Low Tech Hacking: Street Smarts for Security Professionalsen

Total Page:16

File Type:pdf, Size:1020Kb

Low Tech Hacking: Street Smarts for Security Professionalsen Low Tech Hacking Street Smarts for Security Professionals Jack Wiles Dr. Terry Gudaitis Jennifer Jabbusch Russ Rogers Sean Lowther Neil Wyler, Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an imprint of Elsevier Acquiring Editor: Chris Katsaropoulos Development Editor: Mstt Cater Project Manager: Paul Gottehrer Designer: Russell Purdy Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA # 2012 Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information or methods described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility. To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein. Library of Congress Cataloging-in-Publication Data Application submitted British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library. ISBN: 978-1-59749-665-0 For information on all Syngress publications visit our website at www.syngress.com Printed in the United States of America 12 13 14 15 16 10 9 8 7 6 5 4 3 2 1 For information on all Syngress publications visit our website at www.syngress.com Contents Acknowledgments .................................................................................................. ix Foreword................................................................................................................. xi About the Authors ............................................................................................... xiii Introduction............................................................................................................ xv CHAPTER 1 Social engineering: The ultimate low tech hacking threat ...... 1 How easy is it? ............................................................................ 2 The mind of a social engineer..................................................... 3 The mind of a victim................................................................... 3 Tools of the social engineering trade.......................................... 4 One of my favorite tools of the trade ......................................... 5 Social engineering would never work against our company...... 7 What was I able to social engineer out of Mary?....................... 8 The final sting—two weeks later—Friday afternoon ................. 8 Why did this scam work?............................................................ 9 Let’s look at a few more social engineering tools ................... 10 Keystroke logger—Is there one under your desk? ............... 13 One of my lunchtime tools.................................................... 16 Let’s look at that telephone butt-in set on my tool belt ........... 18 Meet Mr. Phil Drake.................................................................. 19 Meet Mr. Paul Henry................................................................. 22 Traditional AV, IDS, and IPS considerations....................... 25 Traditional firewall consideration ......................................... 25 Flaw remediation ................................................................... 26 Do you have a guest user of your credit card?......................... 26 A few possible countermeasures............................................... 27 Always be slightly suspicious ............................................... 28 Start to study the art of social engineering........................... 28 Start a social engineering book library ................................. 28 Summary.................................................................................... 29 CHAPTER 2 Low tech vulnerabilities: Physical security ......................... 31 A mini risk assessment.............................................................. 32 What did I have at risk? ........................................................ 32 What were some possible threats while out on the lake? .... 33 What were some of the possible vulnerabilities? ................. 33 And finally, what about my countermeasures?..................... 34 iii iv Contents Outsider—Insider threats........................................................... 34 Some things to consider for the security of your buildings? ... 35 Check all locks for proper operation .................................... 35 Use employee badges ............................................................ 36 Shredder technology keeps changing as well ....................... 36 Keep an eye on corporate or agency phone books............... 37 Unsecured areas are targets for tailgating............................. 38 Special training for off-shift staff ......................................... 39 Bomb threats in Chicago........................................................... 40 Check those phone closets......................................................... 42 Remove a few door signs .......................................................... 42 Review video security logs ....................................................... 43 Consider adding motion-sensing lights..................................... 43 Subterranean vulnerabilities ...................................................... 44 Clean out your elephant burial ground ..................................... 46 Spot check those drop ceilings.................................................. 47 Internal auditors are your friends.............................................. 47 BONUS: Home security tips..................................................... 48 Summary.................................................................................... 49 CHAPTER 3 More about locks and ways to low tech hack them.............. 51 A little more about locks and lock picking .............................. 52 What kinds of locks are the most popular? .......................... 54 Purchasing better quality locks will be cost effective.......... 57 Be aware of lock vulnerabilities ........................................... 58 Forced entry—and other ways to cheat!................................... 60 A time-tested low tech method of forced entry.................... 61 Let’s break into a semi–high security room ............................. 63 Retracting the bolt to open the door ..................................... 64 Gaining access to the lock itself ........................................... 66 Keys and key control................................................................. 70 Social engineering and key access........................................ 70 Who has the keys to your kingdom ...................................... 70 Special key control awareness training................................. 71 Bait and switch war story that could happen to you ................ 71 Padlock shims are not a new threat ...................................... 73 Some places to go to learn and have some fun ........................ 74 My 110-year-old puzzle ........................................................ 75 More about keys and how to make one if you don’t have one ........................................................................... 76 Five pounds of my favorite keys........................................... 77 Ways to make a key if you didn’t bring a key machine .......... 79 Contents v One final lock to talk about and then we’re done .................... 81 Rim cylinder locks vs. mortise cylinder locks...................... 83 Summary.................................................................................... 85 CHAPTER 4 Low tech wireless hacking................................................. 87 Wireless 101: The electromagnetic spectrum........................... 87 Why securing wireless is hard .............................................. 90 802.11 and Bluetooth low tech hacks ....................................... 91 DoS and availability .................................................................. 91 Layer 1 DoS attacks .............................................................. 91 Layer 2 DoS attacks ............................................................ 104 Backdoors and cracks.............................................................
