When my SpyBlocker software blocks spyware that appears on websites, it also allows me to replace the spyware-graphics with "replacement graphics."
One of the options for a replacement graphic is a big, red, ugly bug.
Look at this screenshot of what happens when I browse to Tomshardware's home page.
http://www.geocities.com/forwardlobe/according_to_spyblocker__toms_hardware_has_some_spyware.jpg
----
Also, a bit of philosophy would be a good thing at this time regarding how to co-exist with anti-spyware installed and protecting your computer.
The determination is made by the anti-spyware companies that some URLs and domains are hazardous to your privacy, whether that’s because they install software on your computer without your knowledge, collect tracking data without your knowledge, etc. The common thread being "without your knowledge."
http://en.wikipedia.org/wiki/Anti-Spyware_Coalition
If your anti-spyware software blocks content that you REALLY wanted to see, then you have two choices.
1) You can deactivate the anti-spyware software to see what it blocked.
2) You can say to yourself, "The anti-spyware software has properly determined that this content is hazardous to my electronic security, financial security, and/or privacy. Therefore, I'm going to have to browse elsewhere and try to find equivalent content, thereby saving my electronic security, financial security, and/or privacy."
For instance, I stopped visiting Tomshardware and the CNet family of websites about eight years ago. I get Ziff newsletter-emails (with Thunderbird blocking embedded images) and still occasionally follow their links to occasional articles -- which is what I’m doing here. My SpyBlocker has done a close-enough-to-perfect job of protecting my computer during that time.
----
Finally, I find it disgraceful and disillusioning that Toms Hardware, Ziff/eWeek/PCMag, and ZDnet/CNet (for starters, in no particular order) have websites with spyware, according to the big red bugs from my SpyBlocker, and that there is little or no recognition of the problem, no less interest in rectifying the problem.
I mean, these are supposed to be technologically-enlightened journalistic services.
If Tomshardware had taken a more pro-active stance in scrutinizing advertising content on their website, they might have been in a better position to avoid the .ANI trojan that they allowed to be disseminated from their website on May 8, according to eWeek. (“... More than a month after Microsoft patched the .ANI vulnerability, the geek favorite e-tailer Tom's Hardware has found the W32.ani Trojan lurking in one of its banner ads...”
http://www.eweek.com/article2/0,1895,2128813,00.asp
One of the options for a replacement graphic is a big, red, ugly bug.
Look at this screenshot of what happens when I browse to Tomshardware's home page.
http://www.geocities.com/forwardlobe/according_to_spyblocker__toms_hardware_has_some_spyware.jpg
----
Also, a bit of philosophy would be a good thing at this time regarding how to co-exist with anti-spyware installed and protecting your computer.
The determination is made by the anti-spyware companies that some URLs and domains are hazardous to your privacy, whether that’s because they install software on your computer without your knowledge, collect tracking data without your knowledge, etc. The common thread being "without your knowledge."
http://en.wikipedia.org/wiki/Anti-Spyware_Coalition
If your anti-spyware software blocks content that you REALLY wanted to see, then you have two choices.
1) You can deactivate the anti-spyware software to see what it blocked.
2) You can say to yourself, "The anti-spyware software has properly determined that this content is hazardous to my electronic security, financial security, and/or privacy. Therefore, I'm going to have to browse elsewhere and try to find equivalent content, thereby saving my electronic security, financial security, and/or privacy."
For instance, I stopped visiting Tomshardware and the CNet family of websites about eight years ago. I get Ziff newsletter-emails (with Thunderbird blocking embedded images) and still occasionally follow their links to occasional articles -- which is what I’m doing here. My SpyBlocker has done a close-enough-to-perfect job of protecting my computer during that time.
----
Finally, I find it disgraceful and disillusioning that Toms Hardware, Ziff/eWeek/PCMag, and ZDnet/CNet (for starters, in no particular order) have websites with spyware, according to the big red bugs from my SpyBlocker, and that there is little or no recognition of the problem, no less interest in rectifying the problem.
I mean, these are supposed to be technologically-enlightened journalistic services.
If Tomshardware had taken a more pro-active stance in scrutinizing advertising content on their website, they might have been in a better position to avoid the .ANI trojan that they allowed to be disseminated from their website on May 8, according to eWeek. (“... More than a month after Microsoft patched the .ANI vulnerability, the geek favorite e-tailer Tom's Hardware has found the W32.ani Trojan lurking in one of its banner ads...”
http://www.eweek.com/article2/0,1895,2128813,00.asp