Web Browsing - Collected Information

You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit.

There are a few main pieces of information that get saved when you surf the web, this is by no means a full list, or a list of potentially what someone may be able to get, but the 'average' website will collect this data.

Referring URL - The prior website that you were surfing. This information is quite detailed, it will not just say google.com, it'll give the full website url that referred you, including the search words you used. In fact, they can click or copy that in to their web browser and see the exact page you left. Keep in mind that if you were in a website doing banking or something over a secure connection they won't be able to just login, however some less secure websites encode your password and username in to the URL itself, which could make that possible.

IP Address & Hostname - Your IP address and hostname identify you to the world, without a unique identity you wouldn't be able to request anything from the Internet. This will tell them who your ISP (Internet Service Provider) is and often give away where you live (to the city), or if you are working for a government agency, educational facility, or if you are surfing from behind a company proxy server.

Surfing Habits - Websites will record how many pages you have visited, the amount of time you spent at one page (before clicking on the next), the page you enter on, and the one you exited from.

Operating System and Software - This is a big one, as you are surfing information about your Operating System (OS) and the web browser you are using is recorded. Often the version numbers are also sent out. Additionally, they can actually tell your screen resolution and colour depth!

Most websites as I said before, use all of this information for statistical purposes, targeting advertising, developing a more user or operating system friendly website. However, it is good to keep in mind that a malicious person could also use this information.

Many security features are available through your web browsers, such as different levels of security for trusted and untrusted sites. Some linux browsers allow you to remove operating system and web browser information so it won't be available to websites. Personal firewalls, anti-virus software, malware scanners are all a great thing to have if you do a lot of surfing the web, and of course cleaning your internet cache and history!

It's always a good idea to keep privacy and security in mind when you are surfing the web and be careful of what websites you openly provide information to.

Ken Dennis
http://KenDennis-RSS.homeip.net

In The News:


pen paper and inkwell


cat break through


Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Identity Theft -- 10 Simple Ways to Protect Your Good Name!

Identity Theft is one of the most serious problems facing... Read More

Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself

The money being spent online is steadily growing. With billions... Read More

Spyware, What It Is, What It Does, And How To Stop It

Spyware is software that runs on a personal computer without... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

How To Cover Your Tracks On The Internet

Every single time you access a website, you leave tracks.... Read More

Passwords or Pass Phrase? Protecting your Intellectual Property

Much has been said on the theory of password protection... Read More

Phishing ? Its Signs and Your Options

Phishing is the act of some individual sending an email... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

DOS Attacks: Instigation and Mitigation

During the release of a new software product specialized to... Read More

Make Money Online - Latest Scam Disclosed

Before we start, I want to make it clear that... Read More

Dont Fall Victim to Internet Fraud-10 Tips for Safer Surfing

The Internet offers a global marketplace for consumers and businesses.... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Password Security and Safety

There is nothing more important that password security in world... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Backup and Save your business!

There you are busily typing away on your PC or... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Protecting Your Identity On The Internet

Afraid that someone is monitoring your PC or installed a... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Everything You Need To Know About Spyware and Malware

You are at your computer, checking out software on EBay.... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Whats All This I Hear About Firewalls?

At this point, if you've got the whole "turning the... Read More

From Spyware with Love!

It's late. You've been scouring the web for that perfect... Read More

Internet Privacy

Over the past few years as the internet has become... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Hacking Threats and Protective Security

The 1998 Data Protection Act was not an extension to,... Read More