Survival, Security Books, Manuals: Internet Frauds, Internet Tracking, Internet Tracing, Internet Security, Internet Privacy, Countermeasures Technologies!
Consumertronics Combined Online Catalog
  Framed: www.consumertronics.net/index2.htm   Unframed: .../index1.html
P.O. Box 23097, ABQ, NM 87192, USA
FAX (call first (7-day, 24-hr)): (call to schedule)  VOICE ( 9-5 MST): 505-321-1034
TO ORDER: Order Form (MAIL/FAX) or Call in Your Order
Or write down order on paper, add it up + S/H, Mail/Email (PDF or TXT attach) to us.
Check, Money Order, PayPal*, Money Transfer Service (MTS), Trade =>
    *PAYPAL (orders over $150 or foreign order requires our prior, written OK)
      Log onto PAYPAL; Do a PayPal "Send Money" for Item Total + S/H,
      Pay to: wizguru@consumertronics.net, Then Email Us with Order Details

2017 Catalog Webpages now on 1G Flash Drive (only $19.95)
Contact Us:
wizguru


Hardware Sales!
1000+ Items!



...tell your friends!
policies.htm
USA site - No cookies - No spyware - No adware - No trojans - No viruses - No worms - No spam - No pop-ups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

Welcome to Consumertronics.net Internet,online,books,disks,tutorials,services: Frauds,scams,tracking,tracing,security,cookies,countermeasuresWelcome to Consumertronics.net Internet,online,books,disks,tutorials,services: Frauds,scams,tracking,tracing,security,cookies,countermeasures Welcome to Consumertronics.net Internet,online,books,disks,tutorials,services: Frauds,scams,tracking,tracing,security,cookies,countermeasures
We are technical professionals to serve YOUR High-Tech Survival & Security needs.
In business 30+ years. Featured on CBS "60 Minutes," New York Times, Forbes, - many more!

Consumertronics.net Online Catalog Internet Topics
Hi-tech survival, security books, manuals, ebooks (email / CDROM), software, services: Internet frauds, Internet scams, Internet hacks, Internet tracking / tracing security and countermeasures, computer privacy, identity theft, ... !

Major Discounts all for Products on this Website: 15% OFF all Orders over $79, or 10% OFF for all Orders over $49 effective immediately and until changed here! Please order today! (No other types of discounts apply except $2.00 OFF for all online/mail/fax orders). Short of money? We can also accept trades (mostly electronic parts, test equip., computers) =>

NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.

Dropdown Topic Menus Feature all Major Consumertronics Book, Disk Topics/Titles
Compatible with IE + most other Browsers, else for Hotlinked lists => Topics & Titles Directories page
Please Select General Topic (all caps) or Title (from Topic dropdown), then click Go!
(because of overlap in what each Topic covers, please also visit related Topics)






























HARD COPY or EBOOK: You can now choose Hard Copy (Disk, if specified), Ebook-EM (Emailed), Ebook-CD (CDROM), or Ebook-Disk (3.5", some offers) for your Selections (most offers and same prices). For each Ebook you want, add "Ebook" and then "-EM", "-CD" or "-Disk" in its Order Form Selection box, else Hard Copy version (or Disk, if specified) will be shipped.


Our Printed CATALOG : Sorry, our Printed Catalog is no longer available. See top of this page for our CDROM Catalog offer.

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #3:

INTERNET, NETWORKS, WEBPAGES, SECURITY

INTERNET FRAUDS DATABOOK: Internet cons, scams and related frauds now rake in $2+Billion annually! Most are done anonymously and with little fear of prosecution. Find out how and why. Topics include: How to Protect Yourself, Ways to Identify a Swindler, Attitudes and Morality, Why People Swindle, How Swindlers Pick Targets, Advantages of Swindles, Chameleons, Hazards of the Internet, more! words=19.2K. $29. ISBN: 0-934274-62-2

