Categories
Interior

How to share your screen without revealing private information

How to share your screen without revealing private information

Yes – it’s possible to share your Netflix account without handing over your password. However, know that this option isn’t built-in, which means you won’t find it on Netflix’s website or its apps. Instead, you need to rely on the creativity of third-party developers, who have already made interesting workarounds in the form of Chrome extensions.

With that said, you’ll find step-by-step guides in this article, teaching you how to share your Netflix account privately without revealing your password. So, let’s jump right in!

Just recently, Netflix has started verifying its subscribers in an effort to prevent password-sharing. That makes the following instructions even more important than before, as Netflix might soon sanction password-sharing.

How to Share Your Netflix Account Without Giving Your Password

As noted above, we’ll use Web browser extensions – and these are made for Chrome and other Chrome-based browsers. So, here are the two methods available right now.

  • Method #1:Share a Netflix Account via ‘ShareAccount’
  • Method #2:Share a Netflix Account via ‘DoNotPay’

Method #1: Share a Netflix Account via the ‘ShareAccount’ Extension

A Chrome extension named ‘ShareAccount’ lets you share your Netflix account in just a few easy steps, creating private keys instead of relying on passwords. With that said, you first need to do the following.

  • Go ahead and check out the ‘ShareAccount’ extension on Chrome.
  • Use the link we’ve provided above and select ‘Add to Chrome.’
  • Make sure the extension is active by checking the top-right corner of Chrome.
  • The recipient must use this same extension, so ensure to meet this requirement.

By now, you have installed ‘ShareAccount’ on Chrome, which should be accessible in the top-right corner of your Web browser. And now, here’s how to use this extension to share your Netflix account without revealing your password.

  • Using Chrome, login to your Netflix account.
  • Activate the ‘ShareAccount’ extension by clicking on its icon.
  • Select ‘Share Account.’
  • Then, enter the recipient’s code (which means the recipient must open the extension on their computer and select ‘Receive Account’ – so, have them send you their code.)
  • You can also set a time limit, in hours. By default, this time limit will be set to a week.
  • Finally, click on ‘Share‘ once ready to start sharing your Netflix account.

At this moment, you will receive a set of instructions (in the ‘Share Result’ field), which you need to share with the recipient(s). Alternatively, you can share a link at the bottom of the extension’s screen – even though that option doesn’t work all the time.

To activate Netflix account sharing, the recipient must open the ‘ShareAccount’ extension on their computer, click on ‘Receive Account,’ and paste the ‘Share Result’ code that has been shared by you.

Method #2: Share a Netflix Account Using the ‘DoNotPay’ Extension

In case you find the method above too complicated, we have another option for you. The ‘DoNotPay’ extension comes with many tricks up its sleeve, and sharing Netflix accounts without a password is one of those. So, here’s what you need to do first.

  • Go ahead and sign up for a DoNotPay account.
  • Then, check how to install the ‘DoNotPay’ on Chrome.
  • Instruct the recipient to do the same.

Once you create your ‘DoNotPay’ account and install the extension, it’s time to share your Netflix account. Keep in mind that ‘DoNotPay’ lets you share your account (without a password) with up to five individuals. So, let’s continue with this process.

  • Using Chrome, launch Netflix’s website and log in.
  • Then, activate the ‘DoNotPay‘ extension.
  • The extension should automatically recognize the streaming service.
  • You need to select ‘Generate a Link.’
  • A custom URL will be auto-generated. You can also input an email to notify the recipient. And lastly, you can set the link to be private for added security.

That’s it! Once the recipient receives their ‘DoNotPay’ URL, they will activate that URL once they verify their identity. At any moment, you can revoke access to your account, which means you’ll be in charge all the time.

That would be all on how to share your Netflix account privately, without giving your password. In case of any questions or doubts, don’t hesitate to post a comment below. And lastly – thank you for reading!

