Jump to content
IObit Forum
Top Free Driver Updater Tools Best 25 PC Optimization Software Best 22 Antimalware Best 22 Uninstaller Software IObit Coupons & Discount Offers PC Optimizer Mac Boost Advice IObit Coupons A Good Utility Program From IObit IObit Promo Codes IObit Coupon Codes IObit Coupons and Deals FAQs Driver Booster Pro Review

The truth about Google Chrome...


martino

Recommended Posts

Hi all,

 

Thanks for being patient. Now, I will get on with the story. Google Chrome is ineeed Spyware. It is secretly known as a data mining tool with a browser built in. It is known as one of the only software to stay secretly popular for so long without being caught. The way it is built makes it a blazing fast browser, but they use Web Bugs that were caught in action by several people including me that records every activity, even if offline. It is a data mining tool with a browser built in, and anything you do, technically speaking could be modified by them. It also tries to de-proccess some anti-virus progeam in return for their "own" protection. Now that hasn't been too much of an issue, but the most worrisome thing is that it sticks its head where it doesn't belog and redirects information. That's all there is to it. They won't GIVE you a virus, the browser is good to a certain extent, but if you want privacy do not use Chrome too freely. For more info, ask in comments or visit sites about Chrome being Spyware like "Bock The Robber - Chrome can" should be your Google Query for more info. Want to prevent Web Bug from accessing you? I have the extensions that blockd all scripts until you allow it for that site. Stay tuned! All the extensions and a full article is coming your way!

 

--> IMF/ASCU Team <--

Link to comment
Share on other sites

Hi all, just an update. Keep Chrome safer than it was...

 

Hi all, just an update. Keep Chrome safer than it was, just refer to the previous post. The extension to keep the browser safe is one called ScriptNo. Manually allow certain scripts on certain pages, no more allowing all automatically! https://chrome.google.com/webstore/detail/scriptno/oiigbmnaadbkfbmpbfijlflahbdbdgdf

 

Want to switch to Firefox, but make it faster? Also stay tuned for a tutorial on how to make Firefox faster, and enable IObit Malware Fighter security ON Firefox, rather than just having it as an extesnion.

 

--> IMF/ASCU Team <--

Link to comment
Share on other sites

Hi Martino!

 

Thank you for the information as always!

 

An assertion without the supporting information is an opinion though and I have been waiting for your full discussion concerning the browser (by the way, thanks for the helpful link).;-)

 

I also am looking forward to your discussion of the firefox topic as well.

 

Sincerely,

-Mel

Live long and prosper!

Link to comment
Share on other sites

Sorry but I have to disagree. I have already checked google chrome. I have one window open and I run a TCPDUMP. There are no other communications that happened. Only the websites that I browsed. Plus, it is a reputable company and I don't think they would have that kind of intentions. icon_smile.gif

Link to comment
Share on other sites

what is Data mining ?

 

Hi Melvin

An assertion without the supporting information is an opinion . . .

yes, that is correct!

we make no assertion, and we do not mean

we know. . .

we have an opinion, but we mean only at home

in the general public we know. . .

 

what is Data mining ?

 

Not to be confused with analytics, information extraction, or data analysis.

 

definition:

Data mining (the analysis step of the "Knowledge Discovery in Databases" process, or KDD), a field at the intersection of computer science and statistics, is the process that attempts to discover patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Aside from the raw analysis step, it involves database and data management aspects, data preprocessing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating.

The term is a buzzword, and is frequently misused to mean any form of large-scale data or information processing (collection, extraction, warehousing, analysis, and statistics) but is also generalized to any kind of computer decision support system, including artificial intelligence, machine learning, and business intelligence. In the proper use of the word, the key term is discovery, commonly defined as "detecting something new". Even the popular book "Data mining: Practical machine learning tools and techniques with Java" (which covers mostly machine learning material) was originally to be named just "Practical machine learning", and the term "data mining" was only added for marketing reasons. Often the more general terms "(large scale) data analysis", or "analytics" – or when referring to actual methods, artificial intelligence and machine learning – are more appropriate.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records (cluster analysis), unusual records (anomaly detection) and dependencies (association rule mining). This usually involves using database techniques such as spatial indexes. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis or, for example, in machine learning and predictive analytics. For example, the data mining step might identify multiple groups in the data, which can then be used to obtain more accurate prediction results by a decision support system. Neither the data collection, data preparation, nor result interpretation and reporting are part of the data mining step, but do belong to the overall KDD process as additional steps.

