Solved

Using an internet kiosk - security precautions

Posted on 2016-10-13
6
54 Views
Last Modified: 2016-10-14
My friend uses an internet kiosk for her email, but I think she is not following the security steps whenever she finishes using the pc.  Can the experts please let me know what are the steps in sequence, she has to take in order to make sure that she has not left any of her personal stuff still retrievable by a geek when she leaves the pc.  Thank u.
0
Comment
Question by:jegajothy
6 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 41841857
You mean an internet cafe? You cannot browse in privacy on a computer that you don't administer - period. If the internet cafe owner wanted, he could record every keystroke without her knowing - you cannot do anything against it.
0
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 41841947
It really depends on how the particular internet cafe works. A good cafe probably uses a locked down OS where users have limited access to and can't change anything, and which returns to an "original state" after a reboot. I would recommend to only use webmail, not to do any e-banking or similar things, and to clear cookies, browsing history and passwords in the web-browser. I'd also suggest to reboot the PC after a session, provided the user can do a reboot.

Another option, provided that is allowed at the cafe, is to boot the PC from your own LiveMedia using a Linux OS from a DVD or USB stick. That way no data can stay on the PC (don't forget to take the DVD or USB stick out of the PC before leafing the cafe)!
0
 
LVL 62

Assisted Solution

by:btan
btan earned 250 total points
ID: 41841976
Internet kiosk is unlikely to allow removal of the browser history, caches and traces of Temp files unless it is given rights and permission. Likewise also if thumbdrives are inserted there is to remove the traces of the device information as it is installed as plug and play..

If appl can be run, the cleaning tool such as Ccleaner is handy. See its coverage.

https://www.piriform.com/ccleaner/features
0
U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

 

Author Closing Comment

by:jegajothy
ID: 41842666
Thank u for your advice, it helps.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41843182
jegajothy, if you visited my internet cafe, these measures would not help - I would use keyloggers to get all your passwords. The only thing you can do (and what Rindi mentioned) is boot your own OS from USB or CD/DVD. Then you are in control. But what internet cafe would let you boot your own OS? I can hardly imagine that. So the only secure way is to use your own device.
0
 

Author Comment

by:jegajothy
ID: 41843569
Thank u McKnife for your information and suggestion, which is very helpful.
0

Featured Post

Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This Micro Tutorial will demonstrate how to add subdomains to your content reports. This can be very importing in having a site with multiple subdomains.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question