Wednesday, June 19, 2024

HP PCs - Creating a Wireless Home Network (Windows 10, 8)

 

HP PCs - Creating a Wireless Home Network (Windows 10, 8)

Set up a local network and file sharing

Access shared files and directories on a local network

This document is for HP and Compaq computers with Windows 10 and Windows 8.

Windows allows you to connect multiple computers in a home network. This is a convenient way to share files in the home. This document provides instructions for setting up and sharing folders and files on a wireless home network.

Set up a local network and file sharing

Set up a home network using wireless hardware.

NOTE: 

To perform some of the steps in this document you must be logged into Windows using the main administrative account. Normally this is the first account that was created when the computer was first turned on.

Step 1: Before you begin

Before you start setting up a local network, make sure you have the following hardware:

·         Wireless network interface card (NIC) or an on-the-motherboard wireless network port for each computer.

·         Confirm the computer has a wireless network antenna. The antenna might be a part of internal networking hardware, or the antenna might be external and should be connected to the back of the computer.

·         Wireless router or access point. If you need a network hub, consult with a network specialist at your local computer store to determine a hub that meets your needs.

Follow these steps before you continue with setting up and connecting your network hardware:

·         Disconnect from the Internet. If you have a DSL or cable modem, disconnect it.

·         Disable any firewall software. Firewall software might interfere with network setup. You can enable the firewall after network setup is complete.

Step 2: Set up and connect the network hardware for a local network

Set up and turn on the power for the wireless network router or other networking device. Follow the instructions provided by the manufacturer to connect a broadband cable or DSL modem to the router and set up security for the wireless network.

NOTE: 

In some cases, the modem and router are combined into one device, and might be referred to as a wireless access point.

Configure the wireless router

The router is the communication center of your home network. To configure the wireless router for your local network, connect the router to the modem (if the router and modem are separate), and temporarily connect a network cable from the computer to the wireless router. Follow the specific installation instructions that came with your router. The router and the computer must use the same communication protocols (802.11a, 802.11b, 802.11g, or 802.11n).

1.     Connect a network cable from a network port on the computer to one on the wireless router.

2.     Turn the computer on and wait for Windows to open and connect to the router.

3.     Open a web browser and type the router IP address to connect to the router. See the following table for common router IP addresses, user names, and passwords.

NOTE: 

The information listed in the table is commonly used by popular router manufacturers. If the information is not correct for your router, check with the manufacturer.

Common Router Settings

Router Brand Name

Router IP Address

User Name

Password

3Com

http://192.168.1.1


admin

D-Link

http://192.168.0.1

admin


Linksys

http://192.168.1.1


admin

Netgear

http://192.168.0.1

admin

password

4.     If prompted, enter the default router user name and password.

5.     Follow the prompts to configure the router security settings.

·         Name for the router (SSID): This might be the name of your network. Type in a new name. Do not use the default name.

·         Type of security: For example, WPA, WPA2, or WEP. You should set up wireless security when you configure the router.

·         Password or passphrase: Never use blank password. For better security, use a password or passphrase that is more than 8 characters and contains letters and numbers.

·         Administrator name and password: This is the name of a user account that is allowed to change the router settings. If you want to leave the default user name (admin), be sure to change the password.

Test the network connection while the network cable is still connected, disconnect the network cable, and then continue to the next step to run the wireless network setup wizard.

Step 3: Run the Windows wireless network setup wizard to add devices to the network

Use the Windows network setup wizard to add computers and devices to the network.

1.     In Windows, right-click the network connection icon in the system tray.

2.     Click Open Network and Internet Settings.

3.     In the network status page, scroll down and click Network and Sharing Center.

4.     Click Set up a new connection or network.

5.     Click Set up a new network.

6.     Click Next, and then follow the on-screen instructions to set up a wireless network. When the network setup is complete, continue to the next step to connect to the network.

Step 4: Connect to a local network

Connect to the local network.

NOTE: 

On notebook computers, make sure the wireless device is enabled. For most notebook computers, there is an LED light or a light on a keyboard key with this symbol https://support.hp.com/wcc-assets/document/images/115/c02228162.jpg that glows blue when the wireless device is turned on and enabled, and glows orange when off or disabled. Some notebook computer models might use a different color scheme.

