{"id":318,"date":"2005-01-20T15:46:34","date_gmt":"2005-01-20T20:46:34","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=318"},"modified":"2005-01-20T15:46:34","modified_gmt":"2005-01-20T20:46:34","slug":"what-your-pc-tracks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/","title":{"rendered":"What Your PC Tracks"},"content":{"rendered":"<p>\nYou should always assume that whenever you use your PC, you are<br \/>\nleaving behind a record of what you are doing.  That&#8217;s the benefit of a computer; it&#8217;s supposed to keep track of things so you don&#8217;t have to do it yourself.  But there are times that you don&#8217;t want it to be so good at keeping track of things, such as the fact you&#8217;re editing your resume at work because you hate your job. Or perhaps you share a computer with other people and don&#8217;t want them to know what you are doing or where you&#8217;ve been on the Internet.\n<\/p>\n<p>\nFortunately, there are steps you can take to protect your privacy.<br \/>\nEveryone knows about obvious things like files in the My Documents directory.<br \/>\nBut there are many other places where traces of your PC work and play are left behind,<br \/>\nintentionally or accidentally.<br \/>\nDeleting files or hiding them in obscure directories won&#8217;t always do the trick.<br \/>\nSome of the most privacy leaks you&#8217;ll encounter are described below;<br \/>\nfor help in removing some of these tracks see our<br \/>\n<a href=\"?p=315\">cleanup page<\/a>.\n<\/p>\n<h3>Tracks You Can Clean<\/h3>\n<p>\n<strong>Browsing history:<\/strong><br \/>\nEvery time you visit a web site, the browser keeps track of the pages you<br \/>\nvisit so that you can easily get back to them later.<br \/>\nYou can decide how far back that history goes, and whether you to<br \/>\nclear out the browsing history entirely.<br \/>\n(Our <a href=\"https:\/\/www.pcpitstop.com\/store\/erase.asp\">privacy scan<\/a><br \/>\ncan show you what&#8217;s currently in your browser history.)\n<\/p>\n<p>\n<strong>Internet cache:<\/strong><br \/>\nTo speed up web surfing, browsers keep a copy of the files you retrieve while<br \/>\nbrowsing the Internet.<br \/>\nThis includes web pages, images, Flash animations, and even large files like videos.<br \/>\nAll of these files can easily be seen in Internet Explorer;<br \/>\njust click View, Internet Options, Settings, View Files.\n<\/p>\n<p>\n<strong>Cookies:<\/strong><br \/>\nCookies serve an important purpose; they provide a &#8220;memory&#8221; so that you can<br \/>\ninteract with a web site from page to page.  In some cases, it is possible for sites to use cookies to track your computer across multiple web sites.  However, it takes a rare combination of circumstances before any personally identifiable data could be associated with those cookies.<br \/>\nThe &#8220;threat&#8221; from cookies is greatly exaggerated in our opinion, but there are some cookies that you may want to delete to ensure the most privacy.  Blocking or deleting all cookies is usually not a good idea.\n<\/p>\n<p>\n<strong>Recently-used file lists:<\/strong><br \/>\nMany program keep a list of files that you have recently opened while using that program; it&#8217;s a feature of Microsoft Office applications for example.  Windows itself keeps a list of recently used documents for all applications on the Start Menu under Documents.  Some of these can be disabled if you prefer not to see or show them.\n<\/p>\n<p>\n<strong>Last-Used directories:<\/strong><br \/>\nSometimes a program won&#8217;t keep a specific list of files, but instead remembers the last directory where you opened or saved a file.  The next time someone opens up the application or tries to save a file, they view a directory containing your files.  For example, WinZip offers this feature; it can be turned off through WinZip&#8217;s Options, Configuration, Folders dialog.\n<\/p>\n<p>\n<strong>Form entries:<\/strong><br \/>\nBrowsers often have an option to remember the data you have entered into forms.  Programs such as RoboForm or Google Toolbar also offer form-fill features.  If someone else is using the computer, they may be able to use the data that is remembered to automatically access web sites using your logins or get persional information.  Where possible, you should protect your information with a master password or turn off form auto-filling to prevent the data from being recorded.\n<\/p>\n<p>\n<strong>Autocomplete URLs:<\/strong><br \/>\nAnother browser feature remembers the sites that you type into the address bar.<br \/>\nLike browser history, this can help to keep track of where you&#8217;ve been.<br \/>\nUnlike browser history, these are addresses that you specifically <i>typed<\/i><br \/>\ninto the address bar, so there is little doubt that you meant to go to these sites.\n<\/p>\n<p>\n<strong>Recycle Bin:<\/strong><br \/>\nSometimes it&#8217;s easy to forget that deleting a file in Windows doesn&#8217;t<br \/>\ncompletely delete it.  When you highlight a file and hit the Delete key, it actually goes into<br \/>\nthe Recycle Bin. Windows XP keeps a separate Recycle Bin for each user login, which helps<br \/>\nmaintain privacy a bit&#8211;if you use separate logins!  Otherwise, anyone can simply open the Recycle Bin and see the files that you no longer wanted, and perhaps the files you wanted nobody to see.\n<\/p>\n<p>\n<strong>Temporary files:<\/strong><br \/>\nAs programs run, they sometimes create working files that they &#8220;forget&#8221; to clean up when they are done.  These working files may include many different types of sensitive information.  If you are editing your resume, for example, one of the temporary files may be a complete copy of your resume.  Temporary file directories are also common hiding places for spyware and viruses, so it&#8217;s a good idea to clean them out to make sure they don&#8217;t harbor anything bad.\n<\/p>\n<p>\n<strong>Document properties and revisions:<\/strong><br \/>\nPrograms like Microsoft Word and Excel put your name and other information into the document properties.  If you send the document to other people, they can see that you created it<br \/>\nusing the information in the document properties.  Microsoft Word also has a revision tracking feature that remembers the changes you have made to a document.  You may have Word set to show only the most recent revision.  If you were to send the document to someone else, however, they might have their options set so they can see those edits and comments.<br \/>\nThat could potentially reveal proprietary or embarrassing information.<br \/>\n(Microsoft makes a<br \/>\n<a target=\"_blank\" href=\"http:\/\/support.microsoft.com\/kb\/834427\">free tool<\/a><br \/>\nthat can remove this data; also see<br \/>\n<a target=\"_blank\" href=\"http:\/\/support.microsoft.com\/kb\/825576\">this Microsoft article<\/a><br \/>\non how to minimize personal data being stored into documents.\n<\/p>\n<h3>Tough to Hide<\/h3>\n<p>\nNo matter how careful you are, there are some things that are difficult to hide.  The good news is that a casual snooper is rarely going to go through the amount of work it would take to retrieve personal or incriminating information from one of these sources.  The bad news? If you are doing something on your computer that you believe is serious enough to justify this level of snooping, you are probably doing something illegal.<br \/>\nDon&#8217;t think that it is possible to cover all your tracks.<br \/>\nEvery technique you can use to eliminate evidence has a flaw, and a determined<br \/>\ninvestigator can find it.<br \/>\nHere are a few of the items that are tough to hide:\n<\/p>\n<p>\n<strong>Fragmented file names:<\/strong><br \/>\nWhen the Windows 2000\/XP version of Disk Defragmenter runs, it displays<br \/>\nthe names of the file that it is currently defragmenting on its status bar.  The names of large and fragmented files may stay on the screen for a minute or more as they are defragmented.  Also, the report generated by Disk Defragmenter&#8217;s analysis includes the names of the ten most fragmented files on the drive.  These names will be displayed even if the files are marked as hidden or system files.\n<\/p>\n<p>\n<strong>Deleted files:<\/strong><br \/>\nWhen you delete a file directly (without sending it to the Recycle Bin),<br \/>\nor when you empty the Recycle Bin, most of the file name and file data are<br \/>\nactually still on the drive.<br \/>\nIt may be a long time before the space used for the deleted file is re-used<br \/>\nby a new file; the algorithm used by Windows for creating new files<br \/>\nalmost guarantees that the space will not be used immediately.<br \/>\nA file undelete program such as the one in Norton Utilities can usually<br \/>\nretrieve files that have been recently deleted, and potentially can recover<br \/>\nfiles that are months old.\n<\/p>\n<p>\n<strong>Slack space:<\/strong><br \/>\nOn most hard drives, files use a multiple of 4,096-byte (or larger) clusters of data on<br \/>\nthe drive.  If the file is only 100 bytes, for example, Windows does not erase<br \/>\nthe remaining 3,996 bytes; this is known as &#8220;slack space.&#8221;  The slack space may contain the data from previous file at that location,  or it might be data from the program that created the file.<br \/>\nPrograms that read the file through Windows will never see the data in the slack space,<br \/>\nbecause Windows will only return the first 100 bytes.  However, a determined snooper with a low-level disk editor could search the drive and might find interesting personal data in the slack space.