Coverart for item
The Resource The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue

The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue

Label
The smart girl's guide to privacy : practical tips for staying safe online
Title
The smart girl's guide to privacy
Title remainder
practical tips for staying safe online
Statement of responsibility
Violet Blue
Creator
Author
Subject
Language
eng
Summary
Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen
Cataloging source
DLC
http://library.link/vocab/creatorName
Blue, Violet
Dewey number
613.6/602854678
Index
index present
LC call number
HV6773
LC item number
.B56 2015
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/subjectName
  • Computer crimes
  • Internet
  • Internet and women
  • Internet
  • Privacy, Right of
Target audience
adult
Label
The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 6
  • 56
  • Navigating the Legal System
  • 56
  • Getting a Restraining Order
  • 58
  • Getting Your Private Photos Offline
  • 59
  • Doing It Yourself
  • 60
  • If You're a Minor
  • Losing Your Privacy
  • 63
  • Outsourcing the Work
  • 64
  • Preventative Maintenance
  • 66
  • 5
  • Identity theft
  • 69
  • Signs of Identity Theft
  • 70
  • 8
  • Run, Don't Walk
  • 72
  • Place a Fraud Alert
  • 72
  • Order Free Credit Reports
  • 73
  • File an Identity Theft Report
  • 73
  • Contact the IRS
  • 73
  • Ways You Can Lose Your Privacy
  • Alert Businesses
  • 73
  • Don't Let It Happen to You
  • 74
  • Prevent Identity Theft
  • 74
  • Avoid Phishing Attacks
  • 75
  • If Your Phone or Computer Is Stolen
  • 77
  • 9
  • Install an Antitheft Tracking App
  • 77
  • Permanently Delete Information from Your Device
  • 78
  • 6
  • How to share
  • 81
  • Social Media Checklist
  • 82
  • Sharing Only What You Want
  • Protect Yourself Right Now
  • 83
  • Friending
  • 85
  • But I Can't Give Up Facebook (or Instagram, or Twitter, or FourSquare, or...)
  • 86
  • Quit Humping My Leg, Facebook
  • 87
  • Location Information in Photos
  • 89
  • Be Smart About Checking In
  • 11
  • 89
  • Controlling What You Share with Google and Google+
  • 89
  • Managing Your Google+ Profile
  • 90
  • Locking Down the Privacy Settings on Your New Phone
  • 91
  • Safely Disposing of Old Devices
  • 92
  • 7
  • Tape Over Your Webcam
  • People-search websites
  • 95
  • But I'm Not That Interesting
  • 96
  • Dangers Lurking in People-Finder Sites
  • 98
  • How People-Finder Sites Get Your Information
  • 99
  • It Sounds Like There's Nothing I Can Do, So Why Do Anything?
  • 100
  • 11
  • 8
  • Dating and sexytime
  • 103
  • Make a Smart Dating Profile
  • 104
  • Screen Out Scammers and Stalkers
  • 106
  • Make the Internet Wear a Condom
  • 107
  • Private Time Online: Browsing Privately and Securing Your Sensitive Information
  • Lock Your Phone, Computer, and Tablet
  • 108
  • Search Engine Creep
  • 109
  • Cookies
  • 110
  • Leave No Trace
  • 111
  • Keep Your Sensitive Files Private
  • 111
  • Erase Files Completely
  • 1
  • 12
  • 111
  • Make Your Browser Private
  • 112
  • Do Not Track
  • 113
  • Private Browsing
  • 114
  • How to Tell If Someone Was on Your Computer
  • 115
  • 9
  • Do a Privacy Check-Up
  • Ninja tricks
  • 119
  • Ninja Your Credit Cards
  • 120
  • Ninja Move: Freeze Your Credit
  • 121
  • Stealth Out Your Mailing Address
  • 122
  • Stealth Out Your Phone Number
  • 123
  • 13
  • Ninja Tricks: Encrypt Your Private Communication
  • 123
  • Protecting Your Email
  • 124
  • Keeping Your Chats Private
  • 126
  • Encrypting Your Internet Activity
  • 126
  • Ninja Choke Hold: Strong, Easy Privacy Apps
  • 127
  • Don't Email Your ID
  • Ninja Your IP Address
  • 128
  • Use Tor
  • 128
  • Use a VPN
  • 129
  • Get Hard-core: Make a Data Silo
