SlideShare a Scribd company logo
1 of 21
COMPUTER RESOURCES
   NICKO Sapnu
   It involves the right or mandate of personal
    privacy concerning the storing, repurposing,
    providing to third-parties, and displaying of
    information pertaining to oneself via the
    Internet.
   The first is that privacy helps individuals
    maintain their autonomy and individuality.
   Because of its functional benefits.
   attempting to acquire information.
   such as usernames, passwords, and credit card
    details by masquerading as a trustworthy
    entity in an electronic communication.
   Is a way to trick computer and Internet users
    into revealing personal and financial
    information through a fraudulent email or
    website.
   Phishing is typically carried out by e-mail
    spoofing or instant messaging.
    Phishing emails may contain links to websites
    that are infected with malware.
   an example of social engineering techniques
    used to deceive users,
   Phishing -a way of attempting to acquire
    information such as usernames, passwords,
    and credit card details by masquerading as a
    trustworthy entity in an electronic
    communication.
   Clone Phishing- A type of phishing attack
    whereby a legitimate, and previously
    delivered, email containing an attachment or
    link has had its content and recipient
    address(es) taken and used to create an almost
    identical or cloned email.
• Whaling- Several recent phishing
  attacks have been directed specifically at
  senior executives and other high profile
  targets within businesses, and the term
  whaling has been coined for these kinds
  of attacks.
• Spear Phishing- Attackers may gather
  personal information about their target
  to increase their probability of success.
   A Fake Facebook Login Page
   An Exploit Kit in a Fraudulent Facebook Page
   A Fraudulent Online Pharmacy Website
   A Fraudster's Order Page
   A Fraudulent YouTube E-mail
   A Fake Virus Scanner
   Disclosure of private information by either
    yourself or friends/contacts.
   Bullying.
   Cyber-stalking.
   Access to age-inappropriate content
   Online grooming and child abuse.
   People hacking into or hijacking your account
    or page.
• Friends’, other people’s and
  companies' posts encouraging you
  to link to fraudulent or
  inappropriate websites.
• People hacking into or hijacking
  your account or page.
• Viruses or spyware contained
  within message attachments or
  photographs.
   Be wary of publishing any identifying
    information about yourself – either in your
    profile or in your posts – such as phone
    numbers, pictures of your home, workplace or
    school, your address or birthday.
   Pick a user name that does not include any
    personal information. For example,
    “joe_glasgow” or “jane_liverpool” would be
    bad choices.
• Set up a separate email account to register and
  receive mail from the site. That way if you want
  to close down your account/page, you can
  simply stop using that mail account. Setting up a
  new email account is very simple and quick to
  do using such providers as Hotmail, Yahoo!
  Mail or gmail.
• Keep your profile closed and allow only your
  friends to view your profile.
• What goes online stays online. Do not say
  anything or publish pictures that might later
  cause you or someone else embarrassment.
• Be aware of what friends post about you, or
  reply to your posts, particularly about your
  personal details and activities.
• Remember that many companies routinely view
  current or prospective employees’ social
  networking pages, so be careful about what you
  say, what pictures you post and your profile.
• Learn how to use the site properly. Use the
  privacy features to restrict strangers’ access to
  your profile. Be guarded about who you let join
  your network.
• Be on your guard against phishing scams.
• Ensure you have effective and updated
  antivirus/antispyware software and firewall
  running before you go online.
   Allows you to browse the Internet without
    saving any information about which sites and
    pages you’ve visited.
   To put Firefox into a temporary state where no
    information about the user's browsing session
    is stored locally.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Start Private Browsing.
   When you turn on Private Browsing, Firefox
    alerts you that it will save your current
    windows and tabs for after you finish using
    Private Browsing. Click Start Private Browsing
    to continue.
   Check the box next to "Do not show this
    message again" if you don't want to receive this
    alert when you turn on Private Browsing.
   The Private Browsing information screen
    appears to confirm that you're in Private
    Browsing mode.
   When browsing in Private Browsing mode, the
    Firefox button will be purple (for Windows XP
    the window title will say (Private Browsing)
    instead) during your session.
   At the top of the Firefox window, click the
    Firefox button (Tools menu in Windows XP)
    and select Stop Private Browsing.




