Frequently Asked Questions
Why did you install your software on my computer without my permssion?
ZEDO does not install software on computers.
How do I remove Zedo?
ZEDO does not install software on computers, so there is no program to remove. If you would like to remove your cookies, you can add zedo.com to the list of blocked sites in your internet settings, then delete your cookies. Instructions for this and opting out of the ZEDO cookie can be found here.
Why do I see ads coming from ZEDO?
The ZEDO technology hosts and serves ads and ad content for hundreds of websites and advertisers across the internet. This means, when a website you visit wants to display an ad, and that websites uses ZEDO’s ad serving technology, the ad you see will be served from ZEDO, onto the website.
What is Adware?
Software in which advertisments are displayed while the program is running, esp. in pop-up windows or banners. While adware can be a good way for a user to try a legitimate program without buying it, many adware programs are installed without the user’s knowledge or consent. Some types of adware are also spyware and can be classified as privacy-invasive software.
What is Spyware?
Any software that covertly gathers user information through the user’s Internet connection without his or her knowledge, usually for advertising purposes.Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.
What is Malware?
Software, such as viruses, intended to damage or disable a computer system without the owner’s informed consent. “Malware” is a general term used by computer professionals to refer to a variety of forms of hostile, intrusive, or annoying software or program code.
What is trojan?
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
What is phishing?
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers, that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user’s information.
What is spam?
Unsolicited or undesired bulk electronic messages or newsgroup postings. Some people define spam even more generally as any unsolicited e-mail.
What is hijacking?
A specific type of spyware that will allow a hacker or malicious perpetrator to spy on the infected computer’s Internet browsing activity. A browser hijacker lets the perpetrator deliver pop-up ads, reset the browser homepage, or direct the browser to Web sites the victim would not normally visit.
What is cookie?
HTTP cookies, also referred to as Web cookies, tracking cookies or session cookies, are parcels of text sent by a server to a Web client (usually a browser) and then sent back unchanged by the client each time it accesses that server. HTTP cookies are used for authenticating, session tracking (state maintenance), and maintaining specific information about users, such as site preferences or the contents of their electronic shopping carts.