Atnaujinkite slapukų nuostatas

El. knyga: My Online Privacy for Seniors

4.50/5 (11 ratings by Goodreads)
  • Formatas: 384 pages
  • Serija: My...
  • Išleidimo metai: 01-Apr-2019
  • Leidėjas: Addison Wesley
  • Kalba: eng
  • ISBN-13: 9780135381298
Kitos knygos pagal šią temą:
  • Formatas: 384 pages
  • Serija: My...
  • Išleidimo metai: 01-Apr-2019
  • Leidėjas: Addison Wesley
  • Kalba: eng
  • ISBN-13: 9780135381298
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

My Online Privacy for Seniors is an exceptionally easy and complete guide to protecting your privacy while you take advantage of the extraordinary resources available to you through the Internet and your mobile devices. It approaches every topic from a seniors point of view, using meaningful examples, step-by-step tasks, large text, close-up screen shots, and a custom full-color interior designed for comfortable reading.

Full-color, step-by-step tasksin legible printwalk you through how to keep your personal information and content secure on computers and mobile devices. Learn how to:



Strengthen your web browsers privacy in just a few steps Make it harder to track and target you with personalized ads Protect against dangerous fake emails and ransomware Securely bank and shop online Control who sees your Facebook or Instagram posts and photos you share Securely use cloud services for backups or shared projects Protect private data on your mobile device, even if its stolen Block most unwanted calls on your smartphone Improve your homes Internet security quickly and inexpensively Get straight answers to online privacy questionsin steps that are simple to follow and easy to understand



