Category List

Tag Cloud

Human ResourcesData Securityforensic securityQuality StandardsTalentForensic careersChip Off ForensicsHRCloud ForensicsComputer EmergenciestrainingRansomwareDigital ForensicsEventdisciplinary evidencecomputer forensic analysisiphone forensicsLegalLima TrainingContactHackingCyber InvestigationGraduate RecruitmentComputer forensics jobsRecruitmentForensic jobsITISO 17025Covert investigationsmobile phone forensics leedsCyber-SecurityProfessionalsConference & Exhbitionsevidence managementCase Management systemLimaIntaForensicsscientific case managementMobile Phone ForenicsInnovationPFIPicture ImagesStaffLima solutionCyber Attackcovert forensicsISOLab ApprovedQSAFinanceCase ManagementComputer forensics leedsforensic analysisVersion 2.0apple forensicsNetwork forensicsIoTGraduate Training Weekdigital forensic case managementchain of custody managementData ProtectiontrojansSMEsISO 17025 accreditationIT SecurityForensic Readinessdigital forensics north-westMobile Phonecomputer investigationsWarringtonUS case management softwarePokemon GoRemote ForensicsEmploymentWindowsGraduateISO 9001Softwarecomputer forensics laboratoryForensic Assurancecomputer expertcomputer forensics north englandForensic Case ManagementSoftware DemonstrationCyber Essentials PlusmalwareLima Forensic Case ManagementHelping PoliceCyber Securitymobile phone forensics yorkshireLoss Preventioncomputer forensics yorkshireMobile Phone ForensicsUK case management softwareDigital Forensic TrainingEmployee DisputeHacking InvestigationsCase Management softwaredigital forensics warringtonmobile phone forensics jobsInternet of Thingsdigital forensics yorkshireCrime ReductioniOS forensicsPCIUpdateComputer forensic case managementCyber CrimeDSSpolice case managementexpert witness computersInformation Securitymobile phone analysis yorkshiredigital forensics londonForensics Europemobile phone analysis leedsforensic scienceNew FeaturesPCI Forensic InvestigationJobsSecurityMarketingdigital forensics leedsQualified Security AssessorISO 27001digital forensic casedata recoverycontinutiy managementDigital Evidencescientific supportMalicious Attackchip-off forensicsSC Magazinestafford jobsJob VacanciesComputer ForensicsLaunch EventData BreachLaw Enforcement ForensicsLima LiteCareers Cases SolvedreportingCyber Essentials

Tag List

PCI Forensic Investigation (3)
IT (1)
mobile phone forensics jobs (1)
Lima Forensic Case Management (1)
Computer forensic case management (1)
Marketing (1)
mobile phone forensics yorkshire (1)
scientific case management (1)
computer forensics laboratory (1)
Hacking Investigations (1)
Security (1)
Law Enforcement Forensics (1)
Mobile Phone (2)
Lima Training (4)
Recruitment (2)
Malicious Attack (1)
Graduate (1)
Chip Off Forensics (1)
Remote Forensics (2)
Graduate Training Week (3)
forensic science (1)
Forensic jobs (1)
Cyber Essentials (4)
Crime Reduction (1)
ISO 9001 (2)
Windows (2)
Cyber Attack (2)
Update (1)
Cyber-Security (2)
Cyber Investigation (1)
digital forensics london (1)
mobile phone analysis yorkshire (1)
Staff (1)
reporting (1)
Lab Approved (1)
Legal (1)
Forensic Case Management (8)
Data Security (2)
computer forensic analysis (1)
Launch Event (1)
training (4)
digital forensic case (2)
police case management (1)
Computer forensics leeds (1)
PFI (1)
data recovery (1)
Digital Forensics (21)
apple forensics (1)
Helping Police (1)
ISO 27001 (3)
chain of custody management (1)
digital forensics north-west (1)
New Features (1)
digital forensics leeds (2)
iphone forensics (1)
Graduate Recruitment (1)
expert witness computers (1)
SMEs (1)
Qualified Security Assessor (1)
digital forensics warrington (1)
Loss Prevention (1)
PCI (4)
Careers (1)
Case Management system (6)
Employment (1)
IoT (1)
IntaForensics (6)
Lima solution (2)
ISO 17025 accreditation (2)
Cyber Security (6)
Jobs (1)
SC Magazine (3)
Software Demonstration (1)
digital forensics yorkshire (2)
Human Resources (1)
Computer forensics jobs (1)
forensic analysis (4)
computer investigations (1)
computer expert (2)
chip-off forensics (1)
Forensic Readiness (2)
Case Management (14)
trojans (1)
Lima Lite (1)
Network forensics (1)
Lima (18)
covert forensics (1)
Case Management software (11)
forensic security (1)
Quality Standards (1)
Ransomware (1)
Covert investigations (1)
digital forensic case management (3)
Talent (1)
malware (1)
Innovation (1)
Software (2)
HR (1)
Professionals (1)
continutiy management (1)
Digital Forensic Training (2)
QSA (2)
Digital Evidence (2)
mobile phone analysis leeds (1)
Picture Images (2)
stafford jobs (1)
Cases Solved (2)
disciplinary evidence (1)
DSS (1)
Data Protection (1)
Hacking (1)
Information Security (1)
ISO 17025 (3)
Mobile Phone Forensics (12)
iOS forensics (1)
evidence management (1)
computer forensics yorkshire (1)
Computer Emergencies (2)
Version 2.0 (2)
scientific support (1)
Job Vacancies (2)
Computer Forensics (20)
Contact (1)
Forensic careers (1)
computer forensics north england (2)
UK case management software (1)
Finance (1)
Conference & Exhbitions (3)
Warrington (1)
Data Breach (2)
Forensics Europe (1)
Employee Dispute (1)
Event (3)
Cyber Crime (4)
mobile phone forensics leeds (1)
IT Security (1)
Forensic Assurance (3)
ISO (1)
Cloud Forensics (1)
Mobile Phone Forenics (1)
Pokemon Go (1)
Internet of Things (1)
US case management software (1)
Cyber Essentials Plus (2)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.