The related terms data dredging, data fishing, and data snooping refer to the use of data mining methods to sample parts of a larger population data set that are (or may be) too small for reliable statistical inferences to be made about the validity of any patterns discovered. These methods can, however, be used in creating new hypotheses to test against the larger data populations.

 

--> IObit Europe Laboratory <--

Link to comment
Share on other sites

Hi Martino.

 

O.K. I don't recall asking about the definition of data mining, but hey there's a language barrier.:-)

 

Thanks for setting the technical term platform... that is understood.;-) I am really looking forward to your analysis on this though... "Stay tuned! All the extensions and a full article is coming your way!" (from post 1 "concerning the truth about google chrome").

 

When will the "full article" be posted? I really would like to read... you make substantial claims and I, being most curious about this subject, eagerly await the substance you offer; otherwise its only an assertion or opinion.

 

Sincerely,

-Mel

Live long and prosper!

Link to comment
Share on other sites

Hi martino

This "definition" of data mining looks very much like the one in Wikipedia

(but it is a bit esoteric for my taste)

 

Mining is commonly understood as prospecting for resources (most people think about natural resources in this connection i.e. iron, gold, copper, coal, oil etc.) , when you then do it in the context of data, I then understand it as a method to look for the resources that the data mining collecting agencies are interested in. This can be a large variety of things fx. which product that are being purchased or what other things that people look at to name a few.

Even without cookies I think you should be able to glean some information from the data that can interest companies, states, demographers and so on. With the (tracking) cookies you can make this relate to individuals.

And in this forum context of malware discussion isn't that what we are interested in?

Cheers

solbjerg

p.s. I remember an episode in a math lesson from my 9th grade (53 years ago), the textbook "explained" a calculation, but I didn't really understand and I therefore asked the teacher to explain it to me.

He then proceded to read the text from the textbook - this of course didn't help me

Luckily I have an older brother that understands those things and he could explain it to me in layman's terms

 

 

Hi Melvin

An assertion without the supporting information is an opinion . . .

yes, that is correct!

we make no assertion, and we do not mean

we know. . .

we have an opinion, but we mean only at home

in the general public we know. . .

 

what is Data mining ?

 

Not to be confused with analytics, information extraction, or data analysis.

 

definition:

Data mining (the analysis step of the "Knowledge Discovery in Databases" process, or KDD), a field at the intersection of computer science and statistics, is the process that attempts to discover patterns in large data sets. It utilizes methods at the intersection of artificial intelligence, machine learning, statistics, and database systems. The overall goal of the data mining process is to extract information from a data set and transform it into an understandable structure for further use. Aside from the raw analysis step, it involves database and data management aspects, data preprocessing, model and inference considerations, interestingness metrics, complexity considerations, post-processing of discovered structures, visualization, and online updating.

The term is a buzzword, and is frequently misused to mean any form of large-scale data or information processing (collection, extraction, warehousing, analysis, and statistics) but is also generalized to any kind of computer decision support system, including artificial intelligence, machine learning, and business intelligence. In the proper use of the word, the key term is discovery, commonly defined as "detecting something new". Even the popular book "Data mining: Practical machine learning tools and techniques with Java" (which covers mostly machine learning material) was originally to be named just "Practical machine learning", and the term "data mining" was only added for marketing reasons. Often the more general terms "(large scale) data analysis", or "analytics" – or when referring to actual methods, artificial intelligence and machine learning – are more appropriate.