If you’ve ever worked with remote teams, worked from home, or attended a virtual all-hands meeting, you’ve likely seen or even participated in free screen sharing. Screen sharing is typically a feature of a business productivity tool and done in partnership with programs such as free video conferencing or even free online whiteboards. However, each of these alone isn’t enough to keep up with the demands of today’s remote work.

Free screen sharing is a versatile tool that allows a person to share their computer screen with others in real-time so everyone in a meeting can see the same thing at the same time, eliminating the need to email relevant content like documents or images. It has made virtual real-time collaboration easy while helping keep meetings productive and successful.

Free screen sharing is easy, but there are right and wrong ways of doing it. So, let’s ensure you’re making the most of free screen sharing.

Visual learning tool

Time is a finite resource, and screen sharing can help cut the amount of time you would typically spend explaining ideas during a meeting. There are many uses for it, including online training and support, demonstrations for prospects, reviewing documents, and so on. The best programs will give you options, such as allowing you to share specific windows or your entire desktop during a meeting.

Whether you need to share ideas or reveal insights and data quickly, screen sharing is ideal. It has become a common practice in the business world because it allows for real-time collaboration and keeps your meeting moving without the holdups of needing to email something.

With most people being visual learners, your audience is more likely to understand and even retain the information you share if they can see it. Here are some tips to ensure you’re making the most of your free screen sharing:

Know the software

You likely have access to several free screen sharing programs, so it’s imperative that you know the controls on the one you will be using. Although most are similar, they do have different user interfaces and controls. Ensure you’re comfortable with how to operate the software and the necessary display skills. Free screen sharing isn’t a traditional slide presentation, but it is a form of presenting, so being comfortable with the technology is a must.

Set your communication tools to “do not disturb”

Getting notifications in the middle of your free screen sharing session can slow the momentum of your progress, distract you, and be potentially embarrassing to you. Setting your communication tools to “do not disturb” helps ensure no unwanted messages appear on your screen in the middle of your presentation.

Clean your desktop or share a window

Much like your house, when you invite people in, you don’t want their first impression to be of your cluttered and messy desktop. A messy desktop can make it difficult for you to find the files you need to share but can also distract those you’re presenting to, making you look unprofessional and disorganized. A workaround if you don’t have the time to clean your desktop is to share a window instead of your whole desktop.

Close out all unneeded programs and apps

Shutting down unnecessary apps is especially important because you do not want to share personal information such as your bank account or any client or company-confidential information. Be proactive and prep before your meeting. Ask yourself, do you need to share your entire screen, or can you get by sharing a specific window? A quick cleanup will help ensure that you and those in your meeting aren’t caught off guard by something on your computer screen.

Make sure it’s secure

With cyber attacks happening roughly every 39 seconds, it’s more important than ever to ensure you and those you’re presenting to are secure. Choose a free screen sharing tool that’s fully integrated, easy to configure and secure.

Free screen sharing has many benefits, including engaging with remote workers and teams and while also encouraging collaboration. It is useful and easy, but it’s essential to ensure you’re doing it right. You’re opening up your (often private) world to others, and the implications of being unprepared can range from mildly embarrassing to catastrophic. Being prepared helps you avoid a bad experience for you and for those you’re presenting to.

About the author

The Microsoft 365 team is focused on sharing resources to help you start, run, and grow your business.

I’m writing a program, from a security point of view, that will catch an SQLException. I’m trying to purge all sensitive information.

Would writing it the above way reveal sensitive information? If so, what would be an secure way to write it?

4 Answers 4

You are revealing parts of your code, as line numbers and variable names will be printed.

The best way would be to just custom your own message. Another method can be something similar to the way IIS error messages are printed: show full stack trace if the request is from the server computer (debugging) but show a generic error for external requests.

How to share your screen without revealing private information

Even from a UX point of view, spewing out technical info will create a crappy experience for the user.

