Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

can we trust 'no spyware' mention in cnet?

Posted on 2014-12-09
8
Medium Priority
?
178 Views
Last Modified: 2014-12-19
http://download.cnet.com/Eusing-Free-YouTube-to-MP3-Converter/3000-2071_4-10962390.html
if cnet certifies as "no spyware or adware", can we trust it completely?
0
Comment
Question by:25112
8 Comments
 
LVL 50

Assisted Solution

by:jcimarron
jcimarron earned 336 total points
ID: 40490096
25112 --
Some times CNET downloads come with piggyback apps.  Just be very careful to read each screen so you do not download things you do not want.
0
 
LVL 99

Assisted Solution

by:John Hurst
John Hurst earned 664 total points
ID: 40490162
Generally yes. As noted above, be careful about piggy back applications.

More to the point: Is anything on CNet worth downloading?  Generally not, in my opinion. I get software from certified software manufacturers. If I have to pay, so be it.

But I think CNet and ZDnet are both guilty of hawking software whether it is useful or not. They get paid to do this so they do not have your interests in mind.
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 332 total points
ID: 40490355
To a point with Cnet, it is more trusted than some.
With any software however the manufacturer is the host / the owner so anything we find on the WWW  including Cnet is just a sponsored link for them.
 I find often times when looking at a download on Cnet when I click on that then get another page click on that this can be a form  of marketing with each new page a cookie is added tracking us.
You'll note this next time you to a page and what you were looking for is listed in the adds.
Google at work giving us adds based on our searches.
I use the host page of the tool if Cnet lists it.
There is also feedback with them and they usually very good telling us that the software is a sponsored link.
When I search out the best video editor on Cnet this gives me a better choice and I can see the sponsored links etc.
Example
So just be aware that cookies should be deleted occasionally but do so only when you know you have the password for EE and all your accounts as you will have to log back in.
0
VIDEO: THE CONCERTO CLOUD FOR HEALTHCARE

Modern healthcare requires a modern cloud. View this brief video to understand how the Concerto Cloud for Healthcare can help your organization.

 
LVL 99

Assisted Solution

by:John Hurst
John Hurst earned 664 total points
ID: 40490359
Most of what I see in CNet is drivel. Nothing I use (and I have tons of software) has ever come from CNet. My suggestion, although they can be reasonably trusted, is not to use what they offer.
0
 
LVL 93

Assisted Solution

by:nobus
nobus earned 332 total points
ID: 40490663
i don't trust ANYTHING on the net
i'm always cautious - and find it a shame that they can load anything with piggybacks / and / or virus
0
 
LVL 24

Accepted Solution

by:
Eirman earned 336 total points
ID: 40490696
Never choose the "Recommended" "Standard" installation with any software you install.

Always choose "Custom Install" ......  read every screen along the way and look at every checkbox.

I include big companies such as Adobe in these warnings.

Install with haste .... Regret at your leisure.
0
 
LVL 5

Author Comment

by:25112
ID: 40509406
thanks for the caution to be more alert and read through the installs..
0
 
LVL 50

Expert Comment

by:jcimarron
ID: 40509564
25112--
Glad to have helped.
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Considering today’s continual security threats, which affect Information technology networks and systems worldwide, it is very important to practice basic security awareness. A normal system user can secure himself or herself by following these simp…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question