The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true.
We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet.
Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records.
Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair.
The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers.
These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work.
Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks.
But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps:
-You sign on to your ISP.
-Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to.
-You type in a web address in your browser and send that request to your ISP.
-Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page.
-The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page.
-The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP.
-Your ISP looks up in it's log who made the initial request and sends it on to you.
-You get the page, a temporary copy is stored on your hard drive.
-You click on a link or enter in a new web address and the process starts all over again!
So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right?
Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself.
All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet.
So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net.
Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.
He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
Lepide Data Security Platform 22.1 protects sensitive data and critical infrastructure - Help Net Security
Lepide Data Security Platform 22.1 protects sensitive data and critical infrastructure Help Net Security
Hartsfield-Jackson to bolster IT security after airport cyberattacks - The Atlanta Journal Constitution
Hartsfield-Jackson to bolster IT security after airport cyberattacks The Atlanta Journal Constitution
Secretary Mayorkas Extends and Redesignates Temporary Protected Status for Haiti for 18 Months - Homeland Security
Secretary Mayorkas Extends and Redesignates Temporary Protected Status for Haiti for 18 Months Homeland Security
Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care - PR Newswire
Palo Alto Networks Announces Medical IoT Security to Protect Connected Devices Critical to Patient Care PR Newswire
Decentralized Cyber security – An Advanced Approach Security Boulevard
Did Brazil DSL Modem Attacks Change Device Security? Security Intelligence
Lebanon: Indictment of State Security members in torture case an 'encouraging development' - Amnesty International
Lebanon: Indictment of State Security members in torture case an 'encouraging development' Amnesty International
US Homeland Security Chief Warns Borders Being Rendered Meaningless Voice of America - VOA News
Former Trump national security advisor John Bolton says he is considering 2024 presidential bid - CNBC
Former Trump national security advisor John Bolton says he is considering 2024 presidential bid CNBC
Clark County, Ohio Schools Commit $1M to Security Systems Government Technology
Treasury officials would have done more for national security by leaving Tornado Cash alone - Cointelegraph
Treasury officials would have done more for national security by leaving Tornado Cash alone Cointelegraph
Cyera expands cloud data security coverage to SaaS environments Help Net Security
Guide to Network Security EnterpriseNetworkingPlanet
Launch of the Japan-United States Energy Security Dialogue US Embassy and Consulates in Japan
New security K-9 teams in training – Michigan Medicine Headlines Michigan Medicine Headlines
Hancock County Schools look at new security options The Steubenville Herald-Star
Remarks at a UN Security Council Briefing on Chemical Weapons in Syria - United States Mission to the United Nations
Remarks at a UN Security Council Briefing on Chemical Weapons in Syria United States Mission to the United Nations
Featured job: Project Manager - Library Security & Safety Hillsborough County
Judicial security bill named for slain son of N.J. jurist heading for congressional approval - NJ.com
The Android December security patch is here Android Police
Cyber Safety Review Board to Conduct Second Review on Lapsus$ Homeland Security
USA Freedom Act Security Policies Bundle 2022: New Mandates on How Corporations Collect, Process, and Store Data - ResearchAndMarkets.com - Business Wire
USA Freedom Act Security Policies Bundle 2022: New Mandates on How Corporations Collect, Process, and Store Data - ResearchAndMarkets.com Business Wire
12/5/22 National Security and Korean News and Commentary smallwarsjournal
Remarks at a UN Security Council Briefing on the UN Investigative Team for Accountability of Da'esh/ISIL (UNITAD) - United States Mission to the United Nations
Remarks at a UN Security Council Briefing on the UN Investigative Team for Accountability of Da'esh/ISIL (UNITAD) United States Mission to the United Nations
Montana State University recieves $4 million from Homeland Security for cybersecurity project - Bozeman Daily Chronicle
Montana State University recieves $4 million from Homeland Security for cybersecurity project Bozeman Daily Chronicle
Industry has lots to say about the Homeland Security plan for cyber incident reporting - Federal News Network
Industry has lots to say about the Homeland Security plan for cyber incident reporting Federal News Network
BEX Mauritius Block Exchange Receives the World's First Ever Security Token Trading License from the Financial Services Commission (FSC) Mauritius - Business Wire
BEX Mauritius Block Exchange Receives the World's First Ever Security Token Trading License from the Financial Services Commission (FSC) Mauritius Business Wire
Chicopee reexamines security measures at high school sporting events Western Massachusetts News
Ogden hangar owner's security badge restored, but legal spat continues Standard-Examiner
#HowTo: Make Security a Board Level Discussion Infosecurity Magazine
Climate Security Advisor - Ethiopia ReliefWeb
Delivering security through systems engineering GPS World magazine
Samsung monthly updates: December 2022 security patch is here with loads of bug fixes - SamMobile - Samsung news
Samsung monthly updates: December 2022 security patch is here with loads of bug fixes SamMobile - Samsung news
Chinese Security Forces Well-prepared to Silence Protests VOA Learning English
Security Breach Detected in October, Believed to Be Sponsored by the Chinese State - The Epoch Times
DOD Releases Path to Cyber Security Through Zero Trust Architecture Department of Defense
