Shoaib Yousuf

"A Good Hacker Is A Well Known Hacker, A Great Hacker Is A Mystery..."

Tweets by shoaib_yousuf

Tuesday, May 7, 2013

10 Great Online Privacy Guides


Best Practice Guidelines for Maintaining Your Privacy Online

I've stumbled across so many great privacy resources online lately, that I just can't keep them to myself. Here's a good collection for you to consider bookmarking.
  1. Facebook Privacy Settings Guide   
  2. 4 Tips to Keep Your Privacy on LinkedIn 
  3. Security and Privacy Tips for Twitter Users 
  4. 3 Tips to Keep Your Privacy on Twitter 
  5. 3 Tips to Keep Your Privacy on Google+ 
  6. Snap Chat Privacy Issues 
  7. Help Avoid Instant Message Viruses 
  8. Using Instant Messaging and Chat Rooms Safely 
  9. A Renter's Guide to Privacy: Top 5 Privacy Tips for Renters 
  10. 10 Online Privacy Tips for Librarians (that can be used by anyone)  
Posted by Unknown at 10:14 PM
Email ThisBlogThis!Share to TwitterShare to FacebookShare to Pinterest
Labels: Article Share, Asset Protection, facebook, Guidelines, Privacy, Security Awareness, Security Best Practices, Security Resources, Social Media, Social Networking

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Search This Blog

About Me

Unknown
View my complete profile

Follow me on Twitter

Follow @shoaib_yousuf

Blog Archive

  • ►  2016 (1)
    • ►  February (1)
  • ►  2015 (3)
    • ►  June (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2014 (23)
    • ►  October (1)
    • ►  August (3)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (2)
    • ►  February (5)
    • ►  January (3)
  • ▼  2013 (98)
    • ►  December (5)
    • ►  November (5)
    • ►  October (7)
    • ►  September (9)
    • ►  August (9)
    • ►  July (12)
    • ►  June (10)
    • ▼  May (11)
      • Sandcat - Penetration Testing Oriented Browser for...
      • Vulnerability in Building Control Systems
      • BYOD is here to stay, Why?
      • Cybersecurity is about more than technology
      • Cyber Infrastructure Protection Guidelines by Stra...
      • 4 Ways to Defend Against State Sponsored Attacks
      • Reputation Is A New Target For Cyber-Attacks
      • No Room For Guessing Games in Information Security
      • 10 Great Online Privacy Guides
      • "Likes" provide an incredible amount of insight in...
      • How You Can Get Hacked at Starbucks?
    • ►  April (7)
    • ►  March (9)
    • ►  February (7)
    • ►  January (7)
  • ►  2012 (151)
    • ►  December (10)
    • ►  November (13)
    • ►  October (11)
    • ►  September (13)
    • ►  August (12)
    • ►  July (12)
    • ►  June (12)
    • ►  May (15)
    • ►  April (15)
    • ►  March (12)
    • ►  February (13)
    • ►  January (13)
  • ►  2011 (190)
    • ►  December (15)
    • ►  November (12)
    • ►  October (14)
    • ►  September (16)
    • ►  August (19)
    • ►  July (20)
    • ►  June (21)
    • ►  May (16)
    • ►  April (15)
    • ►  March (14)
    • ►  February (14)
    • ►  January (14)
  • ►  2010 (139)
    • ►  November (9)
    • ►  October (18)
    • ►  September (13)
    • ►  August (15)
    • ►  July (14)
    • ►  June (15)
    • ►  May (13)
    • ►  April (13)
    • ►  March (10)
    • ►  February (8)
    • ►  January (11)
  • ►  2009 (139)
    • ►  December (7)
    • ►  November (10)
    • ►  October (11)
    • ►  September (12)
    • ►  August (13)
    • ►  July (13)
    • ►  June (10)
    • ►  May (15)
    • ►  April (16)
    • ►  March (15)
    • ►  February (11)
    • ►  January (6)
  • ►  2008 (222)
    • ►  December (13)
    • ►  November (9)
    • ►  October (21)
    • ►  September (18)
    • ►  August (19)
    • ►  July (30)
    • ►  June (14)
    • ►  May (21)
    • ►  April (21)
    • ►  March (18)
    • ►  February (19)
    • ►  January (19)
  • ►  2007 (24)
    • ►  December (13)
    • ►  November (11)

Visitors from around the world

Locations of visitors to this page

Subscribe To Blog

Posts
Atom
Posts
Comments
Atom
Comments
Awesome Inc. theme. Powered by Blogger.