SAFTY TIPS Archives » Website Development Agency

How to block Pop up Ads in your computer

Google Chrome, SAFTY TIPS

Last few days I’ve seen lot of irritating Popup Ads coming from my computer, I’ve found that those ads are initiated by Google Chrome Browser. Some time we click some pop up windows asking to allow or block which are coming in between our internet browsing, accidentally we click allow. Because of this mistake that website saved in out browser and it sends our search data to those website to show relevant ads. This is the step by step tutorial how to block those ads permanently from your system.

  1. Open your Goggle Chrome Browser and on the extreme right corner click the customize button it shows a list of options now select setting

2. In setting page click on Advanced you can find Privacy and Security tab

3. In Privacy and Security tab scroll down to find Site Setting tab

4. click on Site settings

5. Site settings page you can find Notification tab

6. Click on Notification tab you can find Blocked and Allowed website list

7. In Notification page go to Allow section and find the unwanted url and click

8. Now three options will pop out now select Block to block that website for permanently disable.

 

That all you’ve successfully block Pop up Ads in your computer.

Check if you’ve been part of an online data breach

INTERNET, SAFTY TIPS
data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed in an unauthorized fashion. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.
Forget about those hackers in movies trying to crack the code on someone’s computer to get their top-secret files. The hackers responsible for data breaches start by targeting companies, not specific individuals. They want to get data from as many people as possible so they can use, resell, or leverage it to make money. It all starts with getting your password.

You can’t stop hackers from hacking. But you can avoid bad habits that make their work easy.

Check if you’ve been part of an online data breach

All types of data can be valuable.

Some data — like banking information, bank card numbers, government-issued ID numbers, and PIN numbers — is valuable because it can be used to steal the victim’s identity or withdraw money. Email addresses and passwords are also valuable because hackers can try them on other accounts. All sorts of data can be valuable in some way because it can be sold on the dark web for a profit.

What makes a password easy to guess.

If hackers can get a list of email addresses from a data breach, they already have a good start. All they have to do is pick their website of choice and try these emails with the most popular passwords. Chances are, they’ll be able to get into quite a few accounts. So don’t use any of these 100 Worst Passwords of 2018.

  • 123456 and password are the most commonly used passwords. Don’t use them.
  • Switching a letter for a symbol (p@ssw0rd!) is an obvious trick hackers know well.
  • Avoid favorite sports teams or pop culture references. Use something more obscure.
  • Don’t use a single word like sunshine, monkey, or football. Using a phrase or sentence as your password is stronger.
  • Don’t use common number patterns like 111111, abc123, or 654321.
  • Adding a number or piece of punctuation at the end doesn’t make your password stronger.

One exposed password can unlock many accounts.

Hackers know people reuse the same passwords. If your banking password is the same as your email password is the same as your Amazon password, a single vulnerability in one site can put the others at risk.

It’s why you should use different passwords for every single account. The average person has 90 accounts, and that’s a lot of passwords to remember. Security experts recommend using a password manager to safely store unique passwords for every site.

Hackers don’t care how much money you have.

Think you don’t need to worry because you don’t have much money to steal? Hackers couldn’t care less. There are countless ways to leverage all types of personal data for profit.

Through identity theft, cyber criminals can open new credit cards or apply for loans in your name. By getting your financial information, they can make purchases or withdrawals. These attackers can even find ways to target your friends and family once they gain access to your email.

Click here to check See if you’ve been part of an online data breach

 

 

 

 

How to Delete your Personal Information collected by Google

GOOGLE, INTERNET, SAFTY TIPS, TIPS & TRICKS

Everyone worried about our privacy and safety of our personal information which are collected by Google and other online marketing websites. Google collect our personal information and sold to many online business and advertising companies for high profits. So how to avoid our personal information going to others without our concern.

Well, Yahoo! News has the step by step instructions for “How to Download and Delete What Google Search Knows About You”:

Have you ever wondered what Google Search really knows about you? Well, now you can check, as Google has added a new feature that lets you view and download your entire search history.

Yep. Everything.

The feature, which was spotted by the unofficial Google Operating System Blog — though VentureBeat points out that the function was made available in January — gives you access to everything from what you searched for to the links you clicked on from those searches. It also shows you the addresses you’ve searched for.

