際際滷

際際滷Share a Scribd company logo
How To Protect Your Privacy Online
How to protect your privacy online is a debate that has been sparked
fierce debate even more than usual with the situation involving the NSA
and Eric Snowden. Thoughts of the book '1984' and 'Big Brother' looking
over your shoulder, tracking your every move seems to be more real than
ever before. And he seems to have an impressive array of tools at his
disposal.....worms, trojan horses, phishing expeditions, viruses,
spyware and other malware, hackers, etc.
Question is.....Do the benefits of such programs outweigh the tradeoff
in your privacy?
That may be a question for another day. The more immediate questions
that you should be asking yourself right now are...1) Why should I be
concerned with protecting my privacy online? 2) Exactly HOW are people
able to get around my privacy protections that I've put in place? And
3) What steps can I take to bolster my privacy online?
A few days ago, I heard a quote from a well known member of the tech
community that said to the effect, "You no longer have any privacy.
Just get over it". I suspect that he was suggesting that our online
activities leave a 'bread crumb trail' that broadcasts to anyone who
cares enough to know, just when and where you've been, and what you've
been up to.
But is he correct? Should we "just get over it" and give up clinging to
the notion that we have any privacy left in this world?
I don't think so. But let's get back to answering those questions....
1) There are any number of reasons you should at least make an attempt
to protect your online privacy from would-be eavesdroppers. But right
off the top off my head....
People can say that they are you when they're not when they have access
to your personal information. (Ever notice how many Twitter and Facebook
pages there are for celebrities that aren't authentic, but LOOK like
they are?) Imagine someone else impersonating you. Making statements
that you......
The rest of the article is available on my site below. If the link is
not live, copy and paste it into your browser. Once you get to the site,
scroll down to the bottom of the page for the file link....
Thanks for reading,
Kevin D. Rolle.
http://kvnrolle.wix.com/saverdiscounts
Ad

Recommended

Facebook Password Sniper
Facebook Password Sniper
hellishyard9256
OPSEC for Kids
OPSEC for Kids
Department of Defense
Guide to-social-media--2016
Guide to-social-media--2016
Andy Smith
Full Funnel Marketing for Facebook and LinkedIn
Full Funnel Marketing for Facebook and LinkedIn
Damon Gochneaur
Twitter Fiction
Twitter Fiction
Carla Raguseo
Twitter for beginners
Twitter for beginners
Klaudia Jurewicz
Storyful's Malachy Browne at news:rewired
Storyful's Malachy Browne at news:rewired
John Thompson
Online privacy
Online privacy
jo-jo23
Last week, we focused on the difference between scholarly and popula.docx
Last week, we focused on the difference between scholarly and popula.docx
gauthierleppington
Friend is Not A Verb
Friend is Not A Verb
Andy Smith
Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
Chandra Pr. Singh
Media and representation in rec
Media and representation in rec
Mary Kearney
Personal Branding for highschool students 2010
Personal Branding for highschool students 2010
Rodolfo Salazar
Casting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identity
Christian Heilmann
Security is dead, Long live the Hacker
Security is dead, Long live the Hacker
Stuart Coulson
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
Amber Butler
Your Digital Footprint
Your Digital Footprint
EpicTofuWarrior
What Is Spam
What Is Spam
guest1edb8df
Comparison And Contrast Essay Mla Format - How T
Comparison And Contrast Essay Mla Format - How T
April Smith
Censorship
Censorship
Tim Musgrave
View Formal Essay Examples For High Schoo
View Formal Essay Examples For High Schoo
Monica Waters
Digital Rhetoric, November 6th
Digital Rhetoric, November 6th
Miami University
Social media security users guide edited
Social media security users guide edited
Sergey Miller
What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!
Woj Kwasi
Deep Web
Deep Web
Medma Infomatix (P) Ltd.

