Cyber Suicide and Digital Death
It will happen this way. You will come to your computer late one evening. You will be tired and at first you will think: That's the problem. I'm tired. I have forgotten my password.
You will go through your little password recovery rituals. You will ask your significant other who is becoming increasingly irritated at having to be your memory bank. Or worse, you will ask your kids who will just look at you funny. In desperation you ask your dog. And hopped nobody noticed your doing that.
You will look for that little piece of paper that some security experts say you never have. The one with the password on it. Then you might look for that file on your desk top that will one day enable the first hacker who gets it to take over your life and empty out your bank account. You know the file that has every password you have ever had in it?
You will request a new password online. The next day you talk to technical support. At first they may seem helpful. But then their answers grow more and more vague until you get a message that says: Have you read the terms of your agreement?
I regret to inform you that you are digitally dead. Either your or one of your family members has done something while signed in under one of your accounts that offended the Cyber Gods and they have banished you from the Digital Asgard.
No longer can you walk the halls of glory in the Home of the Gods. You are banned from Mount Olympus.
Worse than that, years of correspondence, job references, technical papers , legal commitments or agreements are lost to you now and for ever.
You thought it was funny when the Soup Nazi on that old Seinfeld episode said "No soup for you!"
Now that the Digital Nazi has said: "No information for you!" You are laughing no more.
It's Crying Time
You will beg. You will plead. To no avail.
You will threaten legal action and be met by stony silence. After all, you haven't a leg to stand on
Say it Ain't So
But it is so.
How could this have all been avoided? Well, let's cover the obvious advice.
You idiot. What are you doing giving your pass word to your significant other and your kids? Your lover might not betray you but your kids almost certainly will. Inadvertently perhaps, but they will betray you nonetheless.
Your children, whilst claiming to be you, will upload a picture that they think is terribly amusing. A little old lady from Pasadena notices that the photo, which has been posted some website under your name, violates the terms of agreement and now you my friend are toast.
Toast Avoidance Procedures
How can you avoid becoming toast?
First, never share your password. With anyone.
Never share accounts. With anyone
Everyone in the family has their own logins and passwords and accounts.
Also, no matter how friendly your online provider of email and social media is, they are not your friend. If you ever forget this, they will make you pay.
Act like someone who trusts no one on the internet. Do this by having at least two web email addresses. One for work and one for play. The play one can be something like:
It will be comprised and banned at some point so be prepared to drop it like a bad habit and create a new playful identity like: firstname.lastname@example.org.
Never do anything dangerous with your business email: email@example.com. Don't use it for social media or game playing. It's all business and you only do business with it. If you ever consider uploading a photograph with your business email, you are probably doing something wrong.
Speaking of photographs, if you are doing the internet dating thing go to another online email provider entirely and create a dating email address. No social media with this one and no internet gaming either. Strictly dating on the dating email. No business.
If you are paranoid, create one last email address with a service entirely different from the other email addresses. This one is a silent dummy. He never does nothing with nobody. He needs to be with a service that never expires your email. There is at least one email service out there that will delete all your emails if you don't access your account at least once every 6 months or so. Dummy does not go with that particular provider so again check the terms of agreement carefully. Dummy at the very least gets a copy of all important correspondence and anything you can't afford to lose. If you ever get locked out of the other accounts, dummy is your last ace in the whole.
For those who are not aware, some of the online enterprises that provide email addresses are gmail from Google, yahoo mail from Yahoo, and hotmail or live.com from Microsoft. There are others so check them out as well.
- How to Combat Digital Terrorists and Cyber Crime | Email | FireHow.com
How to Combat Digital Terrorists and Cyber Crime. How to Combat Digital Terrorists and Cyber Crime