INTERNET TRACKING & TRACING: Scammers, spammers, stalkers, phishers, privacy invaders, infectors, and others hide behind the Internet's anonymity to commit serious offenses. Learn from master hackers the best methods to track ID and communications origins. Topics include: Privacy, Why Some Can't be Traced, Anonymous Servers, Identity, Anonymity, Preventing Wrongdoing, How to Track and Trace, Firewalls, Web Searches, more! And how to protect yourself from being identified! words=17.3K. $29. ISBN: 0-934274-49-5

INTERNET SECURITY: The absolute latest tricks and methods software pirates use on the Net. Topics include: Internet Security, How They Get Pirated Software, Password Defeats, Using IRC & FTP, Defeating Copy Protection, Using Newsgroups & Shell Accounts, How They Avoid Getting Caught, much more! Updated about every few months. Includes examples, countermeasures, and lots of tips! words=29.6K. $29. ISBN: 0-934274-63-0

SOCIAL ENGINEERING: "Social Engineering" is the science of manipulating people to do precisely what you want them to do mostly by means of persuasion - even if it is against their best judgment or interests - with minimal loss, costs and risks to yourself. While the term was originally devised by hackers and phreakers to describe socializing techniques they developed for obtaining vital information from sysops and phone operators, it is as old as time itself, and is the tool of every adept politician, sales person and con man. Even chimps know how to "Social Engineer," while many humans have lost this vital skill over the millennia. Words=12.6K. $29. ISBN: 0-934274-73-8

COOKIE TERMINATOR: When you surf the Net, many website providers are tracking your every move! Browser cookie, history and cache files contain personal data readily accessible to Internet predators, scammers, spammers and snoops. Your financial, medical, political, habits and lifestyle information is exposed to the world! Even your plans! This manual shows you step-by-step how to remove and stop these cookies from destroying your privacy through the Microsoft Internet Explorer, AOL, and Netscape Navigator and Communicator browsers. Words=8.8K. $19. ISBN: 0-934274-64-9

HOW TO DO AOL WEB PAGES: Web pages are the rage because they are powerful forums to present YOUR views and business interests, exchange experiences and data, hot-link to other sites, keep in touch with friends and relatives, show how cool you are, etc. Unfortunately, available info on EXACTLY how to create a web page on AOL by getting AOL to recognize your HTML and graphics files as a bonafide web page is both incomplete and erroneous! Step-by-step details described on how YOU can create your very own web page and upload it to AOL. And techniques on how more than one web page can be generated from the same account. (Not an HTML language, or general Internet or AOL tutorial). words=3.4K. $19.

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #13:
INFAMOUS DIRTY-2-DOZEN Disk Files
High-Tech Security & Survival Topics
(Relevant to Topics herein. For listing of all D-2-D disks => www.consumertronics.net/dirty2doz.htm)

Disks are 3.5" PC Windows format, and each has a (Acrobat) PDF file of about 1 MB in size, consisting of several .TXT, .HTM, et al ASCII Text files appended to each other. The combined compressed PDF file size is about half the total sizes of its ASCII files. We carefully sifted through our gigantic and growing private underground database (much of it NOT on the Net) and found the best files relating to the exciting topics of this webpage. Each PDF file is raw and mostly unedited content (substantial formatting editing is done to much improve readability); therefore there may be some inaccuracies, omissions, duplications. To preserve the rich and colorful expressions of some of the original authors, we mostly left intact those file parts which are crude. Most of this material is controversial (but applicable countermeasures are also usually included), and may require adult maturity. We take no responsibility for anything we publish, including file content. To read these PDF files requires Acrobat Reader 4.x or higher (Adobe Acrobat is standard software not provided by us). Once you’ve loaded a file, you can use the Acrobat Find feature to quickly search for keywords. NOTE: All Sales Final! - No Refunds on all D-2-D PURCHASES.

