1

BeginnersGuitarSongs.com Read.

Anne K. Martinez

The Book On Online Safety- A Must

The Book on Online Safety LEGAL NOTICE © 2011– BeginnersGuitarSongs.com. All rights reserved.

The Publisher has strived to be as accurate and complete as possible in the creation of this manual, notwithstanding the fact that he does not warrant or represent at any time that the contents within are accurate due to the rapidly changing nature of the Internet. While all attempts have been made to verify information provided in this publication, the Publisher assumes no responsibility for errors, omissions, or contrary interpretation of the subject matter herein. Any perceived slights of specific persons, peoples, or organizations are unintentional. In practical advice books, like anything else in life, there are no guarantees of income made. Readers are cautioned to reply on their own judgment about their individual circumstances to act accordingly. This manual is not intended for use as a source of legal, business, accounting or financial advice. All readers are advised to seek services of competent professionals in legal, business, accounting, and finance field. You are encouraged to print this book for easy reading. BeginnersGuitarSongs.com.com is not affiliated with any brands or companies on this reports. Each company holds its own copyright

2

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

Distribution rights You can:  Distribute  Share  Print  Email As long as you do not make any changes. You cannot sale it nor give it away as a bonus

3

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

.Computer Disposal Chapter 4 Stop · Think · Click: An of Computer Security Chapter 5 Email Scams Chapter 6 Health Online Chapter 7 -Identity Theft Chapter 8 Internet Auctions Chapter 9 Kids' Privacy Chapter 10 Laptop Security Chapter 11 Malware Chapter 12 Online Dating Scams Chapter 13 Online Investing Chapter 14 Online Shopping Chapter 15.Phishing Chapter 17.Table Of Content Chapter 1-Avoiding Scams Chapter 2-Broadband Chapter 3.com Anne K.P2P Security Chapter 16.Social Networking Sites Chapter 18 Spyware Chapter 19 VoIP – Chapter 20 Wireless Security 4 BeginnersGuitarSongs. Martinez The Book On Online Safety.A Must Read.

Martinez The Book On Online Safety. their families and friends. . but they come with certain risks.In today’s day we have many ways of socializing and communicating online.A Must Read. 5 BeginnersGuitarSongs. The Book on Online Safety covers what any internet user needs to know in order to protect themselves.com Anne K.

Chapter 1 Avoiding Scams Overview International scam artists use clever schemes to defraud millions of people around the globe each year.com Anne K. 6 BeginnersGuitarSongs. Being on guard online can help you maximize the benefits of e-commerce and minimize your chance of being defrauded.A Must Read. . Martinez The Book On Online Safety.

you can’t get it back. Here are ten tips to help you avoid common online scams: a) Don’t send money to someone you don’t know. 4) Keep in mind that wiring money is like sending cash: once it’s gone. 2) Don’t respond to messages that ask for your personal or financial information. remember that there’s no such thing as a sure thing. 5) Don’t agree to deposit a check from someone you don’t know and then wire money back. If you buy items through an online auction. It’s best to do business with sites you know and trust. 9) When considering an investment. 8) Talk to your doctor before buying health products or signing up for medical treatments. That includes an online merchant you’ve never heard of — or an online love interest who asks for money or favors.A Must Read. 6) Read your bills and monthly statements regularly—on paper and online.com Anne K. Being on guard online can help you maximize the benefits of e-commerce and minimize your chance of being defrauded. threatening financial security and generating substantial profits for criminal organizations and common crooks. 3) Don’t play a foreign lottery.Quick Facts Avoiding Online Scams: 1) Don’t send money to someone you don’t know. give to established charities rather than one that seems to have sprung up overnig ht. Martinez The Book On Online Safety. 10) Know where an offer comes from and who you’re dealing with. like a credit card. International scam artists use clever schemes to defraud millions of people around the globe each year. . consider a payment option that provides protection. 7) In the wake of a natural disaster or another crisis. Don’t send cash or use a wire 7 BeginnersGuitarSongs.

If you see charges you don’t recognize or didn’t okay. you won’t get it back. whether the message comes as an email. and they could be collecting the money to finance illegal activity. to sellers who insist on wire transfers for payment. If you get a message and are concerned about your account status. you can’t get it back. give to established charities rather than one that seems to have sprung up overnight. or to someone who claims to be a relative in an emergency (and wants to keep the request a secret). contact your bank. You are responsible for the checks you deposit: When a check turns out to be a fake. especially overseas. Con artists often insist that people wire money. it’s illegal to play foreign lotteries. card issuer. a phone call. c) Don’t play a foreign lottery. b) Don’t respond to messages that ask for your personal or financial information.transfer service. Pop-up charities probably don’t have the infrastructure to get help to the affected areas or people.‖ ―fees. regardless of the promises. And don’t pay upfront fees for the promise of a big pay-off — whether it’s a loan. a job. Martinez The Book On Online Safety.com Anne K. because it’s nearly impossible to reverse the transaction or trace the money. a text message. f) Read your bills and monthly statements regularly—on paper and online. banks must make funds from deposited checks available within days.‖ or ―customs duties‖ to collect your prize. Don’t click on links or call phone numbers included in the message. . or messages that claim you’ve already won. it’s easy to be tempted by messages that boast enticing odds in a foreign lottery. or other creditor immediately. or prize money. e) Don’t agree to deposit a check from someone you don’t know and then wire money back. If you se nd money. Inevitably. you’ll be asked to pay ―taxes. d) Keep in mind that wiring money is like sending cash: once it’s gone. g) In the wake of a natural disaster or another crisis. you’ll be responsible for paying back the bank. 8 BeginnersGuitarSongs. Don’t wire money to strangers. The crooks behind these messages are trying to trick you into sending money and revealing your bank account information. or an ad. By law. but uncovering a fake check can take weeks.A Must Read. either. no matter how convincing the story. Second. First. call the number on your credit or debit card — or your statement — and check it out. Scammers steal account information and then run up charges or commit crimes in your name.

S. pharmacies. When you hear pitches that insist you act now. Buy prescription drugs only from licensed U. Ask about research that supports a product’s claims — and possible risks or side effects.h) Talk to your doctor before buying health products or signing up for medical treatments. high-return investment opportunities. stay away. products that could be dangerous. i) Remember there’s no such thing as a sure thing. Otherwise. guarantees of big profits.A Must Read. expired or mislabeled — in short. . or demands that you send cash immediately avoid them 9 BeginnersGuitarSongs. you could end up with products that are fake. If someone contacts you promoting low-risk. Martinez The Book On Online Safety. promises of little or no financial risk.com Anne K.

watch movies. wireless. cable. fiber optic. or use other applications. make phone calls. 10 BeginnersGuitarSongs. Martinez The Book On Online Safety. and the questions to ask to get the best deal for your needs – whether you shop. Learn about the types of services that are available.com Anne K. or satellite. play games.Chapter 2 Broadband Broadband refers to high-speed internet access available through services like digital subscriber line (DSL). .A Must Read. listen to music.

or use other "hot" applications. make phone calls. 11 BeginnersGuitarSongs. There's no need to dial a phone number to reach your Internet Service Provider (ISP). 2) Are you offering any specials? Read the fine print. but it might make it more difficult to change providers for any one service if you're tied into a long-term contract. There's no need to dial a phone number to reach your Internet Service Provider (ISP). and the questions to ask to get the deal that best suits your needs. you access the internet simply by turning on your computer. BeginnersGuitarSongs. you access the internet simply by turning on your computer.com wants you toknow the types of services that are available. fiber optic. Before signing up for any plan. . If you use your computer to shop online. Typically. consider these questions when shopping for broadband: 1) Is there a discount if I get more than one service from your company? Buying a bundle of services from one provider can be a good deal. When you are shopping for broadband service. broadband lets you do it faster. including digital subscriber line (DSL). listen to music.com Anne K. Promotions like introductory pricing may not include taxes or the cost of extra equipment. cable. 4) Can I change plans before my contract expires? Ask about options and costs for changing your plan to reflect your usage.com. 3) What speeds can I expect? Speeds vary and depend on a variety of factors including what type of service you are using. and cable is faster than DSL. Martinez The Book On Online Safety.Quick Facts Broadband refers to the high-speed internet access you can get through a variety of services – and with broadband. or satellite.A Must Read. Be sure you understand what the fees are and how they are calculated before you sign up. Broadband refers to the high-speed internet access you can get through a variety of services. what level or tier of service you have purchased. like a digital cable modem. With broadband. or additional fees. wireless. 5) Is there a cancellation fee? Some plans include early-termination fees. fiber is faster than cable. like an activation fee or an early termination fee. watch movies. and how congested your network and the internet are at any time. play video games.

" which are available in increasing numbers of airports. which is a new and faster type of broadband service. in some areas.com Anne K. Martinez The Book On Online Safety. The four most common types of residential broadband service are: 1) Digital Subscriber Lines (DSL). city parks. d) Broadband Over Powerline (BPL). and other public locations.A) Types of Broadband The type of broadband available to you depends on what technology the providers in your area offer. Local phone companies typically offer DSL services. b) "Wi-fi hotspots. Extreme weather conditions can disrupt service. 2) Cable modems. which transmit data through phone lines without interfering with telephone service. They also can be accessed using a computer with a built-in or plug-in air card.A Must Read. Fiber optic broadband is currently available only in certain areas. 3) Fiber optic broadband. Cable modem internet access services typically are offered by the same companies that offer cable TV services in your area. 4) Mobile wireless broadband services. c) Satellite Delivery of internet access services. bookstores. other internet service providers also offer DSL services. which provide access to the internet over cable lines without interfering with your cable television service. which are available from mobile telephone service providers. 5) Other types of broadband might be available in your community: a) Fixed Wireless broadband. BPL is an emerging technology that has 12 BeginnersGuitarSongs. The same fiber optic line providing your broadband service simultaneously can deliver phone and video (television) services. which connects a home or business to the internet using a radio link between the customer's location and the service provider's facility. Such services are accessible through certain wireless telephones and PDA devices (personal digital assistants). . which is the delivery of broadband over electric utility lines. which are available in most areas from providers of satellite television services.

. and cable is faster than DSL. Upstream speeds tell you how fast you can transfer data from your computer to a computer somewhere else on the internet — for example. There are some applications that work best with high-speed connections. like watching high-definition movies or playing real-time video games. but even basic Web browsing goes faster with a broadband connection. B) What Speeds to Expect 1) One appeal of broadband is that it's much faster than dial-up. 4) Many applications do not require high speeds.significant potential because power lines are installed virtually everywhere. The Web is full of free broadband speed testing programs. Downstream speeds tell you how fast you can download something from the internet to your computer. what level or tier of service you have purchased. 3) Most providers offer different speeds upstream and downstream. Downstream speeds usually are faster than upstream speeds. 13 BeginnersGuitarSongs. But speeds vary and depend on a variety of factors including what type of service you are using. If you test your broadband speed and you're not getting what you expected. or megabits (Mbps) — millions of bits per second. Speeds are expressed in kilobits (kbps) — thousands of bits per second. 5) If speed matters to you. fiber is faster than cable. But be aware that different tests may produce different results because they may not test speed the same way.com Anne K.A Must Read. eliminating the need to build new lines to every customer. how fast you can upload photographs onto a website. make sure you ask providers what speeds you can expect. and how congested your network and the internet are at any time. ask your provider why and if there are ways to improve it. 2) Typically. Martinez The Book On Online Safety.

test the service to see if it meets your expectations. 2) Are you offering any specials? Special promotions like introductory pricing may be enticing. Problems that can go along with setting up a connection can be daunting. but it might make it more difficult to change providers for any one service if you're tied into a long-term contract. 3) Is there anything I need to know about setting up my broadband? Some promotions require you to install cables. especially if you're not technologically savvy. like an activation fee or an early termination fee. When you are online. recurring. Ask when they end. 14 BeginnersGuitarSongs. and if there's a trial period. or additional fees. like a digital cable modem. In addition.A Must Read. minimum system requirements. Most providers will help you troubleshoot on the phone or make instructions available online. such as the type of application you are using or the number of other visitors to the website you are viewing. and may be less than the maximum potential speed your provider touts. Even if you have to order online. Some deals are available only online or by phone.C) Shopping for Broadband The first step in signing up for broadband is to know whether you also want to get internet. Ask the provider to explain all the one-time. Be aware that the actual transmission speeds you experience depend on many factors. and print a copy for yo ur records. modems. what are the conditions? Buying a bundle of services from one provider can be a good deal. telephone. call the provider first to ask questions. review any frequently asked questions. Make sure the listed download and upload speeds are the ones that you're expecting.com Anne K. 4) What speeds can I expect? Be aware that low promotional pricing may be for the lowest speeds. and special charges. and TV service from the same p rovider. and fine-print terms and conditions. and what the post-promotion cost will be. Get all promises in writing. including taxes and fees. Read the entire customer service agreement. Ask when the special promotions end. . Message boards on a manufacturer's website also can be helpful. satellite dishes or software yourself. Consider asking providers: 1) Is there a discount if I get more than one service from your company? If yes. Martinez The Book On Online Safety. Find out early on what you'll need to do. and what the post-promotion cost will be. but read the fine print. routers. promotional prices may have time limits. The promotion price probably does not include taxes or the cost of extra equipment.

or if the costs are more than you are willing to pay. Is it free? 10) What happens when the power goes out? Check with the provider to find out whether phone and broadband service will be available in the event of a power outage.com Anne K.Finally. 9) Who do I call if the service goes out? Ask if customer service or tech support is available 24 hours a day. Martinez The Book On Online Safety. If the provider does not offer protective software. and the costs to purchase and to rent. 5) Can I change plans before my contract expires? After you become a broadband user. Before signing up for fiber service. If you know exactly what you want. 6) Is there a cancellation fee? Some plans include early-termination fees. Services provided over cable or fiber may not. Ask about options and costs for changing your plan to reflect your usage. 11) What security measures does the provider include. 7) If I get fiber service and then decide I don't want it. you may wish to change plans. and whether it is by telephone or the internet. Highbandwidth lines are fully capable of carrying calls as well as internet data and television. 8) Is it better to lease or buy the required equipment? It depends on how long you plan to stick with the provider. Services provided over a landline or DSL typically work during short term power outages. can I go back to my old DSL service? If you're considering fiber optic broadband. you may not be able to switch back to traditional phone service or DSL service. Of course. 15 BeginnersGuitarSongs. But if the copper lines are removed. and at what price? Ask the provider if anti-virus. Be sure you understand what the fees are and how they are calculated before you sign up. anti-spam. find out the policy on converting from DSL to fiber — or back to DSL.A Must Read. and the cost. seven days a week. some retailers may offer plans on behalf of phone or cable companies with different terms than those offered by the companies themselves. . and anti-spyware software are included with your service. you also might try negotiating a customized plan with a provider or a retailer. your computer needs a battery or other power supply to work during a power outage. ask the provider if the copper wires that are used to carry your phone calls will be removed.

com Anne K. first contact your service provider to resolve the issue. Martinez The Book On Online Safety. D) For More Information If you have a problem with your broadband.download it from the websites of software companies or buy it from retail stores. 16 BeginnersGuitarSongs. consider contacting your public utility commission or other appropriate state or local regulator. If you can't get satisfaction. .A Must Read.

better. . faster—but how do you safely dispose of last year's model? Learn what to do before getting rid of your old computer so your personal information – and the environment – are protected. Martinez The Book On Online Safety.A Must Read.Chapter 3 Computer Disposal Computers are newer. 17 BeginnersGuitarSongs.com Anne K.

donating. The law requires businesses to follow data security and disposal requirements for certain information that’s related to customers. But before you log off for the last time. a USB drive. and other personal documents. addresses and phone numbers. a CDRom. Before getting rid of your old computer. consider recycling.Quick Facts If you want to get rid of your old computer. it’s a good idea to use software to ―wipe‖ the hard drive clean.com Anne K. tax returns. there are important things to do to prepare it for disposal. 18 BeginnersGuitarSongs. They’re generally inexpensive. Martinez The Book On Online Safety. or reselling it – and keep the environment in mind when disposing of your computer. Computers often hold personal and financial information. consider using a program that overwrites or wipes the hard drive many times. or an external hard drive – or transfer them to a new computer.A Must Read. 2) ―Wipe‖ your hard drive clean – use software available both online and in stores where computers are sold. 3) If your old computer contains sensitive information that would be valuable to an identity thief. options include recycling. some are available on the internet for free. consider your old hard drive a 21st century treasure chest for identity thieves and information pirates. . account numbers. Or. reselling. Once you have a ―clean‖ computer. including passwords. check with your employer about how to manage business-related information on your computer. and physically destroy it. 4) If you use your computer for business purposes. medical and prescription information. and donating. remove the hard drive. If you don’t. Here are a few things to keep on mind 1) Save important files on an external storage device – for example. license keys or registration numbers for software programs.

those that overwrite or wipe the drive only once may not prevent information being wiped from being recovered later. The law requires businesses to follow data security and disposal requirements for certain information that’s related to customers. They’re generally inexpensive. then gathers the bits and pieces and reconstructs them. or its customer support line for information on how to save data and transfer it to a new computer. They also vary in their effectiveness: programs that overwrite or wipe the hard drive many times are very effective. consider using a program that overwrites or wipes the hard drive many times. and physically destroy it. Martinez The Book On Online Safety. it needs to be wiped clean. 2) When you delete a file. or an external hard drive – or transfer them to a new computer. and they can be retrieved with a data recovery program. remove the hard drive. Check your owner’s manual. save the files that are important to you on an external storage device – for example.A) Understanding Hard Drives 1) A computer’s hard drive stores data. If your old computer contains sensitive information that would be valuable to an identity thief. it is scattered around the hard drive in bits and pieces.A Must Read. When you save a file. a CDRom. the manufacturer’s website. Files also are automatically created by browsers and operating systems. 2) Utility programs to wipe your hard drive are available both online and in stores where computers are sold. some are available on the internet for free. Or. the hard drive checks the index. signaling to your system that the file isn’t needed any longer and that hard drive space can be overwritten. especially a large one.com Anne K. 19 BeginnersGuitarSongs. a USB drive. 3) One more thing to keep in mind: If you use your home or personal computer for business purposes. Wipe utility programs vary in their capabilities: some erase the entire disk. check with your employer about how to manage information on your computer that’s business-related. To remove data from your hard drive permanently. while others allow you to select files or folders to erase. B) Cleaning Hard Dives 1) Before you clean your hard drive. . When you open a file. But the bits and pieces of the deleted file stay on your computer until they’re overwritten. the links between the index and the file disappear. and maintains an index of files.

here’s how to dispose of it: 1) Recycle it. Some people and organizations buy old computers. Many organizations collect old computers and donate them to charities. . Martinez The Book On Online Safety. Check online.C) Disposal Options Once you have a ―clean‖ computer. 2) Donate it. Most computer equipment contains hazardous materials that don’t belong in a landfill. The EPA recommends that you check with your local health and sanitation agencies for ways to dispose of electronics safely. Your local community may have a recycling program. many computers have heavy metals that can contaminate the earth. Many computer manufacturers have programs to recycle computers and components. For example. Keep the environment in mind when disposing of your computer. Check with your county or local government. including the local landfill office for regulations. Check their websites or call their toll-free numbers for more information.A Must Read.com Anne K. 3) Resell it. 20 BeginnersGuitarSongs.