1.     In Windows, click the network connection icon in the system tray.

2.     In the network list, select the wireless network you want to connect to, and then click Connect.

3.     Enter the network pass phrase (or security key) for the selected wireless network, and then click Next.

The computer connects to the network.

4.     Click OK.

Repeat these steps for each computer in the network.

Step 5: Share drives, folders, and files on a local network

You must turn on network discovery to access the computers on the network. You can also set files and printers to be shared and customize sharing options for specific files or folders.

Turn on network discovery and file and printer sharing on a local network

Follow these steps to open advanced sharing settings and turn on network discovery and file and printer sharing.

1.     In Windows, right-click the Network connection icon in the system tray.

2.     Click Open Network and Internet Settings.

3.     On the network status page, scroll down and click Network and Sharing Center

                 

4.     In the left pane, click Change advanced sharing settings.

5.     Select both Turn on network discovery and Turn on file and printer sharing in the sharing profile you want to change.

NOTE: 

There are sharing settings for your Private profile, Guest or Public profile, and All networks.

6.     Click Save changes.

Set sharing options and permissions for specific files or folders on a local network

Set sharing options of files and non-public folders from the computer whose content you want to share. To share non-public folders, do the following:

NOTE: 

Microsoft retired the Homegroup feature in Windows 10 April 2018 Update.

1.     In Windows, search for and open File Explorer.

2.     Browse to the folder you want to share.

3.     Right-click the folder, select Give access to, and then click Remove access (to remove sharing options) or Specific people (to add new sharing permissions).

NOTE: 

Homegroup might display in the menu, however the Homegroup options are no longer available. For more information, see HomeGroup Removed from Windows 10 (Version 1803) (in English) from Microsoft support.

4.     If you choose Specific people, the File Sharing window displays.

5.     Click the down arrow and select the user you want to share with. If the user is not listed, type the user name or email address, and then click Add.

6.     Click the down arrow under Permission Level to set the permission level for each user or group.

7.     Click Share.

Step 6: Test the local network

Open the Windows network window and browse shared folders on each computer or device on the network to make sure sharing is set up correctly.

1.     In the Windows search box, search for and open View network computers and devices.

The Network window opens and displays computers and devices detected on the network.

2.     Double-click the name of the computer or device you want to access. If prompted, enter the user name and password to connect to the computer or device.

·         If the computer can read and access files from a remote computer, the remote computer or device is set up correctly. Browse to every available computer or device from each computer on the network. If there are any issues, repeat these steps and confirm that the settings are correct.

·         If you are not sure how to browse shared folders or are experiencing difficulties, go to the section Accessing shared files and directories.

When all computers can read and access files from the other computers on the network, continue to the next step to enable Internet access on the local network.

Step 7: Enable Internet access and firewall on a local network

After you confirm that your home network is capable of transferring files, connect and enable Internet connections for computers with Internet access.

   CAUTION: 

Make sure each computer with Internet access is well protected from security threats. At the minimum, each computer should have its Internet connection protected with a firewall and Windows should be updated with the latest critical updates from Microsoft Windows Update. If malicious activity comes though one computer, the activity can quickly spread through the entire network.

Access shared files and directories on a local network

Access shared folders and files from computers or devices on the network.

1.     Make sure that network discovery and file sharing is turned on.

2.     In the Windows search box, search for and open View network computers and devices.

The Network window opens and displays computers and devices detected on the network.

3.     Double-click the name of the computer or device you want to access. If prompted, enter the username and password to access that computer.

4.     Navigate to the folder or file you want to access.

 

