Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true.
We have to give those companies some credit though - they are giving you half of the truth. If they were giving you the whole story, what they'd be saying is that their software will make your surfing tracks disappear from your personal computer. Not from the Internet.
Now, with that said, don't just blow off these products saying "if they can't get rid of all my personal surfing records then what good are they?" These products actually address the more important half of the issue. The effective ones really do clean up your personal computer! To me this is very important because it's easier for people to get your computer's Internet records, via hacking, tracking or outright theft, than it is for them to get any other type of Internet records.
Want proof? Just ask Gary Glitter, a 1960's pop star who took his personal computer in to have a repair done. The shop found both pictures and other evidence of illegal Internet activity and called the cops! Glitter spent time in jail because he didn't "clean up his act" before he took the computer in for a repair.
The other half of this issue and the one that is a bit more complicated to address is made up of all the records established and held by your ISP (Internet Service Provider), Internet routers (computer "traffic cops" that route Internet requests around the web) and website hosting servers.
These computers are completely outside your scope of influence. You can't just call up your ISP and tell them to delete all records that pertain to your account! Once they are done laughing, they will let you know that to do that they would have to cull through literally millions of records for any given day to pull out your two or three hundred records. The effort would be enormous and they don't have the resources to do this kind of work.
Besides, these logs are used mostly to trouble shoot server / router errors and to help stop hacker abuse and other kinds of DOS (Denial of Service) attacks.
But you can affect the information that gets stored in these logs. To understand this you need to know how the process works. Here are the basic steps:
-You sign on to your ISP.
-Your ISP assigns you an IP (Internet Protocol) address. An IP address is a series of numbers that tell the computer where you are connecting from and who to send information to.
-You type in a web address in your browser and send that request to your ISP.
-Your ISP logs the request, along with your assigned IP address and then goes out to the Internet to request the web page.
-The ISP's request goes through multiple routers, each one logging who made the request and forwarding on the request to the next until it gets to the server hosting the web page.
-The host server logs the request and sends the information back out, often through a completely different set of routers, each one again logging the request and passing it on to the next until it gets back to your ISP.
-Your ISP looks up in it's log who made the initial request and sends it on to you.
-You get the page, a temporary copy is stored on your hard drive.
-You click on a link or enter in a new web address and the process starts all over again!
So for every request you make to your ISP, not only does that request get stored on your computer, it gets stored on a number of other computers as well! Comforting right?
Well there is a way to hide, or mask would be a better term, your web surfing activities. You need to use an anonymous surfing tool. Sites like Anonymizer.com or the-cloak.com offer an online proxy type service that takes advantage of SSL and encryption to keep your surfing tracks to yourself.
All requests made to them through SSL are encrypted so even your ISP can't read what you requested. This secure connection is the same type that ecommerce sites use to protect your credit card data. Then all requests they make for you reference their computers as the originator of the request so all the routers and web host servers see is their IP address! Your personal and or browser information is blocked from the Internet.
So, if you really want to protect your privacy, give the snoopers a one - two punch. Clean up your act by using one of the history / cookie clean up tools available for download AND surf through one of the anonymous surfing providers out on the net.
Michael Ameye has been developing web sites since 1995. He started writing about online privacy issues to answer questions from family, friends and co-workers. Visit http://www.canyourspam.com to see his latest work.
He is also the chief editor of PSS Online, A Privacy, Safety and Security eZine dedicated to bringing important information to people in order to foster a safer more secure environment - online and off. Visit http://www.pssonline.info to subscribe.
![]() |
|
![]() |
|
![]() |
|
![]() |
Internet scams and frauds are on the rise! The quantity... Read More
First I would like to stress I am condoning the... Read More
I Challenge You To Crack The Code ------------------------------------- I had... Read More
Spyware is software that runs on a personal computer without... Read More
The average computer is packed with hidden software that can... Read More
When we think of adware, what comes to mind are... Read More
Every single time you access a website, you leave tracks.... Read More
The most frustrating part of having Spyware on your computer... Read More
Over £5 billion pounds was spent on online shopping in... Read More
If you are a parent, you have probably wondered at... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
"You've just won a fabulous vacation or prize package! Now,... Read More
As you know, this time the virus under the name... Read More
Pharming is one of the latest online scams and rapidly... Read More
Have you ever had to call Symantec or McAfee to... Read More
So you want to know who your kids are chatting... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
Today the internet is a mine field of malicious code... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
This is not some new fangled techno-speak, it is a... Read More
They're out there. Individuals trying to make a quick buck... Read More
This is the second in a series of articles highlighting... Read More
Nowadays more and more people are using a computer. A... Read More
Have been an Internet user for more than 9 years,... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
Shopping for horse gifts or other gift items on the... Read More
Nobody wants to pay to remove spyware. At the very... Read More
The trash folder in my main inbox hit 4000 today.... Read More
Afraid that someone is monitoring your PC or installed a... Read More
My first experience with a spyware BHO based infection was... Read More
Let us take the example of scrambling an egg. First,... Read More
During the release of a new software product specialized to... Read More
Well, if that would have been said to me by... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Every day millions of people go online to find information,... Read More
There is nothing more important that password security in world... Read More
There are folks out there who use their powers for... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
We all get the odd virus now and then, but... Read More
Identity Theft and Your Personal Information Identity theft is... Read More
Working from home has its advantages, including no commute, a... Read More
A couple of years back, I paid my dues the... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
If you are a parent, as am I, I think... Read More
Every now and then you can read about a new... Read More
Spyware SolutionProbably Today's Biggest Computer Problem. You Suffer Without Knowing... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Be careful of sites that promise to send you "instant... Read More
Recently I have received email from my bank/credit Card Company,... Read More
I am the victim of an internet scam. It is... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
So called phishers try to catch the information about the... Read More
Identity theft ? also known as ID theft, identity fraud... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
Is your data secure? Think again. Securing data is unlike... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
A crowded marketplace can lead to unethical webmasters using underhand... Read More
Internet Security |