![]() |
![]() |
Email Marketing Information |
|
![]() |
![]() |
Who’s Watching What You TypeRobert Palmer If someone entered your home, uninvited and installed numerous cameras and listening devices in order to monitor your activities, you would quite rightly be outraged. While such a situation, unless you are living in the Big Brother House, would be considered ridiculous, the same cannot be said for the humble home computer. Recently released research alarmingly shows that home PC’s are increasingly likely to host software which can watch each and every keystroke the user inputs. According to the research compiled from an audit conducted jointly by the software firm, WebRoot and services provider, EarthLink, the average home PC hosts 28 so-called spyware programs. Whilst the worst examples of spyware are written by virus writers to steal passwords and hijack computers to launch “denial of service” attacks against web-servers, the vast majority are used to collate marketing information and then target advertising according to the end-users web surfing habits. The WebRoot/EarthLink audit surveyed more than 1.5 million PC’s during the last 12 months and discovered an amazing 41 million incidents of spyware; adware, Trojans, tracking cookies and other undesirable programs. Most of these programs are loaded into the computer memory when the PC is started up. From here, the program will work silently, often giving no clues as to its existence. However, unexplained browser window pop-up’s, often advertising adult services and mysterious alterations to the browsers homepage setting are more often than not an indication that spyware is present and active on a computer. One particular piece of spyware, which is proving to be very expensive for many home users, is that of Trojan Diallers. Diallers, often without any warning to the end-user, hangs up the current net connection and then automatically reconnects using a Premium Rate telephone number, thus running up huge telephone bills. The activities of companies using this technology as a revenue stream are currently under investigation in the UK by government watchdogs. A hard-disk and memory overflowing with spyware used to be one of the unfortunate consequences of visiting sex and adult orientated sites; a kind of eSTD. Like most Internet marketing technologies, from the pop-up to the pop-under and the first snowball of Spam, spyware began life serving the adult industry. Then, just like pop-up, spyware filtered through all aspects of ecommerce. In an interview to the BBC, David Moll, CEO of WebRoot, said that spyware has now become so common across the whole of the Internet, that it can be contracted from nearly anywhere. So-called “drive-by downloads” are now responsible for most infections of spyware. The term “drive-by” refers to the casualness of the infection. By simply visiting an ordinary webpage a user can unwittingly initiate an automatic download of spyware onto their computer. There are no clues and no warnings. In a recent, carefully controlled and closed demonstration, it took me less than 20 minutes to create a spyware program and embed it into a webpage. Using colleagues who had previously been made aware of the nature of the experiment, I invited them to take a look at this “special” but very ordinary looking webpage. Within seconds of visiting this webpage, the spyware went to work taking a snapshot of their hard disk, a snapshot of their Favourites folder and a copy of their browsing history. Before they had even finished reading the webpage, the spyware was already transferring their information to my server. It’s as easy as that! Equally that same code could be manipulated to perform a total trash of the hard disk or some other equally miserable and criminal act. Speaking to the BBC, David Moll explained. "Some spyware programs lurk on misspelled URLs and strike those that type faster than their fingers can carry them. As a result you do not end up where you expect to be." Alarmingly, users do not even need to visit a website to contract spyware. The preview window in Microsoft’s Outlook Express allows emails containing HTML and any other code which can be placed on a normal webpage, to be loaded, without warning. Companies looking to implant spyware using the “drive-by” principal are regularly exploiting this glaringly obvious flaw in the design of Outlook Express. "If you get one piece of spyware, you will get five because the business model says they pay each other to pass on information about victims," said Mr Moll. Thankfully anti-spyware/adware programs such as Ad-Aware free and WebRoot’s own offering, Spy Sweeper can clean up a PC and even help prevent further infections, but just like anti-virus software, anti-spyware software needs to be kept up-to-date to remain effective. In addition to providing software solutions to this problem, legislators too are seeking to end this electronic intrusion. In the USA an anti-spyware bill is moving towards approval in Congress. If successfully implemented, this bill will force firms who wish to use spyware to first receive permission from the end-user before it is installed. But even before any new laws come into place, spyware makers are already working on next generation coding which keep their programs intact and operational….perhaps even on your PC. Related Links: WebRoot Spyware Audit http://www.webroot.com/services/spyaudit_03.htm Ad-Aware http://www.lavasoftusa.com/software/adaware/ WebRoot http://www.webroot.com/
|
![]() |
![]() |
![]() |
RELATED ARTICLES