Use a polite general error code (and or error message) that users can send you to help with debugging

How to share your screen without revealing private information

CERT Secure Coding sheds some light on this topic. They give examples as to why simply printing the stack trace is not secure. There are several issues from both a technical and business prospective:

  • SQLExceptions can reveal hints about database structure
  • Sensitive client information could be revealed by an exception
  • Stack traces in general can reveal implementation details of your application

There are several things you can do to mitigate these risks.

Discard the exception. While far from ideal, one potential solution could be to catch the original exception, and either print a message free of sensitive data to Standard Error or throw a new exception with a different message. This, however, can make debugging difficult, but it could reduce the risk of exposing sensitive information.

Clean up the exception.

The MyExceptionCleaner object has the ability to capture and filter any sensitive data while still preserving any details that might be useful for maintenance. For more information, check out this question.

Q) Why printing the stack trace after an exception is thrown is insecure ?

A) A stack trace is an informational leak, which reveals some details about the implementation of your system. Not a serious vulnerability but could aid attackers to gain certain information about the deign of the database (database version, table names, code filenames).

Printing the stack trace could also allow attackers to use debugging tools to identify and exploit flaws in the system.

Apart from the security issues discussed above the stack trace should not be displayed to any users of the system or attackers. Customer confidence in the system will be decreased if an error such as the stack trace is printed onto the console.

The user is unclear if their transaction has been completed, or unclear on why such an error has been shown.

An Error Has Occurred Summary: Syntax error (missing operator) in query expression ‘username = ‘john’ or 1=1 ‘ AND password = ‘gggg”. Error Message: System.Data.OleDb.OleDbException: Syntax error (missing operator) in query expression ‘username = ‘john’ or 1=1 ‘ AND password = ‘gggg”. at System.Data.OleDb.OleDbCommand.ExecuteCommandTextErrorHandling(OleDbHResult hr) at System.Data.OleDb.OleDbCommand.ExecuteCommandTextForSingleResult(tagDBPARAMS dbParams, Object& executeResult) at System.Data.OleDb.OleDbCommand.ExecuteCommandText(Object& executeResult) at System.Data.OleDb.OleDbCommand.ExecuteCommand(CommandBehavior behavior, Object& executeResult) at System.Data.OleDb.OleDbCommand.ExecuteReaderInternal(CommandBehavior behavior, String method) at System.Data.OleDb.OleDbCommand.ExecuteReader(CommandBehavior behavior) at System.Data.OleDb.OleDbCommand.System.Data.IDbCommand.ExecuteReader(CommandBehavior behavior) at System.Data.Common.DbDataAdapter.FillInternal(DataSet dataset, DataTable[] datatables, Int32 startRecord, Int32 maxRecords, String srcTable, IDbCommand command, CommandBehavior behavior) at System.Data.Common.DbDataAdapter.Fill(DataSet dataSet, Int32 startRecord, Int32 maxRecords, String srcTable, IDbCommand command, CommandBehavior behavior) at System.Data.Common.DbDataAdapter.Fill(DataSet dataSet, String srcTable) at Altoro.Authentication.ValidateUser (String uName, String pWord) in c:\downloads\AltoroMutual_v6\website\bank\login.aspx.cs:line 68 at Altoro.Authentication.Page_Load(Object sender, EventArgs e) in c:\downloads\AltoroMutual_v6\website\bank \login.aspx.cs:line 33 at System.Web.Util.CalliHelper.EventArgFunctionCaller(IntPtr fp, Object o, Object t, EventArgs e) at System.Web.Util.CalliEventHandlerDelegateProxy.Callback(Object sender, EventArgs e) at System.Web.UI.Control.OnLoad (EventArgs e) at System.Web.UI.Control.LoadRecursive() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint)

As shown in the example stack trace shown above, the user name that was entered contained invalid characters that were not expected to be entered into the username field, as a result the system crashed and thrown this detailed stack trace to the screen.

