• Main Menu
  • Privacy

    • How to Delete Internet History

      How to Delete Internet History

      Deleting Internet history clears the record of web sites visited. This procedure helps keep Internet browsing private.  Below are steps to manually delete Internet files from the computer: Delete Internet History in Internet Explorer By default, Internet Explorer keeps Internet history for 20 days. To delete Internet history in Internet Explorer, open the Tools menu,

    • TEMPEST

      TEMPEST

      TEMPEST stands for Transient Electromagnetic Pulse Surveillance Technology. Computers and other electronic equipment release interference to their surrounding environment. You may observe this by placing two video monitors close together. The pictures will behave erratically until you space them apart. What is important for an observer is the emission of digital pulses (zeroes and ones)

    • Browser Cookie

      Browser Cookie

      A browser cookie is a small piece of information sent by a web server to a web browser to be stored for future use. The data in the browser cookie will be sent back to the web server whenever the browser reconnects to the web site. Cookies are commonly used to store user preference information,

    • Anonymous Proxy

      Anonymous Proxy

      An anonymous proxy is a piece of software that protects web browsers’ privacy and anonymity from web site operators, Internet snoops, and even unfriendly governments. The anonymous proxy software resides on a proxy server. The web browser connects to the proxy server and the proxy server connects to the web server. The web server does

    • How to Erase Browser History

      How to Erase Browser History

      Erasing browser history clears the record of what web sites the user visited over a period of time. This can help to protect privacy by preventing others from monitoring what web sites the user has been visiting. Erasing Internet Explorer’s Browser History By default, Internet Explorer keeps browser history for 20 days. To erase browser

    • How to Disable LoJack

      How to Disable LoJack

      LoJack refers to a GPS dependent tracking device that allows users to locate devices or vehicles that have been stolen. It is available in both a software version for computers and a hardware version for vehicles and communicates with GPS satellites to show a user where his/her stolen item currently is. LoJack can be activated

    • How to Bypass Websense

      How to Bypass Websense

      Many businesses and government institutions use a content filtering program such as Websense to keep employees from visiting certain websites while at work. These programs can either prohibit the use of certain websites or monitor all of the sites that employees visit while in the office. Websense blocks several website categories: adult material, entertainment, drugs,

    • Technologies That Can Help Protect Your Privacy

      Technologies That Can Help Protect Your Privacy

      In a previous article on privacy we’ve established what it is, how does digitally networking our world affect it, and in a nutshell, why should we care. We established that the best way to ensure your privacy is through technological means, and in this article I offer an overview of what such technologies are. What

    • Anonymous Proxy Lists

      Anonymous Proxy Lists

      Anonymous proxies appear on the Internet constantly, often only to disappear rapidly when their owners discover the bandwidth cost. To help users find a current anonymous proxy server, dedicated individuals maintain anonymous proxy lists. Anonymous Proxy Server Lists We maintain our own anonymous proxy list that users can access by clicking the Proxy Sites button

    • How to Remove a Keylogger

      How to Remove a Keylogger

      In the last few decades, computer science has changed the world. People now use computers to pay their bills, talk to their friends, and virtually everything else. Because of this dependence on computers, the vast majority of computer users have opened a portal into their homes that hackers and cyber thieves can use to steal

    privacy
    405 queries in 0.560 seconds.