Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
The Truth About Hiding Your Tracks on the Internet > NetSparsh - Viral Content you Love & Share

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true.

We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet.

Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records.

Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair.

The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers.

These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work.

Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks.

But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps:

-You sign on to your ISP.

-Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to.

-You type in a web address in your browser and send that request to your ISP.

-Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page.

-The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page.

-The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP.

-Your ISP looks up in it's log who made the initial request and sends it on to you.

-You get the page, a temporary copy is stored on your hard drive.

-You click on a link or enter in a new web address and the process starts all over again!

So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right?

Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself.

All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet.

So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net.

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

TechCrunch

Tortuga Logic raises $2 million to build chip-level security systems
TechCrunch
Tortuga Logic has raised $2 million in seed funding from Eclipse Ventures to help in their effort to maintain chip-level system security. Based in Palo Alto, the company plans to use the cash to build products that will find “lurking vulnerabilities ...


UN News Centre

At Security Council, UN chief urges cooperation to tackle security challenges in Mediterranean
UN News Centre
17 November 2017 – The Mediterranean – a confluence of civilizations, cultures, religions, trade and migration – is facing multiple security challenges, such as terrorism, illicit trade in narcotics, environmental degradation and forced displacement ...

and more »

New York Post

Mandalay Bay adds elevator security after Las Vegas shooting
Las Vegas Review-Journal
To that end, we have determined that positioning 24-hour security at the elevator banks improves our surveillance capabilities and enhances security for all of our guests and facilities,” MGM Resorts said in the statement. People seeking to get on the ...
Mandalay Bay adds 24/7 elevator security after gunman's rampageNew York Post

all 4 news articles »

KING5.com

Seattle police plan security for tree lighting ceremony
KING5.com
Seattle police have a plan to secure next week's holiday tree lighting ceremony in Westlake Park, and it makes room for protesters to exercise their first amendment rights. "It's the kickoff for the holiday season," said James Sido, DSA spokesperson ...


New York Times

Homeland Security Official Resigns Over Remarks on African-Americans and Muslims
New York Times
WASHINGTON — The Department of Homeland Security's head of outreach to religious and community organizations resigned on Thursday after audio recordings revealed that he had previously made incendiary remarks about African-Americans and ...
Homeland Security Official Who Blamed Slums On 'Lazy Blacks' QuitsHuffPost
Homeland Security official Jamie Johnson resigns after comments ...Washington Post
Homeland Security's head of community outreach resigns over past controversial comments on black community, IslamCNN
The Grio -New York Daily News -CNN -FEMA.gov
all 68 news articles »

Computerworld

Strong and stable: The iOS security guide
Computerworld
So, what's the weakest point in mobile device security? Sadly, it's you. From tapping links in phony emails to accessing confidential password-protected information using open public Wi-Fi hotspots to simply using the same password everywhere: All ...
The iOS 11 privacy and security settings you need to know aboutWired.co.uk

all 147 news articles »

UN News Centre

Security Council fails at fresh attempt to renew panel investigating chemical weapons use in Syria
UN News Centre
17 November 2017 – For the third time in two days, the United Nations Security Council on Friday failed to adopt a resolution on the mandate of an international panel investigating use of chemical weapons in Syria due to a negative vote by permanent ...
Security Council Considers 30-day Extension on Syria ExpertsVoice of America
The Investigation Into Chemical Attacks in Syria Is Fizzling Out After a Security Council ShowdownTIME
Security Council Fails for Fourth Time to Renew Mandate of Joint Mechanism Investigating Chemical Weapons Attacks ...ReliefWeb

all 521 news articles »

WFTV Orlando

Investigators testify in downtown Orlando security guard's murder trial
WFTV Orlando
ORLANDO, Fla. - Crime scene investigators testified Friday in the murder trial of a man accused of raping and killing a 27-year-old woman at her downtown Orlando apartment. Police said Stephen Duxbury strangled Sasha Samsudean in October 2015 at the ...
Jurors hear from print experts in security guard's murder trialOrlando Sentinel

all 5 news articles »

Houston Chronicle

Ex-Homeland Security secretary recovering from heart attack
Houston Chronicle
Ridge was the nation's first homeland security secretary, serving under Republican President George W. Bush until February 2005. He left the governorship after the terrorist attacks of Sept. 11, 2001, to join the Bush administration. Since leaving ...
Ex-Homeland Security Czar Ridge Hospitalized After Heart AttackVoice of America
Former Pennsylvania Governor and U.S. Homeland Security ...WTAE Pittsburgh
Former Head of US Homeland Security Ridge in Critical ConditionU.S. News & World Report
Fox News -Austin American-Statesman
all 105 news articles »

Tampabay.com

Cyber firm accesses CentCom cloud information, gives command low security score
Tampabay.com
Vickery said he notified the military about the security loophole as soon as it was discovered. He said he would "not be surprised" if someone besides him accessed the information, but Army Maj. Josh Jacques, a command spokesman, said it appears no one ...

and more »
Google News

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

Spyware is Not Like a Nosy Neighbor

Remember the television show about the nosy neighbor Mrs. Kravitz... Read More

Why Malicious Programs Spread So Quickly?

It seems that nowadays cybercriminals prefer cash to fun. That... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Firewall Protection - Does Your Firewall Do This?

The first thing people think about when defending their computers... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

New CipherSend Online Security Service Thwarts Email Address Theft And Soothes Password Fatigue

In 1997, I decided after 15 years as a practicing... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

Is That Free Stuff Like An iPod Or Desktop Computer Really Free?

Have you seen the web site, www.freestuff.com? Or have you... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

An Open Door To Your Home Wireless Internet Network Security?

This is not some new fangled techno-speak, it is a... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Hacked: Who Else Is Using Your Computer?

A friend called me one day and asked if I... Read More

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

How to Thwart the Barbarian Spyware!

Today,on most internet user's computers, we have the ability to... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

Phishing, Fraudulent, and Malicious Websites

Whether we like it or not, we are all living... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Internet Scams: Dont be a Victim

As the number of people using the Internet as an... Read More

All About Computer Viruses

Your computer is as slow as molasses. Your mouse freezes... Read More

Click Here To Defeat Evil

Microsoft routinely releases new security updates, many of which are... Read More