2privacy
Online Privacy Test

Online Privacy Test


To view requested information please enter the code and click the 'OK' button

Code  



This privacy test shows what information can be collected by web sites when you visit them.
Need information about your IP address Location? Check geo IP location using the Check IP Location Test

IP Address Location Test
Quick and easy way to get IP address or domain name location information

Your IP whois lookup
Detailed IP address (host/domain) whois lookup
Search IP whois? Using the IP whois lookup you can easily get IP whois about the organization or the Internet service provider (ISP) that owns the IP address, including information about the geographic location, country, state, city, address, phone numbers and e-mails. Just go to the IP whois page, enter IP or domain name and press the "Whois" button.

Computer networks are not, by themselves, particularly secure. When sending or receiving confidential information such as a financial transaction, encryption ensures that no unauthorized parties have access to that data. Encryption is extremely important for passwords. Sending an unencrypted password across the network gives an open invitation to hackers. Once your password has been compromised, a hacker can access your personal e-mail as well as your personal data and data stored on shared systems.

Prevent web sites from tracking your activities by cleaning up your trails on a regualar basis. For example, clear out your browser history, Temporary Internet files at the end of every session. If you leave your browser running all the time, then make a point of doing this every few hours. You can also clean unwanted cookies from your system so web sites can't find them.

Online Privacy Tips

Do not reveal personal information to strangers or just-met "friends"
Be very careful to whom you give personal information and where you post information. Don't give out any personal information to people you meet in chat rooms, message boards or newsgroups, unless you know for sure who they are and have met them in person. There are people on the Internet who can be trusted, but there are also people on the Internet who can't be trusted, and it is very difficult to tell them apart.

Security Tips

Do not reveal personal information inadvertently
Most of the computer programs, like email handlers, browsers etc, have options that you can set to specify personal details. Leave them blank or if the system insists, then give a reasonable looking but fictitious name.
Avoid giving information to any company that says they might sell your information to other parties. You'll have to look closely at the site's privacy policy or statement to find this information.

Do not reply to spammers, for any reason.
If you reply, or even ask for your name to be removed from the spammers list, this confirms that the e-mail has been read by an actual person, and you will receive even more spams. There are some spam filters available. To protect your e-mail address against cyberstalkers and spam use special services.

Don't give out credit card numbers in a non-secure environment.
If you're making a purchase through a web site, read the company's policy before you buy. A secure web page will usually have a URL that begins "https" (instead of "http"), and most browers will alert you to the fact that you are going to a secured (or unsecured) page. A secure server will show on your browser with a closed lock icon at the bottom in Windows, or at the top on Mac.

Avoid accessing personal or private information (e.g. your online banking account) from a computer that is shared (i.e. work, library, webcafe, etc.) because there is no guarantee that this information is not tracked.

Online Security Tips

Turn on cookie notices in your web browser and/or use cookie management software.
Most cookies are useful in web surfing. The Internet offers a wide variety of useful services such as free e-mail accounts, online forums, and e-commerce sites. The use of cookies is essential for these sites. But, in one of their malevolent forms, cookies from one web site might track your visits to a different web site.
There is an option in web browsers to display a warning if any visited website wants to send you a cookie to be stored and allow you to decide whether or not to accept it. You can also use cookie management software and services.
Also see how delete cookies, enable cookies, disable cookies

Internet Privacy Tips

clear recent documents list

Check your IP address using IP Checker

How can I protect Internet Privacy?

Using privacy protection software and following some simple privacy protection tips can help you maintain your Internet privacy and offline privacy.
Privacy software will keep your personal information safe through a number of methods.

Why you should concern about Internet Privacy protection


Most Internet users feel little or no concern about their online privacy protection. And while there is no actual physical danger to Internet surfing, chat, or e-mail, most users are either poorly informed or misinformed about what really happens while they're online.
It's easy to forget that the Internet is a two-way connection. You can use the Internet to see content that resides on other computer systems around the world. But remember - those systems can see what's on your computer, too. In other words, the Internet is more like a two-way mirror than a television set.
Many computer users already have a virus or a firewall solution installed on their computers, but very often they are still missing the most crucial component of all - privacy protection software. Having full-time privacy protection software enables you to "encrypt", or hide, all traffic to and from your computer. This prevents online snoops from tracking your surfing habits and using it for undesirable purposes.

What tracks you leave online

IP address
(Internet Protocol address) is your Internet identification number. Everyone has an IP address to communicate on the Internet. Your computer's IP address is comparable to your home address or your Social Security number. If someone can match your IP address to your ISP's customer list, they can use the information to identify country, city, internet provider and even physical address. When you surf the web, your IP address is left in logs all around the Internet: in the logs at your ISP, at the routers of your requests and finally the destination of your request. Hackers and identity thieves can use this information to infiltrate your system and steal personal information, use it in a Distributed Denial of Service (DDoS) attack, spy upon you or cause damage to your PC. It is possible to restrict accessing any information or provide customized content to specific IP.

• Information about your system
As web servers communicate with your computer, they can gather certain types of information about your system. For example, a web site can immediately determine what browser you use, certain system settings, and whether some types of software are installed. This includes browser plug-ins, media handlers, application programs, and your operating system. While most sites use information about OS and browser to provide a better surfing experience this information can also be used by hackers for virus attacks that use weaknesses in your system to get access to the content of your hard drive or RAM, steal personal information or cause damage to your computer.

• Referral information
When you click a hyperlink to jump to a new web site, your browser reveals the address of the referring site - that is, the site you jumped from. As you "hop" from one server to another, your activities can be tracked. Information about last visited web pages can be used to track your web usage and profile your browsing habits. Spammers can use this information to send you spam and junk e-mails.

• Cookies
As you surf the web, most web sites send cookies to your computer to track your Internet usage. Some cookies are "good" cookies, used for legitimate purposes, such as storing preferences, account information and remembering the choices you have made on the site. Some cookies are "bad" cookies. Bad cookies are used to track your browsing habits, purchase history, etc.

Sending and receiving email creates a trail that connects you, through ISPs, back to the recipient or sender and email content is typically copied and saved several times along the way. If email content and Instant messaging content is not encrypted, anyone monitoring network traffic can capture and trace emails and instant messages to the source.

2 Privacy
My IP address

Online IP check

My IP whois lookup

Check my IP location

Copyright © 2014 Intemodino Group s.r.o.   All rights reserved   Legal   Contact   Site map   Change language Thursday, October 2, 2014