Web browsing history
Encyclopedia
In computing, the web browsing history refers to the list of web page
Web page
A web page or webpage is a document or information resource that is suitable for the World Wide Web and can be accessed through a web browser and displayed on a monitor or mobile device. This information is usually in HTML or XHTML format, and may provide navigation to other web pages via hypertext...

s a user has visited recently—and associated data such as page title and time of visit—which is recorded by web browser
Web browser
A web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web. An information resource is identified by a Uniform Resource Identifier and may be a web page, image, video, or other piece of content...

 software as standard for a certain period of time. Web browser software does this in order to provide the user with a Back button and/or a History list, to go back to pages they have visited previously, rather than relying on the user to remember where they have been on the web.

In addition to the web browser software itself, third-party services can also record a user's web browsing history (completely or partially). For example, in Google Web History
Google Web History
Google Web History is a feature of Google Search and provided by Google, in which all search queries and results that a user clicks on are recorded to. The feature is only available for users logged in to a Google Account. The feature was renamed from Search History to Web History on April 19, 2007...

, the clicks of registered users are recorded and stored in individual user histories, each of which are browsable and searchable by that user (this is in addition to the click-tracking Google records for its own internal purposes, such as advertising click tracking). If the user installs the Google Toolbar
Google Toolbar
Google Toolbar is an Internet browser toolbar only available for Internet Explorer and Firefox .-Google Toolbar 1.0 December 11, 2000:New features:*Direct access to the Google search functionality from any web page*Web Site search...

, all pages that the user visits while logged in to Google on that computer may be recorded as well. A potential benefit to the user is that they can review - and search through - all of their web browsing history on any computer, but this can have privacy implications.

Privacy

Web browsing history is not published anywhere publicly by default, whether a user uses their own browser's history functionality or a third-party service, because this would have huge negative privacy implications and would reflect negatively on the reputation of a software or service provider who did such a thing.

Users may wish to remove browsing history data or stop it being collected (at least temporarily). They may want or need to do this to try and avoid other people who have full access to the computer they are using (such as their parents, spouse, or manager, or law enforcement
Law enforcement agency
In North American English, a law enforcement agency is a government agency responsible for the enforcement of the laws.Outside North America, such organizations are called police services. In North America, some of these services are called police while others have other names In North American...

 officials) seeing confidential information about websites they have visited.

However, this alone will not necessarily give the user adequate privacy. Other factors may need to be considered, depending on the user's requirements. Such factors include the contents of the web browser cache
Cache
In computer engineering, a cache is a component that transparently stores data so that future requests for that data can be served faster. The data that is stored within a cache might be values that have been computed earlier or duplicates of original values that are stored elsewhere...

, encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 of the data being transmitted over the network, and anonymity
Anonymity
Anonymity is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". In colloquial use, anonymity typically refers to the state of an individual's personal identity, or personally identifiable information, being publicly unknown.There are many reasons why a...

/traceability
Darknet
The term darknet refers to any private, distributed P2P filesharing network, where connections are made only between trusted peers using non-standard protocols and ports...

 of the user's network connection.

The means by which a user can stop pages being recorded, and delete records of previously-browsed pages, depends on the product used. If a user is using a third-party product which may record search such as Google Search (see above), it may be necessary to remove or stop history collection in multiple places (e.g. in the browser and in Google Search settings).

Privacy of kept history data

Privacy on computer systems is intimately related to computer security
Computer security
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to...

: to the extent that a computer system can realistically be hacked into
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

, the confidentiality of the information stored on it is compromised. Even when a computer system has been well programmed and contains few or no security bugs
Software bug
A software bug is the common term used to describe an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways. Most bugs arise from mistakes and errors made by people in either a program's...

, security is only as strong as "the weakest link in the chain" (that is, the easiest part of the system to hack). This weakest link may be - and often is - something under the user's control, such as a password.

If a user has not disabled ("paused") Google's collection of Web History, and has a Google Account which they use, choosing a strong password for that account is important to prevent hackers gaining access to confidential data. (It is even important when the user has paused Web History on Google, because a hacker could unpause collection of Web History data without the user necessarily noticing.)

Likewise, if a user has not cleared their web browser history and has confidential sites listed there, they may want to use a strong password or other authentication
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 solution for their user account on their computer, lock (i.e. password-protect) the computer when not in use, and/or encrypt the storage medium on which the web browser stores its history information (on a desktop computer
Desktop computer
A desktop computer is a personal computer in a form intended for regular use at a single location, as opposed to a mobile laptop or portable computer. Early desktop computers are designed to lay flat on the desk, while modern towers stand upright...

 or laptop computer, that is usually the hard drive).

See also

  • Historious
  • Computer forensics
    Computer forensics
    Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media...

  • Anti-computer forensics
    Anti-computer forensics
    Anti-computer forensics is a general term for a set of techniques used as countermeasures to forensic analysis.- Definition :...

  • Social bookmarking
    Social bookmarking
    Social bookmarking is a method for Internet users to organize, store, manage and search for bookmarks of resources online. Unlike file sharing, the resources themselves aren't shared, merely bookmarks that reference them....

  • Web annotation
    Web annotation
    A web annotation is an online annotation associated with a web resource, typically a web page. With a Web annotation system, a user can add, modify or remove information from a Web resource without modifying the resource itself...

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK