7 Things You Should Never Share Online

Like Erica in the movie “The Social Network” says “The Internet‘s not written in pencil, Mark, it’s written in ink.” She meant that whatever is written on Internet is permanent and cannot be removed easily. Social Media makes it fast and easy to share just about anything.

Not only can you post this information yourself, many other sites can ask for permission to share it on your behalf. It can become viral and no one can actually track the original source and block it. In today’s digital age, it’s more important than ever to protect your safety and privacy online. Below I have mentioned 7 important things you should NEVER share online, and make sure

1. Videos of Other People’s Children

Do not post pictures of other people's kids

Videos of kids are fun, adorable, and occasionally downright hilarious. While you can post videos and pictures of your children at your discretion, you should always use care with other people’s kids. This applies to both your own home videos and videos that you see in your feed. Just because a parent posted a family video for her friends and family, doesn’t mean that she wants you to repost it for a bunch of strangers. Always ask the parent for explicit permission.

2. Spam Posts About Social Media Policies

Online Privacy

It’s very unlikely that you’re going to find out about a new and important Social Media policy via a spam-like post. These warnings are usually totally unfounded, such as the rumor that circulated stating Facebook would become a paid site. Your posts are also an insufficient way to protect your rights. One post claimed that putting it on your wall would protect your rights on Facebook. Always check these posts’ validity before sharing.

3. Work-Related Complaints

Work-Related Complaints

Complaining about work on a Social Media site is a bad idea all the way around. The laws about what employers can and can’t fire you over are still fuzzy, so it’s best to play it safe. Posting about blatantly inappropriate activity like calling in sick when you’re well or having a workplace affair could definitely leave you unemployed.

4. Vacation Details

Vacation Details

Posting the exact dates of your vacation is as good as advertising that your home is empty and unprotected. Share the details of your getaway when you’re back.

5. Your Birth Date and Birthplace

Your Identity

Criminals can find your social security number with just your name, date of birth, and birthplace. If you must share your birthday, keep the year private. Best of all, let your friends prove their true loyalty by remembering your birthday without email reminders.

6. Pictures You Wouldn’t Want Your Boss or Parents to See

Party Images

If you’d be mortified for your dad to see you in that bikini, or you wouldn’t want your boss to have a visual representation of how many Jell-O shooters you can handle, keep these photos off of social media sites. You never know where a computer-savvy enemy may be lurking, ready to copy and share.

7. Your Location at Any Time

Location Time

Posting your location is risky business, and many smartphone or tablet pc apps want to do it. Foursquare, Instagram, and even your Facebook and Twitter apps have options for posting your exact location in real-time. This lets predators know where you are and what hot spots you frequent. It also lets potential burglars know when your home is empty and vulnerable. Even if you think that you have the best laptop with latest security features, when it comes to online sharing, the security of your family and you is in your hands.

There are privacy safeguards on social media sites for your protection. By all means use these, but also be careful of what you share, keeping in mind that you never know what someone else may choose to pass along.

5 Cool Tools For Ensuring Your Online Privacy

Today I begin a new session to present programs and utilities focused on a particular topic. To make a start I decided to make a small gathering around one of the most important aspects of personal computing: privacy.

Online Privacy

So I present some utilities that you can use daily in your computer and that will help you communicate, encrypt your files, store your passwords, or surf safely.

1. TrueCrypt

TrueCrypt is one of the most popular applications when encoding your files ahead of us or who only want to access its contents. It takes many years in the market and is endorsed by a large community of users and developers, as it is completely based on open source.

Its use is really simple, and among other things can help us to codify our files, do it with a partition or entire drive, or deny access if it is detected the incorrect entry of password.

2. KeePass

KeePass is a password manager that will help us store our passwords in a secure and simple. With this application you can store all your passwords in a database that will be closed and opened only by entering a master key. That is, we have to remember only one password to access the rest of them. It also allows us to get the databases with us wherever we go, keeping them away from hazards or outsiders.

Particularly am not writing this type of data and use these services, but it is a very safe, and also with the times in which the amount of data we store on the net is increasing and the number of services that we use is growing every day, this is a very good idea.

3. Skype

Although it was recently bought by Microsoft and announced major changes, the truth is that today have a conversation on Skype remains one of the best ways to communicate in a totally private on the Internet.

Its versatility and the fact that it is available for a wide range of platforms makes it ideal and almost essential that we all have a Skype account, from which also does not cost you anything to talk with our contacts, even though they are on the other side of the world.

4. TorChat

In a post on privacy could not stop talking about TOR. As you all know, this is a system that attempts to provide anonymity when to connect to the network through a series of routers that allow us to get where we are going through a series of sites you never know who we are. In fact, mean TOR The Onion Router , as if it were an onion our connection will go through many layers before reaching the other end.

There are many programs that work with TOR, and here we mention a few. The first is TorChat, an application of that and I talked a few months and is ideal for chatting in a completely secure and anonymous . The distribution for Windows, Mac and Linux, and its use is based on a 16-character identifier that will serve as the ID and that we share with our friends to talk to them.

5. Privoxy

Privoxy is another utility that is based on TOR to ensure our privacy, and this time focuses on providing an advanced web proxy from which we can among other things, access control or manage cookies.

This is a very popular program since its GNU make this available for cross-platform, and special compilations can download for Windows, Mac OS X or Linux. Its installation and configuration are fairly straightforward, although we can find the official documentation if you have plenty of problems.

This article is written by Asher ross. She is an Expert technical writer from UK with expertise in writing articles over Dedicated Server UK Mac OS, Apple, Mobile and UK Web hosting server technology. If you wish to write for us, kindly check this.