new icn messageflickr-free-ic3d pan white
View allAll Photos Tagged Spyware

diese sibirische eule habe ich im wildpark poing, whärend der raubvogelschau fotografiert ... ich hatte glück :))) nicht wie mit meinem PC, irgend ein blödes trojanisches pferd hatte ihn lahmgelegt *brummel* und es hat mir stunden gebraucht um ihn zu fangen!... ich besuche euch später, mag jetzt nicht mehr lange vor dem PC sitzen!..


see it On Black


I catched this sibirian owl at a wildpark close to munich... a lucky shot!.. :)

in the last 12 hours I was busy with spyware on my PC, so I need a break for a few hours, I will visit you later:)

Back in business after a few days of computer issues.. certainly gave me a scare since I have so many pictures to edit and my PC just wouldn't turn on..!!!! Finally, fixed it.. turned out to be a Windows startup issue coupled with a spyware somehow getting installed... have no idea how that happened. Anyhow, cleaned up the PC, got it to start and operate normally now...


This was the scene on the first morning during our visit to the Smoky mountains... right from our cabin balcony... didn't even have a need for coffee after waking up to this!

Shared from ZDnet


Abramova_Kseniya, Getty Images/iStockphoto

A new form powerful spyware designed to compromise specifically-targeted Android devices and spy on...

This is the photo I forgot to take when I was at Ragged Mountain Natural Area Nov 1 for the great fall foliage. It has been on my mind ever since then, so Christmas day I revisited the park for this shot.


I am still trying to repair some damage I did to my computer last night when I got infected with a rogue anti-spyware program. I can't find any of the files on my computer, but it is producing pop-ups galore and I can no longer get Windows automatic updates. I have been up most of the night. Anyone have any suggestions? Please flickr mail me if you can help.


For more photos, tutorials and blog please visit my website at

THANK YOU everyone for your visits, comments and favs!


I really appreciate your invitations and awards ~


© ALL RIGHTS RESERVED. Use without permission is illegal.


Aloe Vera flower blooms ~


I am back after having my computer in the good hands of the "Geek Squad" taking care of the "BSOD" commonly known as the "Blue Screen of Death."

We had this registry error that wouldn't go away, so took it in and they found 173 traces of malware & spyware that wasn't caught by the virus protector.

Needless to say, I am happy to have everything working again :)


Aloe Vera flowers ~




Aloe vera is a succulent plant species that is found only in cultivation, having no naturally occurring populations, although closely related aloes do occur in northern Africa. The species is frequently cited as being used in herbal medicine since the beginning of the first century AD. Extracts from A. vera are widely used in the cosmetics and alternative medicine industries, being marketed as variously having rejuvenating, healing, or soothing properties. There is, however, little scientific evidence of the effectiveness or safety of Aloe vera extracts for either cosmetic or medicinal purposes, and what positive evidence is available is frequently contradicted by other studies.


The bottom flowers have already finished, and are pointing upwards, like the eventual seed-pods do. The next ones up are open and hang downwards, while the buds are the top, yet to open, point upwards.


If you take from nature, please give something back


Well this mister Squirrel...okay I am taking a peaceful walk through the park and there is a huge tree right at the entrance to the Secret Garden. I hear a noise and point my camera...I forget that I have eyes when I have a camera...and this squirrel is barreling down the tree with this big nut in his mouth. He came to a dead stop and so did I. If you think he looks startled...wish I had the camera on me LOL. So I clicked and he ran off into the depths of the tree. No harm done. He got the nut, I went on to the garden and chased bumble bees for a half hour


Love and Peace to you all! Have a great day my friends and thank you for your visits!


©BlueLily Photography All rights reserved

Conceptual image of the hand of a man checking the health of his laptop computer using a stethoscope as he checks for malware and viruses or any electronic malfunctions..

