Article Categories
» Arts & Entertainment
» Automotive
» Business
» Careers & Jobs
» Education & Reference
» Finance
» Food & Drink
» Health & Fitness
» Home & Family
» Internet & Online Businesses
» Miscellaneous
» Self Improvement
» Shopping
» Society & News
» Sports & Recreation
» Technology
» Travel & Leisure
» Writing & Speaking

  Listed Article

  Category: Articles » Technology » Computers » Article
 

Protect Your Privacy by Erasing Tracks Left on Your Computer




By Richard Rogers

When you browse the web information is continuously collected by the websites you visit and by your own computer. For example, websites at a minimum collect information about the web browser you use the operating system of your computer and the geography you reside from. However, what surprises most users is the amount of information that is collected on your computer from your surfing habits and daily use.

Your web browser stores a lot of different types of information which is designed to improve your internet surfing experience but nevertheless poses a privacy risk. The sites or URLs which you visit are stored in the browser's "history." Search results are saved when you enter a search term into a search engine like Google. Web content and images are stored in the "temp" folder. Files that you download are stored in the download manager.

Websites also place "Cookies" onto your hard drive. A cookie is a small text file and is used by websites to offer advanced features. Some of the information that cookies store include shopping basket items or log-in information for a membership site. Cookies can also store information about when you visited the site including date and time.

Given all this information being collected above you can easily see why this could become a privacy risk. It would not take someone who knew what they were doing too long to figure out what websites you visit, what you have bought online and what search terms you are looking for. This is unfortunately not the end of it.

If you are a user of instant messenger or chat programs like AIM, MSN Instant Messenger or even Skype then it is important to be aware that the programs saves your chat history. Most programs allow you turn this feature off.

There are number of other places besides your web browser where information is stored on your computer. This data can allow people to figure out what you have been doing on your computer. Media players like RealPlayer and Microsoft Media Play store audio and video playing history. Microsoft Office like Excel and PowerPoint applications store information about the most recently accessed files.

Another important thing to remember is that when you delete a file it is not necessarily permanently erased and can be recovered with the right software. When you first hit delete the file is moved to the Recycle Bin. Even when you empty the Recycle Bin the file still exists on your hard drive until Windows overwrites it.

Here are two things you can do to help reduce the privacy risks from your computer.

- Use a free software tool called "CCleaner" (http://www.ccleaner.com) to clear information collected by your web browser and Windows's Temp Folder. This software automates the manual process of using your browser options menu to clean out cookies, URL history etc. Try to run this tool once a week or more frequently if you are a heavy internet user.
- If you work with sensitive data files on your computer then you may want to consider investing in secure file "shredder" software. This type of software actually overwrites or "bleaches" the file you want to delete which means that it cannot be restored.

 
 
About the Author
Richard Rogers is a owner of a number of computer related sites. One of his sites offers Computer Help for Windows XP Users - http://www.pcshield.co.uk

Article Source: http://www.simplysearch4it.com/article/25461.html
 
If you wish to add the above article to your website or newsletters then please include the "Article Source: http://www.simplysearch4it.com/article/25461.html" as shown above and make it hyperlinked.



  Some other articles by Richard Rogers
5 Steps to Securing Your Windows XP Home Computer
Most people are aware that there are continuous security issues with Microsoft's Windows operating system and other programs. However, what most people do not realize is how easy it is to significantly improve your computer's ...

The Web Browser is Essential to Your Computer's Security
For most people, the web browser is central to what you do on your computer. Companies are increasingly putting more and more services on the web and ...

How Profits Motivates Virus Creators
The motivation behind hackers has evolved noticeably over the last couple of years. Developing harmful viruses is less about "bragging rights" or satisfying the creator's ego and is ...

How to Reduce Spam in Your Inbox and Enhance Your Email Security
Spam is the internet's equivalent of junk mail. Spam is defined as an e-mail message sent to people without their consent or permission. Addresses of recipients are often harvested from Usenet postings or web pages, obtained from ...

How a Personal Firewall Helps to Protect Your Home Computer From Hackers
There are two types of firewall available to the home computer user. A hardware firewall is a device which sits between your computer and the internet. At home for example it could reside on a broadband ...

  
  Recent Articles
Microsoft Word. The power is under the hood
by Robert Duval

How To Select The Best Gaming Laptops
by Tim Childree

How To Select The Best Business Laptops
by Tim Childree

High-Tech Computer Rental for Business Promotion
by Michael Braganza

Managing a Worldwide Print Infrastructure from a Single Workstation in a Central Location
by Rick Ferguson

A Sneak Peek Into The World Of Refurbished Laptops
by Javier Fuller

Battery information
by goodbattery

Tell Me About Computers
by Khal Nuwar

Setting Up Your Own Internet Radio Station
by Jason Cole

Understanding Solar Energy
by Anna Stone

Mac FAXstf X Pro Faxing Program for Mac OS X Users
by Nivea David

How to Retrofit a Picture or an Image into Desktop Wallpaper for Your Computer
by Steve Dimeck

Wallpaper Choosing For Good Mood
by Dalvin Rumsey

Can't connect to database