Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project
|
|
- Blanche Sharp
- 7 years ago
- Views:
Transcription
1 HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project
2 Logging on is now one of the first things we do every day. And every time we do, we leave a trace, often without giving a thought to the information left in our trail. In most cases, we are unaware that someone, somewhere is taking our information, processing it, and using it. For example, you browse online for a product. Two days later, you visit a completely different website, and an advert pops up for the product you were searching for two days ago. How is this possible? Websites have developed new ways to identify their users, and behavioural marketing firms are coming up with new ways to use that data. In order to track the online footprint of the typical online user, MWR InfoSecurity and the Data Baby project are looking at the digital activity of Rebecca Taylor, a 27 year old Londoner who likes travelling, photography, music, fashion and uses all popular social networks. However, Rebecca does not exist. In reality, she is a laptop controlled by a team of journalists and guided by the personality type they have mapped out. She is the Data Baby project - a virtual identity of which every trace can be tracked and forensically analysed. Periodically, the Rebecca laptop is sent to MWR InfoSecurity, who analyse the information it has sent and received. A picture is building up of where the Data Baby s information is going, who is processing it, and how that is affecting Rebecca s online experience. Any data posted or sent online can in theory be accessed forever, and when MWR InfoSecurity and the Data Baby team analysed Rebecca s online activities after just a few months of virtual life, they found out that it was possible to determine what she likes, where she is, who her friends are and who she s. mwrinfosecurity.com 2/5
3 After the Prism / NSA scandal put online privacy back in the headlines, MWR InfoSecurity and the Data Baby project has compiled a series of hints and tips to help you browse privately and protect your identity. Protect your location Dongles/Mobile Devices Social Networks Wireless Networks Photos Protect your preferences Protect your personal information in Social Media Protect your identity Protect your friends Protect your personal documents Disable Location Services Turn off the where I am functionality Disable the GeoTagging functionality Make browser history private Do not use third party apps Turn off facial recognition software Hide your list of friends Encrypt your data stored in the cloud Protect your location - A proxy server requests information from another server on behalf of the users; it basically acts as the middleman. For example, we would send the data to the proxy, the proxy would connect to Facebook and send us the information back. In this way, Facebook will think that our IP* address is the IP belonging to the proxy. There are different third party options that can be used to connect through a proxy server: Virtual Private Network: You can use a third party such as to anonymously encrypt your internet activity from snooping eyes. However, you would still need to trust the third party not to track your connections. Website based proxies: Sites such as can provide you with software or web-based functionalities that use proxies around the world to provide you with anonymous access to web sites. Stand alone proxy servers: Configure your browser to route traffic through a proxy in the Internet, using one of the following types: Anonymous proxy: It will hide your IP address Distorting Proxy: It hides your IP by placing an incorrect IP address in the HTTP headers. High Anonymity Proxy: It will hide your IP address and it will not identify itself as a proxy making even more difficult to track. If you use any of the options above you will have to trust that the third party providing the service will not collect any tracking information. * An IP address is the numerical label assigned to each device (e.g., computer, printer) that is connected to a computer network that uses the Internet Protocol for communication. mwrinfosecurity.com 3/5
4 A solution for this is to use networks such as Tor ( which will prevent websites from tracking your physical location or what websites you have visited. Tor uses several proxy servers and works in a way that every proxy in the path will know just the addresses of the previous and the next proxy, therefore protecting and hiding what you send to where. Dongles/Mobile Devices Disable Location Services Using a dongle or a mobile device could expose your exact location if you allow the device to share location information. For example, when accessing Facebook with GPS turned on, the device will know your whereabouts. Social Networks Turn off the where I am functionality Social networks often offer a where I am functionality that will show your location when posting something. The best way of avoiding this is to go to your profile settings and remove this feature if possible. The best option to avoid this kind of data to be included in your photos is to turn off the GeoTagging functionality or, alternatively, when using social media sites you can remove the metadata before uploading a photo. Sites such as Facebook, Instagram, Flickr and Twitter remove it automatically but, for example, Google+ does not. However, software such as BatchPurifier can be used for this. Protect your preferences Make browser history private You can turn on the private or incognito mode available in most browsers which will delete cookies sent by websites and all other tracking info when closing the browser. Even though pages will still be able to analyse your behaviour while browsing, the