How To: Managing Your Android Security

Several popular Android apps regularly share your location and critical phone data such as your phone number with advertisers and others. The following sections contain tips you can use to keep the data in your Android smartphone out of the wrong hands. Permissions You can view the information that each app you’ve downloaded is able… Read More


How To: Managing Your iPhone Security

Smartphones, like the iPhone, have become increasingly important to our modern lives, and accessing account and professional content is shifting more towards mobile devices. The iPhone has security options that you can use, which are listed below. Use a Passcode Make sure that you are using a passcode onto your iPhone, which is the easiest… Read More


How To: Managing Your Palm OS Security

The following sections contain some simple things you can do to ensure your Palm security. Assign a Password First, assign a password to your device: From the Palm Launcher, go to the Security application. Enter your password, including a password hint. Confirm your new password when prompted. To make it easier to lock your device,… Read More



The Perils of using Facebook on Public WiFi

The next time you to connect to Facebook on an open hotspot, take a second to think about your security. What was intended as a quick log on to update your status or check your account, may have perilous consequence.  You may not realize it, but Facebook users logging on through a public wireless connection are vulnerable.



How To: Google Search Results and Your Privacy

Like all search engines, Google’s search results contain information that is publicly available on the Internet. Google cannot remove content directly from the Internet. While it’s possible to remove content from display in Google’s search results, this would still leave the original content as it exists on the Internet. If you want to remove something… Read More


How To: Configuring Your Firewall for Optimal Security

Firewall software is a group of security protocols designed to keep malicious code and hackers out of your computer. A firewall protects your laptop from Internet traffic entering in or information leaking out. While antivirus software scans emails and files, a firewall acts as a guard dog, keeping your system safe from unauthorized entry. It… Read More


How To: Installing Patches and Automating Updates

Patches are software that fix problems or issues with a computer program. This includes fixing security vulnerabilities and other bugs, and improving the usability or performance. Most software, browsers, and operating systems have features that allow them to be updated automatically when connected to the Internet. When an Internet connection is established, these programs prompt… Read More


How To: Job Search Sites and Your Privacy

Make sure you protect your privacy while conducting an online job search. The following sections describe what steps you can take to ensure your privacy. 1. Don’t include a lot of personal contact information (name, address, phone numbers) on your resume This might make it a little more difficult for an employer to reach you,… Read More