*************************************** ** ** ** IE-SPYAD ** ** for ZonedOut ** ** ** ** Restricted Sites List ** ** for Internet Explorer ** ** ** *************************************** -------- Overview -------- IE-SPYAD for ZonedOut contains a set of Internet Explorer "Restricted sites" lists for use with ZonedOut, a free Internet Explorer zone management utility: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 ZonedOut automates the process of loading the IE-SPYAD sites list into Internet Explorer's Restricted sites zone. In order to use the Restricted sites lists included in this package, you must download and use ZonedOut. Like the "original" IE-SPYAD (which has been "retired" and is no longer available), IE-SPYAD for ZonedOut adds a long list of sites and domains associated with known advertisers, marketers, and crapware pushers to the Restricted sites zone of Internet Explorer. Once you merge this list of sites and domains into the Registry, the web sites for these companies will not be able to use cookies, ActiveX controls, Java applets, or scripting to compromise your privacy or your PC while you surf the Net. Nor will they be able to use your browser to push unwanted pop-ups, cookies, or auto-installing programs on your PC.  Please note that IE-SPYAD for ZonedOut is not an ad blocker. It cannot cause Internet Explorer to start blocking standard banner ads. You will still see most banner ads. IE-SPYAD merely enables Internet Explorer to impose limits on what advertisers, marketers, and crapware pushers can do with your web browser. For example, IE-SPYAD will: * STOP UNWANTED CRAPWARE from being installed behind your back via "drive- by-downloads"; * PREVENT THE HIJACKING OF YOUR HOME PAGE and other key Internet Explorer settings; * SHUT DOWN ACTIVEX, JAVA, AND SCRIPTING, all of which can be employed to push obnoxious advertising on you and compromise your privacy and security; * BLOCK COOKIES, which can be used to monitor and track your travels around the Internet; * COMBAT OBNOXIOUS SCRIPT-BASED POPUPS that clutter your screen and force unwanted advertising on you. These Restricted sites lists are based in part on info from discussions in major anti-spyware forums, the latest updates to well-known anti-crapware programs, other crapware reference sites, and the latest updates to publicly available HOSTS files. For a discussion of the reasons that sites and domains might be included in IE-SPYAD, see the following web page: Targeting & Inclusion Policy http://www.spywarewarrior.com/uiuc/target-policy.htm For privacy and security in Internet Explorer, you may also be interested in another utility available from this site: Enough is Enough! http://www.spywarewarrior.com/uiuc/resource6.htm ~~~~~~~~~~~~~ Compatibility ~~~~~~~~~~~~~ This Restricted Sites list can be used with the following versions of Internet Explorer: Internet Explorer 8.0 (see note below) Internet Explorer 7.0 Internet Explorer 6.0 (incl. SP1 & SP2) Internet Explorer 5.5 (incl. SP1 & SP2) Internet Explorer 5.01 (incl. SP1 & SP2) Internet Explorer 5.0 Internet Explorer 4.01 (incl. SP1 & SP2) Internet Explorer 4.0 These Restricted sites lists work only with Internet Explorer; they will have no effect whatsoever on Opera, Mozilla, Netscape 6.0/7.0, or the older Netscape Navigator/Communicator. As noted earlier, in order to load these Restricted sites lists into your Internet Explorer Restricted sites zone, you must use ZonedOut, an Internet Explorer zone management utility available for free from FunkyToad: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Note on Internet Explorer 8.0 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Early versions of Internet Explorer 8.0 had stability/performance issues with large numbers of domains loaded in the Restricted Sites zone. Those issues are now resolved. With the release of the June 2009 Cumulative Security Update for Internet Explorer 8.0, large Restricted Sites lists such as IE-SPYAD can be used with the Internet Explorer 8.0. See: http://www.microsoft.com/technet/security/Bulletin/MS09-019.mspx http://blogs.msdn.com/ie/archive/2009/06/09/ie-june-09-security-update-now-available.aspx#comments ~~~~~~~~~~~~~~~~~~~ Windows 2003 Server ~~~~~~~~~~~~~~~~~~~ If you're installing IE-SPYAD on Windows 2003 Server, there are some special considerations. Please see the "Windows 2003 Server" section below in "Notes on Installation & Uninstallation." ~~~~~~~~~~~~~~~ AOL Web Browser ~~~~~~~~~~~~~~~ The AOL web browser is actually just a fancy front-end to Internet Explorer. Although you may not have realized it, when you're surfing the web with AOL's web browser, you're actually using Internet Explorer underneath. AOL's embedded Internet Explorer web browser does rely upon the privacy and security settings from Internet Explorer. AOL's web browser will respect the Internet zone Security settings and, thus, will use IE-SPYAD's list of Restricted sites. From within the AOL web browser you can access Internet Explorer's Security zones, including the Restricted zone to which IE- SPYAD adds its list of domains and sites. In AOL, go to Settings >> Preferences, which has a link to Internet Properties (WWW) that calls up a dialog box titled AOL Internet Properties. Switch to the Security tab and you'll see the Restricted site zone. You don't need to do anything special to install IE-SPYAD on your system so that the AOL web browser will use IE-SPYAD's Restricted sites list. Follow the installation instructions below and you'll have IE-SPYAD installed for AOL's web browser. ~~~~~~~~~~~~~~~~~~~~~~ IE-SPYAD vs. IE-SPYAD2 ~~~~~~~~~~~~~~~~~~~~~~ The "original" IE-SPYAD came in two different versions: IE-SPYAD and IE-SPYAD2. Both versions of IE-SPYAD install the same block list -- the only difference was the Registry location where that block list is installed. IE-SPYAD: Installs to... HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains IE-SPYAD2: Installs to... HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains In other words, the original IE-SPYAD installed to the Registry location for the current user of the PC; IE-SPYAD2 installed to the global machine location, thus affecting all users and accounts on the PC. Starting with version 3.0 of ZonedOut, the IE-SPYAD Restricted sites list can be loaded by ZonedOut into both the the HKEY_CURRENT_USER Registry hive and the HKEY_LOCAL_MACHINE Registry hive. To load the IE-SPYAD list into the HKEY_LOCAL_MACHINE Registry hive, you will need to upgrade to version 3.0 (or higher) of ZonedOut, if you haven't already: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 Most users should should use a Restricted sites list that loads into the HKEY_CURRENT_USER Registry hive, as IE-SPYAD for ZonedOut does. A list loaded into the HKEY_LOCAL_MACHINE Registry hive should be used only if there is a compelling need to do so -- for example, if... 1) The administrator of the machine wants to install the block list simultaneously on all user accounts. 2) The original IE-SPYAD block list is not appearing as expected in the Restricted sites list for Internet Explorer. See the ReadeMe for the "original" IE-SPYAD for more information on IE-SPYAD2: http://www.spywarewarrior.com/uiuc/res/ie-spyad.txt ------------------ Installation & Use ------------------ In order to import and use the Restricted sites lists included in this package, do the following: 1) Download and install ZonedOut: ZonedOut is a free Security zones management utility for Internet Explorer that can be downloaded for from FunkyToad: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 Once downloaded, unpack the files from ZONEDOUT.ZIP to a directory of your choice. 2) Download and unpack the Ie-SPYAD for ZonedOut package Download IE-SPYAD for ZonedOut from: http://www.spywarewarrior.com/uiuc/resource.htm#IESPYAD_ZO Unpack the files in IE-SPYAD_ZO.ZIP or IE-SPYAD_ZO.EXE to a directory of your choice. A good default directory would be the same directory as you installed the ZonedOut program to. 3) Uninstall previous versions of IE-SPYAD Before installing any new IE-SPYAD Restricted sites list, you should uninstall older versions of the IE-SPYAD list first. You can use ZonedOut to uninstall those previous versions, even if you installed one of the "original" IE-SPYAD Restricted sites lists. To uninstall a previous version of IE-SPYAD, start the ZonedOut program. Then, from the "Menu," go "Remove Sites" >> Remove All." ZonedOut will remove ALL sites from your Restricted sites zone in Internet Explorer. Note: Custom Sites Lists If you have added your own custom sites to the Restricted sites zone, you will need to build your own custom sites list, which