Friday, May 31, 2024

15 Things You Didn’t Know Your iPhone Could Do

15 Things You Didn’t Know Your iPhone Could Do

Published May 6, 2024
Save
Error! Filename not specified.
Photo: Michael Hession
By Wirecutter Staff
No matter how long you’ve used an iPhone, there are always new (or new-to-you) features to discover. And stumbling upon a time-saving trick after so many years is, quite frankly, a delight.
Here are 15 tips and tricks that Wirecutter staffers rely on all the time. If you don’t already know about them, we hope they make your life a lot easier.
1. Identify plants or animals. If you take a photo of a plant, flower, tree, or animal, you can find out exactly what it is by tapping the Info button on the bottom of the screen; if your iPhone knows what it is, a symbol with stars will appear at the bottom of the photo. The metadata details will tell you what the plant or animal is and will also give you an option to look up more information about it.
2. Transform your phone into a portable white noise machine. In Settings, go to Accessibility > Audio & Visual > Background Sounds and choose from sounds such as Ocean, Rain, and Stream. We’ve tested this ourselves and with babies, and the sounds are soothing for all.
3. Ask Siri to read things to you. Open the Safari app and then command Siri to “read this” or say “I want to listen to this page.” You can also tap the Aa button on the left of the address bar and tap Listen to Page. You have the option to adjust the speaking speed as well as pause.
4. Automatically sort your grocery list. The Reminders app does double duty keeping lists, and it can even organize some lists for you. When you create a new list, select Groceries from the List Type drop-down. As you add items to the list, the app sorts them into categories, such as putting “eggs” under “Dairy, Eggs & Cheese.”
5. Keep people out of your private tabs. If you’ve been away from Safari for 15 minutes, your iPhone can require authentication before displaying your private tabs. That’s handy if you often let other people use your phone and would like to keep some browsing habits private. To enable the feature, go to Settings, tap Safari, and switch on the toggle for Require Face ID to Unlock Private Browsing.
6. Create gestures that you can trigger with your voice. The iOS accessibility features can replay any series of touch actions when you give a voice command. Imagine mapping out an entire, tedious action that you do frequently in an app, such as manually entering information to move through screens, or having a command that scrawls your signature or draws a picture. Go to Settings, tap Accessibility, and then tap Voice Control. Toggle it on, and then tap Commands > Create New Command. Enter your desired command phrase, tap Action, and then tap Run Custom Gesture. Use your finger to create the gesture on your home screen, and your phone will replay it when you say the trigger phrase. Note: We found that Voice Control would respond to anyone using the commands, so maybe turn this one off when you aren’t using it.
7. Quickly remove the background from photos. Tap and hold any picture stored in the Files app, and then tap Quick Actions > Remove Background. iOS creates a duplicate of your original photo with no background—perfect for further editing in another app. You can use the same trick with several photos, too.
8. Use two fingers to select all. Just swipe down to select all to mark every item as read or mass-delete items within apps like Messages, Mail, Notes, and Reminders. This action also works in some third-party apps, such as Telegram, but there is no support yet in others, like Gmail.
9. Copy or translate text with the camera. Open the camera app and point your phone lens at a block of text. An icon with three lines in an outlined square appears at the bottom-right corner. Tap the icon, and it captures the text with the option to copy, select all, look up, translate, or share.
10. Look up laundry-care icons. After you take a photo of a laundry-care label, tap the Info button at the bottom of the page and tap Look Up Laundry Care. The results will show you what each specific label means.
11. Delete one digit on the calculator. Swipe in either direction on the calculator display to remove one digit at a time instead of removing all digits via the Clear or All Clear button.
12. Keep people from snooping through your phone. A setting called Guided Access keeps your phone locked to one app, which is particularly useful when you’re letting kids play with your iPhone. In Settings, tap Accessibility > Guided Access to activate the feature, which prevents whoever is using your phone from exiting an app and opening another one. Just remember to turn it off once you get your phone back.
13. Become a faster photographer with Camera shortcuts. Swiping left on your iPhone’s lock screen opens the Camera app. It’s much easier to shoot photos by pressing the physical volume button on the side of the phone instead of tapping the Shutter button. Swiping the Shutter button to the left shoots a bunch of photos in a row, a function known as burst mode, while holding down the Shutter button shoots video without your having to swipe into video mode. Shaving a second off the time it takes to snap a photo or record video can be precious when you’re capturing something fleeting, like fast-moving kids or pets.
14. Limit screen time for specific apps. Wasting too much time mindlessly scrolling TikTok or Instagram? You can turn on a setting that restricts your access to those apps. Within Settings, tap Screen Time, and then tap Add Limits > Add Limit. You can select an entire app category, such as Social, or you can set limits on specific apps by tapping the category and then selecting apps within those categories. Tap Next in the top-right corner and then choose how much time you’ll allow yourself to spend in those apps. You can give yourself more time on weekends if you want by tapping Customize Days.
15. Move a group of apps to another page on your home screen. When you’re curating your iPhone home screen, moving apps one by one to a different page can be tedious. You can move a group of apps over at the same time: Just long-press an app, tap Edit Home Screen, and then grab the app you want to move. While still holding your finger on the screen, tap on each app icon you’d like to move with it, and the iPhone will grab them all.

