Facebook   Twitter   Google+   YouTube Get FREE Online Help Free Download IObit Products  

Go Back   IObit.Com Forums > Lounge > Lounge
Register FAQ Members List Calendar Search Today's Posts Mark Forums Read

Lounge The Lounge is a place where you can discuss more than our products or non computer related subjects.

Reply
 
Thread Tools Display Modes
  #1  
Old Apr. 7th, 2010, 21:58
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Post Spying and Tracking you on the Internet 2

you have a right not to be tracked,or spied on!
i have come to see the terrible incessant way its done
i shall for the ones interested write up this post try to x plane how you can help your self!

its a long post.and you need to take your time.
its for you benefit that i decided to take time out and it may possibly help you understand .?

first lets talk about how.and what is used.
thank you



Web advertisers are increasingly using surreptitious methods ("spyware", "web banners", "web bugs", and "cookies") to identify and track individuals on the Internet without the knowledge and consent of the individuals involved. The purpose is to build a database (a dossier) on web surfers and to use that information for their commercial purposes, including marketing both online and using direct mail.

for some The Internet has become a gold mine to be exploited
your personal information is the coin of trade for the profit of others. In their pursuit of their profit, some vendors have taken the position, that not only are your browser viewing habit.
Some vendors believe that they have the right to track you and your use of your computer for their commercial purposes

on the other hand, do not tell you that they have inserted "spyware" on your system or are tracking your web surfing habits, preferring instead to obtain the information they want about you, secretly and without your consent.


information . is justified by the industry as simply a means to "enhance your browsing experience" through the creation of such "online profiling." However, it is clear that such fine words are a rather poor, attempt to justify being peeping Toms.
They are really saying that by being peeping Toms, they can "target" you with "better" advertisements; ads that might make your more likely to purchase what they are selling.

Yes, . itís all about making money off of you.

yes you heard it all before.and think so what.ok if you the reader feel this way ,this is not for you.

i will again x plane what you can do about it. by using software,like iobit.
and pc blocking methods..
for the ones who do care about there privacy..

How they spy on you

There are several ways that advertising companies (and they are the one driving this phenomena) invade your privacy and get information about you. In combination or separately, use techniques involving

"cookies", "web banners", "web bugs", "pop ups"

plus, spy ware that you have (perhaps unknowingly) installed on your computer that sends information to them behind your back.
let talk about .
Cookies and JavaScript Tags

"cookie" is a file that the web browser stores on your computer, at the direction of the web server, which contains information about the visit to a web site.

"JavaScript Tag" is an embedded program in a web page that is used to track your internet browsing practices.

i have used 1 xsample of a site that are honest as to what thy do.
and let you decide one way or the other.
but not all and most will not ..tell you.

part 1
itsmejjj
Attached Thumbnails
Click image for larger version

Name:	Snap_2010.04.07 20.52.13_002_1680x1029.jpg
Views:	42
Size:	262.9 KB
ID:	4861  Click image for larger version

Name:	Snap_2010.04.07 20.23.23_001_1481x1050.jpg
Views:	18
Size:	536.2 KB
ID:	4862  

Last edited by itsmejjj : Apr. 10th, 2010 at 09:40.
Reply With Quote
  #2  
Old Apr. 7th, 2010, 23:45
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Post Part 2

part2

many user now block cookies instead inserts a JavaScript Tag (a small JavaScript program) into subscribing companies web pages that
"When a visitor downloads a page from the site, the JavaScript initiates an interaction between the visitor's browser and SiteWise. The JavaScript code collects data about the visitor's browser and activity and transmits it to an analysis engine. The analysis engine aggregates the data with that of all other visitors to the site, stores it, and makes it available in reports that can be viewed and downloaded


Web Banners

A "web banner" is the advertisement that the advertiser displays on your screen. Itís the pitch for products and services that you see at the top, the sides, and the bottom of commercial web pages. If you click on them, you will be sent to the web site offering the goods of services being advertised.

So what is the problem with this? Whether or not you click on the banner, a cookie is read and written on your hard drive telling the advertiser that you viewed a particular banner ad on a particular web site. How this works is that the web banner is not part of the page you are downloading. It is an off page link to another website (the advertiserís) that records the fact that your web browser saw the web banner ad and from which website you linked from. An example of Information that can be recorded follows:

Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/msword, */*

Accept-Language: en-us

Connection: Keep-Alive

Host: grc.com

Referer: @@@://grc.com/x/ne.dll?rh1dkyd2

User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)

Content-Length: 31

Content-Type: application/x-www-form-urlencoded

(sample from grc site..)

