This Article is About
private web
private web surfing
technical standpoint
conspiracy theory
private data
perverts
grocery store
online communities
colleague
Private Web Surfing - Privacy Online
Join 1000's of Authors at StreetArticles Today!

Private Web Surfing  -  Privacy Online

Is your privacy important to you? Probably. What you might not know is that your privacy is at risk every time you connect to the internet. Now I don't want this to sound like one of those conspiracy theory 'the government is watching you!' type warnings, but from a technical standpoint, it's true. There are some serious risks you take when you connect to the internet using your real IP address (your online ID). Private web surfing is not just for perverts and psychos - perfectly normal people who want to surf the internet knowing that their private data stays that way can make use of this software.

Why you need privacy online

Ok, so lets establish why you need privacy online before talk about how to actually do it.

Have you ever been reading a newspaper or magazine on the bus and some guy next to you or behind you starts reading with you? Do you feel uncomfortable?

Has the checkout lady ever commented on the stuff you were buying at the grocery store? Did you feel a bit annoyed, and that it was none of her businesses?

Have you gone to the doctor, had a colleague or friend ask why, and then told them it was just for a checkup even though it was for something else?

These are all examples of how we want to keep strangers, friends, and acquaintances out of our private life. What we don't realize is that when we surf the internet, this type of information is exposed.

For example, if you sign up for a forum online and use your email address, that is a footprint that can lead back to you. Does your email have your real name attached to it in some way? Could someone search for your name or email address and find out you're a member of that forum? Do you keep a blog with similar type of information in the 'contact me' area of your blog?

Online Privacy Software

Maybe you don't participate in online communities and just browse and download. Still, all that information is being sent through your ISP, who's keep records of it. Sure, they might not care about your foot fungus or smoking habits, but your employer might. Your government might. Now, most of the time that information is not available, but there are conditions in which it might be. Does a potential employer do a background check on new employees? What can they find out about you on the internet just by doing a Google search? I'd bet that most governments have policies in place that allow them to seize ISP severs if they think a certain IP address could be a 'national threat'.

And that's not even talking about the tracking devices that advertisers use to try to get you to click on and buy more stuff. The point is that you leave footprints wherever you go, and if you're not extremely careful, chances are that there's information available about you that you didn't know existed.

How to get privacy online

The best way for private web surfing is to use a virtual private network. This is a type of software that can be downloaded onto your phone or computer, and doesn't need any extra hardware to work. It is possible to use a VPN router to make an entire network private, but for the most part, an individual user and even multiple users on 1 network will do just find with the downloaded version.

It's basically a private network of servers that's used to block out outsiders. You use a 'VPN tunnel' connection to the VPN servers, where a virtual IP address is assigned to you, and then you use the fake IP address to surf the internet. You real IP stays hidden, and the virtual IP is used as a front man to your online activities. Anyone who tries to find out more about you is blocked by data encryption, which you'll see written as IPSec, SSL, or SSH.

For privacy on phones like iPhone and Android, you can use L2TP/IPSec VPN. What it is, is a bit complicated, but it's the most secure form of privacy for you smartphone. On laptops, you can use OpenVPN/SSL. Most VPN services will have these two VPNs, plus something called PPTP. You'll notice that some services offer discounts for PPTP, so it's no wonder that PPTP is a bit outdated. Still, it's popular for users who are looking to bypass firewalls and unblock sites rather than full privacy online. Users looking for invisibility online however, should still stick with L2TP and OpenVPN.

The great thing about VPNs when compared to other forms of privacy tools available online is that they encrypt and tunnel all of your online data - not just your browsing session. This makes virtual private networks popular with users that want to stream TV from foreign websites, call using VOIP software, businesses with employees overseas, and even online gamers.


Street Talk

No comments present
You May Also Like
Private Web Surfing - The Debate Continues
Early in the development of the internet, private web surfing was something that was assumed, and people probably never imagine that being able to be private online would be difficult. However, in the modern online environment, this is no longer the case. In fact, there have been some pretty heavy…
By: Roderick B in  Computers and Technology   Jan 23, 2013  
0
  Likes: 1

Private Web Surfing, Zombie Computers, Proxies, Vpns And Privacy Online
Is your privacy online important to you? Most people haven't really though about it before. Huddled in your room surfing the net, you think that just because no one can see your monitor, no one can see what you're doing. Most of the time you're right. But most of the…
By:  in  Computers and Technology   Apr 08, 2012  
0
  Likes: 1

Private Web Surfing At Work And School
When you access the internet from an open network, even if it is on your privately owned device, you run the risk of being eavesdropped on. That means when you access your email accounts at work, or your Facebook account at school, you could be getting spied on. Chances are…
By:  in  Computers and Technology  >  Mobile Computing   Apr 08, 2012  
0
  Likes: 0