I was even able to see the list of images I clicked on while searching for pictures of cats eating spaghetti. Now imagine what you’ve looked for. Oh, and clearing your browser history won’t delete this data.

But there’s no reason to panic, because in addition to being able to download your search history, you can clear it.

First, here’s how to download your history:

1. Navigate to Google’s Web and App Activity page.

Personal Information collected by Google (3)

2. Next, click the gear icon in the top-right corner of the screen.

Personal Information collected by Google (4)

3. Then select Download from the drop-down menu.

Personal Information collected by Google (5)

You’ll then receive a pop-up window warning you not to download your search history to a public computer, as it contains a large amount of sensitive information.

4. If you want to continue, click Create Archive.

Personal Information collected by Google (6)

Once your history is downloaded, you’ll receive a link in a few seconds that lets you view your data.

If you don’t want to download your data, and would rather get rid of it, you can do that as well. Of course, there are some reasons to let Google keep your search data. For one thing, it guarantees faster search results. It also ensures that Google Now has all of the latest relevant information about you. If you delete your data, your searches won’t be as tailored to your habits.

Still want to get rid of your search history? Here’s how:

Before we get started, it’s worth pointing out that if you want to keep your information hidden, you can use your browser’s privacy option, which keeps Google from saving your data — though it can still be seen by your service provider or employer.

Simply deleting you browser history won’t clear the data saved by Google, as you’re only deleting the information stored by your browser and not what’s on Google’s servers. To do that, you’ll have to:

1. Navigate to the Web and App Activity Page and click the gear icon in the top-right corner.

Personal Information collected by Google (7)

2. Select Remove Items and choose the beginning of time from the drop-down menu.

Personal Information collected by Google (1)

3.Click Remove and kiss your data goodbye.

Personal Information collected by Google (2)

That’s it. All of your search history will be deleted, and you’ll never have to worry about Google knowing about the time you looked for tickets to a Justin Bieber concert.

 

How can you protect yourself while online?

BROWSER, COMPUTER TIPS, INTERNET, SAFTY TIPS, TIPS & TRICKS

When sending confidential information over the Internet such as usernames, passwords, or credit card numbers only send it securely. To verify this look for a small lock (Internet browser security lock) in the bottom right corner of your browser window or next to the address bar (as shown below). If visible, this lock should also be in the locked position and not unlocked.

Internet Explorer 7.0 secure address bar
Internet Explorer 7 secure address bar

We also suggest making sure the URL begins with https as shown above.

While the lock is in the lock position, data is encrypted, which helps anyone from understanding the data if it’s intercepted. When no lock is visible or in the unlocked position all information is plaintext and if intercepted could be read. If a web page is not secure, such as an online forum, use a password you wouldn’t use with protected sites such as your online banking website.

E-mail is not encrypted

Websites should not transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted and if intercepted by a third-party could be read.

Be aware of phishing scams

Familiarized yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.

Use a safe password

Websites that store confidential data, such as an online bank site need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords consider using a password manager.

Use caution when accepting or agreeing to prompts

When prompted to install any program or add-on make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program cancel or close the window.

Additionally, when installing any program watch for any check box that asks if it’s ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.

Be cautious where you’re logging in from

Business

Your place of work can install key loggers or use other methods of monitoring the computer while online. Someone who has access to this information could read these logs and gather usernames and passwords. Also, do not store any passwords in your browser if your computer is shared with other coworkers.

Wireless network

When on a wireless network realize that all information being sent to and from your computer can be intercepted and read by someone nearby. Prevent this from happening by only logging into a secure network using WEP or WPA. If this is a home wireless network, make sure it is secure.

Friends house

Be concerned when logging into an account from a friends computer. A computer or network you are not familiar with could intentionally or unintentionally log usernames and passwords. Finally, when logging into any site on a friends computer never save the password information on their browser.

Be aware of those around you

While at work, school, library, or anywhere that has people around who could look at the monitor be cautious of anyone shoulder surfing. Someone could watch you type in your password, which would give them access to your account.

If you need everything displayed on the screen to remain private, consider a privacy filter for the display.

Update Internet browser plugins

Often many attackers find security vulnerabilities through browser plugins such as Adobe Flash. Make sure all installed Internet plug-ins are up-to-date.

Secure saved passwords

Make sure to store passwords and login information in a secure area. Never write login information on a sticky note or in a text file that is not encrypted.

To save your passwords we recommend using a password manager, which stores all login information and securely encrypts and password protects that information.

When saving password information in a browser, it may be visible by anyone who has access to your Internet browser. For example, without a master password setup in Firefox anyone can see all stored passwords.

Use a third-party service to confirm the safety and security of a page

We recommend the free Web of Trust (WOT) tool to verify the safety of all websites on the Internet.

How to Change Bing Safe Search

GOOGLE, INTERNET, SAFTY TIPS, Search Engine

Nowadays our kids are very familiar with  search engine  more than us, from their studies to entertainment they’re searching there. So I am going to explain how to save them from adult and irrelevant results in Microsoft Bing search engine.

How to turn off Bing Safe Search?  Bing is Microsoft’s new search engine, but the strict filters may be blocking valid text content you need to surf. How can you change the Bing safe search preferences from Strict to Moderate in India and many other countries, or turn on Strict filters in countries where the safe filter is set to moderate.

To edit the safe search preferences, you need to look at the top right corner and click Extras > Preferences.

bing-preferences

If you do not see a safe search preference option on that page, it means Strict Safe Search is enabled by default in your region. The Strict Filter will remove all explicit text, images, and videos from your search results. Here is what typically will happen when you search for blocked terms

bing-banned

If you check the Google Safe search settings, they are set to Moderate Filtering by default, which means block bad images only. But the Bing settings are set to Strict if the option is not available in your country. So your text results are also filtered.

google-safesearch

Change Bing Safe Search Settings

To change the options, you can change the country. Click on the country in the top right corner and select “United States – English”, or you can directly select US as your country. Now you can again go to Extras > Preferences and you will have the moderate safe search option selected by default, which will filter bad images and videos, but not text, from your search results.

google-safesearch

On the other hand, if you are in the US or other countries where moderate filters are on, you can go to Extras > Preferences and change your filter to Strict, which will stop all types of offensive content in one go. This is a good idea if children are surfing the web and you do not wish to get surprised by offensive search results slipping through filters. Bing also lets you report websites with adult content, if they are entering your search results with the strict filter on.

Why Different Regional Safe Filters?

Microsoft has updated their blog on the safe search issues and informs that the filters are on by default and if you need to turn it off, you need to confirm you are over 18 years.

Update: Microsoft advises you can add adlt=strict to the end of a query and no matter what the settings are for that session, it will return results as if safe search was set to strict.

How to Lock Google Safe Search to Protect Children Online

GOOGLE, INTERNET, SAFTY TIPS, Search Engine

Nowadays our kids are very familiar with Google search more than us,  from their studies to entertainment they’re searching there. So I am going to explain how to save them from adult and irrelevant results in google search engine.

Did you know that you can lock Google safe search, to protect your children online from searching adult content, and getting surprised by unexpected sexual search results. If your children use the same computer and browser that you do,  then it is highly recommended that you to enable and lock strict safe search, besides using a good parental control software and a filtered web browser.

Google does provide an option for strict search results, but it doesn’t serve much purpose as children can always turn off safesearch in click. Don’t think that your children would do that –  if they created an underage Facebook account, this is much easier.

google-search-settings

So the good idea would be to apply strict search filtering, and Lock safe search with password protection of your Google account.

How to Lock Safe Search?

Proceed to the search settings icon (gear shaped), and choose search settings. In the safe search filters, choose the strict filtering option which will filter out most explicit sexual content from webpages, images and videos.

lock-safe-search

Once you decide to lock safe search, the good thing is that Google will lock this across all Google domains, so children cannot use a different Google domain name like google.in and get access to unmoderated search. Now Google will ask you for your Google account password which will lock the search results.

safesearch-locked

That’s it. Now all the Google search results will be strict filtered and will need your Google account password to unlock safe search. This is how the coloured Google balls will appear on the top right of the screen when this Google safe search is activated and locked (which parents can easily monitor from across the room).

google-search-blocked

In fact, I would also go ahead and recommend that you turn off Google instant search and show more search results instead, so that unexpected results and images don’t appear in the window below as your children continue to type their search terms.

Remember, this is just one option for parental control on Google search. Even after activating it, you will still find a lot of content which you may feel is explicit for your children, but still it is better than not having unlocked Google safe search at all.

Internet is an unsafe place, and there are hundreds of other ways in which children can access adult content and unblock websites, so you must activate parental control software on your computers. There are so many image search engines, and just blocking Google image search does not block explicit images.

