Us > Fight Spyware
> Frequently Asked Questions
Frequently Asked Questions
did you install software on my computer without my permission?
ZEDO does not install software on computers.
How do I remove Zedo?
ZEDO does not install software on computers, so there
is no program to remove. If you would like to remove
your cookies, you can add zedo.com to the list of blocked
sites in your internet settings, then delete your cookies.
Instructions for this and opting out of the ZEDO cookie
can be found here
Why do I see ads coming from ZEDO?
The ZEDO technology hosts and serves ads and ad content
for hundreds of websites and advertisers across the
internet. This means, when a website you visit wants
to display an ad, and that websites uses ZEDO’s
ad serving technology, the ad you see will be served
from ZEDO, onto the website.
What is Adware?
Software in which advertisments are displayed while
the program is running, esp. in pop-up windows or banners.
While adware can be a good way for a user to try a legitimate
program without buying it, many adware programs are
installed without the user's knowledge or consent. Some
types of adware are also spyware and can be classified
as privacy-invasive software.
What is Spyware?
Any software that covertly gathers user information
through the user's Internet connection without his or
her knowledge, usually for advertising purposes.Once
installed, the spyware monitors user activity on the
Internet and transmits that information in the background
to someone else. Spyware can also gather information
about e-mail addresses and even passwords and credit
What is Malware?
Software, such as viruses, intended to damage or disable
a computer system without the owner's informed consent.
"Malware" is a general term used by computer
professionals to refer to a variety of forms of hostile,
intrusive, or annoying software or program code.
What is trojan?
A destructive program that masquerades as a benign application.
Unlike viruses, Trojan horses do not replicate themselves
but they can be just as destructive. One of the most
insidious types of Trojan horse is a program that claims
to rid your computer of viruses but instead introduces
viruses onto your computer.
What is phishing?
The act of sending an e-mail to a user falsely claiming
to be an established legitimate enterprise in an attempt
to scam the user into surrendering private information
that will be used for identity theft. The e-mail directs
the user to visit a Web site where they are asked to
update personal information, such as passwords and credit
card, social security, and bank account numbers, that
the legitimate organization already has. The Web site,
however, is bogus and set up only to steal the user’s
What is spam?
Unsolicited or undesired bulk electronic messages or
newsgroup postings. Some people define spam even more
generally as any unsolicited e-mail.
What is hijacking?
A specific type of spyware that will allow a hacker
or malicious perpetrator to spy on the infected computer's
Internet browsing activity. A browser hijacker lets
the perpetrator deliver pop-up ads, reset the browser
homepage, or direct the browser to Web sites the victim
would not normally visit.
What is cookie?
HTTP cookies, also referred to as Web cookies, tracking
cookies or session cookies, are parcels of text sent
by a server to a Web client (usually a browser) and
then sent back unchanged by the client each time it
accesses that server. HTTP cookies are used for authenticating,
session tracking (state maintenance), and maintaining
specific information about users, such as site preferences
or the contents of their electronic shopping carts.