Skip to main content

Don't want advertisers to monitor your every search on Facebook ?

Facebook for Windows users: Tight privacy set

How to protect your account from getting hacked

  • Set a strong password
  • Enable two-factor authentication
  • Verify the list of trusted devices
  • Enable suspicious activity alerts
  • Choose trusted contacts to help recover your account

How to keep corporations out of your business

  • Block face recognition
  • Disable the use of your personal data in advertising
  • Disable integration with questionable sites
  • Restrict the use of information about your off-Facebook activity in advertising.
  • Deny Facebook partners access to your data

How to defeat spammers and trolls

  • Limit the ability to comment on your posts
  • Exclude offensive comments from your timeline
  • Block unwanted users
  • Limit the ability to tag you in posts
  • Restrict others from posting on your timeline
  • Limit the ability to send you friend requests

How to hide posts from unwanted people

  • Configure visibility of posts
  • Limit access to stories
  • Stop users from sharing your posts in stories

How not to expose your personal data

  • Configure visibility of your profile data
  • Restrict the visibility of your subscriptions
  • Hide your status
  • Limit visibility of your ad-specific activity on the social network
  • Limit the ability to find you by your phone number and e-mail address
  • Stop search engines from indexing your profile

How to get rid of unwanted notifications

  • Turn off unnecessary notifications
  • Turn off notifications from games and apps
  • Disable browser notifications

How to clean up your traces

  • Delete bank card details
  • Disable and remove the location history
  • Check what data Facebook has on you

Comments

Popular posts from this blog

How to secure PayPal

How to secure PayPal By- Aarti Jatan Your online finances need proper protection. Learn how to secure your PayPal account. With hundreds of millions of users around the world, PayPal has long been an international leader in the electronic payments industry. But as we know, money never fails to attract fraud, especially now, with as much of life as possible taking place online. Here is what you need to do to stay safe when sending or receiving money through PayPal. How secure is PayPal? As a matter of fact, PayPal is quite a reliable platform that maintains a high level of security — and keeps improving it. Thus, the company has an official program deploying white hat hackers to unearth vulnerabilities (the so-called bug bounty), under which it has already paid out almost $4 million since 2018. The program also covers several other services owned by PayPal, such as Venmo. PayPal also treats its users’ data responsibly: It did have one reliably reported leak, in 2017, but the leak invol...

A DEEP DIVE INTO THE OFFICIAL DOCKER IMAGE FOR PYTHON

  A DEEP DIVE INTO THE OFFICIAL DOCKER IMAGE FOR PYTHON The official Python image for Docker is quite popular, and in fact I recommend one of its variations as a base image . But many people don’t quite understand what it does, which can lead to confusion and brokenness. In this post I will therefore go over how it’s constructed, why it’s useful, how to use it correctly, as well as its limitations. In particular, I’ll be reading through the python:3.8-slim-buster variant, as of August 19, 2020 , and explaining it as I go along. Reading the Dockerfile The base image We start with the base image: FROM debian:buster-slim That is, the base image is Debian GNU/Linux 10, the current stable release of the Debian distribution, also known as Buster because Debian names all their releases after characters from Toy Story. In case you’re wondering, Buster is Andy’s pet dog . So to begin with, this is a Linux distribution that guarantees stability over time, while providing bug fixes. The slim...

Five regular checks for SMBs

Five regular checks for SMBs By- Aarti Jatan Five things that, if neglected, can cost SMBs dearly. It is not always economically viable for small and medium-size businesses to maintain a dedicated IT security team, so it often happens that one person is in charge of monitoring the entire infrastructure. Sometimes he or she is not even a permanent, full-time employee. Sure, a good administrator can do a lot, but even a pro might miss something, particularly if issues are mounting and time is short. So, it’s worth establishing a few habits. Here are our Top 5 regular checks. Renew the corporate site security certificate Any website that requests or processes user data must have an SSL certificate. It protects information entered by visitors from being intercepted, and almost all modern browsers  warn  users that sites without an SSL certificate are insecure. That can scare off potential customers. Your website most likely has an SSL certificate, but its validity period is limite...