Microsoft Bing search turns on strict safe search in most countries by default, and you can learn about how to turn on  Bing Safe Search in your region.

Simple Facebook Security Tips

INTERNET, SAFTY TIPS, SOCIAL MEDIA

Facebook is a great way of keeping in touch with friends. However, you need to be very careful about the type of information that you reveal… just in case it falls into the wrong hands.

Internet Security tips – to help you use Facebook more safely

With cybercriminals using a wide range of financial scams in order to try to steal money – and criminals also making bogus ‘friend requests’ in order to capture personal information – it’s wise to be careful in how you use Facebook. Here are a few Facebook security tips to help keep you safe:

Facebook Security Tips

  • Verify every Facebook contact
    Make sure that the person you’re talking to… really is the person you think they are. Try to verify their identity.
  • Protect your banking and financial information
    Never disclose anything about your bank accounts, credit cards, debit cards, or other financial information on Facebook.
  • Be wary of strangers
    Don’t add or accept friend requests from people that you don’t know.
  • Keep your password secure
    Taking a little extra care over your password can be a vital element in your Facebook security:

    • Devise a complex password that will be difficult for others to guess
    • Ideally, your password should use a mixture of letters, numbers, and symbols
    • Remember to change your password frequently
    • Don’t use the same password for Facebook and other websites. If the security of your password is compromised on one site, it may then be used to access your Facebook account
  • Secure your computer, your mobile devices, and your data
    Install a rigorous anti-malware solution on your computer, smartphone, and tablet – to protect your devices against the latest computer viruses, worms, Trojan viruses, and other threats.

Sponsored by
Kaspersky Lab US E-Store

5 Tips to Stay Safe on Internet

COMPUTER TIPS, INTERNET, SAFTY TIPS, WEBSITE
As the Internet becomes an increasingly integral part of daily life, questions about privacy and security on the Internet are on the rise. Keeping your personal information, private data and finances safe can be difficult, but by following a few tips, you can avoid the vast majority of scams, spyware and privacy breaches.

Tip 1. Be Aware

The best tool to avoid spyware and stay safe on the Internet is your own brain. Free software with no potential upgrades or strings attached, websites that are covered in flashy ads, and free Wi-Fi in an unexpected place are all signs that something may be wrong, and ignoring that intuition can get you in trouble. By staying aware of what you are doing, and thinking about your security while you live your online life, you stand a better chance of avoiding potentially dangerous situations.

internet safetyTip 2: Check for website safety

The Internet can be dangerous because so many websites require your personal information to either log in to your account or to complete a transaction. Hackers, thieves and spyware programmers realize this and often try to intercept your information during these transactions, so make sure you are always dealing with secure websites and companies. First, only provide your information to reputable businesses, then ensure that the company’s website uses a Web address that starts with “https” and has a padlock symbol either in the address bar or at the bottom of the browser. This means that the site encrypts your information, making the data nearly useless to any thieves or hackers who may intercept the transmission.

Tip 3: Choose strong and varied passwords

For most people, a password is the strongest protection to ward off hackers and thieves, and yet so many choose passwords that are barely worth the time it takes to enter them. When creating a password, always use a mix of letters and numbers, and include a symbol if the website allows it. While more difficult to remember, this will make your password almost impossible to guess.

More importantly, you have to use different passwords for different websites. Think about how often you use the same username and password for many online accounts. Hackers specifically target low-security sites to gain access to large lists of usernames and corresponding passwords, knowing that many people use the same combination of credentials for things like online banking.

Additionally, take advantage of any two-factor authentication offered by these sites. This requires not only a password to log in, but a code that’s sent to a dedicated device or to your smartphone as an SMS message. This makes it very difficult for a third party to hack into your account.

Tip 4: What is spyware? How do I stop it?

Spyware probably poses the biggest threat to privacy and security on the Internet, yet so few people really know what it is or how it works. Put simply, spyware is any piece of software that records your actions or information without your knowledge. Some spyware is fairly benign, tracking browsing history and keeping the data it receives anonymous, while other spyware is specifically designed to get your online banking credentials so thieves can clean out your accounts.