Thursday, May 30, 2024

Lyrics of a New Nigeria National Anthem.

Lyrics of a New Nigeria National Anthem'

Nigeria, we hail thee,

Our own dear native land,

Though tribe and tongue may differ,

In brotherhood, we stand,

Nigerians all, and proud to serve

Our sovereign Motherland.

Our flag shall be our symbol

That truth and justice reign,

In peace or battle honour’d,

And this we count as gain,

To hand on to our children

A banner without stain.

O God of all creation,

Grant this our one request,

Help us to build a nation

Where no man is oppressed,

And so with peace and plenty

Nigeria shall be blessed.

Sunday, May 26, 2024

GOOGLE TO INVEST USD 350 MILLION IN INDIA'S FLIPKART

Alphabet Inc.'s Google is poised to acquire a minority stake in Flipkart, valued at $350 million, which would place the Indian e-commerce company's worth at $37 billion, according to a source with direct knowledge of the situation, as reported by Reuters .

👉 The tech giant is set to participate as an investor in the latest funding round for the Bengaluru-based firm, which will be led by Walmart, Flipkart's largest shareholder. This move will position Google as a minority investor, pending regulatory approvals.

👉 In December 2023, a spokesperson from Flipkart reportedly confirmed that Walmart planned to contribute $600 million to the company as part of a larger $1 billion funding round.

Saturday, February 3, 2024

Blogging & Digital Marketing: What are The Benefits of Blogging?


Digital Marketing: What are The Benefits of Blogging?

“Your first blog posts won’t be perfect, but you just have to do it. You have to start somewhere.” – Shane Barker

An efficient and strategic business website is essential in today’s digital age. Even so, few businesses understand the power of blogging as part of their overall website content and marketing strategy. Regular blogging can significantly impact your online presence, driving more traffic to your website while helping you establish yourself as an expert in your industry. This article discusses how blogs drive traffic to your business website, establish brand credibility, engage customers, and boost sales.

What is a blog?

Blogs are articles written to present facts, information, opinions, ideas, or commentary about a specific topic. They are often interactive and include sections at the bottom of individual blog posts where readers can leave comments. Blogs also generate relevant content for a website and can provide a foundation for product marketing and social media promotion to drive search engine traffic to your website.

What is website traffic?

Website traffic refers to the web users who visit a website. Web traffic is the number of visitors a website experiences; individual visits are measured in “sessions” or “page views.” These metrics help website designers gauge the effectiveness of blog content in attracting (popular) interest.

What is Search Engine Optimization?

Search Engine Optimization (SEO) is the technical process used to efficiently connect a website’s content relevance to search engine queries. As a result, search engines such as Google, Yahoo, or Bing, for instance, are more likely to locate content that is relevant to the topic and popular among readers. SEO Software and digital tools are available to assist in maximizing the searchability of web content, including blogs.


“Good SEO work only gets better over time. It’s only search engine tricks that need to keep changing when the ranking algorithms change.” – Jill Whalen.


The goal of blogging is to produce content that is as relevant to potential audiences as possible so that they achieve top search engine ranking results. SEO is critical because high-ranking articles more likely to be read versus lower-ranking ones. Hence, a higher-ranking article that accrues high traffic levels is valuable to the website and business.


What is the purpose of a blog?

 “The first thing you need to decide when you build your blog is what you want to accomplish with it, and what it can do if successful.” – Ron Dawson.

Blogs attracts website traffic, builds customer trust, and elevates a company’s credibility. Moreover, marketing is constantly changing, and using blogs as part of an advertising strategy is a cost-effective way for businesses to reach current or potential customers. The following are a few examples of how companies use blogs:

  • Customer Engagement: Blogs create a relationship between a business and its customers by providing knowledge about company products and services, new developments, and industry trends that may affect them. If done correctly, a foundation for a thriving community based on product feedback, reviews, correspondence, and social media promotion.
  • Product Education & Troubleshooting: Blogs help customers become more knowledgeable about the product or service they have purchased. For example, blog information can assist customers in troubleshooting unique situations, optimizing product utility, or providing answers to frequently asked questions (FAQs).
  • Product & Service Marketing: Blogs can showcase the benefits of a business’s products and services. For example, an article can provide a solution(s) to a consumer or business problem(s) wherein your business’s product is the solution. For example, TimeWellScheduled’s cloud-based software provides scheduling, payroll, communication, and HRIS solutions to various companies. Click here to learn more.
  • Enhance Business Reputation & Credibility: Blogs allow businesses opportunities to present case studies that provide current customers to discuss their experiences with the customer’s products and services. Case-study articles provide buyers with experience-based context to relieve any concerns they may have.