Resources For Staying Current of IT Advancements For Online Business Owners The internet and associated technology changes at a relatively fast pace. For anyone working in fields that make extensive use of IT technology, it is crucial to always stay one step ahead of the game. Keeping up the pace can be challenging and seem utterly impossible at times without the help of resources to pull from. Who’s Watching What You Type If someone entered your home, uninvited and installed numerous cameras and listening devices in order to monitor your activities, you would quite rightly be outraged. While such a situation, unless you are living in the Big Brother House, would be considered ridiculous, the same cannot be said for the humble home computer. When Internet Marketing Gurus Sell Their Soul If youre just getting started in Internet Marketing, you may be awed by the amount of "Internet Gurus" out there, each one making millions of dollars or so they claim and for some reason seem more than willing, for a fee, to teach you their biggest, most intimate secrets. Email Microtargeting Email marketing is undergoing rapid changes. Now, more than ever, both the creative and demographic selection and targeting of a message must be highly relevant and qualified. Bulk Email, Spam, and Email Marketing Excerpted from PlanetLinks Enews - an email newsletter delivered for FREE to your computer. To subscribe, go to www.planetlink.com Rogue Dialers - The Nets Latest Scamola! If recent news stories concerning worms, trojans and security exploits within Microsofts Internet Explorer, left you feeling vulnerable, this will leave you terrified. PCs the world over are already being hit by a new breed of trojan type software called Rogue Dialers. More malevolent than most ordinary spyware, Rogue Dialers actually hijack the computers modem and then uses it to dial-up a premium rate telephone number, racking up huge telephone charges. Many Dialers operate whilst the victim is actively surfing the Net by dropping the current connection and then performing an automatic reconnection via a premium rate number. Most scary of all are the Dialers which connect themselves to a premium rate number while the victim is away from their machine, achieving this by detecting long periods of inactivity. Building an Email Marketing List Theres a marketing estimate that it takes something like seven contacts with a potential client before they purchase. Email is a wonderful way to handle these contacts for a variety of reasons: Email Marketing Losing Its Effectiveness The Alternative Is Desktop Marketing! Youve heard of email marketing, but it isnt what it used to be. With todays abundance of spam and even opt-in email solicitations, your messages are competing against hundreds of incoming messages daily. How are you ever supposed to stand out How To Use RSS Feeds In Your Marketing It was Friday night. I finished reading a book about RSS feeds. Quickly set up one for my site, submitted it on directories and went to bed. Software Piracy - Global Increase Pirated software is on the increase and now accounts for over one third of the software installed on the worlds computers and its cost the software industry a staggering, $28bn £12bn last year in lost revenues. Thats the startling claim of the UK based, Business Software Alliance. Their annual survey of global software piracy shows that some 36% of software applications were illegally installed and being used during 2003. How To Evaluate A New Business Opportunity If you are searching for ways to earn an income using the internet, you must have already come across many programs with unbelievable claims of overnight income. This article outlines 7 criteria that I use to evaluate any opportunity that presents itself before me. Why Does Your Business Need An Autoresponder Suppose you have a website with 500 visitors a day, and one in fifty of them requests information. Thats ten e-mails youre going to have to send manually for the next few days or weeks. And tomorrow you get another ten, and the next day another ten... can you imagine how complicated managing this process could be The Biggest Problem With Your Marketing Is... What is the biggest problem most marketers have Who knows. We dont, and they certainly dont either. That is exactly the problem. Most marketers dont know whether or not their campaigns are working because they dont know how to track the results. Build or Buy--Should You Build Your Own Opt-in Email List The easiest way to acquire an email list for your ezine or email marketing is just to buy one. Theyre not too expensive, and they provide you with a long list of names and email addresses. Interactivity Is Key How to use the latest in Interactivity tools to increase sales and provide exceptional customer service Different Models For Making Money On The Internet There are several strategies for making money on the net. Here are some possible options: My Emails Are Not Being Delivered. Black Lists and White Lists Explained. Over 40% of all emails within your marketing campaign are not being delivered. You may not even be aware of this, as many ISPs will not send back a bounce message. In fact if you are sending messages to AOL customers, AOL is now blocking over 80% of the messages that come into their servers. Promote Your Website - Link Popularity What is link popularity Search Wars! - MSNs Opening Salvo With all the recent publicity given to Google as the Internets number one search service, its hardly surprising that Microsoft has already started work on re-vamping their MSN search service. Okay, its still powered by the Yahoo engine, but according to Microsoft it has been "cleaned up" and the new service mirrors much more the kind of "non-commercial" results which are currently displayed by Google. Writing e-Newsletters – Tricks of the Trade Follow 10 simple rules of thumb, and you’ll soon be writing great e-newsletters and reaping the rewards. ![]() |
home | site map |
© 2005 |