Internet Explorer 6 Spyware -- Alexa Registry Key, Part 3
I was fortunate enough to receive a message from the Product Manager of Alexa, Geoff Mack. His concerns were about our ongoing discussion of whether or not Internet Explorer contains Alexa Spyware. I'd like to take this time now to share his concerns. Geoff writes:
" Hello, My name is Geoffrey Mack, Product Manager at Alexa, an Amazon.com company. I am writing to disagree with your assertion that the Alexa Toolbar is spyware. First, it is helpful to define Spyware. The definition is here. In short, Spyware is:
- software that gets on your machine without your permission, and
- tracks your activity for no user benefit.
You'll find that the Alexa Toolbar, like the Google Toolbar, does neither of the above. Both the Alexa and Google Toolbars provide info as users surf and as a consequence of that functionality have a log of users' surfing activity. Both Alexa and Google strive to keep the identity of the users anonymous. Google uses the logs to feed to its search engine index. Alexa uses them to feed to its Related Links.
I realize there is a lot of hyperbole where Alexa is concerned, and in some circles, the conspiracy theorists have prevailed, due in no small part to Ad-Aware's efforts. But I would encourage you to rise above the fray and take an honest look. I think you'll find that the Alexa Toolbar is not Spyware any more than the Google Toolbar. "
I just want to clarify a statement that Geoff wrote. I never did "flat-out" state that there was in fact a Spyware component present in Internet Explorer. Yes -- I entertained the thought, but the majority of my sentiments were to outline "ways around" not using Alexa, if a user decided to do remove it from the Internet Explorer browser.
Well, anyway -- I appreciate Geoff writing in and expressing his opinions.
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.