{"id":2506,"date":"2014-08-04T08:58:29","date_gmt":"2014-08-04T13:58:29","guid":{"rendered":"http:\/\/www.poweradmin.com\/blog\/?p=2506"},"modified":"2015-04-24T16:02:03","modified_gmt":"2015-04-24T21:02:03","slug":"how-to-remove-your-digital-footprint-from-the-net","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/how-to-remove-your-digital-footprint-from-the-net\/","title":{"rendered":"How to Remove Your Digital Footprint"},"content":{"rendered":"<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">The internet has been around for some time now and it\u2019s likely that there\u2019s plenty of information on there that many people would rather be deleted. Plenty of devices connect to the internet these days and with the proliferation of smart devices, everything is generating data about you and your habits.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">For some people this may seem intimidating, perhaps even scary, but there are ways to minimize your exposure online. There are others however, who need the internet and its exposure for their business or their work to succeed. Regardless of what category you fall into, it\u2019s worthwhile understanding how the internet works and utilizing good practices while online.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">These days however privacy is a premium commodity so let\u2019s consider some ways that you can keep control of what\u2019s known and shared about you.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Private browsing<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/incognito.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2536\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/incognito-300x273.png\" alt=\"Incognito\" width=\"200\" height=\"182\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/incognito-300x273.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/incognito.png 500w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\"><\/a>A simple place to start is on your internet browser. Most users just use it as it comes, but surfing the web safely requires some good practices. The first step is to browse the internet privately.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">This does help but users would do well to remember that it\u2019s only one element when it comes to being private and secure online. Private browsing basically ensures that your internet browser isn\u2019t keeping track of the pages you view.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">That\u2019s not to say that your ISP doesn\u2019t still log the pages that you visit, but private browsing does limit the amount of information stored locally on your computer. Private browsing comes under some different names depending on the browser in use:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Internet Explorer \u2013 InPrivate Browsing<\/b><\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Chrome \u2013 Incognito Mode<\/b><\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Firefox \u2013 Private Window<\/b><\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">On each of the browsers mentioned above it\u2019s an easy enough task to find the private browsing option. Simply navigate to the main menu to enable this feature.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Private browsing is very limited as a security fix<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/firefox-private-window.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2535 size-medium\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/firefox-private-window-300x198.jpg\" alt=\"Firefox Private Browsing\" width=\"300\" height=\"198\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/firefox-private-window-300x198.jpg 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/firefox-private-window.jpg 709w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><\/a>Private browsing keeps your personal computer clean but you\u2019re still broadcasting your information to the wider web. That means that private browsing has no effect on the server side. In other words, websites will still log your IP address and any unencrypted data is vulnerable to interception.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">There are options to make your internet experience a bit more private. For more covert browsing there\u2019s the option to use <a title=\"Sandboxie\" href=\"http:\/\/www.sandboxie.com\/\" target=\"_blank\" rel=\"nofollow\">Sandboxie<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. This is an application that functions to prevent any illicit or unwanted programs from accessing your computer and it stops those programs from saving anything to your disk. This is effective in numerous ways but perhaps the best element of Sandboxie is its ability to prevent malware from sneaking past your firewall and security software.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Using Tor<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/tor-logo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-2539\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/tor-logo-300x181.png\" alt=\"Tor\" width=\"209\" height=\"126\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/tor-logo-300x181.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/tor-logo.png 500w\" sizes=\"auto, (max-width: 209px) 100vw, 209px\"><\/a>Many of you have likely heard of this networking option. <a title=\"Tor\" href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"nofollow\">Tor<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> lets users browse the internet not only privately but also anonymously meaning that any outgoing or incoming traffic is bounced via other users of the Tor platform. This makes it virtually impossible for anyone to track or monitor your internet activity.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Sites that you visit while utilizing Tor won\u2019t be able to log or read your IP address (your IP address can be used to reveal your geographical location) and Tor will also prevent anyone from listening in on your outgoing traffic.