Because it’s almost impossible to avoid spyware on your own, having anti-spware and antivirus programs running on your computer is a must. These programs will automatically scan any piece of incoming software for malicious signatures and block the installation if the program looks suspect. They’ll also scan existing files and monitor Internet traffic to ensure that spyware isn’t hiding somewhere on the machine and sending your information to some hacker’s terminal.

There are free anti-spyware programs out there, but you have to be careful when trying to save a buck or two — quite a few of these programs are really Trojan horses in disguise, looking to infect your machine instead of protect it. Instead, your best option is to go with an industry leader. These companies have no interest in scamming you, and are big enough to ensure that their databases are constantly updated as new threats emerge. The best options also offer a free trial, so you can see the anti-spyware program in action before paying some of your hard-earned cash.

Tip 5: It’s not all about spyware and scams

With all this talk about spyware, hackers and Internet security, it’s important to remember that most people with privacy issues on the Internet put themselves in that position. Think about social networking sites and just how much personal information you have posted there. If someone were trying to steal your identity and needed your father’s middle name or where you went to elementary school — two commonly used security questions — you need to think about how a thief could locate those facts. If you’re concerned about Internet privacy, you have to consider staying away from social networking sites, minimizing the information you put out there, or maximizing privacy settings on these sites.

Complete privacy and security on the Internet is a tough goal to reach, these tips will help you go a long way toward keeping yourself safe. Millions of people use the Internet, and thieves will inevitably go for easy targets. People who give even the smallest amount of thought to security and privacy, and take steps in that regard, will find themselves passed over as thieves search out greener pastures.

Sponsored by
Kaspersky Lab US E-Store

Protect Yourself Online – Internet Safety Tips

COMPUTER TIPS, Google Chrome, INTERNET, MICROSOFT, SAFTY TIPS, WEBSITE

Protect Yourself Online - Internet Safety TipsInternet threats continue to pose a problem for anyone that surfs the Internet — and yes, that includes you reading the headline and thinking you know it all. In this article we will show you how to protect yourself using some “best practices” for safely surfing the Internet, all without spending a dime.

Background on Internet Threats

Anyone can throw around terms such as “spyware” and “viruses”, but what exactly are they? It helps to know before trying to figure out how best to avoid such problems. Here are the basics:

  • Malware: Short for “malicious software”. Resides and runs on a user’s computer without their consent or knowledge. Malware can be used as an all-inclusive term for viruses, spyware, keyloggers, worms, and Trojan horses, and other Internet threats.
  • Spyware: A type of malware that collects information about users, including personal information and habits (sites they visited). It can also trigger popups and install additional malware.
  • Virus: A type of malware that can replicate itself and infect other computers through a network or media (such as a flash drive). Viruses can do multiple harmful things to a user’s computer, such as taking it over and using it for malicious purposes.

Three Steps to Internet Safety

This guide will take you through three relatively simple steps to protect yourself on the Internet:

  1. Install Mozilla Firefox
  2. Install the McAfee Site Advisor tool
  3. Change your online habits

Step One: Install Mozilla Firefox

Yes, “Install Mozilla Firefox” may be clich; however, there is sound reasoning why this is a good piece of software. Let’s cut the marketing nonsense — here are the tangible things I like about Firefox:

  • Pop-up blocker: Pop-ups are perhaps the most annoying form of advertising, and Firefox takes care of them for you. It will let you know a pop-up was blocked in case you were expecting one.
  • Unsafe site warnings: If you go to a website that is fraudulent, untrusted, or has known security problems, Firefox will actually prevent the site from loading.
  • Integration with anti-virus software: Firefox works with your resident anti-virus program to scan downloaded files for security threats.
  • Automatic updates: Firefox automatically updates itself, so your defenses stay current.
  • Private browsing: Firefox normally remembers what websites you visited, however in private browsing mode (which is easy to toggle on and off), it will not remember anything you did. This feature is handy when logging into banking sites that you want to leave no trace of on your computer (or someone else’s). Private Browsing can be activated from the tools menu and clicking “Start Private Browsing”; do the same to turn it off:

Without further delay, follow this link to Mozilla’s official website and download Firefox for your computer.

Firefox is a small 8MB download. Click Download and thensave the file to your computer to a location you know (such as My Documents). Double-click the downloaded file and install Firefox with the default settings. Done? Great! Those familiar with Internet Explorer should be able to adapt to Firefox without much trouble — it gets natural after a day.

