Shoaib Yousuf

"A Good Hacker Is A Well Known Hacker, A Great Hacker Is A Mystery..."

Tweets by shoaib_yousuf

Tuesday, May 7, 2013

10 Great Online Privacy Guides


Best Practice Guidelines for Maintaining Your Privacy Online

I've stumbled across so many great privacy resources online lately, that I just can't keep them to myself. Here's a good collection for you to consider bookmarking.
  1. Facebook Privacy Settings Guide   
  2. 4 Tips to Keep Your Privacy on LinkedIn 
  3. Security and Privacy Tips for Twitter Users 
  4. 3 Tips to Keep Your Privacy on Twitter 
  5. 3 Tips to Keep Your Privacy on Google+ 
  6. Snap Chat Privacy Issues 
  7. Help Avoid Instant Message Viruses 
  8. Using Instant Messaging and Chat Rooms Safely 
  9. A Renter's Guide to Privacy: Top 5 Privacy Tips for Renters 
  10. 10 Online Privacy Tips for Librarians (that can be used by anyone)  
Posted by Unknown at 10:14 PM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Article Share, Asset Protection, facebook, Guidelines, Privacy, Security Awareness, Security Best Practices, Security Resources, Social Media, Social Networking

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

About Me

Unknown
View my complete profile

Follow me on Twitter

Follow @shoaib_yousuf

Blog Archive

  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  June (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2014 (23)
    • ►  October (1)
    • ►  August (3)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (2)
    • ►  February (5)
    • ►  January (3)
  • ▼  2013 (98)
    • ►  December (5)
    • ►  November (5)
    • ►  October (7)
    • ►  September (9)
    • ►  August (9)
    • ►  July (12)
    • ►  June (10)
    • ▼  May (11)
      • Sandcat - Penetration Testing Oriented Browser for...
      • Vulnerability in Building Control Systems
      • BYOD is here to stay, Why?
      • Cybersecurity is about more than technology
      • Cyber Infrastructure Protection Guidelines by Stra...
      • 4 Ways to Defend Against State Sponsored Attacks
      • Reputation Is A New Target For Cyber-Attacks
      • No Room For Guessing Games in Information Security
      • 10 Great Online Privacy Guides
      • "Likes" provide an incredible amount of insight in...
      • How You Can Get Hacked at Starbucks?
    • ►  April (7)
    • ►  March (9)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (151)
    • ►  December (10)
    • ►  November (13)
    • ►  October (11)
    • ►  September (13)
    • ►  August (12)
    • ►  July (12)
    • ►  June (12)
    • ►  May (15)
    • ►  April (15)
    • ►  March (12)
    • ►  February (13)
    • ►  January (13)
  • ►  2011 (190)
    • ►  December (15)
    • ►  November (12)
    • ►  October (14)
    • ►  September (16)
    • ►  August (19)
    • ►  July (20)
    • ►  June (21)
    • ►  May (16)
    • ►  April (15)
    • ►  March (14)
    • ►  February (14)
    • ►  January (14)
  • ►  2010 (139)
    • ►  November (9)
    • ►  October (18)
    • ►  September (13)
    • ►  August (15)
    • ►  July (14)
    • ►  June (15)
    • ►  May (13)
    • ►  April (13)
    • ►  March (10)
    • ►  February (8)
    • ►  January (11)
  • ►  2009 (139)
    • ►  December (7)
    • ►  November (10)
    • ►  October (11)
    • ►  September (12)
    • ►  August (13)
    • ►  July (13)
    • ►  June (10)
    • ►  May (15)
    • ►  April (16)
    • ►  March (15)
    • ►  February (11)
    • ►  January (6)
  • ►  2008 (222)
    • ►  December (13)
    • ►  November (9)
    • ►  October (21)
    • ►  September (18)
    • ►  August (19)
    • ►  July (30)
    • ►  June (14)
    • ►  May (21)
    • ►  April (21)
    • ►  March (18)
    • ►  February (19)
    • ►  January (19)
  • ►  2007 (24)
    • ►  December (13)
    • ►  November (11)

Visitors from around the world

Locations of visitors to this page

Follow by Email

Subscribe To Blog

Posts
Atom
Posts
Comments
Atom
Comments
Awesome Inc. theme. Powered by Blogger.