Recommended publications
  • On the Incoherencies in Web Browser Access Control Policies
    On the Incoherencies in Web Browser Access Control Policies Kapil Singh∗, Alexander Moshchuk†, Helen J. Wang† and Wenke Lee∗ ∗Georgia Institute of Technology, Atlanta, GA Email: {ksingh, wenke}@cc.gatech.edu †Microsoft Research, Redmond, WA Email: {alexmos, helenw}@microsoft.com Abstract—Web browsers’ access control policies have evolved Inconsistent principal labeling. Today’s browsers do piecemeal in an ad-hoc fashion with the introduction of new not have the same principal definition for all browser re- browser features. This has resulted in numerous incoherencies. sources (which include the Document Object Model (DOM), In this paper, we analyze three major access control flaws in today’s browsers: (1) principal labeling is different for different network, cookies, other persistent state, and display). For resources, raising problems when resources interplay, (2) run- example, for the DOM (memory) resource, a principal is time changes to principal identities are handled inconsistently, labeled by the origin defined in the same origin policy and (3) browsers mismanage resources belonging to the user (SOP) in the form of <protocol, domain, port> [4]; but principal. We show that such mishandling of principals leads for the cookie resource, a principal is labeled by <domain, to many access control incoherencies, presenting hurdles for > web developers to construct secure web applications. path . Different principal definitions for two resources are A unique contribution of this paper is to identify the com- benign as long as the two resources do not interplay with patibility cost of removing these unsafe browser features. To do each other. However, when they do, incoherencies arise. For this, we have built WebAnalyzer, a crawler-based framework example, when cookies became accessible through DOM’s for measuring real-world usage of browser features, and used “document” object, DOM’s access control policy, namely the it to study the top 100,000 popular web sites ranked by Alexa.
    [Show full text]
  • 1.2Kv Class Energy Efficient Distribution Transformer Typical Specification
    HPS SENTINEL® 1.2kV Class Energy Efficient Distribution Transformer Typical Specification Canada United States 595 Southgate Drive 1100 Lake Street Guelph, Ontario Baraboo, Wisconsin N1G 3W6 53913-2866 Phone: 1-888-798-8882 Phone: 1-866-705-4684 Fax: 1-519-822-9701 Fax: 1-608-356-2452 E-mail: [email protected] www.hammondpowersolutions.com CSI-2004 (Section 26 22 13) Page 1 of 4 SPS# 06, Rev: 06 1 GENERAL 1.1 SCOPE A This section defines dry-type, enclosed and ventilated low voltage low loss transformers designed constructed and rated in accordance with efficiency levels defined (where applicable) in the U.S. Department of Energy, Energy Conservation Program for Commercial Equipment; Distribution Transformers Energy Conservation Standards DOE 10 CFR Part 431; (before DOE referred to as TP1) and/or CSA C802.2 as referenced in the Canadian Energy Efficiency Regulations (SOR/94-651). 1.2 RELATED DOCUMENTS A Drawing and general provisions of the Contract, including General and Supplementary Conditions and Division 1 Specification Sections, apply to this Section. 1.3 REFERENCES A NEMA ST-20 Dry-Type Transformer For General Applications B IEEE C57.110 Recommended Practice for establishing transformer capability when feeding non- sinusoidal load currents. C DOE 10 CFR Part 431 Efficiency Standards; (before DOE referred to as TP1), CSA C802.2 as referenced in the Canadian Energy Efficiency Regulations SOR/94-651. D UL 1561, CSA C9 & CA 22.2 No. 47. 1.4 SUBMITALS A Submit shop drawing and product data for approval and final documentation in the quantities listed according to the Conditions of the contract.
