Solved

Using an internet kiosk - security precautions

Posted on 2016-10-13
6
72 Views
Last Modified: 2016-10-14
My friend uses an internet kiosk for her email, but I think she is not following the security steps whenever she finishes using the pc.  Can the experts please let me know what are the steps in sequence, she has to take in order to make sure that she has not left any of her personal stuff still retrievable by a geek when she leaves the pc.  Thank u.
0
Comment
Question by:jegajothy
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 54

Expert Comment

by:McKnife
ID: 41841857
You mean an internet cafe? You cannot browse in privacy on a computer that you don't administer - period. If the internet cafe owner wanted, he could record every keystroke without her knowing - you cannot do anything against it.
0
 
LVL 88

Accepted Solution

by:
rindi earned 250 total points
ID: 41841947
It really depends on how the particular internet cafe works. A good cafe probably uses a locked down OS where users have limited access to and can't change anything, and which returns to an "original state" after a reboot. I would recommend to only use webmail, not to do any e-banking or similar things, and to clear cookies, browsing history and passwords in the web-browser. I'd also suggest to reboot the PC after a session, provided the user can do a reboot.

Another option, provided that is allowed at the cafe, is to boot the PC from your own LiveMedia using a Linux OS from a DVD or USB stick. That way no data can stay on the PC (don't forget to take the DVD or USB stick out of the PC before leafing the cafe)!
0
 
LVL 63

Assisted Solution

by:btan
btan earned 250 total points
ID: 41841976
Internet kiosk is unlikely to allow removal of the browser history, caches and traces of Temp files unless it is given rights and permission. Likewise also if thumbdrives are inserted there is to remove the traces of the device information as it is installed as plug and play..

If appl can be run, the cleaning tool such as Ccleaner is handy. See its coverage.

https://www.piriform.com/ccleaner/features
0
Are You Ransomware's Next Victim?

Worried about ransomware attacks hitting your organization?  The good news is that these attacks are predicable and therefore preventable. Learn more about how you can  stop a ransomware attacks before encryption takes place with WatchGuard Total Security!

 

Author Closing Comment

by:jegajothy
ID: 41842666
Thank u for your advice, it helps.
0
 
LVL 54

Expert Comment

by:McKnife
ID: 41843182
jegajothy, if you visited my internet cafe, these measures would not help - I would use keyloggers to get all your passwords. The only thing you can do (and what Rindi mentioned) is boot your own OS from USB or CD/DVD. Then you are in control. But what internet cafe would let you boot your own OS? I can hardly imagine that. So the only secure way is to use your own device.
0
 

Author Comment

by:jegajothy
ID: 41843569
Thank u McKnife for your information and suggestion, which is very helpful.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

710 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question