Internet Pollution and Computer Hell

by Eric Predoehl , Octalouie.com

It's hard to deny that the widespread use of the home computer has dramatically changed the course of world culture. Within the past ten years, the adoption of the internet to exchange email messages has been nothing short of revolutionary. Just as the widespread adoption of the automobile opened up new doors at the beginning of the twentieth century, we are at the dawn of a new era approximately 100 years later as the world embraces computers as one of the new standards of modern living.

There is no doubt that computers have the power to do great things when harnessed by those that can handle the power of these magnificent tools. Writing, organizing, mathematical equations, and graphic illustration are just a few of the tasks that can be simplified with these mighty devices. Yet, computers tend to open a Pandora's box of multi-faceted challenges. They operate on a special type of logic that often seems so very alien to the core of human experience. A wise man once said "To err is human, to really screw things up, get a computer." Certainly, computers have been a source of frustration for anyone that uses them.

Of all tasks performed with computers, the dominant use for computers seems to be the task of information-gathering with the mighty beast known as the internet. Along the internet highway, computer users will run into five types of annoyances that I have categorized as such:

Part One: The Hoaxes

Part Two: The Spam Emails

Part Three: The Pop-Up Ads

Part Four: The Viruses

Part Five: The Unexplainable Weirdness

Any one of these nuisances can easily alienate a computer novice to such extremes that they would want nothing to do with a computer. It's intimidating to deal with such problems firsthand, and it often requires some extra help from a friend to go beyond such frustrations. A little bit of patience can go a long way in getting past the darkness. Let's address each of these five annoyances, and make the path as painless as possible....

Part One: The Hoaxes

If anything sounds too good to be true, it probably isn't. Anyone who spends any amount of time on the internet will probably come across some pile of dribble designed to relieve you of your excess money, time, or both. Chain letters are alive and well, continuing to spread like uncontrollable communicable diseases in this new era of internet communications. Put your name on a list, forward a pile of nonsense to ten of your friends, and you too can perpetuate the latest scam that promises to deliver great sums of wealth, free vacation plans to exotic locales, a strong political voice for a non-existent congressional bill, or relief to some "charitable organization" that is actually some front for some slippery scam artist.

How does anyone separate the fact from the fiction? A healthy dosage of cynicism helps one get past the initial layer of mistruths. After that, it's good to take a look at some of the other great scams that have already been perpetuated on the internet. There are many great websites designed to debunk the various urban legends of the internet, and my favorite one is something called Snopes.com.

Of course, there will always be the pranksters out there lurking to pounce on the naive web-surfers. The spirit of P.T. Barnum is alive and well, living comfortably on the internet.

http://www.snopes.com

http://hoaxbusters.ciac.org

Part Two: The Spam Emails

Once upon a time, SPAM was merely a cheap potted meat product sold by the Hormel food company. I'm not exactly sure what type of meat was actually in SPAM, but I've been told it was a popular American food item in the 1950's. Sometime in the 1970's, a brilliant British comedy troupe by the name of Monty Python's Flying Circus paid tribute to this odd meat product, making it the subject of some great skits.

Nowadays, SPAM, is of course, the catch-all phrase used to describe junk email. Over-ambitious salespeople have decided to use the tools of internet email to market their wares to folks that could care less about such crap. Unsolicited email has become a major nuisance. Arrogant salespeople have become relentless in their methods of extracting email addresses from websites, chat rooms, newsletters, individual emails, and anything else that might contain such details. Targeted marketing seems irrelevant for most of these bottom dwellers, as they gather massive lists of email addresses, sending out solicitations indiscriminately to anybody and everybody, regardless of their actual interest in such products.

Attempts to remove one's name from such lists often seem to be futile efforts. By responding to such nuisances, the very action of replying actually verifies that the email address is valid, and requests to "remove" are often ignored. While there are some marketing folks that will actually remove your name from their list, it's difficult to separate the ethical companies from the bottom dwellers.