    [Show full text]
  • Large-Scale, Automatic XSS Detection Using Google Dorks
    Large-Scale, Automatic XSS Detection using Google Dorks Riccardo Pelizzi Tung Tran Alireza Saberi Abstract XSS Attacks continue to be prevalent today, not only because XSS sanitization is a hard problem in rich- formatting contexts, but also because there are so many potential avenues and so many uneducated developers who forget to sanitize reflected content altogether. In this paper, we present Gd0rk, a tool which em- ploys Google’s advanced search capabilities to scan for websites vulnerable to XSS. It automatically generates Figure 1: CVE vulnerabilities for 2010 and maintains a database of parameters to search, and uses heuristics to prioritize scanning hosts which are degrees of client-side support with a primarily server- more likely to be vulnerable. Gd0rk includes a high- side XSS defense [37, 23, 31]. However, the diffusion of throughput XSS scanner which reverse engineers and ap- such methods remains limited: hybrid methods require proximates XSS filters using a limited number of web re- support from both clients and servers. Since the party quests and generates working exploits using HTML and that is most directly affected by an XSS attack is the user JavaScript context-aware rules. who accesses a vulnerable server, client-side protections The output produced by the tool is not only a remark- are thus desirable (despite their limitation to so-called re- ably vast database of vulnerable websites along with flected XSS) and have been developed [29,4, 17, 11]. working XSS exploits, but also a more compact repre- However, client-side defenses are no definitive solution sentation of the list in the form of google search terms, either: IE8 regular-expression based approach is easy whose effectiveness has been tested during the search.
    [Show full text]
  • Recent Developments in Cybersecurity Melanie J
    American University Business Law Review Volume 2 | Issue 2 Article 1 2013 Fiddling on the Roof: Recent Developments in Cybersecurity Melanie J. Teplinsky Follow this and additional works at: http://digitalcommons.wcl.american.edu/aublr Part of the Law Commons Recommended Citation Teplinsky, Melanie J. "Fiddling on the Roof: Recent Developments in Cybersecurity." American University Business Law Review 2, no. 2 (2013): 225-322. This Article is brought to you for free and open access by the Washington College of Law Journals & Law Reviews at Digital Commons @ American University Washington College of Law. It has been accepted for inclusion in American University Business Law Review by an authorized administrator of Digital Commons @ American University Washington College of Law. For more information, please contact [email protected]. ARTICLES FIDDLING ON THE ROOF: RECENT DEVELOPMENTS IN CYBERSECURITY MELANIE J. TEPLINSKY* TABLE OF CONTENTS Introduction .......................................... ..... 227 I. The Promise and Peril of Cyberspace .............. ........ 227 II. Self-Regulation and the Challenge of Critical Infrastructure ......... 232 III. The Changing Face of Cybersecurity: Technology Trends ............ 233 A. Mobile Technology ......................... 233 B. Cloud Computing ........................... ...... 237 C. Social Networking ................................. 241 IV. The Changing Face of Cybersecurity: Cyberthreat Trends ............ 244 A. Cybercrime ................................. ..... 249 1. Costs of Cybercrime
    [Show full text]
  • Hacking the Master Switch? the Role of Infrastructure in Google's
    Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s by John Harris Stevenson A thesis submitteD in conformity with the requirements for the Degree of Doctor of Philosophy Faculty of Information University of Toronto © Copyright by John Harris Stevenson 2017 Hacking the Master Switch? The Role of Infrastructure in Google’s Network Neutrality Strategy in the 2000s John Harris Stevenson Doctor of Philosophy Faculty of Information University of Toronto 2017 Abstract During most of the decade of the 2000s, global Internet company Google Inc. was one of the most prominent public champions of the notion of network neutrality, the network design principle conceived by Tim Wu that all Internet traffic should be treated equally by network operators. However, in 2010, following a series of joint policy statements on network neutrality with telecommunications giant Verizon, Google fell nearly silent on the issue, despite Wu arguing that a neutral Internet was vital to Google’s survival. During this period, Google engaged in a massive expansion of its services and technical infrastructure. My research examines the influence of Google’s systems and service offerings on the company’s approach to network neutrality policy making. Drawing on documentary evidence and network analysis data, I identify Google’s global proprietary networks and server locations worldwide, including over 1500 Google edge caching servers located at Internet service providers. ii I argue that the affordances provided by its systems allowed Google to mitigate potential retail and transit ISP gatekeeping. Drawing on the work of Latour and Callon in Actor– network theory, I posit the existence of at least one actor-network formed among Google and ISPs, centred on an interest in the utility of Google’s edge caching servers and the success of the Android operating system.
    [Show full text]
  • Sloane Drayson Knigge Comic Inventory (Without
    Title Publisher Author(s) Illustrator(s) Year Number Donor Box # 1,000,000 DC One Million 80-Page Giant DC NA NA 1999 NA Sloane Drayson-Knigge 1 A Moment of Silence Marvel Bill Jemas Mark Bagley 2002 1 Sloane Drayson-Knigge 1 Alex Ross Millennium Edition Wizard Various Various 1999 NA Sloane Drayson-Knigge 1 Open Space Marvel Comics Lawrence Watt-Evans Alex Ross 1999 0 Sloane Drayson-Knigge 1 Alf Marvel Comics Michael Gallagher Dave Manak 1990 33 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 1999 1 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 1999 2 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 1999 3 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 1999 4 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 2000 5 Sloane Drayson-Knigge 1 Alleycat Image Bob Napton and Matt Hawkins NA 2000 6 Sloane Drayson-Knigge 1 Aphrodite IX Top Cow Productions David Wohl and Dave Finch Dave Finch 2000 0 Sloane Drayson-Knigge 1 Archie Marries Veronica Archie Comics Publications Michael Uslan Stan Goldberg 2009 600 Sloane Drayson-Knigge 1 Archie Marries Veronica Archie Comics Publications Michael Uslan Stan Goldberg 2009 601 Sloane Drayson-Knigge 1 Archie Marries Veronica Archie Comics Publications Michael Uslan Stan Goldberg 2009 602 Sloane Drayson-Knigge 1 Archie Marries Betty Archie Comics Publications Michael Uslan Stan Goldberg 2009 603 Sloane Drayson-Knigge 1 Archie Marries Betty Archie Comics Publications Michael Uslan Stan Goldberg 2009
    [Show full text]
  • Google Dorks: Use Cases and Adaption Study
    Google dorks: Use cases and Adaption study UNIVERSITY OF TURKU Department of Future Technologies Master of Science in Technology Thesis Networked Systems Security October 2020 Reza Abasi Supervisors: Dr. Ali Farooq Dr. Antti Hakkala The originality of this thesis has been checked in accordance with the University of Turku quality assurance system using the Turnitin OriginalityCheck service. i UNIVERSITY OF TURKU Department of Future Technologies Reza Abasi: Google dorks: Use cases and adaption study Master of Science in Technology Thesis, 93 pages. Networked Systems Security October 2020 The information age brought about radical changes in our lives. More and more assets are getting connected to the Internet. On the one hand, the connectivity to this ever-growing network of connected devices and assets (the Internet) precipitates more convenience and access to various resources. However, on the downside, the Internet could be the hotbed for malicious actors like hackers, attackers, and cybercriminals’ communities. Continuous Penetration testing and monitoring of the sites, and forums providing illicit digital products and services is a must-do task nowadays. Advanced searching techniques could be employed for discovering such forums and sites. Google dorks that are utilizing Google’s advanced searching techniques could be applied for such purpose. Google dorks could be used for other areas that we will explain during this thesis in more detail like information gathering, vulnerability detection, etc. The purpose of this thesis is to propose advanced searching techniques that will help cybersecurity professionals in information gathering, reconnaissance, vulnerability detection as well as cyber criminal investigative tasks. Further, a usability study has been conducted to examine the acceptance of these techniques among a group of cybersecurity professionals.
    [Show full text]
  • Google Hacking 101
    Google Hacking 101 Edited by Matt Payne, CISSP 15 June 2005 http://MattPayne.org/talks/gh 1 Outline • Google Bombing • Schneier in Secrets and Lies – Attack at a distance – Emergent behavior – Automation • Google as a mirror • “Interesting Searches” – Software versions – Passwords, credit card numbers, ISOs • CGI Scanning – Vulnerable software • Defense against Google Hacking 2 Google Bombing != Google Hacking • http://en.wikipedia.org/wiki/Google_bomb • A Google bomb or Google wash is an attempt to influence the ranking of a given site in results returned by the Google search engine. Due to the way that Google's Page Rank algorithm works, a website will be ranked higher if the sites that link to that page all use consistent anchor text. 3 So What Determines Page Relevance and Rating? • Exact Phrase: are your keywords found as an exact phrase in any pages? • Adjacency: how close are your keywords to each other? • Weighting: how many times do the keywords appear in the page? • PageRank/Links: How many links point to the page? How many links are actually in the page? Equation: (Exact Phrase Hit)+(AdjacencyFactor)+(Weight) * (PageRank/Links) 4 From: Google 201, Advanced Googology - Patrick Crispen, CSU Simply Put • “Google allows for a great deal of target reconnaissance that results in little or no exposure for the attacker.” – Johnny Long • Using Google as a “mirror” searches find: – Google searches for Credit Card and SS #s – Google searches for passwords – CGI (active content) scanning 5 Anatomy of a Search Server Side Client Side http://computer.howstuffworks.com/search-engine1.htm 6 How Google Finds Pages • Are only connected web pages indexed? • NO! – Opera submits every URL viewed to Google for later indexing….
