Identity Theft
This is the 1st part of a 3 part series in protecting yourself from on-line and of-line scams.
This is the 2nd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 1 I attempted to make you aware of some of the common ways in which a scammer operates.
This is 3rd part of a 3 part series in protecting yourself from on-line and of-line scams. In part 2 I discussed some ways you can avoid scams before you become a victum.
It is relatively easy from the standpoint of a thief to impersonate your online identity and assume your financial standing. Using your identity, a thief can open up a line of credit under your name and go on a shopping spree making you assume all of…
This is a good guide that explains how to securely delete data from a Mac, but it also references a PC. These instructions might be beyond the capabilities for the average computer user, but it’s still good to know what is involved in securely deleting data.