yego.me
💡 Stop wasting time. Read Youtube instead of watch. Download Chrome Extension

Why you should actually read the URL & be careful with free Wi-Fi


2m read
·Nov 10, 2024

  • So Kelly, you've convinced me that I should be wary as I browse the internet. What should I be doing to make sure that I can leverage the internet but not get into trouble?

  • Well, I think it all starts with where you're connecting to the internet. So first off, like you, it's great if you're using your own device which you trust and your own wifi network at home or at work. That's kind of the safest option. When you're traveling or when you're out and about and at a cafe, that's where, you know, the internet can start to get a little bit more risky just by nature.

So, you know, the worst thing could be a computer like in a hotel lobby where you can log in to get your pass or your boarding pass printed out, because you don't know who else has used that computer. You don't know what they put on it. That's completely, you know, risky. It could be that they've downloaded something to spyware onto the computer. It could be that they've plugged something in that's dangerous. You know, it depends.

If you're just doing something safe like looking up a local restaurant, that's pretty low risk. But once you're starting to think about typing your username and password into a computer, that's where I would personally be a little more cautious. You know? And then also you can think about free public wifi networks. You really have to think about if you trust the network.

So a lot of times, you know, most sites use HTTPS encryption. So that means between you and that site, everything you're sending is private. It doesn't mean the site is safe, it just means that you guys have a private connection.

  • So make sure I understand this point, especially if you're using a public network. To ensure, look at the URL, see the HTTPS instead of the HTTP before, as part of the URL. Then you at least know that the communications between you and the site is private. You still have to make sure it's not a shady site, but at least other people on that network aren't going to be able to see what your password is or what you're typing and things like that.

  • Yeah, exactly. Exactly.

More Articles

View All
The Biggest Eruptions That Changed Earth Forever
The Earth is a gigantic ball of semi-molten rock with a heart of iron as hot as the surface of the Sun. Titanic amounts of heat left over from its birth and the radioactive decay of trillions of tons of radioactive elements find no escape but up. Currents…
Homeroom with Sal, Carol Dweck, PhD, & Vicky Colbert - Tuesday, May 25
Hi everyone, Sal Khan here from Khan Academy. Welcome to the Homeroom with Sal live stream. We have a very exciting show today. We have, I would say, two mega figures in the world of education. We have Carol Dweck, a professor at Stanford. You all might …
How Eating Venomous Lionfish Helps the Environment | National Geographic
Fortunately, lion fish is an invasive species that actually tastes good. On a weekly basis, I’m getting calls from a number of places throughout the country, really asking when the next time is we’re going out to go hunt lion fish, cuz they need fish for …
Kids Take Action Against Ocean Plastic | Short Film Showcase
[Music] Go to hell! All these horrible things are private. [Music] I cannot go to this; Hawaii is my Hawaii. The meaning of malama honua really is malama; you need to care for something, to cherish something. Who knew? Ah, he translated from our language…
Calculating confidence interval for difference of means | AP Statistics | Khan Academy
Kylie suspected that when people exercise longer, their body temperatures change. She randomly assigned people to exercise for 30 or 60 minutes, then measured their temperatures. The 18 people who exercised for 30 minutes had a mean temperature, so this i…
Chain rule with the power rule
So we’ve got the function ( f(x) = (2x^3 + 5x^2 - 7)^{88} ) and we want to find the derivative of our function ( f ) with respect to ( x ). Now, the key here is to realize that this function can be viewed as a composition of two functions. How do we do th…