you can then re-loaded after you install IE-SPYAD for ZonedOut. A custom sites list is simply a plain text file with a list of domains and web sites. For an example of what kinds of entries can be included in your custom Restricted sites list, simply open the main IE-SPYAD for ZonedOut list (IE-ADS.TXT, itself a plain text file) and inspect the entries. Building your own custom sites list is really quite simple. You can even build this list within ZonedOut, then export it for future use through the menu option "Import/Export Sites" >> "Export to File." 4) Install the new IE-SPYAD for ZonedOut list From the "Current Key" combo box (top right corner of ZonedOut), celect the Registry hive you would prefer to load the IE-SPYAD list into -- the default is "Current User," which corresponds to HKEY_CURRENT_USER. "Local Machine" selects the HKEY_LOCAL_MACHINE hive. As noted above, most users should use the default "Current User." From the "Menu" in ZonedOut, go "Import/Export Sites" >> "Import from File." ZonedOut will open an "Open File" dialog box, where you can select the main IE-SPYAD for ZonedOut sites list file (IE-ADS.TXT). Once you've selected a sites list file to load, ZonedOut will offer to check for errors in loading the list. This error-checking is optional, though it will slow down the time ZonedOut takes to load a sites list. Note: "White Lists" If there are domains and sites included in the IE-SPYAD Restricted sites list that you would rather not load, you can build your own "white list," which ZonedOut can use to to remove those sites from the Restricted site zone. ZonedOut can even parse your "white list" auto- matically while loading the IE-SPYAD list, saving you the extra step of removing the domains in your "white list" from the Restricted sites zone after the fact. Lite a custom sites list (discussed above), a "white list" is a plain text file with a list of domains and web sites. For an example of what kinds of entries can be included in your "white list," simply open the main IE-SPYAD for ZonedOut list (IE-ADS.TXT, itself a plain text file) and inspect the entries. ZonedOut stores its "white list" in a file named ZWHITE. TXT, found in the same directory to which you installed ZonedOut. Building your own "white list" is really quite simple. To build your "white list" within Zoned Out, go "White List" >> "Edit White List" from the "Main Menu" in ZonedOut. Then use the "White List Editor" box to add and remove entries from your "white list," which ZonedOut stores in the plain text file named ZWHITE.TXT. (This file, by the way, is editable outside of ZonedOut.) ZonedOut provides several options for using your "white list." 1) Parse "white list" while importing IE-SPYAD list: ZonedOut can parse your "white list" automatically while loading IE-SPYAD for ZonedOut. From the "Main Menu" in ZonedOut, go "Import/Export Sites" >> "Import File\Parse White List." 2) Remove "white list" sites from Restricted sites zone: ZonedOut can also be used simply to parse your "white list" and remove any "whitelisted" sites from the currently loaded list of sites in the Restricted sites zone of Internet Explorer. From the "Main Menu" in ZonedOut, go "Remove Sites" >> "Remove White List Sites." 5) Install additional sites lists Once you've loaded the main IE-SPYAD sites list, you can load additional sites lists, including your own custom Restricted sites list. IE-SPYAD for ZonedOut comes with two optional sites lists: IE-NFE.TXT: this optional "Not for Everyone" list contains a number of sites and domains that some users may want to restrict, but others may not. Most servers & domains in this "Not for Everyone" list will not be loaded unless the double-asterisk and space (** ) are removed from the front of each line. Some entries in this optional list are enabled by default, so please take a look at the domains included in this list before loading it. Loading the "Not for Everyone" list may cause some of your favorite web sites to stop working properly. ADULT.TXT: this second optional sites list contains a number of "adult" domains that were removed from the original IE-SPYAD Restricted sites list several years ago. You can also load your own custom Restricted sites list, as explained in earlier in this section. Once you've loaded all the Restricted sites lists that you want, close ZonedOut. You're