educational

Safe Surfing: Part 1

Today’s Internet surfer faces a myriad variety of dangers, both obvious – and hidden. One of the worst of these dangers is the threat posed by malicious “spyware” – a broad term used to describe a software component which has been secretly installed on your computer system; either as part of a “freeware” download, or as a result of visiting a Website run by an unscrupulous Webmaster.

Spyware can take the form of a simple logging engine that monitors your surfing activity, and then reports the results to a marketer who will use the information to serve you targeted advertisements. While invasive, the end result is popups and spam targeted to your interests. Some spyware, however, can incorporate viruses, Trojan Horses, worms, and other “virtual nasties” that can corrupt your system, and install unwanted files, bookmarks, and perform other nuisances such as resetting your start page – or worse.

Some of these programs will auto-initiate dialers, and / or redirect the unsuspecting surfer to porn sites against his will. Oftentimes, the spyware programmer is doing this to defraud legitimate adult Webmaster affiliate programs (usually those which run on a pay-per-click model), using his creation to drive unwilling traffic to the sponsor.

Some of these programs are able to seek out and retrieve credit card information, user name and password combinations, and other sensitive, personal information. Registry alteration and host file manipulation are also common with such infections, and are often used to redirect surfers who type a URL into their browser’s address bar. For example, you could be heading over to your bank’s Website to do a little online banking the way you always do – except this time, when you type in “BankofAmerica.com” you are sent to a site that outwardly appears to be your site, but in reality is a bogus copy, designed to lure you into revealing your account information.

A similar wave of e-mail based scams are now rampant on the Internet, attempting to lure you into chaos by pretending to be eBay, PayPal, CitiBank, or any number of other institutions. Fortunately, there are a couple of preventative measures that you can take against being drawn in by most of these fraudulent e-mail schemes.

The first, and easiest, is to not give your e-mail address to any financial institutions you deal with. Then, if you receive an e-mail from your bank or other agency, you’ll immediately know it’s bogus. Sometimes you want or need to give out your e-mail address to these organizations. If this is the case, and you’re fortunate enough to have multiple addresses, provide one exclusively for their use (not your “main” address), this way mailings to your main account can easily be flagged as bogus.

On a personal note, I face this quite often, as banks and other institutions which I do not patronize (and even those I do), send e-mail to my XBiz account; an address which I have not given them, which immediately indicates the mailing to be fraudulent…

Another simple means of avoiding being swindled by one of these schemes is available to users of Microsoft’s Outlook e-mail client, which will reveal in the status bar the true target of any e-mail embedded URL with a simple “mouseover” of the link. In other words, before clicking on that link that ‘says’ it’s going to take you to “CitiBank.com,” place your cursor over it and look at your e-mail client’s status bar: if it says “CitiBank.com” (and the e-mail was received on an account you gave them), then it’s likely safe to click on it. If the link says “CitiBank.com,” but your status bar shows “ScamsRUs.ru” – don’t click on it!

While these simple steps can help protect you from e-mail based attacks, the problem of dealing with spyware and other malicious software is not as simple, but perhaps more vital: While these scams might be the mechanism from which the criminal hopes to obtain your money, the e-mail address he is using might have been given to him via spyware on your computer. Lavasoft’s popular Ad-aware utility will alert you to the presence of spyware and other malicious components on your system, and remove them as well.

As bad as the threat to your bank and other accounts is from malicious software, it is insignificant when compared to the threat to your liberty, which can end if the authorities find child pornography on your computer – child porn which was put there without your knowledge or consent by spyware. Stay tuned for Part 2!

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Reba Rocket

As chief operating officer and chief marketing officer of Takedown Piracy, long at the forefront of intellectual property protection in adult entertainment, Rocket is dedicated to safeguarding the livelihoods of content creators and producers while fostering a more ethical and sustainable industry.

Women In Adult ·
opinion

Protecting Content Ownership Rights When Using AI

In today’s digital age, content producers have more tools at their disposal than ever before. Among these tools, artificial intelligence (AI) content generation has emerged as a game changer, enabling creators to produce high-quality content quickly and efficiently.

Corey D. Silverstein ·
opinion

How Payment Orchestration Can Help Your Business

An emerging payment solution is making waves in the merchant world: the payment orchestration platform (POP). It’s quickly gaining traction as a powerful tool for managing online payments — but questions abound.

Cathy Beardsley ·
opinion

Fine-Tuning Refund and Cancellation Policies

For adult websites, managing refunds and cancellations isn’t just about customer service. It’s a crucial factor in maintaining compliance with the regulations of payment processors and payment networks such as Visa and Mastercard.

Jonathan Corona ·
profile

WIA Profile: Laurel Bencomo

Born in Cambridge, England but raised in Spain, Laurel Bencomo initially chose to study business at the University of Barcelona simply because it felt familiar — both of her parents are entrepreneurs. She went on to earn a master’s degree in sales and marketing management at the EADA Business School, while working in events for a group of restaurants in Barcelona.

Women In Adult ·
profile

Gregory Dorcel on Building Upon His Brand's Signature Legacy

“Whether reflected in the storyline or the cast or even the locations, the entertainment we deliver is based on fantasy,” he elaborates. “Our business is not, and never has been, reality. People who are buying our content aren’t expecting reality, or direct contact with stars like you can have with OnlyFans,” he says.

Jeff Dana ·
opinion

How to Turn Card Brand Compliance Into Effective Marketing

In the adult sector, compliance is often treated as a gauntlet of mandatory checkboxes. While it’s true that those boxes need to be ticked and regulations must be followed, sites that view compliance strictly as a chore risk missing out on a bigger opportunity.

Jonathan Corona ·
opinion

A Look at the Latest AI Tools for Online Safety

One of the defining challenges for adult businesses is helping to combat the proliferation of illegal or nonconsensual content, as well as preventing minors from accessing inappropriate or harmful material — all the more so because companies or sites unable or unwilling to do so may expose themselves to significant penalties and put their users at risk.

Gavin Worrall ·
opinion

Know When to Drop Domains You Don't Need

Do you own too many domains? If so, you’re not alone. Like other things we accumulate, every registered domain means something to us. Sometimes a domain represents a dream project we have always wanted to do but have never quite gotten around to.

Juicy Jay ·
opinion

Understanding 'Indemnification' in Business Contracts

Clients frequently tell me that they didn’t understand — or sometimes, even read — certain portions of a contract because those sections appeared to be just “standard legalese.” They are referring, of course, to the specialized language used in legal documents, including contracts.

Corey D. Silverstein ·
Show More