The "Referer:" information tells the server the source of the link to it. Advertisers using web banners use the "Referer:" data to tell the EXACTLY where you were reading the web banner from.

the fact that you view the web page containing a web banner ad causes the stored cookie (that the web banner company put on your machine the last time, also known as a "third party cookie") to be transmitted to the advertiser.

What most people do not know that information A web server can get access to any and all information that you entered in a form for that particular browser session.

Information that you enter in a web browser form is stored as "value" in memory associated with that browserís session and remains available to the browser session until you close it. Any subsequent web page you view (those with web banners, for example) could cause the server behind it to query and upload those variables to that web banner company, providing them with personally identifiable data. The "third party" cookie or JavaScript Tag used then provides a marker that follows you where ever go on the web.

Web Bugs

A "web bug" is a variation of the web banner described above. However, instead of a visible banner ad, a web bug is a graphic that is usually only 1 pixel in size, and hence essentially invisible. In other words, its only purpose is to track your visit to the page, not to pitch a product or service to you. Other than this, they operate exactly like the web banner advertisement and a visit to a web page with a web bug results in a cookie being placed or read on your machine and an update to the advertiserís database.

Pop Ups"

Pop up or "Pop under" ads are very popular today. There are hardly any commercial news or entertainment web sites that do not use them. They either appear on top of what you are reading, or underneath it to be visible when you close the web page you were reading.

Pop up ads do EVERYTHING that the web banners do. They plant cookies, they transmit your IP address and goodness knows what else to the advertiser, and they carry one more annoying feature: You must deliberately, manually close them. Advertisers love them because they are "in your face." This is why they are almost universally despised by the rest of us.

Pop up ads are most commonly launched through the use of JavaScript programs embedded on the web pages you visit. JavaScript is a programming language that can enhance a web site visually as well as programmatically. "Dynamic HTML" is a useful tool that can be used to highlight words or paragraphs, transform images, and make a website much more dynamic and dramatic.


Mouse trapping" and other dirty tricks

JavaScript is so powerful that it can literally change how your web browser operates. Through Javascript, a programmer can link ads together or create an overwhelming cascade of ads appearing either one right after another, or in a near simultaneous burst of opening pages that can overwhelm your computer to the point of system crash.

But they other thing they can do is prevent you from escaping their clutches by turning off the "back" button, or reprogram it into a "launch more junk" button. This is called "mouse trapping." It is an attempt to prevent your leaving their web page

Spyware

"Spyware" are programs that you have installed on your computer that sends information about your computer to Internet servers in a, invisible background session. The authors of these programs refer to them as "adware," and claim that the are only used to control the display of advertisements on your monitor. Almost always, spyware is installed as part of the installation of a program or software package. Some times, the End User License Agreement (EULA) has a sentence buried deep inside somewhere telling you that data may be sent in the background to an outside Internet server. But most of the time, there is not a notice in the EULA, and the user has no knowledge that he is running a program that is sending information to a server somewhere, to be used for purposes unknown to him.

Many times, this spyware is installed such that it is started when you start your computer. And often, this software has conflicts with the operating system, causing system crashes. Clearly, running a hidden program that transmits data to others without your knowledge


Finally, some spyware programs make changes to the operation of your computer. Some imbed themselves very deeply in the operating system by replacing operating system programs with their own versions. Some reset the defaults of Internet Explorer and override your home page setting to one point to their web site or change the search engine to insure that their customers get preference when you search the web.

Some imbed themselves deeply in the registry and automatically reinstall themselves if you uninstall the software or reset your default home page back to where they want it, after you manually set it. Some disable security controls to make future manipulation of your browser easier for their customer's web sites.

thank you for reading.
hope this is informative.
itsmejjj

next part 3 what can we do?

Last edited by itsmejjj : Apr. 7th, 2010 at 23:47.
Reply With Quote
  #3  
Old Apr. 8th, 2010, 02:24
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Smile Part 3

MANY soft ware vender companies have distributed spyware,links,auto updating,adding to your Browser.SEARCH en gens.such as Google Yahoo.ASK com.that are imbeded into freeware, shareware, or purchases/licensed products. Be advised its growing as this practice spreads.and unknowingly added to your systems. all in the name of better computing!
the new practice , your task bar (toolbar)now infected by auto linkings.update checking.redirecting.and so on..all hidden ,and mostly unknown by you.
you have the right to stop it.the almost instand links made at boot up.most unbeknown to you!

