![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Web Browsing - Collected Information
You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. There are a few main pieces of information that get saved when you surf the web, this is by no means a full list, or a list of potentially what someone may be able to get, but the 'average' website will collect this data. Referring URL - The prior website that you were surfing. This information is quite detailed, it will not just say google.com, it'll give the full website url that referred you, including the search words you used. In fact, they can click or copy that in to their web browser and see the exact page you left. Keep in mind that if you were in a website doing banking or something over a secure connection they won't be able to just login, however some less secure websites encode your password and username in to the URL itself, which could make that possible. IP Address & Hostname - Your IP address and hostname identify you to the world, without a unique identity you wouldn't be able to request anything from the Internet. This will tell them who your ISP (Internet Service Provider) is and often give away where you live (to the city), or if you are working for a government agency, educational facility, or if you are surfing from behind a company proxy server. Surfing Habits - Websites will record how many pages you have visited, the amount of time you spent at one page (before clicking on the next), the page you enter on, and the one you exited from. Operating System and Software - This is a big one, as you are surfing information about your Operating System (OS) and the web browser you are using is recorded. Often the version numbers are also sent out. Additionally, they can actually tell your screen resolution and colour depth! Most websites as I said before, use all of this information for statistical purposes, targeting advertising, developing a more user or operating system friendly website. However, it is good to keep in mind that a malicious person could also use this information. Many security features are available through your web browsers, such as different levels of security for trusted and untrusted sites. Some linux browsers allow you to remove operating system and web browser information so it won't be available to websites. Personal firewalls, anti-virus software, malware scanners are all a great thing to have if you do a lot of surfing the web, and of course cleaning your internet cache and history! It's always a good idea to keep privacy and security in mind when you are surfing the web and be careful of what websites you openly provide information to. Ken Dennis
MORE RESOURCES: Ukraine Must Guarantee Its Own Security Foreign Affairs Magazine New York State Police to assist with security at striking correctional facilities WETM - MyTwinTiers.com AI security risks are in the spotlight—but hackers say models are still alarmingly easy to attack Fortune Top Social Security official exits after clash with Musk’s DOGE over data The Washington Post Remarks at a UN Security Council Open Debate on Practicing Multilateralism, Reforming and Improving Global Governance United States Mission to the United Nations Navy aims to expand maritime security cooperation in latest multinational Middle East exercise DefenseScoop Red Canary Named to CRN's 2025 Security 100 List PR Newswire Young people’s voices are key to securing global peace and security World Economic Forum Why dismantling the PCLOB and CSRB threatens privacy and national security Brookings Institution CT bill would reduce renters’ security deposits to 1 month’s rent, instead of 2 Connecticut Public Expect enhanced security for Jefferson Parish parades FOX 8 Local First WISeKey Unifies AI, Blockchain, and Quantum-Resistant Security to Strengthen Digital Trust The Quantum Insider Saviynt Recognized on CRN’s 2025 Security 100 List Business Wire Introducing enQase for Quantum-Safe Security Dark Reading Exabeam Honored in CRN’s 2025 Security 100 List Business Wire Businesses Are Delaying Upgrades to Physical Security Systems– But the Cloud Can Help BizTech Magazine CMD+CTRL Security Signs CISA Secure by Design Pledge Business Wire Dallas County JP judges push for more security at government offices FOX 4 News Dallas-Fort Worth Top Social Security Official Leaves After Musk Team Seeks Data Access The New York Times Seattle City Council talks security as another shooting highlights the dangers of public transit KIRO Seattle A Policymaker’s Guide to China’s Technology Security Strategy Information Technology and Innovation Foundation The 20 Coolest Identity Access Management And Data Protection Companies Of 2025: The Security 100 CRN Weeks after Baltimore courthouse shooting, MD legal leaders reflect on courthouse security Maryland Daily Record Ford adds new features to anti-theft security app on F-150 pickups Detroit Free Press