AntiVirus guide,Tips to handle computer viruses,Latest updates,Free and Paid Downloads, Antivirus software reviews,PC solutions,and more..

Tuesday, August 5, 2014

Staying Safe on Social Network Sites

What are social networks?
Social networking sites, sometimes called "friend-of-a-friend" sites, build on the concept of traditional social networks where you are connected through people you already know new people. The purpose of some networking sites may be purely social, allowing users to establish friendships or romantic relationships, while others focus on establishing business connections.
Although the functions of social networking sites differ, they all can get information about themselves available and provides a kind of communication mechanism (forums, chat rooms, email, instant messenger) that you can connect with other users. On some websites that you can search for people based on certain criteria, while other sites require that you be "introduced" to new people. Due to a connection that you share Many of the sites have communities or subgroups that may be based on a particular interest.
 

What impact on the safety of these places exist?
Social networking sites rely on connections and communication, so that they can recommend you a certain amount of personal information. When deciding how to reveal much information that people can not have the same amount of caution, because if someone exercise may meet because..
The Internet provides a sense of anonymity the lack of physical interaction a false sense of security
reflect the information for their friends to read, forgetting that others see it they offer insights to impress potential friends or business associates, While the majority of people do not pose a threat to these pages, can evil people, they are drawn to because of the accessibility and amount of personal information that is available. The more information malicious people have about you, the easier it is for them to take advantage of you. Predators may form relationships online and then convince unsuspecting people, to meet them in person. This could lead to a dangerous situation. The personal data may also be used perform a social engineering attack. Using information you provide about your location, hobbies, interests and friends available, a malicious person could spend a trusted friend or convince them to access other personal or financial information the authority.
In addition, because of the popularity of these sites, attackers can use them to spread malicious code. Websites that offer developed by third-party applications that are particularly vulnerable. Attackers can while your computer or transfer your data to create infection appear without your knowledge capable of custom applications, to be innocent.
How can you protect yourself?
Limit the amount of personal information that you - Do not post such as your address or information about your schedule or routine information that would make you vulnerable. If your connections for information about sure that the combined information is not more than you to be comfortable, would be to know with strangers. Also be considerate when posting information, including photos, about your connections.
Remember that the Internet is a public resource - Only for information that you see is comfortable 
with someone. This includes information and photos in your profile and in blogs and other forums. Also, if you provide information online can not be withdrawn. Even if you remove the information from a site, saved or cached versions may still exist on other people's machines.
Be wary of strangers - The internet makes it easy for people to represent their identity and motives wrong. Limit the people who are authorized to contact you on these pages. If you interact with people you do not know, careful about the amount of information you reveal or agreeing to meet them personally.
Be skeptical - not everything you read, do not believe online. People can give false or misleading information about various topics, including to post their own identity. This is not necessarily done with malicious intent; it could be unintentional, an exaggeration, or a joke. Take appropriate precautions, though, and try before they check the authenticity of the information measures.
Evaluate your settings - Take advantage of the privacy settings of a site. The default settings for some sites may allow anyone to see your profile, but you can adjust your settings to restrict access to only certain people. There is still a risk that private information could be exposed despite these limitations, so not everything you do not want the public to see that post. Check sites can change their options at regular intervals so. Your security and privacy settings regularly to ensure that your choices are still appropriate
Be wary of third-party applications - third-party applications can provide entertainment or functionality, but be careful when deciding to allow the applications. Avoid applications that look suspicious, and change your settings to the amount of information that the applications can access.
Use strong passwords - Protect your account with a password that can not be easily guessed. If you compromised your password, someone else may be able to access your account and pretend that you will be.
Check the privacy policies - Some sites may share information such as email addresses or user preferences with other companies. This can cause a significant increase in spam (refer to reducing spam for more information). Also, try the policy for dealing with transfers, to ensure that you do not inadvertently signing to find your friends for spam. Some sites will also continue to send e-mail messages to all until you relate to join.
Keep software, particularly your web browser up to date - Install software updates so that attackers do not use well-known problems or vulnerabilities. Many operating systems provide automatic updates. If this option is not available, you should enable it.
Use and maintain anti-virus software - Anti-virus software protects your computer against known viruses, so you may be able to spot and remove the virus before it do damage. Since the attacker constantly writing new viruses, it is important to keep the definitions up to date.
Children are particularly vulnerable in front of the threats that social networking sites. Although many of these sites have age restrictions, children can represent their age wrong, so that they can join. By teaching children about internet safety, being aware of their online habits and guide them to appropriate sites to ensure parents that the children in the safe and responsible users.

Tag

Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger