newYou can now listen to Fox News articles!
I have to tell this story. When my college-bound son moved to Los Angeles, 28 years ago he was asked for the number of the house he rented in the area for two months.
I laughed because I couldn’t remember. Then—I was shocked!
About five minutes later, he texted me a link to a free people search site. It contained that house number, every other address I lived in, my current address, links to relatives, their age, my age, and even my age. Personal mobile phone number.
All this data was not behind a paywall. Just search my name and bam — lost privacy.
At that time, I started an initiative on my site to list the exact steps to remove data from these creepy person search sites.
HACKERS WANT GOOGLE ACCOUNTS.Submit this security check now
These sites often hide instructions. Don’t worry — we did the heavy lifting.
Tap or click to see a list of 13 spooky sites with your phone number, address, age, relatives, etc. and instructions on how to delete your information. You will be amazed at the information about yourself that is available online for free.
Bookmark this page for future reference.
A safer online life in minutes. Follow this list. Then pat yourself on the back to take care of your digital self.
Hide your home on Google Maps and Apple Maps
It’s as useful as Google Maps or Apple Maps, but it makes me uneasy if my home or address is exposed to anyone on the internet. Here is the secret. You can apply privacy blur to your home photos.
Here’s how to send a request to Google:
Open google map or street view gallery — and look up your address.
Tap the Street View photo you want to blur. The image must show your face, home, license plate, or other identifying information.
Click “Report a Problem”. This can be seen in the bottom right corner or by clicking the 3-dot menu on the photo.
fill in the form and[送信]Click.
For Apple maps, you should also email MapsImageCollection@apple.com and:
Ask your house to be blurry.
Provide Apple with your full address.
Include additional property details so Apple knows which home to censor.
Map Tips: Get more out of Google Maps with these 10 smart tips
Check for strange behavior
Spyware is malicious software that works silently in the background and tracks almost everything you do. These sneaky downloads leave behind digital clues if you know what to look for.
Task Manager on Windows PCs and Activity Monitor on Macs give you an overview of everything happening on your machine.
If you are using a PC, do the following:
Open Task Manager by pressing Ctrl + Shift + Esc.[プロセス]Below the tabs you’ll see the apps and background processes running on your PC.
Take a look through the list. If you see a name you don’t know, search online to see what you see. Despite their seemingly obscure names, these programs and background processes are legitimate and may not be a problem.
To close an app or process, right click and hit end taskPlease check back later to see if it works again.
If you’re on a Mac, do the following:
To open Activity Monitor, Command-Spacebar Open Spotlight Search.Then type activity monitor Press come inCheck the list to see if there are any that you do not recognize.
Double-click to close the program or process, then finish.
Tap or click to see other signs that someone is spying on your computer.
lock down your computer
If you leave your computer unlocked, anyone will be invited to come along and snoop. If your laptop is stolen or lost, you could be in a dire situation.
Lock with a strong, unique password. In other words, no repeats! This password should be easy to remember, as you will need to enter it every time you open your computer.
If your computer allows you to unlock it using a biometric, such as your fingerprint, there’s an even easier solution.
Otherwise, use the same password guidelines for all your online accounts:
Use a combination of letters, special characters, numbers, and uppercase letters.
Aim for 12 characters or more.
Consider creating a passphrase instead of a password. These are longer, harder to crack, and easier to remember. Tap or click here and scroll down to No. 3 for more information on creating.
To lock your Windows PC:
go to start > setting > account.
click Sign-in options from the left pane.
click addition [パスワード]under section.
Enter new password.click Nextafter that end.
To lock your Mac:
When you set up your Mac, you’ll be asked to create a login password. Here’s how to set a password to unlock your computer:
click apple iconafter that System Preferences.
click Security and privacy.
Please Confirm password required [全般]box for tabs.
password timing straight away Set your Mac to automatically lock when it goes into sleep or screensaver mode.
Know This Vulnerability Hidden In Your Browser
Extensions allow you to customize your browser and add powerful functionality. But not all extensions are useful. Some follow you around the internet, eat up your computer’s resources, or worse.
What is safe and how can I tell? Google Chrome assigns the “Recommended” badge to extensions that “follow technical best practices and meet high standards of user experience and design” from Google.
Hey, at least it’s something.
Privacy Tip: 5 Ways You’re Being Tracked
Are you sure the extension is bad news? I didn’t download it, so delete it.
It’s also helpful to search the web for phrases like “Is[the extension you’re using]safe to use?” See what pops up and pay special attention to security warnings.
Here’s how to remove the extension from Chrome:
your Chrome browser. Tap. three vertical dots It’s to the right of your profile icon.
cover over Other tools and choose extension.
click delete Click the extension you want to remove, then delete Also.
Do you use Safari on your Mac? Here’s how to remove the extension.
Choose safari > Environmental setting. click extension.
To uninstall an extension, select it and click . Uninstall.
don’t stop there. Tap or click to learn 9 ways to make Chrome more secure.
maintain technical knowledge
My favorite podcast is “kim commando today.” 30 minutes of solid tech news, tips and questions from callers from all over the country.
Search where you can get podcasts.
For your reference, click the link below for recent episodes.
Podcast picks: Ford Helps Cops, Prime Day Again, John McAfee’s Crazy Crime
Be prepared for an electric police chase thanks to Ford’s Police Partnership. We have all the details and an inside scoop on the leaked Amazon document. It looks like we have another Prime Day. Also, you can now wear a smart scarf to keep cool. It’s a wild ride.
Find my podcast “Kim Komando Today” on Apple, Google Podcasts, Spotify or your favorite podcast player.
Search for my surname “Commando”.
What questions do you have about your digital lifestyle? Call Kim’s National Radio Show and Tap or click here to find out on your local radio station.
can hear and see kim commando show On your phone, tablet, TV, or computer. Or tap or click here for Kim’s free podcast.
Copyright 2019, WestStar Multimedia Entertainment. all rights reserved.
Learn about the latest technology kim commando show, the nation’s largest weekend radio talk show. From a smartphone or tablet, Kim Online privacy and data hacking.
For her daily tips, free newsletter, and more, visit her website. command dot com