SECURITY

Implementing Security in Windows 7 : Delete Your Browsing History

9/28/2012 2:56:18 AM
To ensure that other people who have access to your computer cannot view information from sites you have visited, you can delete your browsing history.

Internet Explorer maintains a list of the sites you visit, as well as copies of site content so that pages load faster the next time you view them. Internet Explorer also saves text and passwords that you have typed into forms, and cookies, which are small text files that store information such as site preferences and logon data.

Saving this history makes surfing easier, but it is dangerous because other people who use your computer can just as easily visit or view information about those sites. This can be a problem if you visit financial sites, private corporate sites, or some other page that you would not want another person to visit. You reduce this risk by deleting some or all of your browsing history.

Delete Your Browsing History

1 Click Safety.

2 Click Delete Browsing History.

The Delete Browsing History dialog box appears.

3 To keep the browsing history associated with sites on your Favorites list, click Preserve Favorites website data ( changes to ).

4 To delete saved Web page files, click Temporary Internet files ( changes to ).



5 To delete cookies files, click Cookies ( changes to ).

6 To delete the list of Web sites you have visited, click History ( changes to ).

7 To delete saved form data, click Form data ( changes to ).

8 To delete saved form passwords, click Passwords ( changes to ).

9 Click Delete.

Internet Explorer deletes the selected browsing history.



Simplify It

Can I prevent Internet Explorer from saving my browsing history?

If you visit sensitive or private Web sites, you can tell Internet Explorer not to save any browsing history for those sites. When you activate the InPrivate Browsing feature, Internet Explorer stops saving browsing history when you visit Web sites. Internet Explorer also turns off third-party toolbars and other add-ons that you have added to the browser.

To turn on InPrivate Browsing, click Safety and then click InPrivate Browsing.  A new Internet Explorer window appears, and you see [InPrivate] in the title bar, and the InPrivate indicator in the address bar.

Other  
  •  Web Security : Attacking AJAX - Checking for Cross-Domain Access, Reading Private Data via JSON Hijacking
  •  Web Security : Attacking AJAX - Subverting AJAX with Injected XML, Subverting AJAX with Injected JSON
  •  .NET Security : Programming the Event Log Service (part 3) - Using Custom Event Logs, Monitoring Event Logs
  •  .NET Security : Programming the Event Log Service (part 2) - Reading Event Logs, Writing Events
  •  .NET Security : Programming the Event Log Service (part 1) - Querying the Event Log System, Using Event Sources
  •  .NET Security : The Event Log Service Explained
  •  Web Security : Attacking AJAX - Intercepting and Modifying Server Responses, Subverting AJAX with Injected Data
  •  Web Security : Attacking AJAX - Intercepting and Modifying AJAX Requests
  •  Hacker Zone (Part 2) - Take photos with your Bluetooth headset, Jargon Buster
  •  Hacker Zone (Part 1) - Build your own Cyanogen-Mod ROM with CMC, Manage files in Recovery Mode
  •  
    Top 10
    Review : Sigma 24mm f/1.4 DG HSM Art
    Review : Canon EF11-24mm f/4L USM
    Review : Creative Sound Blaster Roar 2
    Review : Philips Fidelio M2L
    Review : Alienware 17 - Dell's Alienware laptops
    Review Smartwatch : Wellograph
    Review : Xiaomi Redmi 2
    Extending LINQ to Objects : Writing a Single Element Operator (part 2) - Building the RandomElement Operator
    Extending LINQ to Objects : Writing a Single Element Operator (part 1) - Building Our Own Last Operator
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8