Skip to main content

How To Protect Your Online Privacy? Try To Keep Your Private Things Private

Being online is part of the life now. People are online from home, school, library, roads and washrooms. Sitting on a toilet and chatting with a buddy or playing games is a habit of many. Do you know what you actually do when you browse the Internet? Yes ? No ? Alright, Lemme tell you. You just access someone's else computer. But the same can happen with you. Once you get on a network, you raise a security risk for your digital life as well as your real life events. Are you sure that you are the only one in authority who can use your resources? (By resources I meant PC, Smartphone, Webcam, Mic or anything that can be on the Internet). Are you really sure that nobody is spying on you? Do you have someone or something which can tell you 'Watch out'? If you have, is it trustworthy?
Hmmm, So what to do? Here
are some common ways which can help you keeping your private things private. I will try to be quick and to the point. 

Cover your Webcam and Mic:

Do you want someone to watch what you do and hear what you say, even in real time (live), without your assent and without being noticed? Suppose one day (or night) you are having se* with your girlfriend or wife or you are watching something that makes you make some weird faces and somebody captures the moments using your own smartphone, PC or laptop camera. Guess, what can happen? It might be trending on a por* site. Do you want that? I hope for a big NO. Anybody can see what your Cam see. Same is the case with Mic. Snowden have revealed this. So why not to cover the camera and microphone? FBI recommends you to cover your laptop's webcam, for good reason.

You can buy a product like this
Or can use a tape.
I am using Tape because it is almost free.


 Lock your PC before leaving the desk:

Many people leave their PCs, Laptops, and Smartphones, mostly PCs unlocked at their workplace and don't bother to lock it.... A creep can crawl to their desk and do some unwanted stuff because one will have access to whatever they have access to.  It barely takes a second to press [Window + L] on Windows PC (Don't know about Mac shortcut) and can save you a lot.

Never trust your friend:

This might sound a little weird, not a little actually. Let me explain, what I mean by this heading is don't let your friends install any software on your computer or phone unless you are watching them. One can install a remote keylogger which can email him every key your press or a spyware which take screenshots and send it the person who installed it or any of these 10 pranks can happen with you. In few words, you leave confidentiality of your data at risk. So never do that.

Do not use someone else computer for logging into your social media, email or bank accounts:

Do you know what a keylogger is? Keylogger is a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information. I hope you got it. So, there are chances that your friend have installed a keylogger on your own computer or mobile phone and hack your account. 

Choose a strong password:

A password is strong if it have UPPER-CASE and lower-case letters, symbols, digits, proper length and is not easy to guess. I have seen people whose passwords contain their name and 1 digit or their birth date or their computer name. It is unwise to choose a short password because it makes it more vulnerable to attacks. Some people can guess passwords very quickly, don't help them by using a weak password. 
Another thing, let say I have chosen a very strong password like "Jp&asjd!32U86x, how will I remember it? Do I need to write it somewhere like on a sticky note near to my desk or in a text file on my hard drive? Well, it sounds not good. It is good if you can remember your password by yourself or Let the Password Manager do the job for you. Learn more here about password management.

Use Multi-Layer security:

Multi-layer security is aka Multi-factor security which involves using more than one way for authentication. Let's discuss facebook authentication methods very shortly. 
Facebook allows you to log in to your account using your username, email or phone number and your  password but it also lets you enable Login Approvals which add an extra security layer to prevent other people from logging into your account, Login Alerts which alerts you when someone logs into your account from an unrecognized device or browser. You can check for other security mechanisms in settings. 
Why should you use multi-layer security? Well, I have enabled log in approvals in my facebook settings. If someone captures my password using keylogging or social engineering I won't care because he/she will need the login code which only I will have. So, It is good to have some extra butter on toast.
Facebook Login Approvals Settings

Use private browsing:

Wikipedia says: Privacy mode or "private browsing" or "incognito mode" is a privacy feature in some web browsers to disable browsing history, cookies, and the web cache. This allows a person to browse the Web without storing local data that could be retrieved at a later date.
Private browsing improves privacy up to some extent but it does not make you completely anonymous. It also decreases vulnerability to some attacks. It is good to use private browsing mode of the browser when you are browsing something private like online banking.
For those who use a shared PC, private browsing is really helpful for them. Care about nothing and browse. It's ok if you left your facebook account logged in in private browsing mode. It will no longer be logged in once you close the browser.
Cool.