A Must Read. Martinez The Book On Online Safety. and more. At the same time. countless products and services. entertainment. Learn experts' top tips for computer security. it can leave you open to online scammers. 21 BeginnersGuitarSongs. financial offers – frankly. . identity thieves.Chapter 4 Stop · Think · Click: An Overview of Computer Security The internet gives you access to information.com Anne K.

your personal information can provide instant access to your financial accounts. or pop-up message that asks for personal or financial information. Don't give out your personal information unless you first find out how it's going to be used and how it will be protected. a2) Don't respond if you get a message – by email. It might suggest something bad will happen if you don't respond quickly with your personal information. by hacking into large databases managed by businesses or government agencies. If you think no one would be interested in YOUR personal information.com Anne K. The scam is called "phishi ng": criminals send email. text. your credit record. and don't click on links in the message. text. pop-up or phone – that asks you to call a phone number to update your account or give your personal information to access a refund. While you can't enjoy the benefits of the internet without sharing some personal information. or text messages to ask for your personal information.A) 7 Practices for Computer Security 1. Protect your personal information. call the number on your financial statement. If you want to go to a bank or business's website. an online seller or another organization with which you do business. passwords. To an identity thief. b) Some identity thieves have stolen personal information from many people at once. to convince you to share your account numbers. The message asks you to click to a website or call a phone number to update your account information or claim a prize or benefit. In reality. . 22 BeginnersGuitarSongs. legitimate businesses should never use email. and other information so they can get your money or buy things in your name. text. and other assets. type the web address into your browser yourself. How do criminals get your personal information online? One way is by lying about who they are. think again.A Must Read. If you need to reach an organization with which you do business. or use a telephone directory. a government agency. Martinez The Book On Online Safety. ANYONE can be a victim of identity theft. or popup messages that appear to come from your bank. It's valuable. you can take steps to share only with organizations you know and trust. pop-ups. a) To avoid phishing scams: a1) Don't reply to an email.

and whether it is provided to third parties. but also to other information on your hard drive. File -sharing can give people access to a wealth of information. But file-sharing can have a number of risks. File-Sharing: Worth the hidden costs? Every day. email messages. which would mean you could be breaking the law. 23 BeginnersGuitarSongs.c) If you are shopping online. d) Read website privacy policies. In addition. photos. millions of computer users share files online. How does it work? You download special software that connects your computer to an informal network of other computers running the same software. and software. be sure to read the End User Licensing Agreement to be sure you understand and are willing to tolerate the potential risks of free downloads. If you don't check the proper settings. . Millions of users could be connected to each other throug h this software at one time. or other personal documents. Unfortunately. like your tax returns. If you decide to use file-sharing software.com Anne K. 2. no indicator is foolproof. the software is free and easy to access. And some hackers have managed to breach sites that took appropriate security precautions.A Must Read. They should explain what personal information the website collects. Often. you may unwittingly download malware or pornography labeled as something else. If you don't see a privacy policy — or if you can't understand it — consider doing business elsewhere. you could allow access not only to the files you intend to share. like a lock icon on the browser's status bar or a website URL that begins "https:" (the "s" stands for "secure"). don't provide your personal or financial information through a company's website until you have checked for indicators that the site is secure. games. The privacy policy also should tell you whether you have the right to see what information the website has about you and what security measures the company takes to protect your information. Martinez The Book On Online Safety. Or you may download material that is protected b y the copyright laws. medical records. how the information is used. some scammers have forged security icons. including music.

Once you confirm that your security software is up-to-date. and a firewall. That's a tactic scammers have used to spread malware. or displays repeated error messages b2) Won't shut down or restart b3) Serves up a lot of pop-up ads. spyware software monitors or controls your computer use. security software protects against the newest threats only if it is up-to-date. run it to scan your computer for viruses and spyware. Martinez The Book On Online Safety. Resist buying software in response to unexpected pop-up messages or emails. or displays them when you're not surfing the web 24 BeginnersGuitarSongs. redirect your computer to websites. b) Anti-Spyware Software Installed on your computer without your consent. or even allow spammers to send email through your account. If the program identifies a file as a problem.com Anne K. especially ads that claim to have scanned your computer and detected malware. your computer should have anti-virus and anti-spyware software. cause a crash. monitor your internet surfing.3. delete it. That's why it is critical to set your security software to update automatically. and then deleting them. malfunctions. A computer may be infected with spyware if it: b1) Slows down. a) Anti-Virus Software Anti-virus software protects your computer from viruses that can destroy your data. in turn. You can buy stand-alone programs for each element or a security suite that includes these programs from a variety of sources.A Must Read. slow your computer's performance. . could lead to the theft of your personal information. Keep your security software active and current: at a minimum. Some scam artists distribute malware disguised as anti-spyware software. which. Use security software that updates automatically. or record your keystrokes. It may be used to send you popup ads. Security software that comes pre-installed on a computer generally works for a short time unless you pay a subscription fee to keep it in effect. In any case. including commercial vendors or from your Internet Service Provider. It works by scanning your computer and your incoming email for viruses.

It can be appealing to download free software like games. 25 BeginnersGuitarSongs. or sends emails you didn't write. d) Don't Let Your Computer Become Part of a "BotNet" Some spammers search the internet for unprotected computers they can control and use anonymously to send spam. include a text message explaining what it is. customized toolbars. Spammers scan the internet to find computers that aren't protected by security software.A Must Read. file-sharing programs. and then install bad software – known as "malware" – through those "open doors. and the like." which could turn your computer into a "bot. Malware may be hidden in free software applications. a firewall is like a guard. 4. known as a "botnet." That's one reason why up-to-date security software is critical. If you send an email with an attached file. But sometimes just visiting a website or downloading files may cause a "drive-by download. . if you click on or open them.b4) Displays web pages or programs you didn't intend to use. Don't open an email attachment — even if it looks like it's from a friend or coworker — unless you are expecting it or know what it contains." Also known as a "zombie army. turning them into a robot network. Be cautious about opening any attachments or downloading files from emails you receive. links or images which." a botnet is made up of many thousands of home computers sending emails by the millions.com Anne K. install hidden software. c) Firewalls A firewall helps keep hackers from using your computer to send out your personal information without your permission. millions of home computers are part of botnets. Most spam is sent remotely this way." Another way spammers take over your computer is by sending you an email with attachments. While anti-virus software scans incoming email and files. and learn about their security features. Martinez The Book On Online Safety. watching for outside attempts to access your system and blocking communications to and from sources you don't permit. Keep your operating system and Web browser up-to-date.

e) Don't use the same password for each online account you access. If you're not using your computer for an extended period. c) Don't use your personal information. the tougher it is to crack. A 12-character password is stronger than one with eight characters. your login name. and out of plain sight.com Anne K. Use your "Help" function for more information about your choices. When it's disconnected.A Must Read. the computer doesn't send or receive information from the internet and isn't vulnerable to hackers. hackers may try to figure out your passwords to gain access to your computer. Keep your passwords in a secure place. Don't share them on the internet. . To make it tougher for them: a) Use passwords that have at least eight characters and include numbers or symbols. every 90 days). or on the phone. Check the "Tools" or "Options" menus to learn how to upgrade from the default settings. so it's important to set your operating system and Web browser software to download and install security patches automatically. over email. Martinez The Book On Online Safety. or adjacent keys on the keyboard as passwords. 5. disconnect it from the internet. d) Change your passwords regularly (at a minimum. 26 BeginnersGuitarSongs. Your Internet Service Provider (ISP) should never ask for your password. and strong. b) Avoid common words: some hackers use programs that can try every word in the dictionary. The longer the password. secure. Keep your passwords safe. In addition. In addition.Hackers also take advantage of Web browsers (like Firefox or Internet Explorer) and operating system software (like Windows or Mac's OS) that don't have the latest security updates. you can increase your online security by changing the built -in security and privacy settings in your operating system or browser. Operating system companies issue security patches for flaws that they find in their systems.

Delete everything the program identifies as a problem. Tell them that some online activity can put a computer at risk. If you follow these tips. and spammers. If you need professional help. online. Telephone or online help generally are the least expensive ways to access support services — especially if there's a toll-free helpline — but you may have to do some of the work yourself. viruses. contact the manufacturer. But no system is completely secure.6. stop shopping. you might want to call for professional help. and share the seven practices for safer computing. 27 BeginnersGuitarSongs. 7. Before you call. Back up important files. and a short description of the problem. at their store. Once your computer is back up and running. passwords. If your computer is covered by a warranty that offers free tech support. Learn what to do in an e-mergency. Confirm that your security software is up-to-date. or other sensitive information. copy them onto a removable disc or an external hard drive. talk about safe computing with anyone else who uses the computer. Taking your computer to a store usually is less expensive than hiring a technician or repair person to come into your home. if your machine isn't covered by a warranty.A Must Read. Malware could be sending your personal information to identity thieves. or if your security software isn't doing the job properly. the name of any software you've installed. then use it to scan your computer. If you have important files stored on your computer. and store it in a safe place. banking. write down the model and serial number of your computer. . If you suspect malware is lurking on your computer. Also. You may have to restart your computer for the changes to take effect. If the problem persists after you exhaust your ability to diagnose and treat it. you're more likely to be free of interference from hackers. and what you could do to avoid it in the future. and other online activities that involve user names. Many companies — including some affiliated with re tail stores — offer tech support via the phone. or in your home. Your notes will help you give an accurate description to the technician. Martinez The Book On Online Safety.com Anne K. think about how malware could have been downloaded to your machine. you may need to pay for technical support.

hackers.com Anne K. With awareness as your safety net. as well as the things they're seeing and doing online. there are lessons that parents can teach to help kids stay safer as they socialize online. you can play a friendly game with an opponent across the ocean. or inappropriate online behavior. suspicious. and your money. or collaborate with far-flung co-workers in a "virtual" office. get expert advice in an instant. Martinez The Book On Online Safety.A Must Read. Being on guard online helps you protect your information. and more. songs. . Thanks to the internet. your computer. But no software can substitute for parental supervision.if you (or they) are suspicious about something on a social networking site. Social Networking Sites Trust your instincts – and tell kids to trust theirs . encourage them to tell you. Talk to your kids about safe computing practices. or you can buy separate software. products from every corner of the world — even to your work — is greater than ever. Tips for Parents Parents sometimes can feel outpaced by their technologically savvy kids. personal information. or clothes. Read more about chatting with kids about being online. Technology aside. But the internet — and the anonymity it affords — also can give online scammers. Most sites have links where users can immediately report abusive. and identity thieves access to your computer. Most ISPs provide parental controls. To be safer and more secure online. credit and financial services. you can minimize the chance of an internet mishap. You can then help them report concerns to the police and to the social networki ng site. If kids feel threatened by someone or uncomfortable because of something online. 28 BeginnersGuitarSongs. review and rate videos. make these seven practices part of your online routine. finances.Access to information and entertainment.

Martinez The Book On Online Safety. Learn to spot 10 common spam scams and what to do if one shows up in your inbox.A Must Read. with offers for bogus products and fraudulent promotions. 29 BeginnersGuitarSongs.Chapter 5 Email Scams Most people agree that getting "spam" is annoying.com Anne K. . Spam – unsolicited sales pitches – also can be costly.

Quick Facts Some email users have lost money to bogus offers that arrived as spam in their in-box. Disregard any offer that asks you to pay for a gift or prize.com Anne K. Inevitably. A) Filter Tips: 10 Scams to Screen from Your Email 1) The "Nigerian" Email Scam a) The Bait: Con artists claim to be officials. Some fraudsters have even produced trunks of dyed or stamped money to try to verify their claims. b) The Catch: The emails are from crooks trying to steal your money or your identity. . businesspeople. Share credit card or other personal information only when you're buying from a company you know and trust.A Must Read. you may receive documents that look "official." Then they ask you to send money to cover transaction and transfer costs and attorney's fees. 2) Never pay for a "free" gift. Free means free. Con artists are very cunning. Either way. others invite you to a website with a detailed pitch. They offer to transfer lots of money into your bank account if you will pay a fee or "taxes" to help them access their money. you shouldn't have to pay for it. emergencies come up. If it's free or a gift. to complete the transaction. 30 BeginnersGuitarSongs. in this scenario. as well as blank letterhead. Martinez The Book On Online Safety. your bank account numbers. these tips can help you avoid spam scams: 1) Protect your personal information. They may even encourage you to travel to the country in question. Some spam messages ask for your business. they know how to make their claims seem legitimate. or the surviving spouses of former government honchos in Nigeria or another country whose money is somehow tied up for a limited time. or a neighboring country. or other information. If you respond to the initial offer.

2) Phishing a) The Bait: Email or pop-up messages that claim to be from a business or organization you may deal with – say. If you are concerned about your account. 3) Work-at-Home Scams 31 BeginnersGuitarSongs.requiring more of your money and delaying the "transfer" of funds to your account. c) Your Safety Net: Make it a policy never to respond to emails or pop-ups that ask for your personal or financial information.A Must Read. Martinez The Book On Online Safety.com Anne K. an Internet Service Provider (ISP). c) Your Safety Net: Ignore any email from someone claiming to need your help getting money out of a foreign country. people who have responded to "pay in advance " solicitations have been beaten. and run up bills or commit crimes in your name. The message may ask you to "update. or open a new internet browser session and type in the company's correct Web address yourself. The harm sometimes can be felt even beyond your pocketbook: according to State Department reports. fake your identity. can help. and in some cases. The messages direct you to a website that looks just like a legitimate organization's site." or "confirm" your account information or face dire consequences. But these are bogus and exist simply to trick you into divulging your personal information so the operators can steal it. and keeping them up to date. and the scam artist vanishes with your money. contact the organization using a phone number you know to be genuine. Using anti-virus and anti-spyware software and a firewall. bank. either: phishers can make links look like they go one place. or even a government agency. subjected to threats and extortion. or call phone numbers given in the message. . there aren't any profits for you." "validate. In the end. b) The Catch: Phishing is a scam where internet fraudsters send spam or pop-up messages to reel in personal and financial information from unsuspecting victims. murdered. click on links in the message. Don't cut and paste a link from the message into your Web browser. or to a phone number purporting to be real. online payment service. but then actually take you to a look-alike site.

No risk. or equipment to do the job. A reasonable goal is to lose about a pound a week. patch. others guarantee permanent weight loss. or other jobs. There's nothing available through email you can wear or apply to your skin that can cause permanent – or even significant weight loss. Legitimate work-at-home business promoters should tell you – in writing – exactly what's involved in the program they're selling. that means cutting about 500 calories a day from your diet. Talk to your health care provider about a nutrition and exercise program suited to your lifestyle and metabolism. And the advantage of working from home when it's convenient for you. b) The Catch: These are gimmicks. b) The Catch: The ads don't say you may have to work many hours without pay. make photocopies. 4) Weight Loss Claims a) The Bait: Emails promising a revolutionary pill. For most people. Once you put in your own time and money.com Anne K. cream. Martinez The Book On Online Safety.A Must Read. or other product that will result in weight loss without diet or exercise. envelope-stuffing.a) The Bait: Advertisements that promise steady income for minimal labor – in medical claims processing. eating a variety of nutritious foods. or pay hidden costs to place newspaper ads. Minimal work. software. ." c) Your Safety Net: There is no evidence yet of someone who has gotten rich stuffing envelopes or assembling magnets at home. you're likely to find promoters who refuse to pay you. and exercising regularly. or calories. Some products claim to block the absorption of fat. or buy supplies. The ads use similar come-ons: Fast cash. claiming that your work isn't up to their "quality standards. 5) Foreign Lotteries 32 BeginnersGuitarSongs. still others suggest you'll lose lots of weight at lightening speed. playing on your sense of hopefulness. craft assembly work. carbs. c) Your Safety Net: Experts agree that the best way to lose weight is to eat fewer calories and increase your physical activity so you burn more energy. Permanent weight loss happens with permanent lifestyle changes.

be skeptical. These kinds of claims deal with the treatment of diseases. a cure all is a cure none.S. In addition. Martinez The Book On Online Safety. Don't send money now on the promise of a pay-off later. . and require payment in advance. b) The Catch: There is no product or dietary supplement available via email that can make good on its claims to shrink tumors. cure impotency." Case histories or testimonials by consumers or doctors claiming amazing results are not uncommon. or prevent severe memory loss. c) Your Safety Net: When evaluating health-related claims. Don't send cash or use a moneywiring service because you'll have no recourse if something goes wrong. b) The Catch: Most promotions for foreign lotteries are phony. Generally speaking. Consult a health care professional before buying any "cure-all" that claims to treat a wide range of ailments or offers quick cures and easy solutions to serious illnesses.com Anne K. And one last important note: participating in a foreign lottery violates U. treat Alzheimer's disease. You may even get a message claiming you've already won! You just have to pay to get your prize or collect your winnings." "customs duties. c) Your Safety Net: Skip these offers. They generally announce limited availability. law. 7) Check Overpayment Scams 33 BeginnersGuitarSongs. The scammers will ask you to pay "taxes. 6) Cure-All Products a) The Bait: Emails claiming that a product is a "miracle cure." Scammers sometime ask you to send funds via wire transfer. companies that want to make claims like these must follow the FDA's pre-market testing and review process required for new drugs. and offer a no-risk "money-back guarantee.A Must Read. cure insomnia." an "ancient remedy" – or a quick and effective cure for a wide variety of ailments or diseases. lottery hustlers use victims' bank account numbers to make unauthorized withdrawals or their credit card numbers to run up additional charges." a "scientific breakthrough.a) The Bait: Emails boasting enticing odds in foreign lotteries." or fees – and then keep any money you send.

