• الصفحة الرئيسية
  • إتصل بنا
  • سياسة الخصوصية
Logo
  • الرئيسية
  • أفكار
  • صحة
  • معلومات
  • عجائب وغرائب
  • تكنولوجيا
الصفحة الرئيسية Social Networking Sites Top 10 Tips For Secure Use Of Social Networking Sites

Top 10 Tips For Secure Use Of Social Networking Sites

الكاتب ahmed في 10:32 PM Social Networking Sites

Secure Use Of Social Networking Sites
Today Social Networking Sites made most of the internet users easier to connect with their friends, connect to the new friends and share their views, knowledge, photos, videos and many more to their friends. With increasing the uses of those sites, also increasing the risk and crimes related to that. They are also increasingly popular place for cyber crimes to trick people into divulging information or downloading software into their computers for any one purpose. While using those sites, you should know about how to use them securely and also needs to teach other younger persons and your children's. I have listed here top 10 tips for how to use those social networking sites securely. 


1. While registering on the Social Networking Sites, it will be better to use your nick name for the user name which publicly displays, instead of your real name. 

2. It is better to set your profile private, which makes your profile visible only to your friends. 

3. It is be best if not to share your address, phone number or other personal information online. Do not share your actual location or do not share where you plan to go. 

4. Post only after thinking twice about what you are going to post. Once you have post on public, you cannot control that from being visiting that. 

5. Be careful while meeting new people for friendship, some people may want to get something from you. They may use your collected information for threatening. 

6. Think carefully about how to respond others. If someone say or does something that makes you uncomfortable, block them, don't respond and report them to the administrator. 

7. Keep your antivirus software up to date to protect your computer from cyber criminals and to protect from virus infection. 

8. Go to online regularly to check what people are sharing to you. If they are posting offensive content, delete them immediately, block them and report them to the administrator. 

9. Make sure that your password is long, complex and combines, letters, numbers, and symbols. You should use a different password for every online account you have. 

10. Be aware about messages you receive on social networking sites that contain links. Even links that look they come from friends can sometimes contain malware or attempts to collect personal information by log on user and password. If you are suspicious, don't click contact your friend or the business to verify the validity. 

By implementing the tips which are given above, you may be more secure from cyber criminal activities or you can protect your computer from being affected by the different types of viruses. If you have any comment about these tips and if you know any others tips, you can post that on comment session.

You may also wanted to view the following related posts

  • What Are The Main Risks Of Using Social Networking Sites?
  • What are the technical limitations of twitter accounts?
  • How to prevent your twitter account from being suspended?
  • The list of social bookmarking sites
  • List of Top Social Exchange sites
  • Top 12 things needs to know by the Facebook user
  • Most Important Tips for Search Engine Optimization (SEO)
  • List of top 7 Free bulk search engine submission tools
  • List of bad ways for building backlinks
  • List of good ways of building quality backlinks
  • List of top .edu forums or sites to create quality backlinks
شارك المقال :
Tweet
✚

مقالات ذات صلة

التالي
المشاركةالتالية
السابق
المشاركة السابقة

تحويل كودإخفاء محول الأكواد الإبتساماتإخفاء

شكرا لمشاركتنا رأيك
Subscribe to: Post Comments (Atom)
  • Facebook
  • twitter
  • googleplus
  • youtube
  • linkedin

