Adware & Underware - The Definitive Guide

Discussion in 'privacy general' started by Paul Wilders, Oct 19, 2002.

Thread Status:
Not open for further replies.
  1. Paul Wilders

    Paul Wilders Administrator

    Jul 1, 2001
    The Netherlands
    "Both the computing world and commercial enterprises indulge in as much snoopery as any other branch of human existence, and the ethical questions and variety of practices employed in both areas are just as wide-ranging as anywhere else -- especially when they overlap. At the more objectionable end of personal and business computing is the branch of often harmful, usually unethical, and always invasive category of software utilities, browser add-ons, and advertising tactics clumped together under the terms "spyware," "adware," "thiefware," "malware," and other labels. These range from programs that transmit data on your surfing and purchasing habits to advertising cartels, all the way to virus-like programs that hijack your computer and force you to visit designated sites (anything from vendors to porn purveyors). They may change your computer's settings, damage your file structure, disable other programs, and surreptitiously share your computer's resources with other networks."

    This is part of a very nice white paper, worthwhile reading. Read the full story here.


Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.