Quantcast
Channel: eHow - General Internet Safety How To's
Browsing latest articles
Browse All 135 View Live

Image may be NSFW.
Clik here to view.

How to Safely Use Wi-Fi at a Restaurant

Connecting to a restaurant's free Wi-Fi network could open your computer or mobile device to hackers who will have a field day with your personal information. However, free Wi-Fi is awfully convenient...

View Article



Image may be NSFW.
Clik here to view.

Can You Restrict Ages on Tumblr?

Tumblr does not have a method of restricting the age of users who access your posts, nor does it offer any method of warning users as to the content of your blog. There are certain measures you can...

View Article

Image may be NSFW.
Clik here to view.

How to Tell Whether Someone's Pictures Are Fake

The Internet is the source of a tremendous amount of human knowledge, but as Web surfers quickly learn, not all information found on the Internet is equally reliable. The same is true of online...

View Article

Image may be NSFW.
Clik here to view.

How to Identify a Hyperlink

Hyperlinks are easy to identify on a Web page by either looking for the typical blue underlined text or pointing your mouse cursor at the text and watching it turn into a tiny hand icon. However,...

View Article

Image may be NSFW.
Clik here to view.

How to Resend a Confirmation Code

To prevent fraud, websites put up an extra layer of security. The sites verify users' identities or devices with a confirmation code. However, sometimes the confirmation code gets lost and it needs to...

View Article


Image may be NSFW.
Clik here to view.

Reasons Why People Cyber Bully

Cyberbullying is the act of using the Internet, cellphones or other digital devices to harass, humiliate or threaten others. Cyberbullies may pretend to be someone else to trick others into revealing...

View Article

Image may be NSFW.
Clik here to view.

Definition of Csrss.exe

Csrss.exe is a process that belongs to the Microsoft Corporation. However, some malicious programs install and use a process with the same name in an effort to remain undetected. Thus, you will want to...

View Article

Image may be NSFW.
Clik here to view.

How to Detect a Zbot

Zbot is a banking Trojan that also goes by the names Zeus, WSNPOEM, NTOS and PRG. Once the Trojan is downloaded onto your computer, it runs in the background recording every keystroke your computer...

View Article


Image may be NSFW.
Clik here to view.

The Objectives of Hackers

Hacking means gaining unauthorized access into a computer system or online account. Hackers are often financially motivated, as stolen information can be used for material gain via scams or identity...

View Article


Image may be NSFW.
Clik here to view.

How to Remotely Install eBlaster

EBlaster, a SpectorSoft product, records all activity on a computer on which it has been installed. It then sends these records via email to an address that is specified at installation. It is used by...

View Article

Image may be NSFW.
Clik here to view.

What Is IP Hacking?

Unlike computer viruses, which attack users indiscriminately, an IP hack is a targeted attack against a Web server or a personal computer. Most depictions of hacking in television shows and movies are...

View Article

Image may be NSFW.
Clik here to view.

How to Detect IP Addresses

Any computer can detect IP addresses without any special software or tools installed. Windows comes with a tool called Netstat that allows you to see the IP addresses of any sites, servers and chat...

View Article

Image may be NSFW.
Clik here to view.

Negative Effects of Hacking

While some hackers may not worry about the consequences of their actions, little debate exists as to the fact that hacking has several negative effects. Businesses and governments spend an untold...

View Article


Image may be NSFW.
Clik here to view.

How to Get Rid of TeamViewer

TeamViewer is a malicious program that allows remote hackers to gain control of your operating system. Common symptoms of TeamViewer include modified browser start page, missing files, unsolicited...

View Article

What Are Some Web Security Issues That Should Be Considered for Web-Based...

When taking on web-based initiatives, companies often fail to realize the impact of potential security problems. If not taken into consideration, security issues could derail an otherwise fruitful...

View Article


Image may be NSFW.
Clik here to view.

Should I Remove a Burst Media Cookie?

Whether you browse the Internet every day or just once a month, you should be aware of Internet cookies. Just as important is an understanding that despite your personal feelings and perceptions, not...

View Article

What to Do if Someone Posted a Picture Without Permission?

Web browsers make it easy to use an image belonging to someone else without receiving permission. You can right-click any image, save it to your hard drive and re-post it elsewhere in a matter of...

View Article


What to Do If a Security Certificate Is Untrusted?

When you conduct business on the Web, knowing that your information is secure is essential. Security certificates help reinforce that relationship, providing confidence in the vendor and their site....

View Article

Image may be NSFW.
Clik here to view.

How to Use Soulseek With an Anonymous IP

Soulseek is a free file sharing application that’s generally popular among musicians, electronic musicians in particular. Users can employ the Soulseek application to share a variety of files, but...

View Article

Image may be NSFW.
Clik here to view.

Hazards of Selling on Craigslist

Craigslist can be a useful tool for selling your stuff, buying other peoples' stuff, finding a job, finding someone to hire... the list goes on. Since launching as an email want ad equivalent in 1995,...

View Article

Image may be NSFW.
Clik here to view.

Who Regulates the Internet?

The Internet, with its sprawling, multifaceted structure, does not have a single regulating body. Instead, various public and private regulating organizations have stepped in to handle the various...

View Article


Image may be NSFW.
Clik here to view.

What Are Ways People Commit Crimes on the Internet?

The Internet has torn down many of the barriers that once separated people, including those between criminals and their victims. Online criminals can stalk you, steal your personal information and even...

View Article


Image may be NSFW.
Clik here to view.

What to Know About Banking Online

Whether you're stuffing cash into an ATM or using your Web browser to transfer funds, your money is only as safe as the security those devices provide. While Internet banking services help people save...

View Article

Image may be NSFW.
Clik here to view.

Can You Be Hacked Through a Dedicated Server?

Dedicated servers are computers waiting to process a specific type of request. As a result, there are few ways for your computer to differentiate between a proper, dedicated server and a computer that...

View Article

Image may be NSFW.
Clik here to view.

How to Remain Hidden on the Internet

Several clues about your computer configuration, information gathered when you visit a website and potential monitoring by your Internet service provider make it difficult to completely hide yourself...

View Article


Image may be NSFW.
Clik here to view.

What Happens When You Report a Personal Attack on Facebook?

Facebook is a great way to keep in touch, but unfortunately some people use the site to attack or threaten others from behind the safety of a computer monitor. If this happens to you, report the...

View Article

Image may be NSFW.
Clik here to view.

What Does Yahoo Do When Someone Reports They Are Being Impersonated?

Our online identity is one of our most valued possessions. It’s hard to function these days without leaving some sort of digital footprint; from online banking to more general use of professional...

View Article

7 Urgent Things to Tell Your Folks About Ransomware and the Dark Web

"The dark Web." The term evokes imagery from a suspense thriller, complete with spies, a gritty hero and evil technology overlords intent on dominating the earth. Contrary to the sensationalist hype...

View Article

Image may be NSFW.
Clik here to view.

5 Ways to Protect Your Identity From the Anthem Data Breach

If you believe your personal information has been compromised by the recent Anthem data breach (or another similar criminal hack), here are five steps you can take to prevent thieves from damaging your...

View Article



Image may be NSFW.
Clik here to view.

Negative Effects of Internet Usage

The Internet is one of the most exciting and powerful inventions of the second half of the 20th century. The reason why it is so powerful is that it provides access to information about almost every...

View Article

How to Remove the iFrame Trojan

iFrame, also called Mal/Iframe, is a trojan that affects the Windows operating system. The iFrame trojan infects computers through malicious websites and malicious e-mail links. Once infected, your...

View Article

Image may be NSFW.
Clik here to view.

How to Verify if a Source is Credible on the Internet

The Internet is a vast public electronic network of information. Many commercial, academic and government websites provide access to information, services, products, laws and advice. No system of...

View Article

Image may be NSFW.
Clik here to view.

How to Encrypt Your Internet Browsing With Google

Encrypted Google is a popular tool for people who don't like their search habits on Google to be monitored on public Wi-Fi at an airport or by an IT Network administrator at work. When you search over...