What should have occurred is either a customized exception made by the developer to be thrown which instead of revealing all of the above sensitive information to the user just show a message such as:

Two ways of dealing with exceptions and stack trace is by SANITIZING or PURGING.

1) Sanitizing

As shown above, the developer anticipated that an error in input could occur and wrote a error handling section of code that instead of printing the stack trace printed a small easy to understand message to the user on why their action was not completed.

The developer sanitized or “cleaned” the exception to prevent
the system from crashing and can add a loop so if the data entered is incorrect an error message will be thrown and the user asked to re enter their credentials.

2) Purging

Similar to sanitizing, the anticipation of an error occurring allows the developer to intervene and display an error message that is customized only to the understanding of the developer or perhaps the error will not be thrown at all and just a customized error will be thrown to a log file.

Any user facing errors that occur will be sanitized so that the customer can easily understand why the error occurred and the error is then logged. The logged error is purged inside the log file with an id number or a customized

thrown error so instead of FileNotFoundException being displayed in the log the developer can customize that to read Error:782.

How to share your screen without revealing private information

Capturing images of your screen is a great way to share information.

But, what happens when there’s something in the screenshot you don’t want to share? Meet the blur screenshot tool.

Once you start using screenshots, they form a helpful routine that makes it easy to be clear and concise. As you use screenshots more and more, it’s important to have a set of tools that allow you to identify what is important in an image. You don’t need fancy image editing tools just to blur an image.

Additionally, you will run into times when there is content in a screenshot that you’d prefer not to share, but cannot be completely removed. When this happens, it shouldn’t stop you from using screen captures.

There are many ways to hide or de-emphasize content in a screenshot. My colleague, Dayna, has an excellent post detailing some great ways to do this. She suggests blurring out undesirable portions of images. Most high-quality screen capture software has a tool that lets you blur out part or all of an image.

Here are five ways TechSmith employees use blurring with their screenshots.

Get the best screenshot blur tool

Snagit is high-quality screen capture software that lets you blur your images. Try it today for free!

1. Remove personal information from a screenshot

Our tech support team does awesome work every day, providing chat, email, and phone help to our users. This work requires them to take a lot of screenshots. Often, the screen grabs include email and other account information.

Our agents use Snagit’s blur tool to remove personal information, like their email address, from a screenshot.

How to share your screen without revealing private information

In the screenshot above, one of our techs needed to show a user how to change an account setting on Screencast.com. He was able to blur out his email address and display name without the capture losing any of its context or meaning. Pretty sweet.

2. Screenshots of user feedback

One of the most important parts of our software building process is listening to our users.

We run beta tests, communicate with user groups, conduct surveys, and maintain a feedback community, among many other input-gathering strategies. While planning new features, we make sure everyone working on our software has heard the voice of our users.

To do this, we create resources and share them throughout the team. The names or information of individual users, often collected in surveys, is not necessary to include. So, we usually blur it out.

The screenshot below is from a spreadsheet containing user feedback with the ‘email address’ column blurred out.

How to share your screen without revealing private information

3. Remove unnecessary information

Sometimes the reason for blurring isn’t about hiding identifying or sensitive information.

Instead, there is irrelevant or unnecessary content that you want to de-emphasize. This is a tactic one of our trainers uses to direct the focus for example screenshots.

He grabs an image to include in a presentation and then blurs out the parts that could distract from the subject. In the screenshot below, he blurred text that was not pertinent to what he was explaining.

How to share your screen without revealing private information

4. Use blur to highlight

I’ve talked about how blur tools can hide information. But blurring also can be used to emphasize a particular part of a screenshot or video.

By blurring out the unimportant parts of any image, you can draw a viewer’s eye to a particular section of an image or video. This technique is useful when you still want to maintain context in your screenshot.

In this example, I’ve blurred the rest of the interface in order to draw attention to the menu in the upper left.

