At one time or another, everyone’s spent far too much time rooting around in their couch for a lost remote control.
You end up looking under furniture, in the cushions, wondering if you
carried it to another room, and by the time you find it you’re too
frustrated to care about what you were going to watch. There is one
item that never seems to leave your side, however, and that is your
smartphone. Thanks to modern technology, now your phone can replace
your clunky old remote, making it that much easier to keep track of the
essential technology you need. It doesn’t matter what operating system
your smartphone runs on, there are numerous choices out there for
turning your phone into the universal remote of your dreams.
Archives
0
TAKE CARE ONLINE WHILE SHARING YOUR INFO.
Matovu George William
Before sharing information online, consider what you are sharing
(how sensitive the information is) and who you want to share the
information with. If the information is general in nature or restricted
to a site that isn’t available to the general public, there should be
little risk in sharing it. However, if the information identifies you,
your possessions or someone else in some way, you want to limit access
to that information.
Here are some categories of information you may want to consider as you determine what you’re comfortable sharing — or having others share about you publicly. This list doesn’t presume to be a definitive inventory of identifying information, but it can get you thinking about what you share and where you share it.
Identifying information: birth year, birth date, zodiac sign, social security number, city, state, hobbies, emotional state.
Addresses: This includes home and work addresses, as well as any other location you visit regularly, Consider what information goes in birth, wedding, graduation and death announcements.
Phone numbers: This includes home, mobile phone, work number and friends’ numbers.
Personal numbers: Bank accounts, credit cards, debit cards, PINs, phone calling card, SSN, passport, driver’s license number, birth date, wedding date, insurance policy numbers, loan numbers, VIN numbers, license plate and more.
Information-rich photos: A perfectly innocent photo can reveal more than you think. You might put yourself, family members or friends at risk by posting photos that show where you live or work, for example.
Here are some categories of information you may want to consider as you determine what you’re comfortable sharing — or having others share about you publicly. This list doesn’t presume to be a definitive inventory of identifying information, but it can get you thinking about what you share and where you share it.
Identifying information: birth year, birth date, zodiac sign, social security number, city, state, hobbies, emotional state.
Addresses: This includes home and work addresses, as well as any other location you visit regularly, Consider what information goes in birth, wedding, graduation and death announcements.
Phone numbers: This includes home, mobile phone, work number and friends’ numbers.
Personal numbers: Bank accounts, credit cards, debit cards, PINs, phone calling card, SSN, passport, driver’s license number, birth date, wedding date, insurance policy numbers, loan numbers, VIN numbers, license plate and more.
Information-rich photos: A perfectly innocent photo can reveal more than you think. You might put yourself, family members or friends at risk by posting photos that show where you live or work, for example.
Tip
Don’t place information about others online without first obtaining
their express permission. And ask your friends and family to do the
same for you.
1
Information You Post May Be Used Against You.
Do you know that every piece of information you or others post about you and every
action you take online has commercial value to someone. That isn’t
necessarily a bad thing, if it simply helps companies target your
interests and preferences, but your information may be used in negative
and sometimes criminal ways. For example, it might be used by
- Someone who wants to embarrass or bully you.
- Plagiarists who want to claim your content as their own.
- Criminal organizations or individuals building profiles of people to scam, steal identities from, hijack computers, find interesting homes to break into or cars to steal, target people to physically harm, and so on.
- Companies who want to use your information in ways that act against your interests. Consider these examples:
- Insurance companies may use information posted on blogs to deny coverage of medical claims, car accident claims, and so on.
- A potential employer may reject your job application based on information about you online. Or your current employer may find reasons to fire you.
SO ALWAYS TAKE CARE
Subscribe to:
Posts (Atom)