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Tor may seem slightly paranoid (and perhaps it is) but with all of the recent press surrounding governmental spying allegations it seems to be increasingly necessary.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It is worth noting however that although Tor is a great option for the security conscious it\u2019s also something that\u2019ll slow down your browser and internet speeds considerably. This is down to the server bouncing so unless you really need to be anonymous then this may be an option that\u2019s more hassle than it\u2019s worth.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">There\u2019s an option to turn Tor on or off so this may be a good way to pick and choose when to use the network tool.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Password protect everything that you can<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/windows-7-bitlocker-crack-claims-addressed-by-microsoft-2.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2532\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/windows-7-bitlocker-crack-claims-addressed-by-microsoft-2.jpg\" alt=\"Microsoft BitLocker\" width=\"205\" height=\"187\"><\/a>Whatever the account type, there must be a good and unique password to ensure that it\u2019s not susceptible to attack. This includes passwords for personal computers. However, passwords alone (no matter how well devised) aren\u2019t a guarantee that your data will remain secure.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">To make your files completely secure you\u2019ll need to encrypt it and the easiest way to approach this is by using a third party option like Bitlocker. This is a service that comes built in and pre-installed on the Ultimate and Enterprise editions of Windows 7 and Vista. Bitlocker is also available on Windows 8 on the Professional and Enterprise versions, but on both platforms Bitlocker isn\u2019t natively turned on.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It\u2019s easy to do however. Here are the steps:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Control Panel<\/b><\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>System and Security<\/b><\/span><\/li>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><b>Bitlocker Drive Encryption<\/b><\/span><\/li>\n<\/ul>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Following the above steps will ensure that your computer is inaccessible without your unique user account password.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">For those users on another OS (Mac) or for those that don\u2019t want to use Bitlocker there are other options available. There\u2019s the service called <a title=\"GnuPG\" href=\"https:\/\/www.gnupg.org\/\" target=\"_blank\" rel=\"nofollow\">GnuPG<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>. This is an open-source platform, meaning that it can be modified and adapted if needed.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Once deleted, not always gone<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/empty-trash-can.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-2534\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/empty-trash-can.png\" alt=\"Empty Trash Can\" width=\"128\" height=\"128\"><\/a>Deleted files aren\u2019t completely gone, as Windows doesn\u2019t remove files or data from your hard drive. Instead it deletes and removes the file system itself that directs you to the file. There are plenty of programs that can recover data that\u2019s been trashed so it can be a good idea to use a program to ensure that your data is truly deleted.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">For Windows users there\u2019s a tool called <a title=\"Eraser\" href=\"http:\/\/sourceforge.net\/projects\/eraser\/\" target=\"_blank\" rel=\"nofollow\">Eraser<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> that works as a secure removal tool and it completely deletes sensitive data from your hard drive. It does this by overwriting it several times to ensure that it can\u2019t be readable.<\/span><\/p>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>It might be time to change your OS<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/linux-icon.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright  wp-image-2537\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/linux-icon-300x300.png\" alt=\"Linux\" width=\"170\" height=\"170\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/linux-icon-300x300.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/linux-icon-150x150.png 150w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/linux-icon.png 512w\" sizes=\"auto, (max-width: 170px) 100vw, 170px\"><\/a>Windows isn\u2019t best known for its ease of use and there are plenty of times where it becomes hard to keep track of exactly what\u2019s going on with the OS. If you\u2019re looking for a completely anonymous browsing experience then it\u2019s probably advisable to use a different OS.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Mac is a good alternative but it\u2019s expensive. In some ways it\u2019s a more closed system but its Unix base is an intelligent place to start. It\u2019s probably better considering Linux for a truly private and customized digital experience. Linux is experiencing great strides forward in developing and emerging economies.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It\u2019s a free and open source platform that has been added to and experimented on for years by a wide variety of people and coders. Here is one such option to consider:<\/span><\/p>\n<ul>\n<li><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a title=\"Bodhi Linux\" href=\"http:\/\/www.linux.com\/learn\/tutorials\/556594:bodhi-linux-the-beautiful-configurable-lightweight-linux\" target=\"_blank\" rel=\"nofollow\">Bodhi Linux<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/span><\/li>\n<\/ul>\n<h2><span style=\"font-family: verdana,geneva; font-size: 12pt; color: #ff6600;\"><b>Virtual Private Networks<\/b><\/span><\/h2>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\"><a href=\"\/blog\/wp-content\/uploads\/2014\/07\/emoticons-private-icon.