This is our resources page. Find links to companies, links to terms and links to articles about the landscape when it comes to email and other forms of delivery.
Books will also be listed which closely talk about the landscape in some way as it relates to today. There are other books which may be true stories of crimes and punishments, but things change, and those books may be listed if it fits. For example, we could list a book talking about check cashing and crimes of that nature, but while that might have changed from the time of the book, it gives a history.
It may be best to read the description of the book to determine if it is something you want to read. Just because we decide to list a book and it is older doesn't make it less relevant than something newer that talks about what is happening today.
As discussed on these pages, actors tend to utalize email as one of the main methods of delivery, although they could come in through SMS, social media or voice calls.
If there is a term, book, or blog post that you'd like added that isn't in the terms list, books list, company and resource table, or blog post listings, please send an email to the JRN and let us know. We'll see what we can do!
These are terms that you might see. Some terms might not be directly related to email, however, they are here because its part of the industry that exists today and may affect you. As we've said, actors can use many different tactics, so the terms may be of value when it comes to protecting yourself. All links, unless specified after the link, are going to be linked from Wikipedia. Keep in mind that articles from Wikipedia might need revision and we're not responsible for these links and the fact they say they need revision or correction in some way.
There is also another larger list of terms that you might be interested in. Thanks to the folks at knowb4 and the rooms I had been in on clubhouse, they were doing this and talking about some of the terms within the list. Its a great resource. Maybe you'll find something you didn't know that will help you!
That completes the set of terms.
Books of interest
The books in this section were read, are currently being read, or are in our future reading list. While there are books that we thought of that could be listed, some may not qualify as part of today's landscape coverage. The JRN does not get paid for this list, it is only recommended.
All links are to Amazon and its associated properties whether Kindle, Audible or hardcopy book. You can change the type of book you want from the page if it allows you to do so. If you're disabled, note that not all books will be on sites designed for us such as the NLS, Bookshare or any others that are not listed here.
While Jared Rimer has read, plans to read, or is currently reading these books, the books here are not in any particular order and it doesn't matter the order read. The JRN is not being paid to list these books, we found them valuable and hope you'll give them a look. We hope you enjoy the list, and comment through the podcast on what you think.
Some of the books listed may contain adult content such as strong language or other themes. Reader's discretion is advised.
The book listings
- Mark Russinovich
- Scott Schober
- Kim Zetter
- Mikko Hyponnen
- Kai Roer and Perry Carpenter
- Robert Kerbeck
- Renee Dudley and Daniel Golden
- Andy Greenberg
- Christopher Hadnagy, Michele Fincher and Robin Dreeke
- Adam Levin
- Kevin Mitnick, Steve Wozniak and William L. Simon
- Kevin Mitnick and Mikko Hypponnen
- Dave Eggers
- Frank Abagnale
- Marsha Bertrand
- Daniel J. Solove
- Paul Larosa and Maria Cramer
- Phil Lapsley
- Ron Smith
- Mitchell Zuckoff
- Matthew Danda
- Leigh Baker
- John E Douglas and Stephen Singular
- Ian Leaf and Ian Andrews
- John Gower III
- Scott J. Shapiro
- Laurent Richard, Sandrine Rigaud and Rachel Maddow
- Glenn Greenwald
- Geoff White
- Brian Krebs
- Nick Bilton
- Jamie Bartlett
- Paul Wilson with Christopher Hadnagy and A. T. Chandler
- Noah Zhang and Gary Westphalen
- Marc Goodman and Robertson Dean
- Jeff Horwitz
- Christopher Hadnagy
- Ben McKenzie and Jacob Silverman
- Jeff White
- Maxie Reynolds
- Nicole Perlroth
- Matt Potter
- Kevin Poulsen
- Joseph Menn
- Bruce Sterling
- David E. Sanger
- Parmy Olson
- Michelle Slatalla and Joshua Quittner
- Thomas Rid
- Bruce Schneier
- Bruce Schneier and Ken Maxon
- Bobby Hundreds
- Ted Koppel
- Cris Thomas
- Roger A. Grimes
- Kashmir Hill
This completes the list of books here on EMHS. If you find a book of interest, please contact the JRN through links available on the web site and make sure to send the title, author and link if possible.