** Note: Shallow depth of field

HP es el fabricante de PCs que más vende en todo el mundo junto a Lenovo y Dell, y por ello resulta especialmente singular que la empresa haya caído en el mismo error que sus dos rivales: ambas se vieron sacudidas por las críticas al descubrirse que habían preinstalado spyware en sus equipos.


In our TOP 10 rating we've gathered all most popular and effective CELL PHONE SPY APPS, which are available today.


Shared from ZDnet


Pegasus spyware is used to monitor activities of individual targets.

Image: iStock

A new version of one of the most sophisticated forms of mobile...

Faceless hooded anonymous computer hacker with programming code from monitor

Louie thinks he's hiding behind the arm of the couch. It's

one of his daily games.


Sorry for the lack of focus, I had to click fast.

Actually, it's more serious than that. Last Thursday, Aug. 7, my son got a pop-up which said something that scared him. It said something and then said that he needed to download this program to remove the system problem (or something like this according to him). So he did (without checking with me first). But, in the process he actually did add spyware (or a trojan) or something like that. Anyway, I looked up the program he added which is called Antivirus XP 2008. Whatever you do, don't ever download it. It will surely drive you nuts. It's sure driving us nuts.


So, I'm sorry for skipping out on you. It appears we'll have to take our computer to a specialist to get this nasty spyware (at least I think that's what the response to my google search said it is) removed. Sorry I can't visit. I'm going to go ahead and shut back down. This program does automatically continue to restart my computer if we let it idle for even a little bit. Plus, I keep getting some stupid pop-ups. SORRY!!!!!!!

follow me on twitter : @iamjdurban & facebook

BlackOasis APT exploits Flash zero-day to download FinFisher spyware

#AdobeFlashPlayer, #AdobeFlashZeroDay, #AngloGermanFirmGamma, #BlackOasisAPTExploits, #GammaFinFisherSoftware, #LatestVersionOfFinFisher

BlackOasis APT exploits Flash zero-day to download FinFisher spyware

BlackOasis APT exploits Flash zero-day to download FinFisher spyware:- AN ADVANCED PERSISTENT THREAT (APT) exploiting a new Adobe Flash zero-day exploit that downloads Gamma FinFisher surveillance software has been uncovered by...

BlackOasis APT exploits Flash zero-day to download FinFisher spyware

#AdobeFlashPlayer, #AdobeFlashZeroDay, #AngloGermanFirmGamma, #BlackOasisAPTExploits, #GammaFinFisherSoftware, #LatestVersionOfFinFisher

BlackOasis APT exploits Flash zero-day to download FinFisher spyware

BlackOasis APT exploits Flash zero-day to download FinFisher spyware:- AN ADVANCED PERSISTENT THREAT (APT) exploiting a new Adobe Flash zero-day exploit that downloads Gamma FinFisher surveillance software has been uncovered by...

Freedom, and Independence...July 4, 2010.


If you love our Flag...this will bring a tear to your eye:


Some interesting flag facts:


The Citizens Flag Alliance:


And here's a novelty: American flags actually made IN America! ...


Free (and spyware free) American Flag Screensaver; this one really looks great! ...


All the lyrics to our National Anthem:


And I'm going to enjoy the Fourth by including this great American Whiskey in my celebrations:


One more link; how great a pocket knife is this to carry?? I have one (actually, several Victorinox knives...I highly recommend them) and doing business with this company has been great:


Mobile security is the most common topic today- 68% users are facing issues with their mobile phones regarding mobile security. Install McAfee Mobile Security and secure your Mobile against Malware, spyware and other mobile threats. For More info, contact at McAfee Help & Support team on +1-800-243-0051 or visit:-



This piece was ironically inspired by my lack of inspiration for the past month or so. I felt and still feel (to an extent) that I haven't been creatively 'outside the box'...hence the box theme to this image.


