The Perils of using Facebook on Public WiFi

The next time you to connect to Facebook on an open hotspot, take a second to think about your security. What was intended as a quick log on to update your status or check your account, may have perilous consequence.  You may not realize it, but Facebook users logging on through a public wireless connection are vulnerable.


How To: BlueKai, Online Tracking, and Your Privacy

BlueKai is an online marketing firm that provides data to marketers, ad networks and publishers. This data is used to target ads to consumers. This information that BlueKai gathers is considered “anonymous” because it identifies web browsers, not individuals. However, because they gather data from multiple sources, it’s easy for them to build a very… Read More


How To: Lotame, Online Tracking, and Your Privacy

Lotame is a behavior targeter focused on social networks, like Facebook. The information that Lotame and other similar companies gather is considered anonymous because it identifies web browsers, not individuals. However, aggregating data from multiple sources means companies can easily create a detailed profile of a user that many privacy experts believe can actually identify… Read More


How To: eXelate, Online Tracking, and Your Privacy

eXelate Media is a company that collects and sells web data on consumers. EXelate has been criticized for linking web-surfing habits with personal data, since this crosses a major privacy line. eXelate gathers consumer data from hundreds of websites and can determine a consumer’s demographic information and web habits using cookies. Though eXelate claims its… Read More



How To: Understanding the Network Advertising Initiative and How to Opt Out

The Network Advertising Initiative (NAI) develops standards for online advertising. It is an industry trade group which was formed in 1999. This group was created by advertisers because of concerns from the Federal Trade Commission and consumer groups that online advertising was harming user privacy. The NAI creates guidelines for participating advertisers and advertising networks… Read More


How To: Google Search Results and Your Privacy

Like all search engines, Google’s search results contain information that is publicly available on the Internet. Google cannot remove content directly from the Internet. While it’s possible to remove content from display in Google’s search results, this would still leave the original content as it exists on the Internet. If you want to remove something… Read More


How To: Configuring Your Firewall for Optimal Security

Firewall software is a group of security protocols designed to keep malicious code and hackers out of your computer. A firewall protects your laptop from Internet traffic entering in or information leaking out. While antivirus software scans emails and files, a firewall acts as a guard dog, keeping your system safe from unauthorized entry. It… Read More


How To: Installing Patches and Automating Updates

Patches are software that fix problems or issues with a computer program. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Most software, browsers, and operating systems have features that allow them to be updated automatically when connected to the Internet. When an Internet connection is established, these programs prompt… Read More