How To Reject fake friends on social media.


Connecting with strangers on Facebook and Twitter may gain you more friends and followers, but it also leaves you vulnerable to scammers and spammers. Be aware, if you’re tempted to accept a friend request from a stranger or allow someone to follow you, that around 83 million Facebook accounts are thought to be fake and many of these are used for nefarious purposes.
  

First, check the person’s Facebook profile (if you can) to verify they are who they say they are. Who are their friends? Where do they live? Have they shared any content aside from their profile photo? Best of all, try searching for their profile photo using an image search engine to see if the picture has been stolen from elsewhere. To do this, save the photo to your Desktop, then go to TinEye (www.tineye.com) or Google Images (images.google.co.uk) and upload the picture to search for matches across the web. You can report a fake account to Facebook by clicking the three-dot icon on its cover photo and choosing Report. 



Fake accounts on Twitter can follow you without asking permission and may tweet links to malicious sites or pester you and your real followers with spam or porn. Many such accounts have eggs for profile pictures because they haven’t changed Twitter’s default settings, but others use photos of real people and not all egg accounts are fakes. 


There are several tools that scan your list of followers to determine which profiles aren’t genuine, but these often charge you to reveal the findings and let you block the offenders. Fortunately, a helpful chap called Clayton Lambert offers a couple of free scripts for weeding out fake Twitter followers, called Block & Remove Fake Twitter Egg Followers and Fake Twitter Follower Removal Script. Both need to be run using the Console function in Chrome – you’ll find full instructions on their respective pages. 


You can easily block and report fake accounts by clicking the cog icon in the top-right corner of their profile and choosing the appropriate option.

How To Identify fake customer reviews.



Not all the reviews you read on websites such as Amazon, TripAdvisor and Google Play can be taken at face value. It’s becoming increasingly common for companies and developers to buy fake reviews and ratings on these sites, in the same way, that you can get thousands of Twitter followers overnight by paying for them. The fraudulent reviewers are usually real people (Amazon won’t let you post a review unless you’ve bought at least one item from the store) who have signed up with services such as LaunchZon (launchzon.com) that bulk-sell bogus opinions. Alternatively, they advertise their writing skills through task marketplaces such as Fiverr (www.fiverr.com), which last year was at the center of Amazon’s clampdown on fake reviews that involved the store suing 1,114 alleged perpetrators. Current listings on Fiverr include ‘I will post a positive review anywhere’ and ‘I will write perfect reviews for your Android apps’ – clearly the community hasn’t learned its lesson.



You can identify many of these paid-for reviews by using common sense – click the reviewer’s name to see all the opinions they’ve posted; if the text is very similar, they’re almost definitely a shill. Additionally, fake reviews are often vague, brief or over-enthusiastic, for example: “Best book/tablet/waffle maker I’ve ever bought, worth every penny!”.




For more scientific analysis, paste the URL of a product’s Amazon page into Fakespot (fakespot.com) and click ‘Analyse It!’. Fakespot uses its special algorithms to scan the reviews of the item for signs of fraudulence, looking at the language used, the reviewer’s profile, correlation with other reviewers’ data, the sentiments expressed and “prevailing patterns used by proven fake reviewers”. Once finished, it gives an overall grade and summary to indicate whether reviews of the item are likely to be genuine or false. We were pleased (but not surprised!) that Fakespot gave our 2015 Back Issues Disc an ‘A’ grade and concluded that “you can trust reviews of this product”; whereas a pair of Techrise earphones received an ‘F’ and a warning for suspicious all-five-star reviews. See Fakespot’s Worst Fake Reviews section for other examples.



Fakespot isn’t always right, but the more reviews it analyses, the more accurate it becomes – it’s already checked more than 390,000. There are also Fakespot extensions for Chrome (click here) and Firefox, so you can scan review pages on the fly.

Catch People Trying To Use Your Phone.


Apple and Google both offer free services for locating, locking and wiping a lost or stolen phone, called Find My Phone and Find Your Phone, respectively. 


As the latter has just been added to Google’s My Account hub (myaccount.google.com) to make it easier to track down and sign out of a missing handset. Useful though these are, they don’t tell you who snatched your phone, which is where Lock watch comes in. This free Android app captures a photo when someone tries to unlock your phone using the wrong PIN, password or pattern. It then emails you the picture with a map of your device’s location. 


Lockwatch works silently and invisibly with your phone’s front camera and starts automatically when needed, so you don’t need to keep it running all the time.


Alternatively, Prey Anti Theft for iOS and Android (preyproject.com) lets you remotely control your phone's camera(s) to take photos of the snooper, pinpoint their location and delete all stored passwords from your device.