Blogging is a proven way to drive website traffic and increase a business’s SEO rankings. The more content posted on a blog, the more information the search engines have to crawl and index. Meanining, search engines will recognize that a business’s website is an information resource for people to access (about a specific topic).

What is the difference between crawling and indexing?

Search Engine CrawlingCrawling is the discovery of webpages and links that lead to more pages.

Search Engine Indexing: Indexing refers to storing, analyzing, and organizing web content and connections between pages. There are parts of indexing that help inform how a search engine crawls.

What are the benefits of having a blog on a business website?

Blogs Help to Boost Sales

"61% of online users in the US have bought something after reading a blog." (FirstSiteGuide

Blogging drives sales by enhancing product awareness, improving SEO rankings, and increasing website traffic. Also, a blog that is attractive to customers will make it easier for search engines to find it, thereby allowing your business to connect with customers. 

Blogs Help Develop Relationships

Blogs encourage customers to interact with a business and develop relationships. The key to maintaining these relationships is to consistently post quality content and follow up by connecting with people directly through the business's website and/or social media. 

Blogs Increase Brand Awareness

The generation of discussion and interest creates brand awareness, and credibility. Credibility and awareness lead to word-of-mouth promotion and sales. 

Blogs Support the Business Marketing Strategy

Blogging is integral to any content marketing strategy because it is frequently updated with fresh articles and information that keeps consumers interested and engaged. In addition, blog articles are often the first point of contact future customers have with a business.

Blogs Complement Social Media Strategies

"97% of bloggers use social media to boost their results." (FirstSiteGuide) 

Blogging complements social media marketing strategy by making product details and content available to prospective buyers. Further, blog articles provide followers with context and in-depth discussions.

Blogs Help Manage the Business Identity

Blogs provide the advantage of allowing businesses to define and manage their online identity. 

What skills and abilities are necessary to create a blog?

 “Blogging is hard because of the grind required to stay interesting and relevant.” – Sufia Tippu.

Most of us already have many of the skills necessary to create a blog. For instance, can you read? Can you write? Are you willing to learn how to use new software? Are you ready to commit to a consistent schedule of writing unique material indefinitely? These are a few questions you need to ask yourself before you invest in starting a blog.

  • Successful bloggers spend 4 hours on average to write a post. (FirstSiteGuide)
  • The estimated global number of blogs is over 572 million.
  • 7 million is the projected number of bloggers in the US.

Here are a few more skills and abilities that will help you become a successful blogger:

  • Grammar, proofreading, and word processing
  • Learn SEO fundamentals
  • Openness to different perspectives
  • Knowledge of social media platforms
  • Basic website knowledge
  • Research Skills
  • Ability to generate new ideas
  • Willingness to learn

Remember, starting a blog is easy and inexpensive. However, thousands of new blogs are published daily, making it an extremely competitive endeavor. As a result, successful blogs require dedication, discipline, and a willingness to succeed.

  • 67% of bloggers who post daily say that they are successful. (FirstSiteGuide)
  • Blog articles with 3000+ words get better results.(FirstSiteGuide)
  • 97% of bloggers use social media to boost their results.(FirstSiteGuide)

A strategic, well-executed business blog can be a powerful tool to improve your website’s traffic, engagement, and sales. If you don’t have a business blog or have not been consistent with your blogging efforts, now is the time to start. A few essential tips to get you started include:

  • Posting regularly.
  • Writing helpful and informative content.
  • Using keywords thoughtfully throughout your posts.
  • Promoting each new post across your social media channels and including calls-to-action(CTA) on every post.

Following these tips and making blogging part of your overall marketing strategy, you can supercharge your website and take your business to the next level.

About TimeWellScheduled

Thank you for reading our article!

