Using the Internet Safely For Seniors
Some malware programs can take your e-mail contacts and send out messages that may look like they come from you. It’s for that r ...
Figure 5-14 4.Type your message. 5.Beforeyou click the Sendbutton, be sure you have hon- ored the privacy of the person who sent ...
Be cautious about forwarding e-mail messages with multiple recipients, such as chain letter e-mails. Many of these are cute, but ...
Figure 5-15 Manage Spam Spamis e-mail sent in bulk to recipients who haven’t requested it. People usually get spam from senders ...
Figure 5-16 ➟ Review the junk mail folder periodically to make sure legitimate e-mail hasn’t been placed there. Then delete the ...
To make these settings in Windows Live Hotmail, click the Optionsbutton in the upper-right corner and select More Options. 2.O ...
Figure 5-17 Figure 5-18 Click this link 113 Chapter 5: Risk-Free E-Mail ...
Use Verification Programs If you’ve had it with spam, consider using a program (see Figure 5-19) that authenticates users. But k ...
Figure 5-19 File a Spam Complaint The United States federal CAN-SPAM Act of 2003 went into effect on January 1, 2004. The CAN-SP ...
➟ Requires the physical address of the sender to be included in the e-mail. ➟ Creates criminal penalties for those who violate s ...
call a phone number in the e-mail; it could be fake. To visit a company’s or bank’s Web site, type the address in yourself if yo ...
Figure 5-21 In addition to these questions, also remember the following: ➟ If you decide to forward (or send) e-mail to a group, ...
For example, Valentine scams circulate around Valentine’s Day. Last year, a Valentine scammer e-mailed messages with titles incl ...
2.The e-mail is illiterate. 3.You’re asked to provide information such as an account number, phone number, or social security nu ...
Figure 5-22 121 Chapter 5: Risk-Free E-Mail ...
122 Part II: Using the Internet While Dodging the Risk ...
Posting Photos and Videos Safely P hotos help to record life moments big and small and capture the beauty of the world around us ...
How a Picture Can Put You at Risk The most important thing about posting images online is to have an understanding of what you m ...
➟ Ways to break into your house if your home is in the picture: windows, doors, possible location of a spare key, and so on ➟ Yo ...
➟ Sold to pornography sites. One of the fastest ways to generate ‘new’ pornography images is to add new faces to old material. ➟ ...
«
2
3
4
5
6
7
8
9
10
11
»
Free download pdf