![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true. We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet. Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records. Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair. The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers. These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work. Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks. But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps: -You sign on to your ISP. -Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to. -You type in a web address in your browser and send that request to your ISP. -Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page. -The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page. -The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP. -Your ISP looks up in it's log who made the initial request and sends it on to you. -You get the page, a temporary copy is stored on your hard drive. -You click on a link or enter in a new web address and the process starts all over again! So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right? Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself. All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet. So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net. Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work. He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
MORE RESOURCES: Waltz and staff used Gmail for government communications, officials say The Washington Post Blocking 7-Eleven deal on security grounds would hurt Japan's image, head of state-backed fund says Reuters Armenia refuses to finance Russian-led CSTO security alliance budget The Kyiv Independent A week in security (March 24 – March 30) Malwarebytes White House suggests national security adviser Mike Waltz received work-related emails on his personal Gmail account New York Post Fight at maximum security unit precedes tour by state’s prison work group - South Dakota Searchlight Fight at maximum security unit precedes tour by state’s prison work group South Dakota Searchlight EU analysis highlights space capabilities, lists scenarios for space security by 2050 Industrial Cyber Musk Again Misleads on Social Security Fraud The New York Times Alaska Capitol will get airport-style security checkpoint, legislative panel orders Anchorage Daily News Forget Signal. National Security Adviser Waltz now accused of using Gmail for work - theregister.com Fortress Government Solutions receives impact Level 6 security accreditation from US Navy Industrial Cyber Mobile police installing new security cameras at city parks, following shootout at Langan Park fox10tv.com Native Community Protests MPLS Security Company Who Beat, Maced, and Cuffed Indigenous Man Unicorn Riot Mike Waltz Faces Another Embarrassing Data Security Failure The Daily Beast Lawmatics Achieves SOC 2 & HIPAA Compliance, Reinforcing Commitment to Data Security and Privacy LawSites Leaders Describe Host of Threats to Homeland, Steps to Mitigate Them U.S. Department of Defense (.gov) Restaurant owner hires security guards after quadruple shooting; residents wonder if it is enough WBAL-TV MPD: Driver of security truck issued several traffic citations after hitting pedestrian along S. Parkway East Action News 5 Breaking the Cone of Silence: The Jigsaw Puzzle of Operational Security Security Clearance Jobs The urgent reality of machine identity security in 2025 csoonline.com SCOTUS examines court’s role in national security Courthouse News Service Could drones replace school security guards? FOX 7 Austin Women in Security: Tia Eskandari, Senior Director, Allied Universal Security Sales & Integration City to receive $94K in Homeland Security grant funding Oil City News Your smart home may not be as secure as you think Help Net Security Pasadena school security guard fired after allegations she forced student to duct tape mouth Pasadena Star News Security officer made Pasadena middle schooler duct-tape her own mouth shut, father says Los Angeles Times Two new security K-9s join Lehigh Valley Health Network NBC10 Philadelphia LightPath Technologies to Exhibit Advanced Infrared Solutions at 2025 Border Security Expo PR Newswire ReliaQuest Closes $500M Round to Boost Agentic AI Security BankInfoSecurity BitLyft Gives Back to the Information Security Community GlobeNewswire Pasadena school security officer accused of duct-taping 11-year-old girl's mouth shut for 'talking too much' ABC7 Los Angeles "Credible Threat" to 2025 Chincoteague Pony Swim Prompts New Security Policies Chesapeake Bay Magazine Akron-Canton Airport has new security measure: K9 Luna Cleveland 19 News Winnetka hires private security to patrol village NBC 5 Chicago Israel’s National Security Council Warns of Increased Threats to Jews Abroad Ahead of Passover Algemeiner.com South Korea’s acting president urges calm, tighter security ahead of impeachment ruling The Mighty 790 KFGO AI Agent and Copilot Podcast: Microsoft Exec Dorothy Li on Role of AI Agents, Ecosystem in Security Cloud Wars Senate Education Focuses On School Security, Classroom Aides West Virginia Public Broadcasting Hazleton Anesthesia Services warns of security breach Hazleton Standard Speaker Gun-detecting dogs join LVHN security team Times News Online MIT Wins $12.2B Contract to Drive Innovation for National Security at Lincoln Lab Security Clearance Jobs Northwest Dallas security guard fatally shoots man outside motel FOX 4 News Dallas-Fort Worth Oracle Cloud security SNAFU latest: IT giant accused of pedantry as evidence scrubbed theregister.com Secure Passage and Sunflower Labs Take Security to the Skies with Autonomous Drone Integration PR Newswire Security dog bites woman at Mayfair Mall, police describe fight FOX6 News Milwaukee Motel security guard kills man after altercation in Northwest Dallas FOX 4 News Dallas-Fort Worth |
![]() |
![]() |
![]() |
RELATED ARTICLES
Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. ![]() |
home | site map |
© 2006 |