Cloud Security Alliance Calls for Reassessment of AI Development in the Face of DeepSeek Debut T.H.E. Journal UAE Launches Next-Gen GPS-Less Navigation and Secure Flight Control to Strengthen Aviation Security Business Wire ID R&D Delivers Industry Leading Liveness Results in U.S. Homeland Security Evaluation of Remote Identity Validation Systems Business Wire Threats to international peace and security - Security Council, 9859th meeting Welcome to the United Nations Social Security Is DOGE's New Target: What You Need to Know Kiplinger's Personal Finance G7 Foreign Ministers’ Statement on the Margins of the Munich Security Conference Department of State Members of Space Launch Delta 45 Provide Security for President Trump's Second Inauguration SpaceCoastDaily.com Inclusivity, economic woes and security challenge Syria post-Assad Voice of America VIVE 2025 roundup: Conference beefs up security; CAQH finds $20B savings opportunity Fierce healthcare Keeper Security Launches Upgraded KeeperPAM IT Security Guru Homeland Security set to move in to flood authority headquarters this fall Wilkes-Barre Citizens Voice The Just Security Podcast: What Just Happened Series, Understanding Federal Employee Rights Just Security Arkansas secretary of state touts election security, calls for changes to ballot initiative process White River Now Malan Best Security Expands Fire Watch Services to Support High-Risk Industries amid Rising Fire Safety Concerns Yahoo Finance 5 ways to improve security governance and prevent future illegal mining tragedies from happening The Conversation CPX 2025: Check Point CEO talks up hybrid mesh security ComputerWeekly.com Who gets a $2,000 Social Security payment on Wednesday, February 19? See the full list Marca English Zelenskyy to Vance: Ukraine wants 'security guarantees' as Trump seeks to end Ukraine-Russia war The Associated Press |
![]() |
![]() |
![]() |
RELATED ARTICLES
Protecting Your Home Both Inside and Out If you are a parent, you have probably wondered at one time or another, what more you can do to protect your children and yourself, not only physically but emotionally, mentally, spiritually etc. Today many parents and families are discouraged. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. Top 10 tips for Safe Internet Shopping Over £5 billion pounds was spent on online shopping in 2004. The Internet was the fastest growing retail sector last year, attracting one in four shoppers. Spyware is Not Like a Nosy Neighbor Remember the television show about the nosy neighbor Mrs. Kravitzalways peeking out her window or over the fence, sometimes evenknocking on the door just to find out what was going on in herneighborhood? If you don't wait a month or so and the DVD orthe movie will be out. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. How to Get Rid of New Sobig.F Virus? As you know, this time the virus under the name Sobig.F has wreaked quite havoc! No doubt, many of us have suffered from this recent virus outbreak. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Hacking Threats and Protective Security The 1998 Data Protection Act was not an extension to, but rather a replacement which retains the existing provisions of the data protection system established by the 1984 legislation. The Act was to come into force from 24 October 1998 but was delayed until 1st March 2000. Why you Must Secure your Digital Product and Thank You Web Page A couple of years back, I paid my dues the 'hard way'.My web site was up and running, the sales letter had been 'crafted' with the most influential marketing techniques and the profits had been consistently coming-in, until. Social Engineering - The Real E-Terrorism? One evening, during the graveyard shift, an AOL technical support operator took a call from a hacker. During the hour long conversation the hacker mentioned he had a car for sale. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. The Move to a New Anti-Virus Model This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #1: the Basic ModelAnti-virus software vendors still rely on yesterday's methods for solving today's problems: they wait for the next virus to wreak havoc and then produce a solution. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Spyware - Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated.It's created a whole ecosystem, so to speak. Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is A week or so ago, I received an inquiry from a man in Indonesia about buying multiple copies of certain items on my website. I immediately suspected fraud, so I explained that I only had one piece of each. Desktop Security Software Risks - Part 1 This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions.Reason #2: the Desktop Security Software RisksThe risks of placing software on the desktop are such that I will be breaking this article into two parts. ![]() |
home | site map |
© 2006 |