Intro: Cleanliness is Next to Godliness: Browser cookies
We often think of the above expression as a method of keeping mind, body, soul, heart, word and deed in a state of salvation (from a western cultural perspective) or a state of nirvana (from an eastern cultural perspective) in an effort to identify ourselves with a Creator or perhaps called a Supreme Being. In all cases of the above expression, some computer users leave the cleanliness of a computer to pure happenchance or at best an archaic process of deleting a file or a cache memory which is not much more than having your dawg lick a plate after dinner and subsequently placing the plate back on the shelf for re-use as clean. File or cache deletion is an unwise practice through the use of most popular web browsers:

Cookie Monster: My browser has cookies? I did not know that.
Cookie Monster: Where can I find them? I want to eat them.
buckeroo: Ummm, maybe we should start with clearing your cache.
Cookie Monster: Ok, how do I do that?
The fundamental idea is that you dont delete the cookies. Simple deletion is tantamount to leaving breadcrumbs. You eat the cookies. The problem with your local cache memory using the normal web browser and other applications deletion functions is all it performs in the deletion process is the deletion of the file pointers to memory (typically on the HDD) and then reassigns a new memory pointer (typically on the HDD) to a new position particularly in most versions of Windows OS. The caveat is: old data is still resident in memory for any exposure towards unintended eyes to where the earlier pointer was originally pointed towards. The best or optimal method to ensure proper file deletion is through a third party application that overwrites the data with any number of user selected methods from simple to extremely complex. The third party application opens the file (cache) that you selected assuming the file is not already in use. That same application then over-writes the contents of the file with the user selected method (typically a pseudo-random code) and then deletes the file pointer thus losing the data in resident memory.
Again, the only way to ensure that deleted files, as well as files that you encrypt with EFS or other encryption methods (I shall cover this in the next section of this series) that are safe from recovery is to use a secure delete application. Secure delete applications overwrite a selected file using techniques that have proven to make disk data unrecoverable, even using the most modern recovery technology that can read patterns in various forms of media that reveal weakly deleted files.
This is the introduction to a five part series that I plan for security reasons about your own physical and intellectual property. The series shall describe simple or easy & cost effective AND proven methods of keeping your Windows computer clean from intrusion, snooping and what I refer to leaving breadcrumbs. Here are the five parts:
- Intro: Cleanliness is Next to Godliness: Browser cookies (this thread)
- Part1: Cleanliness is Next to Godliness: Local machine(s) HDD security
- Part2: Cleanliness is Next to Godliness: LAN security and HDD backups
- Part3: Cleanliness is Next to Godliness: Internet ports and tests using established methods
- Part4: Cleanliness is Next to Godliness: Obscuring your IPA and not leaving breadcrumbs on the Internet