How to share your screen without revealing private information

5. Progressive reveal

When explaining a complicated interface or diagram, some people like to use blur to do a progressive reveal of portions of an image. This is a great tactic in slide decks and presentations.

It also works well in step-by-step processes. By blurring parts of the image, you can be sure the people you’re presenting to know exactly what part of the interface or image you are talking about. Below is a GIF I created to show how a progressive reveal can be done with a screenshot.

There are tons more ways to use blur in images. Download Snagit to start capturing images and try out the blur tool for yourself!

Get the best screenshot blur tool

Snagit is high-quality screen capture software that lets you blur your images. Try it today for free!

Article Angle: This article is meant to provide a brief background on what a free screen sharing is and provide insight on how to prepare best and do it correctly.

If you’ve ever worked with remote teams, worked from home, or attended a virtual all-hands meeting, you’ve likely seen or even participated in free screen sharing. Screen sharing is typically a feature of a business productivity tool and done in partnership with programs such as free video conferencing or even free online whiteboards. However, each of these alone isn’t enough to keep up with the demands of today’s remote work.

Free screen sharing is a versatile tool that allows a person to share their computer screen with others in real-time so everyone in a meeting can see the same thing at the same time, eliminating the need to email relevant content like documents or images. It has made virtual real-time collaboration easy while helping keep meetings productive and successful.

Free screen sharing is easy, but there are right and wrong ways of doing it. So, let’s ensure that you’re making the most of free screen sharing.

Visual learning tool

Time is a finite resource, and screen sharing can help cut the amount of time you would typically spend explaining ideas during a meeting. There are many uses for it, including online training and support, demonstrations for prospects, reviewing documents and so on. The best programs will give you options, such as allowing you to share specific windows or your entire desktop during a meeting.

Whether you need to share ideas or reveal insights and data quickly, screen sharing is ideal. It has become a common practice in the business world because it allows for real-time collaboration and keeps your meeting moving without the holdups of needing to email something.

With most people being visual learners, your audience is more likely to understand and even retain the information you share if they can see it. Here are some tips to ensure that you’re making the most of your free screen sharing:

Know the software

You probably have access to several free screen sharing programs, so it’s imperative that you know the controls on the one you will be using. Although most are similar, they have different user interfaces and controls. Ensure that you’re comfortable with how to operate the software and the necessary display skills. Free screen sharing isn’t a traditional slide presentation, but it is a form of presenting, so being comfortable with the technology is a must.

Set your communication tools to “do not disturb”

Getting notifications in the middle of your free screen sharing session can slow the momentum of your progress, distract you, and be potentially embarrassing to you. Setting your communication tools to “do not disturb” helps ensure no unwanted messages appear on your screen in the middle of your presentation.

Clean your desktop or share a window

Much like your house, when you invite people in, you don’t want their first impression to be of your cluttered and messy desktop. A messy desktop can make it difficult for you to find the files you need to share but can also distract those you’re presenting to, making you look unprofessional and disorganised. A workaround if you don’t have the time to clean your desktop is to share a window instead of your whole desktop.

Close out all unneeded programs and apps

Shutting down unnecessary apps is especially important because you do not want to share personal information such as your bank account or any client or company-confidential information. Be proactive and prep before your meeting. Ask yourself, do you need to share your entire screen, or can you get by sharing a specific window? A quick cleanup will help ensure that you and those in your meeting aren’t caught off guard by something on your computer screen.

Make sure it’s secure

With cyber attacks happening roughly every 39 seconds, it’s more important than ever to ensure that you and those you’re presenting to are secure. Choose a free screen sharing tool that’s fully integrated, easy to configure and secure.

Conclusion

Free screen sharing has many benefits, including engaging with remote workers and teams and while also encouraging collaboration. It is useful and easy, but it’s essential to ensure that you’re doing it right. You’re opening up your (often private) world to others, and the implications of being unprepared can range from mildly embarrassing to catastrophic. Being prepared helps you avoid a bad experience for you and for those you’re presenting to.