Keep your Firewall always on:

Firewall is simply a wall of fire between your device and invaders which do not allow them to cross the wall and attack on your personal data or harm your device. Some software or websites might ask you to turn off your firewall to enable their some feature. I will suggest you not to do so if you do not know what is going on in the background. I am sure you will not want to open your door for intruders to come inside and perform malicious activities. So keep the door shut, always keep the firewall turned on and keep it up to date and also check what it allows to enter and what it does not.

Have an up to date antivirus installed:

Antiviruses are hunters. It hunts down malware that enters to your device by any means, either from a network, a USB or anything else. It enhances the functionality of a firewall. It is just like something which is fireproof, have passed the firewall and entered your device. The antivirus detects it and takes action and also the big oh no appears (ohhhh noooo attackkk!!!) to alert you. 
There are so many antiviruses available. You can choose anyone you want. The thing which is important is to keep it updated. Because malware is advancing. Invaders are inventing new techniques to bypass your security. So you need to upgrade your army. The more advance your security is, the less you will suffer.

Do not follow the blind links blindly:

A blind link is a hyperlink which does not make any sense to you at the first look or you could not predict where it could take you to. Links without a description or false description is a blind link. It says something else in the description and leads you to somewhere else you never expected. 
Mostly this happens when your device is under attack by an adware/malware or you are browsing a dating/por* site. You will see some links saying, click here to win an iPhone7 or bad moms are waiting for you or Pretty girl is calling you, click to answer
Blind links do not have a destination. These will lead you from one site to another and won't stop unless you stop. Try to avoid clicking this shi*.

Watch out for scams:

It is normal to receive emails and messages which say something interesting like a hyperlink saying  "Hey is it you here?", "Your PC is running too slow, check for speed", or offers to buy something with your credit card and you don't know the sender. It might be a scam. What it can do to you? It can steal your identity, your credit card information, personal files on your device or expect anything else very weird.
Lemme list some common types here.
  • Identity theft scams
  • online shopping scams
  • dating and romance scams
  • charity scams
  • lottery and prize scams
  • remote access scams
  • travel scams
  • investment scams
  • and more. ;)
To protect yourself against scams you should report it to the service providers, keep the receipt if you shopped, make sure nobody knows your credit card PIN, do not click on suspicious links or alerts, choose strong passwords. Read here more.

Encrypt your personal files:

Encryption tools such as BitLocker, Winrar, 7-Zip, AxCrept, VeraCrept etc convert your files from readable form to unreadable form and let you choose a security key or password. Nobody, even you will not be able to open or read the encrypted files without having the password. If somebody steals the files, its ok. You don't need to care as much as you should if the files were unencrypted. 

Do not turn on GPS if you don't need to:

Websites, Mobile Apps, Malware or Hackers can access your GPS data and track your position without your intentions. So, keep the GPS turned off unless needed and at least run through the terms and conditions of an App before installing it. 

Answer security questions carefully:

Security questions are used to recover passwords. Many people (ignorant I would say) select very common questions such as "In what city were you born?" and they answer their real birthplace. Dude, you don't need, to tell the truth. Anybody can get the answer easily. Some select "What is the name of your best friend?" and write their own name in the answer (What the f***). 
Try to select very random questions and answer very carefully, cleverly and wisely. Don't help others to dig out your answers. Hope you got it.

Monitor your traffic:

It is a little difficult step but it worths a try. Monitoring incoming and outgoing, especially outgoing traffic really helps in protecting privacy. It allows you to see what is going where. There are different good tools available on the Internet which you can use. All you need is to install the tool, learn and utilize. I am using Fiddler.

