|Get FREE Online Help||Free Download IObit Products|
Spying and Tracking you on the Internet 2
you have a right not to be tracked,or spied on!
i have come to see the terrible incessant way its done
i shall for the ones interested write up this post try to x plane how you can help your self!
its a long post.and you need to take your time.
its for you benefit that i decided to take time out and it may possibly help you understand .?
first lets talk about how.and what is used.
Web advertisers are increasingly using surreptitious methods ("spyware", "web banners", "web bugs", and "cookies") to identify and track individuals on the Internet without the knowledge and consent of the individuals involved. The purpose is to build a database (a dossier) on web surfers and to use that information for their commercial purposes, including marketing both online and using direct mail.
for some The Internet has become a gold mine to be exploited
your personal information is the coin of trade for the profit of others. In their pursuit of their profit, some vendors have taken the position, that not only are your browser viewing habit.
Some vendors believe that they have the right to track you and your use of your computer for their commercial purposes
on the other hand, do not tell you that they have inserted "spyware" on your system or are tracking your web surfing habits, preferring instead to obtain the information they want about you, secretly and without your consent.
information . is justified by the industry as simply a means to "enhance your browsing experience" through the creation of such "online profiling." However, it is clear that such fine words are a rather poor, attempt to justify being peeping Toms.
They are really saying that by being peeping Toms, they can "target" you with "better" advertisements; ads that might make your more likely to purchase what they are selling.
Yes, . itís all about making money off of you.
yes you heard it all before.and think so what.ok if you the reader feel this way ,this is not for you.
i will again x plane what you can do about it. by using software,like iobit.
and pc blocking methods..
for the ones who do care about there privacy..
How they spy on you
There are several ways that advertising companies (and they are the one driving this phenomena) invade your privacy and get information about you. In combination or separately, use techniques involving
"cookies", "web banners", "web bugs", "pop ups"
plus, spy ware that you have (perhaps unknowingly) installed on your computer that sends information to them behind your back.
let talk about .
"cookie" is a file that the web browser stores on your computer, at the direction of the web server, which contains information about the visit to a web site.
i have used 1 xsample of a site that are honest as to what thy do.
and let you decide one way or the other.
but not all and most will not ..tell you.
Last edited by itsmejjj : Apr. 10th, 2010 at 09:40.
A "web banner" is the advertisement that the advertiser displays on your screen. Itís the pitch for products and services that you see at the top, the sides, and the bottom of commercial web pages. If you click on them, you will be sent to the web site offering the goods of services being advertised.
So what is the problem with this? Whether or not you click on the banner, a cookie is read and written on your hard drive telling the advertiser that you viewed a particular banner ad on a particular web site. How this works is that the web banner is not part of the page you are downloading. It is an off page link to another website (the advertiserís) that records the fact that your web browser saw the web banner ad and from which website you linked from. An example of Information that can be recorded follows:
Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, application/x-shockwave-flash, application/vnd.ms-excel, application/msword, */*
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
(sample from grc site..)
The "Referer:" information tells the server the source of the link to it. Advertisers using web banners use the "Referer:" data to tell the EXACTLY where you were reading the web banner from.
the fact that you view the web page containing a web banner ad causes the stored cookie (that the web banner company put on your machine the last time, also known as a "third party cookie") to be transmitted to the advertiser.
What most people do not know that information A web server can get access to any and all information that you entered in a form for that particular browser session.
A "web bug" is a variation of the web banner described above. However, instead of a visible banner ad, a web bug is a graphic that is usually only 1 pixel in size, and hence essentially invisible. In other words, its only purpose is to track your visit to the page, not to pitch a product or service to you. Other than this, they operate exactly like the web banner advertisement and a visit to a web page with a web bug results in a cookie being placed or read on your machine and an update to the advertiserís database.
Pop up or "Pop under" ads are very popular today. There are hardly any commercial news or entertainment web sites that do not use them. They either appear on top of what you are reading, or underneath it to be visible when you close the web page you were reading.
