A Research Guide for Students by I Lee

Chapter 14.
How to Survive the Internet Unscathed


Translate this page to another language of your choice:


To translate a block of text or web page, click Bing Translate or Google Translate


Wall Street Executive Library Feature Site - This is not an ad but a link to a world of wonderful resources.
Business Toolkit
Reference Library
  Sitemap
     
Google
globe    
by freefind
     

100 Best Websites
Dragon

Take the following advice seriously,
and your Internet experience will be
trouble free at all surfing times.

1.      Be ethical.

2.      Abide by all cyber rules, regulations, and laws wherever they may apply.

3.      Be wary of accepting advice from cyber friends on the Internet.

4.      Don't flamespamspimphish or vish.

5.      25 Forum Posting Etiquette Tips by Pamela S Stevens.
Online Etiquette Guide. Online Etiquette (Netiquette). Good Practices for communicating and participating online, from Madison College.

25 Forum Posting Etiquette Tips by Pamela S Stevens.

Forum Etiquette from Wiki Arch Linux.

Etiquette in technology from Wikipedia, the free encyclopedia.
- "Netiquette, a colloquial portmanteau of network etiquette or Internet etiquette, is a set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums."
- Online etiquette - Digital citizenship is a term that describes how a person should act while using digital technology online and has also been defined as "the ability to participate in society online".
- Cell phone etiquette.

6.      Don't accept opinions, rumors, unsubstantiated comments as Gospel truths. Be wary of propaganda and biased information.

7.      Check original and reliable sources to verify accuracy of information whenever possible. Develop a habit to critically evaluate all content on the Internet.

8.      Guard against viruses and hackers, take absolutely NO chances. See ClamWin Free Antivirus, or Anti-Virus or AntiVirus for a free download.

9.      If you have access to an anti-virus program with live update feature, update frequently and have auto-protect running on your computer.

10.    Remember to disable auto-protect before installing new software on your computer if your program does not automatically do it for you.

11.    As a rule, do not send your photo or give personal information to strangers, and do not give passwords or credit card numbers online. See Privacy Survival Guide: How to Take Control of Your Personal Information & Fact Sheets from Privacy Rights Clearinghouse. See also:

The Definitive Guide to Internet Privacy & Online Security from Premier Choice Internet. Contents include: 1. Introduction to online privacy. Who is tracking your personal data? Keeping safe online with tablets & mobile phones. 2. How to shop safely on the Internet. How can I check a website is secure? Phishing & fake online webpages. 5 tips for keeping safe when shopping online. 3. Online theft, viruses & malware. Understanding viruses and malware. Protecting yourself from online threats. Most common Internet scams. 4. Social media security. Personal privacy tips for social media.

6 Tips for Smart Online Shopping from Warranteer.

7 Ways to Protect Your Privacy Online by Kara Brandeisky, Money, June 5, 2014.

Internet privacy from Wikipedia.

How Privacy Vanishes Online by Steve Lohr, Technology, New York Times, 16 Mar. 2010.

12.    If you must enter your password, give personal information or credit card numbers online, do so cautiously and only if you are sure that the Web site is secured. A KEY or PADLOCK in yellow or in a yellow box is visible at the bottom of the screen when the site is secured. Note also that in the address or URL, the hypertext transfer protocol "http" will change to "https" indicating that the site is indeed secured. Never shop online without using a secure browser such as Internet Explorer, Moxilla Firefox, Google Chrome, Opera or Apple Safari. See Online Shopping Tips for more information.

13.    If you experience something suspicious online or know something is dreadfully wrong, notify someone you trust immediately.

14.    Read carefully agreements, important notices, terms and conditions, before subscribing, downloading, registering, buying, ordering, or "signing" anything online.

15.    Be very cautious when downloading free software. Some sites provide free download of software but long distance charges may apply for every minute of download. Some sites ask you for your credit card information before free downloads or first 30 days free usage.

16.    Be careful what you say (i.e. type) while you are in a chat room. Don't say anything that you may regret later. What you say could be permanently saved or printed by any party "conversing" with you or "listening" to your conversation online.

17.    Never leave your good personal email address to anyone in a chat room, discussion group, newsgroup, on a bulletin board, or when using an instant message service.