More Related Content

Similar to How To Protect Your Privacy Online (19)

Last week, we focused on the difference between scholarly and popula.docx
Last week, we focused on the difference between scholarly and popula.docx
gauthierleppington
Friend is Not A Verb
Friend is Not A Verb
Andy Smith
Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
Chandra Pr. Singh
Media and representation in rec
Media and representation in rec
Mary Kearney
Personal Branding for highschool students 2010
Personal Branding for highschool students 2010
Rodolfo Salazar
Casting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identity
Christian Heilmann
Security is dead, Long live the Hacker
Security is dead, Long live the Hacker
Stuart Coulson
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
Amber Butler
Your Digital Footprint
Your Digital Footprint
EpicTofuWarrior
What Is Spam
What Is Spam
guest1edb8df
Comparison And Contrast Essay Mla Format - How T
Comparison And Contrast Essay Mla Format - How T
April Smith
Censorship
Censorship
Tim Musgrave
View Formal Essay Examples For High Schoo
View Formal Essay Examples For High Schoo
Monica Waters
Digital Rhetoric, November 6th
Digital Rhetoric, November 6th
Miami University
Social media security users guide edited
Social media security users guide edited
Sergey Miller
What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!
Woj Kwasi
Deep Web
Deep Web
Medma Infomatix (P) Ltd.
Last week, we focused on the difference between scholarly and popula.docx
Last week, we focused on the difference between scholarly and popula.docx
gauthierleppington
Friend is Not A Verb
Friend is Not A Verb
Andy Smith
Is Your Face In The Book?
Is Your Face In The Book?
Andy Smith
hacking into computer systems - a beginners guid
hacking into computer systems - a beginners guid
Chandra Pr. Singh
Media and representation in rec
Media and representation in rec
Mary Kearney
Personal Branding for highschool students 2010
Personal Branding for highschool students 2010
Rodolfo Salazar
Casting online shadows- how people on the web change your identity
Casting online shadows- how people on the web change your identity
Christian Heilmann
Security is dead, Long live the Hacker
Security is dead, Long live the Hacker
Stuart Coulson
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Special Topics Day for Engineering Innovation Lecture on Cybersecurity
Michael Rushanan
Write My Research Paper. Online assignment writing service.
Write My Research Paper. Online assignment writing service.
Amber Butler
Your Digital Footprint
Your Digital Footprint
EpicTofuWarrior
Comparison And Contrast Essay Mla Format - How T
Comparison And Contrast Essay Mla Format - How T
April Smith
View Formal Essay Examples For High Schoo
View Formal Essay Examples For High Schoo
Monica Waters
Digital Rhetoric, November 6th
Digital Rhetoric, November 6th
Miami University
Social media security users guide edited
Social media security users guide edited
Sergey Miller
What is Digital Empathy Anyway? Let's Find Out Together!
What is Digital Empathy Anyway? Let's Find Out Together!
Woj Kwasi

How To Protect Your Privacy Online

  • 1. How To Protect Your Privacy Online How to protect your privacy online is a debate that has been sparked fierce debate even more than usual with the situation involving the NSA and Eric Snowden. Thoughts of the book '1984' and 'Big Brother' looking over your shoulder, tracking your every move seems to be more real than ever before. And he seems to have an impressive array of tools at his disposal.....worms, trojan horses, phishing expeditions, viruses, spyware and other malware, hackers, etc. Question is.....Do the benefits of such programs outweigh the tradeoff in your privacy? That may be a question for another day. The more immediate questions that you should be asking yourself right now are...1) Why should I be concerned with protecting my privacy online? 2) Exactly HOW are people able to get around my privacy protections that I've put in place? And 3) What steps can I take to bolster my privacy online? A few days ago, I heard a quote from a well known member of the tech community that said to the effect, "You no longer have any privacy. Just get over it". I suspect that he was suggesting that our online activities leave a 'bread crumb trail' that broadcasts to anyone who cares enough to know, just when and where you've been, and what you've been up to.
  • 2. But is he correct? Should we "just get over it" and give up clinging to the notion that we have any privacy left in this world? I don't think so. But let's get back to answering those questions.... 1) There are any number of reasons you should at least make an attempt to protect your online privacy from would-be eavesdroppers. But right off the top off my head.... People can say that they are you when they're not when they have access to your personal information. (Ever notice how many Twitter and Facebook pages there are for celebrities that aren't authentic, but LOOK like they are?) Imagine someone else impersonating you. Making statements that you...... The rest of the article is available on my site below. If the link is not live, copy and paste it into your browser. Once you get to the site, scroll down to the bottom of the page for the file link.... Thanks for reading, Kevin D. Rolle. http://kvnrolle.wix.com/saverdiscounts