The windows and tabs you were using when you enabled Private
Browsing will appear, and you can use Firefox normally. The Firefox
button will turn orange again (for Windows XP the Firefox window title
will no longer say (Private Browsing)) when Private Browsing is off.
   It is safe for your computer data security.
   No one can track your data when you use
    secure browsing or private browsing.
   this is the safe and secure way for online
    banking .
   it clear the history and passwords when you
    close the browser.

More Related Content

What's hot

Facebook Security
Facebook SecurityFacebook Security
Facebook Securitythaash95
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settingsAbhishek Gupta
 
6 online identity
6 online identity6 online identity
6 online identityCOMP 113
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014B2BPlanner Ltd.
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15Naval OPSEC
 
online spying tools
online spying toolsonline spying tools
online spying toolsDeepa Jacob
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyJonathan Bacon
 
Phishing
PhishingPhishing
PhishingSyahida
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14Naval OPSEC
 
Internet use issues
Internet use issues Internet use issues
Internet use issues computers 11
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaEdureka!
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15Naval OPSEC
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1Rozell Sneede
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14Naval OPSEC
 

What's hot (19)

Facebook Security
Facebook SecurityFacebook Security
Facebook Security
 
Facebook and security settings settings
Facebook and security settings settingsFacebook and security settings settings
Facebook and security settings settings
 
6 online identity
6 online identity6 online identity
6 online identity
 
Online secuirty
Online secuirtyOnline secuirty
Online secuirty
 
Phishing
PhishingPhishing
Phishing
 
Home and Business Computer Security 2014
Home and Business Computer Security 2014Home and Business Computer Security 2014
Home and Business Computer Security 2014
 
Linked in 10mar15
Linked in 10mar15Linked in 10mar15
Linked in 10mar15
 
Online spying tools
Online spying toolsOnline spying tools
Online spying tools
 
online spying tools
online spying toolsonline spying tools
online spying tools
 
Notes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and PrivacyNotes to The Ten Commandments of Online Security and Privacy
Notes to The Ten Commandments of Online Security and Privacy
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Mobile wallets 5 nov14
Mobile wallets 5 nov14Mobile wallets 5 nov14
Mobile wallets 5 nov14
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Facebook 10 mar15
Facebook 10 mar15Facebook 10 mar15
Facebook 10 mar15
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
10 online privacy module samedit1
10 online privacy  module samedit110 online privacy  module samedit1
10 online privacy module samedit1
 
Online registration 25 aug14
Online registration 25 aug14Online registration 25 aug14
Online registration 25 aug14
 

Similar to Online privacy

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxHarishParthasarathy4
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxNoelBuctot1
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraDevsena Mishra
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUBilly Warero
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxDominicCaling
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2JayMarkBandoy1
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTTeacherNicaPrintable
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationSheryldeVilla2
 

Similar to Online privacy (20)

Chp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptxChp-15 Cyber Safety ppt-std 11.pptx
Chp-15 Cyber Safety ppt-std 11.pptx
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Rules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptxRules of netiquette-lesson 2.pptx
Rules of netiquette-lesson 2.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Mark Rogers' Social Network Presentation
Mark Rogers' Social Network PresentationMark Rogers' Social Network Presentation
Mark Rogers' Social Network Presentation
 
Cyberbullying and Cybercrime
Cyberbullying and CybercrimeCyberbullying and Cybercrime
Cyberbullying and Cybercrime
 
cyber safety.pdf
cyber safety.pdfcyber safety.pdf
cyber safety.pdf
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Cyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena MishraCyber security-awareness-for-social-media-users - Devsena Mishra
Cyber security-awareness-for-social-media-users - Devsena Mishra
 
IDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOUIDENTIFYING CYBER THREATS NEAR YOU
IDENTIFYING CYBER THREATS NEAR YOU
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Lecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptxLecture in Empowerment Technologies week 2.pptx
Lecture in Empowerment Technologies week 2.pptx
 
EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2EMPOWERMENT TECHNOLOGIES LESSON 2
EMPOWERMENT TECHNOLOGIES LESSON 2
 
INTERNET SAFETY
INTERNET SAFETY INTERNET SAFETY
INTERNET SAFETY
 
Guide to facebook security
Guide to facebook securityGuide to facebook security
Guide to facebook security
 