now ready to surf the Web safely using Internet Explorer! -------------- Uninstallation -------------- To uninstall IE-SPYAD for Zoned out, start the ZonedOut program. Select the Registry hive to which the IE-SPYAD list was installed ("Current User" or "Local Machine") from th "Current Key" combo box (top right corner of ZonedOut). Then, from the "Menu," go "Remove Sites" >> Remove All." ZonedOut will remove ALL sites from your Restricted sites zone in Internet Explorer. Note that if you have been using a custom Restricted sites list, you will need to re-load that list once you've finished uninstalling IE-SPYAD for ZonedOut. See the "Installation & Use" section above for a discussion of building your own custom Restricted sites list. -------------------------------------- Notes on Installation & Uninstallation -------------------------------------- ~~~~~~~~~~~~~~~~~~~ Windows 2003 Server ~~~~~~~~~~~~~~~~~~~ By default, Windows 2003 Server uses slightly different Registry locations to store zone entries for the Internet Security zones of Internet Explorer. Where all previous versions of Internet Explorer store zone entries in these two Registry keys: Domains: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Internet Settings\ZoneMap\Domains\ Ranges: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Internet Settings\ZoneMap\Ranges\ ...the version of Internet Explorer that ships with Windows 2003 Server stores them here: Domains: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Internet Settings\ZoneMap\EscDomains\ Ranges: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\ Internet Settings\ZoneMap\EscRanges\ In short, the DOMAINS key has become the ESCDOMAINS key, and the RANGES key has become the ESCRANGES key. ZonedOut, unfortunately, cannot load a Restricted sites list into the EscDomains EscRanges Registry keys. The version of Internet Explorer that ships with Windows 2003 Server can be configured to use the same Registry keys as other versions of Internet Explorer on other versions of Windows. In order to use IE-SPYAD for ZonedOut, you will need to configure Windows 2003 to use these standard Internet Explorer Registry instead of the special Registry keys used by default in Windows 2003. To configure Windows 2003 correctly, you must disable the Internet Explorer "Enhanced Security Configuration" component. When the "Enhanced Security Configuration" component is installed, Internet Explorer uses the special ESCDOMAINS and ESCRANGES Registry keys to store security zone entries. When the "Enhanced Security Configuration" component is disabled, Internet Explorer uses the same Registry keys as other versions of Internet Explorer. To disable the Internet Explorer "Enhanced Security Configuration": 1. Open "Add/Remove Programs" Control Panel applet. 2. Click the "Add/Remove Windows Components" button. 3. Uncheck the box for "Internet Explorer Enhanced Security Configuration." 4. Press the "Next" button to finish the reconfiguration. For more information on Windows 2003 Server and the Registry keys it uses for zone entries, see: What Is Internet Explorer Maintenance Extension? http://www.microsoft.com/technet/prodtechnol/windowsserver2003/ library/TechRef/1f105ee4-b025-478c-a03e-77fcd91a64e4.mspx Managing Internet Explorer Enhanced Security Configuration http://www.microsoft.com/downloads/details.aspx?FamilyID= d41b036c-e2e1-4960-99bb-9757f7e9e31b&DisplayLang=en Adding Sites to the Enhanced Security Configuration Zones http://msdn.microsoft.com/library/default.asp? url=/workshop/security/szone/overview/esc_development.asp ~~~~~~~~~~~~~~~~~ License Agreement ~~~~~~~~~~~~~~~~~ By installing and using the IE-SPYAD "Restricted sites" list, you acknowledge that you have read and agreed to the terms and conditions outlined in the "License Agreement," copies of which are included at the end of this ReadMe as well as in the LICENSE.TXT file included with this distribution package. -------------------- The Sites List Files -------------------- The main IE-SPYAD for ZonedOut Restricted sites list file (IE-ADS.TXT) is divided into the following sections: EMAIL NASTIES BIG AD DOMAINS COUNTERS MISC AD DOMAINS CRAPWARE DOMAINS DIALERS ADULT NETWORKS/SERVICES ADULT HOSTING The optional "Not for Everyone" list (IE-NFE.TXT) is also divided into several sections: IE xx.yy Special NOT FOR