If that's not possible. Don't send the merchandise. and asks you to wire back the difference after you deposit the check. You still have to complete an application and you can still be turned down. not from the person who gave you the check. or repair your bad credit even though banks have turned you down.a) The Bait: A response to your ad or online auction posting. If you paid a fee in advance for the promise of a loan or credit card.com Anne K. but they're good enough to fool unsuspecting bank tellers and increase the balance in your bank account – temporarily. you are liable for the entire amount. or corporate check. b) The Catch: If you deposit the check. you have to ante up a processing fee of several hundred dollars. As a seller who accepts payment by check. Typically. . you've been hustled. b) The Catch: A legitimate pre-qualified offer means you've been selected to apply. But when the check eventually bounces. Ask if the check is valid. you can visit personally to make sure the check is valid. the checks are counterfeit. That way. you lose. or a bank with a local branch. 8) Pay-in-Advance Credit Offers a) The Bait: News that you've been "pre-qualified" to get a lowinterest loan or credit card. and the person you've paid has taken your money and run. c) Your Safety Net: Don't accept a check for more than yo ur selling price. personal. At the last minute. Martinez The Book On Online Safety.A Must Read. but there's no loan. You might get a list of lenders. the so-called buyer (or the buyer's "agent") comes up with a reason for writing the check for more than the purchase price. no matter how tempting the plea or convincing the story. If the buyer sends the incorrect amount. 34 BeginnersGuitarSongs. return the check. But to take advantage of the offer. you may ask for a check drawn on a local bank. offering to pay with a cashier's. call the bank the check was drawn on using the phone number from directory assistance or an internet site that you know and trust. Ask the buyer to write the check for the purchase price.

A Must Read.com Anne K. the fees generally are paid to the lender. but these fees seldom are required before the lender is identified and the application is completed. . not to the broker or person who arranged the "guaranteed" loan. In addition. They may require that you pay application.c) Your Safety Net: Don't pay for a promise. 35 BeginnersGuitarSongs. Legitimate lenders never "guarantee" a card or loan before you apply. or credit report fees. Martinez The Book On Online Safety. appraisal.

Others are vague about the nature of the investment. talk with your creditors about arranging a modified payment plan. misrepresent the significance of a current event. insurance.9) Debt Relief a) The Bait: Emails touting a way you can consolidate your bills into one monthly payment without borrowing. One caution: While a home loan may allow you to consolidate your debt. b) The Catch: Many unsolicited schemes are a good investment for the promoters. repossessions. it's generally considered the option of last resort. Martinez The Book On Online Safety.A Must Read. 10)Investment Schemes a) The Bait: Emails touting "investments" that promise high rates of return with little or no risk.com Anne K. Promoters hype their high-level financial connections. Promoters of fraudulent investments operate a particular scam for a short time. While bankruptcy is one way to deal with serious financial problems. or wipe out your debts. b) The Catch: These offers often involve bankruptcy proceedings. or stress the unique quality of their offering. To close the deal. A bankruptcy stays on your credit report for 10 years. Before resorting to bankruptcy. that they'll guarantee the investment. but they rarely say so. or that they'll buy it back. The reason: it has a long-term negative impact on your creditworthiness. the fact that they're privy to inside information. but stress the rates of return. c) Your Safety Net: Read between the lines when looking at these emails. To top it off. you will likely be responsible for attorneys' fees for bankruptcy proceedings. close down 36 BeginnersGuitarSongs. or even a place to live. stop credit harassment. . tax levies and garnishments. but not for participants. foreclosures. they often serve up phony statistics. a job. and can hurt your ability to get credit. it also requires your home as collateral. One version seeks investors to help form an offshore bank. And they'll almost always try to rush you into a decision. you could lose your home. If you can't make the payments. contact a credit counseling service to help you develop a debt repayment plan. or carefully consider a second mortgage or home equity line of credit.

and quickly spend the money they take in. you may find email messages in your "outbox" that you didn't send.before they can be detected." The consequences can be more than just annoying: your Internet Service Provider (ISP) may shut down your account. or your computer suddenly may operate more slowly or sluggishly. c) Your Safety Net: Take your time in evaluating the legitimacy of an offer: The higher the promised return. and use your computer to send spam — potentially offensive or illegal — to other computers without your knowledge. too. A botnet. they reopen under another name. Don't let a promoter pressure you into committing to a n investment before you are certain it's legitimate." usually is made up of tens or hundreds of thousands of home computers sending emails by the millions. Once on your computer. also known as a "zombie army. First. Computer security experts estimate that most spam is sent by home computers that are controlled remotely. You can help reduce the chances of becoming part of a bot — including limiting access into your computer. B) Botnets. known as a "botnet" for short. It can be difficult to tell if a spammer has installed hidden software on your computer. Hackers and SPAM Hackers and spammers may be using your computer right now. and that millions of these home computers are part of botnets. Martinez The Book On Online Safety.com Anne K. steal your personal information. Spammers can install hidden software on your computer in several ways. they scan the internet to find computers that are unprotected. they can spy on your internet surfing. Hire your own attorney or an accountant to take a look at any investment offer. Often.A Must Read. selling another investment scam." which installs malicious software that could turn your computer into a "bot. You may receive emails accusing you of sending spam. the higher the risk. Sometimes just visiting a website or downloading files may cause a "drive-by download. Computers that are taken over this way often become part of a robot network. install hidden software. Botnets are not inevitable. They invade secretly and hide software to get access to the information on your computer. links or images which. . if you click on or open them. including your email program." Spammers may send you an email with attachments. and then install software through those "open doors. Leaving your inter net 37 BeginnersGuitarSongs. but there are some warning signs.

connection on and unprotected is just like leaving your front door wide open. Secure your computer by: 1) Using anti-virus and anti-spyware software and keeping it up to date . You can download this software from ISPs or software companies or buy it in retail stores. Look for anti-virus and anti-spyware software that removes or quarantines viruses and that updates automatically on a daily basis. 2) Setting your operating system software to download and install security patches automatically. Operating system companies issue security patches for flaws that they find in their systems.

3) Being cautious about opening any attachments or downloading files from emails you receive. Don't open an email attachment — even if it looks like it's from a friend or coworker — unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what it is. 4) Using a firewall to protect your computer from hacking attacks while it is connected to the internet. A firewall is software or hardware designed to block hackers from accessing your computer. A firewall is different from anti-virus protection: while anti-virus software scans incoming communications and files for troublesome viruses, a properlyconfigured firewall helps make you invisible on the internet and blocks all incoming communications from unauthorized sources. It's especially important to run a firewall if you have a broadband connection because the connection is always open. Most common operating system software (including Windows XP and Vista) comes with a built-in firewall, but you may have to enable it. 5) Disconnecting from the internet when you're away from your computer. While anti-virus and anti-spyware software, along with a firewall, are critical protections when you're connected to the Web, they're not foolproof. Hackers just can't get into your computer when it's disconnected from the internet. 6) Downloading free software only from sites you know and trust. It can be appealing to download free software like games, file-sharing programs, customized toolbars, and the like. But remember that many free software applications contain other software, including spyware. 7) Checking your "sent items" file or "outgoing" mailbox for messages you did not intend to send. If you do find unknown messages in your out box, it's a sign that your computer may be i nfected with spyware, and may
38

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

be part of a botnet. This isn't foolproof: many spammers have learned to hide their unauthorized access. 8) Taking action immediately if your computer is infected. If your computer has been hacked or infected by a virus, disconnect from the internet right away. Then scan your entire computer with fully updated anti-virus and anti-spyware software. If you suspect that any of your passwords have been compromised, call that company immediately to change your password.

39

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

Chapter 6
Health Online
Going online can be a convenient way to compare prescription drug prices, research health products and services, and answer health questions. Learn what to look for when you search for health information or consider buying health care products online.

40

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

the same rules apply. Your doctor can tell you about the effectiveness and risks of a health care product.S. Don't trust a website just because it looks professional. Reputable pharmacies should require a prescription. The sites may use official looking seals and logos. you may already know the usual precautions to take — like making sure you have up-to-date security software on your computer (if not. They could even contain dangerous ingredients. have a licensed pharmacist to answer questions. Martinez The Book On Online Safety. you might pay for a prescription and never get your order — or your money — back. but all of that can be faked. read 7 Practices for Computer Security). Follow these tips for being smart and safe when dealing with health informatio n and health care products online: A) Only buy prescription drugs from licensed U.A Must Read. promise money back guarantees. or the wrong dosage. .  Consider the source. When you take your health online. You could end up with products that are fake. and "look" legitimate. U. 41 BeginnersGuitarSongs. Going online can be a convenient way to compare prescription drug prices. What looks like an online pharmacy could be a front for a scammer or identity thief.  Only buy prescription drugs from licensed. and provide a physical business address and phone number. In a health search. research health products and services.Quick Facts Going online can be a convenient way to research health care products and find answers to health-related questions. and so do a few others.  Know who's on the other end. or do some research ahead of your next medical appointment. do some research to find out who you're dealing with. Before you hand over any personal or financial information. pharmacies. always consider who's behind the information.S. and make sure the website is secure. If you've spent much time searching or shopping online. answer health questions. Or. pharmacies. But taking your health online also requires some extra investigative effort on your part.com Anne K. mislabeled.  Talk to your doctor or health professional. expired.

Instead.. and HIV -AIDS. Don't trust a website just because it looks professional or has success stories from "real people.nabp.So how can you tell if you're dealing with a legitimate U. NABP also has a list of online pharmacies that meet extra NABP criteria and have been accredited through its Verified Internet Pharmacy Practice Sites (VIPPS) program.com Anne K. have a licensed pharmacist to answer questions. The products may be called "scientific breakthroughs" or "ancient remedies. as well as how it could affect any medicine you're taking or treatments you're getting. or the people may be actors or models paid to praise the product." or safesounding words like "natural.info has information on each state's board. Reputable pharmacy websites also should require a prescription. . and provide a physical business address and phone number.S." The stories may be made up. check with the state board of pharmacy where it's based. cancer." Scammers can be creative. or that one product will cure a range of conditions. As you look for answers to your health questions. The National Association of Boards of Pharmacy (NABP) at www. D) Talk to your doctor or health professional. the ad might just be for a weight loss pill that says you can lose weight without exercising or changing how you eat.S.A Must Read. multiple sclerosis. you might come across websites or ads for pills or other products that make some pretty big promises." or the ads may use scientific-sounding words like "thermogenesis. Alzheimer's disease. They may say their product will cure a serious condition like arthritis. Martinez The Book On Online Safety. Your doctor can tell you about the risks of a product. ask your doctor about it. and at best a waste of money. pharmacy? To see if a pharmacy is licensed in the U. But the reality is that most of these products are useless. Others are flat-out dangerous to your health. 42 BeginnersGuitarSongs. diabetes. before you think about trying a health product. Or.

and how to minimize the damage quickly by putting a fraud alert on your credit report.com Anne K. Martinez The Book On Online Safety. 43 BeginnersGuitarSongs. .Chapter 7 Identity Theft Identity thieves can steal your money and ruin your credit rating. Learn how to protect your identity.A Must Read. what to do should it be stolen.

and hackers is identity theft. The alert tells creditors to follow certain procedures before they open new accounts in your name or make changes to your existing accounts. 3. spyware.A Must Read.com Anne K. Close any accounts that have been tampered with or established fraudulently. 1-800-525-6285 44 BeginnersGuitarSongs. This is an essential step in claiming your rights. Notifying one of the three nationwide consumer reporting companies is sufficient.com. and to take certain steps quickly to minimize the potential damage from identity theft if your information is accidentally disclosed or deliberately stolen: 1. according to OnGuard Online.com. The three nationwide consumer reporting companies have tollfree numbers for placing an initial 90-day fraud alert. if your personal information is accidentally disclosed or deliberately stolen. File a police report with local law enforcement officials.com. That's why it's important to protect your personal information. .Quick Facts It's important to protect your personal information. 1) Place a "Fraud Alert" on your credit reports. Place a "Fraud Alert" on your credit reports. and review those reports carefully. taking certain steps quickly can minimize the potential for the theft of your identity. credit card number or other personal information without your permission to commit fraud or other crimes. 1-800-680-7289 b) Experian: www. Martinez The Book On Online Safety. a call to one company is sufficient: a) TransUnion: www.transunion. 1-888-EXPERIAN (397-3742) c) Equifax: www. But.equifax. 2. Social Security number. and review the reports carefully. ID theft occurs when someone uses your name.experian. A) Identity Theft: What To Do If Your Personal Information Has Been Compromised The bottom line for online threats like phishing.

com Anne K. and debts on your accounts that you can't explain. d) Keep copies of documents and records of your conversations about the theft. c) Ask for verification that the disputed account has been closed and the fraudulent debts discharged. File a report with law enforcement officials to help you with creditors who may want proof of the crime. . b) Use the ID Theft Affidavit to support your written statement. Close any accounts that have been tampered with or established fraudulently: a) Call the security or fraud departments of each company where an account was opened or changed without your okay. 3) File a police report. 45 BeginnersGuitarSongs. Look for inquiries from companies you haven't contacted. accounts you didn't open. with copies of supporting documents. 2) Close accounts.Placing a fraud alert entitles you to free copies of your credit repor ts. This report will also help you claim your rights as a victim of identity theft. Follow up in writing. Martinez The Book On Online Safety.A Must Read.

46 BeginnersGuitarSongs. Martinez The Book On Online Safety.com Anne K. . bogus escrow services.A Must Read.Chapter 8 Internet Auctions Internet auction sites expand your access to markets for buying and selling merchandise. and check overpayment scams. Learn how to navigate online auctions and recognize potential snags. including late shipments.

and whether you can tolerate it being delivered late. Avoid doing business with sellers you can't identify. Martinez The Book On Online Safety. read each auction site's Terms of Use before using it for the first time — sites may charge fees. .  Know who you're dealing with. Learn what recourse you have if something goes wrong. or shipments of products that aren't the same quality as advertised. Here's how:  Evaluate how soon you need to receive the item you're bidding on. or even not delivered.  Know exactly what you're bidding on.  Carefully consider your method of payment. Don't send cash. or selling some of your stuff? Internet auctions are a great resource for shoppers and sellers.Quick Facts Thinking of bidding in an online auction. or offer different protections.com Anne K. especially those who try to lure you off the auction site with promises of a better deal. Many complaints about internet auction fraud involve late shipments.  Whether you're a buyer or a seller. and don't use a money wiring service.  Don't reply to "phishing" emails: messages that look like they've been sent by an auction website or payment service and ask for your password or other personal information. no shipments. Confirm the seller's telephone number in case you have questions or problems. Read and print a copy of the seller's description of the product closely. Save 47 BeginnersGuitarSongs. but you need to watch out for some pitfalls. follow different rules. especially the fine print.A Must Read.

Most complaints involve sellers. 2. Other sites charge a fee only when an item is sold. the buyers are the subject. those dealing with online auction fraud consistently rank near the top of the list. but in some cases. 3. Many sellers set a time limit on bidding and. and review any information the site offers. Keep your password to yourself. your bank account. whether the item is sold or not. In these auctions. Some sites require sellers to agree to pay a fee every time they conduct an auction. they give sellers a global s torefront from which to market their goods. If you share it. Martinez The Book On Online Safety. Role of the Auction Site. buyers and sellers should read the Terms of Use.A Must Read. another person could access your account and buy or sell items without your knowledge. Most internet auction sites require buyers and sellers to register and obtain a "user account name" (or "screen name") and password before they can make bids or place items for bid.copies of all emails you send and receive from the auction site or seller. A) How Internet Auctions Work — Rules of the Marketplace 1. Most internet auction sites specialize in person-to-person activity where individual sellers or small businesses sell their items directly to consumers. The complaints generally deal with late shipments. no shipments. Before using an internet auction site for the first time. . Internet auction sites give buyers a "online" flea market with new and used merchandise from around the world. and often. BeginnersGuitarSongs. Whether you're a buyer or a seller. The Auction. That could damage your online reputation — and eventually. But the online auction business can be risky business. in some cases. and fraudulent dealers who lure bidders from legitimate auction sites with seemingly better deals. too. or shipments of products that aren't the same quality as advertised. Fees.com wants to help buyers and sellers stay safe on internetauction websites. Among the thousands of consumer fraud complaints reported every year. understanding how internet auctions work can help you avoid most problems. Registration. 4. a "reserve price" — the lowest price they will accept for an 48 BeginnersGuitarSongs. the site will not take responsibility for any problems that may arise between buyers and sellers.com Anne K. bogus online payment or escrow services. the seller — not the site — has the merchandise.