Saturday, January 27, 2024

How To Report Someone Impersonating You on Facebook


How To Report Someone Impersonating You on Facebook

It’s well-known that scammers use fake accounts, fake websites, and fake stories to trick people into falling for their scams. But their ploys are even more effective if they use a real person’s profile or identity instead of fabricating one from scratch.

If you discover that a hacker has created a new account using your name, profile picture, and photos, you’re dealing with an impersonation account set up by scammers.

They can use it to run various types of scams, including contacting people on your friends list who will think that they’re communicating with you.

To get rid of the scam account, report the fake account to Facebook. Click on the three dots on the cover photo of the account’s profile, and select Report on the menu that pops up. From there, you’ll be able to flag it as an impersonation account.

To speed up the process, you can ask friends and family members to report the fake account on your behalf.

How To Protect Your Facebook Account From Hackers

How To Protect Your Facebook Account From Hackers

Recovering a hacked Facebook account is a long and frustrating process. It’s always easier to proactively protect your account against hackers and scammers.

Here’s how to secure your Facebook account before it gets hacked:

  • Use strong, unique passwords for all of your online accounts. Set up a password manager to generate strong passwords. Aura’s password manager will warn you if your account is vulnerable or has been compromised in a recent data breach.
  • Enable 2FA on all sensitive accounts. 2FA adds an extra layer of security to your Facebook, banking, and email accounts. Don’t rely on SMS for receiving 2FA codes as they can be intercepted or hacked. Instead, use an authenticator app such as Google authenticator or Microsoft authenticator.
  • Disable third-party apps that are connected to your Facebook account. This way, if hackers muscle into your account, they won’t have immediate access to other personal accounts and apps. Visit Settings & Privacy, continue to Settings, and then click on Apps and Websites on the menu to the left.
  • Set up alerts for unrecognized login attempts. Under Setting up extra security in your Settings & Privacy menu, you can turn on alerts that will notify you whenever someone signs in to your account using a new device or browser.
  • Remove any payment methods that are linked to your account. While these features are convenient, they present a security risk if your account gets hacked.
  • Add a backup email address to your account. If you ever need to recover your account, having an extra email address linked will help you find your account more easily. You’ll also get security notifications sent to more than one place, which increases the chances that you’ll get those alerts in time to take action.
  • Be careful what you post. Limit the amount of personal information that you share on Facebook, especially when it comes to private details including your phone number, home address, hometown, and family members.
  • Tighten up the privacy settings on your Facebook account. Choose the strictest security options wherever possible, and take advantage of Facebook’s Privacy checkup feature to get a full picture of your account’s overall security status.
  • Install antivirus software and a virtual private network (VPN) to protect your device at all times from malware, spyware, and hackers.
  • Use Aura’s free Dark Web scanner to see if your account logins have been compromised. Aura scans recent data breaches and Dark Web sites and forums for your personal information.
✋ Take action: If scammers have access to your Facebook account, your online bank and other sensitive accounts could be at risk. Aura monitors your passwords and sensitive personal information, and alerts you in near real-time to any signs of fraud. Try Aura’s top-rated identity theft protection service free for 14 days.

How To Recover a Hacked Facebook Account Step by Step

If you suspect a hack but can still sign in to your account, that may be the best-case scenario. That said, navigating the recovery process can be confusing.

  • You’re unable to sign in to your Facebook account.
  • You receive a “password reset” email that you didn’t request.
  • Your friends and followers tell you that they’re getting suspicious direct messages (DMs) from your Facebook Messenger account that look like phishing scams.
  • You notice changes to your Facebook profile information (such as your name, birthday, address, etc.).
  • You're suddenly being targeted with more sophisticated Facebook scams.
  • There are posts or comments on your Facebook page that you never made.
  • People you don’t know receive friend requests from you.
  • You find Facebook login sessions you don’t recognize in your “Where You’re Logged In” settings.

The unsettling truth is that it’s easier than ever for scammers to take control of your Facebook account.

In April 2023, a Vietnamese threat actor exploited Facebook's Ads service, resulting in around half a million users being infected with information-stealing malware [*].

Malware like this don’t just put your social media accounts at risk, but also your identity and finances.

What To Do If You Still Have Access To Your Facebook Account

If you suspect a hack but can still sign in to your account, consider yourself lucky.

This is the best-case scenario when it comes to compromised accounts. That said, navigating the recovery process can be confusing.

