Maintain your old Siemens Hipath system

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true.

We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet.

Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records.

Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair.

The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers.

These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work.

Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks.

But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps:

-You sign on to your ISP.

-Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to.

-You type in a web address in your browser and send that request to your ISP.

-Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page.

-The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page.

-The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP.

-Your ISP looks up in it's log who made the initial request and sends it on to you.

-You get the page, a temporary copy is stored on your hard drive.

-You click on a link or enter in a new web address and the process starts all over again!

So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right?

Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself.

All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet.

So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net.

Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.

He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.

In The News:

Virus which killed four may be more widespread - report
Sat, 18 Jan 2020 08:32:00 +0000
The number of cases of a virus spreading through China is likely to be higher than current reports, according to Imperial College.

Macron rushed out of theatre after protesters try to confront him
Sat, 18 Jan 2020 01:54:00 +0000
French President Emmanuel Macron has been rushed out of a theatre in Paris after protesters tried to confront him.

Trump is a 'clown', says Iran's supreme leader in rare public address
Fri, 17 Jan 2020 09:00:00 +0000
Iran's Supreme Leader Ayatollah Ali Khamenei has said European nations including the UK "cannot be trusted" but Tehran is not against negotiating with anyone - except the US.

Will pressure on Iran spark more aggression or pull it back to talks?
Fri, 17 Jan 2020 17:58:00 +0000
In the complex and opaque politics of Iran, this week's Friday prayers in the capital Tehran was one of those moments which provides clues on the country's strength, its direction and the confidence of its leadership.

World's shortest mobile man dies aged 27
Sat, 18 Jan 2020 05:07:00 +0000
The world's shortest man who could walk has died at the age of 27.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

An Open Letter From a So-called Stupid

Someone recently told me, "You would have to be a... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

Beware of Imitations! Security, Internet Scams, and the African Real Estate Agenda

Fishing on the Internet has come a long way. However,... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Is the Internet Insecure Because of You?

Long gone are the days that we could feel secure... Read More

Computer Security

What is computer security? Computer security is the process of... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Data Security; Are Your Company Assets Really Secure?

Is your data secure? Think again. Securing data is unlike... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

SPYWARE - Whos Watching Who?

I am in the midst of Oscar Wilde's The Picture... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Top 10 tips for Safe Internet Shopping

Over £5 billion pounds was spent on online shopping in... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Is Spyware Watching You?

Imagine my surprise when I received a phone call from... Read More

Internet Shopping - How Safe Is It?

Millions of people make purchases online, but many people are... Read More

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing... Read More

Mail Forwarding - Why Would You Do It?

First of all we need to get some terms stated.... Read More

The Move to a New Anti-Virus Model

This is the second in a series of articles highlighting... Read More

Ransom Trojan Uses Cryptography for Malicious Purpose

Every day millions of people go online to find information,... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

HackAttack

P C. owners are constantly at risk from attacks by... Read More