Category List


Tag Cloud

HRRecruitmentdigital forensics north-westPCIForensic careerscomputer investigationsmobile phone analysis yorkshiredigital forensics warringtonWindowschain of custody managementCases Solvedcomputer expertCyber SecurityTalentComputer forensic case managementIntaForensicsSoftware Demonstrationmobile phone forensics jobschip-off forensicscomputer forensics yorkshireGraduatecomputer forensics laboratoryLoss PreventionLima LiteComputer Emergenciesdigital forensics londonSoftwareevidence managementUpdateLima solutionforensic securityFinanceiOS forensicsEmployee DisputeMobile PhoneGraduate Recruitmentiphone forensicsCyber CrimeMarketingUK case management softwareMobile Phone ForenicsForensic ReadinessLaunch EventComputer ForensicsUS case management softwareISOapple forensicsHuman ResourcesSecurityHackingForensic AssuranceEmploymentInnovationISO 17025 accreditationRemote ForensicsLegalComputer forensics leedsdigital forensic case managementPicture Imagesdata recoveryNew Featurescomputer forensics north englandcomputer forensic analysisProfessionalsGraduate Training WeekLaw Enforcement ForensicsCovert investigationsCase Management softwareCase ManagementWarringtonscientific supportdigital forensic caseISO 9001Network forensicsMobile Phone ForensicsDigital ForensicsCareers scientific case managementQuality StandardsData SecurityLab ApprovedForensic jobsITJob VacanciesDSSLimaexpert witness computersHelping PolicereportingISO 27001Case Management systemforensic sciencetrainingmobile phone forensics leedsForensics Europedisciplinary evidenceCrime ReductionCloud Forensicsdigital forensics yorkshireData ProtectionDigital Forensic TrainingStaffdigital forensics leedsmobile phone analysis leedsDigital Evidencepolice case managementISO 17025Cyber-SecurityContactSC Magazinecovert forensicsCyber AttackJobsLima Trainingforensic analysisConference & Exhbitionsstafford jobsForensic Case ManagementComputer forensics jobsChip Off ForensicsEventcontinutiy managementmobile phone forensics yorkshireMalicious Attack


Tag List

Computer forensic case management (1)
data recovery (1)
Contact (1)
Forensic Case Management (5)
training (4)
Forensic careers (1)
Digital Forensics (19)
Update (1)
Computer Emergencies (2)
digital forensic case (2)
computer investigations (1)
Careers (1)
Lab Approved (1)
Cyber Security (1)
digital forensic case management (3)
Job Vacancies (2)
ISO 9001 (2)
Security (1)
Law Enforcement Forensics (1)
Case Management system (6)
Cases Solved (2)
DSS (1)
Employee Dispute (1)
US case management software (1)
Data Security (1)
police case management (1)
Cloud Forensics (1)
mobile phone analysis leeds (1)
forensic analysis (4)
New Features (1)
ISO 27001 (2)
Network forensics (1)
Picture Images (2)
Case Management software (10)
Forensics Europe (1)
Lima solution (2)
Cyber-Security (1)
Launch Event (1)
mobile phone forensics leeds (1)
Windows (2)
iOS forensics (1)
Crime Reduction (1)
Lima (15)
Helping Police (1)
expert witness computers (1)
evidence management (1)
Mobile Phone (1)
Quality Standards (1)
Computer forensics leeds (1)
Cyber Crime (3)
UK case management software (1)
digital forensics leeds (2)
Cyber Attack (1)
computer forensic analysis (1)
Loss Prevention (1)
Lima Training (4)
ISO 17025 accreditation (2)
mobile phone forensics yorkshire (1)
scientific case management (1)
PCI (1)
ISO 17025 (3)
computer expert (2)
mobile phone forensics jobs (1)
Case Management (12)
Human Resources (1)
Remote Forensics (2)
forensic security (1)
reporting (1)
disciplinary evidence (1)
Marketing (1)
digital forensics london (1)
Employment (1)
SC Magazine (3)
ISO (1)
digital forensics yorkshire (2)
continutiy management (1)
Jobs (1)
Forensic jobs (1)
Event (3)
Innovation (1)
Digital Evidence (2)
chip-off forensics (1)
computer forensics laboratory (1)
Malicious Attack (1)
chain of custody management (1)
IntaForensics (6)
Digital Forensic Training (2)
forensic science (1)
HR (1)
Software (2)
Computer Forensics (20)
Forensic Assurance (3)
Lima Lite (1)
Chip Off Forensics (1)
Staff (1)
digital forensics warrington (1)
digital forensics north-west (1)
mobile phone analysis yorkshire (1)
Professionals (1)
computer forensics yorkshire (1)
Talent (1)
Mobile Phone Forensics (11)
stafford jobs (1)
Forensic Readiness (2)
Graduate Training Week (3)
Legal (1)
iphone forensics (1)
Software Demonstration (1)
covert forensics (1)
Recruitment (2)
computer forensics north england (2)
scientific support (1)
Mobile Phone Forenics (1)
Graduate (1)
Computer forensics jobs (1)
Conference & Exhbitions (3)
Covert investigations (1)
IT (1)
Data Protection (1)
Hacking (1)
Finance (1)
Warrington (1)
Graduate Recruitment (1)
apple forensics (1)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.