Related inks

 

There Ought to be a Law

by Rosalyn Bronstein

I hadn’t fully realized the extent of the computer hacking problem until I began receiving feedback from the article I recently wrote. Apparently, lots of others have had similar –and some much more upsetting experiences. Web sites that legitimate individuals worked hard to create and optimize have been “visited and changed”, and e-mails have gone out, supposedly from their address, but in actuality from some computer spewing fraudulent messages – and very likely to millions of recipients they don’t even know about.

I’ve had that dreaded experience a number of times. Since I write frequently and send out lots of articles, I decided to use a distribution service to try and eliminate some of these problems. It’s helped enormously. Now, the only e-mail account I need worry about is my “throw-away” one, where all the junk mail goes.

Actually, since I’ve begun using private messaging, I’ve found that spam and junk mail are a thing of the past. With private messaging, there is no spam – it’s a closed environment – and the only people who are sending me messages are my friends and family. These are people I want to hear from, and look forward to hearing from. There’s no advertising, and I don’t have to be afraid of receiving computer viruses – that doesn’t happen. I know that whenever I send or receive using this service, my communication will be private and secure. And I find it easier than e-mail.

So for the most part, my e-mail situation is under control. The major issue now is unscrupulous companies – and they know who they are – who plant their unwanted advertising and spyware on computers. To my mind, this is trespass. They are unwelcome intruders – are they so desperate, and is their product or service so poor, that they must advertise in such questionable ways? Breaking into someone’s computer doesn’t seem the best way to gain trust.

Anyone who even takes the time to read these offers is only contributing to the problem. Perhaps if they find that no one is paying attention, and that this form of advertising is counter-productive, (which in my case it is), they will find another way to hawk their wares.

Those sending spam have been put on notice that this won’t be tolerated. Perhaps we should do the same for those who want to gain control of our computers without our consent.

About the Author

Rosalyn Bronstein, for more than 20 years an author and consultant, has been an advisor to numerous multinational corporations and international organizations. She can be contacted at families@ntouch4.info

Catagories:

Advertising
Affiliate Programs
CSS
DHTML
Direct Mail
ECommerce
Email
Home Business
HTML
Internet
Javascript
Link Popularity
Marketing
Newsletters
Off-Line Promotion
Online Promotion
Sales
SE Optimization
SE Positioning
SE Tactics
Site Security
Traffic Analysis
Web Design
Webmasters