I've also been dealing with some MAJOR computer problems over the last several weeks and still haven't found a solution! It first started out as a Google redirect spyware (when the search function gets redirected to crappy ad sites)...then it morphed into something that shut down my internet system. After tinkering with my computer and getting all that audio starts to have problems. Great.

So if anyone knows how to mute my internal speakers when headphones/speakers are plugged in...let me know please!!


PS. I'm super busy these days and won't be able to comment on streams...but I love you all and will definitely be back!

My computer suffered a complete disaster this weekend. A spyware virus apparently snuck past the software and firewall stuff and completely knocked out the laptop. I was not able to run any software of any importance and ended up taking it to a guy that managed to clean it up for me. UNFORTUNATELY - he had to wipe the hard drive clean and start over. FORTUNATELY - I have all of my files and photos backed up, so I hopefully lost very little other than ALL OF MY FREAKING SOFTWARE!!!!. Time will tell. I am going to spend the next day or two reloading all of my stuff.


Life can suck, but it would suck way worse without a very thorough backup plan.


Bluebird pair at the nest.

© Steve Byland 2010 all rights reserved

Unauthorized use or reproduction for any reason is prohibited.

Please do not blog this without contacting me first.

This is the Yellow Crane Plaza, It was 1st built over 1,7XX years ago ( Some time 223A.D. in the 3 Kingdom era) mainly with wood.


From my appraisal, the building is actually built on a 300 -400ft elevation. Physical building is about 8 floors high. The 1st floor is about 40ft tall. Each floor is about 15ft high from floor to ceiling. These total for the physical height without the thrush & the roof part is 160ft high.


When including the thrush & roof it is estimated at 200ft.


The plaza have undergone many ups & downs.


It is still stood strong & healthy @ WuHan near Yang Zi river.


My computer is having Virus attack again with the wuauclt.exe keep showing up, since 8.30pm , I am attempting to resolve it.


I read from the google search, this virus is from Microsoft window lives auto updates program.


Windows errors related to wuauclt.exe ?

wuauclt.exe is a process managing automatic updates for Microsoft Windows. This process continuously checks for the latest updates and uses the Internet to do so. This program is important for the stable and secure running of your computer and should not be terminated.


Note: The wuauclt.exe file is located in the folder C:\Windows\System32. In other cases, wuauclt.exe is a virus, spyware, trojan or worm! Check this with......


Certainly, I am very upset like you do with Microsoft business conducts on these low standard of practice.


I am not impress.


According to Gotama, whatever the good deed once do by offering money & kinds would not be excuse from facing own karma due even after death.



The following is the Poem from Li Bai


故 人 西 辭 黃 鶴 樓,


煙 花 三 月 下 揚 州。


孤 帆 遠 影 碧 山 盡,


唯 見 長 江 天 際 流。




Thank fuyanyu for the poem in mandarin




昔 人 已 乘 黄 鹤 去,


此 地 空 余 黄 鹤 楼。


黄 鹤 一 去 不 复 返,


白 云 千 载 空 悠 悠!!


晴 川 历 历 汉 阳 树,


芳 草 萋 萋 鹦 鹉 洲。


日 暮 乡 关 何 处 是,


烟 波 江 上 使 人 愁!!



The above poem from Cui Jing.


Thank Luo Shaoyang for the post.




I like to thank Shi Han & his dad's Shi Yong for hosting my visit in WuHan, although is short trip.


But Shi Yong is very kind & attentive in making the best arrangement.


I whole heartily appreciate it.


Port Saint Lucie and all over the great state of Florida, say the words Spyware, Adware, or malware and Business owners, along with any technically average Windows PC user will shudder in horror. That’s because these programs not only are incredibly stubborn when you’re trying to...

New York City, 2011

Are you leaving evidence laying on the table with your investigation? The cell phone is the # 1 communication device in the world today, therefore it stores valuable information of our activities, contacts, and whereabouts. Visit our website at:

Essential Spyware

18/100... 100 x: The 2015 Edition... Week 8 - In Disguise

Negative Space Project

#90 "Clothing"..." 115 Pictures in 2015."