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-2533\" src=\"\/blog\/wp-content\/uploads\/2014\/07\/emoticons-private-icon.png\" alt=\"Private Browsing\" width=\"131\" height=\"131\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/emoticons-private-icon.png 256w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2014\/07\/emoticons-private-icon-150x150.png 150w\" sizes=\"auto, (max-width: 131px) 100vw, 131px\"><\/a>Really if you\u2019re concerned about your privacy and anonymity online it\u2019s worth considering virtual private networks. Like we mentioned earlier with Tor, a VPN will allow you to browse, download, and generally utilize the internet from a completely anonymous place. <\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Although much of the above may seem paranoid, it is in many cases justified. We have the right to be private but the way that we natively use the internet provides advertising companies and governments with unlimited streams of data about our every move.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Advertisers will <a href=\"http:\/\/www.extremetech.com\/computing\/143030-nowhere-to-hide-advertisers-can-now-stalk-you-across-multiple-devices\" target=\"_blank\" rel=\"nofollow\">actively seek out<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> new ways to monitor and listen in to customer conversations and browsing habits. There are also plenty of reports of governments performing <a href=\"http:\/\/12mars.rsf.org\/2014-en\/enemies-of-the-internet-2014-entities-at-the-heart-of-censorship-and-surveillance\/\" target=\"_blank\" rel=\"nofollow\">mass surveillance<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> so to ensure that you remain anonymous many of the above steps become completely necessary.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">It\u2019s not about whether or not you have something to hide; it\u2019s about safeguarding yourself and your life. It\u2019s about making sure that what\u2019s private to you remains that way. What we\u2019ve focused on today is mostly about prevention and steps to ensure that you\u2019re anonymous online from this point onwards.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Although there is a vast amount of past information stored online relating to people\u2019s pasts, there are emerging options. The recent EU ruling relating to \u201c<a href=\"http:\/\/online.wsj.com\/articles\/eu-regulators-invite-google-microsoft-to-discuss-right-to-be-forgotten-1405592730?mod=europe_home\" target=\"_blank\" rel=\"nofollow\">The Right to be Forgotten<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\u201d means that Europeans can request that Google removes specific content that\u2019s relevant to them. This is clearly a start but the future is one where more and more devices (and people) will become connected to the internet.<\/span><\/p>\n<p><span style=\"font-family: verdana,geneva; font-size: 12pt;\">Use some of the above information and stay in control of what you\u2019re broadcasting about yourself \u2013 you never know who\u2019s listening in. A just remember that <a href=\"https:\/\/www.goodreads.com\/quotes\/98153-just-because-you-re-paranoid-doesn-t-mean-they-aren-t-after-you\" target=\"_blank\" rel=\"nofollow\">Joseph Heller<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> line from Catch 22, \u201cJust because you\u2019re paranoid doesn\u2019t mean they aren\u2019t after you.\u201d<\/span><\/p>\n<p><a title=\"\" href=\"http:\/\/www.twitter.com\/home?status=RT:%20@poweradmn%20How%20To%20Remove%20Your%20Digital%20Footprint%20\/blog\/how-to-remove-your-digital-footprint-from-the-net\/?ref=blog\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1028\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png\" alt=\"Tweet this\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/tweet-this-article-button-large.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n<p><a title=\"\" href=\"https:\/\/plus.google.com\/share?url={\/blog\/how-to-remove-your-digital-footprint-from-the-net\/?ref=blog}\" target=\"_blank\" rel=\"nofollow\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1053\" title=\"\" src=\"\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png\" alt=\"Share on Google+\" width=\"300\" height=\"75\" srcset=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2-300x75.png 300w, https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2013\/11\/google-plus-this-article-button-large2.png 310w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\"><img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The internet has been around for some time now and it\u2019s likely that there\u2019s plenty of information on there that many people would rather be deleted. Plenty of devices connect to the internet these days and with the proliferation of smart devices, everything is generating data about you and your habits. For some people this [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":2536,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5,13,9],"tags":[],"class_list":["post-2506","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general-it","category-how-to","category-pc-security","category-technical"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2506","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=2506"}],"version-history":[{"count":5,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions"}],"predecessor-version":[{"id":3476,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/2506\/revisions\/3476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media\/2536"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=2506"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=2506"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=2506"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}