18.    Don't send anything by email, or attach anything to an email that you don't want the WHOLE WORLD to read, see, hear, or know about, now or in the future. It may come back to haunt you when you least expect it. Remember that an email is a written record accessible by anyone, anywhere, at any time, FOREVER! An email and its attachment could be easily stored, printed or redistributed by anyone.

"Be careful what you say in your work email account, or in your company Slack channel, or anywhere a record is kept. You never know when and where it'll come back to haunt you." ~ From article: "The cofounder of Google's Android just proved why you should always be careful what you say in work email" by Matt Weinberger, Business Insider, 12 May 2016.

Safety tips when using social media from TD CanadaTrust:

● Be wary of requests for money from a friend or relative in trouble. Fraudsters sometimes hack into social media accounts and make monetary requests to get unsuspecting victims to wire them money.
● Don't click on links from people you don't know, especially if these were received via a private message. This could lead to the installation of financial malware or other harmful software on your device.
● Don't post sensitive personal information or disclose financial information pertaining to yourself or others through social media. Legitimate businesses should not ask for sensitive information or pressure you into providing it through social media.
● Familiarize yourself with the social media site's privacy settings, which allow you to choose how much personal information you reveal and to whom.
● Limit access to close friends, relatives and coworkers. Spend a moment vetting new requests, ensure you actually know the person or business and want them to see what you post.

19.    Choose a strong password. Advice from Microsoft: How to create a strong password:

A strong password is one that's difficult for others to determine by guessing or by using automated programs. Do not use single dictionary words, your first or last name, date of birth, or other personal info that can be easily obtained, or a password that contains part of your email address or phone number.

A strong password:

● Is NOT a common word or name, or a close variation on a common word or name.

● Contains 7 to 16 characters.

● Uses at least 3 of the following 4 types of characters:

● Uppercase letters (A, B, C)

● Lowercase letters (a, b, c)

● Numerals (1, 2, 3)

● Special characters ( `~ ! @ # $ % ^ & * ( ) _ + - = { } | [ ] \ : " ; ' < > ? , . / )

21.    Don't use the same password at multiple sites or for all your email accounts. If you have more than one email account, use a different password for each account. Use your own association method to link account with password to help you remember the two. However, you need not worry unduly if you cannot remember your password as most sites will send you an email to assist you with a forgotten password - just don't forget your account, or you may have trouble cancelling the old account to open a new one.

22.    Personal account and financial information are often obtained by scam artists who send unsolicited email to unsuspecting users asking them to "update" their account information. See New E-Scams & Warnings from Federal Bureau of Investigation (FBI). The email scam usually contains a link to a website (or telephone number given) that is controlled by the thief asking the user to submit personal information including email address, password, credit card number, and other relevant information. Once the information is obtained, the scam artist can then gain access to numerous online accounts since many Internet users frequently use the same user name, email address, password, and financial information at multiple web sites. (Advice from Amazon.com).

Email and Web Scams: How to Protect Yourself from Microsoft.

The sneakiest new shopping scams: Easy ways to avoid the biggest rip-offs online and in stores from Yahoo! Scams and Fraud from Royal Canadian Mounted Police. Stop Scammers from Targeting Your Teens by Elizabeth Rogers, Zoomer. Avoid the Latest Hotel Scam by Cynthia Ross Cravit, Zoomer.

Beware these three Facebook scams by Kim Komando, USA TODAY, Nov 30, 2015.

Beware of new Facebook 'Friend' request scam by Tim Hattrick, Komando.com, May 23, 2016.

23.    Be diligent in preventing identiy theft. Identity theft and identity fraud from Canadian Anti-Fraud Centre.

Identity Theft Is a Serious Crime - Resources from the U.S. Government. "Identity theft happens when someone steals your personal information and uses it without your permission. It's a serious crime that can wreak havoc with your finances, credit history, and reputation - and can take time, money, and patience to resolve." Be extremely cautious when entering contests online, request free brochures, free recipes, free quotes, respond to surveys, registering products online, etc. Never respond to unsolicited invitations or requests by providing them with your email address, your real name, date of birth, place of birth, social security number (social insurance number SIN in Canada), home address, telephone number, marital status, education level, place of employment, income, driver's license number, height and weight, ethnic or racial background, hobbies, and other pertinent information about you or that of your family members or friends.

Check out Trusted ID, A Chronology of Data Breaches for data breach alerts, and ZabaSearch.com or SearchSystems.net to see if detailed personal information about you is already accessible in thousands of free online public record databases by anyone at any time, with an option to obtain Background Checks on you.

