Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you been turned on to www.freeipods.com? Or maybe some friend sent you an email suggesting you log on to one of these sites and take advantage of one of its numerous "free offers."

Well, before you start the process of getting that "free" iPod, I'll take you through what's required. Then, you can decide for yourself how free it really is.

After you log on, the first thing you will be required to do is register, which means providing your name, address, email address, etc. Sounds easy so far.

Next, you will be required to sign up for one of the site's free offers. For example, you could sign up for a credit card or buy low-cost printer inks. Gosh, imagine, all you have to do is sign up for a credit card and you get this nice iPod absolutely free.

Not so fast there, friend.

Choosing an offer is only part of the deal. Because, after you sign up for that free credit card (or whatever), you will be required to supply five email addresses of friends or relatives. Hmm, even that doesn't sound too bad. Heck, so maybe five of your friends get some emails from www.freeipods.com. They're probably getting a lot of junk mail already so what's the big deal?

That it's, right? Your free iPod should be in the mail. Hold on a second. Freeipods.com wants to check the offer you chose was legit, You'll be told this process could take a few days and that you should check back periodically.

You log on two days later and Eureka! The system found that you did buy those printer inks or did sign up for that credit card. Now, your iPod is on the way, right?

Wrong.

Next, you will be required to contact those five friends or relatives to make sure they take advantage of one of those wonderful offers. That sound like a good idea to you? How about, "Dear Aunt Ivy. Will you please register on freeipods.com and sign up for a credit card so I can get a free iPod?"

Here's another thing to think about. Suppose only four of those five friends sign up for free offers. Does this mean that freeipod.com's sponsors got four new customers and you got nada?

This just didn't seem like a good thing to me. I didn't want to harass five of my friends to sign up for a credit card or whatever. Instead, I just gave up on getting a "free" iPod. I'm not even sure that if everybody had signed up for an offer that I would have gotten the "free" iPod. Maybe there would have been even more hoops for me to jump through before that "free" iPod was sent to me.

I have been told that if you go through the entire process (whatever that is), you will receive the free iPod.

But there is that old saying, "If it seems too good to true, it probably is." And for me, getting an iPod free falls into that category. It might seem free to you but just understand that this "free" comes with a definite price.

For FREE help with debt and credit, subscribe today to Douglas Hanna's free email newsletter "8 Simple Steps to Debt Relief" at http://www.all-in-one-info.com

In The News:


pen paper and inkwell


cat break through


Spyware Protection Software

Spyware protection software is the easiest way of removing spyware... Read More

How to Prevent Online Identity Theft

Identity theft rates one of the fastest growing crimes in... Read More

Burning Bridges is Bad, But Firewalls are Good

When you signed up for that ultra-fast DSL or Cable... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Lets Talk About Antivirus Software!

Nowadays more and more people are using a computer. A... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

Consumers: Shop Online and Get Information Safely

Do you really have to know how feeds work? Not... Read More

Web Browsing - Collected Information

You may not realize it, but as you are surfing... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

Spyware Removal

Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

The Important Steps To Protect Your Kids on the Internet

Internet is the ocean of knowledge. In this ocean you... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Identity Theft Offline -- So Many Possibilities

Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

Its War I Tell You!

There are ways to insure security though. You can get... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Is Your Email Private? Part 1 of 3

In a word, no - an email message has always... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Firewalls: What They Are And Why You MUST Have One!

A firewall is a system or gateway that prevents unauthorized... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Watch Out For That Scam

The IFCC (Internet Fraud Complaint Center) received over 200,000 complaint... Read More

Watching the Watchers: Detection and Removal of Spyware

If spyware were a person and he set himself up... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More