Beginning March 2nd, 2020 the Mailing Lists functionality on RootsWeb will be discontinued. Users will no longer be able to send outgoing emails or accept incoming emails. Additionally, administration tools will no longer be available to list administrators and mailing lists will be put into an archival state.
Administrators may save the emails in their list prior to March 2nd. After that, mailing list archives will remain available and searchable on RootsWeb
This is a Message Board Post that is gatewayed to this mailing list.
Classification: Query
Message Board URL:
http://boards.ancestry.com/mbexec/msg/rw/BVJ.2ACIB/1115.1.2
Message Board Post:
There are a family of Seawright who are Coker's from Alabama.
My grandfather's name was Comer Jesse Coker,Jr. and there is also a Comer Jesse (Buddy) Coker. I think they are brothers. One of them is my grandfather who fathered 10 children by my grandmother Cora Seawright (not sure of spelling).
Comer Jesse's mother's name was Eliza Barganier. Her husband was Comer Jesse Coker, Sr.
They lived in Mount Willing, Alabama (Lowndes County)which is where the plantation is located that my mother and her siblings grew up on. Unsure as to where the Seawright name came from more and likely it is a slave name. Some spell it Seeright or Searight and we have been told it could also be CWright. I do believe Comer Jesse Coker, Sr. father's name was Comer Jackson Coker. Or John Jackson Coker.
I hope this information will help to further your search.
Please let me know if you find this to be helpful and if you have any info you can pass on to me.
Thank You.
SPruitt
This is a Message Board Post that is gatewayed to this mailing list.
Classification: Query
Message Board URL:
http://boards.ancestry.com/mbexec/msg/rw/BVJ.2ACIB/1194
Message Board Post:
If any one needs a look up done about Navarro County Texas Cemetery Records I have Volume III and V. I will be more than happy to look up what I can.I hopefully will be getting the other volumes soon.I had also listed my web site address here before and it was updated today so feel free to post on the guest book if you like. You can email me thru the site with any questions.Web addy is http://joanna-coker.itgo.com
Thanks
This is a Message Board Post that is gatewayed to this mailing list.
Classification: Query
Message Board URL:
http://boards.ancestry.com/mbexec/msg/an/BVJ.2ACIB/918.3.1.1
Message Board Post:
Napoleon Coker 's daughter AnnaBell married myggrandfather albert kaderli
This is a Message Board Post that is gatewayed to this mailing list.
Classification: Query
Message Board URL:
http://boards.ancestry.com/mbexec/msg/an/BVJ.2ACIB/1193
Message Board Post:
Ezekiel Shelton Davis and Harriet Elizabeth Coker were my husband's great-great-grandparents. Ezekiel b. 1838, Wayne Co., KY, d. 11/4/1892, Marion Co., AK. Harriet, b. 8/22/1841, AK, d. 4/15/1880, ?. His great-grandparents were Albert A. Davis and Sarah Trimble. Do you have names of children of Ezekiel and Harrriet? Any information greatly appreciated.
Bill wrote:
"If you are running Windows, consider changing to
> Linux, it will run on your computer and it is pretty safe. I have been
> using a Mac since the web first opened to civilian traffic. I have
> never had any virus, worm or any other so called infection."
Amen to that!
I own both and in one day a couple of weeks ago, I had 5 viruses sent to my
PC laptop. Norton security caught them but I knew there will come a day
when I'd be one of the first to get a new virus before Norton gets a fix in
place.
The next day, I went out and bought a Mac laptop. I'll never use the PC to go
on line with again, although I'll still use it to run certain software not available
for the Mac.
>
> From: Bill Horn <riverat(a)mac.com>
> Date: Fri May 7, 5:32 PM
> To: COKER-L(a)rootsweb.com
> Subject: [Coker]
>
> I don't wish to offend anyone, only to add another way to avoid worms
> and virii. Next time you replace your Windows computer, consider
> buying one that does not run Windows, such as a Macintosh or a Windows
> box that uses Linux. If you are running Windows, consider changing to
> Linux, it will run on your computer and it is pretty safe. I have been
> using a Mac since the web first opened to civilian traffic. I have
> never had any virus, worm or any other so called infection. I am not
> trying to get anyone to argue with me about Mac's or Dell's or anything
> like that, just know there is a safe computing platform available. The
> reason is: Mac's do not run .exe's (executibles). Think about it.
>
> Bill
>
>
> ==== COKER Mailing List ====
> Subscription management instructions are posted at http://
lists.rootsweb.com/index/surname/c/coker.html
>
> ==============================
> Gain access to over two billion names including the new Immigration
> Collection with an Ancestry.com free trial. Click to learn more.
