Spyware Information |
|
The Dark Side of P2P File SharingBill Paulk P2P file sharing programs are free. Period. But there are P2P scam sites out there that want you to pay them instead. P2P scam sites are rogue companies that have set up shop to fleece unsuspecting music downloaders looking for file sharing programs by charging a fee for an otherwise free service. No P2P file sharing software costs money. Exceptions would be a site asking members to make a monetary donation to help pay for bandwidth, hosting costs, and other administrative costs. Some P2P file sharing programs offer "pro" versions of their free software. But again, their basic service is free to the public. I want you to fully understand this, because paying a P2P scam site money can not only make your wallet a bit lighter, it can also make your computer vulnerable to dangerous spyware. Thats right. These scam sites are only interested in making money off you. As well as actually taking your money by fooling you into paying them, theyll make money off you by installing spyware on your PC, so that they can get paid by sharing your online habits and personal information with others. For music download beginners, all of this can be very confusing. Why Because these scam sites advertise all over the Internet. Search engines return results chockful of these scams alongside the real P2P file sharing programs; their banner ads riddle the Internet landscape; sites are promoting these scams to get their piece of your money. Most real P2P programs dont advertise much on the Internet. The reason is that theyre not money makers. It takes money to advertise, and who has more money--the free P2P file sharing programs or the scam artists You guessed it. P2P relies on word of mouth. The scam sites rely primarily on advertising. How Can I Tell a P2P Scam Site This is the easy part, if you know what youre looking for. P2P scam sites often use phrases like 100% Legal, which is absolutely untrue. This is a trick they use to prey on people interested in P2P file sharing programs, but who are worried rightly about Recording Industry Association of America RIAA lawsuits. Keep in mind that sharing and downloading of copyrighted files is, at this moment, an illegal activity. Another tactic is to use fake endorsements and recommendations from legitimate companies. Other cons are to use phrases like Direct Downloads!, Get Access Now!, Download Unlimited Free Music!, and other phrases that are promising you things they absolutely CANNOT deliver. How Does It Work & How are They Doing It To be honest, I do not know the ins and outs of P2P scam sites. But I know this: all P2P file sharing programs are free. Think about it a moment. It is because music files are being shared free of charge without artists receiving royalties that organizations like the RIAA are mad and suing. These P2P scam sites are merely taking your money, downloading a little spyware to your PC, then connecting you to one of the real P2P file sharing programs. This is all convoluted by the nature of P2P, which is a series of servers networking files to one another. Unless youre buying your music MP3 downloads from a legitimate company, either per song/album or through a monthly subscription, you cannot be sure where your music is coming from. The legal status of P2P file sharing programs is confusing. We know that MP3 files themselves are not illegal. For example, its legal to possess MP3s, to rip your CDs to your hard drive, and to burn CDs for your personal use. But, by sharing and/or downloading these files, you are breaking copyright laws. To my knowledge, P2P scam sites are not actually breaking any laws. But why pay for something you dont have to One of the most common techniques these scam artists use is to set up sites that are misspellings or derivations of popular P2P file sharing programs. KaZaA is probably the most hijacked name being used these days. Other sites may not actually charge you anything at all, but theyll "give you the software for free" if you give them your email address. This too is a scam. Because once again, theyre just sending you along to a proper P2P program, but after collecting your email address, theyre selling it to third parties. Dont give these scammers any of your personal information! If youre on a website you trust, even this website, you may see ads by these scam artists, preaching their lies about 100% blah, blah, blah. For your own security, dont click on the links. Theyre still scams. Many independent websites rely on ads to pay the bills. We dont always have full control over what advertisements appear on our sites. Keep in mind that most online advertisements are arranged and distributed by third-party companies who pair up advertisements with appropriate keywords. So a page that discusses "music downloads" is likely to have an ad from a scam site singing their own false praises. On this note, there are sites all over the Internet that actually promote P2P scam sites. Why I have my opinions. First, these scam sites are paying large sums of money to affiliates who promote their sites. For example, a scam site may be charging you $29.95 for their non-service. Well, theyre paying affiliates over half Ive seen the pay-out as high as 75% of that just for getting you, the visitor, to their scam sites. I Think Ive Used One of these Scam Sites. What Do I Do Now Stop! Right now, stop using that service. If youve got some type of monthly payment with them, stop paying them. Cancel your "membership," contact your bank or credit card company, and stop paying them immediately! Secondly, your computer has probably have been infected by spyware, and you need to remove it right away. I recommend purchasing spyware-removal software like Pest Patrol because they do the best job at clearing out spyware parasites. If youve been pulled into a scam site, just rack it up to experience. Their ad copy is very convincing, and you just wanted to "be legal" while downloading. Take heart in knowing that youre not alone. But youre better off now, with this information at your disposal. In my opinion, this is another reason to consider not using P2P file sharing programs as a means to get your online music. I think that these P2P scam sites will increase in number, and will use more clever tactics to get your money and your information. Until the peer-to-peer communities are regulated in some way, I fear that these types of activities will get worse before they improve.
