Tips what to know about your logs

Since MAC addresses identify specific hosts or computers on the network, traffic going to and from a specific computer...

Last Updated: 21 Sep 2015

MAC Address Logs on Router

Since MAC addresses identify specific hosts or computers on the network, traffic going to and from a specific computer can be identified using the MAC address through the log files. If you want to be anonymous on the local network you may want to change your MAC address before you connect to a network. Check out the tools section on the website on how to do this.

 

Date / Time Access logs of Internet

You might want to regularly delete the Internet access logs from your computer. The most common would be the browsing history on your browsers as well as the firewall logs on your operating system. For browsers you might want to turn off the history logging entirely if you have no use for it.

From the router or Internet access point side, it would be difficult to delete log files if you do not have administrative access. You may want to change your MAC address as an anonymity measure and also use a proxy services like TOR to hide you Internet access activities.

 

Device Name Logs on Router

Some routers log your host or computer name as well. You can change your computer name on a regular basis but this may prove to be tricky for Windows users, because you need to restart your computer for the name change to become effective.  On Mac and Linux/Unix machines you can change your host name without having to restart your computer.

 

Visited IP Address Logs

This is the same as the logs from the router or Internet access point. If you do not have admin access to the router in order to delete the logs, the alternative is to use a proxy service like TOR to anonymise your Internet activities.

 

Internet Services Access Logs

The most that the ISP can log is your assigned IP address and associated Internet traffic. You might want to use a proxy service like TOR to anonymise your traffic. At a minimum use TOR for sites that you think are sensitive or may compromise your security and the security of those around you. Check out the tools section on the website for information about TOR.

 

Browser IDs

When browsing for sensitive information, you can hide your browser ID details by using a TOR or VPN proxy. Check out the tools section for information about TOR and VPN.

 

Browser History

Delete your browsing history after using a browser on a public machine.