Pop up ads do EVERYTHING that the web banners do. They plant cookies, they transmit your IP address and goodness knows what else to the advertiser, and they carry one more annoying feature: You must deliberately, manually close them. Advertisers love them because they are "in your face." This is why they are almost universally despised by the rest of us.
Mouse trapping" and other dirty tricks
But they other thing they can do is prevent you from escaping their clutches by turning off the "back" button, or reprogram it into a "launch more junk" button. This is called "mouse trapping." It is an attempt to prevent your leaving their web page
"Spyware" are programs that you have installed on your computer that sends information about your computer to Internet servers in a, invisible background session. The authors of these programs refer to them as "adware," and claim that the are only used to control the display of advertisements on your monitor. Almost always, spyware is installed as part of the installation of a program or software package. Some times, the End User License Agreement (EULA) has a sentence buried deep inside somewhere telling you that data may be sent in the background to an outside Internet server. But most of the time, there is not a notice in the EULA, and the user has no knowledge that he is running a program that is sending information to a server somewhere, to be used for purposes unknown to him.
Many times, this spyware is installed such that it is started when you start your computer. And often, this software has conflicts with the operating system, causing system crashes. Clearly, running a hidden program that transmits data to others without your knowledge
Finally, some spyware programs make changes to the operation of your computer. Some imbed themselves very deeply in the operating system by replacing operating system programs with their own versions. Some reset the defaults of Internet Explorer and override your home page setting to one point to their web site or change the search engine to insure that their customers get preference when you search the web.
Some imbed themselves deeply in the registry and automatically reinstall themselves if you uninstall the software or reset your default home page back to where they want it, after you manually set it. Some disable security controls to make future manipulation of your browser easier for their customer's web sites.
thank you for reading.
hope this is informative.
next part 3 what can we do?
Last edited by itsmejjj : Apr. 7th, 2010 at 23:47.
MANY soft ware vender companies have distributed spyware,links,auto updating,adding to your Browser.SEARCH en gens.such as Google Yahoo.ASK com.that are imbeded into freeware, shareware, or purchases/licensed products. Be advised its growing as this practice spreads.and unknowingly added to your systems. all in the name of better computing!
the new practice , your task bar (toolbar)now infected by auto linkings.update checking.redirecting.and so on..all hidden ,and mostly unknown by you.
you have the right to stop it.the almost instand links made at boot up.most unbeknown to you!
Viral (virus)is a technique to infect your machine into becoming a ad server. The functional effect is very much like that of sypware installed on your machine. The way it is installed, however, differs from spyware that you install that is piggy-backed as part of another program.
Windows Update, the technique that Microsoft uses to automatically install patches on your operating system and other Microsoft products, uses ActiveX to install new versions of the update program on your computer.
This is misused by Alot by (??????) that believe that YOUR computer is also THEIR computer
ActiveX is only one such way that programs (called "malware") can be installed without your knowledge. It is sufficient to know and understand that people ARE trying to use YOUR computer to consume YOUR time to pitch THEIR products.and link.
What do we do about it?
who gives them the right to spy on YOU, record web surfing habits and invade privacy?
PLEASE, DO SOMETHING ABOUT IT!
How to stop cookies
First of all, do not allow them to be recorded on your system. simply put ,BLOCK them
Most browsers have controls that can be used to stop the recording of cookies. If you are using a browser that does not allow you to stop cookies, dump it and get one that does. delete your cookie files.and most browsers will allow the web server to READ existing cookies. Therefore, to prevent information contained in the cookies from being transmitted to the server asking for the information, do not leave them on disk in the first place.clean them up.
some web sites will not allow you to enter or navigate the site unless you allow cookies. These sites will give you some kind of error message telling you to turn cookies back on. If you neither need nor desire the information contained at that web site, move on. On the other hand, if you need to use the web site, then certain browsers allow you to create cookies in memory that are valid for the duration of the life of the web browser task. The remote server thinks that a cookie is being saved, but it will be thrown away the moment you end the browser task.close it.