> http://www.ancestry.com/rd/redir.asp?targetid=4930&sourceid=1237
>
>
I don't wish to offend anyone, only to add another way to avoid worms
and virii. Next time you replace your Windows computer, consider
buying one that does not run Windows, such as a Macintosh or a Windows
box that uses Linux. If you are running Windows, consider changing to
Linux, it will run on your computer and it is pretty safe. I have been
using a Mac since the web first opened to civilian traffic. I have
never had any virus, worm or any other so called infection. I am not
trying to get anyone to argue with me about Mac's or Dell's or anything
like that, just know there is a safe computing platform available. The
reason is: Mac's do not run .exe's (executibles). Think about it.
Bill
I hope what you are saying is that your Antivirus program detects and
deletes virus infected emails. Not that your computer actually gets
infected.
If that is the case, then you are protected and everything is working right.
The Antivirus program is scanning all incoming email, detecting malicious
code and deleting it. That is how it should work. But, If your computer is
getting infected, then either the Antivirus or Firewall program isn't
configured for the level of security you need, or it doesn't do the job you
need done.
Why do you get infected emails?
Typically, when a computer gets infected, the malicious code reproduces
itself and uses the infected computer's email program to spread the
infection. It can do this, often without the owner noticing, by sending
infected email to every email address in the computer's address book. Or to
every address in every email stored on that computer. Or to every address
in every incoming email the computer receives. Or all of the above. It can
also forge the FROM header information so that the recipient may not know
the true source of the infected message.
So, if an infected computer has your address in an address book, or a stored
email, or an incoming email, then that infected computer may send an
infected email to you. It may do this every time a new incoming email from
you is received. If one computer in an email group list is infected, it may
send infected emails to each person who sends a message to the group list,
every time they send an email to the group. Or, it could send infected
email to every person who has ever sent a message to the group, if the
infected computer has stored all the group email for a long time.
Sending, or forwarding, chain emails is another sure way to get your email
address into thousands of computers. Chain email increases the likelihood
of getting both spam and infected emails.
If you send messages to multiple email groups with hundreds of subscribers,
it is highly probable that some of those subscribers will have infected
computers that will send infected replies. One way to minimize this is to
have a BLANK REPLY-TO address in your outgoing email.
This technique only helps reduce the volume of infected emails. It won't
eliminate them completely. And, it only works when the group list
administrator has the Forum configured to insert the group address into
emails with blank reply-to lines. This technique works with simple
infections that use Reply-To addresses. It won't stop code that picks out
the true From address buried in the email header.
I have the Forums I manage configured to insert the Forum address when the
Reply-To is blank. If an email sent to the Forum has a Reply-To address,
then replies go to that address by default. If the Reply-To address is
blank, then the mailing list gateway inserts the Forum email address as the
Reply-To address. The gateway scans incoming emails and rejects
attachments. So, the group members have a level of protection when the
replies are routed through the gateway rather than directly back to
individuals. It has the downside of people sending "chat" responses to the
entire mailing list rather than directly. But, everything is a trade-off.
Having a blank Reply-To line doesn't cause problems. By default, email
programs send responses to the Reply-To address. If it is blank, then
responses are sent to the FROM address.
Steve Coker
PS Antivirus programs I've used have the ability to log detections and
actions. You could use a log to find out what the program has detected and
done. But it isn't worth worrying about as long as the infected emails are
always deleted and never executed.
-----Original Message-----
From: Margaret B. MILLER [mailto:maltt@juno.com]
Sent: Monday, May 03, 2004 10:32 PM
To: SCROOTS-L(a)rootsweb.com
Subject: Re: [SC] Safe Computing Guidelines
Steve, I read your suggestions with care. I do the things you suggest such
as using a firewall, anti-virus, updating daily, scanning for potential
viruses on a daily basis. Please tell me how these viruses get into my
computer when everything is scanned, both coming in and going out. With the
scan, they get deleted so I don't know what they are. What is upsetting is
that I have them at all. Thanks. Margaret Miller
BASIC SAFE COMPUTING GUIDELINES
by Steve Coker, Forum Manager
May 2004
1. ALWAYS USE A FIREWALL. Last year I ignored this rule for 10-20 minutes
and it burned me. I was setting up a new computer and didn't install the
Firewall before connecting to the Internet to download program updates. In
the short time I was online without Firewall protection, two malicious worm
programs got into my computer. I had to wipe the computer clean and
reinstall everything. NEVER NEVER NEVER connect to the internet without a
Firewall. I recommend ZoneAlarm (http://www.zonelabs.com/). Configure it
for High security. You can learn how to customize program and privacy
settings if high security blocks certain programs or web sites you need to
use. Your online safety is worth the minor hassle of figuring out how to
"tweak" the Firewall settings. REGULARLY UPDATE FIREWALL SOFTWARE. Open
ZoneAlarm, click on the OVERVIEW menu, then click on the PREFERENCES tab.
Make sure that AUTOMATICALLY check for updates is turned on. Click on the
"Check for Updates" button to confirm latest version is installed.
2. UPDATE - UPDATE - UPDATE. Hackers are always finding ways to break into
computers using flaws in software. Especially Windows, Internet Explorer,
and Firewall software. When such flaws are discovered, the publishers issue
updates to "patch" the security flaws. If you don't install the patch (i.e.
update), then your computer is highly vulnerable to hackers.
