educational

Smart Tags and Scumware – An Update

There was a furor in 2001 regarding Microsoft's much maligned use of Smart Tags on the web and understandably so. For those of you who aren't aware of Smart Tags, one of the applications for them was to give companies, willing to pay the price, the ability to introduce their own hyperlinks onto your web pages – without your knowledge.

This was to be achieved by special instructions being sent to the browsing software to highlight certain words on pages, enticing surfers to move their mouse over them. A drop down box would then appear over the highlighted word offering a selection of links related to that word. If the link was selected, a visitor would transported from that site to another.

The owner of the web page would have no control over the destination, nor receive any compensation for unwittingly providing the lead.

You can imagine the backlash from not only web site owners but surfers regarding this invasion of privacy and parasitical form of advertising. If Microsoft had gone ahead with the strategy, it could have meant the end of the affiliate industry and many online business. Microsoft shelved the concept – sort of.

Office XP uses the tags to enhance application functionality in Word, Excel etc. In Word 2002 for example, if you start to type a person's name who is in your Outlook Address book, Word recognizes this and can display options for that particular person, such as being able to send them an email or open up the address book to display their address details. It's clever stuff, and useful, but that's where it should end.

But Microsoft having backed down didn't stop other unscrupulous compcnies from picking up on this concept and perfecting it. There are so many browsers infected with scumware now, it's quite incredible – the last estimates I saw were well over 100 million.

I regularly receive email from site owners angry and confused by incidents where they view their sites on someone else's computer and see words highlighted throughout their content – that they didn't highlight themselves when creating it. When they move a mouse over their content, to their horror a menu has been displayed with links leading out of their site!

Some of the companies involved with scumware include: eZula's TopText, Gator, Surf+ ...and that's just a few – there are dozens more. Textjacking is only one of the aspects of scumware. Depending upon the software, it can record every move that you make on the Internet, and report it back to the company – all under the guise of "enhancing web surfer’s Internet experience." This "enhancing" actually means building up a huge profile on an individual purely to ascertain what kind of ads to display to them and to sell that information to other companies.

How Scumware Gets On Your PC
With the proliferation of free software in the last half dozen years, we've tended to become complacent with what we are installing. Many scumware companies have their software openly bundled with other free applications. One of the more popular types of software to be infected with scumware are file-sharing applications. Remember, there's no such thing as a free lunch.

To get around legal problems, when you install the software application, there is usually mention made of the scumware in the EULA – the End User License Agreement. You know, that document that's usually 3 miles long and full of legal jargon! Most of us just click "I agree" and continue with installation. It's really important to read those terms and look for text that indicates that the software (or application bundled with it) may somehow modify web pages that are viewed.

I have nothing against a clever advertising campaign, and targeted advertising can be of benefit to people, but if I have to look at promotional material, I would much prefer it to be related to the web marketing or e-commerce industry – and the targeting of advertising should remain the responsibility and privilege of the individual web site owner.

As far as I'm concerned, the textjacking strategy mentioned earlier in this article is nothing short of a breach of copyright. The software developers and advertisers participating should be prosecuted to the fullest degree.

Copyright © 2024 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

opinion

The Search for Perfection in Your Payments Page

There has been a lot of talk about changes to cross sales and checkout pages. You have likely noticed that acquirers are now actively pushing back on allowing merchants to offer a negative option, upsell or any cross sales on payment pages.

Cathy Beardsley ·
opinion

Unpacking the Payment Card Industry's Latest Data Security Standard

The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements and guidelines that apply to all businesses that accept credit card payments, and is designed to ensure the security of those transactions.

Jonathan Corona ·
opinion

Compliance With State Age Verification Laws

During the past year, website operators have faced a slew of new state age verification laws entailing a variety of inconsistent compliance obligations.

Lawrence Walters ·
opinion

Merchants in Spotlight With Visa's VIRP

By now, most merchants know about the Visa Integrity Risk Program (VIRP) rolled out in spring 2023. The program is designed to ensure that acquirers and their designated agents — payment facilitators, independent sales organizations and wallets — maintain proper controls and oversight to prevent illegal transactions from entering the Visa payment system.

Cathy Beardsley ·
opinion

How to Know When Hosting Upgrades Are Really Needed

I was reminded about an annoyingly common experience that often frustrates website owners: upgrades. Sometimes, an upgrade of physical system resources like CPU, RAM or storage really is required to solve a problem or improve performance… but how do you know you’re not just being upsold?

Brad Mitchell ·
profile

WIA Profile: Natasha Inamorata

Natasha Inamorata was just a kid when she first picked up a disposable camera. She quickly became enamored with it and continued to shoot with whatever equipment she could afford. In her teens, she saved enough money to purchase a digital Canon ELPH, began taking portraits of her friends, shot an entire wedding on a point-and-shoot camera and edited the photos with Picnik.

Women in Adult ·
trends

Collab Nation: Top Creators Share Best Practices for Fruitful Co-Shoots

One of the fastest ways for creators to gain new subscribers and buyers, not to mention monetize their existing fan base, is to collaborate with other creators. The extra star power can multiply potential earnings, broaden brand reach and boost a creator’s reputation in the community.

Alejandro Freixes ·
opinion

Bridging Generational Divides in Payment Preferences

While Baby Boomers and Gen Xers tend to be most comfortable with the traditional payment methods to which they are accustomed, like cash and credit cards, the younger cohorts — Millennials and Gen Z — have veered sharply toward digital-first payment solutions.

Jonathan Corona ·
opinion

Legal and Business Safety for Creators at Trade Shows

As I write this, I am preparing to attend XBIZ Miami, which reminds me of attending my first trade show 20 years ago. Since then, I have met thousands of people from all over the world who were doing business — or seeking to do business — in the adult industry.

Corey D. Silverstein ·
opinion

Adding AI to Your Company's Tech Toolbox

Artificial intelligence is all the rage. Not only is AI all over the headlines, it is also top of mind for many company leadership teams, who find themselves asking, “How can this new tool help our company?”

Cathy Beardsley ·
Show More