Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, Or have you been turned on to Or maybe some friend sent you an email suggesting you log on to one of these sites and take advantage of one of its numerous "free offers."

Well, before you start the process of getting that "free" iPod, I'll take you through what's required. Then, you can decide for yourself how free it really is.

After you log on, the first thing you will be required to do is register, which means providing your name, address, email address, etc. Sounds easy so far.

Next, you will be required to sign up for one of the site's free offers. For example, you could sign up for a credit card or buy low-cost printer inks. Gosh, imagine, all you have to do is sign up for a credit card and you get this nice iPod absolutely free.

Not so fast there, friend.

Choosing an offer is only part of the deal. Because, after you sign up for that free credit card (or whatever), you will be required to supply five email addresses of friends or relatives. Hmm, even that doesn't sound too bad. Heck, so maybe five of your friends get some emails from They're probably getting a lot of junk mail already so what's the big deal?

That it's, right? Your free iPod should be in the mail. Hold on a second. wants to check the offer you chose was legit, You'll be told this process could take a few days and that you should check back periodically.

You log on two days later and Eureka! The system found that you did buy those printer inks or did sign up for that credit card. Now, your iPod is on the way, right?


Next, you will be required to contact those five friends or relatives to make sure they take advantage of one of those wonderful offers. That sound like a good idea to you? How about, "Dear Aunt Ivy. Will you please register on and sign up for a credit card so I can get a free iPod?"

Here's another thing to think about. Suppose only four of those five friends sign up for free offers. Does this mean that's sponsors got four new customers and you got nada?

This just didn't seem like a good thing to me. I didn't want to harass five of my friends to sign up for a credit card or whatever. Instead, I just gave up on getting a "free" iPod. I'm not even sure that if everybody had signed up for an offer that I would have gotten the "free" iPod. Maybe there would have been even more hoops for me to jump through before that "free" iPod was sent to me.

I have been told that if you go through the entire process (whatever that is), you will receive the free iPod.

But there is that old saying, "If it seems too good to true, it probably is." And for me, getting an iPod free falls into that category. It might seem free to you but just understand that this "free" comes with a definite price.

For FREE help with debt and credit, subscribe today to Douglas Hanna's free email newsletter "8 Simple Steps to Debt Relief" at

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

USPS Site Exposed Data on 60 Million Users
Krebs on Security
“This is not even Information Security 101, this is Information Security 1, which is to implement access control,” Weaver said. “It seems like the only access control they had in place was that you were logged in at all. And if you can access other ...

and more »

The Hill (blog)

Inability to fulfill key positions threatens our national security
The Hill (blog)
The U.S. government faces a number of threats to its national security: think of a rising China, Russia, a nuclear armed North Korea, and cybersecurity. What hinders our ability to address these challenges? Vacancies in key top leadership positions.


In the Name of Security
In the name of security, the defense minister resigned, and in the name of the position of defense minister, the education minister almost resigned, before backtracking — in the name of security. None of the parties to this dirty prank cared about ...

and more »

Chicago Tribune

Cook County correctional officer owns bar where security guard Jemel Roberson shot by cop, officials say
Chicago Tribune
A Cook County correctional officer owns the Robbins bar where security guard Jemel Roberson was fatally shot by a Midlothian police officer on Nov. 11, officials said. Manny's Blue Room Lounge, which does not have a valid state liquor license and had ...

and more »

Miami Herald

Leave your shoes on in airport security? You can thank the dogs
Miami Herald
Though Miami International has 12 security checkpoints, only one checkpoint at a time uses an explosive-sniffing dog team. The airport currently has 10 working dogs and four in training. The dog teams have worked at the airport year-round since 2010 ...

and more »

Naples Daily News

When it comes to personal security, you can never be too careful
Naples Daily News
Shame on me, one of the most organized and security-conscious people you'll ever meet, for logging onto the unsecured Wi-Fi at Miami International Airport last summer. I knew it was the wrong thing to do, but feeling impervious to hackers and somewhat ...

Chicago Tribune

Toni Preckwinkle's administration mostly redacts report that led to security chief's firing
Chicago Tribune
Cook County Board President Toni Preckwinkle on Wednesday continued to keep secret details in a report that preceded the firing of her security chief, releasing a heavily redacted document in response to a records request. County Inspector General ...

and more »

News On 6

Tulsa Police Stress Importance Of Home Security During Holidays
News On 6
TULSA, Oklahoma - There are a lot of things you can do to protect your home as you head out of town for the holidays like buying cameras, leaving lights on, or even telling neighbors to check on your home. Security companies say sales for security ...


Mozilla Wants to Make Security and Privacy a Front-and-Center Holiday Shopping Issue
The privacy-centric nonprofit responsible for web browser Firefox and digital reader Pocket released a holiday shopping guide that puts security and privacy reviews of popular products front and center. It's the second year in a row the company ...


Creepy or Not, Face Scans Are Speeding up Airport Security
Glass security barriers block the jet bridge when a passenger walks up. Then a camera slides up or down inside a slim white pillar, snaps their profile, and flashes a green check mark (or a red cross if it doesn't recognize them). And lo, the glass ...

and more »
Google News

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More

How To Give Away Your Personal Information

Identity Theft and Your Personal Information -------------------------------------------- Identity theft is... Read More

Desktop Security Software Risks - Part 1

This is the second in a series of articles highlighting... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Reclaim Your PC from the Internet Spies

Viruses are, however, not the only malicious software programs out... Read More

3 Simple Steps to Stay Safe from Spyware

There are several basic concepts to keep in mind when... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Securing Your Accounts With Well-Crafted Passwords

In the past I've never really paid much attention to... Read More

What Every Internet Marketer Should Know About Spyware

If you run any type of Internet business, Adware and... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Is Your Music Player Spying On You?

In today's times spyware is a very serious issue and... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Spyware, This Time Its Personal!

First the basic definition of Spyware: It is a type... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Email Hoaxes, Urban Legends, Scams, Spams, And Other CyberJunk

The trash folder in my main inbox hit 4000 today.... Read More

What is Hacking? Are You a Hacker?

WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More