Sleepy Hollow: The Headless Horseman available for download on Facebook!

Help Constable Crane from New York to explore Sleepy Hollow, looking for a way to stop the Headless Horseman! Installed version of Sleepy Hollow: The Headless Horseman - PC game includes 60 minutes free to play trial period. After that period it's possible to purchase a full and unlimited version of Sleepy Hollow: The Headless Horseman - PC game or uninstall it. Sleepy Hollow: The Headless Horseman - PC is shareware Adventure Puzzle Hidden Object game that work correctly with Windows 98/XP/Vista/7 installed and doesn't contain any spyware, malware or adware modules. Today, Sleepy Hollow: The Headless Horseman - PC game costs $ 2.99 only and takes a few minutes to download and install. Enjoy with playing Sleepy Hollow: The Headless Horseman - PC game right now!

ComLand Design is an IT young, dinamic and creative team, but with over 12 years experience in the development of design services. In addition, we provide consulting, maintenance and updating. We also provide onsite engineer visits for all areas in Portsmouth. Most of the time engineers are available on the same day. We have a 24 hours response time from time booking is confirmed and we run NO FIX NO FEE* policy for all onsite visits in Portsmouth. If the engineer cannot fix the problem, you pay absolutely nothing. Satisfaction guaranteed for all services delivered.

WEB Design / Computer Repair Service in Portsmouth area with a NO FIX NO FEE* policy for more detalies please visit our web site or contact us



Just after looking at a video review of a Christmas gift item, this popped up.


My computer was dying before my eyes, auto-running this fake virus scanner while deleting task-bar items . Anti-virus and Task Manager would not run (and many others).


Steps taken: turn off modem > Ctl-Alt-Del {not-working} > take this picture with pocket camera> turn off computer > search internet using another computer, got close fit description in "Spyware Protection" virus > did not download or run the touted programs > boot computer in safe mode (F8) > System Restore to Dec 15 > {worked} > run the now working AVG, removed several malwares associated with DEFENDER.EXE

.... Documents and Settings_All Users\Application Data\defender..


IMG_0103S-insert SpyWare Protection - STOP do not pass GO .jpg .. (top insert added)

Do you want to know what types of pursuits are taking place on someone else's mobile phone? Are you feeling that things have gotten to the stage where you need to contemplate spying? Do you want to mobile phone spy at no cost? Sure, it may sound a little underhanded or possibly even inappropriate. Having said that, if you are having bothersome doubts then getting to the bottom of things can be quite beneficial. Revealing the truth regarding an unsatisfactory employee, struggling son or daughter enables you to consider the necessary actions in order to make things better.


If you think your spouse or partner is being unfaithful, then you're most likely correct. Have a look at these recent survey statistics gathered from a variety of spousal studies.


* 85% of WOMEN who sense they have a unfaithful spouse ARE right.

* 50% of MEN who sense they have a unfaithful spouse ARE right.

* 70% of MARRIED WOMEN have no idea about their spouses' affair.

* 54% of MARRIED MEN do not have knowledge of their spouses' cheating.


Though the numbers above appear a bit depressing, it's still best to trust first and validate second. Today the best way to validate, short of hiring a specialist, is using a basic software program that allows you to keep track of virtually every single activity which takes place on a target mobile phone. What's even better, now you can cell phone spy for free! Visit:

ESET avisa sobre el esparcimiento del spyware FinFisher a través de las ISP

Thanks so much to all of you for your comments and prayers for my friend,Mary.


My son,Kev will be reinstalling my Windows XP today hopefully. Spyware attacked my computer the other night, so he installed Windows 7 ,and I HATE it ! I want my XP back !

It doesn't matter what you are looking to buy, you can find it online. Online shopping connects you to major retail chains, direct manufacturer's outlets, and even auctions. Discounts are available on everything, new or used. This article will assist you in getting the most from online shopping.