Step 1: Change your password

Start by locking out hackers with a new password:

  • On an iOS or Android device: Tap on the Menu icon in the bottom right corner of your screen in the Facebook app (right next to Notifications). Then, select Settings & privacy, and then Password and security in the menu that follows. Under the header marked Login, select Change password and follow the directions to create a Facebook password.
  • From your web browser: Log in to your account at Facebook.com and then click on your profile photo in the upper right-hand corner of the screen. Then, select Settings & Privacy, then Settings, then Security and Login. Scroll down to the Login section to change your password.

Step 2: Check where you’re logged in

Now, it’s time to see if hackers still have access to your account.

In the same security features menu that you just used to change your password, you’ll be able to view all of the locations where your Facebook account is being accessed.

Navigate back to Password and Security (or Security and Login on desktop). Just above the Change password option, you’ll see a section that says Where you’re logged in. This menu will show all the locations and devices that are logged in to your account.

If you’re using a mobile device, tap on any suspicious logins and select “Secure Account.” You’ll be prompted through a few more steps that will help you protect your account.

If you see multiple unauthorized logins, it’s a cybersecurity best practice to log out of all sessions at once.

Step 3: Report the incident to Facebook

Finally, you’ll want to let Facebook know about the incident.

Go back into your Settings & Privacy menu, and navigate to Password and security. Scroll all the way down to the Get help section, and select If you think your account was hacked. Follow the prompts to complete the reporting process.

How To Recover a Hacked Facebook Account That You’ve Been Locked Out Of

If you’re unable to get into your Facebook account, hackers may have already changed your account’s email or phone number.

At this point, you’re essentially locked out and it will be much more cumbersome to recover your account.

Even though Facebook’s official account recovery process is readily available online, many victims of aggressive Facebook account hackers have a hard time getting their accounts back.

This is because account recovery protocols are exactly what hackers use to take over Facebook (and other online accounts) to begin with.

As a result, companies like Meta (Facebook’s parent company) are forced to make the process long, arduous, and (sometimes) unsuccessful.

If you’ve lost control of your Facebook account, these are the most effective steps you can take to get it back:

Step 1: Open Facebook on all of your devices

If you’re usually logged in to Facebook on multiple devices, open your Facebook app or webpage on all of your devices and see if any of them are still logged in.

If the hacker forgot to log you out of each one, you might be in luck. See if any of your devices still open your Facebook page without logging you out first. If not, it’s time to get on with the account recovery process.

Step 2: Find your account

First, make sure to start the process on a computer or mobile device that you typically use to access your Facebook account.

If you’re unable to log in to your account to change your password, visit facebook.com/login/identify. The page will prompt you to enter the email address or phone number that you used to create your account.

A field to enter email or phone number to recover a hacked Facebook account
Facebook will ask you to submit the original email address or phone number that you used to sign up for your account. Source: Aura Team

You can also enter your name or your Facebook profile URL into the search function if the search isn’t successful using your email address and phone number.

Once you click on Search, the following page will show a list of Facebook accounts that match your search in some way. If you see your account, you can select it to begin the password reset process.

Step 3: Change the email address connected to your Facebook account

If the system is able to locate your account, it will ask to send a verification code to the address or phone number currently associated with the account. If the account or phone number listed do not belong to you, select No longer have access to these, and Cannot access my email.

In most cases, Facebook will then start the process of changing the email address associated with your account.

If this still doesn’t happen, there are a few more steps you can take:

  • Visit facebook.com/hacked and select My account is compromised. The page will ask you to enter your account’s current password, or a previous one that you used in the past. Once you enter your password, select Secure my account, and then, I cannot access these.
  • If the above steps don’t allow you to change your account’s email address, try using your mobile device. Log in using the Facebook app, select Forgot password, and choose the prompts indicating that you can’t access the account’s current phone number and email address.
Field to enter your current or old Facebook password to recover account
Facebook will ask for a current or previous password in order to start securing your account. Source: ExpertReviews

If you get far enough, you’ll fill out a form requesting a change to your account’s primary address, and submit a photo of your ID to Facebook support.

From there, you’ll get an email to your account’s new address with a link to reset your password.

Step 4: Set up a recovery email address

Once you finally gain access to your account, go straight into your Settings & Privacy menu. Choose Settings, then General.

