Security Information |
|
The Truth About Hiding Your Tracks on the Internet
Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true. We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet. Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records. Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair. The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers. These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work. Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks. But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps: -You sign on to your ISP. -Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to. -You type in a web address in your browser and send that request to your ISP. -Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page. -The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page. -The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP. -Your ISP looks up in it's log who made the initial request and sends it on to you. -You get the page, a temporary copy is stored on your hard drive. -You click on a link or enter in a new web address and the process starts all over again! So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right? Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself. All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet. So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net. Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work. He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Women are worried about their financial security. That may affect the 2024 presidential election CNBC Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News Canada Releases Defense Policy Update to Boost Security Department of Defense Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News RSA Conference 2024: AI and the Future Of Security Security Boulevard See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post FCC proposes BGP security measures Network World UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News The New U.S. Strategy on Global Health Security Think Global Health PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Votiro Keeps Up the Momentum in 2024 Security Boulevard A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State The Best Home Security Systems of 2024 Security.org The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando The Dell API Breach: It could have been prevented Security Boulevard JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Making Safety and Security Intrinsic to School Design Campus Security Today America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard U.S. Security Cooperation with Ukraine - United States Department of State Department of State USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard Belgium cuts off ticket sales for soccer match against Israel over ‘security concerns’ The Times of Israel Security fog machine helps deter burglars from Chatsworth business FOX 11 Los Angeles French security forces impose 'calmer' situation in New Caledonia under emergency powers FRANCE 24 English Galaxy Tab S9 lineup gets Android's May 2024 security update SamMobile - Samsung news |
RELATED ARTICLES
Cyber Crooks Go Phishing "Phishing," the latest craze among online evil-doers, has nothing to do with sitting at the end of a dock on a sunny afternoon dangling a worm to entice hungry catfish.But, if you take their bait, this new breed of online con artist will hook you, reel you in, and take you for every dollar you have. Make Money Online - Latest Scam Disclosed Before we start, I want to make it clear that this article is about scammers that affect people who make money online by selling digital products, like e-books, software, etc. and have a refund policy, because we have a rather long way until the end and, if you are selling physical product or you money online through affiliate programs that don't involve a refund policy it's probably just a waste of time. Don't Become An Identity Fraud Statistic! "You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing The Internet offers a global marketplace for consumers and businesses. However, criminals also recognize the potential of cyberspace. Spyware Protection Software Spyware protection software is the easiest way of removing spyware from your computer and keeping it away. It detects and removes all pieces of spyware and adware automatically. Top Five Online Scams The top five online scams on the Internet hit nearly ten million people last year according to an FBI report in December 2004. That figure doubled from 2003 to 2004 and people are continuing to fall for these email and identity theft scams. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Internet Small Business and Fraud Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions. Ransom Trojan Uses Cryptography for Malicious Purpose Every day millions of people go online to find information, to do business, to have a good time. Alas, some people go there to commit crimes as well. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Watching the Watchers: Detection and Removal of Spyware If spyware were a person and he set himself up in yourhouse, you are likely going to do one of two things. You'llkick him out yourself or you'll call someone (such as thepolice) to do it for you. |
home | site map |
© 2006 |