What Is Phishing? Email Hoaxes and Scams. Phishing (short for password harvesting fishing) is an online scam that attempts to trick or threaten unsuspecting users into sharing private information that miscreants later use for identity theft. From Smart Computing - Tip of the Day.

Vishing - Voice phishing from Wikipedia, the free encyclopedia. "Voice phishing is the criminal practice of using social engineering over the telephone system to gain access to private personal and financial information from the public for the purpose of financial reward. Sometimes referred to as 'Vishing', the term is a combination of 'voice' and 'phishing.'"

DO NOT FALL for any email phishing for your ID and password or asking you to update your banking or credit card info. Remember that your bank or credit card companies NEVER send you unsolicited emails to ask you to update your personal info online. The following is a real phishing attempt with an authentic-looking email from eBay Inc <infos@eBay.erorr.com>, and another from eBay Billing <ebay.security@ebay.intl.com> complete with official eBay logo phishing for important personal information - Subject: eBay New Security Measure!

● - In order to receive uninterrupted service, please update this information.
● - To update your credit/debit card information:
● - Go to http://www.ebay.com/account/MyEbayLogin&verifyinfoID
● - Select My eBay and logon with your eBay User ID and Password
● - Select Use a credit card for automatic payments
● - Update your credit card information following instructions on the next page

Also, your Bank DOES NOT send e-mails:
- Asking you to provide, confirm or update your personal records.
- From a third party address or link to a third party site.
- Asking you to disclose your passwords, PIN#'s, or PVQs (Personal Verification Questions).
- Containing no information about why you are receiving an e-mail from your Bank.
- Requiring an urgent response from you.

If you provided personal banking information through a link in a phising e-mail, reset your Online Banking password immediately. If you visited the fraudulent site, clear your browser's cache, then close it and reopen it before accessing your Online Banking again.

See Online Banking Safety Tips from CIBC.

If you want to stop scammers and telemarketeers, the Canadian Radio-television and Telecommunications Commission (CRTC) "suggests you keep track of the following:
1. The telephone number at which you received the telemarketing call.
2. The telephone number and name of the telemarketer that appeared on the ID caller screen or that the person gave you over the phone.
3. The date of the call.
4. The exact time of the call as it appeared on the caller ID screen if you have this feature.
5. Whether the complaint relates to a fax, residential, or business number.
6. Any other information that you have about the call.
7. And then report any call you believe to be fraudulent to the Canadian Anti-Fraud Centre at 1-888-495-8501 or http://www.antifraudcentre.ca." ~ Above information comes from Carol In Your Corner: Scammers Never Rest by CARP.

How to Minimize Your Risk of Smartphone Hacking from Privacy Rights Clearinghouse, Posted June 24, 2016.

Identity Theft

The Wall Street Journal. Complete Identity Theft Guidebook: How to Protect Yourself from the Most Pervasive Crime in America (Wall Street Journal Identity Theft Guidebook: How to Protect)
The Wall Street Journal.
Complete
Identity Theft Guidebook:
How to Protect Yourself
from the Most Pervasive
Crime in America
The Identity Theft Protection Guide: *Safeguard Your Family *Protect Your Privacy *Recover a Stolen Identity by Amanda Welsh
The Identity Theft
Protection Guide:
*Safeguard Your Family
*Protect Your Privacy
*Recover a Stolen Identity
By Amanda Welsh
The Identity Theft Survival Kit: A Complete Guide for Restoring Your Credit and Your Peace of Mind (book, cassettes, & diskette) (Audio Cassette)
by Mari J. Frank
The Identity Theft
Survival Kit:
A Complete Guide for
Restoring Your Credit and
Your Peace of Mind
(book, cassettes & diskette)
By Mari J. Frank
Canadian Guide to Protecting Yourself from Identity Theft and Other Fraud by Graham McWaters and Gary L. Ford
Canadian Guide to
Protecting Yourself
from Identity Theft
and Other Fraud
By Graham McWaters
and Gary L. Ford