Companies and services of interest
There are companies that can assist making sure we're as secure as possible. Some are Antivirus companies, some are teaching companies, while others may be services. If there is something in this section you found of value that is not listed, please contact the JRN and let us know by sending a link. If you're a company, please get in touch so we can put your link in this table. Thanks very much!
Disclaimer! The JRN makes no endorsements of any products from the following table. They're all resources and you need to use what works best for you. The JRN knows that all software and services listed here are safe, but does not know about accessibility of products unless used by the network. Please contact the company directly for issues!
The companies and services of interest table
Companies and services of interest
| Company or service name
|| Description of company or service
| Phish Labs by Help Systems
|| Phishlabs was started after a security engineer turned product engineer found that he could take Phishing sites down, but they came back up shortly after. Phishlabs runs a blog that talks about the landscape as well as protecting large companies and their brands from impersonation attacks as well as other attacks they might face. They may reach out to other companies if they detect something that needs taken down. The heading on the home page says it all. It says: "Digital Risk Protection through curated threat intelligence and complete mitigation." They are now part of Fortra. More info on Fortra on their web site. |
| Virus Total
|| Virus Total is a service where you can send files and URL's for analysis. The site will return any negative results, telling you what might be a problem so you can be informed what you receive. For best results if using screen readers, the JRN recommends you use Chrome. |
| Trend Micro
|| Trend Micro is one of the leading antivirus companies. They've been in business for at least 30 years if not longer. They've got products for home, business and more. They even have a free product called house call which works with the main hard drive to find problems. |
|| F-Secure is one of the leading antivirus products that has also been around for at least 30 years. While the JRN has no experience with this suite of products, they have a lot going for them. One of their employees has worked for them before they became F-Secure and has recently written a book. |
| Malware Bytes
|| Malwarebytes is one of the most accessible pieces of software out there to protect you from malware and ransomware. The price is pretty reasonable and it seems to do a great job. They've been around for quite a number of years, and is recommended in the blind community. Their slogan on the home page in heading says: "CYBERSECURITY.
FOR EVERY ONE." |
| Know Before: Security Awareness training
|| Know before (knowbe4) is a company out there providing training on the different aspects of security including phishing. They've had clubhouse rooms that I enjoyed where we talked security and scams of interest. Please check them out, as some things may be free to get. |
| Have I Been Pwned (poned)
|| Have I been Pwned (poned) is a web site started by Troy Hunt that allows people like you and I to check our email addresses and phone numbers against known breaches. This information will not include your information, but can link you to known breaches that may include the info you supplied to the site. Links include a domain search, web sites that have been pwned, a password search and other informational things like largest breaches as well as recently added breaches. Stay in the know with Have I Been Pwned! |
| Expand Shortened URL's
|| This service allows you to expand shortened links from all kinds of services like goo.gl, is.gd, bit.ly and others. It will show you where the final destination of a link goes to. It will not tell you whether it is safe, although it does have Google Safe Browsing alerts available to you. Use this in conjunction with Virus Total to determine if a link is safe. If you trust where the URL is pointing to alone, great! If you still have questions, use Virus Total's URL checker. We've seen expand url say that it is safe according to google safe browsing, but 2 products from Virus Total may say it is malicious or spam. A link to Virus Total is in this list and is highly recommended. |
| Abuse IP database ,/td>
|| Abuse IP database is ran as a repository to keep the Internet safe. You can check domains or IP address to see if they're used for spam or malicious activity. I've used this when getting tons of spam through my contact forms to determine if it is a network that I can block. There may be false positives, so blocking a whole subnet may not be practical, but if you see many spam messages using forms or other commenting systems, you might not have much of a choice. They provide an API for automating these things. Check out the site to see if it might be of use to you. An account is free. They do have payment options available to you. |
| Express VPN
|| Express VPN is one of the leaders in VPN software. Accessible both in Windows and IOS, it protects you from your ISP knowing everything about you, and you can change your location based on your needs. No judging. They do not log anything you do, protecting you from spying. One tap of a connect button, and you're on. Your connection is in ram, not on some hard drive. Disconnect from the VPN and your connection is gone. Learn more and take it for a trial today. |
| Nord VPN
|| Like Express, Nord does not track hyou. They may have more features available to you, and it may work similarly to Express. While the JRN has not used it, one tester recently told us the IOS app is mostly accessible, with the tab buttons on the bottom of the screen just saying tab. Double tapping on them does change the screen and you can do things with it. Give it a look, today. |
This completes the list of companies and resources. Found something that works for you that isn't listed here? Contact the JRN and send a link!
