![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true. We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet. Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records. Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair. The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers. These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work. Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks. But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps: -You sign on to your ISP. -Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to. -You type in a web address in your browser and send that request to your ISP. -Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page. -The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page. -The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP. -Your ISP looks up in it's log who made the initial request and sends it on to you. -You get the page, a temporary copy is stored on your hard drive. -You click on a link or enter in a new web address and the process starts all over again! So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right? Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself. All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet. So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net. Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work. He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
MORE RESOURCES: Russia open to security guarantees for Ukraine ‘in some form,’ Putin’s envoy says after White House talks politico.eu Opinion | What Happens When There’s a Real National Security Crisis? The New York Times NSA and partners Issue Guidance on Fast Flux as a National Security Threat National Security Agency (NSA) (.gov) AI Adoption in the Enterprise: Breaking Through the Security and Compliance Gridlock The Hacker News Trump fires NSC officials a day after far-right activist raises concerns to him about staff loyalty AP News Trump ousts members of National Security Council staff The Washington Post Trump fires six national security staffers after meeting with far-right activist Laura Loomer The Guardian NCS⁴ Announces 16th Annual National Sports Safety and Security Conference & Exhibition Agenda The University of Southern Mississippi Advisory warns of fast flux national security threat, urges action to protect critical infrastructure Industrial Cyber National Security Agency and Cyber Command chief Gen. Timothy Haugh ousted The Washington Post Trump fires national security officials after Laura Loomer ‘excoriated’ them in Oval Office meeting AL.com Lebanon-Syria Border Talks Can Restrain Hezbollah and Boost Security The Washington Institute New DOJ National Security Division Data Security Rules Take Effect on April 8: Is Your Organization Exposed? regulatoryoversight.com Trump Moves to Fire Several National Security Officials Deemed Insufficiently Loyal, AP Sources Say Military.com Senate GOP's blueprint for Trump's 'big, beautiful' agenda includes tax cuts, border security and more — here's what's inside New York Post Homeland Security Investigations expects more victims in Bartow Co. labor trafficking case Atlanta News First Utimaco Launches Post Quantum Security App Package The Quantum Insider Trump fired at least one national security aide following pressure from far-right activist Laura Loomer NBC Los Angeles Women in Security: Candice Aragon, Chief Experience Officer, PSA Security Sales & Integration NLV casino shooting suspect was stopped by security before killing, report says Las Vegas Review-Journal Congo War Security Review, April 3, 2025 Critical Threats Annual Assessment Lists Primary Threats to U.S. National Security AFCEA International IDF, Israel Police ignored all security dangers leading to Nova festival massacre The Jerusalem Post White House national security officials fired, sources say Honolulu Star-Advertiser Commission presents a European internal security strategy European Commission Observers say IDF abandoned Gaza border outpost in 12-hour security lapse The Jerusalem Post Luzerne County holds public demonstration of proposed new security-equipped mail ballot drop box The Sunday Dispatch Netanyahu says Israel will establish a new security corridor across Gaza to pressure Hamas - AP News Ivanti patches Connect Secure zero-day exploited since mid-March BleepingComputer When it Comes to Security, Trooper Tara Lee is Supreme Tennessee Administrative Office of the Courts (.gov) Trump's national security adviser reportedly used his personal Gmail account to do government work TechCrunch Apple Head of Global Security found not guilty in bribery trial tied to concealed gun permits NBC Bay Area Trump purges national security team after meeting conspiracist Yahoo News Singapore ISC West 2025 Show Floor Spotlight: BOSCH SECURITY AND SAFETY SYSTEMS Security Info Watch Wayne Board of Education President Don Pavlak, Provides Update on School Security Measures - TAPinto Trump Fires Three White House National Security Officials WBZ NewsRadio 1030 |
![]() |
![]() |
![]() |
RELATED ARTICLES
Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. ![]() |
home | site map |
© 2006 |