The actual data mining task is the automatic or semi-automatic analysis of large quantities of data to extract previously unknown interesting patterns such as groups of data records (cluster analysis), unusual records (anomaly detection) and dependencies (association rule mining). This usually involves using database techniques such as spatial indexes. These patterns can then be seen as a kind of summary of the input data, and may be used in further analysis or, for example, in machine learning and predictive analytics. For example, the data mining step might identify multiple groups in the data, which can then be used to obtain more accurate prediction results by a decision support system. Neither the data collection, data preparation, nor result interpretation and reporting are part of the data mining step, but do belong to the overall KDD process as additional steps.

The related terms data dredging, data fishing, and data snooping refer to the use of data mining methods to sample parts of a larger population data set that are (or may be) too small for reliable statistical inferences to be made about the validity of any patterns discovered. These methods can, however, be used in creating new hypotheses to test against the larger data populations.

 

--> IObit Europe Laboratory <--

Link to comment
Share on other sites

--> for any IT professional to understand <--

 

Alright, so here it goes everyone. See it for yourself. The Google Toolbar is believed to collect EVERYTHING, and I mean EVERYTHING that goes on, on your PC that makes it easier to give you viruses and use up MASSIVE amounts of RAM that basically torture and make your computer vulnerable. See it yourself by downloading and MONITORING Google Chrome's Spyware behavior.

 

Download SpyStudio from Nektra’s website free of charge and install it.

Replace the database ‘deviare.fdb‘ with a new version. You will find ‘deviare.fdb’ in the path you installed SpyStudio: SpyStudiobin

Download the script chromewatcher and then add the path where you saved it to SpyStudio. Edit -> Preferences -> Python

 

Run SpyStudio and import the module chromeWatcher by typing “import chromeWatcher” in the Python console. Then start monitoring by calling the Begin() function by typing “chromeWatcher.Begin()”.

Now watch SpyStudio while using Google Chrome to find out what information is sent by Chrome.

 

--> for any IT professional to understand <--

Link to comment
Share on other sites

Yes... interesting, I agree Toppack.

 

The Google Toolbar is believed to collect EVERYTHING, and I mean EVERYTHING that goes on, on your PC that makes it easier to give you viruses and use up MASSIVE amounts of RAM that basically torture and make your computer vulnerable. See it yourself by downloading and MONITORING Google Chrome's Spyware behavior.
Hi Martino,:-)

 

It would be nice if you substantiate clearly the claims within the text of your posts here... as this is an open forum... Stating... "--> for any IT professional to understand <-- " doesn't satisfy the needs of the members here as there are very few IT Professionals here and offers no help to the members here at all.

 

 

So what are we talking about here? Google Chrome or the Google toolbar? Why should somebody trust your post?

 

is believed to collect EVERYTHING
by who(who believes)?

use up MASSIVE amounts of RAM that basically torture and make your computer vulnerable
Please demonstrate this... and provide direct established evidence. (not a software to be trusted or not)

 

Sincerely,

-Mel

Live long and prosper!

Link to comment
Share on other sites

... cheers ...

 

hi melvin

 

it's ok, if the IObit forum users are not IT professional.

it's not ok, if IObit Forum Admin and Moderator are not full IT professionals.

 

we speak here of full IT professional with certificate. but not of 1 day IT course with certificate, 2 day IT course with certificate or of 1 month IT course with certificate or of 6 months IT course with certificate, we speak of full IT Professional with 3 year education and certificate, this is only a basic education, then can we specialize such example: network specialist and takes again 1 year up to 3 years education and so on, or you can then 3 years computer science study at a university.

that's IT professional or that's full IT professional !

 

If only one IObit Forum Admin or one IObit Forum Moderator his 3 year basic IT certification education here posting in the IObit forum,

We will our apologies in all public.

 

The IObit forum Admins and moderators make here a really good job but too few for our tastes IT professional.

 

why should we post here more than 300 A4 pages of our laboratory test report, when here in the IObit forum nobody can read?

 

sorry melvin, makes no sense.

 

... CHEERS ....

Link to comment
Share on other sites

Hi GUYS!

 

Gentlemen of IObit Forum!

 

Please do not start another nonsensical rat race here.

 

We all know the formation of the IObit Forum Leaders.

 

All of us are free to give information and opinion of ours here, and WHO ever benefits from that, it is good for the IObit Forum.

 

Thank you and cheers.