These are blog posts of articles talking about the landscape that might affect email and other aspects of delivery of the things we receive as malware. If a link becomes broken, please let us know and it'll be removed. Note not all articles may follow this practice, but the info will affect you in some way.
The blog posts
- 55% of Americans have been scammed – Keep yourself safe online and offline komando.com: September 21, 2023
- WormGPT Is ChatGPT for Scammers, and It’s Seriously Dangerous tech.co: July 18, 2023
- Stop! This mistake is loading your device with adware and trackers! komando.com: June 9, 2023
- ChatGPT apps: The good, the bad and the scammy komando.com: May 21, 2023
- New password rules to secure your accounts komando.com: March 12, 2023
- How to remove yourself from the internet in 2023 Apple Insider: May 12, 2023
- Apple co-founder says AI may make scams harder to spot The BBC News: May 8, 2023
- 80% of our fraud scams come from Meta’s platforms, leading UK bank warns The Next Web: May 5, 2023
- Banks warn of big increase in online scams The BBC: May 5, 2023
- Beware the AI Scams: Meta Blocks 1,000+ Links Tied to ChatGPT-Themed Malware PC Magazine: May 3, 2023
- Beware of this easy-to-fall-for Gmail scam Phone Arena: April 28, 2023
- You need to delete yet another 38 Android apps before they load up your phone with malware Phone Arena: April 28, 2023
- Scammers target older people online. Here are the 3 warning signs to watch for ZD Net: April 18, 2023
- NSO Group returns with triple iOS 15/16 zero-click spyware attack Computerworld: April 18, 2023
- PSA: AI voice cloning and call spoofing create scary convincing scams, here’s how to protect yourself 9to5 Mac: April 17, 2023
- Get this Chinese app out of your smartphone right now komando.com: April 10, 2023
- Warning: Popular e-file tax site caught spreading malware for weeks komando.com: April 5, 2023
- Use Windows? The screenshot tool contains a dangerous flaw – Update now komando.com: March 27, 2023
- Kiwibank counting customers whose ID data was stolen in massive Latitude privacy breach stuff.co.nz: March 27, 2023
- Don’t fall for this Google scam about a compromised account komando.com: March 24, 2023
- As voice-cloning becomes easier, take this one step with your family members to stay safe komando.com: March 22, 2023
- Move, Patch, Get Out the Way: 2022 Zero-Day Exploitation Continues at an Elevated Pace Mandiant.com: March 20, 2023
- Use an iPhone or Mac? Don’t fall for this iCloud email promising free storage komando.com: March 21, 2023
- ChatGPT May Have Exposed Email Addresses of Other Users PC Magazine: March 20, 2023
- Are facial recognition cams like the ones in China coming to a store near you? komando.com: March 20, 2023
- Is TikTok banned? Everything you need to know to protect yourself komando.com: March 20, 2023
- Next time a storm is looming, keep an eye out for imposters pretending to help you komando.com: March 18, 2023
- New password rules to secure your accounts komando.com: March 18, 2023
- This Twitter scam is a smart way to steal bank passwords – Don’t fall for it komando.com: March 13, 2023
- ne companies to block scam text messages
First robotex Ars Technica: March 16, 2023
- Check fraud is skyrocketing – How to protect yourself komando.com: March 15, 2023
- 9 million AT&T customer accounts breached – Is your data included? komando.com: March 13, 2023
- Nasty malware can steal login credentials for 400 banks komando.com: March 13, 2023
- Warning: Don’t fall for these tax scams making the rounds komando.com: March 11, 2023
- The FBI just put out a warning – Do you play these games on your phone? komando.com: March 11, 2023
- Go ahead and unplug this door device before reading. You’ll thank us later. Ars Technica: March 9, 2023
- Best free Windows and Mac security downloads for your computer komando.com: March 8, 2023
- Scammers are using your TV against you to get you to pay up komando.com: March 8, 2023
