{"id":1793,"date":"2008-03-21T11:03:41","date_gmt":"2008-03-21T19:03:41","guid":{"rendered":"http:\/\/lee.org\/blog\/2008\/03\/21\/click-here-february-2004-free-services\/"},"modified":"2008-03-21T12:34:39","modified_gmt":"2008-03-21T20:34:39","slug":"click-here-february-2004-free-services","status":"publish","type":"post","link":"https:\/\/www.lee.org\/blog\/2008\/03\/21\/click-here-february-2004-free-services\/","title":{"rendered":"Click Here February 2004: &#8220;Free&#8221; Services&#8221;"},"content":{"rendered":"<p>This is a continuation of a republishing of a series of articles I wrote titled &#8220;Click Here&#8221;. You can find them all under the <a href=\"http:\/\/lee.org\/blog\/category\/click-here-articles\/\">Click Here Articles<\/a> category in this blog.<\/p>\n<hr \/>\n<p>Click Here<br \/>\nBy Lee C. SonkoLast month I talked about some free internet services including Google.com. Today I want to warn you that not all \u201cfree\u201d services are good for you and your computer. There are all sorts of programs that literally push themselves upon you while you\u2019re surfing the internet. For example, if you are trying to go to Google.com but mistype it, writing \u201cgoogl.com\u201d instead, you are taken to a web site that tries to sell you all sorts of things; it even tries to change your homepage! How rude!<!--more--><\/p>\n<p>Remember that the people at Google.com have nothing to do with the people at Googl.com. You can think of each web site as its own physical storefront. If you walk into a store at 100 Main Street, they might try to sell you junk that you don\u2019t want. But the folks across the street at 102 Main Street might be highly reputable and pleasant too.<\/p>\n<p>There are a lot of websites that try to get you to put \u201cfree\u201d applications onto your computer. Before you allow such a thing, always think of the reputation of the website that you are getting the application from. When you allow one of these applications onto your computer, you are letting them take total control of your computer! Yes, that\u2019s true. Every application on your computer has the power to delete all your files and rifle through your emails.<\/p>\n<p>Here\u2019s a real example of what I\u2019ve seen happen to many people: A friend of mine, let\u2019s call her Jane, heard about a cute little program called \u201cWeatherBug\u201d. It\u2019s this cute little free program that sits in the corner of her desktop giving her weather forecasts all day while she\u2019s at the office. Well, if she had read the (20 page) license agreement (and spoke legalese), she\u2019d have realized that WeatherBug is what\u2019s called a \u201ctrickler\u201d. While it\u2019s running, it downloads\u2026 in a slow trickle\u2026 more programs onto her computer! After a few weeks, Jane noticed that her computer was running a lot slower. Applications took longer to start and sometimes the computer would freeze up for a few seconds at a time. Sometimes when she went to a website, an advertisement for a competing company would pop up on her screen. Two websites take longer to load than just one!<\/p>\n<p>The worst thing is that she couldn\u2019t figure out why all this was happening. After all, she only downloaded one program. When I finally took a look at the computer, I found about five \u201cmystery\u201d programs running unseen in the background. Some of these programs were watching what websites she was going to, some were popping up advertisements, and some were\u2026 well, we honestly don\u2019t know what some of them were doing!<\/p>\n<p>Protect yourself from all this unpleasantness takes a little effort but it\u2019s worth it.<\/p>\n<p>&#8211;    First, if a website asks to download or install something onto your computer when you aren\u2019t expecting it, you should always say \u201cno\u201d, even if the website asks 50 times (that is one nasty tactic that they sometimes use).<br \/>\n&#8211;    Second, you should run a good virus protection program. Norton Internet Security, AVG Antivirus, and McAfee Virusscan all work; there are many antivirus applications out there. Keep it updated every week.<br \/>\n&#8211;    Third, you should run an anti-spyware application every now and then. Two good anti-spyware programs are \u201cSpybot Search and Destroy\u201d and Ad-Aware.<\/p>\n<p>You have to use the anti-spyware programs carefully because they can disable some applications that you might want. For example, Kazaa is a popular \u201cfree\u201d advertiser supported application. If you tell Spybot to disable the ads in Kazaa, then Kazaa won\u2019t work any more.<\/p>\n<p>Of course, there are thousands and thousands of great free applications on the internet. I use them all the time. If you\u2019re not sure if an application is bad, ask a knowledgeable friend; it\u2019ll make for good conversation! Before I install an application that I\u2019m not sure about, I usually go to Google and type the name of the application and the word \u201cspyware\u201d into the search engine. For Kazaa, I\u2019d type \u201ckazaa spyware\u201d. I then read-up on what people are saying.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This is a continuation of a republishing of a series of articles I wrote titled &#8220;Click Here&#8221;. You can find them all under the Click Here Articles category in this blog. Click Here By Lee C. SonkoLast month I talked about some free internet services including Google.com. Today I want to warn you that not [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[22],"tags":[],"class_list":["post-1793","post","type-post","status-publish","format-standard","hentry","category-click-here-articles"],"_links":{"self":[{"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/posts\/1793","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/comments?post=1793"}],"version-history":[{"count":0,"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/posts\/1793\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/media?parent=1793"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/categories?post=1793"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lee.org\/blog\/wp-json\/wp\/v2\/tags?post=1793"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}