You dont have to avoid todays amazing digital world: you can enrich your life, deepen your connections, and still keep yourself safe.
1 Online Security Basics
3(34)
Protecting Yourself Online
5(1)
Simple Steps to Protect Your Privacy
5(1)
Improving Internet Security in Your Home
6(15)
Set Up a Firewall
7(1)
Password-Protect Your Wireless (Wi-Fi) Internet Connection
8(1)
Secure Your Computers
9(1)
Set Up and Manage User Accounts on a Windows 10 PC
10(3)
Set Up and Manage User Accounts on a Mac (Running MacOS)
13(3)
Secure Your Computer's Web Browser
16(1)
Customize the Security Settings When Using the Microsoft Edge Web Browser
17(2)
Customize the Security Settings When Using the Safari Web Browser
19(1)
Take Advantage of Web Browser Plug-Ins (Extensions)
20(1)
Take Advantage of Security Tools Offered by Your Mobile Devices
21(9)
Adjust the Security Settings on Your iPhone or iPad (running iOS 12)
22(5)
Adjust the Security Settings on Your Android Mobile Device
27(3)
Manage Your Account Passwords
30(3)
Use Tools to Manage and Remember Your Passwords
31(1)
Tips for Creating Secure Passwords
32(1)
Apply Multiple Strategies to Protect Yourself Online
33(4)
2 Safely Surf the Internet
37(46)
Using Your Favorite Web Browser
38(2)
Choosing a Web Browser for Your Computer or Mobile Device
40(4)
Acquiring a Web Browser
42(1)
Consider a Specialty Web Browser Built for Privacy
43(1)
Looking at Cookies
44(11)
Manage Microsoft Edge's Cookie-Related Features
47(3)
Manage Safari's Cookie-Related Feature(s)
50(1)
Manage Chrome's Cookie-Related Feature(s)
51(4)
Turning on Your Web Browser's Privacy or Incognito Mode
55(8)
Turn On Privacy (InPrivate) Mode Using Microsoft Edge
56(1)
Turn On Private Mode Using Safari
57(1)
Go Incognito Mode Using Chrome
58(1)
Turn on Privacy Mode on Your iPhone's Safari Web Browser
59(1)
Turn on Privacy Mode on Your iPad's Safari Web Browser
60(1)
Turn on Privacy Mode on Your Android's Chrome Web Browser
61(2)
Managing Your Web Browser's History Folder
63(7)
Work with Microsoft Edge's History Folder
64(1)
Work with Safari's History Folder
65(1)
Work with Chrome's History Folder
66(4)
Managing Bookmarks and Other Information
70(5)
Create a New Bookmark
71(6)
Bookmark with Google Chrome
71(1)
Bookmark with Microsoft Edge
71(1)
Bookmark with Apple Safari
72(1)
Access Your Bookmarks
73(2)
Expanding Your Web Browser's Functionality Using Optional Plug-Ins
75(2)
How to Find, Download, and Install Plug-Ins
76(1)
Learning the Benefits of Using a Virtual Private Network or Two-Factor Authentication
77(2)
Using Apps on Your Mobile Device to Better Handle Many Online Activities
79(4)
3 Protect Your Security When Working with Emails
83(40)
Email Options
83(2)
Determining Where Email Vulnerabilities Can Happen
85(14)
Preventing Unauthorized Physical Access to Your Computer or Mobile Device
85(1)
Protecting Your Computer Against Viruses and Malware
86(1)
Maintaining an Up-to-Date and Reliable Backup
87(1)
Create a Backup Using a Windows 10 PC
88(4)
Create a Backup Using MacOS's Time Machine Feature
92(3)
Choosing Additional Online Backup Solutions
95(1)
Protecting Email Content as It's Moving
96(1)
Avoiding Phishing Schemes and Spam
96(3)
Adjusting the Security and Privacy Features When Using Mail
99(13)
Use the Email Security Features Built in to Mail for Windows 10 PCs
99(2)
Use the Junk Mail Settings in Mail for the Mac
101(1)
Use the Email Security Settings for Gmail
102(7)
Use the Email Security Settings for Yahoo! Mail
109(3)
Identifying and Avoiding Phishing Schemes
112(7)
Dealing with a Phishing Scheme Email
115(1)
Calling a Legitimate Phone Number for a Bank or Credit Card Issuer
116(1)
Identifying Phishing Scheme Email Messages
117(2)
Avoiding Email Security Problems Related to Human Error
119(4)
4 Handling Online Banking Tasks Securely
123(36)
Sending or Receiving Money Electronically
126(1)
Addressing Online or Mobile Banking Security Concerns
127(27)
Protecting Your Online Accounts
127(600)
Creating a Secure Password and Keeping It a Secret
127(1)
Changing Your Password Periodically
128(1)
Using a Credit Card, not a Debit Card, to Make Online Purchases
128(1)
Using Electronic Payments at Retail Locations or Online
128(2)
Setting Up and Using Apple Pay
130(1)
Set Up Apple Pay to Work with Your iPhone
131(6)
Make a Purchase Using Apple Pay, Google Pay, or Samsung Pay
137(2)
Using a Virtual Private Network for Online Banking via Wi-Fi
139(2)
Download and Install a VPN to Your Computer
141(606)
Download and Install a VPN to Your Mobile Device
147(5)
Being Aware of Banking-Related Phishing Schemes
152(1)
Signing Off from Your Online Banking Service When You're Finished
153(1)
Reporting a Suspected Problem Immediately
153(1)
Turning On Two-Factor Authentication for Your Online Accounts
154(5)
Turn On Two-Factor Authentication for Your Bank's Website
154(3)
Managing Credit Card Accounts Online
157(2)
5 Protect Your Privacy and Security When Shopping Online
159(26)
Avoiding Online Shopping Security Risks
161(12)
Being Aware of Fake Websites
162(1)
Paying Attention to Product Descriptions
163(1)
Watching Out for Counterfeit Goods