EVERYONE REMOVED All entries that lead off with a double-asterisk and space (** ) are "commented" out and, thus, ignored by ZonedOut when loading the sites list file. --------- More Info --------- For more information on the IE-SPYAD Restricted sites list, including troubleshooting advice and a full discussion of using this Restricted sites list with other privacy and security solutions, see the ReadMe for the "original" IE-SPYAD Restricted sites list: http://www.spywarewarrior.com/uiuc/res/ie-spyad.txt And for more information on the ZonedOut security zones management utility, please visit the home page for ZonedOut: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 All questions regarding the ZonedOut utility itself should be directed to the developer of ZonedOut. ------- Updates ------- All of the versions of IE-SPYAD are regularly updated. You can download updated versions of IE-SPYAD for ZonedOut from the same page where you downloaded your original copy of IE-SPYAD for ZonedOut. http://www.spywarewarrior.com/uiuc/resource.htm#IESPYAD_ZO That page lists the last time that IE-SPYAD was updated. I usually try to update IE-SPYAD several times a month, though I may update more frequently if circumstances warrant. There is no special forum, newsgroup, or web board for IE-SPYAD. I do hang out regularly in the following newsgroups and forums, however, and you can often find folks talking about IE-SPYAD (and other things related to privacy & security) in these places: DSLR/BBR Security Forum http://www.dslreports.com/forum/security,1 http://www.broadbandreports.com/forum/security,1 GRC Discussion Groups http://grc.com/discussions.htm Wilders Security Forum - Update Alerts http://www.wilderssecurity.com/index.php?board=26 I periodically announce updates to IE-SPYAD and AGNIS (my other main block list) in the the DSLR/BBR forum, the Wilders forum, and the GRC "LatestVersions" newsgroup (grc.news.latestversions). -------------------- Problems & Questions -------------------- I hope you find these Restricted sites lists helpful in your use of Internet Explorer. If you run into serious problems, and you have made every attempt to address the problem but remain stumped, I can be reached at: eburger68@myrealbox.com Please keep in mind that my busy schedule may not allow me to respond immediately. I will attempt to get back to you, though, and address your questions. All questions regarding the ZonedOut utility itself should be directed to the developer of ZonedOut: http://www.funkytoad.com/index.php?option=com_content&view=article&id=15&Itemid=33 Other helpful resources for getting answers to questions about ad blocking and general privacy questions include the GRC Privacy & Security news groups, which are generously hosted by Steve Gibson of Gibson Research (GRC): http://grc.com/discussions.htm ...and the DSL Reports (Broadband Reports) Security Forum: http://www.dslreports.com/forum/security,1 http://www.broadbandreports.com/forum/security,1 I've found the folks who hang out in all of these groups to be helpful, knowledgeable, passionate, and more than wise to the wiles of the marketing droids which infest the Net. Finally, you might also check out my web site at The University of Illinois at Urbana-Champaign, a site which contains a bevy of links to information and software relevant to Privacy & Security on the Internet: http://www.spywarewarrior.com/uiuc/ ------------------------------------------------- Date: 11/15/05, 11/20/05, 7/22/06, 1/18/07, 8/20/07, 4/13/09, 6/23/09 From: http://www.spywarewarrior.com/uiuc/ Made By: Eric L. Howes (eburger68@myrealbox.com) ------------------------------------------------- ------------------------------------- License Agreement: Terms & Conditions ------------------------------------- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ COPYRIGHTS, TRADEMARKS, DISTRIBUTION, WARRANTY ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ IE-SPYAD (including the block lists and the ReadMe) is Copyright (c) 2000-2005 Eric L. Howes. IE-SPYAD can be downloaded from: http://www.spywarewarrior.com/uiuc/resource.htm If you distribute IE-SPYAD, please include all the files. This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. Some files distributed with this package may not be covered by the GNU GPL. Those files remain the property of their original