Hubris - Definition: Microsofts Passport

Before September of 1995, Microsoft ignored the Internet because their 16-bit Windows 3.1 operating system couldn't handle the 32-bit Internet world. With the introduction of Windows 95, Microsoft decided they owned the Internet.

Instead of having separate accounts at dozens of websites, Microsoft decided that you will have one master account that you will use to log in everywhere. That account will contain your credit card number, bank account numbers, all your personal information and financial records, and Microsoft will own that account.

Well, Microsoft IS the United State's government condoned monopoly, so 200 million Internet users, and 100 major web companies dutifully signed up for Microsoft's Passport wallet service.

In 1999, Internet authorities discovered Microsoft's passport service had numerous security holes, and hackers could steal your personal information. In 2001, the Federal Trade Commission admonished Microsoft for not adhering to their own privacy policy. In 2003, Microsoft purged all the financial records from its Passport servers.

Millions of users continue to sign up for Passport because of the convenience it offers. Nearly 100 websites use Passport as their authentication method. Users don't need to remember separate usernames and passwords for each website. They can log in to all of them using a single email address. Some of the websites let you register without a Passport accont, but others, especially Microsoft owned websites, require you to have a Passport account.

If you sign up for Microsoft Network (MSN) or for a free Hotmail email account, you will be forced to sign up for Microsoft's Passport wallet service. You can sign up for a Passport account with a non-Microsoft email account at Microsoft's Passport website.

To sign up, you need only an email address and a password. After you sign up, you can choose to add personal information to your profile. Then you can indicate if you want to share your information with companies that use Passport. If you choose to share your personal information, be aware that Microsoft shares it with every passport website you visit, and those websites are not required to adhere to Microsoft's privacy policy.

The Internet does not need a master account repository for users personal information. Users don't need to remember separate usernames and passwords for each website. Every Internet user has memorized two or three different email addresses and half a dozen different passwords that they use everywhere.

If an Internet master account repositiory is desired, it should NOT be owned or operated by Microsoft. A repository of personal account information must be operated by an honest, independant company.

Note: In April 2000, U.S. District Judge Thomas Penfield Jackson ruled that Microsoft violated two sections of the 1890 Sherman Act. He concluded that Microsoft was an illegal monopoly that used anti-competitive means to maintain its dominance in Intel-based operating systems.

Copyright(C) Bucaro TecHelp.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter visit bucarotechelp.com

express cleaning service Arlington Heights ..
In The News:

Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.

Introduction To ISDN, Part III: PAP

Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More

Groupware Finds Home in American Business: Collaboration Tool Analysis

What is Groupware?Have you ever had to manage document collaboration... Read More

What You Must Know About Spyware Right Now

Spyware is like the new technological nuclear weapon on the... Read More

QuarkXpress Tips: How to Move Content Between Print and Web Layouts

Since its release in 1987, QuarkXpress had made an immediate... Read More

5 Easy File Management Tips in Microsoft Word

How many steps does it take you to locate and... Read More

Best Spyware Removers

Finding the best spyware removers to detect and remove spyware... Read More

Microsoft Great Plains Integration Manager ? Advanced Techniques

Great Plains Integration Manager scripting and translation - overview for... Read More

Inherent Dangers Of File Sharing Via The Internet.

Cyberspace has opened up a new frontier with exciting possibilities... Read More

Off The Record - Tips For Picking Recording Software

Need software to record your voice, streaming audio or musical... Read More

Microsoft Great Plains & CRM in Transportation & Logistics ? Overview

Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More

Introducing GRML

Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More

Can You Calculate Complex Financial Calculations?

Are you a whiz at calculating financial information? Not the... Read More

It?s Back!! WordPerfect?s Amazing Comeback

Have you noticed WordPerfect is gearing up for a comeback... Read More

When is a Software Engineer Not a Software Engineer?

The title of "software engineer" has got to be among... Read More

Microsoft Small Business Manager eCommerce ? Overview

Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

Outlook... Not Just for Email! Using Your Outlook Calendar

Microsoft Outlook is one of the most widely used software... Read More

Selecting Corporate ERP: Microsoft Business Solutions Great Plains ? Estimation Parameters

As we could imagine, if you are reading this article... Read More

Recent Studies Show that 9 out of 10 PCs Are Infected with Spyware

Spyware and malware are large problems for Internet users today... Read More

Crystal Reports For Microsoft Navision - Overview For Programmer/IT Specialist

Let us give you - developer some hints in the... Read More

Free Software: How Not To Get More Than You Bargained For!

I completed an experiment recently. I wanted to find out... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

Most Common Ways to Accumulate Spyware (where It is Downloaded to Your PC)

It is possible that if one avoided all sources of... Read More

The Truth: Netzero 3G

We've all seen the ads on TV for Netzero 3G.... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Cisco Certification: Introduction To ISDN, Part V

The major reason I recommend getting your hands on real... Read More

tidy up service Arlington Heights ..