It frustrating to know that when you surf the Internet, the computer leaves traces. Indeed, when one connects to a site, the computer is identified by its IP address stored by the remote site and all sites displaying banners or dynamic content on the site. In addition, cookies used by sites, are small files used to store the preferences of the user throughout the session, particularly the data entered by the user in various forms. If they originally used to customize the browser, these cookies can be used to store information for commercial purposes, including to sell your email address (spam case) or your browsing habits and consumption sites profiling. There are ways to limit those risks, along with other constraints and that's what this tip is all about:
Principle of Internet browsing
When browsing the Internet, the computer uses a unique address called an IP address, allowing remote web servers to respond. For most users, the IP address is provided by the ISP and will change or not at each new connection to the Internet. Each connection to a remote site, it keeps logs (log files) linking to your IP address pageviews. Similarly, your ISP keeps a log of your connections and can therefore maintain a correspondence between you (with your real coordinates Subscriber), IP address and web pages viewed. It is virtually impossible to falsify its IP address, while viewing web pages, because you do not receive the web pages delivered by the remote site.
Principle of anonymous surfing
The only way to make use of anonymous surfing is to go through an intermediary server that connects to websites that you visit (it will act like a cache). This server is called agent or proxy. The only limitations of this system are the constraints of an intermediary:
Connection time takes longer, because the packet must travel from your computer to the proxy, then from proxy to the website, then the same thing in return and the processing time by the proxy server itself!
Security constraints, no one knows who is behind this proxy and if the data traveling through the intermediary will not be intercepted and maliciously reused.
Torpark, a derivative of the portable version of the popular web-browser Mozilla Firefox set to use a network of routers, called "onion rings" for the random exchange of encrypted data to cover their tracks.
This document entitled « Anonymous web browsing » from CCM (ccm.net) is made available under the Creative Commons license. You can copy, modify copies of this page, under the conditions stipulated by the license, as this note appears clearly.