The End of Spyware?

The US House of Representatives has recently passed the "Spy Act" - or to give it its full title - the Securely Protect Yourself Against Cyber Trespass Act. This aims to prevent software companies from installing spyware on users PCs without their knowledge, and anyone found guilty of breaching the act faces a fine of up to $3 million.

Does this mean the end of spyware as we know it? Unfortunately the answer is no, not really. The problem is that most spyware can continue to operate in exactly the same way as it does now, by asking the computer user to agree to a licence before it installs itself. The majority of people who are faced with a lengthy legal-looking page of text when installing a new program, automatically click the "I Agree" option without reading the terms. Therefore spyware programs can quite legally continue to piggy-back their way onto PCs.

Add to this the fact that a large percentage of spyware originates from outside the US, and it quickly becomes clear that the Spy Act realistically has about as much chance of success as the Can-Spam act did in attempting to stop the deluge of junk email that arrives in our mailboxes every day.

Spyware can be a lucrative business for advertisers and software vendors, and with the average home PC already carrying around 26 spyware and adware programs, it's a problem that looks set to become worse before it gets better. In time, additional international laws may reduce the problem, but for the present at least, every PC user should keep up-to-date anti-spyware software running on their machine.

About The Author

Grant Rogers is an independent computer security consultant. You can find more information on anti-spyware and adware software at http://www.spyware-adware.info

limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’Hare
In The News:

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Melody, the artificial intelligence-powered robot, is life-sized and represents a move toward creating robots that resemble people in appearance and interaction.
Here are five easy smartphone rules from the National Security Agency that you can follow to better protect your mobile device from hackers and scammers.
A U.S. robotics company has developed "Jennie," a robotic pet powered by artificial intelligence that's designed to comfort those facing mental health challenges.
Healthcare records for more than 184 million Americans were breached in 2024, but you can take steps to minimize that risk. Kurt the CyberGuy explains.
The Skyrider X1 from Rictor claims to be the "first amphibious flying passenger motorcycle," and it combines land and air travel in one sleek design.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Home inventory and restoration apps help itemize and track every item in your home in the event you have to make an insurance claim after a natural disaster.
The White House launched a new cybersecurity safety label, the U.S. Cyber Trust Mark, intended to help consumers make informed decisions on smart device safety.
Today's tech can help make life so much easier — if you know how to use it. Here are a few tips on the quickest and best ways to make your phone, laptop and other devices work for you.
Tech expert Kurt “CyberGuy" Knutsson offers Windows 11 restart fixes: Update drivers, run system scans and check hardware.
Sony and Honda's Afeela 1 EV launches with advanced tech and entertainment for $89,900. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
With limited hard drive space, tech expert Kurt “CyberGuy" Knutsson offers these tips for storing large video files and photos.
Tech expert Kurt “CyberGuy" Knutsson says the $236,000 Yangwang U9 electric hypercar boasts 1,287 horsepower and can jump obstacles.

Brand Your Websites URL With a Favicon

Have you ever noticed that when you look at your... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

Exactly What Does FTP Stand for and What Can it do for Me?

FTP stands for "file transfer protocol". FTP is basically a... Read More

Secure File Transfer Using SSH Plus Additional Audit & Automation - FSA Reporting

In order to meet regulatory and corporate compliance requirements reporting... Read More

Software Piracy

SOFTWARE PIRACY We regularly hear reports... Read More

Dig Out That Worm

Internet worms. Is your PC infected?If your computer has become... Read More

Reporting for Microsoft Great Plains/Dynamics/eEnterprise: RW ? ReportWriter ? Tips for Developer

Microsoft Business Solutions Great Plains is written in Great Plains... Read More

Microsoft Navision Database Selection: C/SIDE or MS SQL Server - Overview For IT Specialist

There are certain pluses and minuses in both cases and... Read More

The Secret of the Layer Styles Dialogue

When you double-click a layer in the Layer Palette, you... Read More

Microsoft Great Plains Implementation for Large Corporation ? Overview for VP IT

Microsoft Business Solutions Great Plains was historically designed to serve... Read More

Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

The End of Spyware?

The US House of Representatives has recently passed the "Spy... Read More

What is a Document Manager without Version History?

Document Manager and Version HistoryIn previous articles I have discussed... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

Groupware Finds Home in American Business: Collaboration Tool Analysis

What is Groupware?Have you ever had to manage document collaboration... Read More

Where to Find Free Fleet Maintenance Software

Costs of fleet maintenance software can vary widely. It is... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

Behave, Word, Behave!

If you copy something from a Web site or elsewhere...... Read More

Is Software Tester a Most Infamous Person in a Software Project Team?

The fact that a software tester is a most infamous... Read More

Groupware: Avoid the Ad Hoc Shuffle

GroupwareEfforts are continually made to manage the unavoidable ad hoc... Read More

Make or Break Factors - When Considering Estimating Software

Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More

Microsoft Great Plains Integration Manager ? Advanced Techniques

Great Plains Integration Manager scripting and translation - overview for... Read More

Microsoft Great Plains Payroll Module Customization Scenarios

It is now common thing when large corporation selects mid-market... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

taxi o'hare Auburn ..