spread of many intrusive software and damaging virus' & spyware
originate from web sites engaged in illegal activities. Ways to protect
yourself and your family are discussed and our directory of helpful
resources- right column..
engines, P2P connections and torrents assist in identifying un family-like
materials such as pictures, videos and stories. Major internet service
providers, software developers and telecom companies are the conduit in
delivering the content to your front door. Web site hosting companies,
instant messages and content providers provide the methods
to enter your home with minimal restrictions.
Wi-Fi in hotels and cafe hot spots are riddled with intruders.
We suggest you report offensive sites to your local, state, provincial
or federal law enforcement. Most have a reporting system and the
power to shut down offensive
for example www.cybertips.ca (Canada).
Not only will you be helpful in protecting your own family, it will help those that are being exploited by criminals. Other resources are provided in a News section of this web site.
Be clear, that you can either deactivate or delete your accounts. Only deleting will remove the information entirely.
Remember that you need to ensure you have the consent of non-users before sharing the non-users' email addresses with Facebook.
We suggest you check other sites privacy policies which could allow them to will retain your user profile, pictures, messages, etc. for whatever purpose, like Google. Of late, Yahoo has been getting more bold and asking for your cell phone # and an alternate email. Simply refuse these requests because they are not mandatory to use their services, If not, you can expect to be hounded by phone calls and emails from anyone that will pay for the information.
Many Internet security software packages are bundling in important family protection which you can take advantage of. Some alert you to safe sites, have ranking and even search bars to help guide you to the legitimate web sites.
In a family setting, set an example on what is appropriate surfing behavior. Creating an atmosphere of shared trust goes a long way in the successful use of a valuable resource. Do not underestimate other people's search capabilities.