Solved

Fire Fox Portable - leave traces on host pc?

Posted on 2010-08-19
2
482 Views
Last Modified: 2013-12-07
Hi experts,

I am currently looking into encrypted usb drives. Ive came across the Kangaroo Defender which is hardware encrypted. (Thanks to another expert) My question is , if I install Fire Fox Portable on this USB drive, will my passwords, cookies etc be left behind on the host computer ?

Thank you

Matt
0
Comment
Question by:meshoxford
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Accepted Solution

by:
torimar earned 500 total points
ID: 33477450
No. That is the point of a portable application. It does not use the hard drive/file system of the host operating system.

Some of your data may, however, remain in the RAM/memory of the host system until it is overwritten, or the system rebooted. A capable hacker could possibly extract them, if he knew what to look for in all the gigabytes of garbage.

I should say you are pretty safe with your portable browser on a USB stick in all normal cases and environments, but if the owner of a host system is a) your enemy or b) a very capable hacker or both, and c) you have some really classified top-secret stuff to protect, then don't use that host system for maximum protection.
0
 

Author Closing Comment

by:meshoxford
ID: 33477614
thanks!
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL stands for “Secure Sockets Layer” and an SSL certificate is a critical component to keeping your website safe, secured, and compliant. Any ecommerce website must have an SSL certificate to ensure the safe handling of sensitive information like…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will demonstrate how nuggets on the Web are formatted by using Chrome Developer Tools. These tools would not only view the site's CSS but it can also modify it and save the CSS to use on your own site.
How to create a custom search shortcut to site-search Experts Exchange using Google in the Firefox browser. This eliminates the need to type out site:experts-exchange.com whenever you want to search the site. Launch your Bookmark Menu: Press 'Ctrl +…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question