164(2)
Ignoring Requests for Too Much Personal Information
166(1)
Being Careful What You Sign Up For
166(2)
Understanding Ratings and Reviews
168(1)
Permitting Cookies When Shopping Online
169(1)
Verifying the Return Policy
170(1)
Looking for Free Shipping Offers
170(2)
Ensuring a Secure Internet Connection
172(1)
Comparing Prices on Websites
173(5)
Use a Price Comparison Website from a Computer
174(3)
Use a Price Comparison Website from a Mobile App
177(1)
Taking Advantage of Electronic Payment Options for Added Security
178(7)
Use PayPal to Pay for Online Purchases
180(5)
6 Use Social Media Safely
185(56)
Your Information on Social Media Is Typically Public
185(2)
Becoming Active on Social Media
187(1)
Socializing (and More) on Facebook
188(1)
Discerning Fake News from Real News
189(2)
Addressing Privacy Concerns on Facebook
191(3)
Getting Started Using and Staying Secure on Facebook
194(1)
Set Up a Free Facebook Account
195(3)
Create Your Public Facebook Profile
198(6)
Adjust Your Account's Privacy and Security Settings
204(3)
Customize Face Recognition
207(2)
Adjust Facebook's Advertising-Related Settings
209(4)
Adding Friends to Your Facebook Account
213(61)
Manage Your Facebook Friends
214(1)
Delete Your Facebook Account
215(2)
Staying Safe on Twitter and Instagram
217(10)
Adjusting Twitter and Instagram Privacy and Security Settings
218(61)
Customize Twitter's Settings
219(5)
Customize Instagram's Settings
224(3)
Understanding What You're Posting and Who Will See It
227(1)
Using Linkedln and Other Social Media Services Securely
227(1)
Thinking Before You Post
228(13)
Understanding the Pros and Cons of Geotagging
229(1)
Turn Off Geotagging from Your iPhone/iPad
230(3)
Turn Off Geotagging from Your Android-Based Mobile Device
233(3)
Turn Off Geotagging on a Case-by-Case Basis
236(1)
Weighing the Pros and Cons of Tagging Yourself and Others in Photos
237(4)
7 Protect Your Privacy When Publishing and Sharing Photos Online
241(36)
Organizing Your Digital Image Library Can Take Time
244(3)
Storing, Editing, Organizing, and Sharing Your Digital Images via the Cloud
247(8)
Using Platform-Related Cloud Photo Storage and Sharing Options
247(3)
Using Third-Party Cloud Photo Storage and Sharing Options
250(1)
Use Shutterfly's Share Sites Feature
251(2)
Choosing a Cloud-Based Photo Storage and Sharing Service
253(2)
Sharing Photos via Social Media
255(22)
Uploading a Photo to Your Instagram Account
257(1)
Create an Instagram Post
258(6)
Create a Personalized Online Album on Facebook
264(13)
8 Safely Store Data, Documents, and Files in the Cloud
277(30)
Benefits of Using Cloud Storage
278(2)
Understanding Important Cloud Computing Concepts
280(2)
Configuring Cloud-Based Services
282(12)
Set Up OneDrive Functionality on Your Windows PCs
283(3)
Set Up iCloud Functionality on Your Macs
286(3)
Sharing Content with Others from iCloud Drive
289(1)
Using iCloud with Other MacOS Apps
289(5)
Using a Cross-Platform Cloud-Based Service
294(7)
Sharing Large Files Using Dropbox
295(4)
Perform a Dropbox Security Checkup
299(2)
Using Cloud-Based File Sharing Services Safely
301(6)
9 Customize the Security Settings on Your Smartphone or Tablet
307(32)
Preventing Unauthorized People from Using Your Mobile Device
308(10)
Setting Up the Passcode Feature
310(1)
Set the Passcode (iPhone or iPad)
311(2)
Set the PIN (Android)
313(3)
Turning On the Touch ID (iOS) or Finger Scanner (Android)
316(1)
Activating Touch ID (iPhone or iPad)
316(1)
Activating Fingerprint Scan (Android)
316(1)
Taking Advantage of Face ID (iOS)
317(1)
Restricting Access to Apps and Content
318(1)
Taking Advantage of Parental Controls
318(1)
Adjusting the App-Specific Privacy Settings on Your Mobile Device
319(3)
Keeping Your Mobile Device's Operating System and Apps Up to Date
322(3)
Updating Your iPhone or iPad's Operating System and Apps
322(2)
Updating Your Android Mobile Device Operating System and Apps
324(1)
Managing Your Mobile Device's Wireless Connections
325(8)
Turning On Bluetooth Settings
327(2)
Using AirDrop (iPhone/iPad)
329(1)
Send App-Specific Content Using AirDrop
330(3)
Blocking and Managing Unwanted Calls to Your Smartphone
333(6)
Block Specific Incoming Calls on Your iPhone
335(2)
Block Specific Incoming Calls on an Android Smartphone
337(2)
A Glossary 339(6)
Index 345
Jason R. Rich is an accomplished author, journalist, and photographer. Some of his recently published books include: My Digital Photography for Seniors, My Digital Entertainment for Seniors, Working in the Cloud: Using Web-Based Applications and Tools to Collaborate Online, and The Ultimate Guide to YouTube for Business. Hes also written an unofficial series of strategy guides, targeted to kids, focusing on the popular Fortnite: Battle Royale video game.

Through his work as an enrichment lecturer, he often offers workshops and classes about digital photography, the Internet, and consumer technology aboard cruise ships operated by Carnival Cruise Lines, Royal Caribbean, Princess Cruises Lines, Norwegian Cruise Lines, and Celebrity Cruise Lines, as well as through Adult Education programs in the New England area.