|
RELATED ARTICLES
Tips For Safer Computing Online New computer viruses threaten the unwary user everyday. Hackers jeopardize your online security with invasive computer techniques to steal your passwords, personal information, even identity. Watch Out For Spyware Programs That Slows Down Your Computer System Spyware is a program that once loaded on your computer unknowingly collects information from your PC and sends it to another party. The most dangerous types of Spyware programs copies personal information that you would not share with anyone such as passwords, files and credit card numbers. How To Stop Spam Special Report: How to Stop Spam The Year of Spyware In retrospect, the year 2004 made significant milestones that will forever change the future of internet spyware related issues. Various spyware issues were addressed and a fast growing market evolved around spyware. What Does The Year Of The Rooster Have In Store For The Digital World Roosters are supposedly deep thinkers—capable of handling any challenge, they are outspoken, aggressive, talented, and courageous. Small Business Computer Security, the Basics Anyone in business today realizes both the natural dependency on computers in the workplace, and also the potential dangers associated with storing important data on them. Today’s business owners are constantly being reminded that their company’s data is at risk by the daily reports on various news stations, or even their favorite business-related website. But what can a typical small business owner do to protect their network from these threats that are broadcasted in so many ways Dangers lurk at every turn on the Internet. There are thousands of attacks or areas of security that could be discussed, but I am going to try and focus on three general nuisances associated with today’s computers: viruses, spy-ware, and traditional “hackers” that will intentionally try to exploit your computer systems for various reasons. All of these attacks, although different, serve a specific purpose for the attacker, yet basically translate into three things for a business: lost productivity, lost data, and the end result… lost money. Here is brief descriptions of what the aforementioned attacks are, consist of, and what a typical small business can do to protect their technology investments. Arm Yourself Against Snoops With Spyware Counterintelligence Spyware is the cyber-equivalent of a peeping Tom. No one would think of sitting by while someone hide in the bushes watching their every move, so why do so many allow spyware snoops to moniter them online In some cases the answer is simple. They may not even know that they are being watched. Your Computer May Be Infected. Heres How To Check.. NOT about virus NOTE: Please take time to read on - it may be vital for your PCs security. If you are not in the mood, just save it or print it out for later reference. Explore the Internet in a Whole New Way For a long time now Microsofts Internet Explorer has ruled as King of Internet browsers. Like most of Microsofts products an initially brutal marketing campaign pushed Internet Explorer into the mainstreams consciousness and from then on it was the logical, default choice. Its free with the operating system, works well, loads any page and is easy to use. Other web browsers soon faded into obscurity and sometimes even died in the shadow of the new king of the pack. Netscape Navigator, the former King of the browsers, has now ceased commercial operations and has been taken over by the fan base. Opera is fading into obscurity and Mozilla was facing a similar fate, until recently. Tops In Toolbars Most internet marketers are aware of, and probably use, the Google Toolbar. After all, it has been the only indicator of Googles PageRank number that has been assigned to a given web page. Whether the number is accurate, important, or even updated any more is a matter of debate on the marketing forums. But the only feature that was really worthwhile for more casual surfers, other than being able to use the Google search box directly, was the popup window blocker feature, which oddly enough, is the least favorite feature of many an internet marketer. But for many surfers now, the Yahoo Toolbar may well be a better choice. A 3 megabyte download for computers running Windows 98 or higher and Internet Explorer 5.0 or higher, the Yahoo Toolbar not only offers greater interactivity with Yahoo and My Yahoo, but now offers some benefits for your PC as well. 26 Tips on How to be Safe in Your eBay Selling and Buying The irony of eBay is that as it grows to be ever more successful, it draws the unsavoury element of the internet towards it. Im talking about people who make it their business to attempt to defraud you and I in our eBay and PayPal transactions. How To Choose A Fire Wall Software Program In the real world a "fire wall" is a fireproof wall that is built to stop the spread of fire from one part of a building to others. In the Internet world a firewall has a similar purpose in that it stops the spread of harmful viruses and attacks from entering your home or office network. Rid Your Computer of ITD - Internet Transmitted Diseases Spyware or malware has become very prolific in the past year but there are some things you can do to limit your infection by it. The Dangers of Peer-to-Peer Systems Peer-to-Peer P2P systems do not operate on secure lines, thus providing a conduit for hackers to enter a network or computer, access personal and confidential information, as well as deploy viruses or worms. Users of P2P systems are prime targets and/or launching points for malicious hacker attacks simply because it requires downloading and sharing electronic files or programs, not to mention usage on publicly open and interpretable industry standard protocols and industry standard codec. 6 Essential Steps to Protect Your Computer On the Internet For Free Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto count-down. As he uses Windows 98 second edition with IE5, the virus must be a Sasser variant. The Cheapest Way To Speed Up Your PC Is your computer running slowly but dont have much cash Windows XP telling you that you have low memory Then dont panic, adding memory to your current computer is one of the cheapest, easiest upgrades that you can do yourself! Dont start ripping apart your PC just yet though. Protect Your System From the Internet Evils Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was quickly developed that would attempt to block these ads from loading and being displayed leaving the Internet free from irritants so the user could just view the information that they were after. Not surprisingly the Internet fought back with ads becoming more and more tricky in their execution. More Cool Web Tricks If you ask most people what frustrates them most about the Internet, many of them will tell you "Its the little things!" Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Microsoft Blues With the advent of Service Pack 2 for Windows XP operating system, Microsoft have really made the forums hum. |
home | site map |
© 2005 |