation engages in such criminal behavior if, and only if, the weight of the favorable definitions exceeds the weight of the unfavorable definitions. In other words, birds of a feather flock together, or at least rein-force one another‘s rationalized views and values.
    [Show full text]
  • Sharking — Don’T Get Fooled Again
    SHARKING — DON’T GET FOOLED AGAIN AUTHOR Eric S. Townsend EDITOR Sue LaLumia © 2012-3 Glimpse Digital. All rights reserved. No part of this book may be reproduced without permission from the Publisher. Publisher: Go Booklets of Fairfax, VA 22030. www.gobooklets.com. Parent Company: Glimpse Digital. Distributed worldwide on Amazon. Yes, we provide marketing services to individuals and businesses. Get started at www.glimpse.digital/RFP. © 2012-3 Glimpse Digital — www.glimpse.digital | www.gobooklets.com | www.facebook.com/gobooklets SHARKING — DON’T GET FOOLED AGAIN CONTENTS _________________________ DEDICATION FOREWORD HISTORICAL PERSPECTIVES I. OVERCOME SHARKING WHAT IS SHARKING? RLR: A NEW FORM OF SELF-DEFENSE STEP 1: RECOGNITION STEP 2: LAUGHTER THEORIES OF LAUGHTER STEP 3: RESOLVE II. 9 TALES OF SHARKING POOLPLAYER VS. HUSTLER YOUR MONEY IS MY MONEY THE LIZARD WON’T MISS REACHING FOR TRUTH CONTROL THE WHITE GIRL “KOOSH KOOSH” PANTS SAM HAS A COLD THE MATCH THAT NEVER ENDED THE YIN YANG MAN III. 150 SHARKS IN SUMMARY ADDITIONAL REFERENCES © 2012-3 Glimpse Digital — www.glimpse.digital | www.gobooklets.com | www.facebook.com/gobooklets SHARKING — DON’T GET FOOLED AGAIN We thank you for your interest in Sharking — Don’t Get Fooled Again, as well as our publisher Go Booklets. Our parent company, Glimpse Digital, provides full-spectrum marketing consultation and services to a select number of clients. Tat website is located in the footer. Here’s the Go Booklets library: • Bizkü Volume I • Bizkü Volume II • Catch: Bond in Meaningful Ways
    [Show full text]
  • 2015 Annual Meeting
    LawyerMAY15_Lawyer 4/27/15 8:53 AM Page 149 May 2015 | Volume 76, Number 3 2015 Annual Meeting POINT C L E A R Meeting highlights insideFRegister at www.alabar.org/aboutFtheFbar/annualFmeeting 72617-1 ALABAR.qxp_Lawyer 4/21/15 10:42 AM Page 150 The best malpractice insurance takes no time to find. AIM makes it easy. Dedicated to insuring practicing attorneys. Attorneys Insurance Mutual Telephone 205-980-0009 of the South® Toll Free 800-526-1246 Fax 205-980-9009 200 Inverness Parkway Birmingham, Alabama 35242 www.AttyslnsMut.com "Insuring and Serving Practicing Attorneys Since 1989" Copyright 2013 by Attorneys Insurance Mutual of the South ® 72617-1 ALABAR.qxp_Lawyer 4/21/15 10:43 AM Page 151 72617-1 ALABAR.qxp_Lawyer 4/21/15 10:43 AM Page 152 PAYMENT PROCESSIN EXCLUSIVELY FOR ATTORNEYS. Helping law firms get paid. IOLTA guidelines and the ABA Rules of Professional Conduct require attorneyst o accept credit cords correctly. We guarantee complete separation of earned and unearned fees, giving you the confidence and peace of mind that your transactions ore handled the right way. mm•• a I '11111111-I Wll· I III •i?3i"iMi, www.LowPoy.com/olobor J 866 .376.0950 CREDIT C ARD PROCESSING AffiniPay is a registered ISO/MSP of BMO Harris Bank, N.A .• Chicago, IL LawyerMAY15_Lawyer 4/27/15 8:53 AM Page 153 The Alabama Lawyer May 2015 | Vol. 76, No. 3 166 172 180 FEATURES 160 President-Elect Profiles: J. Cole Portis and W.N. “Rocky” Watson On The Cover The Alabama State Bar is back at the 164 The Economic Impact and Social Return on Grand Hotel this year! Join us July 15-18 Investment of Alabama’s Legal Aid Providers at the Grand Hotel Marriott Resort, Golf By Linda Lund Club & Spa.
    [Show full text]