\n<\/p>\n<p>\n<strong>Paging file:<\/strong><br \/>\nWindows uses the paging file (also known as the swap file) to handle the<br \/>\nsituation where the programs that are running need more physical memory (RAM)<br \/>\nthan is installed in the PC.  The paging file may be used even with systems that have a large amount of memory, particularly for memory-intensive operations such as editing large images or<br \/>\nvideo files.  When data from a program is written to the swap file, it may contain personal<br \/>\ninformation that could compromise privacy.  A well-written program should not keep this kind of information in memory, but it is difficult for a user to know whether the data is protected.<br \/>\nUsing a low-level disk utility, someone could scan the swap file to find this kind of information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That&#8217;s the benefit of a computer; it&#8217;s supposed to keep track of things so you don&#8217;t have to do it yourself. But there are times that you don&#8217;t want it to be so good [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[48,1547,316,1640,53],"class_list":["post-318","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-computer","tag-list","tag-privacy","tag-track","tag-web"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Your PC Tracks<\/title>\n<meta name=\"description\" content=\"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That&#039;s the benefit of a computer; it&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Your PC Tracks\" \/>\n<meta property=\"og:description\" content=\"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That&#039;s the benefit of a computer; it&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2005-01-20T20:46:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dave\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dave\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/\"},\"author\":{\"name\":\"Dave\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/410cb009e8536b3c2bd1f16efe1718bf\"},\"headline\":\"What Your PC Tracks\",\"datePublished\":\"2005-01-20T20:46:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/\"},\"wordCount\":1515,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"computer\",\"list\",\"privacy\",\"track\",\"web\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/\",\"name\":\"What Your PC Tracks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2005-01-20T20:46:34+00:00\",\"description\":\"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That's the benefit of a computer; it's\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-your-pc-tracks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Your PC Tracks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/410cb009e8536b3c2bd1f16efe1718bf\",\"name\":\"Dave\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/dave\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Your PC Tracks","description":"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That's the benefit of a computer; it's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/","og_locale":"en_US","og_type":"article","og_title":"What Your PC Tracks","og_description":"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That's the benefit of a computer; it's","og_url":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2005-01-20T20:46:34+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Dave","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Dave","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/"},"author":{"name":"Dave","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/410cb009e8536b3c2bd1f16efe1718bf"},"headline":"What Your PC Tracks","datePublished":"2005-01-20T20:46:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/"},"wordCount":1515,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["computer","list","privacy","track","web"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/","url":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/","name":"What Your PC Tracks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2005-01-20T20:46:34+00:00","description":"You should always assume that whenever you use your PC, you are leaving behind a record of what you are doing. That's the benefit of a computer; it's","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/what-your-pc-tracks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Your PC Tracks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/410cb009e8536b3c2bd1f16efe1718bf","name":"Dave","url":"https:\/\/www.pcmatic.com\/blog\/author\/dave\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/318","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=318"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/318\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=318"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=318"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=318"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}