Step Two: Install the McAfee Site Advisor Tool


Certain websites are created with malicious intent; for example, some might try to infect your computer with malware and others might be fake phishing sites designed to steal your personal information. McAfee, a computer security company, has a Site Advisor tool that displays ratings next to links in search engines (such as Google and Yahoo), indicating whether or not the listed sites are safe (see here for thorough information on how it works). Site Advisor works with both Mozilla Firefox and Internet Explorer. Simply download and then install McAfee Site Advisor using the default settings (leave everything as-is, though I recommend unchecking the option to install the unnecessary Yahoo toolbar).

Once installed, restart Firefox and test Site Advisor out. Make sure your default search provider is set to McAfee first — in the top right next to the search box, click the down arrow and select McAfee Secure Search:

Now search for something and check out the results page — each link has a little icon next to it that indicates whether the site is safe or not.

Green means good, yellow is caution, and red means unsafe/untrusted. A question mark indicates the site has not been scanned yet. As a rule of thumb, only click on the green links.

Below is an example of what search results look like after installing the Site Advisor tool:

And yes, NotebookReview.com is totally safe — but you knew that.

The Site Advisor tool is great to have when you are searching for things you do not usually search for (and thus might be unfamiliar with sites that come up). It never hurts to double-check. As always, use your judgment when clicking on links. If something is too good to be true, it is.

Step Three: Change Your Online HabitsProtect Yourself Online - Internet Safety Tips 2

The single greatest danger you face on the Internet is yourself. More specifically, there is no software that can compensate for your poor Internet safety habits.

Let’s start with how much critical information you willingly give away. This is the Internet — information posted online can be seen by almost anyone, and secure websites can be hacked. Even restricted pages such as your Facebook profile are not entirely safe — someone with access (such as your “friends”) could copy and paste the information to a Web page that isn’t truly private. The bottom line here is that you need to be extra careful with yourself on the Internet. Below are a few of the habits I see daily that present huge security risks to the users:

? Connecting to unsecured wireless networks: You know that coffee shop down the street that offers free Wi-Fi? That free Wi-Fi access could cost you a lot if it is unsecured (Windows will indicate whether a network is secured/unsecured when you try to connect). An unsecured connection is an open network that allows anyone to connect — information passed from your laptop to the wireless router and vice versa can be intercepted by people with the right tools since it is not encrypted. Additionally, network attacks can be made from other computers connected to the network.
Internet Safety Habit: Avoid unsecured Wi-Fi

? Accessing secure websites in public: Even on a secured network, remember that people can see what you type on your laptop screen. All it takes is one person to walk by with a camera phone and snap a picture of your online banking page. The same is true at your office, where all it takes is one nosy coworker poking over a cubicle wall or an unscrupulous network administrator spying on your workstation to snag your passwords.
Internet Safety Habit: Access secure websites only at home

? Saving personal information on shopping websites: Most shopping sites offer to save your credit card and address information for easier checkout in the future. While this is convenient for the few sites you shop at regularly, please do not opt to save info on every site you shop. Though the information is supposedly secured, successful hacking attempts have occurred in the past and personal data has been stolen. Also, there are too many stories of personal information getting “lost”.
Internet Safety Habit: Don’t save credit card numbers on shopping sites

? Posting personal information on social networking sites: I find it amusing that people post the details of their personal lives on social networking sites such as Facebook, give a platoon of their “friends” access, and then complain about privacy issues. Am I the only one that can see the issue here?
Internet Safety Habit: Only post information online you want everyone to see

? Keep your computer personal: Internet browsers such as Internet Explorer and Mozilla Firefox make it easy to store password and form information (such as names and addresses used in order forms). Anyone that opens the web browser on your computer can check your browsing history, visit your “secure” sites (like your Web-based email) and automatically log in as you because you opted to have the browser save your password. Avoid storing passwords, or better yet, password-protect your computer and lock it when not in use (press the Windows key and L to lock your computer). Make a second account on your computer for other people to use so your information is kept separate, and make sure that account is password-protected and not an administrator.
Internet Safety Habit: Never save passwords on any computer that you share

? Do not install software you do not explicitly want: Many software vendors try to sneak additional pieces of software on your system during the install process. For example, toolbars for your Internet browser, updater tools, and other unnecessary (and annoying) items. If you wanted those pieces of software, you would have installed them on your own.
Internet Safety Habit: Install as little software as possible


Save Filter
×