information from previous sessions will be removed from your browser. Protect your personal information in Social Media Do not use third party apps and set your profile to private Each application will ask for certain permissions when you install them such as accessing your profile, your friend list or your posts and pictures. Some apps can even access your information when you are not using them once you have installed them in your profile. Make sure to restrict access to your personal information, your profile and if possible, avoid using third party applications. Wireless Networks Wireless networks will not help in avoiding tracking. In fact, on some occasions the position of wireless access will be known, including street address. To avoid being tracked in a Wi-Fi network you can use Tor or any of the options proxy server options available. Photos Disable the GeoTagging functionality Some advanced cameras and smartphones, including the iphone, will include metadata in the digital photo file, which is information such as copyright, contact information or details of the camera used. The metadata in the pictures may include as well the GPS position where the photo was taken, which is a feature called GeoTagging. mwrinfosecurity.com 4/5
5 Protect your identity Turn off facial recognition software Facebook s facial recognition software automatically identifies the faces of friends in uploaded photos, which would mean that the company is able to identify what you look like. It has been banned under EU law, but Facebook said it hopes to reintroduce it in the future. To turn it off simply do the following: 1. Click at the top right of any Facebook page and choose Account Settings 2. Click Timeline and Tagging from the left-hand column 3. Under the How can I manage tags people add and tagging suggestions? section, click Who sees tag suggestions when photos that look like you are uploaded? 4. Select your preference from the dropdown menu You can also add to this by turning on the feature in which you have to accept a tag before it is posted in your timeline. Protect your friends Hide your list of friends In your Facebook profile anyone can have access to your list of friends and see who you are connected with. To hide this simply go to your timeline profile, look where your list of friends is, put the mouse over it and a pencil like icon will appear, click on it and select edit privacy. There you can select there who is allowed see your friend list. Protect your personal documents Encrypt your data stored in the cloud If you are going to save your documents somewhere out of your control, for example icloud or Dropbox, then you should consider protecting them with encryption. There are different ways to do this, with each offering a different level of protection. A simple way would be to use software such as Microsoft Office to add a password to your most sensitive documents or to zip your files and protect them with a password. There are other options available for more technically aware users, including software such as Pretty Good Privacy (PGP) or GNU Privacy Guard (GnuPG). This software can offer an extra level of privacy for your files but always consider that if you lose the password or the key to your files, you may not be able to get them back. mwrinfosecurity.com 5/5
User Guide FOR TOSHIBA STORAGE PLACE
User Guide FOR TOSHIBA STORAGE PLACE (This page left blank for 2-sided "book" printing.) Table of Contents Overview... 5 System Requirements... 5 Storage Place Interfaces... 5 Getting Started... 6 Using
More informationFacebook Smart Card FB 121211_1800
Facebook Smart Card FB 121211_1800 Social Networks - Do s and Don ts Only establish and maintain connections with people you know and trust. Review your connections often. Assume that ANYONE can see any
More informationNeat Cloud Service + Mobile App
Getting Started with Neat Cloud Service + Mobile App Neat transforms paper and electronic documents into organized digital files that are easy to find, use, and share. Neat Cloud Service and Mobile App
More informationFoxit MobilePDF for ios Quick Guide
for ios 1 Contents Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 7 Chapter 4 Viewing PDF Files... 8 Chapter 5 Annotation... 13 Chapter 6 Signatures... 18 Chapter 7 Text
More informationcbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL
cbox YOUR FILES GO MOBILE! FOR ANDROID SMARTPHONES AND TABLETS USER MANUAL Introduction cbox is a software that you can easily install on your computer. Once done, an online storage drive cbox appears
More informationPractical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR
Practical Demonstration of Using the Internet Cloud for Backup USING SKY DRIVE, DROP BOX, SUGARSYNC OR GLADINET Internet Traffic Beware if your ISP has a cap on the maximum downloads in your monthly agreement
More informationReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
More informationLast modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216
Last modified: November 22, 2013 This manual was updated for the TeamDrive Android client version 3.0.216 2013 TeamDrive Systems GmbH Page 1 Table of Contents 1 Starting TeamDrive for Android for the First
More informationLeonardo Hotels Group Page 1
Privacy Policy The Leonardo Hotels Group, represented by Sunflower Management GmbH & Co.KG, respects the right to privacy of every individual who access and navigate our website. Leonardo Hotels takes
More information91.527 - Human Computer Interaction Final Project Tutorial. Hardware Inventory Management System (HIMS) By M. Michael Nourai
91.527 - Human Computer Interaction Final Project Tutorial Hardware Inventory Management System (HIMS) By Table of Contents Introduction... 3 Running HIMS... 3 Successful Login to HIMS... 4 HIMS Main Screen...
