English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

When you look up web sights on the internet and send emails etc. from a computer what all is saved that can be traced.....is it just the web sights itself or every email and every word you typed down to the msn messanger converations etc? If you clear the history and cookies and delete the files does that get it all or can people still get into the hard drive and trace your every move? We arent supposed to play on the computers at work but everyone does it so I wondered that if they ever checked if they would know that i check my email and myspace and whats it says in the emails i send from my private email addresses and the msn messanger etc.

2006-07-30 14:47:50 · 7 answers · asked by wendy 2 in Computers & Internet Other - Computers

7 answers

Microsoft saves a copy of EVERYTHNG in a hidden file in the SYSTEM folders, AND in IE, and in OE, that it sends to Microsoft.com everytime you go onto the Internet!

That is why I only use Firefox browser, Thunderbird mail reader...

And, I only run Linux.

They are all free of all the 150,000 Microsoft virus definitions, trojans, bots, pops, and malwares. Plus, they can't 'call the mothership', and, I don't need to spend an hour each week de-fraging my drive, and downloading worriesome 'upgrades', and running all the crapcleaner and spy-bot killer programs!

Try the FREE stuff, contains 5,000 FREE games, programs, applications!

2006-07-30 14:55:25 · answer #1 · answered by Anonymous · 5 0

a lot is saved on you computer. like you said there is a history file - holds a list of pages visited. a cookies file - small parts of a page used to display the page faster. they totally shouldn't be able to read your e-mail from myspace - that is an invasion of privacy, but if you are using the co. e-mail they can read that it is within most all co. disclaimers - use of co. e-mail is not private.

even if you are to clear the cookies, history and other files - there are some very well hidden files that most people don't know about that keep traces of what goes on on your computer.

another very important fact is that the co. routers will keep a list of all pages visited, and a lot of other network traffic. so even if you clear your computer, there are lots of other ways to figure out where people are going.

2006-07-30 14:54:47 · answer #2 · answered by . 3 · 0 0

Everything you do is written to the disk. The only way to get rid of it, is to overwrite the files many times, so they can never be read again. You need a program called Eraser 5.7 it's free. Search for it, there is a website.

Takes a few hours to overwrite the whole drive. Maybe 4

One other thing is that the isp can save the website addresses of where you go, so if you use steath surfing, then the isp won't have a list of those. but stealth surfing slows you down.

2006-07-30 14:52:21 · answer #3 · answered by You may be right 7 · 0 0

If you are not supposed to play on the computers ar work, don't do it. Everywhere you go, everything you do over the company network can be recorded and it's perfectly legal for your employer to do so and use the results to discipline and/or fire you.

Cleaning up your computer does not get everything, and it certainly does not touch the records on the network servers.

I work for a company that does not allow personal use of the computer or unapproved software. People disappear from time to time for violating company policy. I don't even read my personal e-mail at work.

2006-07-30 14:57:06 · answer #4 · answered by Computer Guy 7 · 0 0

If they have a proxy server at your work, or even a fancy firewall, they can even save the addresses of where you go after you clean off your computer. So quit goofing off and get back to work!

2006-07-30 14:50:50 · answer #5 · answered by nkasoff 3 · 0 0

It can be traced on the hard drive...but not likely to happen unless you are being investigated by police or FBI. However, your company could be monitoring your work space with cams...so I would be cautious

2006-07-30 14:52:08 · answer #6 · answered by Anonymous · 0 0

that is conceivable interior of an identical experience that that is conceivable for someone to study a diary that you've on your nightstand. If someone broke into your position, they could open up the drawer and browse it. you need to really make it better troublesome for them with suggestions from retaining your doors and homestead windows locked and probably getting a secure or lock container to save your stuff in. that is an identical with you pc. human beings CAN destroy in, yet even if or not they do relies upon on how properly you secure your pc's safe practices. retaining antivirus different safe practices software is a sturdy position to commence. you could imagine of it as extremely of a watchdog. a lifeless ringer for a real watchdog can each and every in certain situations be coaxed into letting someone in any way if he occurs to deliver a cookie for the canines, someone with the right understanding and equipment can get previous your pc's safe practices. to assist make issues better troublesome, you could take extra steps consisting of making use of encryption equipment to larger preserve your major records. you could also save mushy records on an exterior hardcontinual or thumbcontinual that you merely connect once you actually choose to apply the records. If someone needs to get entry on your records, they could. it is only a remember of how a lot attempt they're keen to positioned into it. The better steps you're taking to preserve your records, they a lot less likely it will be that they are going to. In pc hacking, a lifeless ringer for different criminal acts, human beings have a tendency to seek for "mushy" objectives; products that they could get entry to somewhat actual. The better troublesome you're making it for them, the better likely they are going to ignore you and bypass for someone who delivers a lot less of a mission.* * even if there are countless hackers that bypass out especially searching for a mission, you aren't any further going a objective of theirs. they prefer to bypass after a techniques better troublesome objectives, like the FBI, banks, or invoice Gates' own digital mail.

2016-11-27 00:27:33 · answer #7 · answered by ? 4 · 0 0

fedest.com, questions and answers