Viral

Viral (virus)is a technique to infect your machine into becoming a ad server. The functional effect is very much like that of sypware installed on your machine. The way it is installed, however, differs from spyware that you install that is piggy-backed as part of another program.

Like the name implies, you machine becomes infected when you visit certain websites. Windows machines can run programs that utilize a language called "ActiveX." ActiveX, unlike JavaScript (which affects only web browser operation) can install programs on your computer.

Windows Update, the technique that Microsoft uses to automatically install patches on your operating system and other Microsoft products, uses ActiveX to install new versions of the update program on your computer.
This is misused by Alot by (??????) that believe that YOUR computer is also THEIR computer
ActiveX is only one such way that programs (called "malware") can be installed without your knowledge. It is sufficient to know and understand that people ARE trying to use YOUR computer to consume YOUR time to pitch THEIR products.and link.

What do we do about it?
who gives them the right to spy on YOU, record web surfing habits and invade privacy?
PLEASE, DO SOMETHING ABOUT IT!

How to stop cookies

First of all, do not allow them to be recorded on your system. simply put ,BLOCK them
Most browsers have controls that can be used to stop the recording of cookies. If you are using a browser that does not allow you to stop cookies, dump it and get one that does. delete your cookie files.and most browsers will allow the web server to READ existing cookies. Therefore, to prevent information contained in the cookies from being transmitted to the server asking for the information, do not leave them on disk in the first place.clean them up.
some web sites will not allow you to enter or navigate the site unless you allow cookies. These sites will give you some kind of error message telling you to turn cookies back on. If you neither need nor desire the information contained at that web site, move on. On the other hand, if you need to use the web site, then certain browsers allow you to create cookies in memory that are valid for the duration of the life of the web browser task. The remote server thinks that a cookie is being saved, but it will be thrown away the moment you end the browser task.close it.
Alternatively, most web browsers allow you to categorize web sites in terms of trust or danger. In other words, , you can consider sites as "trusted" and allow cookies to be kept and read. That way, you can shut off cookies for all but the trusted sites, and retain the cookie functionality for a select few.
browsers have the capability to prevent advertiser cookies (also known as "third party cookies") from being stored on your system, while allowing the web siteís cookies to be processed separately.
obtain "cookie management" software. software that blocks cookies, allows you to edit them, and/or allows you to delete them.

Disabling cookies is the first line of defense.

How to stop Web Banners, Web Bugs, and Pop Ups
There are several ways to stop web banners and bugs and pop ups from spying on you
obtain banner blocking software, you can misdirect the attempt to connect to the web advertiserís server, upgrade to a mail client that strips such embedded graphics out and shows as separate images.

Banner blocking software works by intercepting the web browserís attempt to display the banner ad or the web bug, and discarding it. Hence, the banner is never displayed because the advertiser web site is never reached. In addition, the advertiser web site never gets to write a cookie on your hard drive and never updates its database to reflect your visit to the web page where the banner ad was. Hence, the attempt at online profiling gets defeated.
Pop up ads are similarly intercepted though advertisers work hard to prevent their ads from being intercepted by using Macromediaís Shockwave and Flash products.

Another way ,the advertiserís plans is to redirect the request to connect to the web advertiserís server and record your visit to the web page
trick the browser to go to an invalid server IP address, instead of the address of the web advertiserís server. Use of this techniques that you have a certain level of understanding on how TCP/IP (the communications protocol of the Internet) works and how to edit system files. If you do not have this knowledge, purchase a good banner blocker or internet security package instead.

You can fool the web browser into trying to connect to the advertiser by telling it to look on your local host address by manually editing a file called the "hosts" file. This file tells system to use the local host address instead of the real IP address. Before your computer requests a DNS server to translate the long form, it will search this "hosts" file first. All you have to do is include an entry for the machine names commonly used by the banner advertising site and point it to the local loop address and you achieve the same result as using an ad blocker.