Private Web Surfing - The Debate Continues
Early in the development of the internet, private web surfing was something that was assumed, and people probably never imagine that being able to be private online would be difficult. However, in the modern online environment, this is no longer the case. In fact, there have been some pretty heavy…
By: Roderick B in  Computers and Technology   Jan 23, 2013  
0
  Likes: 1

Private Web Surfing - Health, Money, Anonymity
You're not alone when you surf the internet. Sure, there are other people on the internet too, but that's not what I mean. For example, lets say that you get online at home. What you view has to go through your ISPs servers before it's transferred to the larger internet.…
By:  in  Computers and Technology   Apr 08, 2012  
0
  Likes: 0

Private Web Surfing, Zombie Computers, Proxies, Vpns And Privacy Online
Is your privacy online important to you? Most people haven't really though about it before. Huddled in your room surfing the net, you think that just because no one can see your monitor, no one can see what you're doing. Most of the time you're right. But most of the…
By:  in  Computers and Technology   Apr 08, 2012  
0
  Likes: 1

What Sportbike is Right for Me?
In a previous article I talked about the many different types of motorcycles that are out there. One of the styles that I touched on (and often display) is sport bikes. If you are an aspiring rider and have decided that you want to go the sportbike route you are…
By: Shannon Sutherland in  Automotive  >  Motorcycles   Apr 26, 2012  
2
  Likes: 0

Anonymous Web Surfing - Privacy Or Perversion?
I'll be the first to admit that when I heard about anonymous web surfing, I thought that it was something just for perverts. I pictured some guy in the basement of his parents home watching porn and worried that someone would find out about his Japanese anime streaming habits. While…
By:  in  Computers and Technology   Jan 09, 2012  
0
  Likes: 1

What is Cryp1 Ransomware And How to Remove it
This is an article about a malicious program, which is called Cryp1. It is a virus that enters the user's computer, encrypts all the files that it can, and requires a ransom for their decryption. Such viruses are called ransomware, and are considered the most dangerous types of viruses. Their…
By: John137 in  Computers and Technology  >  Software   Jun 08, 2016  
5
  Likes: 11

New Interconnecting Cisco Networking Devices Part 2 200 - 105 Icnd2 Exam Latest Dumps
Endexam have different 200-105 Interconnecting Cisco Networking Devices Part 2 (ICND2 v3.0) for different candidates. With these Endexam targeted training, the candidates can pass the exam much easier. A lot of people who participate in the IT professional certification exam was to use Endexam Interconnecting Cisco Networking Devices Part 2…
By: aaron14 in  Computers and Technology  >  Certification Tests   Jun 08, 2016  
0
  Likes: 2

Killtest Offers Huawei Hcie - storage H13 - 629 Practice Questions And Answers For Learning
After you begin to use the H13-629 study materials together with H13-629 real and original exam questions and answers, you should understand the difference. Case for Huawei qualification can apply regarding employment everywhere in the earth. Huawei qualification may be the identity for ensure. An expert could strengthen his/her capacities…
By: Dolton2016 in  Computers and Technology  >  Certification Tests   Jun 08, 2016  
0
  Likes: 2

Fix Your Yahoo Issues Via Calling Certified Yahoo Customer Service Experts
Getting problem while working with Yahoo mail? Not to worry! Fix your Yahoo issues by Yahoo customer service. It is the place where you get solution for all your problems. No matter, whether the issue is big or small. For contact number of Yahoo service team you can refer the…
By: Joshua Beers in  Computers and Technology  >  Personal Tech   Jun 07, 2016  
0
  Likes: 1

App Store Optimization Service | Accumulate New Users for His Apps
Increasing the likelihood of people finding your app through the App Store's organic search all comes down to choosing the right keywords and text for your app's description. Lucky enough, Sensor Tower has great tools to help you app store optimization service here. Use the Keyword Rankings tool to understand…
By: Molly3 in  Computers and Technology  >  Personal Tech   Jun 07, 2016  
0
  Likes: 1

Three Methods to Restore Iphone After Factory Reset
When you have too many duplicates in your iPhone, you may want to erase all the data and reset iPhone to factory settings. After resetting iPhone, you will get all the data swept from iPhone, and you can restore the files from your iPhone, iTunes backup or iCloud backup. And…
By: ClarkW in  Computers and Technology  >  Data Recovery   Jun 07, 2016  
0
  Likes: 1

How to View Android Text Messages on Computer?
To keep android phone text messages stored longer, or make backups for them, or fulfill some other demands, people may want to read text messages on their computers. But reading SMS messages is quite different from viewing things stored in a storage card used by the cellphone. So many people…
By: eveeve in  Computers and Technology  >  Mobile Computing   Jun 07, 2016  
0
  Likes: 1

Article Views: 1504    Report this Article