The controversy of SiteMeter installing ‘spyware cookies‘ on their user website’s visitors without any of their consent continues. Apparently, the SiteMeter Team posted a reply on the spyware allegations. Despite that, an individual suggested SiteMeter did not post any reply in their blog to prevent those who haven’t already know to get to know about it.
Check out this post to read what others think and feel about the whole spyware cookie episode.
The “spyware cookie” that is created on the user’s computer without their consent is named specificclick.net. Well, it is impossible to tell the whole world to stop using SiteMeter. However, what you can do is to protect yourself against it. It doesn’t matter if you do not have a blog or a website. As long as you have been surfing the Internet for the past 1 month, chances are your computer has already been infected.
What you need to do now is to check if your computer has already been infected. If it has, you will need to remove the cookie first. Then, you will need to block the cookie to prevent future infections. Michael Sync provided a detailed step-by-step instruction on how to remove specificclick.net and how to block it from future infections.
After you have finished all the steps, enter a website or a blog that has a SiteMeter counter in it. Check the cookies that was accepted in that session after the page has been fully loaded. If the specificclick.net cookie is no where to be seen, your ‘patch’ is successful.
Humans make mistakes. However, some mistakes can be avoided. SiteMeter sold out their users’ trust. Now, it is time to bare the consequences.