For example, the following two entries will cause any web page containing a banner page from DoubleClick ,presentation of A advertisement as well as preventing a cookie read/write and profiling database update:
127.0.0.1 ad.doubleclick.net
127.0.0.1 in.doubleclick.net

modify your "hosts" file.
the above techniques, banner ad blockers or using the hosts file, will put a major dent, in the ability of the web advertisers to collect profiling data. However, unless you are proficient with TCP/IP, I recommend you acquire a web banner blocker .
How to stop the "Read Receipt" services from knowing if youíve read an email

one way to certainly defeat web bugs put in to determine if you have read a message is to use the hosts file to block the communication between your machine and the tracking server, or to upgrade to an email client that can suppress the automatic execution of the web in HTML formatted email messages.
An example of such a hosts file entry is:
127.0.0.1 didyoureadit.com
127.0.0.1 notifyread.com
127.0.0.1 msgtag.com
Pre processing email Ė used to check for spam, mostly Ė is another way to determine if email in your inbox might be an HTML formatted message that might have a web bug embedded. An example of a useful email preprocessor is mailwasher type app. program
How to deal with "mouse traps"
The best way to avoid being "mouse trapped" and/or cascading page launches is to avoid the sites most likely to use them. These sites are typically "copycat" web sites, that have a URL that is just slightly different from a real web site so that a common spelling error of incorrect use of a domain identifier, will send you to a bogus web site that launches the mouse trapped/cascading pages. example such is mistakenly typing .


Pornography web sites are notorious for doing such dirty tricks as mouse trapping and cascading page launches using JavaScript.
Using banner/Pop up blocking software is a very good way to prevent loss of control of your web browser. The one thing that JavaScript cannot do is prevent you from closing the web browser. If you have pop up blocking, you can kill a "mouse trapped" web browser session by clicking on the "x" or close icon and "terminating" the session "with prejudice."
Another way to deal with pop up ads emanating from sites you use often, but donít want to put up with their advertising nonsense, is to place the web site in a "restricted use" list provided by your web browser. A restricted use list is configured in most browsers to prevent the execution of ActiveX, VBS (another programming language for web browsers) and JavaScript programs embedded in the web page. Internet Explorer version 7-8 has a "Restricted Sites" tab that can be found under the "Tools" command bar item, with "Internet Options" drop down menu item. consider configuring your browser to either prompt you, when an ActiveX program is about to be run or to block all them entirely.

How to choke off spyware, "viral marketers" and malware
There is only one thing to do here. Track down the spyware programs and delete them. There are a number of free programs you can acquire that will scan your system, identify programs modules and registry entries that correspond to known spyware, and then automatically delete them.
But equally important is preventing the spyware from contacting their Internet servers in the first place. In many aspects, spyware acts like a "Trojan horse" virus. Like a Trojan horse, the spyware program attempts to connect with its Internet server. Usually they are used to control the display of advertisements, but they also upload information about you, your computer, and maybe even what files you have on your system. A credible claim can be made that the only difference between a Trojan horse virus and a spyware program is how the collector intends to use the information.
However, if the spyware is deleted, the specific software you have that is infected with the spyware, may no longer work properly. This may not be what you want to do.


Therefore, an alternate WAY, to complete removal may be to prevent the spyware program from "phoning home", instead. In that case, it may be necessary to install a firewall that will block it from doing that."
A firewall, such as ??????? you decide.
the front line in preventing unauthorized communication to a web advertiserís server from a spyware program. These firewalls will present a pop-up message whenever an unauthorized application tries to make contact with a server on the Internet. The firewall user can prevent the application from ever contacting "home" with its load of data from your hard drive, and prevent it from being an "ad-server" and profiler.
recommended that every internet user installs,firewall software one on every computer that access the Internet. unauthorized attempts blocked.. Not only does it keep out hackers and internet worms, but it prevents spyware from linking home.

We can prevent these privacy invaders and spies from succeeding in tracking our movements and maintaining online profiles. We can do something about it. Remember:ITS YOUR PC. Itís YOUR data,Itís YOUR right to privacy.
Itís YOUR right to stop them

i have put this in a broad way so you understand the net.and the bad guys.not all are.and you may want to allow .adverts.cookies, Updates,links, and so on.but be aware.help your self.
please consider some of the post to your benefit.


next lets talk fire walls ,and blocking
itsmejjj
Reply With Quote
  #4  
Old Apr. 8th, 2010, 09:51
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Question

@@@://www.sendmeemail.co.uk/advice/html/what_is_spyware.HTM

a other opinion from this site.
..
How you can become infected with spyware by Ö
Downloading Files Online

Spyware quickly begins its task of stealing your information (including credit card numbers, user names and passwords), directing your browser to suspect sites, changing or deleting your files, pummeling you with popĖups and slowing your PC to a crawl.

