10 Tips to Stay Safe and Secure Online

The Internet can be a dangerous place.

While you're enjoying the convenience of online shopping, Internet banking and subscription websites, nasty people lurk around every corner.

Hackers, fraudsters, identity thieves and many others would love to get hold of your personal details.

And what stands between you and a security disaster?

Your password.

Just 8 little characters long, it's your last line of defense online. Here are 10 tips for choosing and using bullet-proof passwords that will protect you from harm:

Tip 1 - Avoid the obvious

Passwords based on personal details are too easy to guess. Avoid using names, places, favorite sports teams, or "password".

Tip 2 - Make it non-dictionary

One option a thief might try to crack your password is a brute-force dictionary attack. Choose something that you won't find in any dictionary.

Tip 3 - Use the full 8 characters

The more characters a password contains the more secure it becomes, so fill that password field to the max.

Tip 4 - Mix the case

Deter thieves further by using a combination of upper and lower-case letters. A mIXeD cAsE password adds another layer of protection and is ever harder to guess.

Tip 5 - Include non-alphabetic characters

Adding numbers and non-alphabetic characters (like a hyphen) to your password makes it less likely to be cracked than something purely alphabetic.

Tip 6 - Don't write it down

This should be obvious but it's amazing how many scraps of paper surround the world's PCs.

Tip 7 - Assign a different password to each login id

If thieves get hold of your password, they'll try it in every online system available. Use a separate password at each website and you won't have all your eggs in one basket.

Tip 8 - Employ a password manager

Remembering multiple secure passwords can be challenging. Specialist software like http://www.robo-form.com manages your passwords securely and automates the login process.

Tip 9 - Logout when you're done

Always hit the logout button when you've finished using a secure site like online banking.

Tip 10 - Close that browser

Web pages and passwords can be cached in the browser, so close down your browser window for added security.

Follow these simple common-sense tips and you'll enjoy greater online security while benefiting from the many advantages the Internet has brought.

About The Author

Steve Robson is a successful technical author and contributor to 'How To Buy A Laptop.com' - the definitive online guide for buying a laptop computer. Check out: http://www.robo-form.com

house refresh service Morton Grove ..
In The News:

Carnegie Mellon's noninvasive brain technology allows users to move robotic fingers by thinking about the motion, offering new possibilities for people with motor impairments.
Multi-factor authentication (MFA) adds an extra layer of protection to your accounts. Instead of relying only on a password, MFA requires you to verify your identity using two or more methods.
Scientists from Duke, Harvard, and the University of Otago have unveiled a game-changing tool called DunedinPACNI. It uses a single AI brain scan to reveal how fast a person is biologically aging.
A disturbing wave of fake agent phone scams is sweeping across the United States, catching people off guard and draining their savings.
Emojis aren't just playful add-ons; they're powerful tools for building stronger connections in our increasingly digital world.
Google has taken a major step toward the future of clean energy by partnering with Commonwealth Fusion Systems (CFS), an MIT spin-out working to build one of the world’s first commercial fusion reactors.
If you create and share art online, you might have seen messages warning that Facebook's parent company, Meta, claims the right to use or even sell anything you post, whether it's pictures, poems, or artwork.
Cybercriminals hit Qantas in a major data breach that exposed information from up to six million customers.
Having reliable, loud, and timely emergency alerts on your phone or device is important because when severe weather strikes, every second counts.
Here's how your daily brew is becoming the foundation for greener buildings.
Artificial intelligence (AI) and large language models (LLMs), such as ChatGPT, are transforming how we learn. But what does this mean for AI and learning retention?
Modern AI data centers use much more electricity than traditional cloud servers. In many cases, the existing power grid cannot keep up. One innovative solution is gaining traction: repurposed EV batteries for AI data centers.
Microsoft 365 and Outlook users are being targeted by a tactic that injects fake billing alerts directly into their calendars.
Researchers are now showing us that old smartphones as data centers could be the next big thing in sustainable tech.
Scientists have created micro-robots for sinus infection treatment that can enter the nasal cavity, eliminate bacteria directly at the source, and exit without harming surrounding tissue.
Let's examine how your data is collected in everyday life, who is buying and selling it, what happens to it afterward, and, most importantly, what you can do to protect yourself.
Researchers at the University of Sheffield in the U.K. developed small robots called "Pipebots" that can travel inside water pipes to find and potentially repair leaks, all without any excavation.
A groundbreaking new study has uncovered disturbing AI blackmail behavior that many people are unaware of yet.
Four teams of autonomous humanoid robots competed in China's first AI soccer tournament, demonstrating advanced capabilities in ball detection and independent decision-making.
The ID. Buzz autonomous van features self-driving technology with 13 cameras, nine LiDAR units and five radars after Volkswagen partnered with Hamburg and Uber for 2026 deployments.
Social Security phishing scams use urgency and impersonation to steal personal data. Learn how to spot fake SSA emails and implement 10 protective measures.
French startup Pazzi Robotics created an AI-powered pizza robot that made pies in under five minutes without human help, but it closed in 2022 despite patents and expert partnerships.
Reclaim your time from big tech with effective screen time reduction strategies for iPhone and Android, featuring steps to limit app usage and create phone-free zones.
Amazon Prime Day shoppers face threats from 120,000-plus scam websites as cybercriminals prepare phishing traps and malware ahead of the July sales event.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

10 Time Saving Keyboard Shortcuts

Time is money. And when you constantly have to divide... Read More

What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?

Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

Is Desktop Search Deserving?

Google, in their march to stay ahead of the pack... Read More

Printing Multiple Copies of Photos

I do a holiday letter every year and send them... Read More

A Beginners Guide to Avoiding Viruses

"Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

Flow Text Around a Graphic in Microsoft Word

Flow Text Around a GraphicQuestion: I have inserted a photo... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

Maintain Your Computer ? Keep Your Business Running

Maintaining your computer is extremely important ? especially if you... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

Basic Diagnosis Guidelines for Your PC

Simone is exasperated. She has to work on her university... Read More

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

Spyware Remover

Your first step in removing dangerous infections from your computer... Read More

Learning To Navigate Ciscos Online Documentation

When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More

Plasma TV vs LCD TV

For those seeking to buy their first flat panel TV... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

How To Have Two (Multiple) Copies Of Windows

Having two operating systems is not as difficult as many... Read More

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part... Read More

Be Your Own IT Department

If you use a computer, you need to know more... Read More

Classification of Computers

Computers are available in different shapes, sizes and weights, due... Read More

cleaning service near Mundelein ..