PRICES: 1 DISK $19, 2 DISKs $34, 3 DISKs $47, EACH ADD'L $13 EACH

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)


Customers, Contributors, Authors:
Relevant Topics, Titles, Chapters to this Webpage

SINGLE WORDS: The adware. The antivirus. The cheats. The consultants. The consulting. The Consumertronics. The Consumertronics.net. The cookies. The countermeasures. The eavesdropping. The ethernet. The frauds. The hackers. The hoaxes. The impersonations. The impersonators. The Internet. The LAN. The misrepresentations. The net. The online. The passwords. The phishing. The privacy. The rip-offs. The scammers. The scams. The spams. The spammers. The spoofs. The spoofed. The spoofing. The spying. The spyware. The trojans. The tutorials. The viruses. The WAN. The web. The wifi. The worms.

A-C: The "ad ware." The "antivirus programs." The "antivirus software." The "AOL webpage designs." The "AOL webpages." The "best scams." The "business frauds." The "business scams." The "computer crime." The "computer crimes." The "computer countermeasures." The "computer data privacy protection." The "computer data protection." The "computer data security." The "computer data survival." The "computer file privacy protection." The "computer file protection." The "computer file security." The "computer file survival." The "computer fraud." The "computer frauds." The "computer hackers." The "computer hacks." The "computer infection." The "computer infections." The "computer privacy protection." The "computer programs." The "computer scam." The "computer scams." The "computer security." The "computer services." The "computer software." The "computer spam." The "computer spamming." The "computer survival." The "computer trojan horses." The "computer virus." The "computer viruses." The "computer vulnerability." The "computer vulnerabilities." The "computer worm." The "computer worms." The "con artists." The "countermeasure devices." The "countermeasure equipment." The "countermeasure hardware." The "countermeasure strategies." The "countermeasure tactics ." The "countermeasure target." The "countermeasure techniques." The "crime fighting." The "criminal countermeasures." The "criminal fraud."

D-G: The "data privacy protection." The "data protection." The "data recovery." The "data rescue." The "data security." The "data survival." The "defrauded IDs." The "defrauded identity." The "defrauded privacy data." The "email addresses." The "email filters." The "fake ID scams."

The "filtering emails." The "financial frauds." The "financial protection." The "financial rip-offs." The "financial scams." The "fraud and abuse." The "fraud countermeasures." The "fraud defenses." The "fraud detection." The "fraud on the internet." The "fraud on the net." The "fraud online." The "fraud on the web." The "frauds on the internet." The "frauds on the net." The "frauds online." The "frauds on the web." The "fraud prevention." The "fraud protection." The "fraud, scam." The "frauds, scams." The "frauds and scams." The "great scams."

H: The "hacker culture." The "hacker files." The "hacker strategies." The "hacker tactics." The "hacker techniques." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services."

The "home network." The "home networks." The "how to prevent harassment." The "how to prevent ID theft." The "how to prevent identity theft." The "how to prevent invasion of privacy." The "how to prevent private data losses." The "how to prevent stalking." The "how to prevent theft." The "how to prevent theft of passwords." The "how to protect." The "how to protect against ID theft." The "how to protect your ID." The "how to protect your identity." The "how to protect your passwords." The "how to protect your privacy." The "how to protect your private data." The "how to prevent internet harassment." The "how to prevent internet ID theft." The "how to prevent internet identity theft." The "how to prevent internet invasion of privacy." The "how to prevent internet private data losses." The "how to prevent internet stalking." The "how to prevent internet theft." The "how to prevent internet theft of passwords." The "how to protect your internet ID." The "how to protect your internet identity." The "how to protect your internet passwords." The "how to protect your internet privacy." The "how to protect your internet private data." The "how to prevent net harassment." The "how to prevent net ID theft." The "how to prevent net identity theft." The "how to prevent net invasion of privacy." The "how to prevent net private data losses." The "how to prevent net stalking." The "how to prevent net theft." The "how to prevent net theft of passwords." The "how to protect your net ID." The "how to protect your net identity." The "how to protect your net passwords." The "how to protect your net privacy." The "how to protect your net private data." The "how to prevent online harassment." The "how to prevent online ID theft." The "how to prevent online identity theft." The "how to prevent online invasion of privacy." The "how to prevent online private data losses." The "how to prevent online stalking." The "how to prevent online theft." The "how to prevent online theft of passwords." The "how to protect your online ID." The "how to protect your online identity." The "how to protect your online passwords." The "how to protect your online privacy." The "how to protect your online private data." The "how to prevent web harassment." The "how to prevent web ID theft." The "how to prevent web identity theft." The "how to prevent web invasion of privacy." The "how to prevent web private data losses." The "how to prevent web stalking." The "how to prevent web theft." The "how to prevent web theft of passwords." The "how to protect your web ID." The "how to protect your web identity." The "how to protect your web passwords." The "how to protect your web privacy." The "how to protect your web private data."