الأكثر زيارة

  • What is Information ?
    Information  can be defined as data that has been processed into a form that is meaningful to the recipient and is of real or perceived valu...
  • What is Information Technology?
    Definitions of  Information technology  ( IT ) It is a branch of engineering dealing with the use of computers and telecommunications equipm...
  • بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017
    بالصور الفائزة بمسابقة ملكة جمال مصر 2017 لن تصدق من هي فرح صدقي ↓↓  لمشاهدة الصور والخبر كامل اضغط هنا  ↓↓ رابط المو...
  • Interview Questions on Stack and Queue in Data Structure set-2
    1) The queue in which the insertion takes place in the first position after of last element is a ...... A. priority B. dequeue C. circular D...
  • List of Top 65 Search Engine Submission Add URLs.
    List of Top 65 Search Engine Submission Add URLs.
    To get your site on the top ranking on the search engine results, Your site or URL must be indexed by Search Engines. For that you have to s...
  • List of Best Keyword Research Tools for Better SEO
    List of Best Keyword Research Tools for Better SEO
    Everyone needs to do keyword research work for the site before starting search engine optimization work as the first and most essential tas...
  • What are the different types of scheduling methods?
    Process scheduling is one way for a processor to handle n processes , by scheduling the execution process. Each process is executed one by ...
  • Solved MCQ on Database Backup and Recovery in DBMS set-1
    1) Which of the following is not a recovery technique? A. Deferred update B. Immediate update C. Two-phase commit D. Recovery management 2)C...
  • Solved MCQ on Distributed Database Transaction Management set-4
    1) Commit and rollback are related to .......... A. data integrity B. data consistency C. data sharing D. data security 2) The transaction w...
  • Solved MCQ on Fundamental of DBMS set-10
    1) Which of the following is not a characteristic of a relational database model? A. Table B. Tree like structure C. Complex logical relatio...

الأقسام

  • Artificial Intelligence(AI)
  • Backlinking
  • Basic IT
  • Best List
  • Blogging Tips
  • C
  • C#
  • C++
  • Computer Architecture
  • Computer Fundamental
  • Computer Security
  • Computer/IT Officer Exam
  • CSS
  • Data Mining and Warehousing
  • Data Recovery Tools
  • Data Structure
  • Database Management System
  • E-commerce
  • E-government
  • Internet & Web Designing
  • IT Law
  • IT Tips and Tricks
  • IT Tutorials
  • Java
  • JavaScript
  • Keyword Research Tools
  • MIS
  • Multiple Choice Question (MCQ)
  • Networking
  • Online Earning
  • Online IT Jobs
  • Operating System
  • Oracle Forms and Reports
  • Programming Guide
  • Programming Language
  • SEO
  • Social Networking Sites
  • Software Download
  • Software Engineering
  • System Analysis and Design
  • Top List
  • VB.Net
  • صحة
  • عجائب وغرائب

الأرشيف

  • ►  2017 (4)
    • ►  November (3)
    • ►  October (1)
  • ►  2016 (5)
    • ►  April (5)
  • ►  2015 (87)
    • ►  August (1)
    • ►  July (8)
    • ►  June (13)
    • ►  May (2)
    • ►  April (2)
    • ►  March (4)
    • ►  February (20)
    • ►  January (37)
  • ►  2014 (77)
    • ►  December (31)
    • ►  November (4)
    • ►  September (4)
    • ►  August (11)
    • ►  July (8)
    • ►  June (2)
    • ►  May (2)
    • ►  April (2)
    • ►  March (2)
    • ►  February (7)
    • ►  January (4)
  • ▼  2013 (132)
    • ►  December (11)
    • ►  November (6)
    • ►  October (4)
    • ►  September (6)
    • ►  August (16)
    • ►  July (9)
    • ►  June (9)
    • ►  May (12)
    • ▼  April (13)
      • Top 10 Secrets for Search Engine Optimization (SEO...
      • List of Best Keyword Research Tools for Better SEO
      • How To Claim Your Blog On Technorati?
      • Top 20+ Lists of Blog Search Sites and Directories
      • Top 7 List of High Paying File Sharing Sites
      • How to write a program in C using for Loop?
      • Top 10 List Of Stock Photography Sites To Earn Online
      • How to earn online through stock photography sites?
      • Top 10 Tips For Secure Use Of Social Networking Sites
      • What Are The Main Risks Of Using Social Networking...
      • How To Improve Your Blog Post Content For Better SEO?
      • Most Important Tips for Search Engine Optimization...
      • List of Top 65 Search Engine Submission Add URLs.
    • ►  March (23)
    • ►  February (6)
    • ►  January (17)
  • ►  2012 (59)
    • ►  December (15)
    • ►  November (20)
    • ►  October (21)
    • ►  September (3)

إنضم لنا

© 2017 أفكار جميع الحقوق محفوظة