Access to your accounts
You can see and clean the excess
Access to your Google AccountOn this page, a list of sites that have access to your account on Google mail.Often you are invited to easily log on to some site to use an account on well-known portals so that you do not register again. This simplifies the matter and we readily agree with this.It is usually suggested to log in using accounts on Google, Yandex, Facebook, VK, Twitter ...And if it offers a known or official (state) site, then You can use it.Or some service to get started suggests opening access to your mail to create a social circle for you. For example, you first register with Skype and you do not even have to call anyone. But most likely some of your friends already have a Skype account. You open access to your mail for Skype and find out which of your friends can be added to the address book on Skype. It's the same on some social networks.But over time, we do not even remember where and why we registered in this way.On this page, you can see this list and, if desired, disable access. Especially if there is no such need.After these operations, it is recommended to change the password.
MyPermissionsMyPermissions allows you to easily scan which applications have access to your email and profiles in social media, so you can better monitor the situation than those who have decided to follow you.
In the form field, enter our email and find out if we hacked when our email or other accounts registered through it.
Who’s Watching YouWho has the opportunity to read your correspondence and other information.Facebook and other services have access to your information, as well as any insiders.
And who else? Who’s Watching You tell you.
How it works
Some services are even able to ignore the function Do Not Track, which is built into some browsers and allows you to block surveillance.
People SearchPeople Search Find people abroad Find people in Israel Search on social networks Social accounts of celebrity Real celebrity names
Personal informationPersonal Information - espionage Encryption clouds How do you find on Internet Footprints in the network Who called? Email protection
KinshipNeighbour Network Genealogy Names-names Cemetery Wayback Machine — archive Archive killed in the Second World War
PowerElectronic passport Strength and power of Internet