There are some options to consider in battling this annoying SPAM:

Option 1: Filters

In certain email programs, you can actually install filters to block known offenders of spam email . Outlook, the email program from Microsoft, allows one to block offending parties by simply adding their email addresses to a list of guilty parties with a function known as "Junk Mail Filter." Macintosh users with OS X installed on their computer can utilize the Apple Mail program, which allows one to use a "Bounce to Sender" command. This allows the user to divert the offending e-mail right back at the junk-mailer, making it appear as though the e-mail account had been deactivated. In theory, the email address gets dropped from that list, and any other lists generated from it.

Option 2: Web-mail Options

Some of the web-based email services allow one to effectively block a lot of spam. Unfortunately, most web-based email services rely on internet advertising, which means you'll be trading one set of advertisements for another set of advertisements. Luckily, there are some little tricks to get around some of this. If you use Yahoo email or subscribe to Yahoo Groups newsletters, you can reduce your flow of Yahoo-based ads by simply electing to use text-based email, as opposed to html-based email. For some reason, html email opens up the door for a lot more advertising. With Yahoo Groups newsletter/discussion groups, you can also restrict your ads by choosing the daily digest option, which seems to remove all graphic advertising from the emails.

Option 3: Government Interaction

Unfortunately, it seems that there are times where offending parties will only back down if there are government laws restricting their behaviors. The laws of ethics mean nothing to certain individuals, and it's times like that when drastic measures seem necessary. American citizens can turn the tables on the offending parties by forwarding their spam to the Federal Trade Commission. Here's a direct quote from the FTC website:

"The FTC works for the consumer to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint, or to get free information on any of 150 consumer topics, call toll-free, 1-877-FTC-HELP (1-877-382-4357), or use the complaint form at http://www.ftc.gov. The FTC enters Internet, telemarketing, identity theft and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad. Consumers can forward unwanted spam to the FTC at uce@ftc.gov."

http://spam.abuse.net

http://www.ftc.gov/opa/2002/02/eileenspam1.htm

Part Three: The Pop-Up Ads

Usually, pop-up advertisements are the least offensive forms of internet advertising. They can be annoying, but they usually aren't destructive. Pop-up (and pop-under) advertising are those extra little windows that turn up while you're surfing the web looking for other information. Typically, pop-up ads focus on selling you cheap web-cameras, low-mortgage rates, or try to get you hooked into playing some silly little game to "win big bucks." Even if you don't buy their products, these companies are just as happy to add your email address to their ever-growing list of potential customers if you fill out their little surveys. As you authorize your email identity to be used for these "get-rich-now" contests, you wind up adding another entry for someone's ambitious marketing scheme.

Pop-up advertising relies on JavaScript technology used by your web browser. Adult entertainment websites seem to go completely overboard with this type of technology, bombarding web-surfers with a glorified freak-fest of multiple browser windows than can only be stopped by shutting down the web browser, or simply starting over from scratch.

There are certain things you can do to disable the JavaScript on your web browser, but it may actually prevent you from accessing certain types of sites, including some online banking services, such as PayPal.

The best option, if you have the patience, is learning how to disable JavaScript on a case-by-case basis. Just as you can block certain emails from certain addresses, you can disable JavaScript for certain sites whose ads you wish to block.

For example, let's say you're browsing some newspaper website, when all of a sudden, you see a second window open up, advertising some silly gizmo you have absolutely no interest in buying If, for example, you're using Internet Explorer 5.0 for Macintosh, you would then want to take a look at the HTML source code of this pop-ad by going to the "View- Source" menu option. From there, you might discover that this pop-up ad originated from "http://ad.doubleclick.net" so you make a note of this particular URL, and copy over this information to a temporary text file. After uncovering this information, then you can go to "Preferences," select "Security Zones" from the "Web Browser" sub-menu and chose "Restricted Sites Zone." After selecting the "Add Sites" option, you can then add the URLs for each offending website. It's a bit of extra work, but you will have control over your situation.