- Keep an eye out – Malware-infected Word docs spreading komando.com: March 7, 2023
- More fake ChatGPT malware spreading – Don’t download this komando.com: March 6, 2023
- Watch out for the 9 most creative scams from Kim’s inbox — they’re scarily deceptive komando.com: March 5, 2023
- Here are the 5 social media companies tracking you the most komando.com: March 4, 2023
- This nasty TikTok scam goes after grieving families komando.com: March 4, 2023
- Ignore this Facebook scam trying to get you to buy a ‘cheap phone’ komando.com: February 28, 2023
- 3 nasty new phone scams to watch for komando.com: February 27, 2023
- Don’t download one of these scammy apps pretending to be an authenticator komando.com: February 25, 2023
- 6 ways to stop digital stalkers from harassing you in 2023 komando.com: February 24, 2023
- Security warning: How to spot fake ChatGPT apps hiding malware komando.com: February 23, 2023
- Latest shopping scam: Using ‘Shark Tank’ to trick you into thinking something is legit komando.com: February 22, 2023
- Mac & Windows owners have to contend with different kinds of malware Apple Insider: February 22, 2023
- This tricky ransomware uses your insurance company against you komando.com: February 21, 2023
- Looking for free COVID tests? Don’t do this komando.com: February 20, 2023
- Crypto Buyers Beware: 1 in 4 New Tokens of Any Value Is a Scam wired.com: February 16, 2023
- More than Half of All Phishing Sites Impersonate Financials in Q4 Phishlabs/Fortra: February 16, 2023
- This tricky email scam can fool just about anyone komando.com: February 15, 2023
- Signs your new boyfriend or girlfriend is not who they say they are komando.com: February 14, 2023
- Listen to these fake Medicare calls defrauding older Americans komando.com: February 13, 2023
- This scary malware screenshots your system to see if you’re worth hacking komando.com: February 13, 2023
- NameCheap's email hacked to send Metamask, DHL phishing emails Bleeping Computer: February 12, 2023
- This Amazon phishing scheme is stealing passwords komando.com: February 10, 2023
- Crooks are jamming security cameras — Protect yours now! komando.com: February 13, 2023
- Stalking has never been easier so let’s change that BVS Systems: February 8, 2023
- Valentine’s Day scams: How to spot 4 sneaky tricks (that fool lots of people) komando.com: February 8, 2023
- Don’t fall for this Facebook scam that steals your password komando.com: February 6, 2023
- Until further notice, think twice before using Google to download software Ars Technica: February 3, 2023
Ever run a background check? 20 mil Truth Finder and Instant Checkmate accounts leaked komando.com: February 6, 2023
- Find out who’s calling you from an unknown or blocked number komando.com: February 3, 2023
- 10 tech company customer service phone numbers plus a secret way to know wait times komando.com: February 3, 2023
- Security camera warning: This brand is missing a key privacy feature komando.com: February 1, 2023
- Can you spot the giveaway in this scam email? komando.com: January 31, 2023
- Security warning: Watch out for Social Security scammers komando.com: January 30, 2023
- Don’t use these shady health tracker apps with 10 mil downloads komando.com: January 30, 2023
- Username mistakes you’re making that put you at risk online komando.com: January 30, 2023
- Tax season: Scams to watch for so you don’t get taken komando.com: January 28, 2023
- 3 signs an Instagram, Facebook or Twitter account is fake komando.com: January 28, 2023
- Criminals are going after password manager logins – What to watch out for komando.com: January 27, 2023
- Smishing is spreading – How to spot it komando.com: January 27, 2023
- Protect your privacy, your cell phone number and email address komando.com: January 24, 2023
- Are you a victim of screen hacking? Here’s how this cyberattack works komando.com: January 20, 2023
- That security email from Instagram is real – Here’s how to tell komando.com: January 18, 2023
