Category List

Tag Cloud

Cyber Attackchip-off forensicsCase ManagementNetwork forensicsHackingdigital forensics leedsCrime ReductionStaffforensic securityGraduateRemote Forensicsdata recoveryComputer forensics leedsmobile phone forensics jobsJobspolice case managementapple forensicsdisciplinary evidenceLab ApprovedDigital EvidenceData SecurityCloud ForensicsFinanceWarringtonLima solutiontrainingdigital forensics warringtonscientific case managementISO 17025stafford jobsLimaLima Liteforensic analysisLaunch EventCyber-SecurityCyber Crimechain of custody managementmobile phone analysis yorkshirescientific supportForensic careersMobile PhoneSC MagazinePCILegalIntaForensicsComputer Forensicsdigital forensic caseForensic AssuranceHuman ResourcesITiphone forensicsUK case management softwarecomputer forensics yorkshireComputer forensic case managementevidence managementUS case management softwareCase Management softwarePicture ImagesSoftwareMobile Phone Forensicsdigital forensics londonDSSInnovationMobile Phone ForenicsForensic ReadinessCovert investigationscomputer expertProfessionalsMarketingHelping PoliceGraduate Recruitmentcomputer forensics north englandConference & Exhbitionsmobile phone forensics leedscovert forensicsEmployee Disputedigital forensics north-westMalicious AttackISO 17025 accreditationComputer EmergenciesSecurityNew FeaturesLima TrainingJob VacanciesCareers Forensic jobsEventDigital ForensicsChip Off ForensicsContactComputer forensics jobsForensics EuropeCyber SecurityUpdateRecruitmentTalentData Protectioncomputer forensic analysisiOS forensicsEmploymentLaw Enforcement ForensicsCases SolvedLoss Preventionreportingmobile phone forensics yorkshiredigital forensic case managementSoftware Demonstrationcomputer investigationsISOHRdigital forensics yorkshirecomputer forensics laboratorymobile phone analysis leedsGraduate Training WeekForensic Case ManagementDigital Forensic Trainingforensic scienceWindowsCase Management systemcontinutiy managementexpert witness computers

Tag List

iphone forensics (1)
Cases Solved (2)
Network forensics (1)
continutiy management (1)
chip-off forensics (1)
computer expert (2)
Computer forensics jobs (1)
forensic security (1)
Hacking (1)
Lima (15)
Picture Images (2)
Digital Evidence (2)
Cyber Security (1)
forensic analysis (4)
Forensic jobs (1)
IT (1)
Software Demonstration (1)
Data Security (1)
Mobile Phone (1)
Legal (1)
scientific case management (1)
computer forensic analysis (1)
ISO 17025 accreditation (1)
digital forensics yorkshire (2)
Lima Training (4)
Helping Police (1)
Talent (1)
Computer forensic case management (1)
Cloud Forensics (1)
Case Management software (10)
computer investigations (1)
IntaForensics (6)
Lab Approved (1)
police case management (1)
computer forensics laboratory (1)
stafford jobs (1)
Human Resources (1)
Professionals (1)
Marketing (1)
Graduate Recruitment (1)
New Features (1)
Case Management system (6)
Contact (1)
scientific support (1)
Computer Forensics (20)
disciplinary evidence (1)
Forensic Readiness (2)
Job Vacancies (2)
Forensic careers (1)
evidence management (1)
mobile phone forensics leeds (1)
SC Magazine (3)
UK case management software (1)
computer forensics north england (2)
Covert investigations (1)
digital forensics north-west (1)
Cyber-Security (1)
Jobs (1)
Data Protection (1)
Software (2)
Digital Forensic Training (2)
Mobile Phone Forenics (1)
mobile phone forensics yorkshire (1)
reporting (1)
Forensics Europe (1)
DSS (1)
Warrington (1)
mobile phone analysis leeds (1)
chain of custody management (1)
covert forensics (1)
HR (1)
Cyber Attack (1)
training (4)
iOS forensics (1)
Case Management (12)
data recovery (1)
Digital Forensics (17)
digital forensic case (2)
Careers (1)
Innovation (1)
digital forensics london (1)
Lima Lite (1)
mobile phone analysis yorkshire (1)
Graduate Training Week (3)
mobile phone forensics jobs (1)
Finance (1)
Security (1)
Remote Forensics (2)
Recruitment (2)
Forensic Case Management (5)
Law Enforcement Forensics (1)
ISO (1)
Loss Prevention (1)
US case management software (1)
Computer forensics leeds (1)
Computer Emergencies (2)
digital forensic case management (3)
Graduate (1)
Event (3)
expert witness computers (1)
computer forensics yorkshire (1)
ISO 17025 (1)
digital forensics leeds (2)
Staff (1)
Conference & Exhbitions (3)
Update (1)
Crime Reduction (1)
Cyber Crime (3)
Windows (2)
Employment (1)
apple forensics (1)
Mobile Phone Forensics (11)
PCI (1)
Chip Off Forensics (1)
Lima solution (2)
forensic science (1)
Forensic Assurance (3)
Launch Event (1)
digital forensics warrington (1)
Malicious Attack (1)
Employee Dispute (1)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.