Link to comment
Share on other sites

Gentlemen of IObit Forum!

 

Please do not start another nonsensical rat race here.

 

We all know the formation of the IObit Forum Leaders.

 

All of us are free to give information and opinion of ours here, and WHO ever benefits from that, it is good for the IObit Forum.

 

Thank you and cheers.

 

While I agree fully with Enoskype, I cannot in all conscience accept Martino's comments without reply.

I accept fully that Martino has a serious issue with Google Chrome, and it is his right to voice his opinion. I also accept that Martino believes himself to be an IT professional. Again that is his right. He can believe whatever he wishes, however he must accept that believing in something does not make it true.

I have previously had occasion to ask Martino not to enter into personal attacks on the Forum. However, this latest post cannot be seen as anything other than a personal attack on both the Forum and the leaders.

Martino's need to constantly remind everybody of his prowess and ability in the IT fiels, is indeed a matter which needs the type of help which cannot be obtained on this forum, and I strongly recommend that he should seek out a forum which deals specifically with such issues.

As for Martino's comment on what the abilities of the Forums leaders should be,,,, It does not even merit a reply.

I fully accept that I will probably be in trouble with Admin, but sometimes one just has to make a stand for what is right.

While all contributors to Martino's thread have voiced their opinions/critique without becoming personal. I am afraid that Martino has not returned the courtesy. I am afraid that I have no option but to conclude that Martino would appear to believe that anyone who does not agree with him must be wrong, and anyone who does not have certain qualifications does not have a right to an opinion.

The Users and leaders of this Forum are decent and caring people, who share knowledge and experience freely, and to be denigrated by Martino because of his own belief in his own superiority, is I am afraid a step too far for me.

I endeavour at all times to treat all people with respect, and I apologise to all members of the Forum in advance if they feel I am being harsh to Martino, but I simply cannot accept his negative comments.

 

 

My apologies to all in the Forum,

Link to comment
Share on other sites

Hi Scannan

While the thread subject may be interesting I think that the forum impetus should be on helping ordinary users with problems.

There we have to try to explain everything as clearly and simple as we can and if possible avoid esoteric lingo and too many acronyms :-)

I plead guilty to not always adhering to my own principles, - sorry!

Cheers

solbjerg

Link to comment
Share on other sites

hi melvin

 

it's ok, if the IObit forum users are not IT professional.

it's not ok, if IObit Forum Admin and Moderator are not full IT professionals.

 

we speak here of full IT professional with certificate. but not of 1 day IT course with certificate, 2 day IT course with certificate or of 1 month IT course with certificate or of 6 months IT course with certificate, we speak of full IT Professional with 3 year education and certificate, this is only a basic education, then can we specialize such example: network specialist and takes again 1 year up to 3 years education and so on, or you can then 3 years computer science study at a university.

that's IT professional or that's full IT professional !

 

If only one IObit Forum Admin or one IObit Forum Moderator his 3 year basic IT certification education here posting in the IObit forum,

We will our apologies in all public.

 

 

 

 

Hi Martino.

 

It is my completely volunteered duty to help make some sense out of this forum... As well as the other forum leaders. (I have a four year certificate here doing that)

 

 

 

If I recall correctly I was only asking for you to please continue your disertation on the subject concerning Google chrome

 

http://forums.iobit.com/attachment.php?attachmentid=10950&d=1354501729http://forums.iobit.com/attachment.php?attachmentid=10951&d=1354502251

 

 

 

 

 

... I don't recall asking you to dump data here (which wouldn't be allowed anyway as this is a user help forum, and that wouldn't be helpful). Just to provide some evidence to your claim so you might be helpful.

 

 

 

Sincerely,

-Mel

Live long and prosper!

 

P.S. This post was absolutely not helpful... Maybe as an IT professional you should decide if you wish to post on a free user help forum in a helpful way???

Link to comment
Share on other sites

If I can add my two sense...part of what has been pointed out is somewhat true, to a certain degree. We know that google does in fact collect data from us, and, has the potential to do so with their browser. With a bit of a google search in regards to Chrome information gathering, a few interesting websites should come up. To label it spyware is a bit harsh.

 

I suppose it is wise for those to read up on articles, and, decide for themselves what they wish to make of it. I personally use Chromium, which is the open source version of Chrome, and since the code is "open", I believe its slightly safer.

 

But thats a whole different story. Just my thought on all this...

Link to comment
Share on other sites

Aye Vman!

 

That is exactly why I asked for the supporting post... now it has become this??:shock:

 

Sincerely,

-Mel

Live long and prosper!

 

P.S. Good to see you!

If I can add my two sense...part of what has been pointed out is somewhat true, to a certain degree. We know that google does in fact collect data from us, and, has the potential to do so with their browser. With a bit of a google search in regards to Chrome information gathering, a few interesting websites should come up. To label it spyware is a bit harsh.

 

I suppose it is wise for those to read up on articles, and, decide for themselves what they wish to make of it. I personally use Chromium, which is the open source version of Chrome, and since the code is "open", I believe its slightly safer.

 

But thats a whole different story. Just my thought on all this...

Link to comment
Share on other sites

Hi Melvin

I think it was Thomas Jefferson (President US) who said that he had never heard a debate or a discussion that ended by one of the opponents conceeding the points made by the other.

This is probably not quite true, but he had a point!

Einstein didn't like the uncertaincy principle in quantum mechanics and used the famous quote "God doesn't play dice with the universe" to express it.

But I think that precisely the uncertaincy could make it interesting for God to see what would happen, - we owe him/her/it that much fun at least :-)

Cheers

solbjerg

p.s. Most of our genetic makeup was probably formed during our hunter/gatherer existence (and even football/soccer and other sports haven't done away with war) :-)

p.p.s. Jefferson also said that if you get angry - count to ten - if you get very angry count to one hundred

p.p.p.s Abraham should have gone further and said that if there were just one righteous person (probably not Lot) in Sodoma/Gomorah or Hiroshima/Nagasaki God should spare the cities

 

 

Aye Solbjerg!Things must at least be explained so they can be validated or denied.

 

Sincerely,

-Mel

Live long and prosper!

Link to comment
Share on other sites

www

 

Hi martino

I believe the problems about much of what we call malware to be essentially legislative and political issues in essence.

We have to define what kind of malware is unacceptable and we then have to pressure goverments to implement laws against it globally.

We have established an internet that are free for all, and data mining will be possible even without ordinary cookies.

This is OK I think, - we ourselves also collect data to satisfy our quest for knowledge or simply out of curiosity.

One thing that many object to is the collection of personal data that is going on and the spam generated for advertising purposes. (spam is about at least 85% of the traffic on the internet.)

In many developed countries they are beginning to talk about doing away with cash - we all have a Visa card or something equivalent and do not really need the cash.

This will mean that every single thing we buy will be recorded.

Talk about privacy here!

For example I buy quite a lot of cigarettes (85% taxes) - but I haven't yet seen a discount on my personal IRS forms. :-)

Cheers

solbjerg

Link to comment
Share on other sites

hi solbjerg . . .

 

hi Solbjerg

 

after the definition of IT, it belongs in this category.

 

IT definition: spyware

Spyware is a type of malware (malicious software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users.

While the term spyware suggests software that monitors a user's computing, the functions of spyware can extend beyond simple monitoring. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user logins, and bank or credit account information. Spyware can also interfere with user control of a computer by installing additional software or redirecting Web browsers. Some spyware can change computer settings, which can result in slow Internet connection speeds, un-authorized changes in browser settings, or changes to software settings.

Sometimes, spyware is included along with genuine software, and may come from an official software vendor. In response to the emergence of spyware, a small industry has sprung up dealing in anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer.

 

We have nothing against google chrome and no problems

 

but

 

IObit Malkware Fighter and IObit Advanced SystemCare Ultimate mission:

 

We are here to defend the welfare of all users, no matter the platform, the nature of the user nor the magnitude of the challenge. We will do whatever it takes to keep computer users safe from harm and help the Good prevail. Always!

 

cheers

 

martino

Link to comment
Share on other sites

Archived

This topic is now archived and is closed to further replies.

×
×
  • Create New...