More informationLEARNING RESOURCE CENTRE. Guide to Microsoft Office Online and One Drive
LEARNING RESOURCE CENTRE Guide to Microsoft Office Online and One Drive LEARNING RESOURCE CENTRE JULY 2015 Table of Contents Microsoft Office Online... 3 How to create folders... 6 How to change the document
More informationCreating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
More informationEucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
More informationWeb Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW
Web Connect Guide HL-L9200CDW HL-L9200CDWT DCP-L8400CDN MFC-L8600CDW MFC-L8850CDW MFC-L9550CDW Before You Use Your Brother Machine Applicable Models Definitions of Notes Trademarks Important Note Applicable
More informationHiding Tracks on the Net
Hiding Tracks on the Net Ways one might hide their tracks Private Browsing Anonymizers & Proxy Servers SSL / TLS Passwords False Information Public Networks Email Services Encryption Firewalls Private
More informationICONICS Using the Azure Cloud Connector
Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server
More informationApp Operating Instructions Manual ES File Explorer
App Operating Instructions Manual ES File Explorer 2013/5 ES File Explorer (for Android only) In addition to managing local / shared / FTP / and Bluetooth file folders, you can also directly manage a variety
More informationCRESTRON-APP-ANDROID Control App for Android
1 Introduction The app from Crestron provides a Smart Graphics touch screen user interface on Android devices. Fully integrated with Crestron programming software including Crestron Studio, VT Pro-e, and
More informationalison@libraryfreedomproject.org
PRIVACY TOOLKIT FOR LIBRARIANS alison@libraryfreedomproject.org libraryfreedomproject.org/resources/privacy-toolkit-for-librarians/ THREAT MODELING assets adversaries capabilities consequences how much
More informationPrivacy Policy Version 1.0, 1 st of May 2016
Privacy Policy Version 1.0, 1 st of May 2016 THIS PRIVACY POLICY APPLIES TO PERSONAL INFORMATION COLLECTED BY GOCIETY SOLUTIONS FROM USERS OF THE GOCIETY SOLUTIONS APPLICATIONS (GoLivePhone and GoLiveAssist)
More information1- Using Bonafeyed as a guest
User Manual 1- Using Bonafeyed as a guest 2- Registering 3- Signing in 4- Browsing Facebook through Bonafeyed 5- Encrypting posts, comments and messages while browsing Facebook 6- Sending/receiving encrypted
More informationIntroduction to Cloud Storage GOOGLE DRIVE
Introduction to Cloud Storage What is Cloud Storage? Cloud computing is one method to store and access data over the internet instead of using a physical hard drive (e.g. computer s hard drive, flash drive,
More informationPaperStream Connect. Setup Guide. Version 1.0.0.0. Copyright Fujitsu
PaperStream Connect Setup Guide Version 1.0.0.0 Copyright Fujitsu 2014 Contents Introduction to PaperStream Connect... 2 Setting up PaperStream Capture to Release to Cloud Services... 3 Selecting a Cloud
More informationASUS WebStorage Client-based for Windows [Advanced] User Manual
ASUS WebStorage Client-based for Windows [Advanced] User Manual 1 Welcome to ASUS WebStorage, your personal cloud space Our function panel will help you better understand ASUS WebStorage services. The
More informationFoxit MobilePDF Business for ios Quick Guide
for ios 1 Contents Foxit MobilePDF Business Chapter 1 Description... 3 Chapter 2 Main Menu... 5 Chapter 3 File Management... 6 Chapter 4 Viewing PDF Files... 7 Chapter 5 Annotation... 11 Chapter 6 Signatures...
More informationXerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android
Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link is a personal productivity app that connects your mobile phone and tablet to a Xerox Multifunction Printer (MFP). You
More informationFrequently Asked Questions for logging in to Online Banking
Frequently Asked Questions for logging in to Online Banking Why don t I recognize any of the phone numbers on the Secure Code page? I can t remember my password; can I reset it myself? I know I have the
More informationCanvio Home FAQ. is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
What is a Canvio Home device? Canvio Home is a Network-Attached Storage device that is designed to be very easy to install and use to back up, share, and remotely access the files from your computers.