Find Who’s accessing your Facebook account?



Who’s accessing your Facebook account? 


Most Facebook users never bother to sign out, which means that anyone passing their PC or picking up their phone can access their accounts. 

To make sure no-one invades your Facebook privacy and posts nonsense on your behalf, click the down arrow in the top-right corner of the Facebook website, choose Settings and select Security. 

where you are logged in facebook

Click the Where You’re Logged In option to see a list of devices and locations, and the times and dates they were last accessed. Click ‘End activitynext to an entry to sign out of that session, or choose End All Activity to sign out of all sessions, everywhere. 


Facebook also offers a useful feature called ‘Login notifications’, which notifies you by email, text message or push notification if your account is accessed from an unfamiliar device. You can activate this on the Security page and check which devices Facebook regards as familiar by clicking ‘Trusted browsers’.



Post Your valuable Comment in the comment section below.

How To Log people out of your Google account.

Log people out of your Google account.

If you’re worried that someone might be reading your email – be it your spouse, your boss or the government – Gmail can reassure you and let you log out remotely. 

In your browser, scroll to the bottom of the Gmail page and click the tiny Details the link belowLast account activityin the bottom-right corner. This tells you if your account is open in another location and displays a list of recent activity, including the access type (such as browser or mobile) and IP address. 


Click the ‘Sign out of all other sessions’ button to log out from all other locations apart from your current one. Because your Gmail address is now used across all Google services, clicking this button will also sign you out of Search, Drive and more. 


On YouTube, click the cog icon in the top-right corner, select ‘YouTube settings’ and click the Advanced link below your name and email address. Click ‘Sign out of all YouTube sessions’ to stop anyone using your account.

How to protect your content and images from copying.



Blogger writes a beautiful long post for their blog by adding his/her own creativity. They collect deep knowledge on that topic from various resource and spend a number of hours to make it more attractive to visitors and they love to read that post but blogger feel sad when some thieves steal their content just by a simple right-click. 


Many people think that anything on the internet which is accessible to them is own by them and they can use it in any way they want to. People are not aware of copyright law that you cannot use others content in any format whether it is an image, audio or video without the permission of the creator of that content.

Today I will teach you that how you protect your post from thieves.


You have to follow certain steps given below:-

Step 1:- At first go to your blogger account dashboard and then select the layout option.
blogger dashboard
Blogger Dashboard

Step 2:- Inside the layout option, you have to" add a gadget" anywhere you want.
gadgets of bogger
Add gadgets from the layout


Step 3:-Select HTML/Javascript from the list of gadget and paste the code given below inside it. You can give any title or better to leave it blank.
Gadget available on blogger.com

CODE - 
<script type='text/javascript'>
if (typeof document.onselectstart != "undefined") {
document.onselectstart = new Function("return false");
} else {
document.onmousedown = new Function("return false");
document.onmouseup = new Function("return false");
}
</script>

paste the code here


Step 4:- At last click on save and then save arrangement. Task complete.

Just by doing this small step process you can easily protect your unique post from copying by others because this small setting disables right-click on your post and make it difficult for an average user to copy your content.

How To Discover who's been Using Your Windows PC.

Discover who’s been using your PC.


Most of us don’t mind someone using our PC if they ask nicely, but doing so without permission is another matter – what if they download malware, fiddle with your settings, or nose through your private folders? 
If you suspect someone has logged into your PC behind your back, press the Windows key+R, type eventvwr, and press Enter to launch Event Viewer



Open the Windows Logs list on the left and click the Security log to see the times and dates of all logins and logoffs on your PC, along with the reboots and shutdowns, so you can spot any unauthorized activity. 




You should also check the Application tab to see when specific programs were run. Don’t be alarmed by any errors or warnings you see in Event Viewer logs – these are common in Windows and don’t mean there’s anything wrong with your PC. Indeed, phone scammers are known to use scary-looking Event Viewer errors to fool their victims. 



To ensure you don’t miss any future intrusions, try the following Registry tweak. Press the Windows key+R, type Regedit to open the Registry Editor and navigate to: 
HKEY_LOCAL_MACHINE\
SOFTWARE\Microsoft\Windows\ CurrentVersion\Policies\System
Right-click it, choose New, DWORD Value and name the value DisplayLastLogonInfo. Double-click it and change its value data to ‘1’



Now, when you log into Windows, you’ll see details of the last time you signed in to your account and any failed attempts to gain access to your PC.

DON'T MISS

Nature, Health, Fitness
© all rights reserved
made with by templateszoo