Be aware of "phishing": emails sent to you asking for your password or other personal information that look like they've been sent by an auction website or payment service. don't cut and paste the link from the message into your internet browser. Sometimes.item. or escrow service. phishers often make links look like they go to one site.com Anne K. If you get an email or pop-up message that asks for personal or financial information. personal check. 2. without bidding. the buyer and seller communicate — usually by email — to arrange for payment and delivery. A buyer can choose to purchase the item for the price the seller has set. When the bidding closes at the scheduled time. cashier's check. Martinez The Book On Online Safety. Some auction sites allow sellers to set a price at which a buyer can purchase the item without competing with other bidders. Legitimate companies don't ask for this information via email. the seller limits the types of payment accepted and posts that information in the auction 49 BeginnersGuitarSongs. do not reply. C) Payment Options Successful bidders can choose among many options to pay for an item they have bought on an internet auction — credit card. And don't click on the link in the message. either. . the item is sold to the highest bidder. debit card. but actually send you somewhere else. In any case. money order. If no one bids at or above the reserve price. After the Auction: Arranging to Pay and Deliver Merchandise. At the end of a successful auction. online payment service (which often accepts credit card payments). these emails are fishing for your information and are coming from someone who wants to hack into your account. If you are concerned about your account. B) Phishing 1. the auction closes without the item being sold. Usually. 5. contact the organization mentioned in the email using a telephone number you know to be genuine.A Must Read. or open a new internet browser session and type in the company's correct Web address yourself.

find a different service or use another method of payment. 2. some auction sites now prohibit the use of wire transfers as a method of payment. the buyer tells the online payment service to direct appropriate funds to the seller. Personal Check. 3. Martinez The Book On Online Safety. Some online payment services offer protections to buyers if the seller fails to ship the goods or ships goods that are not as described in the auction. To complete a transaction. Online payment services are popular with both buyers and sellers. Online Payment Services. Credit cards are a safe option for consumers to use when paying for items bought on an internet auction: They allow buyers to seek a credit from the credit card issuer (also known as a "charge back") if the product isn't delivered or isn't what they ordered. Debit Card. and sellers give information about where payments should be deposited. They allow buyers to use a credit card or electronic bank transfer to pay sellers. or Money Order.com Anne K. then charge back rights may not apply. sellers do not have to create an account with the online payment service to receive funds. If you cannot find out what will happen if you need a refund. if a buyer uses a credit card to pay for goods or services through an online payment service.A Must Read. charge back rights are available to the buyer who uses the credit card. 1. To use an online payment service. like bank account or credit card numbers. However. . Cashier's Check. Many smaller sellers accept forms of payment that are cash equivalents. the buyer and seller generally set up accounts that allow them to make or accept payments. not the seller. personal checks. but some payment services charge the buyer. or if you don't understand how the payment service works from reading the website. Usually. if the service considers the transfer of funds to be a method of sending cash rather than paying for goods. They also may protect buyers from unlawful use of their credit cards or bank accounts because the online payment service holds the account information. To protect both buyers and sellers. Many sellers prefer online payment services because the services tend to provide more security than. Higher volume sellers often accept credit cards directly. Credit Cards. Buyers 50 BeginnersGuitarSongs. Buyers should read the terms under which the protections apply. say. Most online payment services charge the seller to receive the funds. Buyers provide payment information. These sellers often wait to receive the payment (and may wait for a personal check to clear) before shipping the item. The seller then gets immediate access to the funds. In some cases. Many sellers require receipt of a cashier's check or money order before they send an item.listing.

If a buyer intends to rely on a seller's bonded status or the seller's insurance to protect against fraud. some auction sites now prohibit the use of wire transfers as a method of payment. check. If a problem arises with a bonded seller. Wire Transfers. the escrow service forwards the payment to the seller. reputable company. they should be suspicious of checks or money orders for amounts that exceed the price of the merchandise. the buyer usually has to engage in a dispute resolution process with the seller before being able to submit a claim to the bonding or insurance company. The primary purpose of online escrow services is to protect buyers and sellers from fraud. If something goes wrong with the transaction. to protect both buyers and sellers. money order or credit card — until he receives and approves the merchandise.com recommends that buyers not wire money (via a money transmitter or directly to a seller's bank account). or jewelry. 5. Online Escrow Services and Bonding Services. . The buyer pays the fee for an online escrow service — generally a percentage of the cost of the item. Buyers should be suspicious of sellers who insist on wire transfers as the only form of payment they will accept. Before using an escrow service. buyers should consider using an escrow service or purchasing from a bonded or insured seller to protect their funds. you most likely will lose your payment and not have any recourse. sellers should ensure that checks and money orders they receive from buyers are legitimate before shipping the goods. Then. Martinez The Book On Online Safety. cars. 51 BeginnersGuitarSongs. In fact. cash equivalents (and wire transfers) cannot be reversed if something goes wrong. Unlike credit cards or some online payment services. Some sellers may state that they are bonded or otherwise insured against fraud. BeginnersGuitarSongs. he should investigate the legitimacy of the bonding or insurance company and then make sure that the seller really is a member of — or certified by — that company. For big-ticket items like computers.com Anne K. Escrow services accept and hold payment from a buyer — often a wire transfer. At the same time.should use this type of payment only when they trust the seller. 4. both the buyer and the seller should verify that it is a legitimate.A Must Read.

A Must Read. can't get any money back.com Anne K. including: a) "Bid siphoning. The buyer never receives the promised goods." when con artists offer losing bidders of a closed auction a second chance to purchase the item that they lost in the auction. 2. Send something of lesser value than advertised. Once buyers provide the escrow service with their payment information. the escrow service doesn't hold the payment: It is sent directly to the so-called seller. 52 BeginnersGuitarSongs. can't locate the seller. feedback forms." when fraudulent sellers or their partners. . 3. Fail to send the merchandise. such as insurance. or guarantees. b) "Second c) "Shill d) "Bid Escrow Service Complaints. buyers lose any protections the original site may provide. Fail to disclose all relevant information about a product or terms of the sale. Second-chance buyers lose any protections the original site may provide once they go off-site. Some buyers experience other problems. chance offers. then retract their bids so that people they know can get the item at a lower price.D) Types of Fraud Most people who complain about internet auction fraud report problems with sellers who: 1. Another type of fraud occurs when sellers or buyers pose as escrow services to improperly obtain money or goods. bidding. shielding. The so-called seller puts goods up for sale on an internet auction and insists that prospective buyers use a particular escrow service. By going off-site. They intend to trick consumers into sending money without delivering the item." when con artists lure bidders off legitimate auction sites by offering to sell the "same" item at a lower price. and." when fraudulent buyers submit very high bids to discourage other bidders from competing for the same item. 4. because the escrow service was part of the scheme. known as "shills. Martinez The Book On Online Safety." bid on sellers' items to drive up the price. Fail to deliver in a timely manner.

. The escrow service tricks the seller into sending the me rchandise and doesn't send the payment or return the goods to the seller.In some cases. leaving you liable for the entire amount. In either case. The checks were counterfeit. insists that the seller use a particular escrow service. a fraudster poses as a buyer and.A Must Read. or comes up with another reason for writing the check for more than the purchase price. or corporate check to pay for the item you're selling. A buyer might offer to use a cashier's check. Sometimes. the buyer sends a fake check or money order that exceeds the cost of the item that has been purchased. E) Fake Check Scams Target Sellers Sellers can be victims of fraud when buyers send fake checks or money orders that are detected by the bank only after the seller has shipped the goods." Later. learn that it has cleared. 53 BeginnersGuitarSongs. You deposit the check. the buyer asks you to wire back the difference after you deposit the check. after placing the highest bid on an item. Martinez The Book On Online Safety.com Anne K. The so-called buyer (or the buyer's "agent") states that he made a mistake. personal check. but good enough to fool unsuspecting bank tellers. and wire the funds back to the "buyers. the bank determines that the check is fraudulent.

Try to determine the relative value of an item before you bid. look at it. Before Bidding a. Get the seller's telephone number as another way to get in touch. Martinez The Book On Online Safety. take it. not authentic. Look for words like "refurbished. efficient. Become familiar with the auction site. Read the fine print. especially those who try to lure you off the auction site with promises of a better deal." "close out. and if a photograph is posted. Be skeptical if the price sounds too low to be realistic. online auctions remain a fun." or "off-brand" — especially when shopping for computer or electronic equipment — to get a better idea of the condition of the item. . or not what the seller claims. Avoid doing business with sellers you can't identify." "discontinued. Find out all you can about the seller. Some auction sites post feedback ratings of sellers based on comments by other buyers. Altho ugh these comments and ratings may give you some idea of how you'll be 54 BeginnersGuitarSongs. Read the seller's description of the item or service. "Brick-andmortar" stores and price comparison sites may be good for reality checks. Check them out. Don't trust emails alone.com Anne K. Dial the number to confirm that it is correct. Find out what protections the auction site offers buyers. d. Some fraudulent sellers have used forged email headers that make follow-up difficult. Know exactly what you're bidding on. b. Sometimes this information and other important terms are in a contract that may be found by following a hyperlink in the listing to the seller's online store. Here's how: 1. c.A) Tips for Buyers Despite complaints of fraud. Never assume that the rules of one auction site apply to another. f. e. and relatively safe way to shop — if you act prudently. If the site offers a stepby-step tutorial on the bidding process. Some sites provide free insurance or guarantees for items that are not delivered.A Must Read. if not impossible. It may save you frustration and disappointment later.

Many sellers don't have the expertise or facilities to provide services for the goods they sell. Email or call the seller if you have any questions. 3.A Must Read. a seller may build up his reputation by selling many low cost items before making fraudulent sales of higher cost items. and whether follow-up service is available if you need it. Some auction sites bar "non-paying" bidders. j. Print and save every email you send and receive from the auction company or the seller. 2. Can you return the item for a full refund if you're not satisfied with it? If you return it. Martinez The Book On Online Safety.treated. i. Check on the seller's return policy. check with the seller before you bid. Protect your identity. date. Find out who pays for shipping and delivery . Consider whether the item comes with a warranty. Print the seller's identification. you're obligated to follow through with the transaction. the item description. This can help ensure that you get a fair price and protect you from "shill bidding. also known as "deadbeats. Before Paying a. Generally. sellers specify the cost of shipping and give buyers the option for express delivery at an additional cost. Don't place any bids until you get straight — and satisfactory — answers. Save all transaction information. b. are you required to pay shipping costs or a restocking fee? Sometimes the return policy is found in the listing. be sure you're willing to forfeit that protection before placing a bid. In other cases. comments sometimes are submitted by the seller or "shills" paid by the seller. and price of your bid." Don't bid on an item you don't intend to buy. g. If this is the case with your seller. 55 BeginnersGuitarSongs. and the time. h. . When Bidding a. If you're the highest bidder." from future bidding. Establish a top price and stick to it. but other times you may have to access it by following a hyperlink in the listing to the seller's online store. If you're uncertain about shipping costs.com Anne K.

Be suspicious of any site that is generally of poor quality with misspelled words or claims that it is affiliated with the government. find out whether it offers buyers any recourse if sellers don't keep their end of the bargain. b1. Examine the online payment and escrow service's privacy policy and security measures.Never provide your Social Security number or driver's license number to a seller. Never wire money to a person you don't know or whose identity you can't verify.A Must Read. and who is responsible for paying for credit card charge backs or transaction reversal requests. Know what form of payment the seller accepts. it might try to recover its loss from you. b2. Protect your funds.com Anne K. b5. Before you agree to use any online payment or escrow service. Check with the Better Business Bureau. or bank account to use just for your online transactions. Don't provide your credit card number or bank account information until you check out the seller and the online payment or escrow service. or consumer protection agency — where you live and where the online payment or escrow service is based — to see whether there are any unresolved complaints against the service. Legitimate escrow services never do this. decide whether you're willing to risk sending your payment before you receive the product. If it's an online payment service. If the seller accepts only cashier's checks or money orders. If the online payment service cannot recover the loss from the seller. Call the customer service line. and how it will be safeguarded. consider reserving a separate credit card. Never disclose financial or personal information unless you know why it's being collected. If there isn't one — or if you call and can't reach someone — don't use the service. whether it prevents sellers from accessing their funds if buyers are not satisfied with the product. check it out. b. using the credit card or bank account information in its file. Visit its website. how it will be used. state attorney general. b4. A lack of 56 BeginnersGuitarSongs. If the seller insists on using a particular escrow or online payment service you've never heard of. and ensure their legitimacy. . read the service's terms of agreement. if you're using one. stored-value card. Be suspicious of an online escrow service that cannot process its own transactions and requires you to set up accounts with online payment services. b3. To limit your exposure. Martinez The Book On Online Safety.

some auction sites have further prohibitions on sales of other items. 2) Advertising Your Product a. There's much truth to the saying that "a picture is worth a thousand words. f. c. When describing your item and its condition. state whether it's new. include a photograph of the item. the responsibility for ensuring that a sale is legal rests with the seller and buyer.A Must Read. Martinez The Book On Online Safety. including who's responsible for paying shipping costs or restocking fees if the item is returned. or reconditioned. 57 BeginnersGuitarSongs. Specify who will pay for shipping. you're required to advertise your product or service and the terms of the sale honestly and accurately. ." d. State your return policy. You can't place "shill" bids on your item to boost the price or offer false testimonials about yourself in the comment section of internet auction sites. When possible.complaints doesn't mean that a service doesn't have any problems. Some auction sites post a list of prohibited items. b.com Anne K. used. Many scammers change their company names often. Specify the minimum bid you're willing to accept. e. While many auction sites monitor to ensure that illegal items are not being offered. and whether you'll ship internationally. Know Your Legal Obligations a) Under federal law. B) Tips for Sellers 1. Anticipate questions buyers might have and address them in the description of your item or service. b) You're prohibited from auctioning illegal goods.

and the date. If it's an online payment service.A Must Read. c. If a buyer insists on using a particular escrow or online payment service that you've never heard of. Respond as quickly as possible to bidders' questions about the item you're auctioning or the terms of the sale.com Anne K. including shipping charges. read the terms of agreement. d. how it will be used. 4) Arranging for Payment a. 3) Dealing with Bidders a. If the service claims to be affiliated with a government agency. Before agreeing to use an online payment or escrow service. Martinez The Book On Online Safety. Examine the service's privacy policy and security measures. time. print all information about the transaction. don't use the service. If you accept credit card payments from the buyer directly. b. Contact the successful buyer as soon after the auction closes as possible. check it out by visiting its website or calling its customer service line. or if you call and can't reach someone. When the auction closes. a description of the item. that's a sign of a scam. Save a copy of every email you send and receive from the auction site or the successful bidder. b. tell them where they can get it. but that requires you to set up accounts 58 BeginnersGuitarSongs. If there isn't one. Let prospective bidders know whether you provide follow-up service. and price of the bid. e. including the buyer's identification. c. and tell the buyer where to send payment. find out who pays for credit card charge backs or transaction reversal requests if the buyer seeks them. if you don't. bill the credit card account only after you've shipped the product. Don't use an online escrow service that does not process its own transactions. . Never disclose financial or personal information unless you know why it's being collected. and how it will be safeguarded.g. confirm the final cost.

Check with the Better Business Bureau. and the buyer asks that you wire the excess funds back to him or to a third party.with online payment services. Legitimate escrow services never do this. call the person who wrote the check to verify that they have authorized it. . f. 5) Look Out for Fraudulent Checks or Money Orders a. That way. and do not ship the merchandise. you can make a personal visit to make sure the check is valid. state attorney general or consumer protection agency — where you live and where the online payment or escrow service is based — to see whether any unresolved complaints are on file against the service. do not wire the money. If you accept payment by check. ask for a check drawn on a local bank. or a bank with a local branch. not from the person who gave you the check. If you are suspicious about a check because it is written by a third party or for any other reason. Instead. 59 BeginnersGuitarSongs. b. Sometimes. But remember that a lack of complaints doesn't guarantee that the service has no prob lems.A Must Read. If you receive a check or money order for an amount that exceeds the successful bid. Martinez The Book On Online Safety. your bank may not alert you that a fake check or money order has been returned until after you have shipped the merchandise. If that's not possible. Get the bank's phone number from directory assistance or an internet site that you know and trust.com Anne K. return the check to the buyer. call the bank the check was drawn from and ask if it is valid.