Always check for coupon codes before you make a purchase online. Many e-commerce sites offer promotions that can be found by searching. Just search the words "coupon code" along with the website you are buying from and you will get many possibilities to use. This is perfect for saving money online.


Read a store's policies before you make a purchase for the first time. This will tell you what information the company collects, how they protect it, and what rules you should follow while shopping there. If you disagree with the store's policies, you should hesitate to make purchases. There is absolutely no reason to buy from a site you don't trust with your information.


If you're doing a lot of online shopping, make sure your spyware protection is up-to-date. If your computer is infected with something as simple as a keylogger while making an online purchase, you just handed a stranger your credit card number. Pay attention to warnings yielded by antivirus software and make sure you report unusual activity to the store itself.


If you buy from Amazon frequently, think about Amazon Prime. This membership only costs $79 annually, and you get a lot for the money. You are able to get discounts for both same day and overnight deliveries as well as free two day shipping. There is a large movie library where you can get free streaming, too. You will save money from this as well.


Make sure to read all the information about any product you are considering purchasing. You can be fooled by online photos of items. It may make something look smaller or bigger than it really is. Make sure to read the description so you know exactly what you are purchasing.


Whether you are a bargain hunting pro or not, the more knowledge you have, the better off you will be. If you are well informed, you will always come out on top. Read similar articles to this one to learn new approaches to online shopping that you wouldn't otherwise hear about.

Malware term meaning “malicious software. There are various types of malware including spyware, keyloggers, true viruses, worms. Know more details about malware definition check here:


Miniature maids or cleaning women on an open computer hard drive. They are cleaning viruses, spyware and trojans. Computer security concept.

Stormtroopers 365 > Day 39/365


[Stormtroopers 365 prints]


If you are interested in internet freedom, please read the following.


Tomorrow, 12th may 2009, the French parliament will vote on a controversial law which is supposed to solve the problem of copyrighted music and movies being shared on the internet. This law is often called the "HADOPI law", after the name of the "High Authority" that will be created to manage the whole stuff.


Check out these awesome features:

- Get punished because of your neighbour or a robot. It's your fault if your Wi-Fi is not secured. It's your fault if some computer geniuses are able to craft your IP address.

- State-controlled spyware: install it or you can't prove you're innocent. But you aren't totally innocent, are you?

- We are family. Family solidarity has never felt that good: everyone in the household gets deprived of internet because of just one P2P addict.

- Pay for your cut-off internet service: you can't use it, but you sure still pay for it. You can't subscribe anywhere else, anyway, so you don't need this money anymore, right?

- Punishment first, discussion later. Your internet was cut off and you did nothing bad? Well, just file a complaint and wait for a few months. If you are right, your internet will be back. If you were wrong, it will be back as well, since the cut-off period as ran out. Innocent or guilty, who cares, after all?

- Get your business ruined because of one guy. Internet service is vital for your business? You'd better be careful, any of your employee can get it cut off by the HADOPI. Hint: you will recognize the potential P2Per by his eyepatch and the parrot on his shoulder. Fire him before he gets you out from the internet!

- Justice is for n00bs. Terrorists and child molesters can not be identified using their IP address without the decision of the Judiciary. P2P users can. Judiciary got pwned!


More detailed explanation:


The HADOPI law is mainly defended by the French government and the lobbies of mass entertainement (Universal and the like). Apart from these people and those who don't care (mainly because they don't know the real dangers of this law - never really explained in mass media, since the mass media players are the same as the entertainment industry guys, and therefore supporters of the law), almost everyone know that this future law will be (1) inefficient (2) dangerous for individual liberty (3) already outdated by technology. But as usual since the election of President Sarkozy, the government does not care about what people say, especially when it's clever.


How does the HADOPI system work ?

The HADOPI law punishes you for having your IP address identified as downloading copyrighted contents on peer-to-peer networks, without paying for it.

