Get Your Tax Refund
File your Federal Taxes for
Free with TurboTax Federal FREE Edition
FREE to Prepare + FREE to Print + FREE to E-file
- Get your maximum refund*
- 100% accurate calculations guaranteed*
TurboTax Federal Free Edition - File Taxes Online
Don't let filing your taxes get you down! We'll help make it as easy as possible. With e-file and direct deposit, there's no faster way to get your refund!
Approved TurboTax Affiliate Site. TurboTax and TurboTax Online, among others, are registered trademarks and/or service marks of Intuit Inc. in the United States and other countries. Other parties' trademarks or service marks are the property of the respective owners.
Can You File 1040ez OnlineFree Tax FormsIrs Forms 1040ez InstructionsFiling An Amended Tax ReturnFree State Filing OnlyHow To Get A 1040x FormH&r Block Free Online Taxes2013 Tax Return1040a Instruction BookTaxes 2006Is It Too Late To File 2012 Tax ReturnHow Do I File A Tax ExtensionTurbotax 20091040ez Tax InstructionsState Income Tax By StateIrs Free Tax FilingWww.myfreetaxes.comTurbo Tax 20101040ez 2011 Tax Form1040ez Tax Form 20102009 Tax Return Form1040ez Tax Form 2013Efile 1040xFree Tax Filing For State And FederalH & R Block Taxes For Free2012 Income Tax FormIrs 2011 TaxesEz Tax FormsDownload 1040x FormEz Form OnlineHr Block LoginHow Do I Refile My TaxesFree Online State TaxesFree Federal Tax Filing 2012E Filing Income TaxState Tax Filing Online For FreeAmend A Tax Return 2010Irs Forms 1040ezTax Return For Students 2011Amend My 2011 TaxesH&rblock Free File
Can You File 1040ez OnlineCan you file 1040ez online Index A Accounting method: Accrual method, Accounting Method Cash method, Accounting Method Assistance (see Tax help) B Business: Expenses, Business Expenses Start-up costs, Business Start-Up Costs Use of car, Car and Truck Expenses Use of home, Business Use of Your Home C Car and truck expenses, Car and Truck Expenses Corporation, Corporations. Can you file 1040ez online D Depositing taxes, Depositing Taxes Depreciation, Depreciation E Employer identification number (EIN), Employer Identification Number (EIN) Employment taxes: Defined, Employment Taxes Records to keep, Employment taxes. Can you file 1040ez online Estimated tax, Estimated tax. Can you file 1040ez online Excise taxes, Excise Taxes F Form: 1099-MISC, Form 1099-MISC. Can you file 1040ez online 11-C, Form 11-C. Can you file 1040ez online 1128, Changing your tax year. Can you file 1040ez online 2290, Form 2290. Can you file 1040ez online 720, Form 720. Can you file 1040ez online 730, Form 730. Can you file 1040ez online 8300, Form 8300. Can you file 1040ez online 8829, Which form do I file? I-9, Form I-9. Can you file 1040ez online SS-4, Applying for an EIN. Can you file 1040ez online W-2, Form W-2 Wage Reporting, Form W-2. Can you file 1040ez online W-4, Form W-4. Can you file 1040ez online W-9, Other payee. Can you file 1040ez online FUTA tax, Federal Unemployment (FUTA) Tax H Help (see Tax help) Help from Small Business Administration, Small Business Administration I Identification numbers, Identification Numbers Income tax, Income Tax, Federal Income, Social Security, and Medicare Taxes Information returns, Information Returns Inventories, Accounting Method L Limited liability company, Limited liability company. Can you file 1040ez online M Medicare tax, Federal Income, Social Security, and Medicare Taxes More Information (see Tax help) More information (see Tax help) O Office in home, Business Use of Your Home P Partnership, Partnerships. Can you file 1040ez online Penalties, Penalties Publications (see Tax help) R Recordkeeping, Recordkeeping Records, how long to keep, How Long To Keep Records S S corporation, S corporations. Can you file 1040ez online Self-employment tax, Self-Employment Tax Small Business Administration, Small Business Administration Social security tax, Federal Income, Social Security, and Medicare Taxes Sole proprietorship, Sole proprietorships. Can you file 1040ez online Start-up costs, Business Start-Up Costs T Tax help, How to Get More Information Tax year, Tax Year Taxes: Employment, Employment Taxes Estimated, Estimated tax. Can you file 1040ez online Excise, Excise Taxes How to deposit, Depositing Taxes Income, Income Tax Self-employment, Self-Employment Tax Unemployment (FUTA), Federal Unemployment (FUTA) Tax Taxpayer Advocate, Taxpayer Advocate Service. Can you file 1040ez online TTY/TDD information, How to Get More Information U Unemployment (FUTA) tax, Federal Unemployment (FUTA) Tax Prev Up Home More Online Publications
Protect Your Privacy Online
Know the Risks
Cyber security, phishing, worms, firewalls, Trojan horses, hackers, and viruses seem to be in the news every day. Plus warnings to update your virus protection, watch out for online scams, protect your privacy, and watch what you click on are everywhere. But what does it all mean? And what can you do to safeguard access to your computer and to protect yourself and your family? What is this all about?
The first step in protecting yourself is to recognize the risks and become familiar with some of the terminology associated with cyber security. The Department of Homeland Security created this list of terms: Hacker, attacker, or intruder - These terms are applied to the people who seek to exploit weaknesses in software and computer systems for their own gain. Although their intentions are sometimes fairly benign and motivated solely by curiosity, their actions are typically in violation of the intended use of the systems they are exploiting. The results can range from mere mischief (creating a virus with no intentionally negative impact) to malicious (stealing or altering information).
Malicious code includes code such as viruses, worms, and Trojan horses. Although some people use these terms interchangeably, they have unique characteristics:
- Viruses - This type of malicious code requires you to actually do something before it infects your computer. This action could be opening an email attachment or going to a particular web page.
- Worms - Worms propagate without you r doing anything. They typically start by exploiting a software vulnerability (a flaw that allows the software's intended security policy to be violated). Then once the victim computer has been infected, the worm will attempt to find and infect other computers. Similar to viruses, worms can propagate via email, web sites, or network-based software. The automated self-propagation of worms distinguishes them from viruses.
- Trojan horses - A Trojan horse program is software that claims to do one thing while, in fact, doing something different behind the scenes. For example, a program that claims it will speed up your computer may actually be sending your confidential information to an intruder.
- Spyware - This sneaky software rides its way onto computers when you download screensavers, games, music, and other applications. Spyware sends information about what you're doing on the Internet to a third-party, usually to target you with pop-up ads. Browsers enable you to block pop-ups. You can also install anti-spyware to stop this threat to your privacy.
Minimize Access to Your Information
It is probably easy for you to identify people who could gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and maybe some others. But identifying the people who could gain remote access to your computer becomes much more difficult. As long as you have a computer and connect it to a network or the internet, you are vulnerable to someone or something else accessing or corrupting your information. Luckily, you can develop habits that make it more difficult.
Lock or log-off your computer when you are away from it. This prevents another person from waiting for you to leave and then sitting down at your computer and accessing all of your information.
To be really secure, disconnect your computer from the Internet when you aren't using it. DSL and cable modems make it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target your computer becomes much higher if your computer is always connected.
Evaluate your security settings. It is important to examine your computer's settings, especially the security settings, and select options that meet your needs without putting you at increased risk. Many, but not all Internet providers offer free security software. If you don't receive free software, you should consider buying a commercial product that includes virus scan, firewall, and pop-up blockers. You should also be aware of your Internet cookies setting. Cookies are short pieces of data used by web servers to identify users. Some cookies are useful for storing images and data from websites that you frequent, but others are malicious and collect information about you. You'll have to decide how much risk from cookies you can accept. Finally, if you install a patch or a new version of software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate.
Look for signals that you are using a secure web page. A secure site encrypts or scrambles personal information so it cannot be easily intercepted. Signals include a screen notice that says you are on a secure site, a closed lock or unbroken key in the bottom corner of your screen, or the first letters of the Internet address you are viewing changes from "http" to "https."
What if Your Online Privacy is Compromised?
If you believe you might have revealed sensitive information about your organization, report it to the appropriate people within the organization, including network administrators. They can be alert for any suspicious or unusual activity.
If you believe your financial accounts may be compromised, contact your financial institution immediately and close any accounts that may have been compromised. Watch for any unexplainable charges to your account.
Check your credit reports for unusual activity.
Report your situation to local police, and file a report with the Federal Trade Commission.
Protecting Children Online
The Children's Online Privacy Protection Act requires commercial websites to obtain parental consent before collecting, using, or disclosing personal information from children under 13. For more information, contact the FTC about Children's Privacy.