More informationEgnyte for Power and Standard Users. User Guide
Egnyte for Power and Standard Users User Guide Egnyte Inc. 1350 West Middlefield Road. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) Revised June 2015 Table of Contents Chapter 1: Getting
More informationABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES
CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML
More informationINTRODUCTION TO CLOUD STORAGE
University of North Carolina at Chapel Hill Libraries Carrboro Cybrary Chapel Hill Public Library Durham County Public Library INTRODUCTION TO CLOUD STORAGE GETTING STARTED PAGE 02 Class Overview What
More informationGadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual
GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile
More informationNAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS
NAVY COMMAND PRINCIPAL SECURITY ADVISOR RECOMMENDED FACEBOOK SECURITY SETTINGS NC PSyA Recommended Facebook Settings - October 2014 1 Introduction 3 Privacy Shortcuts 3 Privacy Settings and Tools 6 General
More informationEnd User Manual. SharePoint. Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk
SharePoint End User Manual Please send feedback or suggestions for updates to the following email address IT.Training@lse.ac.uk London School of Economics & Political Science 1 02/12/2014/lse.ac.uk/IMT/training
More informationHow to use the Cloud
How to use the Cloud Intro You may have heard advertisements, articles, or tech savvy people talk about the cloud and didn t know what that meant. Have no fear, we re here to teach you. Sometimes the cloud
More informationCisco Events Mobile Application
Welcome to the new free Cisco Events mobile application! Using this tool, participants can: Connect with peers and Cisco representatives attending an event virtually or onsite Earn points towards exclusive
More informationA Guide to Mobile Security For Citizen Journalists
A Guide to Mobile Security For Citizen Journalists Your Citizen journalism, and with it the rise of alternative media voices, is one of the most exciting possibilities for mobile phones in activism. Mobile
More informationBlogging. Wordpress.com Weebly.com Penzu.com Blog.com Wix.com Blogger
Blogging What is Blogging? A Blog is a website containing a writer's or group of writers' own experiences, observations, opinions, etc., and often having images and links to other websites. Blog is short
More informationCRESTRON-APP/CRESTRON-APP-PAD
1 3 Introduction The free version of the app has limitations on the size and complexity of the project. For complete functionality, upgrade to the Pro version via an in-app purchase. The CRESTRON-APP and
More informationPDF Expert for ipad User guide
PDF Expert for ipad User guide 2011 Readdle Inc. 2 Contents Introduction Chapter 1: Copying documents to PDF Expert USB file transfer using itunes File Sharing Saving attachments from Mail and other ipad
More informationMobile Print/Scan Guide for Brother iprint&scan
Mobile Print/Scan Guide for Brother iprint&scan Version K ENG Definitions of notes We use the following note style throughout this user s guide: specifies the operating environment, conditions for installation,
More informationIST 195 Laboratory Session 8 - Privacy
IST 195 Laboratory Session 8 - Privacy In this lab, students will be asked to access a web-based content management cloud storage system. As learned in class, cloud computing is that allows files to be
More informationHow Much Space? New SkyDrive accounts offer 7GB of cloud storage. Older users of the service were able to reclaim more free space (25 GB).
What is SkyDrive? The short answer is that SkyDrive is a free service offered by Microsoft to host files in the cloud. SkyDrive also allows you to store, sync, and share files with other people and devices
More informationCreating a Client-To-Site VPN. BT Cloud Compute. The power to build your own cloud solutions to serve your specific business needs.