- Norton customer breach: Were your passwords stolen? komando.com: January 17, 2023
- Signs your phone or computer is infected with a keylogger komando.com: January 14, 2023
- This copycat Zoom download is hiding malware komando.com: January 13, 2023
- WebMD for Gen Z: Kids diagnosing mental health disorders online komando.com: January 12, 2023
- Online banking checkup: 3 must-do steps to protect your login komando.com: January 10, 2023
- New antivirus scam email spreading — Don’t click! komando.com: January 9, 2023
- Want to shed some pounds? Don’t fall for these weight loss scams komando.com: January 9, 2023
- Work in one of these 10 industries? Scammers are targeting you komando.com: January 9, 2023
- This phone scam fooled someone out of thousands of dollars komando.com: January 6, 2023
- What is a DMARC Policy?: The 3 Types & Which to Use The Phishlabs Blog: January 4, 2023
- Taking surveys to earn money? Don’t fall for scams out to get your info komando.com: January 4, 2023
- Looking for something to watch? This mistake puts your computer at risk komando.com: January 3, 2023
- Delete this productivity app NOW komando.com: January 3, 2023
- Watch out for QR code scams being sent through email komando.com: December 30, 2022
- This tricky scam campaign goes after those who lost money in crypto komando.com: December 28, 2022
- Major password manager hacked – What you need to know komando.com: December 27, 2022
- Essential privacy and security steps if you unwrapped a tech gift this year komando.com: December 24, 2022
- Be careful what you click — Scammers are hiding malware in ads komando.com: December 24, 2022
- Watch out: Fake coupons spreading on social media komando.com: December 22, 2022
- Gambling platform DraftKings breached – Do this if you have an account komando.com: December 22, 2022
- Turn on this smart security setting to protect your phone backups from hackers komando.com: December 19, 2022
- 5 texts you must ignore this holiday season komando.com: December 17, 2022
- Here’s why people are receiving empty packages in the mail (Yes, it’s a scam) komando.com: December 16, 2022
- Finishing your holiday shopping? Don’t fall for this fake seller scam komando.com: December 15, 2022
- Have an older iPhone? Install this update now to block hackers komando.com: December 14, 2022
- How to Recognize and Respond to Emerging Social Media Cybersecurity Threats Phishlabs: December 13, 2022
- Malware is hidden in these fake apps that impersonate the real versions komando.com: December 12, 2022
- Before you download, check that file! These are the file types hackers love most komando.com: December 10, 2022
- Missed a Christmas delivery? That email might be a scam komando.com: December 9, 2022
- New Ransom Payment Schemes Target Executives, Telemedicine krebsonsecurity.com: December 8, 2022
- Holiday Season Triggers Rise in Counterfeit Activity The Phishlabs Blog: December 8, 2022
- Don’t fall for this new Facebook giveaway scam komando.com: December 5, 2022
- Update Chrome now! Another zero-day flaw has been found komando.com: December 5, 2022
- This app that promises you money for watching videos is a scam komando.com: December 5, 2022
- Watch out for this triple-pronged PayPal phishing and fraud scam zdnet.com: December 2, 2022
- Getting texts that just say ‘hi’? You’re not alone komando.com: December 2, 2022
- Received a Dropbox link via email? Read this before you click komando.com: November 30, 2022
- Have a Twitter account? Your personal info might be included in this leak komando.com: November 29, 2022
- Top 3 holiday scams you and your loved ones need to know about komando.com: November 26, 2022
- If you get an email with this phone number, don’t call! It’s a money-stealing scam komando.com: November 25, 2022
- How to Identify Phishing & Spoofed Emails The Freshbooks Blog: Accessed November 23, 2022 (article date unknown)
- Nearly HALF of Mac malware comes from this program komando.com: November 21, 2022
- More password-stealing apps spotted – Check your phone komando.com: November 21, 2022
