[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"Leftists Make Desperate Attempt to Discredit Photo of Abrego Garcia's MS-13 Tattoos. Here Are Receipts"

"Trump Administration Freezes $2 Billion After Harvard Refuses to Meet Demands"on After Harvard Refuses to Meet Demands

"Doctors Committing Insurance Fraud to Conceal Trans Procedures, Texas Children’s Whistleblower Testifies"

"Left Using '8647' Symbol for Violence Against Trump, Musk"

KawasakiÂ’s new rideable robohorse is straight out of a sci-fi novel

"Trade should work for America, not rule it"

"The Stakes Couldn’t Be Higher in Wisconsin’s Supreme Court Race – What’s at Risk for the GOP"

"How Trump caught big-government fans in their own trap"

‘Are You Prepared for Violence?’

Greek Orthodox Archbishop gives President Trump a Cross, tells him "Make America Invincible"

"Trump signs executive order eliminating the Department of Education!!!"

"If AOC Is the Democratic Future, the Party Is Even Worse Off Than We Think"

"Ending EPA Overreach"

Closest Look Ever at How Pyramids Were Built

Moment the SpaceX crew Meets Stranded ISS Crew

The Exodus Pharaoh EXPLAINED!

Did the Israelites Really Cross the Red Sea? Stunning Evidence of the Location of Red Sea Crossing!

Are we experiencing a Triumph of Orthodoxy?

Judge Napolitano with Konstantin Malofeev (Moscow, Russia)

"Trump Administration Cancels Most USAID Programs, Folds Others into State Department"

Introducing Manus: The General AI Agent

"Chinese Spies in Our Military? Straight to Jail"

Any suggestion that the USA and NATO are "Helping" or have ever helped Ukraine needs to be shot down instantly

"Real problem with the Palestinians: Nobody wants them"

ACDC & The Rolling Stones - Rock Me Baby

Magnus Carlsen gives a London System lesson!

"The Democrats Are Suffering Through a Drought of Generational Talent"

7 Tactics Of The Enemy To Weaken Your Faith

Strange And Biblical Events Are Happening

Every year ... BusiesT casino gambling day -- in Las Vegas

Trump’s DOGE Plan Is Legally Untouchable—Elon Musk Holds the Scalpel

Palestinians: What do you think of the Trump plan for Gaza?

What Happens Inside Gaza’s Secret Tunnels? | Unpacked

Hamas Torture Bodycam Footage: "These Monsters Filmed it All" | IDF Warfighter Doron Keidar, Ep. 225

EXPOSED: The Dark Truth About the Hostages in Gaza

New Task Force Ready To Expose Dark Secrets

Egypt Amasses Forces on Israel’s Southern Border | World War 3 About to Start?

"Trump wants to dismantle the Education Department. Here’s how it would work"

test

"Federal Workers Concerned That Returning To Office Will Interfere With Them Not Working"

"Yes, the Democrats Have a Governing Problem – They Blame America First, Then Govern Accordingly"

"Trump and His New Frenemies, Abroad and at Home"

"The Left’s Sin Is of Omission and Lost Opportunity"

"How Trump’s team will break down the woke bureaucracy"

Pete Hegseth will be confirmed in a few minutes

"Greg Gutfeld Cooks Jessica Tarlov and Liberal Media in Brilliant Take on Trump's First Day"

"They Gave Trump the Center, and He Took It"

French doors

America THEN and NOW in 65 FASCINATING Photos

"CNN pundit Scott Jennings goes absolutely nuclear on Biden’s ‘farce’ of a farewell speech — and he’s not alone"


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: Intro: Cleanliness is Next to Godliness: Browser cookies
Source: LF
URL Source: [None]
Published: Feb 9, 2012
Author: buckeroo
Post Date: 2012-02-09 20:46:51 by buckeroo
Keywords: None
Views: 5748
Comments: 3

Intro: Cleanliness is Next to Godliness: Browser cookies

We often think of the above expression as a method of keeping “mind, body, soul, heart, word and deed” in a state of salvation (from a western cultural perspective) or a state of nirvana (from an eastern cultural perspective) in an effort to identify ourselves with a Creator or perhaps called a Supreme Being.

In all cases of the above expression, some computer users leave the cleanliness of a computer to pure “happenchance” or at best an archaic process of deleting a file or a cache memory which is not much more than having your dawg lick a plate after dinner and subsequently placing the plate back on the shelf for re-use as clean. File or cache deletion is an unwise practice through the use of most popular web browsers:

Cookie Monster: My browser has cookies? I did not know that.
Cookie Monster: Where can I find them? I want to eat them.
buckeroo: Ummm, maybe we should start with clearing your cache.
Cookie Monster: Ok, how do I do that?

The fundamental idea is that you don’t delete the cookies. Simple deletion is tantamount to leaving “breadcrumbs.” You eat the cookies. The problem with your local cache memory using the normal web browser and other applications “deletion functions” is all it performs in the deletion process is the deletion of the file pointers to memory (typically on the HDD) and then reassigns a new memory pointer (typically on the HDD) to a new position particularly in most versions of Windows OS. The caveat is: old data is still resident in memory for any exposure towards unintended eyes to where the earlier pointer was originally pointed towards.

The best or optimal method to ensure proper file deletion is through a third party application that overwrites the data with any number of user selected methods from simple to extremely complex. The third party application opens the file (cache) that you selected assuming the file is not already in use. That same application then over-writes the contents of the file with the user selected method (typically a pseudo-random code) and then deletes the file pointer thus losing the data in resident memory.

Again, the only way to ensure that deleted files, as well as files that you encrypt with EFS or other encryption methods (I shall cover this in the next section of this series) that are safe from recovery is to use a secure delete application. Secure delete applications overwrite a selected file using techniques that have proven to make disk data unrecoverable, even using the most modern recovery technology that can read patterns in various forms of media that reveal weakly deleted files.

This is the introduction to a five part series that I plan for security reasons about your own physical and intellectual property. The series shall describe simple or easy & cost effective AND proven methods of keeping your Windows computer clean from intrusion, snooping and what I refer to leaving “breadcrumbs.” Here are the five parts:

  • Intro: Cleanliness is Next to Godliness: Browser cookies (this thread)

  • Part1: Cleanliness is Next to Godliness: Local machine(s) HDD security

  • Part2: Cleanliness is Next to Godliness: LAN security and HDD backups

  • Part3: Cleanliness is Next to Godliness: Internet ports and tests using established methods

  • Part4: Cleanliness is Next to Godliness: Obscuring your IPA and not leaving breadcrumbs on the Internet

(1 image)

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

Begin Trace Mode for Comment # 1.

#1. To: NewsJunky, all (#0)

As I suggested on an earlier thread, here is the first part. I choose to different threads for varying topic matters as described. It should be fun and feel free to add your own expertise as you feel.

This series of presentations on LF is set of methods to help prevent you from being a "terrorist" based on the recent US NDAA.

buckeroo  posted on  2012-02-09   20:51:07 ET  Reply   Untrace   Trace   Private Reply  


Replies to Comment # 1.

        There are no replies to Comment # 1.


End Trace Mode for Comment # 1.

TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com