The first flaw is the law is that the IP address is not a reliable data. The Pirate Bay has been dispatching random IP addresses on its trackers for several months in order to prove the inaccuracy of such a proof. In the US, some guys even managed to have the IP address of a printer caught for downloading stuff on a P2P network. But nevermind, the Government doesn't care about this detail.


In order to identify IP addresses, the HADOPI will rely on the collaboration of ISPs. They will allow the HADOPI to know when a copyrighted contents is being downloaded (which means getting into private feeds of datas) and put a name on an IP address. Prior to the HADOPI law, only the Police or a Tribunal was able to order an ISP to give the name of a person based on one's IP address. With the HADOPI, this won't be needed anymore.


What if your Wi-Fi has been hacked by your neighbour and he downloaded the latest Celine Dion album ? Well that's your problem, you should watch your Wi-Fi better, says the Government.


The fake IP and the hacked Wi-Fi both mean that you can be punished without having downloading any single file. In order to prevent this from happening, the Government has found a magical way : you will have to install a spyware (that you'll have to pay for and which will most likely not be compatible with opensource OS) that will be connected 24/7 to a central server of the HADOPI. The datas collected by the spyware will allow you to prove that you are innocent, be you mistakingly caught for downloading copyrighted contents.


Now about the punishment. The punishment has 3 levels. For the first offense an e-mail warning will be sent to the person identified as the owner of the internet access used for downloading. For the second offense a certified warning letter will arrive in the mail. For the third offense the Internet connection of the offending user will be cut for a duration between 1 month and 1 year. The punished user will continue to pay his internet access, and will be prevented from subscribing from another ISP by the addition of his name on a centralized black-list.


This means that a whole family could be deprived of internet access (which means : e-mail, e-shopping, e-administration, e-learning, e-information, e-whatever-you-want), just because the rebel teenager has been downloading some stuff and has not stopped when the parents told him to do so after having received the 2 warning messages. No more Wikipedia. No more Amazon. No more eBay. No more Google. No more Flickr. For up to 1 year. And don't forget the culprit is maybe not even in your home : it can be your neighbour, or even a Chinese or Russian robot sending your IP address on P2P tracker lists.


Going one step further, some people think that the Government does not really care about the entertainment industry, and is just using this purpose as a Trojan to get the (French) internet under control. After all, once the HADOPI is created and given its tools to identify persons from their IP addresses without the need of an independant judge, what will prevent it from tracking more than just kids downloading music and films?


> Wikipedia (en): (short and incomplete article)

> Wikipedia (fr): (long and detailed, but in French)


E-Spy :: Extreme cell phone Spy Gear 2011 Platinum Edition

$15 Get It.... Here:

Just Awarded Software of the Year by Mobiglare Magazine.


Track your child's cell phone activity

Catch that cheating spouse

Learn more about malware evolution and online threats such as iworms, trojans, spyware, downloaders and much more...

Faster detection rates

Easy of use.

Get the best antivirus and internet security AVG here:

The malware that even the Google has been suffered over more than one million Android uses. It also got very familiar and famous through worldwide and became a threat to Google and other essetial netwoks. Today we will give you enough information about some Android users that malware affects them, in this modern world more than 1 million Android Users are infected by Hitting of Malware


What is Malware?


Malware or also called malicious software is any program or file that is harmful to a computer user. Malware is including computer viruses, worms, Trojan horses and spywares. All these malicious programs are performing several sorts of functions such as stealing of data, encrypting or deleting sensitive data illegal, altering or hijacking core computing functions and monitoring users’ computer activity not having a sufficient permission.


As you know about different sorts of attacks so according to the Check Point Technologies, a security firm mentions that the attack dubbed Gooligan, gets authentication token to break in to Google. After getting in, the stealers grab data from Google Play, Photo, Drive, Gmail and others important groups. A survey report stated that the infection keeps on to spread among 13,000 devices each and every day. In place of snatching personal information, attackers opt to install malicious apps from Google Play to generate profits. The profits can be from ad revenue as part of a fraud scheme and the limit goes up to $320,000 monthly.