7 tips for staying safe on the web from Google. See also other safety related issues: Phishing, Malware, Secure sites, Safe networks, Mobile security, Check your Gmail account, Family safety, Shopping safety, Locking your screen, Passwords, and Google's security tools.
Google image of Burglar adapted from http://www.vcu.edu/police/index.html100 Ways to Prevent Identity Theft from Elite Personal Finance. Google image of Burglar adapted from http://www.vcu.edu/police/index.html Tips to Protect Yourself from Identity Theft from Ezinae Articles.
Escrow.com. Protects Online Buyers and Sellers from Fraud. For Buyers: Receive merchandise before the Seller is paid. For Sellers: Protect yourself from credit card and payment fraud.
Immediate Steps to Repair Identity Theft from Federal Trade Commission. FTC's Identity Theft Site: Deter-Detect-Defend Avoid ID Theft.
How to Spot Cashier's Check Fraud - Examples of Scams by Justin Pritchard, Banking/Loans Expert.
Beware of check fraud: Counterfeit cashier's check scams are alive and well. Consumer Reports, 7 March 2014.
Identity Theft Protection Quiz from TD Bank.
How to Protect Yourself from Identity Theft from Canada Post.
How to recognize phishing e-mails by Elinor Mills, News CNET.
A Phew Phishing Phacts. Blog - Datababe's Doodlings or Natterings of a Nerd.
Identity Theft and Identity Fraud from United States Department of Justice.
Identity Theft. Canadian Consumer Handbook.
Consumer Identity Theft Checklist from Government of Canada, Public Safety in Canada.
Identity Theft and Identity Fraud From Canadian Anti-Fraud Centre.
Fraud and Identity Theft - Fraud Victim Assistance Department (FVAD) at TransUnion. Learn how TransUnion can help you if you are a victim of fraud or read tips on how to avoid becoming a victim of fraud.
Internet Fraud, Common Fraud Scams, Internet Scams, Frauds Targeting Senior Citizens from Federal Bureau of Investigation (FBI).
Phishing Scams from Canadian Anti-Fraud Centre.
Protecting Yourself Against Identity Theft: Putting the Freeze on Identity Theft by Suze Orman
Top 4 scams identity thieves love. Video from Yahoo, 3:11 min.
Watch Your Identity: Tips for Reducing the Risk of Identity Theft from Consumer Measures Committee, Canada.

Identity Theft and Data Breaches - Fact Sheets: How to Reduce Your Risk of Identity Theft, Identity Theft: What to Do if It Happens to You, How to Deal with a Security Breach, Criminal Identity Theft: What to Do if It Happens to You, Identity Theft Monitoring Services.

The Internet Crime Complaint Center (IC3) is co-sponsored by the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). Filing a Complaint with the IC3. The IC3 accepts online Internet crime complaints from either the actual victim or from a third party to the complainant. Complaints filed via this web site are processed and may be referred to law enforcement/regulatory agencies for possible investigation.

Canadian Anti-Fraud Centre (CAFC) from Government of Canada. Recognize it. Report it. Stop it. (Formerly Project PhoneBusters). The CAFC is the central agency in Canada that collects information and criminal intelligence on mass marketing fraud (telemarketing), advance fee fraud letters (e.g. West African), internet fraud and I.D theft complaints. If you live in the Peel Region and you are a victim of a serious scam, you may wish to call the Peel Regional Police at 905-453-2121 or the Canadian Anti-Fraud Centre at 1-888-495-8501.

Don't Become a Target: Make Smart Choices to Protect Your Privacy from Privacy Rights Clearinghouse, Jan 27, 2014. Monitor your financial accounts, Credit cards are better than debit cards - Always, Watch out for fraudsters, Never give sensitive information out to anyone who calls you, Watch for fraudulent emails, Keep up with your credit reports.

In the U.S., you are entitled to one FREE credit report per year from each of the three credit bureaus. Best to order one report every four months from each bureau. Only do this through the official site: Annual Credit Report.com.

In Canada, your free credit report is called a "credit file disclosure" by Equifax Canada and a "consumer disclosure" by TransUnion Canada. It does not include your credit score. You can order your credit report FREE of charge once per year by mail, fax or telephone, and you must receive it by mail or in person. If you choose to access it online, you will have to pay a fee. Best to order one report every 6 months from each bureau. Equifax Canada phone: 1-800-465-7166. TransUnion Canada phone: 1-800-663-9980. Have required info handy when you call: SIN, credit card, DOB, house number, postal code, home phone, bank info, employer, etc. See How to order your credit report from Government of Canada.