- Why you keep getting fake emails from Dick’s, Delta and Costco komando.com: November 19, 2022
- Emails Reported as Malicious Reach Four-Quarter High in Q3 The Phishlabs Blog: November 17, 2022
- Don’t visit the site in this post, Google and Chrome have warnings and tools can verify this too The Technology blog and podcast: November 17, 2022
- Holiday shopping scams are here – 8 ways to stay safe komando.com: November 16, 2022
- If you see one of these area codes don’t answer — It’s probably a scam komando.com: november 12, 2022
- Financials See Increase in Phishing Attacks, Compromised Sites Lead Staging Methods in Q3 The Phishlabs Blog: November 10, 2022
- Amid Twitter changes, the scams have begun – Don’t fall for this one komando.com: November 5, 2022
- LinkedIn Adds Verified Emails, Profile Creation Dates Krebs on Security: November 4, 2022
- Warn the students in your family: Data leak + student loan scam komando.com: November 3, 2022
- 5 social media dos and don’ts to protect your privacy and security komando.com: November 2, 2022
- New Report: 2022 Psychology of Passwords The Lastpass Blog: November 1, 2022
- Scammers love LinkedIn – Here’s a new step to keep yourself safe on the job site komando.com: October 28, 2022
- The top 10 most impersonated brands online – Read this to steer clear of phishing komando.com October 26, 2022
- Here we go with the geek squad scams again The Technology blog and podcast: October 18, 2022
- Watch out for this scam going after Facebook accounts komando.com: October 17, 2022
- RedLine Stealer Leads Payloads in Q3 Phishlabs: October 13, 2022
- What is Email Spoofing? Phishlabs: October 6, 2022
- Use this easy, free check to see if a site or file contains malware komando.com: October 5, 2022
- More Scare tactics? This doesn’t work for me, I already know about this The Technology blog: September 30, 2022
- I Knew It! The Best Email ever we talked about in podcast 102? It was definitely a scam The Technology blog and podcast: September 7, 2022
- Old Threats, New High: Response-Based Emails Increase in Q2 Phishlabs: August 25, 2022
- Fraud, Impersonation Fuel Q2 Increase in Social Media Attacks Phishlabs: August 18, 2022
- New Report Documents Highest Volume of Response-Based Email Threats Since 2020 Phishlabs: August 15, 2022
- Top 10 Ways To Recognize a Phishing Email Phishlabs: August 11, 2022
- The "I’s" Have It: How BEC Scammers Validate New Targets with Blank Emails Phishlabs: August 4, 2022
- 10,000 organisations targeted by phishing attack that bypasses multi-factor authentication Phishlabs: July 21, 2022
- Emotet Tops Payload Attack Volume in Q2 Phishlabs: July 14, 2022
- This is very funny, the geek squad sending me an email of a charge that doesn’t exist? The Technology blog and podcast: June 30, 2022
- Smishing is spreading – How to spot it komando.com: February 10, 2022
- 5 clues that your email has been hacked komando.com: January 29, 2022 ;li>
- I call Spam on this one: telling someone to email to a domain that doesn’t exist among other things The Technology blog: January 18, 2022
- Here’s something I’ve never seen, selling email addresses in bulk? The Technology blog and podcast: August 3, 2021
- Perpetrating vaccine hysteria to get people to click The Technology blog: May 5, 2021
- Be on the lookout, forms now leading to trust web sites for fake web sites The Technology blog: February 15, 2021
- White Cane Travel expiring tomorrow? Nobody called me to tell me about it! The Technology blog: January 22, 2021
- Just saw the best email ever … in my inbox … domain is relatively new The Technology Blog and Podcast: November 6, 2020
- I just love these fake emails The Technology Blog and podcast: June 3, 2019
That completes all of the blog posts. Note that you should check this list often, as we may add things to the list that hasn't been read, and we run this particular list in date order. Send articles to the JRN if you found it of value.