Martinez The Book On Online Safety. 60 BeginnersGuitarSongs. Learn more about your rights as a parent and what you can do to help your kids make smart.Chapter 9 Kids' Privacy One of the many choices kids face online is how to deal with their personal information.A Must Read. . safe choices online.com Anne K.

websites need your okay before they're allowed to collect personal information from your kids.to you. Any website for kids under 13. 5. 6. In many cases. it's likely your kids are spending time online. Talk to your child about the risks and benefits of disclosing certain information. sites also have to post privacy policies that give details about what kind of information they collect from kids — and what they might do with it (say.com Anne K. The Children's Online Privacy Protection Act – COPPA – gives parents control over what information websites can collect from their kids. Martinez The Book On Online Safety. play games or learn something new. Under COPPA. or any general site that collects personal information from kids it knows are under 13. ask about them. with only a few exceptions. Thanks to COPPA. Fortunately. or cell phone number.Quick Facts Your kids' personal information and privacy are valuable . 4. address. or give the 61 BeginnersGuitarSongs. chances are that you're spending time thinking about ways to make sure they make smart and safe choices when they do. you have the right to have a site delete any personal information it has about your child. is required to comply with COPPA. Whether to study or socialize. And as a parent. there are ways you can safeguard that privacy when your kids are online. Personal information includes your child's full name. That goes for information sites ask for up-front. and to marketers. Ask questions. 2. Know your rights. email address. and information your kids choose to post about themselves. to send a weekly newsletter. which should say what the site does with the information it collects. For example. direct advertising to them. to them. and see what kind of information the sites ask for or allow kids to post. Then you can decide how you feel about it. Among the many choices they're faced with online is how to deal with their personal information. as a parent.A Must Read. . especially in a public forum. 3. 1. If you're not clear on a site's practices or policies. Take a look at the privacy policy. Check out sites your kids visit. sites have to get a parent's permission if they want to collect or share your kids' personal information. Be selective with your permission.

ask about them. 2) Take a look at the privacy policy. 4) Be selective with your permission. see what kind of information it asks for and whether you're comfortable with what they tell you. they'll need to make sure you really are the parent. you may give your consent by allowing them to charge your credit card. to them. the privacy policy has to include contact information for the site manager. In addition to considering when to give your permission. the privacy policy must say what that company will do with it. Remember.com Anne K. If you're not clear on a site's practices or policies. or by verifying a charge made to your 62 BeginnersGuitarSongs. Links to the policies should be in places where they're easy to spot.information to other companies). either by requiring a signed form or an email wi th a digital signature. then. You might be able to give the company permission to collect some personal information from your child. 3) Ask questions. Just because a site has a privacy policy doesn't mean it keeps personal information private. Here's how to help protect your kids' personal information when they're online. As a parent. like clearly posting its privacy policy for parents and asking for parental consent before kids can participate. talk to your child about the risks and benefits of disclosing certain information in a public forum. for example. it's not all or none. including by email or postal mail. You also can see whether the site appears to be following the most basic COPPA requirements. If a site plans to share the child's information with another company. The policy should tell you what the site does with the information it collects. 5) Know your rights. consider how much consent you want to give — in many cases. . there are no limits. If the site allows kids to post information about themselves. but say no to having that information passed along to another marketer. In many cases. If a site requiresusers to register. websites need your okay before they're allowed to collect personal information from your kids. Some sites will let you see the information they've collected. you can decide how you feel about it. you have the right to have a site delete any personal information it has about your child. But first. If the site falls under COPPA. They may ask for your permission in a number of ways. Martinez The Book On Online Safety. and to marketers.A Must Read. if the policy says there are no limits to what it collects or who gets to see it. Or. A) What Can You Do? Your kids' personal information and privacy are valuable — to you. 1) Check out sites your kids visit.

com Anne K. Talk with your kids about the sites they like to visit. 3) Know what sites your kids go to.A Must Read. Even if they delete the information from a site. 6) Know how your kids get online. One option is to check your browser history and temporary files. and what information might be appropriate for sharing. Be sure your kids know what your family has decided is okay — and not okay — to divulge online. older versions may exist on other people's computers and be circulated online. 4) Make agreements.credit card. as well as through cell phones and game consoles. On the other hand. Make sure your kids know what information should be private. and texting on cell phones. Visit the GetNetWise website to learn more. also remind your kids that once they post information online. other plans allow kids to use those features at certain times of day. Do some exploring on your own to get to know how the sites work and what privacy settings and controls they offer. B) More Tips For Parents 1) Talk. 5) Let your kids know you'll keep an eye on the sites they visit. they can't take it back. Know what limits you can place on your child's cell phone — some companies have plans that limit downloads. Martinez The Book On Online Safety. You also have a right to take back your consent and have any information collected from your child deleted. and posting them where everyone can see them. 2) Depending on what they do online. sharing some personal information may allow them to participate in certain activities or to get emails about promotions and events they're interested in. . though keep in mind that older kids may know how to delete these files or keep them from getting recorded. Consider writing down a list of the rules your family has agreed on. internet access. and talk often. check to see what privacy settings your browser offers or consider software that offers a range of controls. Check out what parental controls are available on the gaming consoles your kids use. When they give out their personal information. 63 BeginnersGuitarSongs. If you’d like more controls. whether it's with a marketing message or something more personal. as well. they give up control of who can reach them. Kids may get online using your family computer or someone else's.

.com Anne K. helping you work no matter where you are.Chapter 10 Laptop Security Your laptop is your desk-on-the-go. Learn how to keep your laptop out of the hands – and off the lap – of a stranger.A Must Read. Martinez The Book On Online Safety. 64 BeginnersGuitarSongs.

but you need to take some steps to keep your laptop safe–and in your possession. Keep it off the floor…or at least between your feet. It enables you to work from home. . you may lose more than an expensive piece of hardware. turn it on. if your data protections aren't up to par. Here are some things you can do to keep track of your laptop: 1. You update your antivirus software. Get it out of the car…don't ever leave it behind. Pay attention in airports…especially at security. 6.A Must Read. A) Keeping Laptops From Getting Lost or Stolen A laptop computer defines convenience and mobility. You encrypt your data. No one thinks their laptop will be stolen– at least not until they find the trunk of their car broken into. notice that their laptop isn't 65 BeginnersGuitarSongs. Don't leave it "for just a sec"…no matter where you are. Chances are you've heard stories about stolen laptops on the news or from friends and colleagues. that sensitive and valuable information in yo ur laptop may be a magnet for an identity thief. Martinez The Book On Online Safety. 4. a hotel room. and you're too smart to fall for those emails that ask for your personal information. a conference hall. Use bells and whistles…if you've got an alarm. Keep it locked…use a security cable. or a coffee shop. 7. 8.Quick Facts Thinking of taking your laptop on the road? It's a great way to work and stay in touch when you're out and about. Keep passwords separate…not near the laptop or case. If it does. You protect your information with a strong password. Maybe you've taken steps to secure the data on your laptop: You've installed a firewall. Treat it like cash. The fact is.com Anne K. But what about the laptop itself? A minor distraction is all it takes for your laptop to vanish. 5. 3. 2.

Don't leave your laptop unguarded – even for a minute. a coffee shop. OnGuardOnline suggests keeping these tips in mind when you take your laptop out and about: 1. Martinez The Book On Online Safety. Treat your laptop like cash. a padded briefcase or a backpack instead. If you must put it down." Your conference colleagues seem trustworthy. so that you're aware of it. Don't leave your laptop in the car – not on the seat. No matter where you are in public – at a conference. However. Don't leave it "for just a minute. Use a laptop security cable: attach it to something immovable or to a heavy piece of furniture that's difficult to move – say. 4.com Anne K. When you take your laptop on the road. a table or a desk. don't help them by leaving your laptop unattended. or at least use a cable to secure it to something heavy. 66 BeginnersGuitarSongs. Keep a careful eye on your laptop just as you would a pile of cash. leaving either in a laptop carrying case or on your laptop is like leaving the keys in your car. or get a refill at the local java joint only to turn around and find their laptop gone. Whether you're using your laptop in the office. Take it with you if you can. 2. Consider using a suitcase. Mind the bag. 6. That said. . so you're comfortable leaving your laptop while you network during a break. place it between your feet or at least up against your leg. would you turn your back o n it – even for just a minute? Would you put it in checked luggage? Leave it on the backseat of your car? Of course not. 5. If you had a wad of money sitting out in a public place. or some other public place. Remembering strong passwords or access numbers can be difficult. if you must leave your laptop behind. Get it out of the car. Keep your passwords elsewhere. carrying it in a computer case may advertise what's inside. a security device can make it more difficult for someone to steal it. a hotel. Keep it locked. Parked cars are a favorite target of laptop thieves. keep it out of sight.waiting at the other side of airport security. 7. Keep it off the floor. or a registration desk – avoid putting your laptop on the floor. not in the trunk. There's no reason to make it easy for a thief to get to your personal or corporate information.A Must Read. so you ask them to keep an eye while you use the restroom. The people at the coffee shop seem nice. 3.

Be vigilant in hotels. report it immediately to the local authorities. consider hanging the "do not disturb" sign on your door. Depending on your security needs. Or consider a kind of "lo -jack" for your laptop: a program that reports the location of your stolen laptop once it's connected to the internet. B) If Your Business Laptop Has Been Lost Notify the local police and immediately report it to your employer. Try not to leave your laptop out in your room. If you're using a security cable to lock down your laptop. If it's your business laptop that's missing. Some laptop alarms sound when there's unexpected motion.8. an alarm can be a useful tool. If your laptop is stolen. Rather. If you stay in hotels.A Must Read. or when the computer moves outside a specified range around you. use the safe in your room if there is one. 11. Hold onto it until the person in front of you has gone through the metal detector – and keep an eye out when it emerges on the other side of the screener. Where to turn for help. Pay attention in airports. Use bells and whistles. Keep your eye on your laptop as you go through security. 67 BeginnersGuitarSongs. Martinez The Book On Online Safety.com Anne K. also immediately notify your employer. . The confusion and shuffle of security checkpoints can be fertile ground for theft. a security cable may not be enough. 10. 9.

Learn the signs of malware and how to reclaim your computer and the information it stores.A Must Read.Chapter 11 Malware Criminals sometimes use malware – programs like viruses and spyware – to get into your computer. send spam. . Martinez The Book On Online Safety. they use it to steal information. Once it's there. and commit fraud. 68 BeginnersGuitarSongs.com Anne K.

and other online activities that involve user names. and compelling s tories to lure you to links that will download malware. But you can minimize the havoc that malware can wreak and reclaim your computer and electronic information. desirable downloads. deleting anything the program identifies as a problem. passwords. and commit fraud. Criminals are hard at work thinking up creative ways to get malware on your computer. . and a firewall. and compelling stories to lure you to links that will download malware – especially on computers that don't use adequate security software." includes viruses and spyware to steal personal information. banking. desirable downloads.com Anne K. If you suspect your computer is still infected. they use the malware to steal personal information. At a minimum. think about how malware could have been downloaded to your machine. Confirm that your security software is active and current. 3. 4. Malware is short for "malicious software. your computer should have anti-virus and anti-spyware software. send spam. If you suspect malware is on your computer: 1. Once your computer is back up and running. Criminals create appealing websites.Quick Facts Malware. 69 BeginnersGuitarSongs. you may want to run a second anti-virus or anti-spyware program – or call in professional help. especially on computers that don't use adequate security software. short for "malicious software. Stop shopping. Once your security software is up-to-date. run it to scan your computer for viruses and spyware. 2. 5." it includes viruses – programs that copy themselves without your permission – and spyware. Then. and commit fraud. They create appealing web sites.A Must Read. and what you could do to avoid it in the future. programs installed without your consent to monitor or control your computer activity. or other sensitive information. send spam. Martinez The Book On Online Safety.

It doesn't have to be that way. BeginnersGuitarSongs.com says consumers can minimize the havoc malware can wreak, and reclaim their computers and their electronic information.

Computers may be infected with malware if they: 1. Slow down, malfunction, or display repeated error messages 2. Won't shut down or restart 3. Serve up a lot of pop-up ads, or display them when you're not surfing the web 4. Display web pages or programs you didn't intend to use, or send emails you didn't write.

If you suspect malware is lurking on your computer, stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. Malware on your computer could be sending your personal information to identity thieves. Then, confirm that your security software is active and current: at a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. You can buy stand-alone programs for each element – or a security "suite" that includes these programs – from a variety of sources, including commercial vendors or from your Internet Service Provider. Security software that comes pre installed on a computer generally works for a short time unless you pay a subscription fee to keep it in effect. In any case, security software protects against the newest threats only if it is up-to-date. That's why it is critical to set your security software and operating system (like Windows or Apple's OS) to update automatically.

Once you confirm that your security software is up-to-date, run it to scan your computer for viruses and spyware. Delete everything the program identifies as a problem. You may have to restart your computer for the changes to take effect. If you suspect that your computer still is infected, you may want to run a second anti-spyware or anti-virus program. Some computer security experts recommend
70

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

installing one program for real-time protection, and another for periodic scans of your machine as a way to stop malware that might have slipped past the first program. Finally, if the problem persists after you exhaust your own ability to diagnose and treat it, you might want to call for professional help. If your computer is covered by a warranty that offers free tech support, contact the manufacturer. Before you call, write down the model and serial number of your computer, the name of any software you've installed, and a short description of the problem. Your notes will help you give an accurate description to the technician. If you need professional help, if your machine isn't covered by a warranty, or if your security software isn't doing the job properly, you may need to pay for technical support. Many companies – including some affiliated with retail stores – offer tech support via the phone, online, at their store, or in your home. Telephone or online help generally are the least expensive ways to access support services – especially if there's a toll-free helpline – but you may have to do some of the work yourself. Taking your computer to a store usually is less expensive than hiring a technician or repair person to come into your home. Once your computer is back up and running, think about how malware could have been downloaded to your machine, and what you could do to avoid it in the future. If your security software or operati ng system was out-of-date, download the newest version and set it to update automatically. Use the opportunity to back up important files by copying them onto a removable disc. Other ways to minimize the chances of a malware download in the future:
1.

Don't click on a link in an email or open an attachment unless you know who sent it and what it is. Links in email can send you to sites that automatically download malware to your machine. Opening attachments – even those that appear to come from a friend or co-worker – also can install malware on your computer. Download and install software only from websites you know and trust.Downloading free games, file-sharing programs, and customized toolbars may sound appealing, but free software can come with malware. Talk about safe computing. Tell your kids that some online activity can put a computer at risk: clicking on pop-ups, downloading "free" games or programs, or posting personal information.

2.

3.

Finally, monitor your computer for unusual behavior. If yo u suspect your machine has been exposed to malware, take action immediately. Report problems with malware to your ISP so it can try to prevent similar problems and alert other subscribers.
71

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

Chapter 12
Online Dating Scams – Overview
Millions of Americans use online dating and social networking sites to meet people. But scammers also use these sites – as well as chat rooms. They create fake profiles to find potential victims and attract attention.

72

BeginnersGuitarSongs.com

Anne K. Martinez

The Book On Online Safety- A Must Read.

hospital bills for a child or other relative. but is prevented by a traumatic event. others who secured their trust through passionate and intimate conversation. for help in recovering from a temporary financial setback.S..Here are some tips to help you identify scam artists who are in it for the money rather than the relationship.com Anne K. Online Dating Scams: When Love Goes Wrong Millions of Americans use online dating and social networking sites to meet people. 73 BeginnersGuitarSongs. Martinez The Book On Online Safety. but just until a big business deal takes place. who they can convince to send money in the name of love. like make a purchase online or forward a package to another country.S. But scammers also use these sites – as well as chat rooms. The agency cautions people active on dating sites to use their heads as well as their hearts. Some scammers even make wedding plans. visas or other official documents. . medication. He wants to leave the dating site immediately and use your personal email or IM. They create fake profiles to find potential victims and attract attention. Somtimes online romance can be a fantasy. 3. Often claiming to be out of the country for business or military service. perpetrated by scam artists who are in it for the money rather than the relationship. 2. It can be tough to tell if your sweetie's heart is in the right place. and still others who took a more deliberate approach with months of patient wooing before asking for money. these scammers asked their love interests to wire money. People have reported scammers who professed undying love and affection at warp speed. He claims to be from the U.A Must Read. but is currently overseas. the pretenders may have talked about an urgent need for money for travel. She claims love in a heartbeat. 4. Some asked their victims to do them a favor. She plans to visit. usually to a location outside the U. Scammers look for targets of any age and in any location. or for a loan. Eventually. Here are some clues that it's not: 1.

a robbery. along with the person you thought you knew. It can be heartbreaking to think of being so disappointed by someone you thought you knew.The requests for money generally do not stop. for another hospitalization. Regardless of how convincing the story. you can count on more: money for an airline ticket. If you respond once. but it doesn't have to bankrupt you. . Martinez The Book On Online Safety. 74 BeginnersGuitarSongs. too. you can't get it back. Wiring money is the same as sending cash: once it's gone. or for replacement funds for money lost during a mugging. the money will be gone.A Must Read. or detention in another country.com Anne K. the bottom line is this: if you send money to someone you haven't met.

the rules say." Learn more about the relationship between risk and reward. .com Anne K.Chapter 13 Online Investing While the internet features investment opportunities. and hackers. and identity thieves who use investment opportunities to wreak havoc on your personal finances. 75 BeginnersGuitarSongs. Martinez The Book On Online Safety.A Must Read. scammers. "caveat investor.

But hackers and identity thieves can wreak havoc on your personal finances unless you take steps to protect the security of your account numbers. If your firewall was shipped in the "off" mode. If you get an email or pop-up message asking for personal information. Turn to unbiased sources when researching investments. such as the U. 3. It's valuable. And investment opportunities that sound like no-brainers all too often turn out to be frauds.com Anne K. over email. your state securities regulator. and don't share them on the internet. A) Securing Your Information The internet serves as a powerful tool for investors. BeginnersGuitarSongs. Keep passwords in a secure place. Fraud artists often float false information and "hot tips" as part of their efforts to rip-off investors or manipulate the market for a particular security. and a firewall.S. and use extra caution when using your own computer in a wireless "hot spot. But the internet is not fail-safe. or on the phone. Avoid using public or other shared computers to access your financial accounts online. Protect your passwords for your online investment accounts. Martinez The Book On Online Safety. or bulletin boards. . don't reply or click on the 76 BeginnersGuitarSongs. Use anti-virus and anti-spyware software. and securities industry self-regulatory organizations (including FINRA. and PINs. 2. passwords.A Must Read." Don't believe everything you read in online newsletters. and Nasdaq).com suggests these tips to help you invest wisely online: 1. 5. 4. Amex. Protect your personal information. be sure to turn it on and set it up properly. To invest wisely online: 1. investing blogs. Securities and Exchange Commission. and keep them up-to-date.Quick Facts The internet allows investors to access account information 24/7. initiate securities transactions from virtually anywhere. and quickly and inexpensively research investment opportunities.

check that both programs will update automatically. your login name. 2. d. and you don't want to risk downloading a virus or piece of spyware that can log your key-strokes when you type in an account number. Look for anti-virus software that removes or quarantines viruses. the tougher it is for a hacker to figure it out. Unfortunately. These programs are a must-have if you make financial transactions online. b. Protect your passwords. over email. password. Changing your passwords regularly (at a minimum. and keep them up-to-date. Use anti-virus and anti-spyware software. be sure to position yourself so that no one can see your hands or your screen as you type your PIN or password. every 90 days). Martinez The Book On Online Safety. or on the phone. some scammers have forged security icons. or PIN. Avoiding common words: some hackers use programs that can try every word in the dictionary—even spelled backwards. Your Internet Service Provider (ISP) should never ask for your password. c. . You can make it tougher for them by: a. Email is not a secure way to transmit personal information. And if you access your accounts in a public place. 3. In addition.link in the message. no indicator is foolproof. hackers may try to figure out your passwords to gain access to your computer. If your firewall was shipped in the "off" mode. and for anti-spyware software that can undo changes spyware makes to your system. contact that company directly in a way you know to be genuine. or adjacent keys on the keyboard as passwords. e. Don't share your passwords on the internet. Don't access your online investment account until you have checked to see that the site is secure. Using passwords that have at least eight characters and include numbers or symbols. and avoid storing them on your computer. Look for things like a key or closed padlock icon on the browser's status bar or a website URL that begins "https:" (the "s" stands for "secure").com Anne K.A Must Read. Keep your passwords in a secure place. If you believe there may be a need for such information by a company with which you have an account. and a firewall. Not using your personal information. be sure to 77 BeginnersGuitarSongs. The longer your password is. out of plain view. The safest course of action is not to respond to requests for your personal or financial information. Not using the same password for each online account you access.

or the company's financial health. Many cafes.com suggests the following: 1. Instead. hotels. and other public establishments offer wireless networks for use by their customers. when you finish a session. B) Avoiding Investment Scams Online To avoid internet scams. Use a Security Token (if available). for that matter — through a public wireless connection isn't worth the security risk." and clear your internet history. such as the U. delete your "temporary internet files. These unpredictable pass-codes can frustrate identity thieves. if you have personal.S. you may decide that accessing your online investment account — or any account. 6.com Anne K. but they may not be secure. or blog — especially if the investment involves a small. make an investment based solely on what you read in an online newsletter. It's easy for a company or its promoters to make grandiose claims about new product developments. If you do use one. bulletin board posting. or other sensitive information on your computer. click on the "log out" button to terminate your online session. 5. BeginnersGuitarSongs. financial. . Using a security token can make it even harder for an identity thief to access your online investment account. Securities and Exchange Commission 78 BeginnersGuitarSongs.turn it on and set it up properly. That's because these small number-generating devices offer a second layer of security — a one-time pass-code that typically changes every 30 or 60 seconds. It's also important to keep your operating system up-to-date with the latest security patches. If this browser feature is active. 4. log off completely. Closing or minimizing your browser or typing in a new web address when you're done using your online account may not be enough to prevent others from gaining access to your account information. ever. Martinez The Book On Online Safety. airports.A Must Read. Before you invest. thinly-traded company that isn't well known. These "hot spots" are convenient. Regardless. Log Out Completely. In addition. Use Extra Caution with Public Computers or Wireless Connections. Independently Verify Claims. make sure you've independently verified those claims. lucrative contracts. Never. Get started by turning to unbiased sources. Ask the proprietor what security measures are in place. anyone using your computer will have access to your investment account information. don't permit your browser to "remember" your username and password information. Avoid using public or other shared computers to access your financial accounts online.