24.    How can you tell if the email originates from a legitimate source? Check the HTML code to see where the link really goes and check the detailed headers to see where the email is coming from. If you are suspicious that the email address is not a real one and cannot be tracked, don't reply to that email, but go directly to the company's URL, then type in the company's good email address to send your reply. See Spoof (Fake) Emails Tutorial from eBay.

25.    Be sure the email address of your recipient is correct. If the user name is unknown, your email will not be delivered and you will receive an error message from the Mail Delivery System. If you have the wrong user name but it exists, you may be sending your email to a total stranger somewhere in cyberspace.

26.    Before rushing off an email composed in anger or frustration, send it to yourself first. If you still feel the same way in 24 hours and have no regrets, forward a gentler, modified version to your intended recipient.

27.    NEVER open an email attachment with the extension .exe .EXE (Executable file), or .jpg .JPG, .jpeg .JPEG (commonly used graphics file format) or .wmf .WMF (Windows Meta File) no matter how trusted the source without first scanning it with updated anti-virus and anti-spyware software. Don't go by what you see in the surface header because the usual, familiar-looking email address may be disguised and not be genuine. Be sure to check the detailed email headers to verify that the email originates from a legitimate source. Please note this word of caution from Brent Chivers: Spam and viruses routinely forge the sender address, so the true origin of a message is often not what the visible headers show.

(Received Nov 13, 2013) Info re: CryptoLocker. CyrptoLocker is a malicious program known as ransomware. This type of malware usually stops you from using your computer until you pay a certain amount of money (ransom).
The most common infection vectors for CryptoLocker are spear-phishing e-mails with malicious attachments. The attachment is usually a zip file containing a PDF file which, when opened, executes CryptoLocker.
An ounce of prevention is worth a pound of cure. Here are a few ways that you can protect yourself:
If you receive an unexpected e-mail containing a link you do one or all of the following:
a) Hover your mouse pointer over the link BUT DO NOT CLICK. Look at the address within the link. If it is not what you are expecting to see, don't click it!
b) Contact the sender to verify the validity of the email
c) DELETE IT!

28.    Never respond to email messages that ask you to dial a certain unknown phone number. Some area codes such as 473 or 900 could cost you a bundle.

29.    To avoid sending attachments that may contain viruses to friends, do not send a Web page link as an attachment, copy the URL and paste it into the text of your email.

30.    Don't subscribe to any email that you don't absolutely need. Often when you enter a contest to win something, you are not only giving away your name, address and phone number, you may be subscribing to newsletters and soliciting ads by giving away your email address to numerous other unknown businesses. You will likely be flooded with spam mail shortly after entering the contest.

31.    Unsubscribe (or block) all unwanted email subscriptions that you are currently receiving, but be wary of the sites from which you are unsubscribing. One trick is to ask you to unsubscribe by carefully entering your email address. Your correct and confirmed email address may then be sold or passed on to others without your permission or knowledge.

32.    Never click on any suspicious junk email out of curiosity as that will constitute a response, and a response is a confirmation to the sender that this is your correct email address. You are asking the sender to please spam you some more, and do sell this live, accurate and updated email address to someone else without your permission. Find out - How do spammers harvest email addresses? By Uri Raz.

        DO NOT respond to unsolicited email such as this: "Please forward this to everyone you know ..." for any reason. If you did, you will likely be adding email addresses of your friends and relatives to spammers, passing on any virus contained in links in the original email, as well as adding unnecessary clutter to the Internet.

33.    Use the BLOCK SENDER feature to stop annoying e-mail coming from sources that won't allow you to unsubscribe or e-mail addresses that do not really exist and you cannot get rid of.

34.    Use the FILTER feature to send unwanted in-coming email directly to TRASH and not to your INBOX. You may wish to open a Gmail account (free email from Google). You will get less spam as junk email is not sent directly to your INBOX with gmail.com. If you do get anything in the spam folder, gmail will tell you how many there are, and you can quickly delete all spam email messages without reading any of them by clicking on "Delete all spam messages now". Of course, you have an option to read or move them, or to "Delete Forever" as you wish.

35.    Do not mix the use of your good personal email account with the use of a junk email account. Guard your personal account by not giving your email address to just anyone. Open a free junk email account for use with the public, to register for access to Web sites, to participate in forums, to enter contests, to request coupons, to get free estimates, to ask questions or submit comments to banks or other institutions, to receive potentially useless, annoying, or obnoxious email, etc.