From there, you can edit and delete any contact information associated with your account and remove any details that you don’t recognize as your own.

Button to edit the primary email address on Facebook
Update your contact information to a secure email or phone number. Source: Trusted Reviews

Step 5: Clean up Facebook security settings

Your next stop is the Security and Login menu. Download an authenticator app on your mobile device and use it to set up two-factor authentication (2FA) for your Facebook account.

Next, visit General and remove the hacker’s phone number, email address, and any other unfamiliar contact information.

Review the devices and locations listed under Where you’re logged in, and make sure everything looks accurate.

Finally, visit the Setting up extra security section and sign up for alerts that notify you whenever Facebook detects a sign-in on an unusual web browser or unrecognized device.

Thursday, January 25, 2024

Social Media Safety

RAINN


  • Know how to report, block, and filter content. Read RAINN's tips on how to filter which users or content you see, report harmful comments or content, and bloack those who are attempting to use technology to hurt others. 
  • Personalize your privacy settings. Adjust your privacy settings on the site to your comfort level, and select options that limit who can view your information. Think about non-traditional social media as well, such as your public transactions on Venmo or music activity on Spotify. These site-specific security pages can help you get started.
  • Pause before you post. Before you post, ask yourself if you are comfortable sharing this information with everyone who might see it. Content that contains personal information or your whereabouts could pose a safety risk. Even content that is deleted can sometimes be accessed by the website or through screenshots of the original post and could be used maliciously.
  • Turn off geolocation. Many social media sites or apps will request to access your location, but in most cases this isn’t necessary. You can still get the most out of your social media experience without sharing where you are while you’re there. If sharing where you are is important to you, consider waiting to tag the location until you leave. In addition to this, some sites may automatically make geotagged information public. When you “check in” on Facebook, update your Instagram story, or add a geotag to a Snapchat, these sites may share your exact location with people you may or may not trust with it. Take a look at the privacy settings on the sites listed above, or others you use regularly, to see what your location settings are and consider updating them.
  • Use a private Internet connection. Avoid public Wi-Fi connections, like those offered at coffee shops or airports, when using a website that asks for a password. Limit your social media usage to personal or private Wi-Fi networks, while using cellular data on your phone, or under the protection of a Virtual Private Network (VPN).
  • Talk to your friends about public posts. Let your friends know where you stand on sharing content that may include personally identifying information, like your location, school, job, or a photo of you or your home. Respect each other’s wishes about deleting posts that may be embarrassing or uncomfortable. Always ask permission before you post something about another person, whether it mentions them indirectly, by name, or in a picture. To help keep track of your online presence, you can change your settings so that tagged photos of you will only appear on your profile—but won’t be shared publicly on your timeline—if you have approved the post on Facebook or other social media accounts.
  • Report harassment or inappropriate content. If someone is making you feel uncomfortable online, you can report the interaction to the host site, often anonymously. You can use the “report” button near the chat window, flag a post as inappropriate, or submit a screenshot of the interaction directly to the host site. If you do experience harassment or abuse through social media, consider taking screenshots immediately and saving them in case the content is deleted or removed from your view. To collect evidence of harassment on Facebook, you can download your full Facebook history through the Download Your Information (DYI) feature.
  • Look before you click. If you get a suspicious sounding message or link from a friend through social media, it’s best not to automatically click it. Your friend’s account may have been hacked, which could cause everyone in their contacts list to receive spam. If you’re not sure it’s spam, try contacting that person another way to ask if they meant to send you a link recently.
  • Pick strong passwords and update them frequently. This can help protect against someone who may be trying to sign on to your account for negative reasons like posting spam, impersonating you, or stalking. In addition to choosing strong passwords and updating them, remember to keep your passwords in a secure location.
  • Make privacy a habit by doing a regular social media privacy check-up. Once you’ve gone through the privacy settings in your social media accounts, set a reminder on your calendar to revisit them in three or six months. Companies may change policies or update their platforms which could affect how you would like to share your information online.

Have you encountered sexual content or images relating to a minor? Report these encounters to the CyberTipline.

If you experience unwanted communication of a sexual nature, it can leave you with some uncomfortable or painful feelings. You are not alone. Help is available 24/7 through the National Sexual Assault Hotline: 800.656.HOPE and online.rainn.org.