[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
Status: Not Logged In; Sign In
Computers-Hacking Title: Intro: Cleanliness is Next to Godliness: Browser cookies Intro: Cleanliness is Next to Godliness: Browser cookies In all cases of the above expression, some computer users leave the cleanliness of a computer to pure happenchance or at best an archaic process of deleting a file or a cache memory which is not much more than having your dawg lick a plate after dinner and subsequently placing the plate back on the shelf for re-use as clean. File or cache deletion is an unwise practice through the use of most popular web browsers: Cookie Monster: My browser has cookies? I did not know that. The best or optimal method to ensure proper file deletion is through a third party application that overwrites the data with any number of user selected methods from simple to extremely complex. The third party application opens the file (cache) that you selected assuming the file is not already in use. That same application then over-writes the contents of the file with the user selected method (typically a pseudo-random code) and then deletes the file pointer thus losing the data in resident memory. Again, the only way to ensure that deleted files, as well as files that you encrypt with EFS or other encryption methods (I shall cover this in the next section of this series) that are safe from recovery is to use a secure delete application. Secure delete applications overwrite a selected file using techniques that have proven to make disk data unrecoverable, even using the most modern recovery technology that can read patterns in various forms of media that reveal weakly deleted files. This is the introduction to a five part series that I plan for security reasons about your own physical and intellectual property. The series shall describe simple or easy & cost effective AND proven methods of keeping your Windows computer clean from intrusion, snooping and what I refer to leaving breadcrumbs. Here are the five parts: Post Comment Private Reply Ignore Thread Top Page Up Full Thread Page Down Bottom/Latest Begin Trace Mode for Comment # 1.
#1. To: NewsJunky, all (#0)
As I suggested on an earlier thread, here is the first part. I choose to different threads for varying topic matters as described. It should be fun and feel free to add your own expertise as you feel. This series of presentations on LF is set of methods to help prevent you from being a "terrorist" based on the recent US NDAA.
There are no replies to Comment # 1. End Trace Mode for Comment # 1.
Top Page Up Full Thread Page Down Bottom/Latest |
[Home] [Headlines] [Latest Articles] [Latest Comments] [Post] [Mail] [Sign-in] [Setup] [Help] [Register]
|