36.    Empty BULK mail and TRASH frequently if they are not automatically removed. All of the messages can be deleted easily by clicking FROM and DELETE without having to read any of them. Save anything you wish to keep in DRAFT or in your own created KEEP folder, and it will stay in that folder until you delete it.

37.    Add the following at the end of your email if you do not want your receiver (Addressee) to broadcast or forward your email to someone else without your written consent: (Note: There is no guarantee that the Addressee will honor your request).

Sample 1: This document and/or attachment contains confidential and/or privileged information. The rights to privilege have not been waived. Copyright is owned by I. Lee (enter your name or company name) without whose written permission, none of this document may be excerpted, reprinted, or forwarded to anyone.

Sample 2: This message is intended only for the use of the addressee and may contain information that is privileged and confidential. If you are not the intended recipient or have received this communication in error, you are hereby notified that any unauthorized use or disclosure is strictly prohibited. Please notify the sender immediately and delete the original without making a copy or disclosing its contents.

Sample 2 (in French, for bilingual Canadian users): Le présent message s'adresse exclusivement à son destinataire et peut contenir des renseignements privilégiés et confidentiels. Si vous n'êtes pas le destinataire de ce document ou si vous l'avez reçu par erreur, vous êtes par la présente avisé qu'il est strictement interdit de le divulguer ou de l'utiliser sans autorisation. Veuillez en avertir l'expéditeur immédiatement et détruire le message original sans le copier ou en révéler le contenu.

Sample 3: The information transmitted in this electronic message is confidential. It is intended for the exclusive use of the person to whom it is addressed and may not otherwise be read, distributed, copied or disclosed.

Sample 4: Confidentiality Note: This message is intended only for the use of the named recipient(s) and may contain confidential and/or proprietary information. If you are not the intended recipient, please contact the sender and delete this message. Any unauthorized use of the information contained in this message is prohibited.

38.    Always print, or save on disk or hard drive, a copy of important email you have received or have sent to someone.

39.    When you send email messages using To: and Cc: (Carbon Copy) the names or email addresses will be visible to all recipients. If you use Bcc: (Blind Carbon Copy) the names or email addresses of the recipients will not be visible to either the To: or the Cc: recipients. If you want a record of the people to whom you have sent a Bcc: message, you will need to save or print the DRAFT before you hit SEND. Even if there are several people on your Bcc: list, each person can only view one name, the recipient himself or herself whose email address the message was sent to. The To: and Cc: names, however, remain visible to all.

40.    Bcc: is a very private way to send email messages.  When you use Bcc: it will not allow that recipient to further forward other email addresses onto someone else since other Bcc: email addresses are not visible to the recipient.

41.    When forwarding an email message to someone, remove the original sender's email address unless it is the wish of the original sender that you forward his or her email address to your recipient along with the message.

42.    Don't add unnecessary clutter to the Internet by forwarding chain letters to show that you are a caring and loving person, or to bring luck to yourself and to 5, 10, 20 or more other people by email.

43.    Don't send free eCards accompanied with music, sentimental or spiritual messages, animated cartoons and the like to your friends and relatives as all their email addresses as well as yours may become readily available for sale to third parties without your knowledge or consent. Don't be surprised that you and your friends suddenly receive tons of spam mail shortly after sending or picking up an e-card.

44.    Spam is unsolicited commercial email that has become an extremely serious problem on the Internet. Learn about the new Canada's Anti-Spam Legislation effective July 1, 2014. "Canada's anti-spam legislation (CASL) is in place to protect Canadians while ensuring that businesses can continue to compete in the global marketplace. IF YOU USE ELECTRONIC CHANNELS TO PROMOTE OR MARKET YOUR ORGANIZATION, PRODUCTS OR SERVICES, CANADA'S NEW ANTI-SPAM LAW MAY AFFECT YOU. It is your duty to understand and comply with the law ... Fact: There are no automatic penalties. The CRTC has a range of enforcement tools available, from warnings to penalties (up to $1 million for individuals and $10 million for businesses)." See also Spam in the Virtual Library for more info and free downloads of anti-spam software.

