How to Clear Your Internet History
Mozilla Firefox
1. From the menu bar, drop down the “Tools” menu
2. Select “Clear Recent History” or “Clear Private Data”
3. Check ALL boxes and click “Clear Now”
Safari
1. From the menu bar, drop down the “History” menu
2. Select “Clear History”
3. Click “Clear” to confirm
Internet Explorer 6x/7x
1. From the menu bar, drop down the “Tools” menu
2. Select “Internet Options”
3. Click “Delete Files”
Internet Explorer 4x/5x
1. Close all Internet Explorer browser windows
2. In the computer’s “Control Panel” click “Internet Options”
3. Click the “General” tab
- For some programs you will need to Click “Temporary Internet Files”
4. Select “Clear History/Delete Files”
5. Click “Yes”
6. Click “OK” to close the Internet Options box
Internet Explorer for Macs 4x
1. Open the Macintosh Hard Drive
2. Select “System”
3. Click “Preferences”
4. Select “Explorer”
5. Click “History” file and move the history file into the trash
6. Secure Empty the trash
Internet Explorer 3x
1. From the menu bar, select “View”
2. Click “Options”
- Click the “Navigation” tab > select “Clear History > click “OK”
- Click the “Advanced” tab >select the “Settings” tab > click “Empty Folder”
Netscape
1. From the menu bar, select “Edit”
2. Click “Preferences”
3. Select “Navigator”
4. Select “History”
5. Click “Clear History”
Opera
1. From the menu bar, select “File”
2. Click “Preferences”
3. Select “History”
4. Click “Empty Now”
Delete Google searches:
To delete the history of your google searches, please look at the site below:http://www.google.com/support/websearch/bin/answer.py?answer=465
Internet Safety Tips
For lots of information about online safety, visit http://www.getcybersafe.gc.ca/index-eng.aspx
If you are concerned that your internet use is being monitored by someone in your home or through spyware, the safest option for seeking help online is to not use your personal or home computer, but to use a trusted friend’s computer, a work computer, visit an internet café, local library, or a community centre. Many anti violence support services also have computer available for survivors of abuse to use.
When you use the internet, your browser saves information of the sites that you visit (these are called “cookies”) as a tool to help these pages load faster the next time that you view them. This means that it is possible for someone to view your search history, which sites you have visited and what you have looked at.
If you are going to be using a computer that you are concerned is being monitored, the instructions above explain how to clear your internet’s cookies so that no one can see which sites you have visited.
Think ahead about how much time it will take to view online materials and delete the history. Allow yourself a window of time where you can safely access what you need.
Please note: Your personal safety is of the utmost importance, so you need to be aware that there is a risk involved when clearing data from your computer’s internet history. When you clear your internet history, you may also delete saved passwords and login information for websites. It will also be noticeable that the address history has been cleared and this may raise suspicions. You may want to be ready to explain why you cleared the history, if someone asks, for example: you thought you were supposed to clear the history to make space on the computer because it was running slowly, or you did it by mistake when trying to figure out how to unfreeze a site that was frozen.
Other Things to Consider
Monitoring e-mails is another way that someone can track who you are speaking with and what you are doing.
Increase your privacy by:
- Putting a password on your e-mail account if you do not currently have one already set up.
- You may want to consider making a new e-mail account that only you are aware of.
- Change the password to your e-mail account, steering clear of passwords that are easily guessed.
- Delete any e-mails that you don’t want someone else to view, from your inbox, your sent items and your drafts box. Be sure to securely empty your deleted items folder to ensure the e-mails have been fully deleted.
- When you write an e-mail to a new address, computers will often store that e-mail address in your address book. Be sure to delete any addresses from your address book/history that you don’t want others to view. When deleting these addresses, be sure that you also ensure they have been deleted from the computer itself by securely emptying your computer’s deleted items file.
- Some e-mail programs also have an instant messaging component, be aware that these are also not secure and conversations here will also have to be deleted.
- If you receive an abusive, threatening or harassing e-mail/instant message, be sure to print a copy of the e-mail and save it in a safe place. You could also forward a copy of the e-mail to a safe e-mail address.
Phones
If you are concerned that your phone is being monitored by someone, the safest option for seeking help by phone is to not use your personal or home phone, as the numbers you call will be listed in your phone bill and show who you have spoken to and where you may be seeking help.
To avoid this, use a phone outside the home: a public payphone, a trusted friend’s phone, a work phone, or purchase a cell phone that the person monitoring your calls does not know about. If you are going to use a home or personal phone, consider using a calling card or calling collect.
You may want to think about not discussing anything sensitive on a home phone, in case the phone is being tapped. Cordless phones are easier to tap, so when possible, try to use a corded landline if you are going to be receiving or making calls.
Cell phones often have GPS and can be used to monitor your whereabouts if the GPS component is not disabled. If you do not want your whereabouts to be monitored through your cell phone’s GPS, you would need to disable your cell phone’s GPS.
If you are able to, talk to your phone company and ensure that you are the only person who is able to access your phone records or make changes to your phone account. Ask that you no longer receive paper bills and get the bill sent by e-copy to your secure e-mail address. Change the password to your e-account to something that is not easy to guess.
Surveillance and GPS Tracking
It is important to be conscious that surveillance technology is readily available and easy to use. Baby monitors, “nanny cams” and GPS devices are inexpensive and sold widely. Devices can be concealed in your home, purse, car or any item that you carry with you. The GPS in cars and cell phones can also be used to monitor where you are or have been.
If you are concerned about being tracked when you leave your home to seek help, consider turning off and/or leaving your cell phone or car GPS at home and don’t take your usual bag or wallet. Instead of driving your own car, consider taking a taxi, public transit, walking or having a friend/family member pick you up.
If you find a device, be aware that removing it or turning it off may result in the individual knowing that you’ve found it.
Contact a local community-based victim service program in your community to discuss next steps, or if you feel you are in immediate danger, contact the police.
Social Media
Be aware that social media sites (and instant messaging) are another way your activities can be monitored. Messages, posts, events and photographs on your own pages and the pages of your friends and family, may give information about your whereabouts and activities. It is important to be aware of how easy it is for information to be spread through social media.
Some things you can do to control information about yourself online and through social media are to:
- Be conscious of not only what you put online, but also of what others are posting that include you.
- Make sure your privacy settings are set to the highest levels – though this does not ensure privacy, as those who have access to your posts are able to repost/tweet directly from your page, linking the post/tweet to your account and their privacy settings may make this information open to the public.
- Change your passwords regularly, avoid using something familiar that could be guessed
- Make your friends and family aware that you do not want your activities, whereabouts or image posted online, as it could inadvertently compromise your safety
- Have an open and honest conversation with your children about the realities of social media and what content can and cannot be shared safely.
- Try to avoid using social media sites when searching for or discussing getting help
- If possible, block the person you are concerned about and any of his friends or your mutual friends who are likely to pass on information about you.
- Be skeptical of adding strangers, do not add people that you do not know and have not met in person – this includes people you meet through discussion groups, in chat rooms or other online social networking.
Instructions on how to block someone on Facebook:
http://www.facebook.com/help/?page=841