About the author

The Microsoft 365 team is focused on sharing resources to help you start, run, and grow your business.

Yes. The Privacy Rule allows covered health care providers to share protected health information for treatment purposes without patient authorization, as long as they use reasonable safeguards when doing so. These treatment communications may occur orally or in writing, by phone, fax, e-mail, or otherwise.

  • A laboratory may fax, or communicate over the phone, a patient’s medical test results to a physician.
  • A physician may mail or fax a copy of a patient’s medical record to a specialist who intends to treat the patient.
  • A hospital may fax a patient’s health care instructions to a nursing home to which the patient is to be transferred.
  • A doctor may discuss a patient’s condition over the phone with an emergency room physician who is providing the patient with emergency care.
  • A doctor may orally discuss a patient’s treatment regimen with a nurse who will be involved in the patient’s care.
  • A physician may consult with another physician by e-mail about a patient’s condition.
  • A hospital may share an organ donor’s medical information with another hospital treating the organ recipient.

The Privacy Rule requires that covered health care providers apply reasonable safeguards when making these communications to protect the information from inappropriate use or disclosure. These safeguards may vary depending on the mode of communication used. For example, when faxing protected health information to a telephone number that is not regularly used, a reasonable safeguard may involve a provider first confirming the fax number with the intended recipient. Similarly, a covered entity may pre-program frequently used numbers directly into the fax machine to avoid misdirecting the information. When discussing patient health information orally with another provider in proximity of others, a doctor may be able to reasonably safeguard the information by lowering his or her voice.

How to share your screen without revealing private information

Since its inception as a popular Internet application, Telegram messenger has always been able to boast of its thorough attitude to the security of communication and concern for the protection of users’ personal data.

That is why Telegram provides a wide range of tools and settings that will allow you to hide access to your personal information, if you so wish. One of these tools is the option that allows you to hide your Telegram number from strangers, thereby granting you the privilege of anonymity on the network.

How to Hide a Number in Telegram

Telegram provides the simplest and most convenient settings that allow you to hide your number, in order to do this you need to:

  1. Open the “Settings” menu in Telegram;
  2. Select “Privacy”;
  3. Find the item “Phone number”;
  4. Make the necessary settings in this section.

Next, we will tell you in more detail how this function works and how to hide a number in Telegram on Android and iOS operating systems, we will now tell you further.

It should be noted that the setting of number anonymity on the desktop version of Telegram is completely identical to that on the Android version.

Android

In order to hide your number in Telegram on Android, first click on the three strips in the upper left corner, after which your Telegram menu will appear on the screen.

How to share your screen without revealing private information

Click on “Settings” and select the “Privacy” section.

How to share your screen without revealing private information

In the “Privacy” section you need to select the “Phone number” button.

How to share your screen without revealing private information

After which you find yourself in a very important and interesting menu. In it, you can configure the level of access to your personal information, and first of all, determine who will see your phone number: everyone, the list of your telegram contacts, or no one.

However, the latter function has limitations (more on them later).

Also in this section you can decide who can find you in Telegram by phone number – all users or only your contacts. As a final chord – you have the opportunity to select and add people to the list of exceptions from the rules you created earlier.

That is, you can define people who can always see your phone number, and those who can never see it, despite the previously established rules.

How to share your screen without revealing private information

How to share your screen without revealing private information

In a similar way, setting up a hidden number is carried out on iOS. Launch the Telegram messenger and go to the “Settings” tab.

In “Settings” click on “Privacy”, then select “Phone number”. When the next window opens, select and set the category of users who can see your number. Everything here works the same as described in the previous section. In the same tab, you can set exceptions, which we also wrote about in the section about Android.

How to share your screen without revealing private information

Who Sees My Number in Telegram

How to share your screen without revealing private information

Depending on your privacy settings, your number to which your Telegram account is linked will be seen either by all users of the messenger, or by those who have been added to your list of contacts, or no one will see the number at all if you decide to hide everything.