That's all the resources for now, please come back to see if there are any more, and please suggest things we're missing.
Please choose from one of the following links to continue learning and exploring, and thanks so much for stopping by! If you're already on a page, I.E. the Home Page, selecting that link will take you to the same page. The list of links are across the entire web site.
I've separated links from within the website from other outside links which will take you to other pages on the Internet, away from EMHS itself.
Web site links
Other links outside of the domain
These links are outside of EMHS itself.
Podcasts and sources we use
The following are podcasts and resources we use for topics or other informational things we talk about during the show.
If you are not at the home page, please go back there using this link.
Donating to the project
If you found this site of value and wish to donate, Please go to the Jared Rimer Network donations page. We appreciate your support in this project, and thank anyone who donates. Its not a requirement, but appreciated.
The Jared Rimer Network supports direct credit card and bank transfers through Freshbooks and we also take credit cards and other forms of payment through our Paypal partnership with a button. It supports direct paypal payments, as well as non-paypal members. If you are a non-member and wish not to sign up, just switch off the create account option through the checkout process. Thanks again for your support!
Copyright notice and disclaimer information
Copyright 2022 - 2023
by The Jared Rimer Network. All rights reserved. The site was written with experience in mind, and links to external sources are outside of the Jared Rimer Network's responsibility. Please read more about these sources below.
Please do not call for solicitations such as web development, social media services or the like. The Jared Rimer Network built this site as an educational resource which constantly gets updated based on what we read. It is not appropriate for this to be outsourced. Thank you!
If there is a broken link, please contact the Jared Rimer Network through this contact web page and it'll be taken care of. Make sure you tell the Jared Rimer Network where the link is, as the network runs many different pages. There is no email contact on this site.
Links to third parties
Links to third parties are not the responsibility of the Jared Rimer Network. If the link breaks, please let us know, and if you have a new link to the same source that was broken, please let us know. A contact link is given to the JRN's contact form above.
The books linked within the resources page are recommended reading based on opinion of the JRN reading the book. The JRN does not get paid for the recommendation of the books listed. The JRN enjoyed the book and found it valuable. If there are books within this section that should be listed, please send a note with the title and author and it'll be investigated. All books are linked via Amazon as a convenience, but they may be listed elsewhere including Apple and other book distributers.
By law, we are not allowed to link to BARD, it may have the books listed, but you'll need to do your own search to see what is available and what you're interested in based on the book titles listed herein. Bard is ran by the Library of Congress, United States (U.S.) and all rights are reserved. Only patrons of the U.S. or living abroad and a U.S. citizen may access Bard.
The opinions in the podcasts linked are those of the show hosts, and may not represent any company in which the show hosts may represent.
We do the podcast to get information out, and it may contain errors. If there are any, please let us know what we said wrong, and what it is supposed to be corrected to. This is called "correcting the record" and the best make these mistakes and have to do it. We're not ashamed to say we don't know.