http://www.lithosjigs.com/cart/enablejava.html

http://www.chami.com/tips/internet/021398I.html

http://www.wrclib.noaa.gov/lib/enable.html

http://www.opera.com/support/service/javascript/

Part Four: The Viruses

It seems like every day there's another debilitating virus out to create havoc on unsuspecting computer users. Many people are absolutely petrified with the idea of opening up email attachments for fear of unleashing some ugly virus they have no control. Paranoia is alive and well on the internet.

My first line of defense against computer viruses is a rather simple one. I use a Macintosh computer. While no computer is completely immune from such chaos, I've been told that manufacturing destructive viruses for the Windows platform is a relatively easy task. Not being a hacker, I don't know how to write code, nor do I have any interest in learning how to do so. This is simply what some hackers have told me.

I've got a lot of other reasons for choosing the Macintosh, and not all of them are virus-related. I prefer the interface, the ease of hardware installation, and the various tools available for audio/video production. Among computer manufacturers, I can think of no other company as innovative as Apple Computers, which tends to build the roads that others follow.

While purchasing a Macintosh is certainly one way to fight viruses, it's unrealistic to think that this would be a viable option for many of the people who have made the major commitment to stick with the common Windows computer platform. For those stuck with inferior computers, you have our sympathies. For those that have mastered their Windows computers, all power to you! You will be gainfully employed, and sought out by many seeking your expertise. There will never be a shortage of people that will need your help.

Viruses on the computer are similar to those that exist in a biological sense. Some viruses lie dormant, virtually invisible, lurking in the background for the right opportunity to strike. For example, an infected Macintosh computer may contain a certain type of virus that is perfectly safe as long as it stays on the Mac platform. Yet, if this virus is somehow transmitted to a Windows computer, it can create mass havoc. Just as "Typhoid Mary" did not seem to be personally affected by a certain strain of virus, her intimate alliances were stricken with a debilitating disease. Equivalent situations happen with multiple computer platforms.

It's good to install a virus protection program, such as the ones offered by Norton and McAffie, but there is something you can do right now to protect yourself from spreading potential viruses.

1. Open your Email program and go to your Address Book.

2. Create a new listing and type this in to the Name box: "!0000". (That's an exclamation point and 4 zeros)

3. Don't enter an Email address. Just click OK and you're done.

If you should become infected with a virus, the virus will try to send out an Email to all you friends in your book, but since the "!0000" is the name is at the top of your list, the program will come to a screeching halt and give you a message similar to this:

"The Message could not be sent. One or more recipients do not have an e-mail address. Please check your Address Book and make sure all the recipients have a valid e-mail address"

From there, you can close that window and move on to the task of running a virus inoculation program, as you have been definitely been infected with a virus. Be aware that the virus may have been added to your "Sent" or "Draft" or "Outbox" folder. Just delete it, empty your trash/recycle bin, and everything should be fine.

http://www.vmyths.com

http://www.antivirus.com

http://www.symantec.com

http://www.mcafee.com

Part Five: The Unexplainable Weirdness

There are times where it seems that one's computer is possessed by some strange demons. Despite best efforts to exorcise these gremlins from the computer, things remain slightly wacked. Logic appears to have been replaced by unexplainable behavior. Call it "spooky weirdness," call it "odd coincidence," call it "unusual occurrence," or simply call it "user error." Here's a few options to consider:

Option 1: Don't fill up your hard drive.

Even though you may have 10 gigs of hard drive space on your computer, you really shouldn't try to put everything on it. Give your computer some breathing room, by maintaining at least 15% free space on the hard drive. Your computer needs this free space as a "scratch pad "to work out equations, and it's important that you don't try to cram everything to the tip of the brim, so to speak.