3. UPDATE WINDOWS. You do this online using MS Internet Explorer (aka the
internet browser). Open Internet Explorer, click on TOOLS, then click on
Windows Update. Follow instructions to check for and install updates.
4. ALWAYS USE AN ANTIVIRUS PROGRAM. I recommend Norton Antivirus
(http://www.symantec.com/avcenter/). Antivirus software has to be updated
very frequently to be effective. Most programs have an update feature, use
it often (e.g. Norton LiveUpdate). SCAN YOUR COMPUTER WITH THE ANTIVIRUS
PROGRAM. I recommend at least once a week.
If you think you have a virus on your computer, then you need to boot the
computer from a clean CD with updated virus detection software. Run a full
scan after booting from the CD. If the scan detects one or more infections,
carefully note what was detected, then let the Antivirus program try to
remove the infection. After doing this, go to the Symantec or McAfee
(http://mcafee.com/) web site and read about the infection you found. If it
was simple and you feel it was removed completely, then do nothing. But, if
you have any doubt, backup all your data files, then wipe the computer and
reinstall everything. WIPING AND REINSTALLING IS A LAST RESORT. It is VERY
time-consuming and you will have to make sure you update every program after
reinstalling. But is the surest way to get rid of an infection.
5. TURN OFF FILE SHARING. This is one way a hacker can get into your
computer over the net. You can find out how to do this in Windows Help, or
on the web
(http://www.wellesley.edu/Computing/FileSharing/Windows/winxphome.html). Or
just search for "Turn Off File Sharing" at http://www.microsoft.com or in
any search engine.
6. NEVER OPEN ATTACHMENTS in email or instant messaging UNLESS YOU ARE
ABSOLUTELY SURE that they are safe AND they have been scanned by your
Antivirus program. Don't trust anyone. Even people you trust can give you
an infection without meaning to do so. Always scan attachments. Your
AntiVirus program should be configured to automatically scan email
attachments. You may learn that some attachments are safe. For example you
may routinely get safe "text only" files from certain mailing lists. But,
the rule is if you aren't sure it is safe, assume it is not. A little
paranoia is a good thing when it comes to attachments.
7. NEVER BOOT FROM AN UNKNOWN DISKETTE OR CD unless you scan it first using
updated Antivirus software.
8. Regularly clean spyware and Adware off your computer. I recommend using
AdAware for this. http://www.lavasoftusa.com/
9. Be careful with Instant Messaging (IM) programs. Make sure you don't
allow "Buddies" or "Guests" to have unrestricted access into your computer.
Take time to learn about how infections get in through IM programs.
10. DON'T TRUST PEOPLE. Password protect your computer. Set a boot-up
password and use a password protected screensaver. Every time the computer
is turned on, the user should be required to enter a password. Don't let
strangers, friends, or almost anyone know your passwords. If you aren't
present, then people shouldn't be able to just turn on and use the computer.
11. BACKUP - BACKUP - BACKUP. Even if you do most things right, most of the
time, the computer will still get "messed up" from time-to-time. You need
to regularly backup your data files. JUST THE DATA FILES, nothing else.
You can always wipe the hard drive clean and re-install all the programs.
But your data files are unique and can't be re-installed. To make this
periodic backup easy, store data files under one main folder, with
sub-folders, on your computer (e.g. "Files" or "My Documents"). If the data
files are "spread around" in lots of folders, it will be almost impossible
to backup the data.
Data files include anything you created, received, downloaded, etc.
Examples are word processing documents (*.doc, *.txt, *.wri), Excel
Spreadsheets or Workbooks (*.xls), PowerPoint presentations (*.ppt),
database files, image files (*.jpg, *.gif, *.psp, *.bmp), favorites lists,
etc.
Remember to backup your email too. Your email is stored in data files. If
you use Outlook for email, then a file named outlook.pst is probably where
your email is stored. You can find the file name and location for your
Outlook email by checking the PROPERTIES for the email "personal folder" on
your computer. The exact location of the property setting depends on the
version of Outlook you use. Study the menus or help files until you figure
this out. Try right clicking on the Personal Folder and see if you get the
properties option. You can also locate all *.PST files using the SEARCH
option in Windows Explorer.
12. If you feel capable, and you are careful, AFTER DOING ALL THE ABOVE -
you might want to run a security scanner to test your system for POSSIBLE
security problems. One good security scanner is Retina
(http://www.eeye.com/html/index.html). Be careful to make notes so you can
undo any "fixes" you make based on such scans. If you don't feel confident
that you understand what you are doing, then don't do it.
Information
The Coker Forum is the online meeting place for discussion and sharing of information regarding the surname Coker, related variations, and closely allied families, in any place and at any time. https://www.facebook.com/groups/CokerForum/
http://helpdesk.rootsweb.com/