Alternatively, most web browsers allow you to categorize web sites in terms of trust or danger. In other words, , you can consider sites as "trusted" and allow cookies to be kept and read. That way, you can shut off cookies for all but the trusted sites, and retain the cookie functionality for a select few.
browsers have the capability to prevent advertiser cookies (also known as "third party cookies") from being stored on your system, while allowing the web siteís cookies to be processed separately.
obtain "cookie management" software. software that blocks cookies, allows you to edit them, and/or allows you to delete them.
Disabling cookies is the first line of defense.
How to stop Web Banners, Web Bugs, and Pop Ups
There are several ways to stop web banners and bugs and pop ups from spying on you
obtain banner blocking software, you can misdirect the attempt to connect to the web advertiserís server, upgrade to a mail client that strips such embedded graphics out and shows as separate images.
Banner blocking software works by intercepting the web browserís attempt to display the banner ad or the web bug, and discarding it. Hence, the banner is never displayed because the advertiser web site is never reached. In addition, the advertiser web site never gets to write a cookie on your hard drive and never updates its database to reflect your visit to the web page where the banner ad was. Hence, the attempt at online profiling gets defeated.
Pop up ads are similarly intercepted though advertisers work hard to prevent their ads from being intercepted by using Macromediaís Shockwave and Flash products.
Another way ,the advertiserís plans is to redirect the request to connect to the web advertiserís server and record your visit to the web page
trick the browser to go to an invalid server IP address, instead of the address of the web advertiserís server. Use of this techniques that you have a certain level of understanding on how TCP/IP (the communications protocol of the Internet) works and how to edit system files. If you do not have this knowledge, purchase a good banner blocker or internet security package instead.
You can fool the web browser into trying to connect to the advertiser by telling it to look on your local host address by manually editing a file called the "hosts" file. This file tells system to use the local host address instead of the real IP address. Before your computer requests a DNS server to translate the long form, it will search this "hosts" file first. All you have to do is include an entry for the machine names commonly used by the banner advertising site and point it to the local loop address and you achieve the same result as using an ad blocker.
For example, the following two entries will cause any web page containing a banner page from DoubleClick ,presentation of A advertisement as well as preventing a cookie read/write and profiling database update:
modify your "hosts" file.
the above techniques, banner ad blockers or using the hosts file, will put a major dent, in the ability of the web advertisers to collect profiling data. However, unless you are proficient with TCP/IP, I recommend you acquire a web banner blocker .
How to stop the "Read Receipt" services from knowing if youíve read an email
one way to certainly defeat web bugs put in to determine if you have read a message is to use the hosts file to block the communication between your machine and the tracking server, or to upgrade to an email client that can suppress the automatic execution of the web in HTML formatted email messages.
An example of such a hosts file entry is:
Pre processing email Ė used to check for spam, mostly Ė is another way to determine if email in your inbox might be an HTML formatted message that might have a web bug embedded. An example of a useful email preprocessor is mailwasher type app. program
How to deal with "mouse traps"
The best way to avoid being "mouse trapped" and/or cascading page launches is to avoid the sites most likely to use them. These sites are typically "copycat" web sites, that have a URL that is just slightly different from a real web site so that a common spelling error of incorrect use of a domain identifier, will send you to a bogus web site that launches the mouse trapped/cascading pages. example such is mistakenly typing .
How to choke off spyware, "viral marketers" and malware
There is only one thing to do here. Track down the spyware programs and delete them. There are a number of free programs you can acquire that will scan your system, identify programs modules and registry entries that correspond to known spyware, and then automatically delete them.
