Originally Posted by
davetravels
I've gotten a few of those before, but . . . .
Post #3:
Post #11:
I know. I can read
However, any decent phishing and hacking scheme can take information from your own personal computer, and distribute from an email list block just looking to take your information.
That's why I was curious to see what the actual email looked like.