7 captures
25 May 2001 - 05 Jan 2003
May JUN Jul
08
2000 2001 2002
success
fail

About this capture

COLLECTED BY

Organization: Alexa Crawls

Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.

Collection: Alexa Crawls DF

Crawl data donated by Alexa Internet. This data is currently not publicly accessible
TIMESTAMPS

The Wayback Machine - http://web.archive.org/web/20010608124232/http://www.pcworld.com:80/features/article/0,aid,49928,00.asp
 
idg.netPCWorld.com
Technology Advice You Can Trust
HomeNewsReviewsHere's HowFeaturesDownloadsChannels
  Today in Features | The Week in Features
Search for    in    within     
Do an
Advanced Search

June 08, 2001
See All Topics
Related Links
 
FTC Says Amazon Unit Guilty of Privacy Violations

Amazon Vindicated in Privacy Charges

Could Privacy Proposals Bankrupt Some Sites?

Technology Outpaces Privacy Laws

Amazon Unit to Pay in Privacy Settlement

Editors Picks
Our Top 100 Products:

 
Product Finder
Specs & Latest Prices:

 
Free Newsletters
 
Daily Product Review
Daily Best Buy
 
Enter your e-mail:


See all newsletters
 
Instant Alerts
 
Get email Alerts on stories that match your interest. To choose a keyword, click here.
 
 
Expert Help
 
Need help with your computer question? Choose the right expert at the right price, anytime day or night, at
PC World Expert Help.
 
 
 
Letters to PC World
 
Your take on sharing music files, Trojan horses, and online safety.

From the July 2001 issue of PC World magazine
Posted Friday, May 18, 2001


I am the Webmaster of a company that has received numerous threats of fines and ISP disconnection because of so-called spamming [Consumer Watch, May]. I say 'so-called' because I believe most people surfing the Web are totally ignorant about their actions. How many times you have truly read and understood a site's policy or the fine print on an online form? You might just have given that site permission to send you e-mail. And some businesses like to legitimately use e-mail to solicit business.

Thank goodness the U.S. Postal Service still works! Imagine if the USPS blocked snail mail the way ISPs are blocking e-mail: "Sorry! Your post office is no longer allowed to deliver mail because of spamming."

Jim Lester, Melbourne, Florida

I too ran afoul of Hotmail's Use of Services agreement by using my Hotmail address to post classified ads on Internet newsgroups. I was not running a business, just trying to get rid of some stuff around the house. I was banished from Hotmail without warning. No problem: Within an hour, I was set up with another free e-mail account. In addition, I had carefully saved copies of all critical e-mail messages onto my PC just in case my account became inoperable. Hotmail's diligence had its limitations, though: Whenever I logged on to that account, it would be overflowing with spam.

Jay Thompson, Timmonsville, South Carolina

Windows XP--Xpect a Hassle?

Does anyone besides me have a problem with sending Microsoft a "fingerprint" of my PC as part of the price for installing the upcoming Windows XP [Top of the News, May]? How do we know what is being sent, how it will be used, and how secure it all is? Of course Microsoft will swear to keep it anonymous, not to misuse it, and so on. This [Product Activation plan] and the thought of listening to Microsoft's hold music for heaven knows how long whenever I obtain a new hard drive or sound card makes XP a nonstarter for me.

It looks to me as though the X might just stand for Xtortion.

Dennis Poledna, Glendora, California

Author's response: If you buy Windows XP preinstalled on a new computer, you won't have to go through the Product Activation hassle, according to Microsoft. If you go through the installation process, whether you are upgrading an existing OS or doing a clean install, you will be subject to the new constraints. We plan to test the feature thoroughly in upcoming coverage. --Scott Spanbauer

Keeping Kids Safe Online

I just read your tips for keeping kids safe online ["Safe Kids," May]. While this is a noble purpose, almost everything you suggest is full of holes. I'll be turning 21 soon and have been online since I was 13 or so, and I can tell you that only the threat of discovery will keep a kid out of online trouble.

If I wanted to make certain my child was safe online, the only measure I'd trust would be to put the computer in a common area such as the living room. Teenagers (as I can well testify) are deeply interested in going places and seeing things they shouldn't, and without the fear of getting caught, they will.

I had a computer in my bedroom while I was growing up, and though my parents owned it, I was in control of it. Browser history and cookies can be deleted, and IP addresses can be masked. To a teenager with even a little computer savvy, such tasks are simple, and from that point there are virtually no limits to online activity. The only way a child's online life can be monitored is with a physical presence.

Adam Durell, Barberton, Ohio

No Trojan Horses Here

May's article "Dot Cons" made a claim for which I've yet to find any support:

"Currently, these crooks' weapons of choice are Trojan horse programs, which typically arrive as e-mail attachments that look like harmless programs or innocuous files such as JPEG images. Double-click the files, though, and you launch a hostile program that may swipe your passwords or give hackers access to your PC and all the information therein."

Can the author provide me with even one example where a Trojan horse program has been included in a JPEG file? I don't think so.

Paul Montgomery, Chicago

Editor's response: The Trojan horse files aren't in JPEG format but masquerade as such. We apologize if we didn't make this clear enough. --Harry McCracken

Music File Sharing

Amidst the ongoing controversy about Napster, MP3, and the recording industry, I wonder if anyone has seriously considered trying the "shareware" model. Perhaps we could all download songs or albums, try them for 30 days, and then send in payment if we decide to keep them.

This would solve the problem of paying 16 bucks for a CD only to find just one good song (or none) on it. Granted, there will be cheaters who do not pay, but dishonest people will always find their way around any system we put in place.

Ken Wenzler, Waukesha, Wisconsin

PC World welcomes your letters to the editor. Send e-mail to letters@pcworld.com.

Next Page:  Cross Fire
Jump to Page:  1  2  3  
Printer Friendly Version
 

Sponsor Offers and Demos


PC World Magazine


Get 2 Risk-Free Issues
and a Free Gift


Magazine Subscriptions and Services

Check Out This Month's Issue
 

About Us   |   Contact Us   |   Advertise  |   Site Map   |   Corrections   |   Subscribe to the Magazine

Copyright & Permissions   |   Terms of Service Agreement   |   ASME Guidelines   |   Privacy Statement