![]() Use different email addresses, one for receiving emails from important sites and apps, use the second one for receiving emails from unimportant sites and apps, use the third one for receiving your password-reset email when the first on hacked. Or access unimportant websites and install new software inside a virtual machine. Turn off or lock your computer and mobile phone when you leave.Įncrypt the entire hard drive with any tool before putting important files on it, and destroy the hard drive of your old devices physically if necessary.Īccess important websites in private or incognito mode, or use one Web browser to access them, use another one to access other sites.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |