programming4us
           
 
 
Windows

Windows 7 : Configuring Internet Explorer Security - Enhancing Your Browsing Privacy (part 4) - InPrivate Browsing and Filtering

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
12/10/2010 9:14:53 AM

Total Privacy: InPrivate Browsing and Filtering

The privacy techniques you’ve seen so far suffer from a complete of glaring problems:

  • They work after the fact— For example, if you’ve visited a site with sensitive data, you delete your browsing history after you leave the site. This is a problem because you might forget to delete your history.

  • They’re all or nothing— When you delete format data, passwords, history, cookies, or the cache files, you delete all of them (unless you preserve the cookies and cache files for your favorites). This is a problem because you often want to remove the data for only a single site or a few sites.

Fortunately, Internet Explorer 8 implements a single new feature that solves both problems: InPrivate browsing. When you activate this feature, Internet Explorer stops storing private data when you visit websites. It no longer saves temporary Internet files, cookies, browsing history, form data, and passwords. Here’s how this solves the privacy problems I mentioned earlier:

  • It works before the fact— By turning on InPrivate browsing before you visit a site, you don’t have to worry about deleting data afterward because no data is saved.

  • It works only while it’s on— When you activate InPrivate browsing and surf some private sites, no data is stored, but all your other privacy data remains intact. When you then deactivate InPrivate browsing, Internet Explorer resumes saving privacy data.

To use InPrivate browsing, select Safety, InPrivate Browsing (or press Ctrl+Shift+P). Internet Explorer opens a new browser window as shown in Figure 5. Notice two things in this window that tell you InPrivate browsing is activated:

  • You see InPrivate in the title bar.

  • You see the InPrivate icon in the address bar.

Figure 5. When you activate InPrivate browsing, Internet Explorer 8 opens a new window and displays indicators in the title bar and address bar.


A similar idea is InPrivate filtering. When you visit a website, it’s possible that the site loads some of its content from a third-party provider. It could be an ad, a map, a YouTube video, or an image. That’s not a terrible thing once in a while, but if a particular third-party company provides data for many different sites, that company could conceivably build up a profile of your online activity.

What InPrivate filtering does is watch out for these third-party providers and track the data they provide. If the InPrivate feature detects that a third-party site is providing data quite often to the sites you visit, InPrivate will begin blocking that site’s content so that it can’t build up a profile of your activity.

InPrivate filtering is off by default. To turn it on, select Safety, InPrivate Filtering (or press Ctrl+Shift+F).

Other -----------------
- Windows 7 : Managing Windows Firewall (part 2)
- Windows 7 : Managing Windows Firewall (part 1)
- Windows 7 : Checking Your Computer’s Security Settings (part 2)
- Windows 7 : Checking Your Computer’s Security Settings (part 1)
- Securing Windows 7 : Thwarting Snoops and Crackers (part 2) - Locking Your Computer Manually, Automatically
- Securing Windows 7 : Thwarting Snoops and Crackers (part 1) - First, Some Basic Precautions
- Windows 7 : Working with the Command-Line Tools (part 3) - Working with System Management Tools
- Windows 7 : Working with the Command-Line Tools (part 2) - Working with File and Folder Management Tools
- Windows 7 : Working with the Command-Line Tools (part 1) - Working with Disk Management Tools
- SOA with .NET and Windows Azure : System.Transactions
- Windows 7 : Understanding Batch File Basics (part 2) - Using Batch File Parameters
- Windows 7 : Understanding Batch File Basics (part 1) - Creating Batch Files
- Discovering the Microsoft Azure Platform
- SOA with .NET and Windows Azure : Microsoft Messaging Queue (MSMQ)
- Windows 7 : Working at the Command Line (part 3)
- Windows 7 : Working at the Command Line (part 2)
- Windows 7 : Working at the Command Line (part 1)
- Windows 7 : Getting to the Command Line (part 2) - Running CMD
- Windows 7 : Getting to the Command Line (part 1)
- Windows Azure : Programming Access Control Service (part 10) - Deploying the Web Service in Windows Azure
 
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
- First look: Apple Watch

- 3 Tips for Maintaining Your Cell Phone Battery (part 1)

- 3 Tips for Maintaining Your Cell Phone Battery (part 2)
programming4us programming4us