Kesar Tech

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 5 March 2011

How Anonymous Are You Online?

Posted on 15:58 by Unknown
These days, we share more and more personal details about ourselves online — whether intentional or not. You may think that you are anonymous as you browse websites, but pieces of information about you are always left behind. This information can include browsing behaviors, but more importantly, it could also include personally identifiable information, which can potentially be exploited by criminals for identity theft. Luckily, the information revealed about you can be reduced by taking a few simple measures.

Below is an overview created by US-Cert.org (see attached link) to help you minimize your risk of revealing too much.



What information is collected?



When you visit a website, a certain amount of information is automatically sent to the site. This information may include the following:

  • IP address - Each computer on the internet is assigned a specific, unique IP (internet protocol) address. Your computer may have a static IP address or a dynamic IP address. If you have a static IP address, it never changes. However, some ISPs own a block of addresses and assign an open one each time you connect to the internet — this is a dynamic IP address.
  • Domain name - The internet is divided into domains, and every user's account is associated with one of those domains. You can identify the domain by looking at the end of URL; for example, .edu indicates an educational institution, .gov indicates a US government agency, .org refers to organization, and .com is for commercial use.
  • Software details - An organization is usually able to determine which browser you used to access its site. The organization may also be able to determine what operating system your computer is running.
  • Page visits - Information about which pages you visited, how long you stayed on a given page, and whether you came to the site from a search engine is often also available to the organization operating the website.



If a website uses cookies, the organization may be able to collect even more information, such as your browsing patterns, which include other sites you've visited. If the site you're visiting is malicious, files on your computer, as well as passwords stored in the temporary memory, may be at risk.



How is this information used?

Generally, organizations use the information that is gathered automatically for legitimate purposes, such as generating statistics about their sites. By analyzing the statistics, the organizations can better understand the popularity of the site and which areas of content are being accessed the most. They may be able to use this information to modify the site to better support the behavior of the people visiting it.

Another way to apply information gathered about users is marketing. If the site uses cookies to determine other sites or pages you have visited, it may use this information to advertise certain products. The products may be on the same site or may be offered by partner sites.

However, some sites may collect your information for malicious purposes. If attackers are able to access files, passwords, or personal information on your computer, they may be able to use this data to their advantage. The attackers may be able to steal your identity, using and abusing your personal information for financial gain. A common practice is for attackers to use this type of information once or twice, then sell or trade it to other people. The attackers profit from the sale or trade, and increasing the number of transactions makes it more difficult to trace any activity back to them. The attackers may also alter the security settings on your computer so that they can access and use your computer for other malicious activity.

How can you limit the amount of information collected about you?

Be careful supplying personal information - Unless you trust a site, don't give your address, password, or credit card information. Look for indications that the site uses SSL to encrypt your information.
  • Limit cookies - If an attacker can access your computer, he or she may be able to find personal data stored in cookies. You may not realize the extent of the information stored on your computer until it is too late.
  • Browse safely - Be careful which websites you visit; if it seems suspicious, leave the site. Also make sure to take precautions by increasing your security settings, keeping your virus definitions up to date, and scanning your computer for spyware.



  • Here is how you would erase your browsing history for Internet Explorer 7 from Windows:

    1. Click Start on the desktop.

    2. Click Control Panel.

    3. Double-click Internet Options.

    4. Make sure the General tab is selected.

    5. Click Clear History in the History box.

    6. Click OK when it asks if you want to delete all items in your history folder.

    7. Click OK at the bottom of the General box to exit.

    Here is how you would erase your browsing history for Internet Explorer 8 from Windows:

    1. Click Start on the desktop.

    2. Click Control Panel.

    3. Double-click Internet Options.

    4. Click Delete under the Browsing History.

    5. Select what you want to delete and then click the Delete button.

    A couple of other things I recomend are:

    1. Under Browsing History, check "Delete browsing history on exit."

    2a. Also under Browsing History, click Settings.

    2b. Under History, set "Days to keep pages in history" to Zero.

    To do this from your browser:

    1. Click on "Tools" from your menu bar.

    2. Then Internet options.

    3. Follow the steps for your browser from above.

    For other browsers or Operating Systems, check the following link: http://kb.iu.edu/data/ahic.html.

    Hope this helps.



    Source: http://www.us-cert.gov/cas/tips/ST05-008.html



    Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
    Posted in Informative, Security | No comments
    Newer Post Older Post Home

    0 comments:

    Post a Comment

    Subscribe to: Post Comments (Atom)

    Popular Posts

    • I need your help.
      Hello and thanks for tuning in for another episode of the Kesar Tech blog. Today I would like to go in a little bit of a different directi...
    • 10 Reasons to Root Your Android Device
      Hello & Happy New Year. For those of you with Android devices, here is a way to take control of your device. It's called "Rooti...
    • Belarc Advisor
      This entry is to explain what the Belarc Advisor link on this page is for. Belarc's products automatically create an accurate and up-to-...
    • How do you get infected with malware?
      The answer to the above question is: Social engineering! Several people have asked me this very question, so to you guys, here is your answe...
    • Welcome
      Let me first start by saying, I am by no means an expert at writing, so you will probably find many grammatical errors and maybe even a spel...
    • Extortionware / Rogue Security Software / Malware
      You may not be familiar with the terms ‘rogue software, extortionware, or malware’ but there’s a very good chance that you or someone you kn...
    • Cell phone privacy reminder
      Cell phone numbers became public in March, and telemarketing companies can now call you on your cell. If you do not want to receive these ca...
    • Banking Scam
      Hello Everyone, I received the following scam email in my junk email account today. Many thing alerted me that this was false. * I have a Ch...
    • Free Download F-Secure Anti-Theft for Mobile 6.2
      Are you worried about your mobile phone being stolen and all your info (contacts, account info, etc..) being used for evil? Have no fear F-S...
    • Beware of Christmas scams
      Scammers absolutely love the holiday season. There are likely to be more online scam victims during those busy shopping and travelling Decem...

    Categories

    • Facebook
    • Informative
    • Other
    • Security

    Blog Archive

    • ►  2014 (1)
      • ►  January (1)
    • ►  2013 (14)
      • ►  December (6)
      • ►  November (3)
      • ►  October (1)
      • ►  September (1)
      • ►  August (1)
      • ►  June (1)
      • ►  April (1)
    • ►  2012 (20)
      • ►  November (3)
      • ►  October (1)
      • ►  September (1)
      • ►  August (3)
      • ►  July (1)
      • ►  May (3)
      • ►  April (3)
      • ►  March (2)
      • ►  February (2)
      • ►  January (1)
    • ▼  2011 (48)
      • ►  December (3)
      • ►  November (4)
      • ►  October (2)
      • ►  September (2)
      • ►  August (4)
      • ►  July (1)
      • ►  June (8)
      • ►  May (3)
      • ►  April (6)
      • ▼  March (9)
        • Securing your Facebook WiFi connection.
        • Tracking you through your smartphone.
        • Cell phone privacy reminder
        • Skype used for scam.
        • Phone Phishing Attacks
        • Does Your Smartphone Need Antivirus Protection?
        • I need your help.
        • Package Delivery Failure Virus
        • How Anonymous Are You Online?
      • ►  February (3)
      • ►  January (3)
    • ►  2010 (32)
      • ►  December (5)
      • ►  November (2)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
      • ►  July (1)
      • ►  June (2)
      • ►  May (2)
      • ►  April (3)
      • ►  March (2)
      • ►  February (4)
      • ►  January (5)
    Powered by Blogger.

    About Me

    Unknown
    View my complete profile