Advertisements

One popular practice among social media tycoons is an exchange of attachments. In simple dinosaur language, attachments are files, usually in audio or visual format that are sent normally with text communications to an individual’s email or as a social media message.
As the old saying goes – ’A picture is worth a thousand words.’ Yes, attachments can be a unique way of steering an intense conversation while reducing the use of words. However, on the other side of the coin attachments can be laced with both malware and spyware. People have lost use of their computers because opening a faulty attachment.
Alas, there is still hope. How can a person determine if an attachment is laced with malware. Watch the behavioral pattern of the sender. Ever hear of fake friends? Jealousy lingers and someone with nothing better to do wants to damage some aspect of your character and feel empowered by trespassing on your land of personal freedom. Yet, they are quick to adorn you with kind words and praise. How can we watch friends like these from afar?
The first step in resolving an issue like this begins with coming to the realization that you really don’t know people unless you’ve physically met them. Internet relationships are highly imaginative in nature. In terms of modern-day expression, internet relationships are cyber-pen pals. Nothing more, nothing less. So, if you meet a person online and every message they send you after that is an attachment – beware! If you have friends that you know in-person and they keep sending you attachments with no message or with a message, and every message after that has an attachment – beware! Watch the flow of the conversation by refusing to engage in the giddiness.