But equally important is preventing the spyware from contacting their Internet servers in the first place. In many aspects, spyware acts like a "Trojan horse" virus. Like a Trojan horse, the spyware program attempts to connect with its Internet server. Usually they are used to control the display of advertisements, but they also upload information about you, your computer, and maybe even what files you have on your system. A credible claim can be made that the only difference between a Trojan horse virus and a spyware program is how the collector intends to use the information.
However, if the spyware is deleted, the specific software you have that is infected with the spyware, may no longer work properly. This may not be what you want to do.
Therefore, an alternate WAY, to complete removal may be to prevent the spyware program from "phoning home", instead. In that case, it may be necessary to install a firewall that will block it from doing that."
A firewall, such as ??????? you decide.
the front line in preventing unauthorized communication to a web advertiserís server from a spyware program. These firewalls will present a pop-up message whenever an unauthorized application tries to make contact with a server on the Internet. The firewall user can prevent the application from ever contacting "home" with its load of data from your hard drive, and prevent it from being an "ad-server" and profiler.
recommended that every internet user installs,firewall software one on every computer that access the Internet. unauthorized attempts blocked.. Not only does it keep out hackers and internet worms, but it prevents spyware from linking home.
We can prevent these privacy invaders and spies from succeeding in tracking our movements and maintaining online profiles. We can do something about it. Remember:ITS YOUR PC. Itís YOUR data,Itís YOUR right to privacy.
Itís YOUR right to stop them
i have put this in a broad way so you understand the net.and the bad guys.not all are.and you may want to allow .adverts.cookies, Updates,links, and so on.but be aware.help your self.
please consider some of the post to your benefit.
next lets talk fire walls ,and blocking
a other opinion from this site.
How you can become infected with spyware by Ö
Downloading Files Online
Spyware quickly begins its task of stealing your information (including credit card numbers, user names and passwords), directing your browser to suspect sites, changing or deleting your files, pummeling you with popĖups and slowing your PC to a crawl.
ok read here .yes i know its there fire wall but i am more thinking you get a
understanding what happens.
saves me a lot of explanations.
broadband advice note
A GOOD STAND ALONE ANTI SPYWARE LIKE (WEBROOT SPY SWEEPER )OR AN COMPLETE ANTIVIRUS FIRE WALL ANTI SPYWARE PROGRAM LIKE BITFENDER INTERNET SECURITY V9 ARE RECOMMENDING (OF COURSE THERE ARE MANY GOOD AND NOT SO GOOD PRODUCTS ON THE MARKET ) IT MAY BE DOWN TO USERS PREFERENCE OR EASY OF USE THAT DETERMINES THE END PRODUCT / BRAND USED .
I USE # 3 fire walls (software) and the routers.!
but that's me.
well there are many for you to pic from.from small to huge fire walls.
you decide to your liking and what you feel works for you.
and you think you heard it all before?
sure you may of..but there are new things happening all the time..
please spend a little time learning.
just like all things in life.
try .have fun,i joy the PC.it can be a wonderful thing.but it will at times be disappointing.and confusing .
know what it is...
Last edited by itsmejjj : Apr. 8th, 2010 at 10:16.
hi all so you have read this long winded post? and are here.
Thank you .it shows you are a little concerned..
ok .now .i want to ask you.
have you backed up your system? have a image of your hard drive?
no,,? please do this now..
yes excellent..like myself and others we are in the knowledge were can restore
you may be interested to know i use 5 fire walls (router)
3 ip blockers ,filter program,iobit,360.
yes i am happy with it.and all i personally use and want..
not interested in any other.
ok nothing allowed bar my browser.to access the net.only 1 port used to be out and in bound.always use a proxy.never my own IP...
no udp is allowed.(ports).no java,cookies,scrips,active X ,ping,mail,Icmp.DNS .
no linking to any sites .any thing that tries is blocked!
itsmejjj well done now thats a post .useful important information well laid out eazy to read and understand...
Yours Snoopy2010 , Stupid Guy Here ,3H48002Y4, Former Iobit user, and who ever else I am today or tommrow?
