Cryptidize | Digital Assistant

Cryptidize | Digital Assi...'s profile picture

"Creating a safer digital world!"

My name is Cryptid. I'll be your digital guide to the web.

Last active:

Mood: :)


View my: Profile | Forum Topics

Report User

SpaceHey Blog URL:

https://blog.spacehey.com/cryptidize

Cryptidize | Digital Assistant's Blog Entries

[Subscribe to this Blog]

Pinned

Updates and Blogging

Category: Blogging

Hello there! This is my blogging post/update log for the Digital Literacy Crash Course. I felt like this would suit better than bulletins and/or multiple separate blog posts. February 13, 2024 - Update So, that life stuff happened quicker than expected. I got laid off from my previous job and totalled my car so I've been... Recovering, emotionally speaking. I'm ok physically. Things are gonna be s... » Continue Reading

» View Blog Entry

Pinned

Frequently Asked Questions

Category: Web, HTML, Tech

FAQ What is this place and why did you make it? This is the digital literacy hub. Essentially, this will hopefully be a intensive guide to computers, the internet, HTML5/CSS coding, and more. I made it because I realized recently (2023) that a lot of folks are lacking in basic knowledge of computers like file extensions or the difference between the www. and https://. While it may not seem to big,... » Continue Reading

» View Blog Entry

Pinned

Table Of Contents

Category: Web, HTML, Tech

Digital Literacy Crash Course Last Updated: 12/29/23 Current Status: WIP - See Updates Topic Overview: What Even Is A Computer? Define A Computer Parts of a computer - Hardware Parts of a computer - Software Types of Computers How to research and buy a computer File Types and What They Mean The Ethereal Digital Space Your digital identity - IP Address and Networks What Is The Internet? Browsers, s... » Continue Reading

» View Blog Entry

— 1 Kudos

Other People and the Mantras of Digital Socialization

Category: Web, HTML, Tech

I've been thinking long and hard of where to start with this topic, but I think the biggest point I want to make is that people online are just like people in real life. Some are dangerous, some are friendly, all have their own thoughts, feelings, and lives. I know that should feel self-explanatory, but it's easy to forget the other person behind the screen. There's a few things I personally keep ... » Continue Reading

» View Blog Entry

The Age of Surveillance - VPNs, BootyGuard, and the Deep Web

Category: Web, HTML, Tech

Movies, music, games; you have to be cautious on how you interact with these when they're free online. Storage options like cloud storage can place your items in danger - if a storage provider doesn't like what you're keeping, they can delete your account. Worse, the actual owners of the copywritten material or the government could send a cease-and-desist letter, threating punishment by law for co... » Continue Reading

» View Blog Entry

Virus Protection and Scanning Your Downloads

Category: Web, HTML, Tech

When it comes to guarding yourself from malware, surveillance and some barnacles from the pirates of the digital seas, there's been many guides written and shared within the community. A lot of them have been killed, but just like the humble cockroach, such groups are hard to eliminate. When downloading software, especially freeware, always check and double-check the site you're downloading from f... » Continue Reading

» View Blog Entry

Backing Up Your System - External Storage and the 3, 2, 1 Method

Category: Web, HTML, Tech

External storage, or data storage outside of a computer device, is an exceptional way to keep your data safe from disaster. This type of storage is a pre-emptive measure we take in order to protect ourselves from outside threats. External storage can include external hard drives, CDs, SSDs, USB sticks, SD cards and more. Typically, external storage is great for moving software or data from one mac... » Continue Reading

» View Blog Entry

Watch Where You Click - Phishing and Other Hostiles

Category: Web, HTML, Tech

In modern day, sometimes it's unavoidable to share your information, such as the instances with banks and medical professionals. However, you should always remain aware of impersonations, phishing links, malware, and people with bad intentions. Phishing is the fraudulent practice of sending emails or other messages pretending to be from reputable companies in order to make individuals reveal perso... » Continue Reading

» View Blog Entry

Internet Personas, Anonymous Living, and General Internet Safety

Category: Web, HTML, Tech

In the last lesson, we were discussing goals we can set as individuals in order to stay safe in an ever-evolving web, as well as discourage the enshittification of the internet. Now we're going to cover the last two items in our list: Encourage anonymity and educate on base level boundaries while discouraging overfamiliarity Curate internet learning environments; instruct others on how to create a... » Continue Reading

» View Blog Entry

Your digital identity - Why It Matters

Category: Web, HTML, Tech

Author's note: Please consider exploring most if not all the links I've added to this page. It's not required in order to understand, but I want people to view these sources and decide on their credibility themselves. It's valuable learning » Continue Reading

» View Blog Entry

Clouds and their Problems

Category: Web, HTML, Tech

In the digital world, there are many ways to process and store information. With the internet, servers across the world are able to communicate with each other and with those servers, data can be processed or stored along the way. Many people don't understand what the ethereal Cloud even is but the answer is truly simple. When something is in the cloud, it means it's stored on Internet servers ins... » Continue Reading

» View Blog Entry

Who Can See What I Do?

Category: Web, HTML, Tech

In the "Who Controls the Internet?" lesson, we briefly discussed a few entities who can see your browsing habits, but how do they see these things? And what can they actually see? When a website you visit tracks you, that’s first-party tracking . When a website you visit lets another company track you, that’s third-party tracking . Third-party tracking companies can track you across most websites ... » Continue Reading

» View Blog Entry