Another thing is that if you do not want anyone to be able to find you by a Telegram number, adding your phone number to their address book on their smartphone. Then you can specifically prohibit the search for you by phone number in the settings, as described earlier.

How to share your screen without revealing private information

In addition, you can, if you wish, independently share your phone number with a user who does not see your number. To do this, go to the chat / correspondence with a person and click on the three dots in the upper right corner, and then select the “Send your phone” function.

How to hide your phone number in Telegram

How to Correspond Without Revealing Your Number

How to share your screen without revealing private information

In order not to disclose your Telegram number to the person with whom you communicate, set the maximum privacy settings of the number in the way we described above, or set up a special exception for this person, and then simply correspond without adding the interlocutor to your Telegram contacts.

If you do not add a person to your contacts, then with the appropriate privacy settings (“my contacts” or “no one”, or an exception), the person will not see your phone number.

How to share your screen without revealing private information

In this case, be careful and do not accidentally click on the “Add to contacts” button during correspondence.

Five hours a day. By the end of 2016, that’s how much time U.S. users were spending on their mobile devices. Add to that the additional time spent on computers and other Internet-connected devices—video games, anyone?—and it’s clear we’re online a lot.

No matter the amount of time you’re spending online, it makes sense to be smart about how and what you’re doing there—helping protect your personal information from those who’d like nothing better than to steal your identity and cause you harm. The good news is that you can continue using your devices, but in a safer manner, without interfering with your normal online activity/routine. Here are 5 simple ways to help you protect your personal information.

1. Use passcodes for your devices

If you were to leave your smartphone in a coffee shop or taxi, would the person who found it be able to access what’s on it? That’s a scary scenario. Losing your smartphone is one thing, but giving the finder access to everything from your email and social media accounts to all the personal information you may have stored on the device could play havoc with your life. Make sure to use a passcode to help keep your apps, accounts, and personal information protected. Do the same for your laptops and even desktop computers.

2. Create strong and unique passwords for your online accounts

If you have an online account with a company that suffered a data breach, ideally, that one account is your only concern. But if you use the same login credentials on other accounts, then that single breach incident could give hackers access to your other accounts, as well. That’s why it makes sense to use a unique password for each of your online accounts.

If you’re like me and have way too many sets of online credentials to commit to memory, consider using a password manager to keep track of those many, unique passwords. There are several out there with different prices and plans, but it shouldn’t take you too long to figure out which one works best for you. Just do an Internet search for “password managers” and see what suits your needs.

3. Limit social media sharing

Sharing too much on social media may put your personal information in the wrong hands. Pay attention to not only the pictures and posts you share, but also to your privacy settings, as well, so that you’re limiting the number of people who can see what you’re sharing. The Center for Identity at the University of Texas offers tips for managing privacy settings on a variety of social media platforms. If your kids are on social media, you may also want to check their privacy settings. And when it comes to posting, make sure they understand what’s safe to share—and what’s not.

4. Be wary of free Wi-Fi

You get what you pay for, right? Free public Wi-Fi is a good example. Sure, it’s convenient, but in terms of security, most free public Wi-Fi networks don’t offer much. That means, with the right tools, anyone else on the same Wi-Fi network could be “eavesdropping” on your online activity. Given that, would you want to log in to your bank account or enter a credit card number while on public Wi-Fi? The answer is, no!

Even a password-protected Wi-Fi network is only as safe as the people who have the password. Save transactions for when you’re on a secure network, perhaps at home. If you must log in or transact online on public Wi-Fi, use a VPN (virtual private network), which encrypts your activity so that others on the same network can’t easily see what you’re doing.

