How To: Managing Your Google and Gmail Security

If you use Gmail you probably store a lot of important personal information in your account, such as photos, files, and calendar information. This article discusses the ways in which your account could be comprised, and lists some steps that you can take to help protect your account. Hacker Methods Hackers can get access to… Read More



How To: Lotame, Online Tracking, and Your Privacy

Lotame is a behavior targeter focused on social networks, like Facebook. The information that Lotame and other similar companies gather is considered anonymous because it identifies web browsers, not individuals. However, aggregating data from multiple sources means companies can easily create a detailed profile of a user that many privacy experts believe can actually identify… Read More


How To: eXelate, Online Tracking, and Your Privacy

eXelate Media is a company that collects and sells web data on consumers. EXelate has been criticized for linking web-surfing habits with personal data, since this crosses a major privacy line. eXelate gathers consumer data from hundreds of websites and can determine a consumer’s demographic information and web habits using cookies. Though eXelate claims its… Read More


How To: Job Search Sites and Your Privacy

Make sure you protect your privacy while conducting an online job search. The following sections describe what steps you can take to ensure your privacy. 1. Don’t include a lot of personal contact information (name, address, phone numbers) on your resume This might make it a little more difficult for an employer to reach you,… Read More



How To: Installing Patches and Automating Updates

Patches are software that fix problems or issues with a computer program. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Most software, browsers, and operating systems have features that allow them to be updated automatically when connected to the Internet. When an Internet connection is established, these programs prompt… Read More


How To: Configuring Your Firewall for Optimal Security

Firewall software is a group of security protocols designed to keep malicious code and hackers out of your computer. A firewall protects your laptop from Internet traffic entering in or information leaking out. While antivirus software scans emails and files, a firewall acts as a guard dog, keeping your system safe from unauthorized entry. It… Read More