All games are created by the
players, and only they are privy to the e-mail addresses used. We
do not pass on, to any 3rd party vendors, any e-mail addresses,
used in any games here, whatsoever. All game postings are
automatically computer generated
by the game. For information on a Cookie file we use,
please click here.
games are created by the players, on the assumption, they are
welcomed by those who create their games. If you feel an
address is being abused, you can either delete the game, or ask
Admin to do so. Players who freely leave their e-mail addresses
in our Guestbook, should be aware of this. That
many unscrupulous people use software, specifically designed to extract
e-mail addresses from local text files, web site pages, search
engines and Newsgroups, and you may be sent spam mail that way.
No spam, or any viruses whatsoever, are sent from our site.
you are receiving excessive amounts of spam mail, you
might try checking your system for Adware, or Spyware software
as that software can track everything you do, and even
is any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware.
Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
Spyware is similar to a Trojan horse in that users unwittingly install the product when they install something else. A common way to become a victim of spyware is to download certain peer-to-peer file swapping products that are available today.
Aside from the questions of ethics and privacy, spyware steals from the user by using the computer's memory resources and also by eating bandwidth as it sends information back to the spyware's home base via the user's Internet connection. Because spyware is using memory and system resources, the applications running in the background can lead to system crashes or general system instability.
Because spyware exists as independent executable programs, they have the ability to monitor keystrokes, scan files on the hard drive, snoop other applications, such as chat programs or word processors, install other spyware programs, read cookies, change the default home page on the Web browser, consistently relaying this information back to the spyware author who will either use it for
advertising and marketing purposes, or sell the information to another party. For
information on Adware, and Spyware removal software, please click