Tag Archives: Privacy

Are There Privacy Concerns with Google Plus?

Google Plus, Google’s recently announced social network, is currently being tested by select users as a beta project. In what is common with web-based software, the beta version of the platform was released to testers with limited features as well as basic security and privacy features. According to various reports online, a significant flaw in the privacy settings has already been identified.

Content Exposed Through Resharing

Like most of the popular social networks these days, Google Plus is designed to allow users to share and reshare content. The platform is equipped with a unique component known as Circles, a feature that allows users to separate their friends by criteria such as relatives, co-workers, and classmates. Unfortunately, all the content you share with your circle can be shared with the people in their circle, essentially meaning that your status updates, photos, videos, and other content can be exposed to complete strangers.

Since the beta version apparently does not have an option that allows you to restrict who reshares your content with others, those passing along sensitive information could possibly have concerns over this feature. However, Google has come up with a quick fix to counter the early critics. A BusinessInsider article showed that the company included a dialog box explaining to the user that the original post was shared with an exclusive audience and warning them to share the content responsibly. While disabling the reshare feature may have been a better move in the eyes of some observers, whether or not this approach will suffice when the project goes live is something that remains to be seen.

Big Deal or No Big Deal?

The Google Plus flaw was reportedly first spotted by Tim Bradshaw, journalist and Digital Media Correspondent for London’s Financial Times. According to Bradshaw, this flaw is no where near as serious as the hole that resulted in Google having to shell out a hefty sum to settle a legal dispute over the Buzz privacy fiasco. The Plus issue certainly does not seem to be a big deal at this point when considering that the product is being tested and such flaws can easily be addressed before the official launch. Additionally, while Google should certainly be held responsible for making sure users know how the platform works, it is ultimately up to the user to know just how public social sharing can be. Regardless of what mechanisms are in place, anything you share online can technically be shared with others.

Google has been trying to make a huge splash in the social space for some time, and may finally succeed with Plus. Due to its less than stellar track record, all eyes will certainly be on the internet powerhouse every step of the way. There does not appear to be any major privacy concerns in the early goings, but hopefully for Google’s sake this is not a sign indicative of the search giant getting in the way of its own success once again.

The Importance of Your Online Privacy

This is a guest post by Mike from iVPN. If you would like to write for CallingAllGeeks, check our guest posting guidelines.

Most people who use the Internet on an everyday basis put some form of confidence and trust in it. Whether it’s entering sensitive credit card information on an online retailer, or simply writing something private to a friend on a social networking website, security and privacy are integral parts of the online experience. When that privacy is violated, people become more hesitant in using the Internet; when this happens on a wide scale, participation in websites that require personal details suffers greatly. This is precisely when maintaining security and privacy online should be a top priority for anyone using the Internet.

Online Privacy ImageIdentity fraud is one of the most common forms of security violations on the Internet, and it happens in many forms. An infamous method to compromise someone’s identity is phishing. This method consists of presenting a web interface or sending an e-mail that emulates another website, in order to compromise sensitive information or log-in credentials. For example, a phisher could setup a mirror-image of a bank’s log-in gateway that is an exact duplicate of the bank’s real website in every way. If someone happens upon this fake website and enters their bank information, it will be sent directly to the phisher, thus compromising the victim’s identity.

Phishers don’t only aim for the obvious targets such as bank accounts; they’ll also go for e-mail addresses as well. E-mail credentials can be even more valuable to phishers, as they can browse through a victim’s past e-mails to search for anything valuable that they can get their hands on. They can also change the password and security questions on a victim’s e-mail address, effectively locking victims out from any accounts they may have had attached to their e-mail address.

One of the best ways someone can prevent identity fraud and other hazards is getting the right combination of software tools to strengthen the layers of security on their computer. The first step should be getting a highly comprehensive antivirus software suite; this means not getting a free version, as they often lack the tools that premium antivirus software offers, such as firewalls. Utilizing the security plug-ins that web browsers offer is another way to strengthen security, especially plug-ins that are geared toward protection against phishing e-mails and websites.

A less known method of safeguarding online privacy is increasing anonymity with an anonymous VPN, which stands for Virtual Private Network. A VPN service acts as a firewall proxy between a person’s computer and the Internet, meaning their real identity, or IP address, is not exposed on the Internet, which inherently increases anonymity and privacy. It’s not especially difficult to find a reliable VPN service online, provided one researches reviews of the VPN provider before going and purchasing an account with them.

Using an anonymous VPN and updated antivirus program isn’t always enough to maintain online privacy; someone being well-informed and aware of the common pitfalls of the Internet that compromise privacy is the strongest tool in remaining secure. Paying attention to phishing warnings and new security threats is the best way to protect privacy.

Two Best Folder Lock Applications for Windows

Many time we need a folder lock and hide application. We want to keep others away from our personal data but we are unable to stop their access to our PC. In this condition folder protection applications are really effective and using these type of applications we can make a folder or drive read only (delete protected),Inaccessible or completely invisible. These applications works with a master password to control it all. There are many software to lock a folder but here we are telling about best 2 such applications.

Two Best Folder and Drive Protection Applications for Windows

1.Folder Security Personal

Folder Security Personal is a complete solution to protect or lock a folder. It is a small but powerful software and you can use its 15 days free full working trial. Using this software you can lock folder or hide folders. You can also lock hard drive as well as optical drives with it.


Features of Folder Security Personal

  • You can lock folders
  • You can make folders delete protected
  • You can lock hard drives
  • You can lock optical drives
  • Very light application
  • 15 days fully functional trial


2.Folder Guard

Folder Guard is the second most powerful folder protection software with which you can lock folders or hide folders and make them password protected. You can use Folder Guard to lock your personal files,folders and many other type of Windows options such as control panel,start menu etc.


Features of Folder Guard

  • You can lock any file or folder with a password
  • You can hide any file or folder and it will be completely invisible
  • You can hide control panel,start menu and desktop
  • You can protect hard drives and optical drives
  • Use hot keys to operate the application

Download Free Trial

Do let us know which software are you using to hide your folder and to lock your folder?

How to Hide Files & Folders From Spotlight Search on Mac

This tutorial will show you how to hide any file or folder Spotlight search results. Spotlight privacy settings, once configured, will keep your personal data safe from prying eyes.

You might have often noticed that when you search for files and folders on your Mac using Spotlight(Cmd+Space) some results unintentionally crop up in the results. Here’s a simple solution to enable spotlight privacy.

Follow these steps to Hide files/folders from Spotlight:

  • Search anything in Spotlight(Cmd+Space) and click on Spotlight Preferences Link in the bottom.
  • The first tab displays various categories. Use this list to hide content like Mail messages, contacts & certain file types such as Images, PDF files etc.


  • Now getting back to hiding specific files.
  • Click on the Privacy Tab. Here is the list of files and folders which Spotlight will skip during searching. So click on the plus button at the bottom of the list to add anything to the list.


  • You can put all your personal data in one folder and just add the folder to this list so that they are not displayed in results.

Simple enough, right! If you have more Mac related queries feel free to use the new CAG Help forum.