Category List


Tag Cloud

Hacking InvestigationsCyber-SecurityData BreachComputer forensic case managementInformation SecurityHelping PoliceChip Off ForensicsFinanceCovert investigationsEventLaw Enforcement Forensicsscientific case managementLimadata recoverySC MagazineDigital ForensicsComputer forensics leedsforensic securityMobile Phone ForensicsUS case management softwarescientific supportISO 17025 accreditationcontinutiy managementcomputer forensic analysisLima Forensic Case Managementcomputer forensics yorkshireISO 27001Malicious AttackNew Featureschain of custody managementmobile phone forensics jobsmobile phone analysis leedsIntaForensicsRecruitmentSecurityISOMobile PhoneForensic jobsCloud ForensicsForensic Assuranceforensic sciencePCIVersion 2.0Cyber EssentialsNetwork forensicsComputer ForensicsLoss Preventionexpert witness computersMobile Phone ForenicsDigital Forensic TrainingLima solutionIT SecurityLegalcomputer forensics north englandcomputer investigationscovert forensicsPicture ImagesProfessionalsWarringtontrainingmobile phone forensics leedsUpdateComputer forensics jobsCyber Essentials PlusSoftwareGraduate Training WeekForensics EuropeHuman ResourcesISO 9001Cyber CrimeForensic ReadinessStaffdigital forensics londonHackingiOS forensicsdisciplinary evidenceQSAGraduateCyber SecurityITforensic analysisForensic Case ManagementCase Management systemdigital forensics north-westLima TrainingForensic careersPFIWindowsHRmobile phone forensics yorkshireUK case management softwarechip-off forensicsTalentreportingdigital forensic case managementdigital forensics yorkshireevidence managementDigital EvidenceMarketingData ProtectionEmployee Disputemobile phone analysis yorkshireCrime ReductionCase ManagementInnovationRemote Forensicsdigital forensic casestafford jobsapple forensicsConference & ExhbitionsCyber InvestigationJob VacanciesLab ApprovedCase Management softwareCareers ContactCyber Attackiphone forensicsCases SolvedLaunch EventPCI Forensic InvestigationEmploymentData Securitycomputer expertQualified Security Assessordigital forensics warringtonpolice case managementComputer EmergenciesSoftware DemonstrationDSSISO 17025Graduate RecruitmentLima Litedigital forensics leedscomputer forensics laboratoryQuality StandardsJobs


Tag List

Case Management system (6)
Software (2)
Cyber Attack (1)
Lima Training (4)
Digital Forensic Training (2)
forensic science (1)
digital forensic case management (3)
Forensic careers (1)
Cyber Security (3)
mobile phone analysis leeds (1)
Digital Evidence (2)
Employment (1)
Law Enforcement Forensics (1)
ISO (1)
Digital Forensics (21)
ISO 9001 (2)
Computer forensics jobs (1)
HR (1)
digital forensic case (2)
Finance (1)
evidence management (1)
Software Demonstration (1)
Cyber-Security (1)
computer forensics north england (2)
covert forensics (1)
stafford jobs (1)
Lima solution (2)
Computer Forensics (20)
mobile phone analysis yorkshire (1)
IT Security (1)
Talent (1)
Lab Approved (1)
Careers (1)
computer expert (2)
Forensic jobs (1)
Remote Forensics (2)
Forensic Case Management (8)
Network forensics (1)
Cyber Investigation (1)
Cloud Forensics (1)
chain of custody management (1)
disciplinary evidence (1)
DSS (1)
digital forensics yorkshire (2)
reporting (1)
Warrington (1)
digital forensics leeds (2)
Lima Forensic Case Management (1)
Graduate Training Week (3)
Case Management (14)
Covert investigations (1)
Innovation (1)
Qualified Security Assessor (1)
iphone forensics (1)
Professionals (1)
computer forensic analysis (1)
mobile phone forensics jobs (1)
Forensic Assurance (3)
Event (3)
scientific support (1)
Marketing (1)
New Features (1)
mobile phone forensics yorkshire (1)
computer forensics yorkshire (1)
Picture Images (2)
expert witness computers (1)
Mobile Phone Forensics (11)
Job Vacancies (2)
Forensic Readiness (2)
chip-off forensics (1)
Staff (1)
digital forensics london (1)
apple forensics (1)
SC Magazine (3)
IntaForensics (6)
Forensics Europe (1)
Case Management software (11)
QSA (2)
Computer forensics leeds (1)
Hacking Investigations (1)
Jobs (1)
Loss Prevention (1)
Human Resources (1)
police case management (1)
computer investigations (1)
ISO 17025 (3)
Data Security (2)
Chip Off Forensics (1)
forensic security (1)
Lima (18)
Mobile Phone (1)
scientific case management (1)
Graduate Recruitment (1)
PFI (1)
Update (1)
mobile phone forensics leeds (1)
ISO 27001 (3)
digital forensics north-west (1)
digital forensics warrington (1)
Windows (2)
US case management software (1)
Mobile Phone Forenics (1)
Cases Solved (2)
Data Protection (1)
Conference & Exhbitions (3)
Lima Lite (1)
Computer Emergencies (2)
continutiy management (1)
Launch Event (1)
Cyber Essentials (1)
Crime Reduction (1)
Security (1)
Malicious Attack (1)
Employee Dispute (1)
Helping Police (1)
iOS forensics (1)
Quality Standards (1)
ISO 17025 accreditation (2)
PCI (4)
Legal (1)
Cyber Crime (3)
Computer forensic case management (1)
training (4)
PCI Forensic Investigation (3)
Hacking (1)
data recovery (1)
Cyber Essentials Plus (1)
UK case management software (1)
forensic analysis (4)
Recruitment (2)
Information Security (1)
Contact (1)
IT (1)
computer forensics laboratory (1)
Version 2.0 (2)
Data Breach (2)
Graduate (1)

