Using the Internet Safely For Seniors
➟ Someone who wants to embarrass or bully you. ➟ Plagiarists who want to claim your content as their own. ➟ Criminal organizatio ...
to devices, such as your computer, that connect with the Internet) to route information to and from you. They check which Intern ...
Figure 2-3 How Web Sites Use Demographics Web sites typically need information — for a variety of reasons — about the people who ...
Figure 2-4 Although Web sites learn this information, they may or may not use it in any way other than to improve their services ...
➟ If you were just on your bank’s Web site, the site you go to next knows where you bank. If the site you go to is one you trust ...
Figure 2-5 Your searches tell a great deal about you, and search engines have come under heavy pressure — particularly in Europe ...
information on a banking site because its terms state that it holds the information in the strictest confidence. However, you ma ...
Figure 2-7 Quizzes and Surveys Take a look at quizzes and surveys to understand how their creators use your information. ➟ Quizz ...
Figure 2-8 ➟ If the quiz has no questions of a personal nature, how and where the quiz provider shares that information may not ...
➟ Quizzes can also generate targeted spam offers based on your answers. If you answer a diabetes quiz that asks about your least ...
➟ Don’t click links in ads or e-mails, enter contests, fill out surveys, open attachments to e-mails that are suspicious, or res ...
38 Part I: The Foundation of Using the Internet Safely ...
Raise Your Safety Bar Today W e don’t want you to have to read through this whole book before you begin using online safety prac ...
the target of a scam, and forwarding the messages to your friends puts them at risk as well. By forwarding chain e-mail, you may ...
Figure 3-1 Don’t Play Russian Roulette with Links Never trust a link from someone you don’t know. If you click it, it may take y ...
2.Click the link for the site in the search results (see Figure 3-2) to go there. Be sure that the site you’re going to is the c ...
3.Use links on the search results to locate contact informa- tion for the company. 4.Either call the customer support number pro ...
Create Safer E-Mail Aliases Your real name displays by default on e-mails you send from many of the major e-mail services, so wh ...
Figure 3-4 6.On the Web page shown in Figure 3-5, either delete your first and/or last name or replace them with other infor- ma ...
Figure 3-5 Use Passwords Wisely The prospect of creating a strong password, changing a password, or using multiple passwords mak ...
«
1
2
3
4
5
6
7
8
9
10
»
Free download pdf