ok read here .yes i know its there fire wall but i am more thinking you get a
understanding what happens.
saves me a lot of explanations.

broadband advice note

A GOOD STAND ALONE ANTI SPYWARE LIKE (WEBROOT SPY SWEEPER )OR AN COMPLETE ANTIVIRUS FIRE WALL ANTI SPYWARE PROGRAM LIKE BITFENDER INTERNET SECURITY V9 ARE RECOMMENDING (OF COURSE THERE ARE MANY GOOD AND NOT SO GOOD PRODUCTS ON THE MARKET ) IT MAY BE DOWN TO USERS PREFERENCE OR EASY OF USE THAT DETERMINES THE END PRODUCT / BRAND USED .
I USE # 3 fire walls (software) and the routers.!
but that's me.

well there are many for you to pic from.from small to huge fire walls.
you decide to your liking and what you feel works for you.
and you think you heard it all before?
sure you may of..but there are new things happening all the time..
please spend a little time learning.
just like all things in life.

try .have fun,i joy the PC.it can be a wonderful thing.but it will at times be disappointing.and confusing .
know what it is...

itsmejjj
Attached Thumbnails
Click image for larger version

Name:	Snap_2010.04.08 09.57.14_006_787x600_1049x800.jpg
Views:	19
Size:	98.5 KB
ID:	4864  Click image for larger version

Name:	Snap_2010.04.08 09.59.07_007_1050x800_1050x800.jpg
Views:	14
Size:	322.5 KB
ID:	4865  

Last edited by itsmejjj : Apr. 8th, 2010 at 10:16.
Reply With Quote
  #5  
Old Apr. 8th, 2010, 10:20
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Talking

hi all so you have read this long winded post? and are here.
Thank you .it shows you are a little concerned..

ok .now .i want to ask you.
have you backed up your system? have a image of your hard drive?
no,,? please do this now..

yes excellent..like myself and others we are in the knowledge were can restore
any disasters.
itsmejjj
Reply With Quote
  #6  
Old Apr. 8th, 2010, 22:49
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Smile

you may be interested to know i use 5 fire walls (router)
3 ip blockers ,filter program,iobit,360.
yes i am happy with it.and all i personally use and want..
not interested in any other.

ok nothing allowed bar my browser.to access the net.only 1 port used to be out and in bound.always use a proxy.never my own IP...
no udp is allowed.(ports).no java,cookies,scrips,active X ,ping,mail,Icmp.DNS .
no linking to any sites .any thing that tries is blocked!
itsmejjj
Attached Thumbnails
Click image for larger version

Name:	Snap_2010.04.08 10.30.24_009_1257x800.jpg
Views:	20
Size:	303.1 KB
ID:	4866  
Reply With Quote
  #7  
Old Apr. 8th, 2010, 23:33
Stupid Guy Here Stupid Guy Here is offline
Banned
 
Join Date: 11 Mar 2010
Posts: 40
Default well done

itsmejjj well done now thats a post .useful important information well laid out eazy to read and understand...

Yours Snoopy2010 , Stupid Guy Here ,3H48002Y4, Former Iobit user, and who ever else I am today or tommrow?


Last edited by Stupid Guy Here : Jul. 12th, 2010 at 00:11.
Reply With Quote
  #8  
Old Apr. 9th, 2010, 00:34
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Talking

thank you its been hard work.and i think my best post yet.

please ,any one can think of something i missed ad your comments.

also vote what you think 1 out of 5 .
this would mean a lot to me.i never have ask.and only this one time

itsmejjj

Last edited by itsmejjj : Apr. 9th, 2010 at 02:59.
Reply With Quote
  #9  
Old Apr. 9th, 2010, 03:23
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Smile

ok this is what fire wall do .looks, fearsome.but no thy all can
a combination.or just 1 .depending how you want it.. or if you think


or is non needed
not recommended.


what extremity is up to you..and how you block and its your business only.no one else should be able to tell you different
talk you out of a fire wall .or convince you different.try to con you into a other one.
stick with what you are most happy with. take no notice of hipe. or stories.posts.or profiteers of fire walls.
take it all in yes .but remember its your system we are talking about.

a free version is as good or can be ,as a so called you pay..for one..



ok next
lets talk spy malaware stoppers
itsmejjj
Attached Thumbnails
Click image for larger version

Name:	Snap_2010.04.09 00.55.07_001_1280x798.jpg
Views:	18
Size:	282.1 KB
ID:	4869  Click image for larger version