owners and are covered by the licenses under which they were originally distributed. All trademarks are the property of their respective owners. You should have received a copy of the GNU General Public License along with this program; see the file COPYING. If not, write to the Free Software Foundation 59 Temple Place - Suite 330 Boston, MA 02111-1307, USA ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ RESTRICTION OF FUNCTIONALITY & CONTENT ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By installing and using the IE-SPYAD "Restricted sites" list and/or the INSTALL.BAT installation utility, you acknowledge that you have read, understood, and agreed to following terms and conditions: a) The IE-SPYAD "Restricted sites" list contain lists of domains and web sites that your web browser will use to restrict the functionality and content of those sites and domains when they are displayed in your web browser. b) By installing the IE-SPYAD "Restricted sites" list included in this dist- ribution package, you acknowledge that it is your decision to restrict the functionality and content of the web sites and domains covered in the IE-SPYAD "Restricted sites" list -- including sites and services that may prohibit you from restricting their functionality and content or otherwise interfering with their services and software -- should you choose to use those sites, services, and domains. c) If you do not wish to restrict the functionality and content of certain of those sites, you can selectively edit the IE-SPYAD "Restricted sites" list -- either in its source file form or through your web browser's graphical user interface (GUI) -- to remove the list entries that restrict the functionality and content of those sites. d) You agree to accept any and all legal responsibility for the consequences that may result from the restriction of functionality and content of the sites and domains covered in the IE-SPYAD "Restricted sites" list when you use those domains and sites. e) If you have entered into contracts or agreements with the companies whose sites and domains are included in the IE-SPYAD "Restricted sites" list, and those contracts or agreements prohibit you from restricting the functionality and content of those sites or otherwise interfering with the companies' soft- ware or services, you agree that it is your responsibility to resolve those contractual obligations in a satisfactory manner. ------------------------------- Advice on Distributing IE-SPYAD ------------------------------- As noted above, IE-SPYAD is distributed under the terms of the Gnu General Public License, a copy of which is online HERE. That license gives you broad rights to modify and distribute IE-SPYAD, but in order to exercise those rights, you must abide by the terms of the license. At a minimum, to distribute, modify, or distribute modified versions of IE-SPYAD under the terms of the GPL: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) Furthermore, you must: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.) Since the IE-SPYAD Restricted sites list does not consist of binary code, the following would be sufficient: 1) Include a notice somewhere in the installation stating the following: This program makes use of a modified version of the IE-SPYAD Restricted sites list, which is available from: http://www.spywarewarrior.com/uiuc/resource.htm IE-SPYAD is (C) Copyright 2000-2005 Eric L. Howes. IE-SPYAD is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2, or (at your option) any later version. IE-SPYAD is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You can obtain a copy of the GNU General Public License from the Free Software Foundation online: http://www.fsf.org/licenses/gpl.txt 2) Include something like above notice in the ReadMe as well. In fact, you could include the above notice with any other acknowledgements and "thank you's" in your standard documentation. 3) Make a plain text version of the list available If you've embedded the IE-SPYAD Restricted sites list in a binary program, make a separate plain text version of the list (including your own additions and modifications to the basic list) publicly available either on your web site or with the program itself. ------- CONTACT ------- The author of IE-SPYAD can be contacted at: eburger68@myrealbox.com (Eric L. Howes) Jan. 23, 2008