Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy into your computer. This spy is known as "spyware, adware, or trojans", and once it is in your computer it starts taking statistical information as you travel the Internet. In some cases, it may send you pop-up ads and slow down your computer. A wired.com article, mentions it "could even collect your credit card information".

How did you invite the spy?

Maybe you visited a website you knew and enjoyed only to find that it was recently purchased by a pornography site. The new company has imbedded "spyware" into the home page and now, in many cases without your knowledge, it is on your computer.

Maybe you downloaded a free or paid program and as part of the package you were provided with an added secret bonus ? a "spyware" program. Spyware may also be placed on CD's you purchase, too.

Maybe you agreed to it! You could have downloaded a program and checked the box to allow the program to take statistics from you "for their own use".

Maybe someone sent you spam, especially porn spam, and that spam created the spy. Spys can easily be placed, without your knowledge, in pictures or HTML email.

What you can do?

Purchase a firewall program and it should let you know if a program is about to download from the website you are at. Note the word "should".

Or you can learn all about spyware, download an anti-spyware program, and schedule time in your weekly calendar to run an anti-spyware program. The first time I conducted a "clean up", on my 18-month old computer, I found 2 porn and 42 other spyware programs. Then a week later, I had 4 new spyware files appear.

To further reduce the amount of spyware that ends up in your e-mail Inbox, create a "rule" or "filter" that will move any e-mail containing "certain adult words of your choosing" directly to your delete or spam folder.

Norton and MacAfee the virus protection specialists, have added anti-spy programs to the list of maintenance programs they sell. However, according to information I've seen on email lists, they're not as anywhere as good as the Ad-aware program from Lavasoft.

Just a note: If a few people use your computer and each has their own log in password, when you run LavaSoft program, you need to run it under each password. Example: Let's say Katie and Molly have passwords on your computer. Log in as Katie and run Lava Soft. Then log out of Katie, and log in as Molly and "run the program again." I'm sure, you'll find additional spys under each log in name ? just like I did last weekend when I cleaned and updated a friend's computer.

Use the resources below to help you learn more about Spy's:

Learn about protecting your computer from spam and spyware
http://www.unwantedlinks.com/
http://grc.com/optout.htm
http://www.spyware.co.uk/

Check for spyware on new software before you download it.
http://www.spychecker.com/

Free anti-spyware program.
Use it at least monthly and don't delete the items you really want! http://www.lavasoft.de/

Opt out of double click ads
http://www.doubleclick.com/us/corporate/privacy/privacy/ad-cookie/default.asp

Removing your e-mail, address and telephone numbers from lists.
http://www.dmaconsumers.org/consumerassistance.html#mail

Anti-Spam Tools
http://www.webattack.com/freeware/comm/fwspam.shtml

BONUS: Opt-out of credit card marketing mail
The three big credit-reporting companies provide your information to "resellers" or "vendors". To curtail this abuse, call toll free 888-567-8688. Listen to all the options before hitting a key. #3 is the best option to remove you "forever" (well till you change your phone number). Remember to get your cell phone number removed, too. Once you call them they will mail you a confirmation letter for you to mail back to them.

? 2004 Maria Marsala, Business Growth Strategist. Bringing women-owned service businesses our Wall Street expertise. Your bottom line is NO accident. If your income has been hovering or flat lining the past year or so, if you are working more than 35 hours per week and have no passive income stream, we need to talk. http://www.coachmaria.com You have nothing to loose and everything to gain!

family-safe home cleaners Lincolnshire ..
In The News:

Texas family reunites with missing 11-year-old cat Grayson after 103 days using Petco Love Lost's AI photo matching technology and community help.
Tired of AI customer service loops? These insider tricks help you escape "frustration AI" and get real human help when you need it most for urgent issues.
Unlock richer audio from your streaming apps with simple tweaks to volume normalization, equalizer settings, and quality preferences for cleaner sound.
Scammers are sending fake Facebook settlement payout emails that mimic legitimate notices from the privacy settlement administrator to deceive users.
Holiday shopping scams surge as fake refund emails target distracted consumers during Black Friday and holiday seasons, costing Americans billions annually.
The AI-powered IRMO M1 exoskeleton features four modes, including turbo, eco, training and rest for hiking, running, cycling and sports with eight-hour battery life.
OpenAI announced upgrades for its ChatGPT Images platform on Tuesday, saying the program can now make more precise edits and produce images more quickly.
Chrome for Android now turns web articles into AI-powered podcast conversations. Get hands-free browsing with Google Gemini's natural audio summaries.
LastPass faces $1.6 million fine from U.K. regulators after 2022 data breach exposed 1.6 million users. Password manager failed proper security controls.
Petco disclosed a data breach exposing customer Social Security numbers, financial account details, and driver's license information due to a software error.
Baseball teams can now analyze complete swing mechanics in normal training environments using Theia's markerless AI system that processes standard high-speed footage.
Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Put Order and Information into File Names

Unless you place your faith in internal search engine software... Read More

What Does That Error Message Really Mean?

Surf the 'Net for about 10 minutes and chances rate... Read More

Portable DVD Players - Things To Know

In my humble opinion nothing makes a long trip easier... Read More

Portable Technology: Getting to Know the Treo

Up until the recent past, those who wanted to take... Read More

Help, I Need a New HDTV! (Part 3 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Tips for Buying a PC

Buying Your PCBuying a PC that's right for you and... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

Connect Your IPAQ to Linux

Choose Not To ConformPalm pilots and pdas are constantly growing... Read More

Best PC Pocket GPS

Stop Getting LostOne of the greatest uses for a pocket... Read More

Favorite Things To Do With Home Technology

Save money. Save 10-15% on utility bills per month. Work... Read More

EDTV vs HDTV

Confused by EDTV vs HDTV? We don't blame you. The... Read More

A Tale of Two Regeds

Tech support tells me to type 'regedt32' as opposed to... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

What Are You Looking For In A Cheap MP3 Player?

Are you stymied by the vast offerings in cheap mp3... Read More

Ergonomics and Healthy Computing - Positioning Your Body For Maximum Comfort At Your Computer

Do you remember the old saw about how computers would... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

Microsoft Great Plains Dexterity Customizations

Microsoft Business Solutions is on the way to popularize it's... Read More

Lightning Season: How to Avoid Data Loss

We have just entered the time of year that most... Read More

maide service in Buffalo Grove ..