DEVTOME.COM HOSTING COSTS HAVE BEGUN TO EXCEED 115$ MONTHLY. THE ADMINISTRATION IS NO LONGER ABLE TO HANDLE THE COST WITHOUT ASSISTANCE DUE TO THE RISING COST. THIS HAS BEEN OCCURRING FOR ALMOST A YEAR, BUT WE HAVE BEEN HANDLING IT FROM OUR OWN POCKETS. HOWEVER, WITH LITERALLY NO DONATIONS FOR THE PAST 2+ YEARS IT HAS DEPLETED THE BUDGET IN SHORT ORDER WITH THE INCREASE IN ACTIVITY ON THE SITE IN THE PAST 6 MONTHS. OUR CPU USAGE HAS BECOME TOO HIGH TO REMAIN ON A REASONABLE COSTING PLAN THAT WE COULD MAINTAIN. IF YOU WOULD LIKE TO SUPPORT THE DEVTOME PROJECT AND KEEP THE SITE UP/ALIVE PLEASE DONATE (EVEN IF ITS A SATOSHI) TO OUR DEVCOIN 1M4PCuMXvpWX6LHPkBEf3LJ2z1boZv4EQa OR OUR BTC WALLET 16eqEcqfw4zHUh2znvMcmRzGVwCn7CJLxR TO ALLOW US TO AFFORD THE HOSTING.

THE DEVCOIN AND DEVTOME PROJECTS ARE BOTH VERY IMPORTANT TO THE COMMUNITY. PLEASE CONTRIBUTE TO ITS FURTHER SUCCESS FOR ANOTHER 5 OR MORE YEARS!

Look Both Ways by Linda Criddle

This article was inspired by Linda Criddle's Look Both Ways . If you enjoy this article then consider purchasing or borrowing the book.

img2.imagesbn.com_p_9780735623477_p0_v1_s260x420.jpg

How to Use the Internet Safely

“The existence of cybercriminals should not force you to avoid the Internet any more than you avoid walking or driving because a bad driver might do you harm.”

From identity theft to stalking, the Internet provides exploiters with plenty of opportunities to commit crime against its 2 billion plus users. With 12% Web sites serving as pornography providers, the Internet has become a hostile locale for children. Research indicates that one-fifth of children aged 12 to 17 will be sexually solicited through the Internet.

How can you protect yourself and your family from cybercriminals? By reading this article, you will be able to identify what predators want and how to keep them from getting it.

First, be cautious when sharing information, and explain the risks of uploading photos to the Internet. Pictures posted in what you think is a private place online are more open than you think. If your children aren’t careful, their images can be twisted into pornographic images. Consider the type of information a photo tells predators about you and your family. Photo editing software exists to hide the personal information associated with your pictures.

Don’t post more information about yourself than is necessary. Cybercriminals will lie about themselves to gain your trust and convince you that the two of you have much in common. Most blogs and social networking sites will share your personal information as a default setting. Take advantage of their privacy features.

You and your children should be aware of predators’ strategies. They will try to gain your trust and appear to help you or your children out when you are in need. Avoid posting information that makes you look depressed and in desperate need of a friend. Predators make themselves appear heroic, and then they take advantage of you or your children.

Global positioning systems and wi-fi can tell criminals where you live. Don’t let others know the location of your house! This just opens the door to assault or robbery. Your photos can give visual clues, so be careful about what they reveal.

Instant messaging is dangerous if mishandled. Use a general nickname that won’t allow strangers find out your personal information. Keep a close eye on who joins your “buddy list,” as they can observe when you log-in and see your email-address.

When blogging, limit the access to your blog and check the comments left by others. Be careful about the information you share, and regularly read your friends’ blogs and comments to see if they reveal your confidential information.

Watch out for spam emails! A spam filter can prevent most spam, but clever spammers can impersonate your friends. Never respond to spam messages or purchase anything through their links.

If single, practice safe online dating habits. Use common sense when posting information, and don’t give out your e-mail address. Pick an appropriate nickname and photo.

Never enter banking information into pop-ups or e-mails. Follow the previous tips on your mobile device also.


QR Code
QR Code how_to_use_the_internet_safely (generated for current page)
 

Advertise with Anonymous Ads