Tech Tips Home
The Best Tech Tips And Daily Deals
Newsletter On The Internet!

WorldStart Tech Tip And Store Search
Email: Password: Login Remember Me
looking for freeware

Like what you see here? Subscribe to the Tech Tips newsletter!   Email: Subscribe

How to Compute In Privacy: Part 1

Tuesday, November 12th, 2013 by | Filed Under: Security Help

Thanks to the NSA Scandal with Edward Snowden, people are now more concerned with the privacy of their digital communications than every before. It was Snowden that made shockwaves worldwide when he blew the whistle and leaked the mega story “The NSA is Spying on YOU” earlier this year.

 The reactions?

Well, there are two main camps really, those who shrugged it off as, “ah, no biggy”; and those who are now taking a long and hard look at how well their data is being protected.

Just in case you’re in the first group and are “just curious”, here are the 6 best ways to compute in privacy.

 #1 – Password Privacy

The easiest way to get your data stolen is to use a weak password.

Most people are not aware that most “hackers” crack into systems using a technique called social engineering

They don’t always crack into your account with sophisticated high powered computers; many times they just simply put two and two together and try a few different password combinations using information they have about you.  This is why writing your password on a note under your keyboard is a bad idea.

Password Privacy Do’s:

  • Keep it simple. Use a password that you can remember.
    There’s no point in having a password that you can’t recall when you need it most. Keep it simple, don’t make it too hard.
  • Use a song, part of a quote, a popular movie line, or phrase as a base.
    For example, “We don’t need no stinking badges.” Can become WDNNSB if you use the first letter of each word.  Add to this your favorite special characters and a few numbers like your birth year and now you have a strong password, ex: WDNNSB@1971!. 

 Password Privacy Don’ts:

  • Use a password management software.
    The whole point of a PRIVATE password is that only YOU have it, if you store it in some management system, guess what? Someone else has access to it too.  Instead of taking this risk, just type them in clear text in a text document somewhere in a way that only YOU can understand or interpret.  Example %myfavmovieline%@yearoftheMAN!
  • Use the same password. 
    Instead figure out an identification system to add to your password on each site that you use.  For example BOA_WDNNSB@1971! Or WDNNSB@1971!boa for your Bank of America account and WDNNSB@1971!wells or WF-WDNNSB@1971! For your Wells Fargo account.

Also don’t forget to alternate the text capitalization as this adds further complexity to your password.  You can capitalize the first letter only, or the last letter only, or only the first two letters, whatever it is just remember to keep it consistent and easy for you to remember. 



#2 – Search privacy

Unfortunately Google, Yahoo, and Bing have all admitted to storing and sharing your data with “others”. This can put you in a predicament when you just want to keep your private communications private.

Here are the top 8 search engines that do not store information such as when you search and what you’re searching:


If you still want to use Google but you don’t want them to know what YOU search then you should try this:

  • Hide your IP address.
    Use software tools like Easy-Hide-Ip and Quick Hide IP Platinum.  This is needed because your IP address acts almost like your social security number online.  With this info your ISP, people you email, and websites you visit can easily figure out specifically WHO you are.
  • Make sure you’re not logged in to Google.
    Try using Google Chrome in “incognito mode”. 
    Open Chrome, click the options/settings button and select New incognito window:

    A new window will appear with a notification message:

  • Go to

This will help prevent “others” from seeing what you search for Google such as your ISP, that is whoever is providing you an internet connection. Also, if you’re not logged in to Google then they won’t have an account to link to your searches. 

*Remember, this helps dramatically but it’s still not a 100% private.

 #3 – Email Privacy

Email privacy is now becoming increasingly more important as over and over again judges have held that emails are in fact PUBLIC information.

Although this may sound shocking it is the reality that we live in today. This effectively means that someone can obtain your email through nefarious means and then claim that is okay for them to have it because it’s public.

If you want your emails to be read only by the person that you send them to here are your options:

 I’ll have more of these tips in part 2 of How to Compute in Privacy.

~ Darnell Jackson


Tags: ,

6 Responses to “How to Compute In Privacy: Part 1”

  1. bob rice says:

    Interesting. I have never once seen anyone say, “don’t” use a password manager. The reason stated here is not clear: “If you store it in some management system, guess what? Someone else has access to it too.”

    So I guess you are referring to an online manager. I don’t know anyone who uses one. Most are on the computer, and if one uses a long, complex master password to access the manager, it should be safe. Right?

  2. Bill in Texas says:

    Regardless of how “strong” the password may be, I would never include numbers such as my birth year (as recommended in the article) that are potentially available public information.

    • Darnell Jackson says:

      Hey Bill,

      The point is no one will know how you choose to present your birth date:


      All represent the same date the idea is to keep it secure by encrypting it with your mind.

  3. Maurice Smith says:

    This is great information – Thanks

  4. Jimmy Storar says:

    If You have don’t worry about anyone reading Your email can’t You use a very simple password?

    • steve says:

      Keep in mind that if they can get into your e-mail to read it, they can also send messages to your contacts as well. Not to mention they could send spam or pornography from your account – and sometimes it’s hard to prove it wasn’t YOU who did it. A lot of people have gotten in trouble at the federal level for what amounted to a hacked account – just not worth in in my opinion.


Leave a Reply

Like these tips? Get them for FREE in your email!

WorldStart's Tech Tips Newsletter

  • Tech Tips Daily - Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

  • Tech Tips Weekly - If you don't want our Tech Tips newsletter every day, then sign up for this weekly newsletter to get the best information of the week. Sent on Fridays.

Other Newsletters

  • WorldStart's Daily Deals - Every week, we send out great deals in our Daily Deals newsletter. Many of these deals are exclusively for our Daily Deals newsletter subscribers and can't be found with our regular specials.

  • Just For Grins - Each issue includes a couple clean jokes, some funny quotes, and a hilarious reader's story. Newsletter is sent five days a week.

Enter Email Address:


Your e-mail address is safe with us!
We only use it to send you the newsletters you request. It is NEVER disclosed to a third party for any reason, ever! Plus, if you decided you don't like our newsletters (don't worry, you'll love them), unsubscribing is fast and easy.

Free Newsletter Signup

Tech Tips Daily

Become a tech pro! Get the very best tech and computer help sent directly to your email every weekday!

Tech Tips Weekly

The week's best in tech and computer help. Get your issue sent to your email every Friday!

WorldStart's Daily Deals

The very best deals on the Internet! Get a new set of incredible sales every day of the week!

Just For Grins

Clean jokes, funny quotes, and hilarious comics. Sent 5 times a week straight to your email.


Love Worldstart? Refer A Friend!

looking for freeware
WorldStart's Premium Membership

Tip Archive