Spam - Its Whats For Breakfast

The first thing I do every morning when I wake up is head for my computer. It holds the secrets to my day. I read my e-mails from several accounts, check my schedule on my Outlook calendar and even find out how much money I can spend that day from my bank's Web site. I'd be lost without my computer.

However, I have one huge frustration - privacy invasion. In the last three months alone I have had the privacy of my personal computer invaded in so many ways I am starting to feel like it is public property instead of my own property.

My home page has been changed without my consent. My search engine was set for Internet Explorer and was changed to some search engine I never knew existed. Hidden programs have infiltrated my computer and set it to randomly open windows to casino ads and porn sites.

My e-mail is constantly bombarded with ads from companies that claim I have "opted" into their e-mail list. As if I would waste my time asking someone to send me e-mails that are deleted as fast as they are received. Can I have a little orange juice with that spam at 6:30 in the morning?

Since I have my own server, one of my e-mail addresses is not related to any of the big name e-mail sites like Yahoo, Hotmail or America Online. But those nasty little computer geeks have even invaded that part of my privacy by using my server to send out e-mail ads. They get tons of money from the dupes who actually buy into their money-making schemes, and I get to have my account flooded by all of the undeliverable e-mail. Isn't that just peachy?

My biggest frustration comes from the pop-up messages I receive when connected to the Internet. A friend of mine explained the technical aspects of this phenomenon to me, but I don't care about how it happens. All I care about is that it does happen. I get pop-ups about all kinds of stuff. I have received several pop-ups inviting me to learn how to enlarge my penis. Last time I checked, I didn't even have a penis.

I even get pop-ups telling me how to not get pop-ups. Now that is frustration to the nth degree. If I could, I'd reach through the lines that connect me to those privacy thieves and pour my orange juice all over their geeky little heads. But alas, I have no such super powers.

Is it really necessary to feel victimized in your own home at your own computer? Luckily I know someone who helped restore my computer to its original state, but that doesn't stop the spamming or the pop-ups and it doesn't protect me from future invasion.

Each state has its own anti-spam laws to protect people from this type of privacy invasion. Illinois passed its first law in 1999. In California, outgoing Gov. Gray Davis recently signed a bill that made a tough stand on spamming with fines from $1,000 per e-mail and up to $1 million per mass-mailing incident. However, the truth of the matter is it is very hard to catch and prosecute these privacy thieves.

How about a do-not-call list for computers? As a matter of fact, the U.S. Senate passed legislation last week that would increase penalties for spammers on a national level and would start a do-not-spam list. Anyone have a pen handy?

Although spamming is only one of the many invasions of privacy on my computer and although this new legislation has been too long in coming, I have to admit I'm quite relieved to see help is on the way. Until then, I will try to go about my daily routine without allowing those privacy thieves to get me too frustrated.

However, I do not intend to share my OJ or my toast with them - unless they like OJ as shampoo.

About the Author: Stella Ramsaroop is a western world traveler, a life-long student, a wanna-be stargazer, and an Aquarius in all its forms (if you know what that means). Her articles emphasize the importance of the continued development and protection of gender equality in all aspects of a woman's life.

Visit Stella's Website at http://www.newsparade.com to read her current articles and to contribute your thoughts.

In The News:

Fitness centers and workout studios are starting to establish policies that prohibit shooting phone videos to protect people's privacy.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Apple recently notified a small number of iPhone customers in 92 countries that their phones may be under attack by mercenary spyware.
An artificial intelligence-powered home security system can fire paintballs and tear gas at trespassers. The camera identifies human faces and animals.
Technology expert Kim Komando gives her tips and tricks on enhancing your user experience a smartphone and other devices you use everyday.
A new camera called NUCA uses artificial intelligence to create deepfake photos of subjects by stripping away clothing in close to real time.
The Kimberley Kube trail-ready camper has a compact but spacious design and combines luxury, functionality and ruggedness for a weekend getaway.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Emails instructing you to reset your password for an account may be legitimate, or they may be scams. Kurt "CyberGuy" Knutsson explains.
Northrop Grumman's Manta Ray uncrewed underwater vehicle aims to revolutionize undersea missions — it glides through the ocean without human assistance.
Learn how to work Google's calendar application to streamline and organize your daily tasks from technology expert Kim Komando.
If you do not want Facebook to have automatic access to your private photos, follow our tips to protect yourself. Kurt “CyberGuy" Knutsson shows you how.
Kurt “CyberGuy" Knutsson goes into detail about Apple’s recent iOS update that allows iPhone users to instantly translate spoken language simply by using the Action Button.
Safeguarding your digital life with a reliable physical backup isn't just a precaution, it's a necessity. Kurt “CyberGuy" Knutsson provides the essential backup checklist.
Kurt “CyberGuy" Knutsson reveals how a Redditor exposed false recycling claims at their apartment, highlighting a report that only 21% of U.S. recyclables are processed.
Kurt "CyberGuy" Knutsson offers a travel toolkit featuring five technology tools to help you with booking flights and hotels for your summer vacation.
The bubble behind the clock on your iPhone can appear in different colors. Kurt "CyberGuy" Knutsson explains what each of those colors mean.
Scammers are using the power of artificial intelligence to mimic voices of people and are using the fake voices to commit crimes, like kidnappings.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech guru Kurt "CyberGuy" Knutsson explains the science behind the Invisibility Shield, a 6-foot shield that makes people become invisible.
The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.

Why Your ISP Takes Bribes From Spammers

The lifeblood of the spammer is email. They need to... Read More

Is Email Dying?

2004 was really a year when the whole subject of... Read More

Of Spam and Sandboxes

About a month ago I had the privilege of giving... Read More

How To Stop Spam

I imagine you have seen, heard about, or already know... Read More

Why Is Spam Such a Problem?

Spam can be a lot more damaging than you might... Read More

Internet Tip of the Week: Cease and Desist

While we all admit that unsolicited commercial email is a... Read More

Dont Look Spammy!

We all hate spam and get way too much of... Read More

FTC Botches Fight on SPAM, Microsoft Takes Over the Battle

While the Federal Trade Commission is busy fighting over definitions... Read More

How Spammers Fool Bayesian Filters - And How to Stop Them

Effectively stopping spam over the long-term requires much more than... Read More

Pst... Pass It On... I Found Out Its a Hoax

When you receive an email telling you about a virus,... Read More

Invasion of the Email Snatchers

They're sneaky. And stealthy. They're quiet and mostly unobtrusive, but... Read More

A Practical Approach to Eliminate Spam

Spam is out of control! I guess that would be... Read More

Getting Back To Basics.

While we all agree that there`s way too much spamming/junk-mailing... Read More

How to Protect Your Email ID from Spammers?

You must be one of them experiencing a lot of... Read More

How To Identify Spam

Most of us have opened our email program and found,... Read More

SPAM: A Nutrious Food or a Waste of Time?

Unless the filters on your computer are really good, you're... Read More

E-mail SPAM: Whats The Big Deal?

It absolutely amazes me how many people over-react to receiving... Read More

All About Spam

Spam is annoying. Period. Why people would want to send... Read More

Evict the Spammers from Your Inbox

Block Spam and Other Email Threats From Entering Your Gateway... Read More

The Business Of Sending Spam

You all tear your hair out in frustration every time... Read More

Stop Spam: How To Escape The Spam Hell-Hole

If you're anything like me, you're pretty sick of it,... Read More

Are You A Spam Zombie?

Over the past few years you've all become familiar with... Read More

Do Not Spam

The temptation among internet marketers to SPAM is greater than... Read More

Which Spam Filter Is Best For You?

With the number of spam filtering solutions increasing each week... Read More

CAN-SPAM Basics

I. BACKGROUNDThe CAN-SPAM Act of 2003 (Controlling the Assault of... Read More