How Private Is 'In Private' Browsing?

Sep 24, 2010

Whenever a computer user accesses the internet, records of their activity are automatically stored on their PC. This information might include the keywords they have searched for, pages they have visited and even the data they have entered into online forms. For users wishing to keep certain activities away from prying eyes, the most popular internet browsers have now introduced 'In Private' browsing which offers users a way to stop the most obvious traces of activity from being stored. 

Microsoft Internet Explorer 8 introduced this in the form of 'Inprivate' browsing, while Google Chrome offers an 'Incognito' mode and the soon to be released Mozilla Firefox 3.1 offers 'Private Browsing'. In Internet Explorer 8, the feature works by either preventing information from being created or by automatically deleting it once the user has finished browsing. For example, 'history' entries, which keep a record of the pages visited, are not created and form data and passwords are not stored. 

However, cookies, which provide websites with certain site-specific information about the user such as shopping cart contents, are stored as 'session cookies' meaning that they are cleared when the browser is closed. In Google Chrome, 'Incognito' mode offers similar features, as web pages visited and files downloaded are not recorded, and all cookies are deleted when the Incognito window is closed. 

While such features may afford a degree of privacy from other users, both Microsoft and Google have stressed that the modes are not designed to hide user activity from computer forensic experts or security specialists. In fact, after a round of testing, Dutch computer forensic expert Christian Prickaerts deemed the privacy afforded by Internet Explorer 8's 'Inprivate' browsing feature to be purely 'cosmetic', and warned that it should not be confused with anonymous web surfing.

In fact, the security offered by 'Inprivate' mode is mainly aimed at local level internet information, so that data regarding a user's internet activity may still be stored by the visited websites, the Internet Service Provider or the network administrator in the case of internet cafes or corporate workspaces. 

In addition, while entries are not made into the browser's 'History' file, details of web pages visited are still left intact in other areas of the computer's registry and 'cache data', which includes images and other information that IE stores to speed up browser times, is also left untouched. Such data is usually easily accessible with computer forensic software, even if it has been deleted manually. 

For home users then, the 'In Private' feature offers a useful way to keep information private from other users who are unlikely to deliberately pry, but for internet cafe users the feature should not be considered to offer significant additional security. As such, it should not be considered a replacement for other forms of internet security and the same level of caution should be exercised with regard to the type of data accessed from public locations. 

For businesses running corporate networks, it is important to ensure that systems administrators are aware of the feature, since 'In Private' browsing may remove the more obvious traces of wrongdoing. But for the time being at least, the feature offers no significant barrier to a successful investigation if computer misuse is suspected.