IA-IM: The "ID fraud." The "ID security." The "ID theft." The "ID stolen." The "ID theft and fraud." The "ID theft countermeasures." The "ID theft help." The "ID theft information." The "ID theft on the internet." The "ID theft on the net." The "ID theft online." The "ID theft on the web." The "ID theft prevention." The "ID theft protection." The "ID theft scams." The "ID theft solutions." The "ID theft victims." The "identity fraud." The "identity security." The "identity theft." The "identity stolen." The "identity theft and fraud." The "identity theft countermeasures." The "identity theft help." The "identity theft information." The "identity theft on the internet." The "identity theft on the net." The "identity theft online." The "identity theft on the web." The "identity theft prevention." The "identity theft protection." The "identity theft scams." The "identity theft solutions." The "identity theft victims."

Internet: The "internet casinos." The "internet countermeasures." The "internet credit card fraud." The "internet fraud." The "internet fraud countermeasures." The "internet fraud prevention." The "internet fraud protection." The "internet frauds." The "internet frauds and scams." The "internet gambling." The "internet hacker." The "internet hackers." The "internet hacks." The "internet harassment." The "internet hoaxes." The "internet hoaxes and frauds." The "internet hoaxes and scams." The "internet ID frauds." The "internet identity frauds." The "Internet ID theft." The "internet identity theft." The internet investment frauds." The "internet investment scams." The "internet operations." The "internet phone scams." The "internet products." The "internet privacy." The "internet privacy invasion." The "internet privacy protection." The "internet protect privacy." The "internet scam." The "internet scams." The "internet scams and frauds." The "internet science project." The "internet science projects." The "internet security." The "internet security products." The "internet security solutions." The "internet security systems." The "internet services." The "internet spam." The "internet special projects." The "internet stalking." The "internet strategies." The "internet strategy." The "internet survival." The "internet tactics." The "internet tracing." The "internet tracking." The "internet tracing and tracking." The "internet tracking and tracing." The "internet tutorials." The "internet vulnerabilities." The "internet worms."

IN-M: The "invasion of internet privacy." The "invasion of net privacy." The "invasion of online privacy." The "invasion of web privacy." The "invasion of privacy." The "investment fraud." The "investment frauds." The "investment scams." The "local area network." The "local area networks." The "master hackers." The "modern security."

Net: The "net casinos." The "net countermeasures." The "net credit card fraud." The "net fraud." The "net fraud countermeasures." The "net fraud prevention." The "net fraud protection." The "net frauds." The "net frauds and scams." The "net gambling." The "net hacker." The "net hackers." The "net hacks." The "net harassment." The "net hoaxes." The "net hoaxes and frauds." The "net hoaxes and scams." The "net ID frauds." The "net identity frauds." The "net ID theft." The "net identity theft." The net investment frauds." The "net investment scams." The "net operations." The "net phone scams." The "net privacy." The "net privacy invasion." The "net privacy protection." The "net products." The "net protect privacy." The "net scam." The "net scams." The "net scams and frauds." The "net science project." The "net science projects." The "net security." The "net security products." The "net security solutions." The "net security systems." The "net services." The "net spam." The "net special projects." The "net stalking." The "net strategy." The "net strategies." The "net survival." The "net tactics." The "net tracing." The "net tracking." The "net tracing and tracking." The "net tracking and tracing." The "net tutorials." The "net vulnerabilities." The "net worms."