View Article


Image may be NSFW.
Clik here to view.

The Disadvantages of Mobile Internet

Mobile phones have become increasingly sophisticated. Gone are the days when mobile phones were simply used for making calls. They've become all-encompassing gadgets able to play music and videos,...

View Article

Image may be NSFW.
Clik here to view.

Proxies That Work With Dailymotion

When accessing the Internet through a network that operates filters, you'll be unable to visit websites that are being restricted by the network administrator. These restrictions are common at...

View Article

Image may be NSFW.
Clik here to view.

How to Manually Remove the Trojan.FakeAV & the Wscsvc32.exe Process

Trojan.FakeAV is a process installed and used by a trojan bearing the same name. The Wscsvc32.exe process is installed and used by a rogue anti-malware program called Antivirus. Both malicious programs...

View Article


Image may be NSFW.
Clik here to view.

How to Remove Cutwail Spambot

The Cutwail virus is a nasty bit of malware that automatically downloads files to your PC and runs them without your consent. It’s also capable of compromising your sensitive information; the virus can...

View Article


Image may be NSFW.
Clik here to view.

How to Remove the Crawler From My Computer

Crawler is an Internet toolbar that blocks pop-up advertisements and provides additional search functions. However, Crawler may also redirect Internet searches, make changes to your Internet browser...

View Article

Image may be NSFW.
Clik here to view.

Psychological Effects of Internet Usage

Although the Internet is a great source of information, it can have psychological effects on children and adolescents. Some psychological problems include social awkwardness and lack of a social life...

View Article

How to Block Yandex.ru

Yandex.ru is a Russian Web search website that also includes several other features, including weather updates, market information, details about buying new cars, a dictionary, news headlines and more....

View Article

How to Find DNS Server IP Addresses for My Router

The Domain Name System, or DNS, is an essential component of computer networking. When you use a Web browser, you type the website's domain name into the URL bar. However, the servers that your...

View Article


Image may be NSFW.
Clik here to view.

How to Delete Flash Cookies Using Windows 7

Local shared objects, also known as Flash cookies, store data between visits to flash content in the same way an Internet browser stores cookies from visited websites. Flash cookies are totally...

View Article

Image may be NSFW.
Clik here to view.

What Are Government Agencies Doing to Stop Cyber Crime?

From the average person to multibillion-dollar corporations and the government, cyber crime affects every one of us in some way. The federal government has attempted to combat cyber crime by...

View Article


Image may be NSFW.
Clik here to view.

How to Close an iMesh Account

IMesh is a peer-to-peer media file-sharing platform that allows users to purchase music and video. Paid subscriptions allow users to listen to music clips and purchase full song or video versions based...

View Article

Image may be NSFW.
Clik here to view.

How to Report a Post on 4Chan

4Chan is an online bulletin board that allows users to post images and messages. With 4Chan, you are able to discuss Japanese anime, music, photography and video games. 4Chan makes sure that this...

View Article


Image may be NSFW.
Clik here to view.

How to File a Complaint Against an Internet Website

The Federal Trade Commission (FTC) is the first stop for people in the United States wishing to complain about a website. It handles any complaints related to Internet fraud and scams, identity thieves...

View Article

How to Unfilter Websites

Filters or blocks on websites prevent family computer users from accessing potentially harmful or inappropriate sites. If you've blocked a website from specific access, but now need to access it, use...

View Article

How to Block "AddThis"

AddThis is a popular, on-line bookmarking and link/file sharing service. AddThis gives users the convenience of having their favorite online sites and amenities only clicks away. But, having direct...

View Article

Image may be NSFW.
Clik here to view.

How to Stop Bot Attacks

A "bot" is a small computer program that can hijack your website or infect your computer. Bots are used to spam website comments and contact forms with advertising, or to take control of your computer...

View Article


Image may be NSFW.
Clik here to view.

How to Create an Online Alias

When you communicate over the Internet with the people you know, such as family, friends and business colleagues, you feel free to use your real name. However, when you want to participate in an online...

View Article

Browsing latest articles
Browse All 135 View Live




Latest Images