Comments

Popular posts from this blog

How Big Data Analytics Can Help You Improve And Grow Your Business?

Big Data Analytics There are certain problems that can only solve through big data. Here we discuss the field big data as "Big Data Analytics". The big data came into the picture we never thought how commodity hardware is used to store and manage the data which is reliable and feasible as compared to the costly sources. Now let us discuss a few examples of how big data analytics is useful nowadays. When you go to websites like Amazon, Youtube, Netflix, and any other websites actually they will provide some field in which recommend some product, videos, movies, and some songs for you. What do you think about how they do it? Basically what kind of data they generated on these kind websites. They make sure to analyze properly. The data generated is not small it is actually big data. Now they analysis these big data they make sure whatever you like and whatever you are the preferences accordingly they generate recommendations for you. If you go to Youtube you have noticed it kn…

AI Vs Machine Learning Vs Deep Learning

AI Vs Machine Learning Vs Deep Learning Artificial intelligence, deep learning and machine learning are often confused with each other. These terms are used interchangeably but do they do not refer to the same thing. These terms are closely related to each other which makes it difficult for beginners to spot differences among them. The reason I think of this puzzle is that AI is classified in many ways. It is divided into subfields with respect to the tasks AI is used for such as computer vision, natural language processing, forecasting and prediction, with respect to the type of approach used for learning and the type of data used. Subfields of Artificial Intelligence have much in common which makes it difficult for beginners to clearly differentiate among these areas. Different approaches of AI can process similar data to perform similar tasks. For example Deep learning and SVM both could be used for object detection task. Both have pros and cons. In some cases Machine Learning is …

How Computers Understand Human Language?

How Computers Understand Human Language? Natural languages are the languages that we speak and understand, containing large diverse vocabulary. Various words have several different meanings, speakers with different accents and all sorts of interesting word play. But for the most part human can roll right through these challenges. The skillful use of language is a major part what makes us human and for this reason the desire for computers that understand or speak human language has been around since they were first conceived. This led to the creation of natural language processing or NLP.
Natural Language Processing is a disciplinary field combining computer science and linguistics. There is an infinite number of ways to arrange words in a sentence. We can't give computers a dictionary of all possible sentences to help them understand what humans are blabbing on about. So, an early and fundamental NLP problem was deconstructing sentences into small pieces which could be more easily…

Introduction to Data Science: What is Big Data?

What Is Big Data First, we will discuss how big data is evaluated step by step process. Evolution of Data How the data evolved and how the big data came. Nowadays the data have been evaluated from different sources like the evolution of technology, IoT(Internet of Things), Social media like Facebook, Instagram, Twitter, YouTube, many other sources the data has been created day by day. 1. Evolution of  Technology We will see how technology is evolved as we see from the below image at the earlier stages we have the landline phone but now we have smartphones of Android, IoS, and HongMeng Os (Huawei)  that are making our life smarter as well as our phone smarter. Apart from that, we have heavily built a desktop for processing of Mb's data that we were using a floppy you will remember how much data it can be stored after that hard disk has been introduced which can stored data in Tb. Now due to modern technology, we can be stored data in the cloud as well. Similarly, nowadays we noticed …

The Limits of Artificial Intelligence

If you are here, it means that you are familiar with term artificial intelligence. Either you have read about it in school or have seen it in sci-fi movies or somewhere else. Talking about the limitations of AI, let me ask you one simple question first, do you know the definition of AI? You might be thinking to answer me with a yes, yes I know what is artificial intelligence. But what if I tell you that AI is a buzzword and it is almost impossible to properly define. It is this way because the definition of artificial intelligence is moving. People don’t call the things AI that they used to call. For example, a problem that seemed too complex to be solved by human and was solved by AI algorithm is no longer a problem of AI. Playing chess, is one of the examples. It was considered the peek level of artificial intelligence back in previous century. Now it hardly fits the criteria for AI. It is presented to the world as a super power that when given to a computer, it magically starts li…

How To Become A Successful Programmer?