    [Show full text]
  • 06 9/2 TV Guide.Indd 1 9/3/08 7:50:15 AM
    PAGE 6 THE NORTON TELEGRAM Tuesday, September 2, 2008 Monday Evening September 8, 2008 7:00 7:30 8:00 8:30 9:00 9:30 10:00 10:30 11:00 11:30 KHGI/ABC H.S. Musical CMA Music Festival Local Nightline Jimmy Kimmel Live KBSH/CBS Big Bang How I Met Two Men Christine CSI: Miami Local Late Show-Letterman Late Late WEEK OF FRIDAY , SEPT . 5 THROUGH THUR S DAY , SEPT . 11 KSNK/NBC Deal or No Deal Toughest Jobs Dateline NBC Local Tonight Show Late FOX Sarah Connor Prison Break Local Cable Channels A&E Intervention Intervention After Paranorml Paranorml Paranorml Paranorml Intervention AMC Alexander Geronimo: An American Legend ANIM Animal Cops Houston Animal Cops Houston Miami Animal Police Miami Animal Police Animal Cops Houston CNN CNN Election Center Larry King Live Anderson Cooper 360 Larry King Live DISC Mega-Excavators 9/11 Towers Into the Unknown How-Made How-Made Mega-Excavators DISN An Extremely Goofy Movie Wizards Wizards Life With The Suite Montana So Raven Cory E! Cutest Child Stars Dr. 90210 E! News Chelsea Chelsea Girls ESPN NFL Football NFL Football ESPN2 Poker Series of Poker Baseball Tonight SportsCenter NASCAR Now Norton TV FAM Secret-Teen Secret-Teen Secret-Teen The 700 Club Whose? Whose? FX 13 Going on 30 Little Black Book HGTV To Sell Curb Potential Potential House House Buy Me Sleep To Sell Curb HIST The Kennedy Assassin 9/11 Conspiracies The Kennedy Assassin LIFE Army Wives Tell Me No Lies Will Will Frasier Frasier MTV Exposed Exposed Exiled The Hills The Hills Exiled The Hills Exiled Busted Busted NICK Pets SpongeBob Fam.
    [Show full text]
  • On the Auto Body, Inc
    FINAL-1 Sat, Oct 14, 2017 7:52:52 PM Your Weekly Guide to TV Entertainment for the week of October 21 - 27, 2017 HARTNETT’S ALL SOFT CLOTH CAR WASH $ 00 OFF 3 ANY CAR WASH! EXPIRES 10/31/17 BUMPER SPECIALISTSHartnetts H1artnett x 5” On the Auto Body, Inc. COLLISION REPAIR SPECIALISTS & APPRAISERS MA R.S. #2313 R. ALAN HARTNETT LIC. #2037 run DANA F. HARTNETT LIC. #9482 Emma Dumont stars 15 WATER STREET in “The Gifted” DANVERS (Exit 23, Rte. 128) TEL. (978) 774-2474 FAX (978) 750-4663 Open 7 Days Now that their mutant abilities have been revealed, teenage siblings must go on the lam in a new episode of “The Gifted,” airing Mon.-Fri. 8-7, Sat. 8-6, Sun. 8-4 Monday. ** Gift Certificates Available ** Choosing the right OLD FASHIONED SERVICE Attorney is no accident FREE REGISTRY SERVICE Free Consultation PERSONAL INJURYCLAIMS • Automobile Accident Victims • Work Accidents Massachusetts’ First Credit Union • Slip &Fall • Motorcycle &Pedestrian Accidents Located at 370 Highland Avenue, Salem John Doyle Forlizzi• Wrongfu Lawl Death Office INSURANCEDoyle Insurance AGENCY • Dog Attacks St. Jean's Credit Union • Injuries2 x to 3 Children Voted #1 1 x 3” With 35 years experience on the North Serving over 15,000 Members •3 A Partx 3 of your Community since 1910 Insurance Shore we have aproven record of recovery Agency No Fee Unless Successful Supporting over 60 Non-Profit Organizations & Programs The LawOffice of Serving the Employees of over 40 Businesses STEPHEN M. FORLIZZI Auto • Homeowners 978.739.4898 978.219.1000 • www.stjeanscu.com Business
