• Technology How to create a strong password and always remember it

  • Technology 8.4 billion passwords are leaked, what do I do to know I'm safe?

Years of browsing the Internet

force anyone to create accounts

to access different services: to buy in online stores, follow a course, get a special discount at an event, subscribe to a


, view content ... in addition to using almost any online video game or video call



After that, many users wonder where they have created the accounts during that time to be able to delete them.

The reasons are varied, and can include the desire to leave behind the content they generated at an earlier age, to

control their digital footprint

or to stop receiving emails from pages they no longer use.

For this reason, there are a series of methods and tools to find, access and delete these accounts and

never have to worry about them again depending on whether a user knows where the account was made, does

not know it or has used a password manager.


In the first place, if the user knows and remembers the service or the web in which they have created an account that they want to delete, there are

several tools that locate them without any complex process


Account Killer


Just Delete Me

include a search engine. websites with which the account can be found and deleted.

By finding the page on which a user was created the account, Account Killer will give step-by-step information on

how to delete it

and, in certain cases, the links to access the deletion method as soon as possible.

Just Delete Me works the same, but adds an assessment about the difficulty of doing this process.

If, despite everything, it seems impossible to finish the process,

Data Requests

has a data request generator that creates a text to make a

request to delete the account

, in addition to other services.

If not, you can contact the company that hosts the account yourself and ask for it to be deleted, alluding to the right of

deletion in article 17

of the General Data Protection Regulation (RGPD) of the European Union (EU).


If, contrary to what happens when using

Account Killer


Delete Me

, what

is remembered is an email but not the websites where accounts have been created

with it, there are a series of methods to find them and then use the mentioned resources.

First, although it is not a resource created for it, searching for phrases and keywords in the inbox and the spam of the 'emails' can be more


than it seems.

When creating an account, many times you are accessing the originating websites to send commercial communications,

information about updates,

events, problems, new products, clarifications about the account itself ... or, simply, you can find the first email of account creation.

Thanks to this, you can find accounts that were not even suspected to exist by looking for emails that indicate phrases and keywords in Spanish, English and other languages ​​such as 'registration', 'new account', '

confirmation of' email '

' or 'mail' , 'verify email', 'registration', 'activate account', 'password', 'welcome', 'free trial' ...

Similarly, you can search for the person's own name and patiently scroll through old emails.

If user names are remembered, they can also be included to

refine the search

, or search for them on websites like Namechk and Knowem?

to indicate on which social platforms an account with that name already exists and then check if it is your own.

To continue finding account information, the original intention

of account filtering websites

can be transformed


Sites such as Have I Been Pwned or the Avast Hack Check have the function of informing whether the data of certain accounts associated with an email address has been leaked or if they are in danger, which can give clues about their location.

In the event that you are looking to carry out a more complete search or if you have not been able to find more information by these methods, you can resort to the variety of search engines and their different search algorithms to

find accounts


The trick is to search for the same information on Google, Bing, Ecosia,


, Duckduckgo, Gibiru ... or any other search engine, since the different results offer the possibility of finding the information you are looking for.

A good trick, too, is to search for the user with double quotes ("user") so that the search engine offers results that exactly match him.


Many users have the habit of using a password manager (in English 'Password manager').

These systems allow user names with their associated websites and the

passwords of each one

to be saved in a list


The browsers themselves save the passwords for many accounts, which can help you find them.

Google Chrome has a key icon when you click on the profile at the top right where it saves them, Firefox places them in the menu at the top right under 'Logins and passwords', and


keeps them under 'Passwords', within the 'Preferences' menu.

In Chromium-based Edge, click on 'Advanced Settings', go to 'Privacy and services' and go to 'Manage passwords' to view the accounts and their passwords.

In all these cases, it is not enough to delete the browser account, but you have to go to the service itself and carry out its

specific removal procedure



Any hindsight on the Internet that has been used to find lost information should lead users to reflect on how to avoid the same thing happening again in the future.

Despite the 'right to be forgotten' on the Internet and the possibilities of erasing the fingerprint, the network has shown that the ramifications of information and the practice of search engines of indexing information without taking responsibility for the origin of the content make this option is sometimes almost impossible.

Therefore, it is positive that people carry out scrupulous monitoring of the accounts they create on different websites to avoid unnecessary problems in the future or to erase information that they may regret in a few years.

The aforementioned password managers can be a good way to keep track of what is being done, but they can also be made lists to save them in the cloud, in the mail itself and even on paper.

Any method is valid as long as the accounts are known to exist and the methods are known to be able to delete them in the future.

According to the criteria of The Trust Project

Know more

  • Internet

  • European Union

GadgetsFacebook wants you to have work meetings in virtual reality

TricksDoes my mobile have a virus?

Five Symptoms That Your Phone Has Been Infected With Malware

So you can save on electricity by measuring consumption from your mobile

See links of interest

  • Last News

  • Holidays 2021


  • Besiktas - Borussia Dortmund

  • Sheriff Tiraspol - Shakhtar Donetsk

  • Atlético de Madrid - FC Porto

  • Club Brugge - Paris Saint-Germain

  • Internazionale - Real Madrid