Online: The "online casinos." The "online countermeasures." The "online credit card fraud." The "online fraud." The "online fraud countermeasures." The "online fraud prevention." The "online fraud protection." The "online frauds." The "online frauds and scams." The "online gambling." The "online hacker." The "online hackers." The "online hacks." The "online harassment." The "online hoaxes." The "online hoaxes and frauds." The "online hoaxes and scams." The "online ID frauds." The "online identity frauds." The "online ID theft." The "online identity theft." The online investment frauds." The "online investment scams." The "online operations." The "online phone scams." The "online privacy." The "online privacy invasion." The "online privacy protection." The "online products." The "online protect privacy." The "online scam." The "online scams." The "online scams and frauds." The "online science project." The "online science projects." The "online security." The "online security products." The "online security solutions." The "online security systems." The "online services." The "online spam." The "online special projects." The "online stalking." The "online strategy." The "online strategies." The "online survival." The "online tactics." The "online tracing." The "online tracking." The "online tracing and tracking." The "online tracking and tracing." The "online tutorials." The "online vulnerabilities." The "online worms."

P-R: The "password protection." The "password theft." The "password theft prevention." The "personal internet security." The "personal net security." The "personal online security." The "personal web security." The "personal privacy security." The "personal security." The "phishing attacks." The "phishing expeditions." The "phishing frauds." The "prevent frauds." The "prevent scams." The "prevent ID theft." The "prevent identity theft." The "preventing identity theft." The "privacy protection." The "privacy security." The "protect against identity theft." The "protect ID." The "protect identity." The "protect internet ID." The "protect internet identity." The "protect internet privacy." The "protect net privacy." The "protect online privacy." The "protect web privacy." The "protect privacy." The "quick money scams." The "reporting computer." The "reporting internet."

S: The "scams and cons." The "scams and frauds." The "scams and hoaxes." The "scams on the internet." The "scams on the net." The "scams online." The "scams on the web." The "scams that work." The "science project." The "science projects." The "security books." The "security fraud." The "security holes." The "security information." The "security manuals." The "security measures." The "security online." The "security plans." The "security problems." The "security products." The "security services." The "security solutions." The "security strategies." The "security systems." The "security tactics." The "security techniques." The "security tutorials." The "social engineer." The "social engineering." The "social engineering strategies." The "social engineering tactics." The "social engineering techniques." The "spammed email." The "special projects." The "spoofed email addresses." The "spoofed webpage." The "spoofed website." The "spoofing email addresses." The "spoofing webpages." The "spoofing websites." The "spy ware." The "stolen ID." The "stolen IDs." The "stolen identity." The "stolen password." The "stolen passwords." The "stolen privacy data." The "surfing the internet." The "surfing the net." The "surfing online." The "surfing the web." The "surviving the internet." The "surviving the net."

T: The "theft of IDs." The "theft of identity." The "theft of passwords." The "theft of privacy data." The "top 10 frauds." The "top 10 scams." The "top ten frauds." The "top ten scams." The "top 10 internet frauds." The "top 10 internet scams." The "top ten internet frauds." The "top ten internet scams." The "top 10 net frauds." The "top 10 net scams." The "top ten net frauds." The "top ten net scams." The "top 10 online frauds." The "top 10 online scams." The "top ten online frauds." The "top ten online scams." The "top 10 web frauds." The "top 10 web scams." The "top ten web frauds." The "top ten web scams." The "trojan horse." The "trojan horses."

U-WE: The "victim of frauds." The "victim of scams." The "victim of theft." The "victim of internet frauds." The "victim of internet scams." The "victim of internet theft." The "victim of net frauds." The "victim of net scams." The "victim of net theft." The "victim of online frauds." The "victim of online scams." The "victim of online theft." The "victim of web frauds." The "victim of web scams." The "victim of web theft." The "victims of frauds." The "victims of scams." The "victims of theft." The "victim of internet frauds." The "victims of internet scams." The "victims of internet theft." The "victims of net frauds." The "victims of net scams." The "victims of net theft." The "victims of online frauds." The "victims of online scams." The "victims of online theft." The "victims of web frauds." The "victims of web scams." The "victims of web theft." The "war driving."

