Do Shortened Facebook Links Work To Your Advantage? | Social Media Statistics & Metrics | Socialbakers

Do Shortened Facebook Links Work To Your Advantage? | Social Media Statistics & Metrics | Socialbakers

pin 1
USE "TAG REVIEW" to keep unwanted photos and tags off your page. Facebook doesn’t provide users a way to disable tagging altogether. The best thing you can do to keep embarrassing or otherwise unwanted photos from randomly showing up on your profile is to enable Tag Review.  It’s also important to take this precaution because scammers often use this photo-tagging exploit to virally spread content on Facebook.…

USE "TAG REVIEW" to keep unwanted photos and tags off your page. Facebook doesn’t provide users a way to disable tagging altogether. The best thing you can do to keep embarrassing or otherwise unwanted photos from randomly showing up on your profile is to enable Tag Review. It’s also important to take this precaution because scammers often use this photo-tagging exploit to virally spread content on Facebook.…

pin 1
How to shorten your Facebook url (username)

How to shorten your Facebook url (username)

pin 1
heart 1
Unwhatever.me | Here's a new Chrome extension that will remove advertisements, Jesus, people's dinner, and annoying politics from your Facebook timeline.

Unwhatever.me | Here's a new Chrome extension that will remove advertisements, Jesus, people's dinner, and annoying politics from your Facebook timeline.

pin 1
What happens when scammers COPY YOUR PROFILE: The most common scenario is someone copies the name, profile picture and other available photos of their intended victim. The next thing they do is block the person they are impersonating and send friend requests to everyone on the victim’s friends list. This is done to infiltrate their social network. Once this part of the mission is complete, the scammer has a variety of options at their disposal.

What happens when scammers COPY YOUR PROFILE: The most common scenario is someone copies the name, profile picture and other available photos of their intended victim. The next thing they do is block the person they are impersonating and send friend requests to everyone on the victim’s friends list. This is done to infiltrate their social network. Once this part of the mission is complete, the scammer has a variety of options at their disposal.

pin 1
Pinterest • The world’s catalog of ideas
Search