Name:	Snap_2010.04.09 00.55.40_002_1280x642.jpg
Views:	16
Size:	84.4 KB
ID:	4870  Click image for larger version

Name:	Snap_2010.04.09 01.27.18_003_767x960.jpg
Views:	14
Size:	198.0 KB
ID:	4871  Click image for larger version

Name:	Snap_2010.04.09 01.36.18_004_1280x550.jpg
Views:	18
Size:	54.6 KB
ID:	4872  

Last edited by itsmejjj : Apr. 9th, 2010 at 03:35.
Reply With Quote
  #10  
Old Apr. 9th, 2010, 20:25
itsmejjj's Avatar
itsmejjj itsmejjj is offline
IObit Expert VIP
 
Join Date: 14 Jul 2009
Posts: 1,934
Smile

ok listen and read this .please this is my way of running any new app.
nothing to do with iobit.or any one
itsmejjj way.

I try hard to x plane the way i install ---this apply s to any software.no if or but.

ok yes .back up the system..(forget restore point its useless) make a image back is what i am talking about..


ok next your modem.pull out the fhone line..look to see the light go off..

ok now install.find the run,or exe file of the install,left click,run a administrator.

win or a warning should pop up .hit allow(run)

now here watch carefully..look at what it says.agreements.ok next any other pop windows should arrive.
as in options..

be aware.what gets installed.like tool bars.or changing your browser settings..
ok next.and so on..

ok your fire wall will now pop up some where along the install..and ask you this or that.
you answer block....
no if or but..WHY?

if the program stops.it is because it want to link to the net.ok we do not allow it.

sit and watch.normally, most will continue,if not.stiff get rid of it.its malaware,100%
no if or but...if it will not install ..with out the modem on


when done .reboot.run the application.and test it(NO MODEM ON) your fire wall should be still
and not ask any thing more about the program .bar perhaps to allow it..that is all

ok close the application.open your browser.check if any thing has changed.
if you are sure all is well.ok reboot....

lets pretended its 360 you installed.ok run it.
please check the caps how and what you do. first time start.
do nothing els.for now..
i mean nothing ,
first read every thing about the app.
in the help files..
then try out the extras..

so now reboot.all should be running fine.YES?

ok plug in the modem.
tell your fire wall to allow it to the net..360.iobit

from here you can now go ahead and do your ,thing.update.register.

NO? well check why,if you cannot find it.uninstall..fully.
should be good,if not re image the drive..if something is fowled up.


try one more time the above..if you still have problems.ok tell the furum about your experience.
in a nice way .the mallaware fighters well help you .or our admins..

try to sort you out.and the possible problem.
mean time you are back as you were before the install.

thank you for reading this..
itsmejjj

yes i know i still use this version!


note please look at the screen shots carefully.
you do this at the first time running of the application.
take particular note of the last screen.
if not sure leave it.and ask some one
(i entered (installed) this Trojan on purpose to demonstrate this app.)

yes i have many on a special cd


then reboot.if all is well then go ahead and do your thing..
Attached Thumbnails
Click image for larger version

Name:	Snap_2010.04.09 18.45.53_003_1280x440_1280x440.jpg
Views:	14
Size:	53.6 KB
ID:	4878  Click image for larger version

Name:	Snap_2010.04.09 18.47.32_004_1280x464_1280x464.jpg
Views:	15
Size:	67.9 KB
ID:	4879  Click image for larger version

Name:	Snap_2010.04.09 18.51.23_006_1280x561_1280x561.jpg
Views:	16
Size:	78.8 KB
ID:	4880  Click image for larger version

Name:	Snap_2010.04.09 18.54.52_007_1280x548_1280x548.jpg
Views:	19
Size:	105.9 KB
ID:	4881  

Last edited by itsmejjj : Apr. 10th, 2010 at 09:51.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Get FREE Online Help



Free Download IObit Products




Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
Spying and Tracking you on the Internet itsmejjj Lounge 13 Apr. 11th, 2010 09:06
Is Comodo Spying on You? detailer Lounge 7 Sep. 25th, 2009 03:57
tracking cookies sarathv ASC General Discussions 4 Jun. 15th, 2009 18:10
Is Smartdefrag spying on us? Iobituser SD General Discussions 1 Mar. 2nd, 2008 12:18
tracking cookies dinasseti ASC General Discussions 2 Dec. 10th, 2006 09:57


All times are GMT +0. The time now is 14:21.


Powered by vBulletin® Version 3.6.8
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.