(SEC). Offers to sell securities must be registered with the SEC or eligible for an exemption — otherwise the offering is illegal. But many investment frauds. the fact that a company hasn't registered and doesn't file reports doesn't mean the company is a fraud. Stocks that trade in the OTC market generally are among the most risky and most susceptible to manipulation. Whenever the SEC sues an individual or entity. Find Out Where the Stock Trades. 3. To see whether an investment is registered. You also can check the licensing and disciplinary history of the person or entity promoting the opportunity by using FINRA's free BrokerCheck service or by calling your state securities regulator. the company being touted.com Anne K." Sometimes they will give you the name of a real agency — other times they will make one up. The fact that a company has registered its securities and files reports with the SEC doesn't guarantee the company will be a good investment. Thoroughly Check Out Promoters and Company Officials. your state securities regulator. Beware of promoters who pressure you to buy before you have a chance to think about and fully 79 BeginnersGuitarSongs. thinly-traded companies cannot meet the listing requirements of a national exchange.A Must Read. 2. the contact information they provide invariably will be false. Amex. Fraudsters will falsely assure you that an investment is properly registered with the appropriate agency and purport to give you the agency's telephone number so that you can verify that "fact. . 5. Many fraudsters are repeat offenders. and Nasdaq). Many small. his or her company or newsletter. you'll reach the fraudsters or their colleagues — who will give the company." Litigation releases going back to 1995 are available on the SEC’s website — simply run a search for the promoter. Do Your Homework. or the transaction high marks. Be Skeptical of Self-Provided References. Martinez The Book On Online Safety. The securities of these companies trade instead in the "over-the-counter" market and are quoted on OTC systems. and securities industry selfregulatory organizations (including FINRA. Watch Out for High-Pressure Pitches. the promoter. 4. 6. Instead of speaking with a government official. Likewise. the agency issues a "litigation release. But even if the agency does exist. involve unregistered securities — so always investigate before you invest. check the SEC's EDGAR database and call your state securities regulator for more information about the company and the people promoting it. and its officers and directors. including online scams. such as the OTC Bulletin Board or the Pink Sheets.

A Must Read. 7. 80 BeginnersGuitarSongs. Remember: if an opportunity sounds too good to be true. . Consider the Source and Be Skeptical. Don't fall for the line that you'll lose out on a "once-in-a-lifetime" chance to make big money if you don' t act quickly. Martinez The Book On Online Safety. ask yourself: Why me? Why is this stranger giving me this tip? How might he or she benefit if I trade? Never forget that the person touting the stock may well be an insider of the company or a paid promoter who stands to profit handsomely if you trade. Whenever someone you don't know offers you a hot stock tip. it probably is.com Anne K.investigate an investment opportunity.

fast. and convenient. Learn how to identify disreputable vendors or fraud artists that may be setting up shop – and how to minimize your chance of a shopping mishap.A Must Read.com Anne K. . 81 BeginnersGuitarSongs. Martinez The Book On Online Safety.Chapter 14 Online Shopping Shopping online … it's easy.

or purchase your favorite fashions. Check out the terms of the deal. The internet is always open — seven days a week. If you get an email or pop-up message while you're browsing that asks for financial information. 82 BeginnersGuitarSongs. Read the seller's description of the product closely. Confirm the online seller's physical address and phone number in case you have questions or prob lems. Factor shipping and handling — along with your needs and budget — into the total cost of the order. Martinez The Book On Online Safety. don't reply or click on the link in the message. send flowers to a friend.Quick Facts Shopping on the internet can be economical. especially the fine print. BeginnersGuitarSongs. . Know who you're dealing with. Confirm the online seller's physical address and phone number in case you have questions or problems. Anyone can set up shop online under almost any name. Legitimate companies don't ask for this information via email. Know who you're dealing with. for maximum consumer protections." or "close-out" may indicate that the product is in less-than-mint condition. To help keep your online shopping experience a safe one: 1. Shopping online offers lots of benefits that you won't find shopping in a store or by mail. while name-brand items with "too good to be true" prices could be counterfeits." "vintage. Know what it will cost. Read the seller's description of the product closely. 24 hours a day — and bargains can be numerous online.A Must Read. Know exactly what you're buying. Words like "refurbished. If you're buying items from an online retailer or auction website. you can buy an airline ticket. like refund policies and delivery dates. and no less safe than shopping in a store or by mail. 5. 4. Pay by credit or charge card. especially the fine print. 2. With a click of a mouse. 3. convenient. Print and save records of your online transactions. book a hotel.com offers this advice to help you make the most of your shopping experience: 1.com Anne K. Know exactly what you're buying. But sizing up your finds on the internet is a little different from checking out items at the mall. 6. 2.

If you can't find a privacy policy — or if you can't understand it. and how they're going to use the information. Check out websites that offer price comparisons and then. checking account. and/or purchase protection benefits. and when you will receive your order 6. find out who pays the shipping costs or restocking fees. In the event of unauthorized use of your credit or charge card.com Anne K. Print and save records of your online transactions. no indicator is foolproof. and some cards may provide additional warranty. If you initiate a transaction and want to provide your financial information through an organization's website. 83 BeginnersGuitarSongs. Don't email your financial information. Pay by credit or charge card. Martinez The Book On Online Safety. the online receipt. Can you return the item for a full refund if you're not satisfied? If you return it. you generally would be held liable only for the first $50 in charges. Email is not a secure method of transmitting financial information like your credit card. Some companies offer an online shopping guarantee that ensures you will not be held responsible for any unauthorized charges made online. 5. compare "apples to apples. or Social Security number. . 8. Read your credit card statements as you receive them and be on the lookout for unauthorized charges. like a lock icon on the browser's status bar or a URL for a website that begins "https:" (the "s" stands for "secure")." Factor shipping and handling — along with your needs and budget — into the total cost of the order. like refund policies and delivery dates. and copies of every email you send or receive from the selle r. 7. Keep a paper trail. Do not send cash under any circumstances. why. It should let you know what personal information the website operators are collecting. Under this law. look for indicators that the site is secure. your transaction will be protected by the Fair Credit Billing Act. Unfortunately. 4. Know what it will cost. Check out the terms of the deal. If you pay by credit or charge card online. Check the privacy policy.3. return. some fraudulent sites have forged security icons.A Must Read. consider taking your business to another site that's more consumer-friendly. you have the right to dispute charges under certain circumstances and temporarily withhold payment while the creditor is investigating them. including the product description and price.

a. b. and how the operators are going to use it. a free gift card. 3. Legitimate companies don't ask for your financial information via email or pop-up message. Confirm the online seller's physical address and phone number before you buy. what personal information the website collects. a seasonal job or a holiday vacation rental. . Martinez The Book On Online Safety. c. 4. Be stingy with your personal information. It may be long.A Must Read. Check the Privacy Policy Really. Shop around 84 BeginnersGuitarSongs.A) Online Shopping Tips For the Holidays 1. including all emails to and from the seller. It comes in handy if you have questions or problems later. 2. Don't give out your credit card or other financial information in exchange for an offer of the newest tech toy. If you can't find the privacy policy—or understand it—consider taking your business elsewhere. c. Can you return the item for a full refund if you're not satisfied? Who pays the shipping costs? Is there a restocking fee? Print and save records of your online transactions. your checking account. Know what you're buying a. Don't click on a link in an email. Read the seller's description of the product and even though it can be painful.com Anne K. why. Check out the terms and conditions. Avoid buying cards from any online auction sites because the cards could be fakes. but it can give important information: for example. or your Social Security number. Email isn't a secure way to transmit numbers—your credit card. Don't email your financial information. 5. Buy gift cards from sources you know and trust. Know who you're dealing with. and letting the site know what you think. the fine print. b.

or other seasonal downloads could carry dangerous viruses. 6. Some retailers match. Or if you order online and pick up at the store. 85 BeginnersGuitarSongs. consumers will be making a list and checking it twice this holiday season to find ways to stretch their gift giving budgets. 7. Under federal law. your liability generally ends at the first $50. Should you buy on public WiFi? Don't assume that public "hot spots" are secure. Savvy sellers know this is the time to brush up on the basics of complying with the law. you have the right to dispute charges under certain circumstances and withhold payment temporarily while the creditor is investigating. e-cards. And if your card is used without your authorization. B) Present Perfect: Doing Right By Holiday Shoppers If the word from Wall Street is any indication. Unless you can verify that a hot spot has effective security measures in place. consider the cost of parking or public transportation. Wiring money can be risky. . Pay by credit or charge card They offer the best consumer protections. a competitor's prices. it's gone. You can't get it back.A Must Read. you may not want to send sensitive information over that network. Keep your anti-virus and anti-spyware software current along with your firewall. Many merchants are offering free shipping this year.com Anne K. But there’s good news for direct marketers. 30 percent of holiday dollars will be spent online or through telephone or catalog sales. or even beat. but not all—so factor the cost of shipping into the total cost. Martinez The Book On Online Safety. 9. According to reports. 8. Monitor your financial accounts Read your statements regularly.Having an item's manufacturer and model number can help you compare "apples to apples" among merchants. Free can be costly Free screen savers. It's just like sending cash—once it's gone. making sure they reflect the charges you authorized.

If you make claims about how fast you process orders – for example. Martinez The Book On Online Safety. make sure they’re clear and conspicuous. and delivered. The law requires that sellers explain the financial facts in a way consumers will understand. Before the holiday rush. sealed. That’s why it’s important to disclose your return policy up front so that buyers can make an informed choice. 5. Limit access to account data and credit card information on a need-toknow basis.1. graciously handling returns with a minimum of red tape during the holiday season wins consumer loyalty year-round. ―Three easy payments of…‖ Consumers on a budget appreciate the convenience of payment plans. . The law gives you a lot of leeway in how you pitch your products – as long as what you say is true and you can back up objective claims with solid proof. Signed. Compare and contrast. 86 BeginnersGuitarSongs. 3. ―Delivery by December 21st‖ or ―We ship within 24 hours‖ – you need more than wishful thinking to back up those promises. Especially during your busy season. 2. You must have a reasonable basis for believing you can ship within 30 days. They’ll be scrutinizing what you say on your website to grab the best deal at the lowest price. disclosing the details of the deal in fine -print footnotes doesn’t cut it. Sometimes even the greatest gift may turn out to be not quite right. As successful direct marketers know. Consumers on a budget will be more likely than ever to comparison shop this season. Many happy returns. 4. But what if your ads don’t say anything about deli very time?.A Must Read.com Anne K. But as recent law enforcement actions make clear. Add an extra helping of security. Many companies bring on extra help to handle the holiday rush. If there are conditions or limitations on getting a refund or making an exchange. maintain your usual high standards for protecting customers’ sensitive information. review your website to make sure your advertising claims meet that standard.

. 87 BeginnersGuitarSongs. but also can up your exposure to viruses. P2P can give you access to lots of information. Find out how to minimize your risks when using P2P. spyware.A Must Read. Martinez The Book On Online Safety.Chapter 15 P2P Security Peer-to-Peer (P2P) file-sharing enables people to share files online through an informal network.com Anne K. illegal material and more.

Some file-sharing software may install malware or adware. You could download copyright-protected material. 88 BeginnersGuitarSongs. 3) You may want to adjust the file-sharing program's controls so that it is not connected to the P2P network all the time.com Anne K. and use a password to protect any files that contain sensitive information. 2) Use a security program from a vendor you know and trust. 5) Back up data you don't want to lose in case of a computer crash. 4) Consider setting up separate user accounts. pornography. or subfolders. folders. . if your computer has multiple users. Martinez The Book On Online Safety.Quick Facts Peer-to-peer (P2P) file-sharing allows users to share files online through an informal network of computers running the same software. Limiting rights on user accounts may help protect your computer from unwanted software and your data from unwelcome sharing. or viruses without meaning to.A Must Read. and some files may include unwanted content. File -sharing can give you access to a wealth of information. so that you know what's being shared. If you're considering P2P file-sharing: 1) Install file-sharing software carefully. Check the proper settings so that other users of the filesharing network won't have access to your private files. Some file-sharing programs automatically open every time you turn on your computer and continue to operate even when you "close" them. Or you could mistakenly allow other people to copy files you don't mean to share. but it also has a number of risks. in addition to the administrator's account. keep that software and your operating system up-to-date. Changes you make to the default settings of the "save" or "shared" folder might cause you to share folders and subfolders you don't want to share.

you download special software that connects your computer to other computers running the same software. 2. email messages. when you are connected to file-sharing programs.P2P File-Sharing: Evaluate the Risks Every day. . Use security software and keep it and your operating system up-todate. any changes you make to the P2P software's default settings during installation could cause serious problems. BeginnersGuitarSongs. or other personal documents – along with the files you want to share. And a lmost all P2P file-sharing applications will. millions of computer users share files online. Millions of users could be connected to each other through this software at one time. To secure the personal information stored on your computer. you may unknowingly allow others to copy private files – even giving access to entire folders and subfolders – you never intended to share. Before you use any file-sharing program.com suggests that you: 1.com cautions that file-sharing can have a number of risks.com Anne K. Files you download may also hide malware. For example. if you change the defaults when you set up the "shared" or "save" folder. The software often is free. For example.A Must Read. by default. And when you install a P2P file-sharing application. When you load a file-sharing application onto your computer. Or you may unwittingly download pornography labeled as something else. or software. Some file-sharing programs may install malware that monitors a user's computer use and then sends that data to third parties. but make sure that you consider the trade-offs. games. You may download material that is protected by copyright laws and find yourself mired in legal issues. Malware and adware can be difficult to detect and remove. BeginnersGuitarSongs. Install file-sharing software carefully. get a security program that includes anti-virus 89 BeginnersGuitarSongs. Whether it is music. Martinez The Book On Online Safety. medical records. you might be required to install "adware" that monitors your browsing habits and serves you advertising. share the downloads in your "save" or "download" folder – unless you set it not to. file-sharing can give people access to a wealth of information. or other unwanted content. You may download a virus or facilitate a security breach. you may let other P2P users into any of your folders – and all its subfolders. right? Maybe. You could inadvertently share information on your hard drive – like your tax returns. Sounds promising. viruses. photos. To share files through a P2P network. so that you know what's being shared.

rather than just clicking "X" or "closing" it. Set your security software and operating system to be updated regularly. or other material. this can help protect against software you don't want on your computer. 5. DVDs. 3. And before you open or pla y any downloaded files.and anti-spyware protection from a vendor you know and trust and make sure that your operating system is up to date. Create separate user accounts. Delete any software the security program detects that you don't want on your computer. closing the file-sharing program window does not actually close your connection to the network. Make sure your security software and firewall are running whenever your computer is connected to the internet. Martinez The Book On Online Safety. in addition to the administrator's account. As a preventive measure. 90 BeginnersGuitarSongs. you stay connected to the internet unless you turn off the computer or disconnect your internet service. Since only a user with administrator rights can install software.A Must Read. take the time to "exit" the program. If you have a high-speed or "broadband" connection to the internet. .com Anne K. and give those user accounts only limited rights. Back up sensitive documents. and if they've exchanged games. ask your children whether they've downloaded file-sharing software. Back up files that you'd want to keep if your computer crashes. videos. If you're a teen or tween interested in file-sharing. since users with limited rights generally don't have access to each other's information. Store them on CDs. some file-sharing programs automatically open every time you turn on your computer. music. scan them with your security software to detect malware or viruses. talk with your parents before downloading software or exchangi ng files. you may want to adjust the file-sharing program's controls to prevent the filesharing program from automatically opening. In some instances. Talk with your family about file-sharing. These "always on" connections may allow others to copy your shared files at any time. Close your connection. To be sure your file -sharing program is closed. if they're going to use P2P file-sharing at all. It also can keep users from accessing other users' folders and subfolders. or detachable drives that you keep in a safe place. What's more. 6. Also use a password to protect your firewall and security software so no one else can disable them or grant themselves rights that you don't want them to have on your machine. Talk to your kids about the security and other risks involved with file-sharing and how to install the software correctly. consider setting up separate user accounts. That allows file-sharing to continue and could increase your security risk. 4. If more than one person uses your computer. If you're a parent.

