Category List


Tag Cloud

Softwaredigital forensics londonCyber Crimecomputer investigationsNew FeaturesNetwork forensicsEventComputer forensics leedsISO 17025 accreditationdisciplinary evidenceforensic securityData Securityiphone forensicsmobile phone forensics leedscomputer forensics yorkshireStaffCovert investigationsForensic jobsdigital forensic case managementMobile Phone ForensicsUpdatemobile phone analysis leedsInnovationmobile phone forensics yorkshireContactdigital forensics north-westCases SolvedWindowsmobile phone forensics jobsSoftware Demonstrationforensic analysisMarketingGraduateHelping Policedigital forensics yorkshireComputer EmergenciesJob VacanciesPicture ImagesDigital Evidencecomputer forensic analysisHRdigital forensics warringtonCase Management softwareevidence managementMobile Phone ForenicsUS case management softwareHackingcomputer expertRemote ForensicsLima Litecomputer forensics laboratoryLimatrainingcovert forensicsdigital forensic casecomputer forensics north englandISORecruitmentforensic scienceiOS forensicsForensic ReadinessComputer forensic case managementForensic Case ManagementComputer forensics jobspolice case managementLima TrainingDigital Forensicsapple forensicsCloud Forensicsscientific supportcontinutiy managementchain of custody managementForensics Europechip-off forensicsLegalmobile phone analysis yorkshireForensic AssuranceHuman ResourcesCrime ReductionForensic careersCase Management systemreportingLoss PreventionMalicious AttackGraduate Recruitmentdigital forensics leedsdata recoveryLaw Enforcement ForensicsUK case management softwareexpert witness computersLaunch EventCyber-SecurityConference & ExhbitionsCase ManagementMobile PhoneChip Off ForensicsGraduate Training WeekComputer ForensicsProfessionalsDigital Forensic TrainingIntaForensicsCyber AttackData ProtectionWarringtonSC Magazinescientific case managementITCyber SecurityEmployee DisputeISO 17025Talentstafford jobsLima solutionSecurityFinance


Tag List

digital forensics london (1)
Lima Lite (1)
forensic analysis (4)
Update (1)
digital forensics yorkshire (2)
Professionals (1)
computer forensic analysis (1)
Forensic careers (1)
Talent (1)
evidence management (1)
digital forensics north-west (1)
Digital Forensic Training (2)
Human Resources (1)
Digital Forensics (16)
Lima (14)
Mobile Phone Forensics (11)
Employee Dispute (1)
Remote Forensics (2)
police case management (1)
Software (2)
apple forensics (1)
computer forensics north england (2)
Mobile Phone Forenics (1)
forensic science (1)
Lima Training (4)
mobile phone forensics yorkshire (1)
Launch Event (1)
SC Magazine (2)
Lima solution (2)
Data Protection (1)
Conference & Exhbitions (3)
computer forensics yorkshire (1)
Chip Off Forensics (1)
Forensic Case Management (4)
digital forensics leeds (2)
Cloud Forensics (1)
Computer forensics jobs (1)
expert witness computers (1)
digital forensics warrington (1)
Event (3)
data recovery (1)
Graduate (1)
Mobile Phone (1)
Job Vacancies (2)
Case Management software (10)
New Features (1)
Legal (1)
mobile phone analysis leeds (1)
Hacking (1)
Cyber Attack (1)
digital forensic case (2)
computer forensics laboratory (1)
mobile phone forensics leeds (1)
Computer forensics leeds (1)
Digital Evidence (2)
Forensics Europe (1)
UK case management software (1)
Loss Prevention (1)
digital forensic case management (3)
Data Security (1)
Crime Reduction (1)
IntaForensics (4)
chain of custody management (1)
Graduate Recruitment (1)
Cases Solved (2)
Cyber-Security (1)
Computer Forensics (20)
Marketing (1)
mobile phone analysis yorkshire (1)
Cyber Crime (3)
Security (1)
iphone forensics (1)
Case Management system (6)
Computer forensic case management (1)
US case management software (1)
iOS forensics (1)
training (4)
forensic security (1)
computer investigations (1)
ISO 17025 accreditation (1)
mobile phone forensics jobs (1)
Warrington (1)
Staff (1)
Software Demonstration (1)
scientific support (1)
Forensic Readiness (2)
Computer Emergencies (2)
Contact (1)
stafford jobs (1)
Forensic Assurance (3)
scientific case management (1)
Recruitment (1)
Cyber Security (1)
reporting (1)
continutiy management (1)
Malicious Attack (1)
ISO (1)
Helping Police (1)
Finance (1)
HR (1)
Graduate Training Week (3)
Innovation (1)
Case Management (12)
Windows (2)
Covert investigations (1)
chip-off forensics (1)
Network forensics (1)
computer expert (2)
Forensic jobs (1)
Law Enforcement Forensics (1)
disciplinary evidence (1)
covert forensics (1)
IT (1)
ISO 17025 (1)
Picture Images (2)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.