ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Cyber Suicide and Digital Death

Updated on February 12, 2017

Information Nazi

It will happen this way. You will come to your computer late one evening. You will be tired and at first you will think: That's the problem. I'm tired. I have forgotten my password.

You will go through your little password recovery rituals. You will ask your significant other who is becoming increasingly irritated at having to be your memory bank. Or worse, you will ask your kids who will just look at you funny. In desperation you ask your dog. And hopped nobody noticed your doing that.

You will look for that little piece of paper that some security experts say you never have. The one with the password on it. Then you might look for that file on your desk top that will one day enable the first hacker who gets it to take over your life and empty out your bank account. You know the file that has every password you have ever had in it?

You will request a new password online. The next day you talk to technical support. At first they may seem helpful. But then their answers grow more and more vague until you get a message that says: Have you read the terms of your agreement?


I regret to inform you that you are digitally dead. Either your or one of your family members has done something while signed in under one of your accounts that offended the Cyber Gods and they have banished you from the Digital Asgard.

No longer can you walk the halls of glory in the Home of the Gods. You are banned from Mount Olympus.

Worse than that, years of correspondence, job references, technical papers , legal commitments or agreements are lost to you now and for ever.

You thought it was funny when the Soup Nazi on that old Seinfeld episode said "No soup for you!"

Now that the Digital Nazi has said: "No information for you!" You are laughing no more.

It's Crying Time

You will beg. You will plead. To no avail.

You will threaten legal action and be met by stony silence. After all, you haven't a leg to stand on

Say it Ain't So

But it is so.

How could this have all been avoided? Well, let's cover the obvious advice.

You idiot. What are you doing giving your pass word to your significant other and your kids? Your lover might not betray you but your kids almost certainly will. Inadvertently perhaps, but they will betray you nonetheless.

Your children, whilst claiming to be you, will upload a picture that they think is terribly amusing. A little old lady from Pasadena notices that the photo, which has been posted some website under your name, violates the terms of agreement and now you my friend are toast.

Toast Avoidance Procedures

How can you avoid becoming toast?

First, never share your password. With anyone.

Never share accounts. With anyone

Everyone in the family has their own logins and passwords and accounts.

Also, no matter how friendly your online provider of email and social media is, they are not your friend. If you ever forget this, they will make you pay.

Act like someone who trusts no one on the internet. Do this by having at least two web email addresses. One for work and one for play. The play one can be something like:

It will be comprised and banned at some point so be prepared to drop it like a bad habit and create a new playful identity like:

Never do anything dangerous with your business email: Don't use it for social media or game playing. It's all business and you only do business with it. If you ever consider uploading a photograph with your business email, you are probably doing something wrong.

Speaking of photographs, if you are doing the internet dating thing go to another online email provider entirely and create a dating email address. No social media with this one and no internet gaming either. Strictly dating on the dating email. No business.

If you are paranoid, create one last email address with a service entirely different from the other email addresses. This one is a silent dummy. He never does nothing with nobody. He needs to be with a service that never expires your email. There is at least one email service out there that will delete all your emails if you don't access your account at least once every 6 months or so. Dummy does not go with that particular provider so again check the terms of agreement carefully. Dummy at the very least gets a copy of all important correspondence and anything you can't afford to lose. If you ever get locked out of the other accounts, dummy is your last ace in the whole.

For those who are not aware, some of the online enterprises that provide email addresses are gmail from Google, yahoo mail from Yahoo, and hotmail or from Microsoft. There are others so check them out as well.

Cyber Fate

What is the worse thing that has happened to you online?

See results


    0 of 8192 characters used
    Post Comment

    • poetryman6969 profile imageAUTHOR


      3 years ago

      Peggy, governments all over the world are looking for the power to shut down the Internet. Even the US government and even some states. Sometimes I think people don't take government power seriously enough. Government has the power to kill you where you stand and make up a reason later. For me, this does not mean I should fear the government only that I should always be suspicious whenever the government says it needs more power. Like the power to shut down the internet or the power to spy on all of us all the time for any reason or no reason.

    • Peggy W profile image

      Peggy Woods 

      3 years ago from Houston, Texas

      I have only two email accounts and should probably have more for the "just in case" scenario. Interesting thoughts you shared with us in this hub. We are lucky that our Internet access is open and free in our least so far! Let's hope that long continues!

      Potentially our overloaded and aging electricity delivery system could cause us more problems with regard to Internet access as well as living life as we know it if they do not start addressing that soon. The blackouts and brownouts are happening more often.

    • poetryman6969 profile imageAUTHOR


      7 years ago

      It is interesting that one of the first things that the governments do in the middle east when they are being overthrown is to shut down the internet....

    • Trsmd profile image


      7 years ago from India

      Will the USA become the next Nazi-type jungle, with today's digital capability?


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)