Web: The "web casinos." The "web countermeasures." The "web credit card fraud." The "web fraud." The "web fraud countermeasures." The "web fraud prevention." The "web fraud protection." The "web frauds." The "web frauds and scams." The "web gambling." The "web hacker." The "web hackers." The "web hacks." The "web products." The "web scam." The "web scams." The "web hoaxes." The "web hoaxes and frauds." The "web hoaxes and scams." The "web ID frauds." The "web harassment." The "web identity frauds." The "web ID theft." The "web identity theft." The web investment frauds." The "web investment scams." The "web operations." The "web phone scams." The "web privacy." The "web privacy invasion." The "web privacy protection." The "web protect privacy." The "web products." The "web scam." The "web scams." The "web scams and frauds." The "web science project." The "web science projects." The "web security." The "web security products." The "web security solutions." The "web security systems." The "web services." The "web special projects." The "web stalking." The "web strategy." The "web strategies." The "web survival." The "web tactics." The "web tracing." The "web tracking." The "web tracing and tracking." The "web tracking and tracing." The "web tutorials." The "web vulnerabilities." The "web worms."

WF-Z: The "war driving." The "white collar crimes." The "wide area network." The "wide area networks." The "world wide scams." The "worldwide scams." The "worldwide web." The "world wide web."