  • 130
  • 10
  • I hate passwords
  • 13
  • 133
  • How People Steal Passwords
  • 134
  • But I Have to Share My Password
  • 135
  • Password Fu
  • 137
  • Use a Password Manager and Install an Antitheft App
  • 14
  • Be the Firewall
  • 14
  • 2
  • Get smart
  • But it's just my phone number
  • 17
  • You Control What You Share
  • 17
  • Private Spaces and Activities
  • 18
  • Lock Down Your Personally Identifying Information
  • 21
  • Red Alert List
  • 22
  • 1
  • Yellow Alert List
  • 23
  • Green List
  • 24
  • Information-Sharing Guidelines
  • 25
  • He Said, She Said
  • 26
  • Worst-Case Scenario
  • 28
  • Take the Online Privacy Test
  • 3
  • You got hacked
  • 31
  • One Compromised Account to Rule Them All
  • 32
  • What Honan Did Wrong
  • 33
  • Hack-Proof Your Life
  • 34
  • Make Your Address Hard to Find
  • 4
  • 34
  • Don't Link Major Accounts
  • 34
  • Don't Use One Service for Everything
  • 35
  • Back Up Your Everything: Your Contacts, Your Files, Your Photos
  • 35
  • Encrypt Your Computer's Hard Drive
  • 36
  • What to Do When You've Been Attacked
  • Eight Privacy Tips to Use Right Now
  • 36
  • Recover Your Accounts and Data
  • 38
  • When a Service Gets Hacked
  • 40
  • If Your Financial Information May Have Been
  • Exposed in a Data Breach
  • 41
  • How to Change Your Email Address
  • 43
  • 4
  • Choose a New Home
  • 44
  • Set Up Forwarding
  • 45
  • Move In
  • 46
  • Update Your Accounts
  • 47
  • Tell Everyone
  • 47
  • Targets and Nontargets
  • 4
  • Female trouble
  • 49
  • Recovering from Harassment
  • 50
  • When Will It Stop?
  • 53
  • Staying Strong
  • 54
  • Fighting Back
Control code
ocn896860507
Dimensions
23 cm
Extent
xi, 164 pages
Isbn
9781593276485
Lccn
2015013420
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Note
364.168 B625 ; XX-N ; [Z15BP002, #61, 3@17.95, LAP/bdh]
System control number
  • (Sirsi) 896860507
  • (OCoLC)896860507
Label
The smart girl's guide to privacy : practical tips for staying safe online, Violet Blue
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • 6
  • 56
  • Navigating the Legal System
  • 56
  • Getting a Restraining Order
  • 58
  • Getting Your Private Photos Offline
  • 59
  • Doing It Yourself
  • 60
  • If You're a Minor
  • Losing Your Privacy
  • 63
  • Outsourcing the Work
  • 64
  • Preventative Maintenance
  • 66
  • 5
  • Identity theft
  • 69
  • Signs of Identity Theft
  • 70
  • 8
  • Run, Don't Walk
  • 72
  • Place a Fraud Alert
  • 72
  • Order Free Credit Reports
  • 73
  • File an Identity Theft Report
  • 73
  • Contact the IRS
  • 73
  • Ways You Can Lose Your Privacy
  • Alert Businesses
  • 73
  • Don't Let It Happen to You
  • 74
  • Prevent Identity Theft
  • 74
  • Avoid Phishing Attacks
  • 75
  • If Your Phone or Computer Is Stolen
  • 77
  • 9
  • Install an Antitheft Tracking App
  • 77
  • Permanently Delete Information from Your Device
  • 78
  • 6
  • How to share
  • 81
  • Social Media Checklist
  • 82
  • Sharing Only What You Want
  • Protect Yourself Right Now
  • 83
  • Friending
  • 85
  • But I Can't Give Up Facebook (or Instagram, or Twitter, or FourSquare, or...)
  • 86
  • Quit Humping My Leg, Facebook
  • 87
  • Location Information in Photos
  • 89
  • Be Smart About Checking In
  • 11
  • 89
  • Controlling What You Share with Google and Google+
  • 89
  • Managing Your Google+ Profile
  • 90
  • Locking Down the Privacy Settings on Your New Phone
  • 91
  • Safely Disposing of Old Devices
  • 92
  • 7
  • Tape Over Your Webcam
  • People-search websites
  • 95
  • But I'm Not That Interesting
  • 96
  • Dangers Lurking in People-Finder Sites
  • 98
  • How People-Finder Sites Get Your Information
  • 99
  • It Sounds Like There's Nothing I Can Do, So Why Do Anything?