45.    Learn to search effectively online as information on the WWW is not systematically organized.

46.    Set a time or item limit for research and try sticking to it.

47.    If you have a task to perform, don't allow cyber ads to distract you, stay focused on your task.

48.    Do not become overly addicted to the Internet and ignore your loved ones in the process.

49.    Bookmark your favorite sites.

50.    Immediately print or save information that you find useful, for you may never see the same site again.

51.    Make backups of all data that you don't want to lose.

52.    Keep important CDs, DVDs, boot disks, rescue disks, tape backups, etc. readily available for emergency use.

53.    If your system is terribly fouled up, and you don't have a program that would sweep it clean and fix it for you, you may need to take the drastic step to format your entire hard drive and reinstall everything from scratch. Check out Tools for Webmasters for useful clean-up or fix-it tools, but use such software cautiously so as not to throw out the baby with the bath water by wiping out needed files along with the junk.

54.    Never delete important system files that you have no clue as to what they are being used for.

55.    Always use UNINSTALL instead of DELETE to get rid of unwanted programs if you have an option.

56.    To UNINSTALL or remove a program you don't want, go to Start - Settings - Control Panel. Click on Programs and Features and choose Uninstall a Program. Select a program from the list, then click "Uninstall". Depending on the operating system you use, the commands may be slightly different.

57.    Clean out the cache or close and exit the program after banking online, especially if you are using public computers. Do delete useless files and email messages regularly at your own computer.

58.    Every now and then CLEAN OUT all your cookies to eliminate offensive email or unwanted ads. The procedure to wipe out cookies may vary with different browsers. If using Internet Explorer, click on Tools, select Internet Options. Under Temporary Internet files, click on Delete Cookies box, click OK to Delete all cookies in the Temporary Internet Files folder. The cookies that you need and want will come back when you access those sites the next time.

59.    Be watchful of spyware residing in your computer often without your knowledge or consent. Such software violates your privacy, continuously uses memory on your computer when you are surfing, and adds to more clutter on the WWW.  Spyware is generally used to track or trace all your Internet usage in detail and the information thus gathered is sent to the software developer. Such information may be sold to third parties or used for other purposes not to your liking.

60.    It is a good idea to install a reputable spyware detection and removal program on your computer. You can download for free a copy of AVG Free Anti-Virus - Free antivirus and anti-spyware, HouseCall from Trend Micro, a free online virus and spyware scanner, Spybot Search & Destroy, Ad-Aware, Spyware Blaster, or SUPERAntiSpyware. The purpose of anti-spyware software is to scan your computer system to detect any software components that you don't want or are not aware of their existence on your system, and to provide you with an option to remove these hidden cookies. See Security & Spyware for more free downloads of Spyware Removal programs.

61.    Check out Safety on the Internet from The Police Notebook, and Awareness and Prevention and Free Tools, Apps, and Trials from TrendMicro. Trend Micro offers a range of free tools to protect your devices and help you manage your online activity.

62.    Be wary of using P2P Peer-to-Peer software. Info from Wikipedia, the free encyclopedia. Take note of Copyright Infringement Liability, Data Security, Spyware, Viruses, and other associated problems.

63.    Health comes first. Be kind to your body and make sure that it gets the proper exercise, nutrition, and rest that it deserves.

64.    At the first sign of eyestrain, fatigue, cramps, hunger or thirst - QUIT, or check out the following sites for consequences:

How to Survive the Internet by Janet Williams, Seattle.
Internet addiction disorder from Wikipedia, the free encyclopedia. "Internet addiction disorder (IAD) is now more commonly called problematic internet use (PIU) or compulsive internet use (CIU). Other overlapping terms include internet overuse, problematic computer use or pathological computer use - and even iDisorder. These terms avoid the word addiction and are not limited to any single cause, but only reflect a general statement about excessive computer use that interferes with daily life."
Internet Addiction Test (IAT) - A test for online users to determine if you may be addicted to the Internet.
Center for Internet Addiction Recovery.
Internet Addiction from BBC.co.uk.
Internet Addiction: The Emergence of a New Clinical Disorder - in PDF, 13 pages by Kimberly S. Young, University of Pittsburg, at Bradford.
Internet Addiction: Symptoms, Evaluation, and Treatment - in PDF, 17 pages by Kimberly S. Young.


Here's a bit of fun music to brighten up the day:
Dedodedo.wav (Hamster dance)

HOME     VIRTUAL LIBRARY     PREVIOUS     NEXT