Articles tagged: privacy
Google will use your mobile phone number for verification if you lose access to your account. Some people don’t want to provide that information to Google.
Skype calls recorded by Skype? Possible, but until recently, highly unlikely. However, there’s a much scarier scenario that no technology can prevent.
When using a shared computer, it’s too easy for others to see your data or history. If you must use a shared computer, you need to protect yourself.
Sharing posts you find on Facebook often results in an “unavailable” message. That’s Facebook respecting privacy settings.
So-called “supercookies” and “evercookies” track the websites you visit even if you regularly disable or flush normal cookies.
The most common question related to Windows 10 seems to be “Should I upgrade?” I’ll cover my recommendations.
You can and should be aware of and control your Facebook privacy settings.
We’ll look at how to review and adjust privacy settings in several areas of Win10.
Windows 10 privacy seems to be somewhat of an oxymoron, at least on its initial release. I’ll review choices you can make at setup to retain some control.
Windows 10 has been criticised for encroaching on users privacy. Is it an issue? Is Microsoft being evil? Or is it something else?
Web browsers like Google Chrome try to be helpful by recognizing commonly used forms and fields and remembering previously entered information for you. It’s no conspiracy, but it can seem spooky.
Facebook did some testing. It’s made some people upset. What’s important to realize is that testing is ubiquitous on the web and happens in many different ways.
Privacy on the internet means different things to different people. I discuss three different privacy applications out there, explain what exactly each does, and offer some of my own thoughts.
The right to be forgotten is a misleading and ineffectual technique to prevent people from finding information on the internet. Bottom line: it can’t work.
We rail against intrusions into our private affairs and private information; and then post our private information publicly. Where’s the logic in that?
Isolating other sessions in Gmail can become pretty complex. We’ll walk through a number of scenarios.
Deleting items on your computer usually doesn’t wipe them clean. That’s an extra step.
Even a cached version of a website could send information about you back to the original server. The thing is that we just don’t (and can’t) know.
Search engines have numerous (and quite amazing) ways to gather information on people and the way they search. It’s nothing to worry about unless you have some critical need for privacy.
Unfortunately, there is no practical way to determine what is and what isn’t personal information. Securing a computer to give away is an all-or-nothing proposition.
Open WiFi hotspot downloads are available for the internet cafe owner to
see. Whether or not they take the time to do it is another story!
Erasing your hard drive before you give it away is important. Exactly how thorough an erase you need depends on your data and level of paranoia.
Once you’ve hacked into someone else’s account you’ve not only done something morally wrong – you’re at risk of being found out.
If using your company’s machine, it’s safe to assume that your boss or IT department could see your emails and instant messages.