5. Close unused accounts

Think about all of the online accounts you’ve opened over time. Now, consider which ones are still open, but that you never use. If there’s a breach involving one of those entities, hackers may have access to whatever personal information is tied to that account. An old email account, for instance, could be holding any number of past bank statements and healthcare forms—and those documents may be filled with personal data that could lead to identity theft. Invest some time in identifying unused online accounts and, then, shutting them down. The less personal information you have stored online, the better.

No one can prevent all identity theft, but by using these tips, you’ll help keep your personal information a little more “personal” online—and in this digitally connected age, that’s something to strive for.

Get LifeLock Identity Theft Protection 30 DAYS FREE*

Criminals can open new accounts, get payday loans, and even file tax returns in your name. There was a victim of identity theft every 3 seconds in 2019°, so don’t wait to get identity theft protection.

Want the convenience of a throwaway email address without all the hassle? How about anonymous text messaging so you can get to know someone before giving them your real information? Gliph has you covered.

How to share your screen without revealing private information alt=”How to Cloak Your Private Email Address into an Anonymous, Disposable One with Gliph” width=”320″ height=”320″ />

Gliph is a service that lets you create an identity around a set of three to five symbols called “artifacts” instead of your name, phone number, or email address. You choose how much information you reveal, and anytime you communicate with someone else who has Gliph, the data is protected using AES-256 encryption.

How to share your screen without revealing private information alt=”How to Cloak Your Private Email Address into an Anonymous, Disposable One with Gliph” width=”320″ height=”320″ />

Last week we covered an app called Burner which lets you create throwaway alias phone numbers, but Gliph goes a step further. When you send an email through Gliph, your email address is cloaked so that when you give it out, emails are routed through the cloaked address to your real one, keeping it secure. This means that you’re protected if a website you use ever has a data breach or sells your email address to a third-party.

How to share your screen without revealing private information alt=”How to Cloak Your Private Email Address into an Anonymous, Disposable One with Gliph” width=”320″ height=”320″ />

You can get rid of a cloak anytime you want, and Gliph offers permanent deletion. The best part is that it’s completely free to use. You get one cloak when you sign up and additional ones for inviting your friends. This sounds like a pain, but when you think about it, it makes sense because the more people you know who use it, the more protected you are.

Gliph is available in both the iTunes and Android app stores, but they haven’t added the email cloaking service to the Android app yet. You can still get the full functionality by logging in on a mobile browser. Check out the video below to see how to claim your Gliph:

And this one to see how cloaked emailing works:

Also check out the company’s blog for more on their privacy policy and features.

How to Detect Fake Email Addresses

Think someone’s sending you emails from a forged account? For cloaked emails using Gliph, it’s as easy as spotting the “@cloak.gli.ph” address. For other emails, it’s not as simple.

You can find out a lot about the sender just by looking at the email’s header. You can check this page to see how to do this in various email clients. Once you’ve opened the header, there are a few fields that can tell you a lot of information.

How to share your screen without revealing private information

Misspellings

The first and most obvious tip-off is misspellings. In the header above, the name of the company is spelled incorrectly, and the likelihood that a big corporation would misspell its own name is pretty slim.

IP Address

Another quick trick is to look up the IP address the message came from. If it’s in a different country than the company, it’s probably fake.

Received From

The “Received” line tells you where the email originated from. If the email is actually from who it says it’s from, it would probably come from the company’s website. In the email above, the website the email came from has nothing to do with the company it says it’s from.

Reply To

Same goes for the “Reply To” field. You can tell the email address in the image above has been spoofed because the “Reply To” address doesn’t match the “From” address.

That said, if you aren’t doing it for evil purposes, you can have a lot of fun spoofing your email address or phone number. Have you ever forged your email or phone, or been a victim? Tell us about your experience in the comments.

Keep Your Connection Secure Without a Monthly Bill. Get a lifetime subscription to VPN Unlimited for all your devices with a one-time purchase from the new Gadget Hacks Shop, and watch Hulu or Netflix without regional restrictions, increase security when browsing on public networks, and more.