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINTEMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
EMPOWERMENT TECHNOLOGY - GRADE 11 POWERPOINT
 
eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015eSmart Libraries cybersafety presentation june 2015
eSmart Libraries cybersafety presentation june 2015
 
empowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentationempowerment technologies Powerpoint presentation
empowerment technologies Powerpoint presentation
 

Recently uploaded

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Online privacy

  • 1. COMPUTER RESOURCES NICKO Sapnu
  • 2. It involves the right or mandate of personal privacy concerning the storing, repurposing, providing to third-parties, and displaying of information pertaining to oneself via the Internet.
  • 3. The first is that privacy helps individuals maintain their autonomy and individuality.  Because of its functional benefits.
  • 4.
  • 5. attempting to acquire information.  such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Is a way to trick computer and Internet users into revealing personal and financial information through a fraudulent email or website.
  • 6. Phishing is typically carried out by e-mail spoofing or instant messaging.  Phishing emails may contain links to websites that are infected with malware.  an example of social engineering techniques used to deceive users,
  • 7. Phishing -a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.  Clone Phishing- A type of phishing attack whereby a legitimate, and previously delivered, email containing an attachment or link has had its content and recipient address(es) taken and used to create an almost identical or cloned email.
  • 8. • Whaling- Several recent phishing attacks have been directed specifically at senior executives and other high profile targets within businesses, and the term whaling has been coined for these kinds of attacks. • Spear Phishing- Attackers may gather personal information about their target to increase their probability of success.
  • 9. A Fake Facebook Login Page  An Exploit Kit in a Fraudulent Facebook Page  A Fraudulent Online Pharmacy Website  A Fraudster's Order Page  A Fraudulent YouTube E-mail  A Fake Virus Scanner
  • 10. Disclosure of private information by either yourself or friends/contacts.  Bullying.  Cyber-stalking.  Access to age-inappropriate content  Online grooming and child abuse.  People hacking into or hijacking your account or page.
  • 11. • Friends’, other people’s and companies' posts encouraging you to link to fraudulent or inappropriate websites. • People hacking into or hijacking your account or page. • Viruses or spyware contained within message attachments or photographs.
  • 12.
  • 13. Be wary of publishing any identifying information about yourself – either in your profile or in your posts – such as phone numbers, pictures of your home, workplace or school, your address or birthday.  Pick a user name that does not include any personal information. For example, “joe_glasgow” or “jane_liverpool” would be bad choices.
  • 14. • Set up a separate email account to register and receive mail from the site. That way if you want to close down your account/page, you can simply stop using that mail account. Setting up a new email account is very simple and quick to do using such providers as Hotmail, Yahoo! Mail or gmail. • Keep your profile closed and allow only your friends to view your profile. • What goes online stays online. Do not say anything or publish pictures that might later cause you or someone else embarrassment.
  • 15. • Be aware of what friends post about you, or reply to your posts, particularly about your personal details and activities. • Remember that many companies routinely view current or prospective employees’ social networking pages, so be careful about what you say, what pictures you post and your profile. • Learn how to use the site properly. Use the privacy features to restrict strangers’ access to your profile. Be guarded about who you let join your network. • Be on your guard against phishing scams. • Ensure you have effective and updated antivirus/antispyware software and firewall running before you go online.
  • 16. Allows you to browse the Internet without saving any information about which sites and pages you’ve visited.  To put Firefox into a temporary state where no information about the user's browsing session is stored locally.
  • 17. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Start Private Browsing.
  • 18. When you turn on Private Browsing, Firefox alerts you that it will save your current windows and tabs for after you finish using Private Browsing. Click Start Private Browsing to continue.  Check the box next to "Do not show this message again" if you don't want to receive this alert when you turn on Private Browsing.
  • 19. The Private Browsing information screen appears to confirm that you're in Private Browsing mode.  When browsing in Private Browsing mode, the Firefox button will be purple (for Windows XP the window title will say (Private Browsing) instead) during your session.
  • 20. At the top of the Firefox window, click the Firefox button (Tools menu in Windows XP) and select Stop Private Browsing. The windows and tabs you were using when you enabled Private Browsing will appear, and you can use Firefox normally. The Firefox button will turn orange again (for Windows XP the Firefox window title will no longer say (Private Browsing)) when Private Browsing is off.
  • 21. It is safe for your computer data security.  No one can track your data when you use secure browsing or private browsing.  this is the safe and secure way for online banking .  it clear the history and passwords when you close the browser.