    [Show full text]
  • Copyrighted Material
    38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page ix Contents Acknowledgments xxiii Introduction xxv Chapter 1 Control Your Email 1 Hack 1: Empty Your Inbox (and Keep It Empty) 3 Why an Empty Inbox? 4 Set Up the Trusted Trio of Folders 4 The Archive Folder 5 The Follow Up Folder 5 The Hold Folder 6 Process Your Messages 6 Keep It Empty 7 Your First Time 7 The Catch 7 Hack 2: Decrease Your Response Time 8 Process Messages in Batches 9 The One-Minute Rule 9 Respond to Task Requests — Before the Task Is Done 9 COPYRIGHTEDDon’t Leave It in Your Inbox MATERIAL 10 Hack 3: Craft Effective Messages 10 Composing a New Message 11 Determine Your Purpose 11 Use an Informative Subject Line 11 Be Succinct 12 Put Your Messages on a Diet 12 Facilitate a Complete Response 13 ix 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page x x Contents Make It Clear Why Everyone Got the Message 14 Don’t Forget the Attachment 14 Replying to a Message 14 Respond to Individual Points Inline 15 Task Requests 15 Lead by Example 16 Don’t Respond in Real Time 16 Get Outside the Inbox 16 Know When Not to Say a Thing 17 Hack 4: Highlight Messages Sent Directly to You 17 Microsoft Outlook: Color Me Blue 18 All Other Email Programs: Create a Not-to-Me Filter 18 Hack 5: Use Disposable Email Addresses 19 Web-Based Public Email Addresses 19 Multi-Domain Email Addresses 19 Hack 6: Master Message Search 20 Search Criteria 20 Saved Search Folders 23 Hack 7: Future-Proof Your Email Address 25 Don’ts 25 Do’s 25 Bottom Line 26 Hack 8: Consolidate Multiple Email Addresses with Gmail 27 Receive Messages
    [Show full text]
  • Tv Pg8 12-27.Indd
    8 The Goodland Star-News / Tuesday, December 27, 2011 All Central Time, for Kansas Mountain TIme Stations subtract an hour TV Channel Guide Tuesday Evening December 27, 2011 7:00 7:30 8:00 8:30 9:00 9:30 10:00 10:30 11:00 11:30 35 NFL 67 Bravo 22 ESPN 41 Hallmark ABC Last Man Last Man Middle Suburg. Body of Proof Local Nightline Jimmy Kimmel Live S&T Eagle CBS NCIS Kennedy Ctr. Local Late Show Letterman Late 37 USA 68 truTV 23 ESPN 2 45 NFL NBC The Biggest Loser Parenthood Local Tonight Show w/Leno Late 2 PBS KOOD 2 PBS KOOD 38 TBS 71 SCI FI 24 ESPN Nws 47 Food FOX Glee New Girl Raising Local 3 KWGN WB 3 NBC-KUSA 25 TBS 49 E! Cable Channels 39 WGN 72 Spike 4 ABC-KLBY A&E Storage Storage Storage Storage Storage Storage Storage Storage Wars Local 5 KSCW WB 26 Animal 51 Travel AMC The Polar Express The Polar Express The Sandlot Local 40 TNT 73 Comedy 6 Weather 27 VH1 54 MTV 6 ABC-KLBY ANIM Yellowstone: Battle Wild Russia Yellowstone: Battle for Life Local 41 FX 74 MTV 7 CBS-KBSL 28 TNT 55 Discovery BET Baby Boy Motives Wendy Williams Show Lean On Local 7 KSAS FOX 8 NBC-KSNK 29 CNBC 56 Fox Nws BRAVO 42 Discovery 75 VH1 Tabatha's Salon Take Tabatha's Salon Take Tabatha's Salon Take Tabatha's Salon Take Tabatha's Salon Take 8 NBC-KSNK 9 Eagle 30 FSN RM 57 Disney CMT Local Local Tombstone Fried Blue 43 TLC 76 CMT 11 QVC CNN Piers Morgan Tonight Anderson Cooper 360 E.
    [Show full text]