The Truth About Hiding Your Songs On The Internet

The Truth About Hiding Your Songs On The Internet

Hiding Your Privacy – We have to give credit to those companies – they give you half of the truth. If they give you the whole story, what they will say is that their software will make your surfing track disappear from your personal computer. Not from the internet.

Now, by saying that, don’t just blow these products by saying “if they can’t get rid of all my personal surfing notes then what’s the use of them?” These products really address half of the more important problems. An effective way to really clean your personal computer! For me, this is very important because it is easier for people to get your computer’s Internet records, through hacking, tracking or direct theft, than for them to get other types of Internet records.Hiding Your Privacy

Hiding Your Privacy – Personal Computer

Want proof? Just ask Gary Glitter, a 1960s pop star who brought his personal computer to make repairs. The store found images and other evidence of illegal Internet activity and called the police! Glitter spent time in prison because he didn’t “clean up his actions” before he took the computer to repair it.

The other half of this problem and the slightly more complicated one to deal with consist of all the records that are made and held by your ISP (Internet Service Provider), Internet routers (“traffic police” computers that route Internet requests around the web) and site hosting servers the web.

These computers are completely outside the reach of your influence. You can’t just call your ISP and tell them to delete all records relating to your account! Once they have finished laughing, they will tell you what to do so that they have to sort out millions of records for a particular day to take out two or three hundred of your notes. This effort will be very large and they do not have the resources to do this kind of work.

In addition, these logs are mostly used to solve server/router errors and to help stop hackers’ abuse and other types of DOS (Denial of Service) attacks.

But you can influence the information stored in this log. To understand this, you need to know how the process works.

The Following Are The Basic Steps:

1) You log in to your ISP.

2) Your ISP gives you an Internet Protocol (IP) address. An IP address is a series of numbers that tells the computer where you are connected and to whom you will send information.

3) You type the web address in your browser and send the request to your ISP.

4) Your ISP records the request, along with the IP address that you specified and then goes to the Internet to request a web page.

5) Requests the ISP to pass through several routers, each recording who made the request and forwarding the request to the next one until it arrived at the server hosting the web page.

6) The host server records the request and sends information back, often through a completely different set of routers, each of which records the request again and passes it to the next until it returns to your ISP.

7) Your ISP searches in the log that makes the initial request and sends it to you.

8) You get a page, a temporary copy is stored on your hard drive.

9) You click the link or enter a new web address and the process starts again!

Hiding Your Privacy From Internet

So for each request, you make it to your ISP, not only is the request stored on your computer, it will be stored on a number of other computers too! Comfortable right?

Well, there are ways to hide, or the mask will be a better term, your web surfing activities. You need to use an anonymous surfing device. Then, Sites like Anonymizer.com or the-cloak.com offer online proxy type services that use SSL and encryption to maintain your own search tracks.

All requests submitted to them via SSL are encrypted so that even your ISP cannot read what you requested. In other words, This secure connection is the same type that e-commerce sites use to protect your credit card data. So all the requests they make for you to refer their computers as triggers for requests to all routers and web host servers see are their IP addresses! Your personal and/or browser information is blocked from the Internet.

So, if you really want to protect your privacy, give one-two punch snoopers. Then, Clean up your actions by using one history/cookie cleaning tool available for download AND surfing through one of the anonymous surfing providers on the internet.

Related Post: A Slow Computer In Relation To The Internet

0 thoughts on “The Truth About Hiding Your Songs On The Internet”

Leave a Reply

Your email address will not be published. Required fields are marked *