For reading more click the link below......


Google Will Share Your Browsing History On March 1st


Effective March 1, Google will commence its new (and controversial) Privacy Policy which enable it to do more in terms of gathering and storing search queries, history, logs, and personal information from its users.


Other than closing your Google accounts, you cannot fully block the search engine site from gathering this type of information. But as Daily Mail Online outlined, you can take three easy steps to remove your browsing history from your Google account.


Step one: Log into your Google account. Under your profile name, click on “Account settings.”


Step Two: Scroll down to the Services section and click on “Go to web history.”


Step Three: At the top of the Web History page, click on the “Remove all Web History” button.

You can always return to the Web History page and click the “Resume” button to allow Google to

resume collecting your search queries.


If you've bothered to read the Privacy Policy Preview you know how deep

this Big Brother tactic goes. Paranoid or cautious, BOTH!


I find it scarey how much information can be and has been collected from us already, apparently

there is no privacy on the web. You can have the best anti-spyware or any pc software protection,

wear a condom,rubber gloves and a hasmat suit, doesn't matter, we're all being tracked.

In fairness, its not only Google.


Information is the currency of the future.

Je pense que Macadam sait que c'est une mauvaise journée aujourd'hui. Je croyais profiter d'un bel après-midi de congé, mais oh surprise en arrivant, je trouve une lettre m'annonçant qu'il y a eu erreur dans mon calcul d'impôt 2009 et que je leur dois 724 $ ! Et je ne vous parle pas des 4 heures passées sur mon ordinateur à essayer de trouver ce qui ne va pas... Anti "spywares", antivirus, scan... et ça ne semble même pas aller mieux.. Reste là, Macadam, je te rejoins ! ;o)


I think Macadam knows that it's a bad bad day today. I thought i would enjoy a beautiful afternoon off, but oh surprise when I arrived, I found a letter telling me that there was error in calculating my 2009 taxes and I have to pay them $ 724 ! And I don't tell you about these 4 hours I passed on my computer trying to find what is wrong ... Anti "spyware", antivirus, scan ... and it doesn't seem to be better .. Stay there, Macadam, I join you ! ;o)

An adult online anonymous internet hacker with invisible face sitting at the laptop

This photo is for Julie Amero, a 40-year old substitute teacher in Connecticut who faces up to 40 years in jail because the computer in her classroom was infected with spyware/malware causing porn popups to appear on the screen during a 7th grade English class. Read more here


Her sentencing date is March 2, 2007. She did not receive a fair trial and should never have been prosecuted but for the fact that the judge, prosecutor and so-called expert were clueless about malware infections. The jury convicted her of 4 counts of 'failing to protect children" and "exposing children to pornography". Each count carries a maximum sentence of 10 years in prison.


If she is not completely vindicated of this horrible conviction, educators everywhere will shy away from using technology in the classroom -- a loss for everyone, but especially our kids.


Julie and her family have lost everything fighting this, including the baby she was carrying at the time she was arrested (the stress of the arrest caused a miscarriage).


I'm leaving this photo at the top of my stream until March 2, 2007 - her sentencing date -- in the hope that justice will prevail and the judge will declare her factually innocent of all charges.


Update: Her sentencing has been postponed until 3/29/07 to allow her new attorney time to review everything (and hopefully file an appeal!)


It's just wrong.

How Does Spyware & Adware Commonly Assault?

This pretty new form of virus has one up-to-date in thoughts, up to date take manipulate over your online surfing experience and up-to-date you any other opportunity without ever asking.


As an example these virus sorts will:

Take control of your...

Image of male robber wearing mask and looking at the camera, stealing laptop computer and business information

1 3 4 5 6 7 ••• 79 80