  • 100
  • 11
  • 8
  • Dating and sexytime
  • 103
  • Make a Smart Dating Profile
  • 104
  • Screen Out Scammers and Stalkers
  • 106
  • Make the Internet Wear a Condom
  • 107
  • Private Time Online: Browsing Privately and Securing Your Sensitive Information
  • Lock Your Phone, Computer, and Tablet
  • 108
  • Search Engine Creep
  • 109
  • Cookies
  • 110
  • Leave No Trace
  • 111
  • Keep Your Sensitive Files Private
  • 111
  • Erase Files Completely
  • 1
  • 12
  • 111
  • Make Your Browser Private
  • 112
  • Do Not Track
  • 113
  • Private Browsing
  • 114
  • How to Tell If Someone Was on Your Computer
  • 115
  • 9
  • Do a Privacy Check-Up
  • Ninja tricks
  • 119
  • Ninja Your Credit Cards
  • 120
  • Ninja Move: Freeze Your Credit
  • 121
  • Stealth Out Your Mailing Address
  • 122
  • Stealth Out Your Phone Number
  • 123
  • 13
  • Ninja Tricks: Encrypt Your Private Communication
  • 123
  • Protecting Your Email
  • 124
  • Keeping Your Chats Private
  • 126
  • Encrypting Your Internet Activity
  • 126
  • Ninja Choke Hold: Strong, Easy Privacy Apps
  • 127
  • Don't Email Your ID
  • Ninja Your IP Address
  • 128
  • Use Tor
  • 128
  • Use a VPN
  • 129
  • Get Hard-core: Make a Data Silo
  • 130
  • 10
  • I hate passwords
  • 13
  • 133
  • How People Steal Passwords
  • 134
  • But I Have to Share My Password
  • 135
  • Password Fu
  • 137
  • Use a Password Manager and Install an Antitheft App
  • 14
  • Be the Firewall
  • 14
  • 2
  • Get smart
  • But it's just my phone number
  • 17
  • You Control What You Share
  • 17
  • Private Spaces and Activities
  • 18
  • Lock Down Your Personally Identifying Information
  • 21
  • Red Alert List
  • 22
  • 1
  • Yellow Alert List
  • 23
  • Green List
  • 24
  • Information-Sharing Guidelines
  • 25
  • He Said, She Said
  • 26
  • Worst-Case Scenario
  • 28
  • Take the Online Privacy Test
  • 3
  • You got hacked
  • 31
  • One Compromised Account to Rule Them All
  • 32
  • What Honan Did Wrong
  • 33
  • Hack-Proof Your Life
  • 34
  • Make Your Address Hard to Find
  • 4
  • 34
  • Don't Link Major Accounts
  • 34
  • Don't Use One Service for Everything
  • 35
  • Back Up Your Everything: Your Contacts, Your Files, Your Photos
  • 35
  • Encrypt Your Computer's Hard Drive
  • 36
  • What to Do When You've Been Attacked
  • Eight Privacy Tips to Use Right Now
  • 36
  • Recover Your Accounts and Data
  • 38
  • When a Service Gets Hacked
  • 40
  • If Your Financial Information May Have Been
  • Exposed in a Data Breach
  • 41
  • How to Change Your Email Address
  • 43
  • 4
  • Choose a New Home
  • 44
  • Set Up Forwarding
  • 45
  • Move In
  • 46
  • Update Your Accounts
  • 47
  • Tell Everyone
  • 47
  • Targets and Nontargets
  • 4
  • Female trouble
  • 49
  • Recovering from Harassment
  • 50
  • When Will It Stop?
  • 53
  • Staying Strong
  • 54
  • Fighting Back
Control code
ocn896860507
Dimensions
23 cm
Extent
xi, 164 pages
Isbn
9781593276485
Lccn
2015013420
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Note
364.168 B625 ; XX-N ; [Z15BP002, #61, 3@17.95, LAP/bdh]
System control number
  • (Sirsi) 896860507
  • (OCoLC)896860507

Library Locations

    • Antioch BranchBorrow it
      6060 N. Chestnut Ave., Gladstone, MO, 64119 , US
      39.20389 -94.54657
    • Lee's Summit BranchBorrow it
      150 NW Oldham Pkwy., Lee's Summit, MO, 64081 , US
      38.915628 -94.400799
    • Smithville BranchBorrow it
      120 Richardson St., Smithville, MO, 64089, US
      39.373305 -94.582329
Processing Feedback ...