Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Info

Posted on 1998-04-17
2
Medium Priority
?
198 Views
Last Modified: 2010-04-12
Where do info brokers get their info from the internet?
0
Comment
Question by:Dmitriy
2 Comments
 
LVL 2

Expert Comment

by:cyberwizz
ID: 1019062
Could please clarify what it is you want since there is just too much info on the net.
0
 

Accepted Solution

by:
pcmig earned 30 total points
ID: 1019063
Depending on the integrity of the so-called "info-broker".    Most of these guys compile their lists from Usenet, then sell your information to the next "info-broker" who sells to another...   Eventually, you get spammed with MLM scams, Work at home scams, and beastiality porn site ads...And endless vicious cycle.

Porn sites are the worst to submit information to.   Most of the time, the guy who is running the porn site is also involved in "info brokering" and a simple email to the webmaster can end up being a 50 spam messages a day mistake...

Others will farm for your information by way of giveaways (i.e.:   Click here to win a 1998 Porche Boxter!!)  --  The gotcha is who is paying for that $50k car?   The people they sell your information to.  While  one person may be driving home in a new Boxter, the other 2 million people who filled out the "Official Entry Blank" are having thier information sold to direct marketers and getting an email box crammed with spam.  Thus, the wildfire growth of web email accounts -- quick & disposable when the spam gets unbearable...   (My ISP charges when excessive email is sent to the account)

On the other hand, a respectable company that asks for your personal information usually has a box you check if you don't want to be spammed, and almost all of the one's I've chosen have been true to thier word.    It boils down to "Don't talk to strangers"  --  Don't give your information out to someone you don't know or trust.

Welcome to the internet...

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

pc, laptop  monitor connection configurations
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will teach you how to add a cinematic look to any film or video out there. There are very few simple steps that you will follow to do so. This will be demonstrated using Adobe Premiere Pro CS6.
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an anti-spam), the admin…
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question