Option 2: Throw out your stale cookies

Often when one visits certain websites, certain "cookies" are placed within one's computer system preferences. "Cookies" are essentially little robotic spies that note whenever you visit certain websites. The most common use of cookies is to allow visitors to return to certain websites without having to re-enter passwords each time. Other cookies keep track of favorite websites and personal statistics, making it easier for certain companies to limit their marketing efforts to specific target audiences. While one can set up their internet browsers to refuse such "cookies," there are many websites that simply will not work without dropping cookies into one's computer. Cookies have become an integral part of the internet experience, even though the implications of their use as surveillance tools seem rather creepy.

Spending some time every 2 months to clear out old cookies isn't a bad idea at all. I've found that certain cookies sometimes get corrupted, and make it difficult to access certain websites. Once, there was a time where it seemed impossible for me to access my Yahoo Groups pages, where I'm a member of various discussion groups. Despite my best efforts, I could not properly enter the correct password to enter the Yahoo Groups pages. Only after I removed old "Yahoo" cookies from my system was I able to properly input my password, and enter the Yahoo Groups pages. You can remove the cookies by adjusting the "Preferences" in your internet browser, or by physically removing the quirky files, assuming you know where to look. The bottom line- keep your cookies fresh, and toss out cookies from unscrupulous companies.

Option 3: Run Utility Programs

The operating system on any computer is not a static situation. In ordinary use, files are constantly being written, amended, moved, and erased. Each application has it's own set of rules, and the software used for internet communications is no exception. As things are shuffled around and re-organized on a regular basis, there is always the possibility that things are sometimes misplaced. As the computer operating system continues to adjust itself to each situation, there is always the possibility that an error somehow slipped between the cracks. Utility programs can fix minor and major software errors, often halting accidents before they happen. Just a good doctor might be able to spot a dangerous condition in an otherwise subtle abnormality, a diagnostic program can do an equivalent service for computers. It's a good idea to use utility diagnostic programs on a regular basis, especially if you spend a lot of time on the computer.

http://www.symantec.com

http://www.micromat.com

Option 4: Back up Anything Important

There is always the potential to lose data from your computer. Hard drives sometimes fail at the worst possible time. Acts of nature do occur, and there's always the possibility that an earthquake, landslide or flood may destroy your entire computer system, as well as your house and other worldly possessions. Robberies can occur in "good neighborhoods" as well as "bad. neighborhoods." Things happen. If you have important writings, graphics, or music files on your computer, you really should create backups on a regular basis. Invest in a CD-burner, and create back-ups of your irreplaceable information. There really is no substitute for the often-repeated mantra "back up your data."

Option 5: Chill Out

Sometimes the best option is simply to walk away. Over-analyzed problems sometimes need a fresh set of eyes to see what's wrong. Obvious solutions are sometimes hiding right in front of you. When you hit certain brick walls that you cannot climb, in spite of your best efforts, it's best to just turn off the computer, and do something else for awhile. It is not healthy to get overwhelmed with frustration.

Take a walk in the park, and get some fresh air into your lungs. Turn on the stereo, and dance to your favorite ditty. Have a drink of your favorite liquid equalizer- be it coffee, team, soda, beer, wine, martini, prune juice, or plain old mountain spring water. Go play with your dog, cat, bird, or monkey. Toss a frisbee with a friend.

When you come back, you'll be in a much better shape to deal with your silly little computer. With a fresh outlook, you might be able to figure out the problem. If not, there's always tech support.

If your dreams start to look like computer screens, that's a sign that you really need to take a vacation from your computer. Remember, a computer is just a tool. It was created to serve your needs, and not the other way around.

Don't ever forget that.

* * * * * * * * * *

Copyright 2002 Eric Predoehl / Octalouie LLC. All rights reserved. This article cannot be duplicated or distributed without the consent of Eric Predoehl. If you'd like to share this info, just put a link to the site, and let folks discover the rest of Octalouie.com.

 

 

.