Welcome and happy reading!

Since, like anyone else, I receive tons of scam emails and snail mail letters, I decided to present here some of these. All of these (and many more which I just delete) are scams. This means, what the senders have in mind is to racket one of us. And according to what I've seen, they do succeed quite often.

If you have similar letters in your mailbox, either disregard or play with the person knowing that you can't give him (or her) any information about:

  1. Your bank account,
  2. Your address — or any valid address if that matter,
  3. Your family, and
  4. any other information that you judge private or even intimate.

Ha! I say "Your"... even if you don't like your neighbor at all, don't give his information either. The Internet leaves tracks (hackers in the US are being caught one after another!) and you would certainly be in even bigger trouble.

In the meantime, I hope you will enjoy reading these letters as I do myself once in a while. 8-)I do not always add comments with the letters since I usually don't have time to do so, but there would often be a lot of joke to tell!

Soap Bubbles


Latest Scams
  • Last update: 10/31/2009

    These days I got an increase of Random Content. And that's just plain... weird. I can understand the concept of sending emails to sell things such as Viagra and Porn, but emails which are randomly generated with content randomly taken from websites, I don't get it.

  • Last update: 10/31/2009
    X-Apparently-To:		alexis_wilke@yahoo.com via; Tue, 29 Jun 2004 07:25:01 -0700
    X-Originating-IP:		[]
    Return-Path:			<mustaphar@stade.fr>
    Received:			from (EHLO sc8-sf-mx2.sourceforge.net) (
    				by mta305.mail.scd.yahoo.com with SMTP; Tue, 29 Jun 2004 07:25:01 -0700
    Received:			from stade.fr ([] helo=mail.stade.fr) by sc8-sf-mx2.sourceforge.net
    				with esmtp (Exim 4.34) id 1BfJXg-00083l-2M; Tue, 29 Jun 2004 07:25:00 -0700
    Received:			from [] (account mustaphar@stade.fr)
    				by mail.stade.fr (CommuniGat
  • Last update: 10/31/2009
    Received:			from netscape.net by substitute with [XMail 1.22 ESMTP Server]
    				id <S8650> for <alexis@m2osw.com>
    				from <reginaahmedtysecppe@netscape.net>; Thu, 29 Jun 2006 02:03:34 -0700
    Received:			from unknown ( by smtp.mixedthings.net
    				with ESMTP; Thu, 29 Jun 2006 06:46:06 -0300
    Received:			from [] by webmail.halftomorrow.com with QMQP; Thu,
    				29 Jun 2006 06:30:12 -0300
    Received:			from ([]) by mail.naihautsui.co.kr
    				with SMTP; Thu, 29 Jun 2006 06:26:01 -0300
    Received:			from unknown (
  • Last update: 11/23/2014

    Quite interesting email. First the header includes some broken entries with the missing space after the : (i.e. X-EYOU-SPAMVALUE) Then the email itself sounds like the bank can only secure its login stuff with your help. I guess they could not just turn off your account and voila...

    Return-Path:		<security@regions.com>
    X-Original-To:		alexis@halk.m2osw.com
    Delivered-To:		alexis@halk.m2osw.com
    Received:		from mail.m2osw.com (jcolo [])
    			by halk.m2osw.com (Postfix) with ESMTP id 132B31BDE4
    			for <alexis@halk.m2osw.com>; Thu, 14 Feb 2008 15:45:07 -0800 ...
  • Last update: 11/24/2014

    The link in this one was on an artist website. The artist just has a Flash animation in there. The hacker added the directory named "onlinebanking" and put a copy of the bank's website.


    Now it sounds like the bank did have a website without encryption before. That's most certainly the case. All banks do just that. Website with no encryption, no certificate, nothing. And all your data floats around just like in totally clear text! Yeah! Right! And sure they need us to confirm we're still alive. Say the bank has ...

  • Last update: 10/31/2009

    I like the "To:" field... don't you?!