Chapter 16 Phishing When fraudsters send spam or pop-up messages.A Must Read." and what to do if – oops . how to avoid getting "hooked. they're casting a wide net in hopes of getting people to divulge their personal and financial information. .com Anne K. Martinez The Book On Online Safety.you realize you've been phished. Learn how to spot a phishing message. 91 BeginnersGuitarSongs.

A Must Read. call the number on your financial statements or on the back of your credit card. Please click here to update and verify your information. we couldn't verify your information. 4. Use anti-virus and anti-spyware software. Be cautious about opening any attachment or downloading any files from emails you receive." Have you received email with a similar message? It's a scam called "phishing" — and it involves internet fraudsters who send spam or pop-up messages to lure personal information (credit card numbers. regardless of who sent them. 6. 2. as well as a firewall. please click the link below and confirm your identity. but that actually send you to a different site." "During our regular verification of accounts. 92 BeginnersGuitarSongs. . and update them all regularly. 5. the area code you call does not reflect where the scammers really are. To avoid getting hooked: 1. and don't click on links in the message. or other sensitive information) from unsuspecting victims. Don't email personal or financial information.Quick Facts Phishing is a scam where internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecti ng victims." Because they use Voice over Internet Protocol Technology. Some scammers send an email that appears to be from a legitimate business and ask you to call a phone number to update your account or access a "refund. Don't reply to email or pop-up messages that ask for personal or financial information. Martinez The Book On Online Safety. Don't cut and paste a link from the message into your Web browser — phishers can make links look like they go one place. If you need to reach an organization you do business with. bank account information. 3.com Anne K. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Social Security number. passwords. A) How Not To Get Hooked by a "Phishing" Scam "We suspect an unauthorized transaction on your account. To ensure that your account is not compromised.

Anti-virus software scans incoming communications for troublesome files. The messages direct you to a website that looks just like a legitimate organization's site. .com suggests these tips to help you avoid getting hooked by a phishing scam: 1. Use anti-virus and anti-spyware software. And don't click on the link in the message. Some phishing emails contain software that can harm your computer or track your activities on the internet without your knowledge. and update them all regularly. Anti-virus software and a firewall can protect you from inadvertently accepting such unwanted files. online payment service. bank. In any case. as well as a firewall. call the number on your financial statements or on the back of your credit card. or even a government agency. either. don't cut and paste the link from the message into your internet browser — phishers can make links look like they go to one place. The message may ask you to "update. b ut that actually send you to a different site." "validate. Area codes can mislead. Some scammers send emails that appear to be from a legitimate business and ask you to call a phone number to update your account or access a "refund. And delete any emails that ask you to confirm or divulge your financial information. If you are concerned about your account." Because they use Voice over Internet Protocol Technology. 3. It's a bogus site whose sole purpose is to trick you into divulging your personal information so the operators can steal your identity and run up bills or commit crimes in your name. contact the organization mentioned in the email using a telephone number you know to be genuine. an Internet Service Provider (ISP). BeginnersGuitarSongs.Phishers send an email or pop-up message that claims to be from a business or organization that you may deal with — for example. the area code you call does not reflect where the scammers really are. But it isn't. Martinez The Book On Online Safety. If you need to reach an organization you do business with. 2. 93 BeginnersGuitarSongs. or open a new internet browser session and type in the company's correct Web address yourself. do not reply. If you get an email or pop-up message that asks for personal or financial information.A Must Read. Some phishing emails threaten a dire consequence if you don't respond. and that updates automatically. Look for anti-virus software that recognizes current viruses as well as older ones.com Anne K." or "confirm" your account information. Legitimate companies don't ask for this information via email. that can effectively reverse the damage.

some phishers have forged security icons.A firewall helps make you invisible on the internet and blocks all communications from unauthorized sources.A Must Read. 94 BeginnersGuitarSongs. Email is not a secure method of transmitting personal information. If you initiate a transaction and want to provide your personal or financial information through an organization's website. Be cautious about opening any attachment or downloading any files from emails you receive. Review credit card and bank account statements as soon as you receive them to check for unauthorized charges. Unfortunately. If your statement is late by more than a couple of days. Operating systems (like Windows or Linux) or browsers (like Internet Explorer or Netscape) also may offer free software "patches" to close holes in the system that hackers or phishers could exploit. look for indicators that the site is secure. like a lock icon on the browser's status bar or a URL for a website that begins "https:" (the "s" stands for "secure"). 5. Martinez The Book On Online Sa fety. regardless of who sent them. call your credit card company or bank to confirm your billing address and account balances. no indicator is foolproof. 4. 6. . Don't email personal or financial information. It's especially important to run a firewall if you have a broadband connection.com Anne K. These files can contain viruses or other software that can weaken your computer's security.

they also can increase your exposure to people with less-thanfriendly intentions. And while these sites can increase your circle of friends. 95 BeginnersGuitarSongs.com Anne K. Learn how to help your kids – and other family members – socialize online safely.Chapter 17 Social Networking Sites Social networking sites are big. . Martinez The Book On Online Safety.A Must Read.

Tell your kids to trust their gut if they have suspicions. but now. Some social networking sites attract pre-teens – even kids as young as 5 or 6. In fact. Use privacy settings to restrict who can access and post on your child's website. These younger-focused sites don't allow the same kinds of communication that teens and adults have. they can't take it back. Remind your kids that once they post information online. Talk to your kids about avoiding sex talk online. 5. Martinez The Book On Online Safety. Do you know where your children are?" Remember that phrase from your own childhood? It's still a valid question. Help your kids understand what information should be private. Here are tips for helping your kids use social networking sites safely: 1. 6. but there are still things that parents can do to help young kids socialize safely online.A Must Read. encourage them to tell you. it comes with a twist: "Do you know where your kids are — and who they're chatting with online?" Social networking sites have morphed into a mainstream medium for teens and adults. and use blogs and private messaging to communicate with friends. others who share interests.m. These sites encourage and enable people to exchange information about themselves. And that's why it's important to be aware of the possible pitfalls that come with networking online. If they ever feel uncomfortable or threatened by anything online. the law provides some protections – and gives parents some control over the type of information 96 BeginnersGuitarSongs. and sometimes even the world-at-large. A) Social Networking Sites: A Parent's Guide "It's 10 p. Explain that kids should post only information that you – and they – are comfortable with others seeing. 2. they also can increase exposure to people with less than friendly intentions.Quick Facts While social networking sites can increase a person's circle of friends. 4. . 3. share pictures and videos.com Anne K. when it comes to young kids.

COPPA also allows parents to review their child's online profiles and blog pages. Even if they delete the information from a site. they can't take it back. there's the Children's Online Privacy Protection Act (COPPA). Remind your kids that once they post information online. 4. Some social networking sites have strong privacy settings. Tell them not to choose a screen name that gives away too much personal information. and for general audience sites that know they're dealing with kids younger than 13. and to think before posting pictures and videos. B) Help Kids Socialize Safely Online BeginnersGuitarSongs. It requires these sites to get parental consent before they collect.A Must Read. Help your kids understand what information should be private . Information like their full name. college admissions officers. maintain. Even if privacy settings are turned on. team coaches. and family financial information — like bank or credit card account numbers — is private and should stay that way.com shares these tips for safe social networking: 1. or use kids' information. Social Security number. 3. there are lessons that parents can teach to help kids stay safer as they socialize online. Employers. Use privacy settings to restrict who can access and post on your child's website. and explain to them why this is important. Show your child how to use these settings to limit who can view their online profile. Encourage your child to think about the language used in a blog. phone number. some — or even all — of your child's profile may be seen by a broader audience than you're comfortable with. 97 BeginnersGuitarSongs. For sites directed to children under age 13. 2. Even a kid's screen name could make a difference. Explain that kids should post only information that you — and they — are comfortable with others seeing. Parents sometimes can feel outpaced by their technologically savvy kids. and teachers may view your child's postings. Technology aside. Martinez The Book On Online Safety. family members and friends – to themselves. Encourage teens to think about the impression that screen names could make.com Anne K. . Tell them why it's important to keep some things – about themselves. older versions may exist on other people's computers and be circulated online.that children can disclose online. street address.

Find out about what limits you can place on your child's cell phone. and parent sections to understand its features and privacy controls. 6. Online bullying can take many forms. but parents of younger children also can: 1. Talk to your kids about bullying. 7.5. If they feel threatened by someone or uncomfortable because of something online. and texting. can bring on punishment from the authorities. Tell your kids that the words they type and the images they post can have real-world consequences.com Anne K. If you're concerned that your child is engaging in risky online behavior. . other plans allow kids to use those features only at certain times of day. make the sender look bad – and. grade. Know how your kids are getting online. 9. Recent research shows that teens who don't talk about sex with strangers online are less likely to come in contact with a predator. sometimes. They can make the target of the bullying feel bad. More and more. hobbies. Most sites have links where users can immediately report abusive. you can search the blog sites they visit to see what information they're posting. so you can keep an eye on what 98 BeginnersGuitarSongs. encourage them to tell you. school. You can then help them report concerns to the police and to the social networking site. or inappropriate online behavior. Tell your kids to trust their gut if they have suspicions.A Must Read. from spreading rumors online and posting or forwarding pri vate messages without the sender's OK. Try searching by their name. Some cellular companies have plans that limit downloads. FAQs. Keep the computer in an open area like the kitchen or family room. 8. suspicious. nickname. Martinez The Book On Online Safety. Encourage your kids to talk to you if they feel targeted by a bully. to sending threatening messages. Talk to your kids about avoiding sex talk online. internet access. The site should spell out your rights as a parent to review and delete your child's profile if your child is younger than 13. C) A Few More Tips to Protect Pre-Teens Many of the tips above apply for pre-teens. Read sites' privacy policies. Take extra steps to protect younger kids. Spend some time with a site's privacy policy. kids are accessing the internet through their cell phones. or area where you live.

others allow anyone and everyone to view postings. Think about how different sites work before deciding to join a site. Sign up for – and use – the social networking spaces that your kids visit. 2.your kids are doing online. 4. 3. Go where your kids go online. Social Security number. Keep some control over the information you post by restricting access to your page. whether they can download items. Let them know that you're there. 3. E) What to Do if There's a Problem Trust your gut if you have suspicions.com Anne K. they also can increase your exposure to people with less-than-friendly intentions. tell an adult you trust. If you feel threatened by someone or uncomfortable because of something online. address. and help teach them how to act as they socialize online. Keep your full name.A Must Read. You may want to limit your child's online ―friends‖ to people your child actually knows and is friendly with in real life. . Consider taking advantage of parental control features on some operating systems that let you manage your kids' computer use. phone number. Some sites allow only a defined community of users to access posted content. Here are some things you can do to socialize safely online: 1. 99 BeginnersGuitarSongs. and bank or credit card account numbers to yourself. F) Safety Tips for Tweens and Teens While social networking sites can increase your circle of friends. Use the internet with them to help develop safe surfing habits. Martinez The Book On Online Safety. Understand sites' privacy policies. and report it to the police and the social networking site. 2. Sites should spell out your rights as a parent to review and delete your child's profile if your child is younger than 13. Review your child's friends list. or what time of day they can be online. including what sites they can visit.

. email. it doesn't take a genius to combine clues to figure out who you are and where you can be found. Consider not posting your photo. don't talk to strangers. Flirting with strangers online could have serious consequences. your employer. G) Social Networking Sites: Safety Tips for Tweets and Teens You've probably learned a long list of important safety and privacy lessons already: Look both ways before crossing the street. Social networking sites have added a new factor to the "friends of friends" equation. and then report it to the police. with friends you trust. If you feel threatened by someone or uncomfortable because of something online. your teachers. Make sure your screen name doesn't say too much about you. the police — and strangers. buckle up. some of whom could be dangerous. 7. they also can increase your exposure to people who have less-thanfriendly intentions. Be wary if a new friend wants to meet you in person. BeginnersGuitarSongs. or had their computer hacked. By providing information about yourself and using blogs. Trust your gut if you have suspicions.com is urging kids to add one more lesson to the list: Don't post information about yourself online that you don't want the whole world to know. or instant messaging. you can communicate. Martinez The Book On Online Safety. 5.4. 8. It can be altered or broadcast in ways you may not be happy about. chat rooms. 6. You've heard the stories about people who were stalked by someone they met online. including your parents. during the day. or with the world at large. tell an adult you trust. Some people lie about who they really are. If you decide to meet them. Post only information that you are comfortable with others seeing and knowing. But while the sites can increase your circle of friends. And tell a responsible adult where you're going.com Anne K. had their identity stolen.A Must Read. either within a limited community. Even if you think it makes you anonymous. 100 BeginnersGuitarSongs. meet in a public place. 9. hide your diary where your nosy brother can't find it. The internet is the world's biggest information exchange: many more people could see your information than you intend.

clubs. either. 6. Make sure your screen name doesn't say too much about you. you can't take it back. your friends from school. Keep your information to yourself. Social Security number. It can be altered and broadcast in ways you may not be happy about. 5. Some sites will allow only a defined community of users to access posted content. Remember that once you post information online. If you do post one. sports team. your team. Think about keeping some control over the information you post. older versions exist on other people's computers. 101 BeginnersGuitarSongs.com suggests these tips for socializing safely online: 1.com Anne K. Don't post your full name. Flirting with strangers online could have serious consequences. 3. the police. and where you work or hang out. including your parents. it doesn't take a genius to combine clues to figure out who you are and where you can be found. your age. Even if you delete the information from a site. This could include the name of your school. 8. Consider restricting access to your page to a select group of people. Because some people lie about who they really are. or your family. Martinez The Book On Online Safety. or the job you might want to apply for in five years. the college you might want to apply to next year. 2. for example. others allow anyone and everyone to view postings. phone number. address. Many people can see your page. your club. your teachers. or bank and credit card account numbers — and don't post other people's information. your community groups. 7. or your hometown. Even if you think your screen name makes you anonymous. Be cautious about posting information that could be used to identify you or locate you offline. Think about how different sites work before deciding to join a site. . Don't use your name. Post only information that you are comfortable with others seeing — and knowing — about you. ask yourself whether it's one your mom would display in the living room. you never really know who you're dealing with.H) Your Safety's at Stake BeginnersGuitarSongs. Consider not posting your photo. 4.A Must Read.

102 BeginnersGuitarSongs. with friends you trust. If you decide to meet them. Martinez The Book On Online Safety. . be smart about it: Meet in a public place. You could end up preventing someone else from becoming a victim. during the day. and when you expect to be back. 10. do your research: Ask whether any of your friends know the person. Trust your gut if you have suspicions.9.com Anne K. tell an adult you trust and report it to the police and the social networking site. and see what background you can dig up through online search engines. Be wary if a new online friend wants to meet you in person. If you feel threatened by someone or uncomfortable because of something online. Tell an adult or a responsible sibling where you're going.A Must Read. Before you decide to meet someone.

how to tell if it's on your computer and get rid of it. and how to avoid it altogether. Learn what spyware is.A Must Read. . Martinez The Book On Online Safety.Chapter 18 Spyware Criminals can install stealth software on your computer that lets them steal your identity and do other damage. 103 BeginnersGuitarSongs.com Anne K.

2) Use anti-virus and anti-spyware software. there may be no symptoms at all. you may unintentionally be installing spyware. security. or record your keystrokes. It may be used to send you pop-up ads. spyware software monitors or controls your computer use. random error messages. Clues that spyware is on a computer may include a barrage of pop-ups. To lower your risk of spyware infections: 1) Update your operating system and Web browser software. monitor your internet surfing. and sluggish performance when opening programs or saving files. one more privacy. All computer users should take preventive steps to avoid spyware. 4) Don't click on links inside pop-ups. 5) Don't click on links in spam or pop -ups that claim to offer anti-spyware software. and set your browser security high enough to detect unauthorized downloads. and functionality issue crops up — spyware. Enticing free software downloads frequently bundle other software. a browser that takes you to sites you don't want. redirect your computer to websites.com Anne K.A Must Read. keys that don't work. including spyware. in turn. 3) Download free software only from sites you know and trust. which.Quick Facts Spyware is software installed on your computer without your consent to monitor or control your computer use. avoid it. get wise to the signs that it has been installed on their machines. Many experienced Web users have learned how to recognize spyware. and then take the appropriate steps to delete it. as well as a firewall. Just when you thought you were Web savvy. In some cases. The clues that spyware is on a computer include: 1) Barrage of pop-ups 2) Hijacked browser — that is. . a browser that takes you to sites other than those you type into the address box 104 BeginnersGuitarSongs. and update them all regularly. Martinez The Book On Online Safety. could lead to identity theft. and delete it. unexpected toolbars or icons on your computer screen. Installed on your computer without your consent.