HARDWARE & SPECIAL SERVICES (for legal educational and/or entertainment purposes only)! Our exciting books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm. Many of these include comprehensive circuit diagrams and functional descriptions. We designed and built here almost all of these circuits (and many, many more), and sold them as our Off-the-Shelf Hardware and Special Projects. We no longer sell functional hardware that we make. We do sell nonfunctional hardware of what we used to make - mostly electronic (www.consumertronics.net/oshpast.html) strictly as salvage: www.consumertronics.net/salvage.html (LIMITED QUANTITIES REMAINING! - once sold there will be no more! - buy all you need as soon as possible - before they are all forever gone!), and also strictly as very realistically-looking models, mockups, replicas and novelties as SPECIAL PROJECTS: www.consumertronics.net/spaf-spp.html. NOTE: For salvage and SP hardware, while priced very low compared to the original functional versions, we provide no guarantees, support, user manuals, schematics, batteries or refunds (Special Projects also does consulting and research services).
         HARDWARE SALES: We also sell functional hardware which others make as surplus and salvage: For comprehensive list of 10,000s of item types we Sell, Buy and Trade for (including in exchange for our popular books and manuals), see our popular: ABQ-Techzonics - 1,000,000 integrated circuits (ICs) + 1,000,000 other small electronic parts + plus electronic test equipment + many other high-tech electronic and non-electronic Items.
        LONE STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334, www.lonestarconsultinginc.com) makes customized device types much closer than any other company we know of to the popular and exciting functional device types we used to make and sell as Special Projects and Off-the-Shelf Hardware - plus many other device types - plus extensive invention prototyping and invention consulting services - plus they also sell Historical Diagrams for many controversial device types! Their device types are described at ==> LONE STAR CONSULTING, INC. NOTE: We are not LONE STAR CONSULTING, INC. Neither one owns the other, is a subsidiary of the other, or is responsible for the other. Should you wish to do business with Lone Star Consulting, Inc., please contact them DIRECTLY as you would any other business (as with all purchases one makes, you should check out all available sources for items of interest). Furthermore, Lone Star Consulting, Inc. has an excellent free tutorial on mind control and electronic attacks (if you go to it, please return here): FREE MIND CONTROL /ELECTRONIC ATTACK TUTORIAL. As policy, we never recommend or endorse for or against any other company, product or service - even if you find a link for it on our webpages. (Our privacy and other policies are at: www.consumertronics.net/policies.htm).
       OTHER SPECIAL SERVICES: NO AC ADAPTER EQUIPMENT RESCUE: Lost or broken AC Power Adapter to your valuable equipment too hard to replace? We have 100s of AC adapters, and may be able to help: www.consumertronics.net/no-adapter-rescue.htm. INTERNET AUCTION SERVICES: We also offer Net Auction/Sales Services (eBay, Amazon.com, Craigslist, ABQ-Techzonics, etc.) for your stuff that you don't need so much any more but are just too busy to sell yourself: www.consumertronics.net/netauctions.htm. HOME/OFFICE TUTORING SERVICES: We also offer home and office tutoring services (Albuquerque, NM only): www.consumertronics.net/tutorservices.pdf. PROFESSIONAL PERSONAL PROPERTY APPRAISALS: We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/. COMPUTER SERVICING: Need to get your computer or software repaired, installed, modified, upgraded, updated, tuned-up, or lost data retrieved? Computer damaged by or inflicted with viruses, worms, trojan horses, adware/spyware, popups, other malware, and/or spam? Let us computer geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm. LEGAL RESEARCH SERVICES: Need/interested in being educated about civil or criminal legal topics important to you? Let us provide you relatively very low cost legal research. John Williams is an experienced lay litigant (District Court + Appeals Court), lecturer of "pro se" law, and a prolific legal researcher, legal author and legal publisher of legal books (we are not licensed attorneys and we don't offer legal advice, legal opinion or legal claims; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
echzonics.
        OTHER SPECIAL SERVICES: INTERNET AUCTION SERVICES: We also offer Net Auction Services (eBay, iOffer, Yahoo!, etc): www.consumertronics.net/netauctions/.. PROFESSIONAL PERSONAL PROPERTY APPRAISALS: We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/. COMPUTER SERVICING: Need to get your computer or software repaired, installed, modified, upgraded, updated, tuned-up, or lost data retrieved? Computer damaged by or inflicted with viruses, worms, trojan horses, adware/spyware, popups and/or spam? Let us computer geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm. LEGAL RESEARCH SERVICES: Need/interested in being educated about civil or criminal legal topics important to you? Let me provide you relatively very low cost legal research. I am an experienced lay pro se litigant (District Court + Appeals Court), lecturer of pro se law, and a prolific researcher, writer and publisher of legal books (I am not an attorney and I don't offer legal advice; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
        LONE STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334) does much of the incredible and exciting functional hardware we used to make - mostly electronic (plus many other similar items we did not previously make - plus they also sell Historical Diagrams for much of their Hardware types!), described at: www.lonestarconsultinginc.com/devices.htm (not a hotlink). NOTE: We are not LONE STAR CONSULTING, INC. Neither one owns the other, is a subsidiary of the other, or is responsible for the other. Should you wish to do business with them, please contact them DIRECTLY (as with all purchases one makes, you should check out all available sources for the item of interest). As policy, we never recommend or endorse for or against any other company, product or service. (Our privacy and other policies are at: www.consumertronics.net/policies.htm).

WE TRADE, BUY, SELL & MANY THINGS!
Prefer to trade rather than buy our products and services? Have items you no longer need but we do? Short of cash? We are interested in trading and buying (and also selling) numerous electronic parts, electronic test equipment, hardware, modern computer systems, computer peripherals, software, printing / publishing equipment / parts / supplies, books, small parts, scientific equipment, industrial equipment, commercial equipment, et al - too numerous to list here! For details of some of the items we are interested in trading for or buying from you that can eliminate or much reduce your out-of-pocket expenses for, see our items4trade.htm website, CLICK HERE =>
Items for Trade/Items to Buy/Items for Sale


Great Consumertronics Products and Services!

       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
             ON YOUR WEBSITE

Copyright © 1998-2017, Consumertronics. All rights reserved.

NOTE: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Consumertronics webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability or any other responsibility for any non-Consumertronics company, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or by any other means of communications. For more information on our policies, please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1, Source-2, Source-3, Source-4, Source-5, Source-6, Source-7, Source-10, Source-11

Site Map