educational

Smart Tags and Scumware – An Update

There was a furor in 2001 regarding Microsoft's much maligned use of Smart Tags on the web and understandably so. For those of you who aren't aware of Smart Tags, one of the applications for them was to give companies, willing to pay the price, the ability to introduce their own hyperlinks onto your web pages – without your knowledge.

This was to be achieved by special instructions being sent to the browsing software to highlight certain words on pages, enticing surfers to move their mouse over them. A drop down box would then appear over the highlighted word offering a selection of links related to that word. If the link was selected, a visitor would transported from that site to another.

The owner of the web page would have no control over the destination, nor receive any compensation for unwittingly providing the lead.

You can imagine the backlash from not only web site owners but surfers regarding this invasion of privacy and parasitical form of advertising. If Microsoft had gone ahead with the strategy, it could have meant the end of the affiliate industry and many online business. Microsoft shelved the concept – sort of.

Office XP uses the tags to enhance application functionality in Word, Excel etc. In Word 2002 for example, if you start to type a person's name who is in your Outlook Address book, Word recognizes this and can display options for that particular person, such as being able to send them an email or open up the address book to display their address details. It's clever stuff, and useful, but that's where it should end.

But Microsoft having backed down didn't stop other unscrupulous compcnies from picking up on this concept and perfecting it. There are so many browsers infected with scumware now, it's quite incredible – the last estimates I saw were well over 100 million.

I regularly receive email from site owners angry and confused by incidents where they view their sites on someone else's computer and see words highlighted throughout their content – that they didn't highlight themselves when creating it. When they move a mouse over their content, to their horror a menu has been displayed with links leading out of their site!

Some of the companies involved with scumware include: eZula's TopText, Gator, Surf+ ...and that's just a few – there are dozens more. Textjacking is only one of the aspects of scumware. Depending upon the software, it can record every move that you make on the Internet, and report it back to the company – all under the guise of "enhancing web surfer’s Internet experience." This "enhancing" actually means building up a huge profile on an individual purely to ascertain what kind of ads to display to them and to sell that information to other companies.

How Scumware Gets On Your PC
With the proliferation of free software in the last half dozen years, we've tended to become complacent with what we are installing. Many scumware companies have their software openly bundled with other free applications. One of the more popular types of software to be infected with scumware are file-sharing applications. Remember, there's no such thing as a free lunch.

To get around legal problems, when you install the software application, there is usually mention made of the scumware in the EULA – the End User License Agreement. You know, that document that's usually 3 miles long and full of legal jargon! Most of us just click "I agree" and continue with installation. It's really important to read those terms and look for text that indicates that the software (or application bundled with it) may somehow modify web pages that are viewed.

I have nothing against a clever advertising campaign, and targeted advertising can be of benefit to people, but if I have to look at promotional material, I would much prefer it to be related to the web marketing or e-commerce industry – and the targeting of advertising should remain the responsibility and privilege of the individual web site owner.

As far as I'm concerned, the textjacking strategy mentioned earlier in this article is nothing short of a breach of copyright. The software developers and advertisers participating should be prosecuted to the fullest degree.

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

Navigating Age-Related Regulations in Europe

Age verification measures are rapidly gaining momentum across Europe, with regulators stepping up efforts to protect children online. Recently, the U.K.’s communications regulator, Ofcom, updated its timeline for implementing the Online Safety Act, while France’s ARCOM has released technical guidance detailing age verification standards.

Gavin Worrall ·
opinion

Why Cyber Insurance Is Crucial for Adult Businesses

From streaming services and interactive platforms to ecommerce and virtual reality experiences, the adult industry has long stood at the forefront of online innovation. However, the same technology-forward approach that has enabled adult businesses to deliver unique and personalized content to consumers worldwide also exposes them to myriad risks.

Corey D. Silverstein ·
opinion

Best Practices for Payment Gateway Security

Securing digital payment transactions is critical for all businesses, but especially those in high-risk industries. Payment gateways are a core component of the digital payment ecosystem, and therefore must follow best practices to keep customer data safe.

Jonathan Corona ·
opinion

Ready for New Visa Acquirer Changes?

Next spring, Visa will roll out the U.S. version of its new Visa Acquirer Monitoring Program (VAMP), which goes into effect April 1, 2025. This follows Visa Europe, which rolled out VAMP back in June. VAMP charts a new path for acquirers to manage fraud and chargeback ratios.

Cathy Beardsley ·
opinion

How to Halt Hackers as Fraud Attacks Rise

For hackers, it’s often a game of trial and error. Bad actors will perform enumeration and account testing, repeating the same test on a system to look for vulnerabilities — and if you are not equipped with the proper tools, your merchant account could be the next target.

Cathy Beardsley ·
profile

VerifyMy Seeks to Provide Frictionless Online Safety, Compliance Solutions

Before founding VerifyMy, Ryan Shaw was simply looking for an age verification solution for his previous business. The ones he found, however, were too expensive, too difficult to integrate with, or failed to take into account the needs of either the businesses implementing them or the end users who would be required to interact with them.

Alejandro Freixes ·
opinion

How Adult Website Operators Can Cash in on the 'Interchange' Class Action

The Payment Card Interchange Fee Settlement resulted from a landmark antitrust lawsuit involving Visa, Mastercard and several major banks. The case centered around the interchange fees charged to merchants for processing credit and debit card transactions. These fees are set by card networks and are paid by merchants to the banks that issue the cards.

Jonathan Corona ·
opinion

It's Time to Rock the Vote and Make Your Voice Heard

When I worked to defeat California’s Proposition 60 in 2016, our opposition campaign was outspent nearly 10 to 1. Nevertheless, our community came together and garnered enough support and awareness to defeat that harmful, misguided piece of proposed legislation — by more than a million votes.

Siouxsie Q ·
opinion

Staying Compliant to Avoid the Takedown Shakedown

Dealing with complaints is an everyday part of doing business — and a crucial one, since not dealing with them properly can haunt your business in multiple ways. Card brand regulations require every merchant doing business online to have in place a complaint process for reporting content that may be illegal or that violates the card brand rules.

Cathy Beardsley ·
profile

WIA Profile: Patricia Ucros

Born in Bogota, Colombia, Ucros graduated from college with a degree in education. She spent three years teaching third grade, which she enjoyed a lot, before heeding her father’s advice and moving to South Florida.

Women In Adult ·
Show More