How To Become A Successful Programmer? I have heard many novice programmers saying I want to get better at programming but there is hardly a slight improvement in their skills. I have observed that most of them say they want to get better but that is just a wish. They do not really mean it. They mere wish to improve their skills. They do not work for it. Your wish does not guarantee that you will become a successful programmer. Many other people who have developed an interest in computer programming do not know how to reach to a point where they will be called successful programmers. They either keep wandering in the middle of nowhere or just give up. The same response is for them too as it was for the wishers. Your interest does not guarantee that you will succeed. Programming is a field which requires intensive work to master. Along with improving your technical knowledge of programming, you need to work on your interest. You need to develop a habit of not giving up. You need to…

What is Multithreading? JAVA Multithreading Tutorial

It is almost end of 2017. The computer has evolved throughout its age from a simple, huge machine which was used for just simple numerical calculations to a small and swift electronic device which is affecting almost every aspect of our life. There are a lot of efforts involved in these enhancements in both hardware and software. Powerful hardware has been invented, and robust software techniques have been designed to improve hardware efficiency. One of these methods is multithreading and this is what we are going to talk about.
Multithreading is the ability of a single processing unit to execute multiple programs concurrently, apparently supported by the operating system. Multithreading is achieved either by multithreaded architecture or by software techniques or by both. All processors and OSs today support multi-thread execution.
We are talking about multithreading but what actually a thread is? A thread is a single unit a single processor can execute. The group consists of the sh…

5 Tips for Computer Science Students

You are in college now so I am skipping the basics the go to class do your homework study for tests stay out of the hospital. These are not all important pieces of advice but I am sure you have heard them. Instead, let’s talk computer science. Here are some tips I have specially collected by talking to students who wish they’d heard them when they were students. Listen up.

Seek help when you need it. Your classes are going to get harder, they are going to test your knowledge but that’s why you are there for. Some people find attending office hours or seeking extra help to be embarrassing. But these resources are there for a reason. Taking advantage of the help you are offered will not only help you prepare for future classes and learn the material better but a lot less harmful than bad grades or any other consequences of struggling.Don’t let yourself intimidated by large projects. The best thing to do, sit down a day at the assignment and break it up into smaller tasks. A lot of times…

Supervised Learning vs Unsupervised Learning vs Reinforcement Learning

Supervised Learning vs Unsupervised Learning vs Reinforcement Learning Machine learning models are useful when there is huge amount of data available, there are patterns in data and there is no algorithm other than machine learning to process that data. If any of these three conditions are not satisfied, machine learning models are most likely to under-perform. Machine learning algorithms find patterns in data and try to learn from it as much as it can. Based on the type of data available and the approach used for learning, machine learning algorithms are classified in three broad categories. Supervised learningUnsupervised learningReinforcement learning An abstract definition of above terms would be that in supervised learning, labeled data is fed to ML algorithms while in unsupervised learning, unlabeled data is provided. There is a another learning approach which lies between supervised and unsupervised learning, semi-supervised learning. Semi supervised learning algorithms are giv…

Machine Learning: A Truthy Lie?

For all these years, we all have been misguided by the term machine learning. We have been told that machines learning makes a machine capable of how to think, how to act like a human. Machine learning is the most misused term. It does not really mean what it sounds like. It is a lie, a truthy lie. What is meant by a truthy lie? Each year Merriam-Webster releases a top 10 list of most searched words. In 2003, the top word in the list was democracy. In 2004, the word blog made it to the top. The winning word for the year 2006 was trustiness, "Truth coming from the gut, not books; preferring to believe what you wish to believe, rather than what is known to be true". A word which could be a lie is used so often that it eventually feels like truth. "Bet on the jockey, not the horse" is a truthy lie. Similarly, "machine learning" has been used over time for any kind of activity to train a machine or a computer so it could think or act like a human. The word i…