Creating a Client-To-Site VPN BT Cloud Compute The power to build your own cloud solutions to serve your specific business needs Issue 2 Introduction This guide is intended to demonstrate how easy it is
More informationIIT MOBILEPRINT. Mobileprint Workflow
IIT MOBILEPRINT Mobileprint integrates with existing OTS printing system to enable user to print documents, images and email messages using email client or a web capable devices. This include smartphones,
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationWELCOME TO CITUS CLOUD LOAD TEST
USER S GUIDE CONTENTS Contents... 2 Chapter 1: Welcome to Citus Cloud Load Test... 3 1. What is Citus Cloud Load Test?... 3 2. Why Citus Cloud Load Test?... 3 3. Before using this guide... 3 Chapter 2:
More informationWindows 8 Hacks O'REILLY* Preston Gralla. Beijing. Cambridge Famham. Koln Sebastopol Tokyo
Windows 8 Hacks Preston Gralla Beijing Cambridge Famham O'REILLY* Koln Sebastopol Tokyo Table of Contents Preface vii 1. Setup and Startup Hacks 1 Hack 01. Disable Windows 8's Lock Screen 1 Hack 02. Hack
More informationShentel (Shentel.net)
Shentel (Shentel.net) Email Quick Start Guide Your new webmail is now powered by Contents If you are forwarding your Shentel.net email to a third party address...2 If you use an email program other than
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationEgnyte App for Android Quick Start Guide
Egnyte App for Android Quick Start Guide Introduction Welcome to the Quick Start Guide for the Egnyte App for Android. This guide will explain how to: Access files. Download content for offline access.
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
More informationNote: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.
Quick Start Guide DocuSign Retrieve 3.2.2 Published April 2015 Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems.
More informationGet In, Get Unpacked, Get Connected.
Corporate Information & Computing Services. Get In, Get Unpacked, Get Connected. WELCOME to your New Home and to Unlimited Free Internet Welcome to your new university accommodation and to unlimited free
More informationUsing the owncloud Android App
Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationStudent BYOD - Olathe Public Schools
Student BYOD - Olathe Public Schools Connecting a Personally-Owned Device to the District s Wireless Network Students may attach ONE personal electronic device to the Olathe Public Schools wireless network
More informationAdding Receipts to your Certify Wallet
Adding Receipts to your Certify Wallet Log into Certify using your full Bowdoin College email address and your password. If you have forgotten your password click on the "Lost Password Wizard" from the
More informationSafe internet: Getting Started Guide
Safe internet: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial Configuration
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationInternet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
More informationDroboAccess User Manual
DroboAccess User Manual Release 8.2 The DroboAccess developers June 02, 2016 CONTENTS 1 DroboAccess 8.2 User Manual Introduction 1 2 Configuration of DroboAccess 8.2 3 2.1 Users, passwords and share management................................
More informationStore & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
More informationEducation Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide
Education Solutions Development, Inc. APECS Navigation: Business Systems Getting Started Reference Guide March 2013 Education Solutions Development, Inc. What s Inside The information in this reference
More informationThroughout this document, you will be instructed to log in as user Ann, or as user Julia. Log in using the user name assigned to you.
Introduction Oracle Documents Cloud Service (also referred to as "Oracle DOCS ) is a subscription-based file sync and share service available in the Oracle Cloud. It gives your employees a way to easily
More informationRegain Your Privacy on the Internet
Regain Your Privacy on the Internet by Boris Loza, PhD, CISSP from SafePatrol Solutions Inc. You'd probably be surprised if you knew what information about yourself is available on the Internet! Do you
More informationWireless Network Best Practices for General User
Wireless Network Best Practices for General User I n Hong Kong, the number of Wi-Fi access points (hotspots) has reached 31,000 in 2015 1. Unfortunately, not all of them are well-protected. In fact, wireless
More informationCRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios
1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide
More informationChrome OS USER GUIDE
Chrome OS USER GUIDE Before Reading This Guide This guide describes the general functions of Chrome OS. Some functions may differ depending on the Chrome OS version or the Chromebook model. Copyright c
More informationDepartmental (Service) Account Set Up
Departmental (Service) Account Set Up Exchange does not offer an exact equivalent to GroupWise proxy. Listed below are different methods of accessing your departmental or service account. All require that
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationgenie app and genie mobile app
genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,
More informationWhat is the Cloud? Computer Basics Web Apps and the Cloud. Page 1
Computer Basics Web Apps and the Cloud What is the Cloud? You may have heard people using terms like the cloud, cloud computing, or cloud storage. But what exactly is the cloud? Basically, the cloud is
More informationHow to set up your Secure Email in Outlook 2010*
How to set up your Secure Email in Outlook 2010* This guide is for hosting clients who are hosting their email with us. If you are using a third party email, you should not use these instructions. 1. Open
More informationConfiguring Web services
Configuring Web services (Week 13, Tuesday 11/14/2006) Abdou Illia, Fall 2006 1 Learning Objectives Install Internet Information Services programs Configure FTP sites Configure Web sites 70-216:8 @0-13:16/28:39
More informationAdaptive Business Management Systems Privacy Policy
Adaptive Business Management Systems Privacy Policy Updated policy: Effective on July 01, 2013 This privacy statement describes how Adaptive Business Management Systems collects and uses the personal information
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More information10/16/2014 STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT SOME STATISTICS
STRATEGIES FOR PROTECTING AND MONITORING ONLINE ACTIVITY INITIAL COMMENT The main focus tonight is on protecting and monitoring our children. But let s not fool ourselves the temptations are real for us
More informationOneDrive Using Office Documents
OneDrive Using Office Documents OneDrive is your personal cloud storage. It also provides you with Microsoft s Office Web Apps so you can create or edit documents in the cloud, all from your browser. Contents
More informationBuilder 2.0 Guide and Walkthrough
Builder 2.0 Guide and Walkthrough Getting Started Get started with Builder 2.0 by logging in to the application via your Facebook. Once you have logged into the application, the main dashboard will appear.
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationMobile Configuration Profiles for ios Devices Technical Note
Mobile Configuration Profiles for ios Devices Technical Note Mobile Configuration Profiles for ios Devices Technical Note December 10, 2013 04-502-197517-20131210 Copyright 2013 Fortinet, Inc. All rights
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationHow to connect? I can't connect to the Internet? Why are certain web pages blocked?
How to connect? I can't connect to the Internet? Why are certain web pages blocked? Connecting to Coach/Bus WIFI is easy. Turn on your device as usual. Click WIFI detector symbol. Click on Coach/Bus network.
More informationPDF Expert Enterprise User guide
PDF Expert Enterprise User guide 2012 Readdle Inc. 2 INTRODUCTION 3 CHAPTER 1: DOCUMENT VIEWING AND MANAGING IN PDF EXPERT ENTERPRISE 4 Reading and working with PDF documents 4 Managing files and folders
More informationReference Guide TEAM. Pogoplug Team. Reference Guide. 2012 Cloud Engines Inc., All Rights Reserved.
Reference Guide Pogoplug Team Reference Guide Table of Contents Table of Contents 1. What s Included 2. Getting Started 3. Customizing the Pogoplug Interface a. Custom UI b. Custom Domain Name c. Custom
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationTWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY
TWITTER AND YOUR CHILD, A PARENT S GUIDE TO PRIVACY AND SAFETY What is Twitter? Twitter is one of the leading tools for connecting users with bite-sized pieces of information and status updates. Each message
More informationHow to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
More informationBrainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android
Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.
More informationHTTPS Inspection with Cisco CWS
White Paper HTTPS Inspection with Cisco CWS What is HTTPS? Hyper Text Transfer Protocol Secure (HTTPS) is a secure version of the Hyper Text Transfer Protocol (HTTP). It is a combination of HTTP and a
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationHow To Set Up An Ipa Ez On A Pc Or Mac Or Macbook Or Ipa Or Ipamorade
Iomega EZ Media and Backup Center User Guide Table of Contents Setting up Your Device... 1 Setup Overview... 1 Set up My Iomega StorCenter If It's Not Discovered... 2 Discovering with Iomega Storage Manager...
More informationWatchDox for Windows User Guide. Version 3.9.0
Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or
More informationBROWSER TIPS FOR PEOPLESOFT
BROWSER TIPS FOR PEOPLESOFT Please note: This document is designed to be used online and has a number of embedded links to processes and additional information. We discourage the printing of these documents
More informatione-safety for Parents
e-safety for Parents Helenswood Academy Published June 2014 1 Contents Introduction 4 The Web 5 Children online 6 Friends of your child 7 Information about your child 8 Ownership of your child s technology
More informationConfiguration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
More informationAmazon WorkMail. User Guide Version 1.0
Amazon WorkMail User Guide Amazon WorkMail: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
More informationHow to connect? I can't connect to the Internet? I can't send emails from the train? Why are certain web pages blocked?
How to connect? I can't connect to the Internet? I can't send emails from the train? Why are certain web pages blocked? Connecting to Irish Rail Wifi is easy. Turn on your device as usual. Click Wifi detector
More information