Last edited by Stupid Guy Here : Jul. 12th, 2010 at 00:11.
thank you its been hard work.and i think my best post yet.
please ,any one can think of something i missed ad your comments.
also vote what you think 1 out of 5 .
this would mean a lot to me.i never have ask.and only this one time
Last edited by itsmejjj : Apr. 9th, 2010 at 02:59.
ok this is what fire wall do .looks, fearsome.but no thy all can
a combination.or just 1 .depending how you want it.. or if you think
or is non needed
what extremity is up to you..and how you block and its your business only.no one else should be able to tell you different
talk you out of a fire wall .or convince you different.try to con you into a other one.
stick with what you are most happy with. take no notice of hipe. or stories.posts.or profiteers of fire walls.
take it all in yes .but remember its your system we are talking about.
a free version is as good or can be ,as a so called you pay..for one..
lets talk spy malaware stoppers
Last edited by itsmejjj : Apr. 9th, 2010 at 03:35.
ok listen and read this .please this is my way of running any new app.
nothing to do with iobit.or any one
I try hard to x plane the way i install ---this apply s to any software.no if or but.
ok yes .back up the system..(forget restore point its useless) make a image back is what i am talking about..
ok next your modem.pull out the fhone line..look to see the light go off..
ok now install.find the run,or exe file of the install,left click,run a administrator.
win or a warning should pop up .hit allow(run)
now here watch carefully..look at what it says.agreements.ok next any other pop windows should arrive.
as in options..
be aware.what gets installed.like tool bars.or changing your browser settings..
ok next.and so on..
ok your fire wall will now pop up some where along the install..and ask you this or that.
you answer block....
no if or but..WHY?
if the program stops.it is because it want to link to the net.ok we do not allow it.
sit and watch.normally, most will continue,if not.stiff get rid of it.its malaware,100%
no if or but...if it will not install ..with out the modem on
when done .reboot.run the application.and test it(NO MODEM ON) your fire wall should be still
and not ask any thing more about the program .bar perhaps to allow it..that is all
ok close the application.open your browser.check if any thing has changed.
if you are sure all is well.ok reboot....
lets pretended its 360 you installed.ok run it.
please check the caps how and what you do. first time start.
do nothing els.for now..
i mean nothing ,
first read every thing about the app.
in the help files..
then try out the extras..
so now reboot.all should be running fine.YES?
ok plug in the modem.
tell your fire wall to allow it to the net..360.iobit
from here you can now go ahead and do your ,thing.update.register.
NO? well check why,if you cannot find it.uninstall..fully.
should be good,if not re image the drive..if something is fowled up.
try one more time the above..if you still have problems.ok tell the furum about your experience.
in a nice way .the mallaware fighters well help you .or our admins..
try to sort you out.and the possible problem.
mean time you are back as you were before the install.
thank you for reading this..
yes i know i still use this version!
note please look at the screen shots carefully.
you do this at the first time running of the application.
take particular note of the last screen.
if not sure leave it.and ask some one
(i entered (installed) this Trojan on purpose to demonstrate this app.)
yes i have many on a special cd
then reboot.if all is well then go ahead and do your thing..
Last edited by itsmejjj : Apr. 10th, 2010 at 09:51.
|Thread||Thread Starter||Forum||Replies||Last Post|
|Spying and Tracking you on the Internet||itsmejjj||Lounge||13||Apr. 11th, 2010 09:06|
|Is Comodo Spying on You?||detailer||Lounge||7||Sep. 25th, 2009 03:57|
|tracking cookies||sarathv||ASC General Discussions||4||Jun. 15th, 2009 18:10|
|Is Smartdefrag spying on us?||Iobituser||SD General Discussions||1||Mar. 2nd, 2008 12:18|
|tracking cookies||dinasseti||ASC General Discussions||2||Dec. 10th, 2006 09:57|