Tech Tips

Online Security

9 Ways Passwords Are Compromised

by Barbara J. Feldman November 3, 2010

Although strong passwords that are impossible to guess are an important part of online security, they are not the only precaution you need to take to keep your online identity secure. Leo Notenboom of Ask Leo lists nine ways your password could be compromised, even if it is very long, has lots of numbers and […]

0 comments Read the rest of the tip →

What are the pros and cons of Lifelock security?

by Barbara J. Feldman November 14, 2008

In 2007, more than eight million people were victims of identity theft. The average victim of identity theft will spend hours and hours on the phone, writing letters, sending emails and documents, and doing other tasks to try and recover their money, repair their credit, and get their lives back to normal. Sometimes, it even […]

0 comments Read the rest of the tip →

How does Lifelock security protect your identity?

by Barbara J. Feldman November 12, 2008

Identity theft can be a nightmare to go through, and roughly eight million people a year are faced with the hassle of trying to repair the damage of identity theft. Sometimes, people don’t even know their identity has been stolen and their credit scores tainted until the worst possible times, like trying to obtain a […]

0 comments Read the rest of the tip →

The Disposable Email Address Firewall

by Barbara J. Feldman April 4, 2008

There are a number of different things that you should know about disposable email addresses for privacy. Disposable email addresses are one of the best tools that you can use to protect yourself and your privacy whenever you are online or doing anything online; disposable email addresses ensure that nobody can find out who you […]

0 comments Read the rest of the tip →

Protect Your Identity By Using Facebook Privacy Settings

by Barbara J. Feldman February 14, 2008

When online, protecting your identity should be a concern that remains at the forefront of your mind. The business of identity theft and hacking into computer systems is booming and exercising caution is your only defense against becoming a victim yourself. There are identity protection techniques that should be used every time that you are […]

0 comments Read the rest of the tip →