. 105 BeginnersGuitarSongs.3) A sudden or repeated change in your computer's internet home page 4) New and unexpected toolbars 5) New and unexpected icons on the system tray at the bottom of your computer screen or on your desktop 6) Keys that don't work (for example. the "Tab" key that might not work when you try to move to the next field in a Web form) 7) Random error messages 8) Sluggish or downright slow performance when opening programs or saving files The good news is that consumers can take steps to lower their risk of spyware infections. It can be appealing to download free games.com Anne K.A Must Read. Martinez The Book On Online Safety. b) Use anti-virus and anti-spyware software. If you share a computer with kids. however. c) Download free software only from sites you know and trust. If the EULA is hard to find — or difficult to understand — think twice about installing the software. Take the time to read the end-user license agreement (EULA) before downloading any software. You can download this software from ISPs or software companies or buy it in retail stores. Look for anti-virus and anti-spyware software that removes or quarantines viruses and that updates automatically on a daily basis. BeginnersGuitarSongs. Be aware. file -sharing programs. that some of these free software applications bundle other software. talk with them about safe computing. d) Don't install any software without knowing exactly what it is . Your operating system (like Windows or Linux) may offer free software "patches" to close holes in the system that spyware could exploit. including spyware. Indeed. as well as a firewall. and update them all regularly. Set your operating system and security software to update automatically to be sure you have the latest protections. or customized toolbars.com suggests that you: a) Update your operating system and Web browser software.

and within seconds. Whether it's text files or photos that are important to you. So you might be tempted by an offer of a "free security scan. for example. or other sensitive information. After you agree to spend $40 or more on the software. A) "Free Security Scan" Could Cost Time and Money Messages telling you to install and update security software for your computer seem to be everywhere. ads that claim to have scanned your computer and detected malware are a tactic scammers have used to spread malware. the program tells you that your problems are fixed.A Must Read. . Some software offered in spam or pop-ups actually installs spyware. Make sure your browser security setting is high enough to detect unauthorized downloads. passwords.com Anne K. Martinez The Book On Online Safety. the program now installed on your computer could be harmful. an email. Instead. or an ad that claims "malicious software" has already been found on your machine. Co nfirm that your security software is active and current and run it to scan your computer for viruses and spyware. you may install spyware on your computer. The free scan claims to find a host of problems. immediately stop shopping." especially when faced with a pop-up.e) Minimize "drive-by" downloads. The reality: there was nothing to fix. so resist the urge to respond to or click on those messages. or doing any other online activity that involves user names. i) Back up your data. at least the "Medium" setting for Internet Explorer. Do this as regularly as you update your security software. back up any data that you'd want to keep in case of a computer crash. In fact. deleting anything the program identifies as a problem. Visit OnGuard Online's Malware page for more detailed tips. banking. 106 BeginnersGuitarSongs. close pop-up windows by clicking on the "X" icon in the title bar. h) Install a personal firewall to stop uninvited users from accessing your computer. And what's worse. g) Don't click on links in spam or pop-ups that claim to offer antispyware software. If you think your computer might have spyware on it. you're getting urgent pop-ups to buy security software. f) Don't click on any links within pop-ups. A firewall blocks unauthorized access to your computer and will alert you if spyware already on your computer is sending information out. If you do. it's likely that the scary message is a come-on for a rip-off. Unfortunately.

they actually redirect unsuspecting visitors to a fraudulent website that performs a bogus security scan. you're likely to be connected to someone. . Regardless." Though the "alerts" look like they're being generated by your computer.A Must Read."  you may be invited to download free software for a security scan or to improve your system. remember that these are well-organized and profitable schemes designed to rip people off."  you may get "alerts" about "malicious software" or "illegal pornography on your computer. These programs are called "scareware" because they exploit a person's fear of online viruses and security threats. they actually are created by a con artist and sent through your internet browser. The site then causes a barrage of urgent pop-up messages that pressure users into downloading worthless software." "remove harmful files. Even though the ads look legitimate and harmless to the website's operator.  you may suddenly encounter an unfamiliar website that claims to have performed a security scan and prompts you to download new software." "improve computer function. if you buy the software. but that alone does not mean the company is legitimate.com Anne K. The scam has many variations. For example.Scammers have found ways to create realistic but phony "security alerts. Scareware purveyors also go to great lengths to make their product and service look legitimate." "protect privacy. but there are some telltale signs. For example:  you may get ads that promise to "delete viruses or spyware. If you call. B) How Do the Scammers Do It? Scareware schemes can be quite sophisticated. The scam artists buy ad space on trusted. Martinez The Book On Online Safety.  you could get pop-ups that claim your security software is out-of-date and your computer is in immediate danger. popular websites. 107 BeginnersGuitarSongs. you may get an email receipt with a customer service phone number." or "clean your registry.

including commercial vendors and your Internet Service Provider. .A Must Read. The security software that was installed on your computer when you bought it generally works for just a short time — unless you pay a subscription fee to keep it in effect. Some scareware is designed so that any of those buttons can activate the program. Martinez The Book On Online Safety." If you get an offer.com Anne K. Make it a practice not to click on any links within pop-ups. Don't click "No" or "Cancel." or even the "x" at the top right corner of the screen. You can buy stand-alone programs for each element — or a security suite that includes these programs — from a variety of sources. and click "End Task. press Command + Option + Q + Esc to "Force Quit.C) What to Do If you're faced with any of the warning signs of a scareware scam or suspect a problem. The results can help you determine if the program is on the up-and-up. If you use Windows. shut down your browser. and a firewall. D) Good Security Practices Check that your security software is active and current: at a minimum." If you use a Mac. 108 BeginnersGuitarSongs. press Ctrl + Alt + Delete to open your Task Manager. your computer should have anti-virus and anti-spyware software. check out the program by entering the name in a search engine.

Martinez The Book On Online Safety. A VoIP service may offer unlimited local and long distance calls for a 109 BeginnersGuitarSongs.Chapter 19 VoIP –Overview VoIP is a way to make and receive phone calls using a broadband internet connection instead of a traditional phone line. .com Anne K. Read about the pros and cons of making the switch – and some questions to ask – as you weigh your options. Quick Facts Voice over Internet Protocol — VoIP — is a new way to make and receive telephone calls using a broadband internet connection rather than a regular phone line.A Must Read.

 If you lose your internet connection (or lose power). B) VoIP Technology VoIP technology is offered by some companies that specialize in VoIP service. you dial the same way you always have. Most services using VoIP allow you to call anyone with a telephone number — including local. you need to use special software. the voice signal from your phone — into a digital signal that travels through the internet to the person you are calling. In addition. If you get a VoIP service that works directly from your computer. or spam over internet telephony (SPIT). and international numbers.com Anne K. If you're comfortable with new technology. as well as features like integrated calls and email. long distance. Martinez The Book On Online Safety. Others may allow you to call only people with the same service. cellular. your phone service will be out as well. a 110 BeginnersGuitarSongs. BeginnersGuitarSongs.  Costs include a monthly calling plan as well as a monthly bill for your broadband service. but others work only over your computer or a special VoIP phone.A Must Read. worms. If you get VoIP service that allows you to make a call using a phone with an adaptor. but others work only over your computer or a special VoIP phone. VoIP converts your phone call — actually. Keep in mind:  Some services allow you to use a traditional telephone through an adaptor. most VoIP services allow you to use a traditional telephone through an adaptor. some traditional telephone and cable companies.  VoIP services don't have the same access to some services — including the 911 emergency system and directory assistance — as traditional telephone service. as well as some Internet Service Providers. A) VoIP: It's A Phone. and access to your phone line from many locations. .  VoIP services can be attacked by computer viruses.com suggests that it's smart to do some research on this technology before signing up for it. It's a Computer. the signal is converted back at the other end.fixed price. you may want to learn more about VoIP. It's… Voice over Internet Protocol — VoIP — is one way people are making and receiving telephone calls using a broadband internet connection rather than a regular phone line. If you are calling a plain old telephone number.

For example. and your comfort level with technology. like:  The ability to have more than one phone number. and conditions of service. anyone can call you from a regular phone — analog or digital — without any special equipment. plus a range of interesting features.com Anne K. If your service assigns you a regular phone number. speakers. 111 BeginnersGuitarSongs. . C) VoIP Services Many VoIP services include unlimited local and long distance calling plans (at least within the United States and Canada) for a fixed price. Investigate t he companies you are considering for your service. Many internet search engines can lead you to a wealth of information about consumer experiences with particular providers. you can have a San Francisco phone number. and a sound card. that will mean paying separately for cable modem service or digital subscriber line (DSL) service. VoIP plans generally look inexpensive compared to regular telephone plans.microphone. including phone numbers with different area codes. D) Caveats Any decision to sign up for a VoIP service should be based on careful consideration of the facts. For most people.A Must Read. Martinez The Book On Online Safety. and their calls to you will be local. terms. E) Among the issues to think about are: 1) Terms and Conditions.  With special software and hardware.  Integrated voicemail and email message systems so you can listen to your voicemail on your computer or your email on your phone. but don't forget the cost of broadband internet access. if you live in New York and your kids live in San Francisco. Ask about the costs. Many VoIP providers offer monthly calling plans: make sure you know the number and type of calls included in the amount you'll be billed. That means personal or business calls can be routed to you no matter where you are. the ability to take your VoIP system with you if you travel with your computer.

Each time you re-register. known as IP phones. You may have to connect equipment and adjust to a new system. For example.  Security. Or you can use special internet telephones.A Must Read. Martinez The Book On Online Safety. Note that there are different ways to use the technology: An analog terminal adaptor works on your regular phone to enable VoIP calls.  Do Not Call Registry.gov or call 1-888-382-1222 (TTY 1-866-290-4236). VoIP services can be attacked by computer viruses or worms.donotcall.F) Limits of Service  Phone Number: Many VoIP companies can arrange for your current phone number to be switched to your VoIP service. Your telephone number probably won't be included in directory service listings provided by the local telephone company. a new kind of 112 BeginnersGuitarSongs. which raises security risks that are not an issue with regular telephone service. you may need to re-register your telephone number with the National Do Not Call Registry — even if your number stays the same. If you're using VoIP and a phone adaptor to make calls. you'll need special software. you will have a new phone number.  Power or Service Outages: Consider backup phone service for power or service outages. some actions (changing calling plans or other services. Installing VoIP service is not as simple as plugging in a telephone. in the interim. If you use VoIP to make computer-to-computer calls. VoIP calls are transmitted over the internet. a microphone. a sound card. visit www. . that look like traditional phones but have all the software and hardware necessary to connect directly to your computer's router to make or receive calls.com Anne K. you can be subject to SPIT (Spam over Internet Telephony). When you switch your telephone service to a VoIP provider. telemarketers will have 31 days to take your number off their call lists. In addition.  Equipment and Installation. or changing the billing name on the account) may cause your registered phone number to be deleted from the Registry — even if your service has not been interrupted. To verify that your number is in the Registry. but that could take time.  Directory Assistance: VoIP services don't have the same access to directory assistance services as traditional telephone service does. and speakers. your computer doesn't have to be turned on as long as your broadband internet connection is working.

113 BeginnersGuitarSongs.A Must Read. Learn how to keep your wireless network and the computers on it more secure using encryption and other techniques. and left with mass voice mail messages in your inbox.com Anne K. . Martinez The Book On Online Safety. Chapter 20 Wireless Security Wireless internet access offers convenience and mobility. and you can be caught in a denial of service attack.spam.

Turn it off so your computer won't send a signal to any device in the vicinity announcing its presence.  Use anti-virus and anti-spyware software.A Must Read. But there are steps you should take to protect your wireless network and the computers on it.  Don't assume that public "hot spots" are secure. If you have a choice. WiFi Protected Access (especially WPA2) is stronger than Wired Equivalent Privacy (WEP).  Use encryption to scramble communications over the network.  Allow only specific computers to access your wireless network. A) Securing Your Wireless Network Increasingly. Any computer within range that's equipped with a wireless client card can pull the signal from the air and gain access to the internet.  Change your router's pre-set password for administration to something only you know. 114 BeginnersGuitarSongs. To set up the wireless network. A wireless network can connect computers in different parts of your home or business without a tangle of cords and enable you to work on a laptop anywhere within the network's range. . vacationers beam snapshots to friends while still on holiday. computer users interested in convenience and mobility are accessing the internet wirelessly.  Turn off your wireless network when you know you won't use it. business travelers use wireless laptops to stay in touch with the home office. and shoppers place orders from the comfort of their couches. you connect the access point to a wireless router that broadcasts a signal through the air. Martinez The Book On Online Safety.  Change the identifier on your router from the default so a hacker can't use the manufacturer's default identifier to try to access your network.Quick Facts Wireless internet access can offer convenience and mobility. sometimes as far as several hundred feet. the tougher it is to crack.  Most wireless routers have a mechanism called identifier broadcasting." like a cable or DSL line that runs into a modem. and a firewall. Going wireless generally requires a broadband internet connection into your home. Today. called an "access point.com Anne K. The longer the password. You may want to assume that other people can access any information you see or send over a public wireless network.

The downside of a wireless network is that. If your wireless router doesn't have an encryption feature. As no one step is a complete fix. Computers on a wireless network need the same protections as any computer connected to the internet. and a firewall. communications over the network. 3) Turn off identifier broadcasting. That means your neighbors. . there are steps you can take to protect your wireless network and the computers on it. B) Precautionary Steps 1) Use encryption. check the router manufacturer's website. WPA2 is strongest. Most wireless routers. taking all of the following steps will help you be more secure. which is better than no encryption. Martinez The Book On Online Safety. could "piggyback" on your network. the activity can be traced back to your account. Fortunately.A Must Read. And if an unauthorized person uses your network to commit a crime or send spam. unless you take certain precautions. You must turn it on. router. If you use WEP encryption. use it if you have a choice. anyone with a wireless-ready computer can use your network. or scramble. It should protect your wireless network against accidental intrusions by neighbors or attacks by less-sophisticated hackers. consider getting one that does. and base stations have a built-in encryption mechanism. The directions that come with your wireless router should explain how to do that. and other equipment must use the same encryption. Most wireless routers have a mechanism called identifier broadcasting. The most effective way to secure your wireless network from intruders is to encrypt. 2) Use anti-virus and anti-spyware software. and keep them up-to-date. If your firewall was shipped in the "off" mode. b) Two main types of encryption are available: Wi-Fi Protected Access (WPA) and Wired Equivalent Privacy (WEP). It sends out a signal to any device in the vicinity announcing its presence. If they don't. Your computer.com Anne K. It should protect you against most hackers. access points. or even access the information on your computer. You don't need to broadcast this information if the person using the network already knows it is there. set it to the highest security level available. Install anti-virus and anti-spyware software. or even hackers lurking nearby. a) Manufacturers often deliver wireless routers with the encryption feature turned off. Hackers can use identifier 115 BeginnersGuitarSongs. turn it on. c) Some older routers use only WEP encryption.

it may be best to avoid sending or receiving sensitive information over that network. so don't rely on this step alone. you limit the a mount of time that it is susceptible to a hack. These "hot spots" are convenient. Unless you can verify that a hot spot has effective security measures in place. The identifier for your router is likely to be a standard. the tougher it is to crack. 8) Don't assume that public "hot spots" are secure. To be on the safe side. you may want to assume that other people can access any information you see or send over a public wireless network. Ask the proprietor what security measures are in place. Wireless routers usually have a mechanism to allow only devices with particular MAC addresses access to the network. but they may not be secure. If you turn the router off when you're not using it. hackers know the default IDs and can use them to try to access your network. Many cafés. Every computer that is able to communicate with a network is assigned its own unique Media Access Control (MAC) address. Change your identifier to something only you know.com Anne K. Martinez The Book On Online Safety. Hackers know these default passwords. Some hackers have mimicked MAC addresses. Use a password that's at least 10 characters long: The longer your password. and remember to configure the same unique ID into your wireless router and your computer so they can communicate. 6) Allow only specific computers to access your wireless network. and other public establishments offer wireless networks for their customers' use. so change it to something only you know. . 116 BeginnersGuitarSongs.broadcasting to home in on vulnerable wireless networks. Note the SSID name so you can connect manually.A Must Read. Disable the identifier broadcasting mechanism if your wireless router allows it. The manufacturer of your wireless router probably assigned it a standard default password that allows you to set up and operate the router. the harder it is for hackers to break. hotels. 9) Be careful about the information you access or send from a public wireless network. The longer the password. 7) Turn off your wireless network when you know you won't use it. airports. Hackers cannot access a wireless router when it is shut down. default ID assigned by the manufacturer to all hardware of that model. Even if your router is not broadcasting its identifier to the world. 4) Change the identifier on your router from the default. 5) Change your router's pre-set password for administration.

Encrypts data sent to and from wireless devices within a network.  Wired Equivalent Privacy (WEP): A security protocol that encrypts data sent to and from wireless devices within a network. D) Wrong or Forgotten Password in WiFi Base Station Can't remember the password to your WiFi base station? If you keep getting rejected while entering passwords to access your WiFi settings. Users can improve security by changing to a unique name.  Wireless Network: A method of accessing high speed internet without the computer being linked by cables.  Extended Service Set Identifier (ESSID): The name a manufacturer assigns to a router. Not as strong as WPA encryption.A Must Read. there are two options you can try: First. default password. Martinez The Book On Online Safety. . A router finds the best path for forwarding information across the networks. This default password is the password assigned to it when it shipped.C) Glossary  Encryption: The scrambling of data into a secret code that can be read only by software set to decode the information. WPA2 is the most effective.  Media Access Control (MAC) Address: A unique number that the manufacturer assigns to each computer or other device in a network. try entering a factory.com Anne K.  Wi-Fi Protected Access (WPA): A security protocol developed to fix flaws in WEP. Firewalls watch for outside attempts to access your system and block communications to and from sources you don't permit. Similar to a Service Set Identifier (SSID). It may be a standard.  Router: A device that connects two or more networks.  Firewall: Hardware or software designed to keep hackers from using your computer to send personal information without your permission. default name assigned by the manufacturer to all hardware of that model. Here are a few common default passwords for popular brands: 117 BeginnersGuitarSongs.

if entering the default password didn't work. take a pencil or a pen and push the button in and hold it for several seconds. 118 BeginnersGuitarSongs. Make sure you check technical support before you try this. Martinez The Book On Online Safety.A Must Read. The only problem is that it will reset all of your settings — including ISP settings and other security settings. This will reset the base station password to one of the default passwords above. Linksys requires 30 seconds.com Anne K. Once you've found it (make sure it's the reset button hole!). Linksys Default Password: admin  NETGEAR Default Passwords: 1234 or password  Apple Airport Default Passwords: public or pass word or admin  DLink Default Password: admin  Belkin Default Password: admin Second. Apple base stations require that you hold the button for 10 seconds. . you'll have to manually reset your base station. To do this go to your base station and look for a small hole on the side or back of the device — it's the size of a pin hole. Check your user manual or the company's technical support Web site for the exact procedure.

com Anne K. .A Must Read. Martinez The Book On Online Safety. Feel free to visit BeginnersGuitarSongs.Stay safe online ALWAYS! Feel free to share this ebook with all your friends and family members They will thank you for caring about their security as well.com at any time 119 BeginnersGuitarSongs.

Sign up to vote on this title
UsefulNot useful