Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Fire Fox Portable - leave traces on host pc?

Posted on 2010-08-19
2
Medium Priority
?
485 Views
Last Modified: 2013-12-07
Hi experts,

I am currently looking into encrypted usb drives. Ive came across the Kangaroo Defender which is hardware encrypted. (Thanks to another expert) My question is , if I install Fire Fox Portable on this USB drive, will my passwords, cookies etc be left behind on the host computer ?

Thank you

Matt
0
Comment
Question by:meshoxford
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 35

Accepted Solution

by:
torimar earned 2000 total points
ID: 33477450
No. That is the point of a portable application. It does not use the hard drive/file system of the host operating system.

Some of your data may, however, remain in the RAM/memory of the host system until it is overwritten, or the system rebooted. A capable hacker could possibly extract them, if he knew what to look for in all the gigabytes of garbage.

I should say you are pretty safe with your portable browser on a USB stick in all normal cases and environments, but if the owner of a host system is a) your enemy or b) a very capable hacker or both, and c) you have some really classified top-secret stuff to protect, then don't use that host system for maximum protection.
0
 

Author Closing Comment

by:meshoxford
ID: 33477614
thanks!
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
This article covers the basics of data encryption, what it is, how it works, and why it's important. If you've ever wondered what goes on when you "encrypt" data, you can look here to build a good foundation for your personal learning.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question