Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy into your computer. This spy is known as "spyware, adware, or trojans", and once it is in your computer it starts taking statistical information as you travel the Internet. In some cases, it may send you pop-up ads and slow down your computer. A wired.com article, mentions it "could even collect your credit card information".

How did you invite the spy?

Maybe you visited a website you knew and enjoyed only to find that it was recently purchased by a pornography site. The new company has imbedded "spyware" into the home page and now, in many cases without your knowledge, it is on your computer.

Maybe you downloaded a free or paid program and as part of the package you were provided with an added secret bonus ? a "spyware" program. Spyware may also be placed on CD's you purchase, too.

Maybe you agreed to it! You could have downloaded a program and checked the box to allow the program to take statistics from you "for their own use".

Maybe someone sent you spam, especially porn spam, and that spam created the spy. Spys can easily be placed, without your knowledge, in pictures or HTML email.

What you can do?

Purchase a firewall program and it should let you know if a program is about to download from the website you are at. Note the word "should".

Or you can learn all about spyware, download an anti-spyware program, and schedule time in your weekly calendar to run an anti-spyware program. The first time I conducted a "clean up", on my 18-month old computer, I found 2 porn and 42 other spyware programs. Then a week later, I had 4 new spyware files appear.

To further reduce the amount of spyware that ends up in your e-mail Inbox, create a "rule" or "filter" that will move any e-mail containing "certain adult words of your choosing" directly to your delete or spam folder.

Norton and MacAfee the virus protection specialists, have added anti-spy programs to the list of maintenance programs they sell. However, according to information I've seen on email lists, they're not as anywhere as good as the Ad-aware program from Lavasoft.

Just a note: If a few people use your computer and each has their own log in password, when you run LavaSoft program, you need to run it under each password. Example: Let's say Katie and Molly have passwords on your computer. Log in as Katie and run Lava Soft. Then log out of Katie, and log in as Molly and "run the program again." I'm sure, you'll find additional spys under each log in name ? just like I did last weekend when I cleaned and updated a friend's computer.

Use the resources below to help you learn more about Spy's:

Learn about protecting your computer from spam and spyware
http://www.unwantedlinks.com/
http://grc.com/optout.htm
http://www.spyware.co.uk/

Check for spyware on new software before you download it.
http://www.spychecker.com/

Free anti-spyware program.
Use it at least monthly and don't delete the items you really want! http://www.lavasoft.de/

Opt out of double click ads
http://www.doubleclick.com/us/corporate/privacy/privacy/ad-cookie/default.asp

Removing your e-mail, address and telephone numbers from lists.
http://www.dmaconsumers.org/consumerassistance.html#mail

Anti-Spam Tools
http://www.webattack.com/freeware/comm/fwspam.shtml

BONUS: Opt-out of credit card marketing mail
The three big credit-reporting companies provide your information to "resellers" or "vendors". To curtail this abuse, call toll free 888-567-8688. Listen to all the options before hitting a key. #3 is the best option to remove you "forever" (well till you change your phone number). Remember to get your cell phone number removed, too. Once you call them they will mail you a confirmation letter for you to mail back to them.

? 2004 Maria Marsala, Business Growth Strategist. Bringing women-owned service businesses our Wall Street expertise. Your bottom line is NO accident. If your income has been hovering or flat lining the past year or so, if you are working more than 35 hours per week and have no passive income stream, we need to talk. http://www.coachmaria.com You have nothing to loose and everything to gain!

Barrington South Lincoln Stretch rentals .. Lockport Chicago limo O’Hare
In The News:

A newly discovered security flaw with your iPhone or iPad could leave your personal information vulnerable to hackers. Kurt the CyberGuy explains.
Modeled after a traditional bell-shaped skirt worn by women in Kosovo, a theater's roof is draped entirely by solar panels to generate renewable energy on-site.
Kurt the CyberGuy explains how to protect yourself from malicious Chrome extensions that can steal sensitive information like password managers, crypto wallets and banking apps.
Stellantis' innovative STLA AutoDrive 1.0 system allows drivers to safely take their eyes off the road and their hands off the steering wheel.
Here are some travel hacks to save money on your next vacation including setting up price alerts, remaining flexible and checking for 24-hour price drops.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
One report claims at least 25 million people were targeted by infostealer malware between the beginning of 2023 and the end of 2024, capturing bank card details and passwords.
The LaserWeeder G2 uses lasers, artificial intelligence and advanced robotics to offer an alternative to chemicals traditionally used in farming.
Tech expert Kurt “CyberGuy" Knutsson says a malware app called SpyLend is posing as a financial tool, hitting 100,000-plus downloads.
Tech expert Kurt “CyberGuy" Knutsson says Clone Robotics’ Protoclone mimics humans with 1,000 muscles – too human for comfort.
Tech expert Kurt “CyberGuy" Knutsson urges you to use Apple’s App Privacy Report to see what your apps are really up to.
Tech expert Kurt “CyberGuy" Knutsson talks about how to smoothly transfer your data from an old laptop to a new one using cloud storage or external drives.
Kurt the CyberGuy offers tips to safeguard your personal information as scammers become more sophisticated with scam texts and other methods.
WeRide's unmanned electric delivery van, the Robovan W5, has 194 cubic feet of cargo space and can carry payloads up to about 2,205 pounds
Kurt the CyberGuy recommends deleting 16 browser extensions immediately in response to a report saying more than 3.2 million web users were affected by a security breach.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A robotics firm in China claims a robot has performed the world's first humanoid robot front flip, which is significantly more difficult than a backflip.
A digital ID may be even more secure than a physical ID. Storing your driver's license in your Apple Wallet is an ideal solution for commuters.
A cybersecurity firm has shed some light on just how common tax scams have become. Kurt the CyberGuy offers his advice for how to protect your refund.
Lifesize Plans offers immersive walk-throughs that allow customers the opportunity to tour a home's design before construction actually begins.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A man invested $4 million in bitcoin and lost it all with a single click when he was targeted by a vishing scam, which uses phone calls to trick people.
Expandable's Touchdown is a designer trailer that promises a luxury off-grid living experience and unfolds into a home in about 15 minutes.
Major employee screening company data breach affects 3.3 million people. Tech expert Kurt “CyberGuy" Knutsson explains what happened and gives five ways to protect your data.
Kurt “CyberGuy" Knutsson reveals mind-blowing tech that gives you sunlight on demand.

Enhanced Web Browsing With Toolbars

As the Web grows more crowded and just plain "noisy"... Read More

Cisco Certification: The Most Important Cisco Study Youll Ever Do

All of us are familiar with the pyramids of Egypt.... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Are You Putting Off Productivity?

I recently took a good look at what was keeping... Read More

Flow Text Around a Graphic in Microsoft Word

Flow Text Around a GraphicQuestion: I have inserted a photo... Read More

What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?

Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Gain Control Over Your Screensavers With These Simple Steps

We all enjoy our favorite screensavers but in the same... Read More

The Help Desk

When you think of a help desk, what do you... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

Advantages and Guidelines of Automated Testing

"Automated Testing" is automating the manual testing process currently in... Read More

EDTV vs HDTV

Confused by EDTV vs HDTV? We don't blame you. The... Read More

Dont Let the Internet Overstimulate Your Mind

The Internet is an awesome tool, but be careful and... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

How to Switch to Firefox and Why You should

First things first, what is Firefox? Well, it's a browser.... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

Emulation Manual - A Complete Guide on How to Change Your Windows XP to Mac OS X

IntroductionMac OS X is the most technologically advanced operating system... Read More

Downers Grove limo Chicago ..