?
Solved

Fire Fox Portable - leave traces on host pc?

Posted on 2010-08-19
2
Medium Priority
?
486 Views
Last Modified: 2013-12-07
Hi experts,

I am currently looking into encrypted usb drives. Ive came across the Kangaroo Defender which is hardware encrypted. (Thanks to another expert) My question is , if I install Fire Fox Portable on this USB drive, will my passwords, cookies etc be left behind on the host computer ?

Thank you

Matt
0
Comment
Question by:meshoxford
2 Comments
 
LVL 35

Accepted Solution

by:
torimar earned 2000 total points
ID: 33477450
No. That is the point of a portable application. It does not use the hard drive/file system of the host operating system.

Some of your data may, however, remain in the RAM/memory of the host system until it is overwritten, or the system rebooted. A capable hacker could possibly extract them, if he knew what to look for in all the gigabytes of garbage.

I should say you are pretty safe with your portable browser on a USB stick in all normal cases and environments, but if the owner of a host system is a) your enemy or b) a very capable hacker or both, and c) you have some really classified top-secret stuff to protect, then don't use that host system for maximum protection.
0
 

Author Closing Comment

by:meshoxford
ID: 33477614
thanks!
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Google currently has a new report that is in beta and coming soon to Webmaster Tool accounts. This Micro Tutorial will highlight new features for Google Webmaster Tools.
This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.
Suggested Courses
Course of the Month14 days, 21 hours left to enroll

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question