National Terrorism Advisory System Bulletin - November 30, 2022 Homeland Security
68% of IT leaders are worried about API sprawl Help Net Security
Energy Security Support to Ukraine - United States Department of State Department of State
AWS-Announces-Amazon-Security-Lake Amazon Press Release
Columbia Police Department adds 55 live-streaming security cameras across city - Charleston Post Courier
Columbia Police Department adds 55 live-streaming security cameras across city Charleston Post Courier
BitKeep Completed a Security Audit of Swap Protocol and Launched a Secure Asset Fund With an Initial Capita... - The Daily Hodl
BitKeep Completed a Security Audit of Swap Protocol and Launched a Secure Asset Fund With an Initial Capita... The Daily Hodl
St. Louis Hills Man Designs Security App to Combat Crime Riverfront Times
Social Security update: Exact date boosted direct $914 Supplemental Security Income checks will be sent out - Washington Examiner
Social Security update: Exact date boosted direct $914 Supplemental Security Income checks will be sent out Washington Examiner
Dan Campbell has funny comment on his job security Larry Brown Sports
Ohio school cancels drag story time, citing security dispute WLWT Cincinnati
This Week in Apps: The year’s best apps, Twitter rival Hive’s security woes, App Store backlash grows - TechCrunch
This Week in Apps: The year’s best apps, Twitter rival Hive’s security woes, App Store backlash grows TechCrunch
How Chinese students made an ‘invisibility cloak’ that evades security cameras - South China Morning Post
How Chinese students made an ‘invisibility cloak’ that evades security cameras South China Morning Post
Do Security Cameras Stop Crime? Screen Rant
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture - The White House
National Security Memorandum on Strengthening the Security and Resilience of United States Food and Agriculture The White House
Diplomatic Security Service Leads U.S. Security at the World Cup - United States Department of State - Department of State
Diplomatic Security Service Leads U.S. Security at the World Cup - United States Department of State Department of State
FBI director raises national security concerns about TikTok The Associated Press
Iranian security forces kill anti-government protester celebrating World Cup defeat, rights group says - CNN
Iranian security forces kill anti-government protester celebrating World Cup defeat, rights group says CNN
Chinese Hackers Stole Millions From US COVID Relief Benefits, Secret Service Reports - Washington Free Beacon
Chinese Hackers Stole Millions From US COVID Relief Benefits, Secret Service Reports Washington Free Beacon
Report: Iranians Launch Nationwide Labor Strike in Challenge to Regime Washington Free Beacon
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby - The White House
Press Briefing by Press Secretary Karine Jean-Pierre and National Security Council Coordinator for Strategic Communications John Kirby The White House
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him - CNN
Homeland Security Secretary Mayorkas says he's not quitting as Republicans prepare to escalate attacks against him CNN
AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years . In fact, few steganographers would disagree with the investigation of spreadsheets.
Why Malicious Programs Spread So Quickly?
It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc.
Desktop Security Software Risks - Part 1
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts.
From Spyware with Love!
It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho.
Phishing - Its Signs and Your Options
Phishing is the act of some individual sending an email to a user in an attempt to scam the user to release personal information. Is it easy to determine if it's a scam? Sometimes - but not always.
Everything You Need To Know About Spyware and Malware
You are at your computer, checking out software on EBay. The computer is really sluggish, and you are not running anything else.
Is Adware - Spyware Putting Your Privacy at Risk
Do you sometimes notice your computer running slower. Is your computer acting strange almost like its possessed? Well, it just may be plagued with Spyware.
New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue
In 1997, I decided after 15 years as a practicing CPA that it was time to put down my pencil and explore a new venture on the exciting new internet which, while perhaps not exactly in its infancy at that point, was still at least a pimply faced teenaged medium still unexplored by most accountants.I founded CPAsites.
Phishing - A High Tech Identity Theft With A Low Tech Solution
Have you ever got an email asking you to confirm your account information from a bank or a company that you have never done business with? The email looks official and it even has a link that appears to take you to the company's website. The email you have received is actually from an identity thief.
Spyware Protection Software
Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically.
Anti-Spyware Protection: Behind How-To Tips
There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article".
Spyware Attacks! Windows Safe Mode is No Longer Safe
Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware.
The Bad Guys Are Phishing For Your Personal Information
Do you know what "phishing" is?No, it doesn't mean you grab a pole and head to the late to catchsome phish.The official Webopedia definition of "phishing" is as follows:The act of sending an e-mail to a user falsely claiming to be anestablished legitimate enterprise in an attempt to scam the userinto surrendering private information that will be used foridentity theft.
How To Be Your Own Secret Service Agency
So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance.
Hacked: Who Else Is Using Your Computer?
A friend called me one day and asked if I would stop by to look at his computer. He said it was running abnormally slow and he had found something on his hard-drive he could not explain.
Message Board Security Problems
Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site.
The Risk Of Electronic Fraud & Identity Theft
Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face.
Spyware - Your Web Browser is the Culprit!
My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it.
Protection for Your PC - Painless and Free!
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance.
All About Computer Viruses
Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open.
|home | site map|